old
authorMike Frysinger <vapier@gentoo.org>
Sun, 18 Feb 2007 13:41:30 +0000 (13:41 +0000)
committerMike Frysinger <vapier@gentoo.org>
Sun, 18 Feb 2007 13:41:30 +0000 (13:41 +0000)
Package-Manager: portage-2.1.2-r9

24 files changed:
sys-apps/shadow/Manifest
sys-apps/shadow/files/digest-shadow-4.0.15-r2 [deleted file]
sys-apps/shadow/files/digest-shadow-4.0.16-r2 [deleted file]
sys-apps/shadow/files/digest-shadow-4.0.17 [deleted file]
sys-apps/shadow/files/digest-shadow-4.0.17-r1 [deleted file]
sys-apps/shadow/files/pam.d/login [deleted file]
sys-apps/shadow/files/pam.d/other [deleted file]
sys-apps/shadow/files/pam.d/passwd [deleted file]
sys-apps/shadow/files/pam.d/shadow [deleted file]
sys-apps/shadow/files/pam.d/su [deleted file]
sys-apps/shadow/files/pam.d/system-auth [deleted file]
sys-apps/shadow/files/pam.d/system-auth-1.1 [deleted file]
sys-apps/shadow/files/shadow-4.0.13-login.defs.patch [deleted file]
sys-apps/shadow/files/shadow-4.0.13-su-fix-environment.patch [deleted file]
sys-apps/shadow/files/shadow-4.0.14-su-fix-environment.patch [deleted file]
sys-apps/shadow/files/shadow-4.0.15-no-default-MAIL.patch [deleted file]
sys-apps/shadow/files/shadow-4.0.15-sanity-checks.patch [deleted file]
sys-apps/shadow/files/shadow-4.0.16-check-opendir.patch [deleted file]
sys-apps/shadow/files/shadow-4.0.16-mail-creation.patch [deleted file]
sys-apps/shadow/files/shadow-4.0.17-no-local-getpass.patch [deleted file]
sys-apps/shadow/shadow-4.0.15-r2.ebuild [deleted file]
sys-apps/shadow/shadow-4.0.16-r2.ebuild [deleted file]
sys-apps/shadow/shadow-4.0.17-r1.ebuild [deleted file]
sys-apps/shadow/shadow-4.0.17.ebuild [deleted file]

index d94fb26f47585190f8d157a1172f061586d6341e..5a26e80d4f5fa055d12ff0bbd585aa33ec8e2030 100644 (file)
@@ -49,34 +49,6 @@ AUX pam.d-include/system-auth-1.1 365 RMD160 28d216f6542554bf175a43a876382783100
 MD5 33d9efd092b6999143ea42c99a59bfb1 files/pam.d-include/system-auth-1.1 365
 RMD160 28d216f6542554bf175a43a8763827831009224d files/pam.d-include/system-auth-1.1 365
 SHA256 e073f573c88515cf38fb22faa26ccf87d55d34e6d460d28ad25682958de4c13e files/pam.d-include/system-auth-1.1 365
-AUX pam.d/login 333 RMD160 8ace0beb3722c58397794265c09648d37eb217a1 SHA1 e57eee17d985274363941047c9eaea54d23e74be SHA256 7c678613cadb447e882c24fa491a4fd5d01d9345e5b7f115663fbe779c7535b9
-MD5 987d0bd2e5dd1f96dc28ae2963054022 files/pam.d/login 333
-RMD160 8ace0beb3722c58397794265c09648d37eb217a1 files/pam.d/login 333
-SHA256 7c678613cadb447e882c24fa491a4fd5d01d9345e5b7f115663fbe779c7535b9 files/pam.d/login 333
