summaryrefslogtreecommitdiff
path: root/security/krb5-122/files
diff options
context:
space:
mode:
Diffstat (limited to 'security/krb5-122/files')
-rw-r--r--security/krb5-122/files/patch-clients__ksu__Makefile.in9
-rw-r--r--security/krb5-122/files/patch-config__pre.in8
-rw-r--r--security/krb5-122/files/patch-config__shlib.conf6
-rw-r--r--security/krb5-122/files/patch-configure.ac6
-rw-r--r--security/krb5-122/files/patch-lib-krb5-os-localaddr.c16
-rw-r--r--security/krb5-122/files/patch-lib__gssapi__krb5__import_name.c8
-rw-r--r--security/krb5-122/files/patch-lib_krad_packet.c6
-rw-r--r--security/krb5-122/files/patch-plugins_preauth_pkinit_pkinit__crypto__openssl.c12
-rw-r--r--security/krb5-122/files/patch-util_ss_listen.c4
9 files changed, 38 insertions, 37 deletions
diff --git a/security/krb5-122/files/patch-clients__ksu__Makefile.in b/security/krb5-122/files/patch-clients__ksu__Makefile.in
index 3544db84fc2c..b664998ba9c5 100644
--- a/security/krb5-122/files/patch-clients__ksu__Makefile.in
+++ b/security/krb5-122/files/patch-clients__ksu__Makefile.in
@@ -1,6 +1,6 @@
---- clients/ksu/Makefile.in.orig 2019-05-21 14:09:23.000000000 -0700
-+++ clients/ksu/Makefile.in 2019-05-21 20:30:48.612847000 -0700
-@@ -1,6 +1,6 @@
+--- clients/ksu/Makefile.in.orig 2025-08-05 14:15:15 UTC
++++ clients/ksu/Makefile.in
+@@ -1,6 +1,6 @@ BUILDTOP=$(REL)..$(S)..
mydir=clients$(S)ksu
BUILDTOP=$(REL)..$(S)..
-DEFINES = -DGET_TGT_VIA_PASSWD -DPRINC_LOOK_AHEAD -DCMD_PATH='"/usr/local/sbin /usr/local/bin /sbin /bin /usr/sbin /usr/bin"'
@@ -8,7 +8,7 @@
KSU_LIBS=@KSU_LIBS@
-@@ -30,6 +30,6 @@
+@@ -30,7 +30,7 @@ install:
install:
-for f in ksu; do \
@@ -16,3 +16,4 @@
+ $(INSTALL_PROGRAM) $$f \
$(DESTDIR)$(CLIENT_BINDIR)/`echo $$f|sed '$(transform)'`; \
done
+
diff --git a/security/krb5-122/files/patch-config__pre.in b/security/krb5-122/files/patch-config__pre.in
index 8527c550dc25..8d4180f36d4b 100644
--- a/security/krb5-122/files/patch-config__pre.in
+++ b/security/krb5-122/files/patch-config__pre.in
@@ -1,6 +1,6 @@
---- config/pre.in.orig 2014-10-15 16:55:10.000000000 -0700
-+++ config/pre.in 2015-02-04 12:43:45.693875606 -0800
-@@ -178,9 +178,9 @@
+--- config/pre.in.orig 2025-08-05 14:15:15 UTC
++++ config/pre.in
+@@ -182,9 +182,9 @@ INSTALL_PROGRAM=@INSTALL_PROGRAM@ $(INSTALL_STRIP)
INSTALL=@INSTALL@
INSTALL_STRIP=
INSTALL_PROGRAM=@INSTALL_PROGRAM@ $(INSTALL_STRIP)
