summaryrefslogtreecommitdiff
path: root/sys-auth
diff options
context:
space:
mode:
authorV3n3RiX <venerix@koprulu.sector>2025-01-09 06:41:15 +0000
committerV3n3RiX <venerix@koprulu.sector>2025-01-09 06:41:15 +0000
commitd94fef9a5708b8e64f363f4a71f0b56caef5efe4 (patch)
treeb8041134209c7d8f47560e719b584508ea78180f /sys-auth
parent9991465b0b90d77b2a8a2ae833b6ecd99e6b5101 (diff)
gentoo auto-resync : 09:01:2025 - 06:41:15
Diffstat (limited to 'sys-auth')
-rw-r--r--sys-auth/Manifest.gzbin9262 -> 9261 bytes
-rw-r--r--sys-auth/pam_ssh_agent_auth/Manifest6
-rw-r--r--sys-auth/pam_ssh_agent_auth/files/pam_ssh_agent_auth-0.10.4-0003-Fix-incompatible-pointer.patch46
-rw-r--r--sys-auth/pam_ssh_agent_auth/files/pam_ssh_agent_auth-0.10.4-0004-Always-call-linker.patch44
-rw-r--r--sys-auth/pam_ssh_agent_auth/pam_ssh_agent_auth-0.10.4-r1.ebuild4
-rw-r--r--sys-auth/pam_ssh_agent_auth/pam_ssh_agent_auth-9999.ebuild4
6 files changed, 100 insertions, 4 deletions
diff --git a/sys-auth/Manifest.gz b/sys-auth/Manifest.gz
index c25bfceaeec7..6896d7b3de67 100644
--- a/sys-auth/Manifest.gz
+++ b/sys-auth/Manifest.gz
Binary files differ
diff --git a/sys-auth/pam_ssh_agent_auth/Manifest b/sys-auth/pam_ssh_agent_auth/Manifest
index 694209205a4a..7560f0723285 100644
--- a/sys-auth/pam_ssh_agent_auth/Manifest
+++ b/sys-auth/pam_ssh_agent_auth/Manifest
@@ -1,7 +1,9 @@
AUX pam_ssh_agent_auth-0.10.4-0001-Fix-function-prototypes-in-configure.patch 1524 BLAKE2B 404fc791503e497db68b26380c2f3f00be5ef2f85853336e71743351fb5b3927fe3d1226a6eea8076b683cf48dd7ac16ce75a459f57a208deaefcd81b9560c97 SHA512 42b0047704da6cd57c0bfa2295b9a204ba61b42da6a14cbc0478cd116d0fecb7e853f3bb0cbbe08eea614456ab08d2c33127084a5bb18499eebdabf752dd400b
AUX pam_ssh_agent_auth-0.10.4-0002-Add-missing-includes-implicit-function-declarations.patch 6688 BLAKE2B a97e67fbaa7a29cfdd90d806ed81c7d16fc9adc7abc50a32a665e2aa23e7b6bffdbe028e05014b4f1fbb227275348546bec0b29ce0467727cd1ba71614b6d2e2 SHA512 a21a5f2fe0df9f732101c540f94a1738cf21b54e3a785139241413fd2b474afec9e4b081105bedb834e1faf2abbede6626dd5b76746c9100d0ae277c1fcd39d8
+AUX pam_ssh_agent_auth-0.10.4-0003-Fix-incompatible-pointer.patch 1722 BLAKE2B 6096d7c076ee8aa64070b7e350f080d880139417102b6534492ff4a03b664c98329432e37a8f79349fc73e3aa9224111f07e052473def7c6f34160b4055f07b8 SHA512 c52c0f65528e9fb47261e3586ac872772c01e198d1bcf590d2972eee3502bcbcda7fe0e87c660fe1c6d69cfb40ec1e7e4dedda866123b81e747e77d241b5ad5e
+AUX pam_ssh_agent_auth-0.10.4-0004-Always-call-linker.patch 1019 BLAKE2B 5f82df60362cd0acf01af8c1713088d336ba33ed5939b7dd48cfc729e1226d4d36ab9fa57c3bc2b57c7217fd9d1c1f72747103e75d2b6d81df08dc6826a97d4e SHA512 c90d820f2691769703cd38e96fbbe2dce9c555cd29afa4a4963a40d43a8f11221aa7f2f47779165ab0e3d8e9c7459686e3185609be18908dc61f535829ae93be
