Commit graph

7 commits

Author SHA1 Message Date
jlam
5f8003f633 Update security/heimdal to 0.7.1 (approved by lha). We drop support
for the "db4" option and just rely on the appropriate BDB_* settings
via bdb.buildlink3.mk.  Also, we tweak the builtin.mk file so use
krb5-config, if it's available, to check the version of the built-in
heimdal.  Patches patch-ab, patch-ae and patch-af have been sent back
upstream and will be incorporated into future Heimdal releases.

Changes between version 0.6.5 and version 0.7.1 include:

 * Support for KCM, a process based credential cache
 * Support CCAPI credential cache
 * SPNEGO support
 * AES (and the gssapi conterpart, CFX) support
 * Adding new and improve old documentation
 * Bug fixes
2005-10-26 15:12:45 +00:00
reed
7a9f5a527f Include sys/types.h. This fixes configure on DragonFly. Bump PKGREVISION.
Okayed by lha@. I tested on Linux and DragonFly. I got this from
Joerg Sonnenberger.

On DragonFly, the configure errored like:

/usr/include/openssl/md5.h:110: error: syntax error before "size_t"
In file included from conftest.c:34:
/usr/include/openssl/sha.h:109: error: syntax error before "size_t"

This caused tests to break and it ended up building and installing libdes
and des.h, md4.h, and related headers.

So later libgssapi needed this libdes which was not buildlinked which
broke kdelibs3 build.
2005-08-23 14:07:25 +00:00
jlam
f9724a680a Change the way that openssl/builtin.mk handles the USE_OLD_DES_API flag.
The idea is to prevent needing to patch source files for packages that
use OpenSSL for DES support by ensuring that including <openssl/des.h>
will always present the old DES API.

(1) If des_old.h exists, then we're using OpenSSL>=0.9.7, and
    <openssl/des.h> already does the right thing.

(2) If des_old.h doesn't exist, then one of two things is happening:
    (a) If <openssl/des.h> is old and (only) supports the old DES API,
	then <openssl/des.h> does the right thing.
    (b) If it's NetBSD's Special(TM) one that stripped out the old DES
	support into a separate library and header (-ldes, <des.h>),
	then we create a new header <openssl/des.h> that includes the
	system one and <des.h>.

Also modify existing packages that set USE_OLD_DES_API to simply include
<openssl/des.h> instead of either <des.h> or <openssl/des_old.h> (This
step is mostly just removing unnecessary patches).

This should fix building packages that use OpenSSL's old DES API support
on non-NetBSD systems where the built-in OpenSSL is at least 0.9.7.
2004-12-14 19:24:29 +00:00
jlam
f74029f091 Set USE_OLD_DES_API and replace custom changes to work with NetBSD-2.0's
OpenSSL, with patches to use <openssl/des_old.h>.
2004-12-04 03:59:26 +00:00
jlam
69edfa87aa Correctly detect the old DES API in the OpenSSL in NetBSD's base
install.  This prevents Heimdal from building and installing its own
DES library and headers.  Bump the PKGREVISION.
2004-11-19 23:16:02 +00:00
jlam
e34f12d5d3 Update security/heimdal to 0.6.3. Changes from version 0.6.1 include:
* fix vulnerabilities in ftpd
* support for linux AFS /proc "syscalls"
* support for RFC3244 (Windows 2000 Kerberos Change/Set Password) in kpasswdd
* fix possible KDC denial of service
* Fix possible buffer overrun in v4 kadmin (which now defaults to off)
2004-09-14 14:41:34 +00:00
jlam
694ff19aff Initial import of heimdal-0.6 into security/heimdal.
Heimdal is a free implementation of Kerberos 5.

Kerberos is a system for authenticating users and services on a network.
It is built upon the assumption that the network is "unsafe".  Kerberos
is a trusted third-party service.  That means that there is a third
party (the Kerberos server) that is trusted by all the entities on the
network (users and services, usually called "principals").  All
principals share a secret password (or key) with the Kerberos server and
this enables principals to verify that the messages from the Kerberos
server are authentic.  Thus trusting the Kerberos server, users and
services can authenticate each other.
2004-01-10 14:56:44 +00:00