@@ -12,7 +12,7 @@
INSTALL_SETUID=$(INSTALL) $(INSTALL_STRIP) -m 4755 -o root
## This is needed because autoconf will sometimes define @exec_prefix@ to be
## ${prefix}.
-@@ -197,7 +197,7 @@
+@@ -202,7 +202,7 @@ CLIENT_BINDIR =@bindir@
ADMIN_BINDIR = @sbindir@
SERVER_BINDIR = @sbindir@
CLIENT_BINDIR =@bindir@
diff --git a/security/krb5-122/files/patch-config__shlib.conf b/security/krb5-122/files/patch-config__shlib.conf
index 6761ad7ef35c..bd1630361860 100644
--- a/security/krb5-122/files/patch-config__shlib.conf
+++ b/security/krb5-122/files/patch-config__shlib.conf
@@ -1,6 +1,6 @@
---- config/shlib.conf.orig 2025-08-05 07:15:15.000000000 -0700
-+++ config/shlib.conf 2025-08-06 00:01:20.148882000 -0700
-@@ -168,14 +168,15 @@
+--- config/shlib.conf.orig 2025-08-05 14:15:15 UTC
++++ config/shlib.conf
+@@ -168,14 +168,15 @@ mips-*-netbsd*)
PICFLAGS=-fpic
;;
esac
diff --git a/security/krb5-122/files/patch-configure.ac b/security/krb5-122/files/patch-configure.ac
index abbae0e771b3..c5348a6d82dd 100644
--- a/security/krb5-122/files/patch-configure.ac
+++ b/security/krb5-122/files/patch-configure.ac
@@ -1,6 +1,6 @@
---- configure.ac.orig 2023-08-07 11:38:21.000000000 -0700
-+++ configure.ac 2023-08-09 14:49:19.833149000 -0700
-@@ -1356,8 +1356,12 @@
+--- configure.ac.orig 2025-08-05 14:15:15 UTC
++++ configure.ac
+@@ -1365,8 +1365,12 @@ if test "x$with_libedit" != xno; then
AC_DEFINE([HAVE_LIBEDIT], 1, [Define if building with libedit.])
AC_MSG_NOTICE([Using libedit for readline support])
elif test "x$with_libedit" = xyes; then
diff --git a/security/krb5-122/files/patch-lib-krb5-os-localaddr.c b/security/krb5-122/files/patch-lib-krb5-os-localaddr.c
index 06b6043f22c9..0eb941de968b 100644
--- a/security/krb5-122/files/patch-lib-krb5-os-localaddr.c
+++ b/security/krb5-122/files/patch-lib-krb5-os-localaddr.c
@@ -1,6 +1,6 @@
---- lib/krb5/os/localaddr.c.orig 2009-10-30 20:17:27.000000000 -0700
-+++ lib/krb5/os/localaddr.c 2010-04-19 12:39:56.707090973 -0700
-@@ -175,6 +175,7 @@
+--- lib/krb5/os/localaddr.c.orig 2025-08-05 14:15:15 UTC
++++ lib/krb5/os/localaddr.c
+@@ -176,6 +176,7 @@ printaddr(struct sockaddr *sa)
}
#endif
@@ -8,7 +8,7 @@
static int
is_loopback_address(struct sockaddr *sa)
{
-@@ -191,6 +192,7 @@
+@@ -188,6 +189,7 @@ is_loopback_address(struct sockaddr *sa)
return 0;
}
}
@@ -16,7 +16,7 @@
#ifdef HAVE_IFADDRS_H
#include <ifaddrs.h>
-@@ -467,12 +469,14 @@
+@@ -445,12 +447,14 @@ foreach_localaddr (/*@null@*/ void *data,
ifp->ifa_flags &= ~IFF_UP;
continue;
}
@@ -31,7 +31,7 @@
/* If this address is a duplicate, punt. */
match = 0;
for (ifp2 = ifp_head; ifp2 && ifp2 != ifp; ifp2 = ifp2->ifa_next) {
-@@ -601,11 +605,13 @@
+@@ -579,11 +583,13 @@ foreach_localaddr (/*@null@*/ void *data,
}
/*@=moduncon@*/
@@ -45,7 +45,7 @@
/* Ignore interfaces that are down. */
if ((lifreq.lifr_flags & IFF_UP) == 0) {
Tprintf ((" down\n"));
-@@ -772,11 +778,13 @@
+@@ -750,11 +756,13 @@ foreach_localaddr (/*@null@*/ void *data,
}
/*@=moduncon@*/
@@ -59,7 +59,7 @@
/* Ignore interfaces that are down. */
if ((lifreq.iflr_flags & IFF_UP) == 0) {
Tprintf ((" down\n"));
-@@ -987,11 +995,13 @@
+@@ -968,11 +976,13 @@ foreach_localaddr (/*@null@*/ void *data,
}
/*@=moduncon@*/
diff --git a/security/krb5-122/files/patch-lib__gssapi__krb5__import_name.c b/security/krb5-122/files/patch-lib__gssapi__krb5__import_name.c
