diff options
author | V3n3RiX <venerix@koprulu.sector> | 2025-01-09 06:41:15 +0000 |
---|---|---|
committer | V3n3RiX <venerix@koprulu.sector> | 2025-01-09 06:41:15 +0000 |
commit | d94fef9a5708b8e64f363f4a71f0b56caef5efe4 (patch) | |
tree | b8041134209c7d8f47560e719b584508ea78180f /sys-auth | |
parent | 9991465b0b90d77b2a8a2ae833b6ecd99e6b5101 (diff) |
gentoo auto-resync : 09:01:2025 - 06:41:15
Diffstat (limited to 'sys-auth')
-rw-r--r-- | sys-auth/Manifest.gz | bin | 9262 -> 9261 bytes | |||
-rw-r--r-- | sys-auth/pam_ssh_agent_auth/Manifest | 6 | ||||
-rw-r--r-- | sys-auth/pam_ssh_agent_auth/files/pam_ssh_agent_auth-0.10.4-0003-Fix-incompatible-pointer.patch | 46 | ||||
-rw-r--r-- | sys-auth/pam_ssh_agent_auth/files/pam_ssh_agent_auth-0.10.4-0004-Always-call-linker.patch | 44 | ||||
-rw-r--r-- | sys-auth/pam_ssh_agent_auth/pam_ssh_agent_auth-0.10.4-r1.ebuild | 4 | ||||
-rw-r--r-- | sys-auth/pam_ssh_agent_auth/pam_ssh_agent_auth-9999.ebuild | 4 |
6 files changed, 100 insertions, 4 deletions
diff --git a/sys-auth/Manifest.gz b/sys-auth/Manifest.gz Binary files differindex c25bfceaeec7..6896d7b3de67 100644 --- a/sys-auth/Manifest.gz +++ b/sys-auth/Manifest.gz diff --git a/sys-auth/pam_ssh_agent_auth/Manifest b/sys-auth/pam_ssh_agent_auth/Manifest index 694209205a4a..7560f0723285 100644 --- a/sys-auth/pam_ssh_agent_auth/Manifest +++ b/sys-auth/pam_ssh_agent_auth/Manifest @@ -1,7 +1,9 @@ AUX pam_ssh_agent_auth-0.10.4-0001-Fix-function-prototypes-in-configure.patch 1524 BLAKE2B 404fc791503e497db68b26380c2f3f00be5ef2f85853336e71743351fb5b3927fe3d1226a6eea8076b683cf48dd7ac16ce75a459f57a208deaefcd81b9560c97 SHA512 42b0047704da6cd57c0bfa2295b9a204ba61b42da6a14cbc0478cd116d0fecb7e853f3bb0cbbe08eea614456ab08d2c33127084a5bb18499eebdabf752dd400b AUX pam_ssh_agent_auth-0.10.4-0002-Add-missing-includes-implicit-function-declarations.patch 6688 BLAKE2B a97e67fbaa7a29cfdd90d806ed81c7d16fc9adc7abc50a32a665e2aa23e7b6bffdbe028e05014b4f1fbb227275348546bec0b29ce0467727cd1ba71614b6d2e2 SHA512 a21a5f2fe0df9f732101c540f94a1738cf21b54e3a785139241413fd2b474afec9e4b081105bedb834e1faf2abbede6626dd5b76746c9100d0ae277c1fcd39d8 +AUX pam_ssh_agent_auth-0.10.4-0003-Fix-incompatible-pointer.patch 1722 BLAKE2B 6096d7c076ee8aa64070b7e350f080d880139417102b6534492ff4a03b664c98329432e37a8f79349fc73e3aa9224111f07e052473def7c6f34160b4055f07b8 SHA512 c52c0f65528e9fb47261e3586ac872772c01e198d1bcf590d2972eee3502bcbcda7fe0e87c660fe1c6d69cfb40ec1e7e4dedda866123b81e747e77d241b5ad5e +AUX pam_ssh_agent_auth-0.10.4-0004-Always-call-linker.patch 1019 BLAKE2B 