DIST pam_ssh_agent_auth-0.10.4.tar.gz 307110 BLAKE2B dad39724db4c35ff42e28492c23ab1073baf859ecf797003509b8aa3d29c71e7fae9601d193af1def58c64f149ced07e4e050fac89ae7f42fcbce5241b99df7b SHA512 caccf72174d15e43f4c86a459ac6448682e62116557cf1e1e828955f3d1731595b238df42adec57860e7f341e92daf5d8285020bcb5018f3b8a5145aa32ee1c2
DIST pam_ssh_agent_auth-ed25519-donna.tar.gz 1169972 BLAKE2B f44fa6c00dbb5cdfe51661cb559428bf24c9886e166366d1700d479f033b8b61621d7821d39a9949a7ef7cd6f5be16be575790a8f6fee03276c2c142f65a792a SHA512 5e8b838bc66bdb1983e62b0ae969449741a3fb223198bce26fe3a8996e324728e8ba0e5259f9ef3db613fd484db21459e98c39367f7240940bc537210c6d7f63
-EBUILD pam_ssh_agent_auth-0.10.4-r1.ebuild 1737 BLAKE2B dda77d1e7b2c2c6e23652c9bb92ee7a21c01d1bfef6ab01d09ec6b0f49cf7e3e619acffa1af453f0d7df82f00a2e329553062c2c140985a552f01c37f25851b9 SHA512 2279a1d0f979d109cbfd04ba2d8968fcdfa67ac5cfbab11a2ce5baf01d79d03c8ea377d76d65d6bc54ddd5c9c546f02e04c75b465663b382c8e7e2694b64f3ca
-EBUILD pam_ssh_agent_auth-9999.ebuild 1617 BLAKE2B cfef475437a45fce24881dc91dca6b482287748848714567c9bd8498caee72ab4b61d309bfe2cab843c5339d898c7724a5fbfc16e71b3de87cdc257850758ef4 SHA512 aca96735b06947b418275c8cc055df901075d460ccf91481752cf798763f7f2004b28a23031672a3baf9f8a9a76b947ce28a43eecf3cdc364ea57f86c8180b70
+EBUILD pam_ssh_agent_auth-0.10.4-r1.ebuild 1859 BLAKE2B 914421c48ce53632c1a8ff553c114a44262b686656e08ad7839701c44ca37fa97993aceb258d4b39c4acb89754a6f041f735f5dbe08660a691b0cd37678cc854 SHA512 ac7991c151898ccf49aa9a25bceed221ffbf838672d943f2f3122ae50402d32131250798b38e2541aa2b64bd7770734669ed8b5a0332baab2a7878b1c34125b3
+EBUILD pam_ssh_agent_auth-9999.ebuild 1739 BLAKE2B e00d242684d62e464c806059581093b72f0f6a1c75244f56fffb2e91765291a6b6ea5ade4ac37dbd6af07c1ba55e2a9c1a6375c50299553f5ef6eccfaf2a4c78 SHA512 0b050049d8d9a74ba684c3057883c67c6a671ed80b0bb338ae2616f1ca5999e28fe9482d76ab8cbdd9ebbe5e81ebfb17ffcede9229d359f4baaa88cf477473d7
MISC metadata.xml 320 BLAKE2B 72cc0874f37540256fa619149ba61ce800f7c70f72a21fbd71fbf7ce3b3d8197a0ae41ff6dd4258e00fe7b769082ddc4506554cf4225b237720f16fbea053475 SHA512 9a9ef1797edd6aa4c647f389dfb8d94b240c4bd01c4c409086b33ba7e80eae570e84035721a8989118e58fc76f048eb84b078d2237b05b6bb33ec5ea3a3b3e62
diff --git a/sys-auth/pam_ssh_agent_auth/files/pam_ssh_agent_auth-0.10.4-0003-Fix-incompatible-pointer.patch b/sys-auth/pam_ssh_agent_auth/files/pam_ssh_agent_auth-0.10.4-0003-Fix-incompatible-pointer.patch
new file mode 100644
index 000000000000..580e903c0c18
--- /dev/null
+++ b/sys-auth/pam_ssh_agent_auth/files/pam_ssh_agent_auth-0.10.4-0003-Fix-incompatible-pointer.patch
@@ -0,0 +1,46 @@
+Description: Avoided incompatible pointer passing to fix GCC 14 build errors.