index 40f116af2196..e316a6d6e4bf 100644
--- a/security/krb5-122/files/patch-lib__gssapi__krb5__import_name.c
+++ b/security/krb5-122/files/patch-lib__gssapi__krb5__import_name.c
@@ -1,7 +1,7 @@
---- lib/gssapi/krb5/import_name.c.orig Mon Jul 18 15:12:42 2005
-+++ lib/gssapi/krb5/import_name.c Tue Nov 8 09:53:58 2005
-@@ -33,6 +33,11 @@
- #endif
+--- lib/gssapi/krb5/import_name.c.orig 2025-08-05 14:15:15 UTC
++++ lib/gssapi/krb5/import_name.c
+@@ -32,6 +32,11 @@
+ #include <stdio.h>
#endif
+#include <sys/param.h>
diff --git a/security/krb5-122/files/patch-lib_krad_packet.c b/security/krb5-122/files/patch-lib_krad_packet.c
index 2668d9121524..33752633a2e5 100644
--- a/security/krb5-122/files/patch-lib_krad_packet.c
+++ b/security/krb5-122/files/patch-lib_krad_packet.c
@@ -1,6 +1,6 @@
---- lib/krad/packet.c.orig 2025-08-05 07:15:15.000000000 -0700
-+++ lib/krad/packet.c 2025-08-06 00:16:54.383533000 -0700
-@@ -477,6 +477,9 @@
+--- lib/krad/packet.c.orig 2025-08-05 14:15:15 UTC
++++ lib/krad/packet.c
+@@ -477,6 +477,9 @@ verify_msgauth(const char *secret, const krad_packet *
krb5_error_code retval;
msgauth = krad_packet_get_attr(pkt, KRAD_ATTR_MESSAGE_AUTHENTICATOR, 0);
diff --git a/security/krb5-122/files/patch-plugins_preauth_pkinit_pkinit__crypto__openssl.c b/security/krb5-122/files/patch-plugins_preauth_pkinit_pkinit__crypto__openssl.c
index 71d27a31b406..da280356c92c 100644
--- a/security/krb5-122/files/patch-plugins_preauth_pkinit_pkinit__crypto__openssl.c
+++ b/security/krb5-122/files/patch-plugins_preauth_pkinit_pkinit__crypto__openssl.c
@@ -1,8 +1,8 @@
---- plugins/preauth/pkinit/pkinit_crypto_openssl.c.orig 2022-10-17 09:52:43 UTC
+--- plugins/preauth/pkinit/pkinit_crypto_openssl.c.orig 2025-08-05 14:15:15 UTC
+++ plugins/preauth/pkinit/pkinit_crypto_openssl.c
-@@ -184,6 +184,17 @@ pkcs11err(int err);
- (*_x509_pp) = PKCS7_cert_from_signer_info(_p7,_si)
- #endif
+@@ -201,6 +201,17 @@ create_identifiers_from_stack(STACK_OF(X509) *sk,
+ create_identifiers_from_stack(STACK_OF(X509) *sk,
+ krb5_external_principal_identifier *** ids);
+#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
+
@@ -18,7 +18,7 @@
#if OPENSSL_VERSION_NUMBER < 0x10100000L
/* 1.1 standardizes constructor and destructor names, renaming
-@@ -193,13 +204,6 @@ pkcs11err(int err);
+@@ -210,13 +221,6 @@ create_identifiers_from_stack(STACK_OF(X509) *sk,
#define EVP_MD_CTX_free EVP_MD_CTX_destroy
#define ASN1_STRING_get0_data ASN1_STRING_data
@@ -32,7 +32,7 @@
/* 1.1 makes many handle types opaque and adds accessors. Add compatibility
* versions of the new accessors we use for pre-1.1. */
-@@ -588,7 +592,7 @@ set_padded_derivation(EVP_PKEY_CTX *ctx)
+@@ -657,7 +661,7 @@ set_padded_derivation(EVP_PKEY_CTX *ctx)
{
EVP_PKEY_CTX_set_dh_pad(ctx, 1);
}
diff --git a/security/krb5-122/files/patch-util_ss_listen.c b/security/krb5-122/files/patch-util_ss_listen.c
index 127784b0e2c0..86271a2041e6 100644
--- a/security/krb5-122/files/patch-util_ss_listen.c
+++ b/security/krb5-122/files/patch-util_ss_listen.c
@@ -1,5 +1,5 @@
---- util/ss/listen.c.orig 2023-08-07 11:38:21.000000000 -0700
-+++ util/ss/listen.c 2023-08-09 13:09:30.816661000 -0700
+--- util/ss/listen.c.orig 2025-08-05 14:15:15 UTC
++++ util/ss/listen.c
@@ -15,7 +15,11 @@
#include <sys/param.h>