5f82df60362cd0acf01af8c1713088d336ba33ed5939b7dd48cfc729e1226d4d36ab9fa57c3bc2b57c7217fd9d1c1f72747103e75d2b6d81df08dc6826a97d4e SHA512 c90d820f2691769703cd38e96fbbe2dce9c555cd29afa4a4963a40d43a8f11221aa7f2f47779165ab0e3d8e9c7459686e3185609be18908dc61f535829ae93be DIST pam_ssh_agent_auth-0.10.4.tar.gz 307110 BLAKE2B dad39724db4c35ff42e28492c23ab1073baf859ecf797003509b8aa3d29c71e7fae9601d193af1def58c64f149ced07e4e050fac89ae7f42fcbce5241b99df7b SHA512 caccf72174d15e43f4c86a459ac6448682e62116557cf1e1e828955f3d1731595b238df42adec57860e7f341e92daf5d8285020bcb5018f3b8a5145aa32ee1c2 DIST pam_ssh_agent_auth-ed25519-donna.tar.gz 1169972 BLAKE2B f44fa6c00dbb5cdfe51661cb559428bf24c9886e166366d1700d479f033b8b61621d7821d39a9949a7ef7cd6f5be16be575790a8f6fee03276c2c142f65a792a SHA512 5e8b838bc66bdb1983e62b0ae969449741a3fb223198bce26fe3a8996e324728e8ba0e5259f9ef3db613fd484db21459e98c39367f7240940bc537210c6d7f63 -EBUILD pam_ssh_agent_auth-0.10.4-r1.ebuild 1737 BLAKE2B dda77d1e7b2c2c6e23652c9bb92ee7a21c01d1bfef6ab01d09ec6b0f49cf7e3e619acffa1af453f0d7df82f00a2e329553062c2c140985a552f01c37f25851b9 SHA512 2279a1d0f979d109cbfd04ba2d8968fcdfa67ac5cfbab11a2ce5baf01d79d03c8ea377d76d65d6bc54ddd5c9c546f02e04c75b465663b382c8e7e2694b64f3ca -EBUILD pam_ssh_agent_auth-9999.ebuild 1617 BLAKE2B cfef475437a45fce24881dc91dca6b482287748848714567c9bd8498caee72ab4b61d309bfe2cab843c5339d898c7724a5fbfc16e71b3de87cdc257850758ef4 SHA512 aca96735b06947b418275c8cc055df901075d460ccf91481752cf798763f7f2004b28a23031672a3baf9f8a9a76b947ce28a43eecf3cdc364ea57f86c8180b70 +EBUILD pam_ssh_agent_auth-0.10.4-r1.ebuild 1859 BLAKE2B 914421c48ce53632c1a8ff553c114a44262b686656e08ad7839701c44ca37fa97993aceb258d4b39c4acb89754a6f041f735f5dbe08660a691b0cd37678cc854 SHA512 ac7991c151898ccf49aa9a25bceed221ffbf838672d943f2f3122ae50402d32131250798b38e2541aa2b64bd7770734669ed8b5a0332baab2a7878b1c34125b3 +EBUILD pam_ssh_agent_auth-9999.ebuild 1739 BLAKE2B e00d242684d62e464c806059581093b72f0f6a1c75244f56fffb2e91765291a6b6ea5ade4ac37dbd6af07c1ba55e2a9c1a6375c50299553f5ef6eccfaf2a4c78 SHA512 0b050049d8d9a74ba684c3057883c67c6a671ed80b0bb338ae2616f1ca5999e28fe9482d76ab8cbdd9ebbe5e81ebfb17ffcede9229d359f4baaa88cf477473d7 MISC metadata.xml 320 BLAKE2B 72cc0874f37540256fa619149ba61ce800f7c70f72a21fbd71fbf7ce3b3d8197a0ae41ff6dd4258e00fe7b769082ddc4506554cf4225b237720f16fbea053475 SHA512 9a9ef1797edd6aa4c647f389dfb8d94b240c4bd01c4c409086b33ba7e80eae570e84035721a8989118e58fc76f048eb84b078d2237b05b6bb33ec5ea3a3b3e62 diff --git a/sys-auth/pam_ssh_agent_auth/files/pam_ssh_agent_auth-0.10.4-0003-Fix-incompatible-pointer.patch