+ Add missing 'const', cast to expected pointer type (DSA_SIG) and avoid
+ pointer to pointer when pointer is required.
+ Updated for Gentoo.
+Author: Petter Reinholdtsen <pere@debian.org>
+Bug-Debian: https://bugs.debian.org/1075358
+Forwarded: no
+Last-Update: 2024-11-05
+---
+--- a/ssh-ecdsa.c
++++ b/ssh-ecdsa.c
+@@ -73,7 +73,7 @@ ssh_ecdsa_sign(const Key *key, u_char **
+ if (pamsshagentauth_buffer_get_bignum2_ret(&bb, sig->r) == -1 ||
+ pamsshagentauth_buffer_get_bignum2_ret(&bb, sig->s) == -1) {
+ #else
+- DSA_SIG_get0(sig, &r, &s);
++ DSA_SIG_get0((const DSA_SIG*)sig, (const BIGNUM **)&r, (const BIGNUM **)&s);
+ if (pamsshagentauth_buffer_get_bignum2_ret(&bb, r) == -1 ||
+ pamsshagentauth_buffer_get_bignum2_ret(&bb, s) == -1) {
+ #endif
+--- a/ssh-rsa.c
++++ b/ssh-rsa.c
+@@ -56,9 +56,9 @@ ssh_rsa_sign(const Key *key, u_char **si
+ return -1;
+ }
+ md = EVP_MD_CTX_create();
+- EVP_DigestInit(&md, evp_md);
+- EVP_DigestUpdate(&md, data, datalen);
+- EVP_DigestFinal(&md, digest, &dlen);
++ EVP_DigestInit(md, evp_md);
++ EVP_DigestUpdate(md, data, datalen);
++ EVP_DigestFinal(md, digest, &dlen);
+
+ slen = RSA_size(key->rsa);
+ sig = pamsshagentauth_xmalloc(slen);
+--- a/ssh-ecdsa.c
++++ b/ssh-ecdsa.c
+@@ -145,7 +145,7 @@
+ if ((pamsshagentauth_buffer_get_bignum2_ret(&b, sig->r) == -1) ||
+ (pamsshagentauth_buffer_get_bignum2_ret(&b, sig->s) == -1))
+ #else
+- DSA_SIG_get0(sig, &r, &s);
++ DSA_SIG_get0((const DSA_SIG*)sig, (const BIGNUM **)&r, (const BIGNUM **)&s);
+ if ((pamsshagentauth_buffer_get_bignum2_ret(&b, r) == -1) ||
+ (pamsshagentauth_buffer_get_bignum2_ret(&b, s) == -1))
+ #endif
diff --git a/sys-auth/pam_ssh_agent_auth/files/pam_ssh_agent_auth-0.10.4-0004-Always-call-linker.patch b/sys-auth/pam_ssh_agent_auth/files/pam_ssh_agent_auth-0.10.4-0004-Always-call-linker.patch
new file mode 100644
index 000000000000..81d857f4182d
--- /dev/null
+++ b/sys-auth/pam_ssh_agent_auth/files/pam_ssh_agent_auth-0.10.4-0004-Always-call-linker.patch
@@ -0,0 +1,44 @@
+From 465a30ec74c5053ac93ecd58d71427a3e2b4f393 Mon Sep 17 00:00:00 2001
+From: Peter Levine <plevine457@gmail.com>
+Date: Sun, 18 Dec 2022 21:19:39 -0500
+Subject: [PATCH] Always use the compiler to call the linker
+
+Let the compiler call the linker to handle LDFLAGS correctly.