b/sys-auth/pam_ssh_agent_auth/files/pam_ssh_agent_auth-0.10.4-0003-Fix-incompatible-pointer.patch new file mode 100644 index 000000000000..580e903c0c18 --- /dev/null +++ b/sys-auth/pam_ssh_agent_auth/files/pam_ssh_agent_auth-0.10.4-0003-Fix-incompatible-pointer.patch @@ -0,0 +1,46 @@ +Description: Avoided incompatible pointer passing to fix GCC 14 build errors. + Add missing 'const', cast to expected pointer type (DSA_SIG) and avoid + pointer to pointer when pointer is required. + Updated for Gentoo. +Author: Petter Reinholdtsen <pere@debian.org> +Bug-Debian: https://bugs.debian.org/1075358 +Forwarded: no +Last-Update: 2024-11-05 +--- +--- a/ssh-ecdsa.c ++++ b/ssh-ecdsa.c +@@ -73,7 +73,7 @@ ssh_ecdsa_sign(const Key *key, u_char ** + if (pamsshagentauth_buffer_get_bignum2_ret(&bb, sig->r) == -1 || + pamsshagentauth_buffer_get_bignum2_ret(&bb, sig->s) == -1) { + #else +- DSA_SIG_get0(sig, &r, &s); ++ DSA_SIG_get0((const DSA_SIG*)sig, (const BIGNUM **)&r, (const BIGNUM **)&s); + if (pamsshagentauth_buffer_get_bignum2_ret(&bb, r) == -1 || + pamsshagentauth_buffer_get_bignum2_ret(&bb, s) == -1) { + #endif +--- a/ssh-rsa.c ++++ b/ssh-rsa.c +@@ -56,9 +56,9 @@ ssh_rsa_sign(const Key *key, u_char **si + return -1; + } + md = EVP_MD_CTX_create(); +- EVP_DigestInit(&md, evp_md); +- EVP_DigestUpdate(&md, data, datalen); +- EVP_DigestFinal(&md, digest, &dlen); ++ EVP_DigestInit(md, evp_md); ++ EVP_DigestUpdate(md, data, datalen); ++ EVP_DigestFinal(md, digest, &dlen); + + slen = RSA_size(key->rsa); + sig = pamsshagentauth_xmalloc(slen); +--- a/ssh-ecdsa.c ++++ b/ssh-ecdsa.c +@@ -145,7 +145,7 @@ + if ((pamsshagentauth_buffer_get_bignum2_ret(&b, sig->r) == -1) || + (pamsshagentauth_buffer_get_bignum2_ret(&b, sig->s) == -1)) + #else +- DSA_SIG_get0(sig, &r, &s); ++ DSA_SIG_get0((const DSA_SIG*)sig, (const BIGNUM **)&r, (const BIGNUM **)&s); + if ((pamsshagentauth_buffer_get_bignum2_ret(&b, r) == -1) || + (pamsshagentauth_buffer_get_bignum2_ret(&b, s) == -1)) + #endif diff --git a/sys-auth/pam_ssh_agent_auth/files/pam_ssh_agent_auth-0.10.4-0004-Always-call-linker.patch b/sys-auth/pam_ssh_agent_auth/files/pam_ssh_agent_auth-0.10.4-0004-Always-call-linker.patch new file mode 100644 index 000000000000..81d857f4182d --- /dev/null +++ b/sys-auth/pam_ssh_agent_auth/files/pam_ssh_agent_auth-0.10.4-0004-Always-call-linker.patch @@ -0,0 +1,44 @@ +From 465a30ec74c5053ac93ecd58d71427a3e2b4f393 Mon Sep 17 00:00:00 2001 +From: Peter Levine <plevine457@gmail.com> +Date: Sun, 18 Dec 2022 21:19:39 -0500 +Subject: [PATCH] Always use the compiler to call the linker + +Let the compiler call the linker to handle LDFLAGS correctly. +--- + configure | 5 +---- + configure.ac | 6 +----- + 2 files changed, 2 insertions(+), 9 deletions(-) + +diff --git a/configure b/configure +index 0090b34..ca8cd7f 100755 +--- a/configure ++++ b/configure +@@ -7577,10 +7577,7 @@ _ACEOF + + fi + +-if test -z "$LD" ; then +- LD=$CC +-fi +- ++LD=$CC + + + ac_fn_c_check_decl "$LINENO" "LLONG_MAX" "ac_cv_have_decl_LLONG_MAX" "#include <limits.h> +diff --git a/configure.ac b/configure.ac +index 6496679..7cfd8fc 100644 +--- a/configure.ac ++++ b/configure.ac +@@ -116,11 +116,7 @@ if test ! -z "$PATH_PASSWD_PROG" ; then + [Full path of your "passwd" program]) + fi + +-if test -z "$LD" ; then +- LD=$CC +-fi +-AC_SUBST(LD) +- ++AC_SUBST(LD, $CC) + + AC_CHECK_DECL(LLONG_MAX, have_llong_max=1, , [#include <limits.h>]) + diff --git a/sys-auth/pam_ssh_agent_auth/pam_ssh_agent_auth-0.10.4-r1.ebuild b/sys-auth/pam_ssh_agent_auth/pam_ssh_agent_auth-0.10.4-r1.ebuild index d09b0fea56c1..aa7b2e61f595 100644 --- a/sys-auth/pam_ssh_agent_auth/pam_ssh_agent_auth-0.10.4-r1.ebuild +++ b/sys-auth/pam_ssh_agent_auth/pam_ssh_agent_auth-0.10.4-r1.ebuild @@ -1,4 +1,4 @@ -# Copyright 1999-2022 Gentoo Authors +# Copyright 1999-2025 Gentoo Authors # Distributed under the terms of the GNU General Public License v2 EAPI=8 @@ -36,6 +36,8 @@ BDEPEND="dev-lang/perl" PATCHES=( "${FILESDIR}"/${PN}-0.10.4-0001-Fix-function-prototypes-in-configure.patch "${FILESDIR}"/${PN}-0.10.4-0002-Add-missing-includes-implicit-function-declarations.patch + "${FILESDIR}"/${PN}-0.10.4-0003-Fix-incompatible-pointer.patch + "${FILESDIR}"/${PN}-0.10.4-0004-Always-call-linker.patch ) src_prepare() { diff --git a/sys-auth/pam_ssh_agent_auth/pam_ssh_agent_auth-9999.ebuild b/sys-auth/pam_ssh_agent_auth/pam_ssh_agent_auth-9999.ebuild index d633a44c02ec..501e1ff7f51a 100644 --- a/sys-auth/pam_ssh_agent_auth/pam_ssh_agent_auth-9999.ebuild +++ b/sys-auth/pam_ssh_agent_auth/pam_ssh_agent_auth-9999.ebuild @@ -1,4 +1,4 @@ -# Copyright 1999-2022 Gentoo Authors +# Copyright 1999-2025 Gentoo Authors # Distributed under the terms of the GNU General Public License v2 EAPI=8 @@ -36,6 +36,8 @@ BDEPEND="dev-lang/perl" PATCHES=( "${FILESDIR}"/${PN}-0.10.4-0001-Fix-function-prototypes-in-configure.patch "${FILESDIR}"/${PN}-0.10.4-0002-Add-missing-includes-implicit-function-declarations.patch + "${FILESDIR}"/${PN}-0.10.4-0003-Fix-incompatible-pointer.patch + "${FILESDIR}"/${PN}-0.10.4-0004-Always-call-linker.patch ) src_prepare() { |