+---
+ configure | 5 +----
+ configure.ac | 6 +-----
+ 2 files changed, 2 insertions(+), 9 deletions(-)
+
+diff --git a/configure b/configure
+index 0090b34..ca8cd7f 100755
+--- a/configure
++++ b/configure
+@@ -7577,10 +7577,7 @@ _ACEOF
+
+ fi
+
+-if test -z "$LD" ; then
+- LD=$CC
+-fi
+-
++LD=$CC
+
+
+ ac_fn_c_check_decl "$LINENO" "LLONG_MAX" "ac_cv_have_decl_LLONG_MAX" "#include <limits.h>
+diff --git a/configure.ac b/configure.ac
+index 6496679..7cfd8fc 100644
+--- a/configure.ac
++++ b/configure.ac
+@@ -116,11 +116,7 @@ if test ! -z "$PATH_PASSWD_PROG" ; then
+ [Full path of your "passwd" program])
+ fi
+
+-if test -z "$LD" ; then
+- LD=$CC
+-fi
+-AC_SUBST(LD)
+-
++AC_SUBST(LD, $CC)
+
+ AC_CHECK_DECL(LLONG_MAX, have_llong_max=1, , [#include <limits.h>])
+
diff --git a/sys-auth/pam_ssh_agent_auth/pam_ssh_agent_auth-0.10.4-r1.ebuild b/sys-auth/pam_ssh_agent_auth/pam_ssh_agent_auth-0.10.4-r1.ebuild
index d09b0fea56c1..aa7b2e61f595 100644
--- a/sys-auth/pam_ssh_agent_auth/pam_ssh_agent_auth-0.10.4-r1.ebuild
+++ b/sys-auth/pam_ssh_agent_auth/pam_ssh_agent_auth-0.10.4-r1.ebuild
@@ -1,4 +1,4 @@
-# Copyright 1999-2022 Gentoo Authors
+# Copyright 1999-2025 Gentoo Authors
# Distributed under the terms of the GNU General Public License v2
EAPI=8
@@ -36,6 +36,8 @@ BDEPEND="dev-lang/perl"
PATCHES=(
"${FILESDIR}"/${PN}-0.10.4-0001-Fix-function-prototypes-in-configure.patch
"${FILESDIR}"/${PN}-0.10.4-0002-Add-missing-includes-implicit-function-declarations.patch
+ "${FILESDIR}"/${PN}-0.10.4-0003-Fix-incompatible-pointer.patch
+ "${FILESDIR}"/${PN}-0.10.4-0004-Always-call-linker.patch
)
src_prepare() {
diff --git a/sys-auth/pam_ssh_agent_auth/pam_ssh_agent_auth-9999.ebuild b/sys-auth/pam_ssh_agent_auth/pam_ssh_agent_auth-9999.ebuild
index d633a44c02ec..501e1ff7f51a 100644
--- a/sys-auth/pam_ssh_agent_auth/pam_ssh_agent_auth-9999.ebuild
+++ b/sys-auth/pam_ssh_agent_auth/pam_ssh_agent_auth-9999.ebuild
@@ -1,4 +1,4 @@
-# Copyright 1999-2022 Gentoo Authors
+# Copyright 1999-2025 Gentoo Authors
# Distributed under the terms of the GNU General Public License v2
EAPI=8
@@ -36,6 +36,8 @@ BDEPEND="dev-lang/perl"
PATCHES=(
"${FILESDIR}"/${PN}-0.10.4-0001-Fix-function-prototypes-in-configure.patch
"${FILESDIR}"/${PN}-0.10.4-0002-Add-missing-includes-implicit-function-declarations.patch
+ "${FILESDIR}"/${PN}-0.10.4-0003-Fix-incompatible-pointer.patch
+ "${FILESDIR}"/${PN}-0.10.4-0004-Always-call-linker.patch
)
src_prepare() {