-AUX pam.d/other 142 RMD160 ccd73af37364c1c7edbe9150255fd0bcf8b12b09 SHA1 e038542a11ff3da16756518f236b6d273da1d08d SHA256 5e05df2743ec0021364b05f4bbe2e5a3a670abb5af845c3fa760731e5b7272ca
-MD5 5bff4f2134b72dabc4afa5bb296e874d files/pam.d/other 142
-RMD160 ccd73af37364c1c7edbe9150255fd0bcf8b12b09 files/pam.d/other 142
-SHA256 5e05df2743ec0021364b05f4bbe2e5a3a670abb5af845c3fa760731e5b7272ca files/pam.d/other 142
-AUX pam.d/passwd 172 RMD160 27c31ba3ad64b6bf8bb465b51c1908d85a42da16 SHA1 d4b4e6106767cf618d9817767e3d2d54215d8388 SHA256 13c8375bf208924598422d35cf9066c9e77a234b90ee8e2b845e55bc0f5876ef
-MD5 8a59937d720a19824db6e4a8cd173a4b files/pam.d/passwd 172
-RMD160 27c31ba3ad64b6bf8bb465b51c1908d85a42da16 files/pam.d/passwd 172
-SHA256 13c8375bf208924598422d35cf9066c9e77a234b90ee8e2b845e55bc0f5876ef files/pam.d/passwd 172
-AUX pam.d/shadow 171 RMD160 3cb1b04370f3492ab4caa13742e95485167cc1e8 SHA1 9d7a005421d78711d88703209f6f1b97cbcb2d97 SHA256 7f181ffaf004d4ae5ca1a6c3b9dbb87a6195c1c005d17c76b32602d812864b12
-MD5 a5721c39446539b751dceae4b054542b files/pam.d/shadow 171
-RMD160 3cb1b04370f3492ab4caa13742e95485167cc1e8 files/pam.d/shadow 171
-SHA256 7f181ffaf004d4ae5ca1a6c3b9dbb87a6195c1c005d17c76b32602d812864b12 files/pam.d/shadow 171
-AUX pam.d/su 1142 RMD160 031016dd8fb2721b668c6cf9c4e7be27ecdaa198 SHA1 dfc5a5a3c010d455dcb10cc34d686363f5c79c46 SHA256 6a8e7a11f8d7089676cecb52b2bcdc93bfb7459f6bca1b2ef01847c53fdfd9c2
-MD5 a1fc81dbd0d41face776fba4ca929d8f files/pam.d/su 1142
-RMD160 031016dd8fb2721b668c6cf9c4e7be27ecdaa198 files/pam.d/su 1142
-SHA256 6a8e7a11f8d7089676cecb52b2bcdc93bfb7459f6bca1b2ef01847c53fdfd9c2 files/pam.d/su 1142
-AUX pam.d/system-auth 373 RMD160 f0bbc8a9f69854ffadc81de532e9a993f9761ae7 SHA1 95cab48dff43b02b624050b5cb64d55159006590 SHA256 118ac8c88e9cb0f12fecfc2ff6b503f6ea151bb306cb6b58963068eea04c3668
-MD5 deed69f8fa52ca844f3669414bd5cf01 files/pam.d/system-auth 373
-RMD160 f0bbc8a9f69854ffadc81de532e9a993f9761ae7 files/pam.d/system-auth 373
-SHA256 118ac8c88e9cb0f12fecfc2ff6b503f6ea151bb306cb6b58963068eea04c3668 files/pam.d/system-auth 373
-AUX pam.d/system-auth-1.1 365 RMD160 28d216f6542554bf175a43a8763827831009224d SHA1 91af0856563242ca34c6f49ee57d90c8a9e6a0f8 SHA256 e073f573c88515cf38fb22faa26ccf87d55d34e6d460d28ad25682958de4c13e
-MD5 33d9efd092b6999143ea42c99a59bfb1 files/pam.d/system-auth-1.1 365
-RMD160 28d216f6542554bf175a43a8763827831009224d files/pam.d/system-auth-1.1 365
-SHA256 e073f573c88515cf38fb22faa26ccf87d55d34e6d460d28ad25682958de4c13e files/pam.d/system-auth-1.1 365
 AUX securetty 253 RMD160 20e9b398e7bd3c6d50db92d403ade8e3f5b13cb1 SHA1 ca723296318773733d1e53486088579ff43e210b SHA256 158ba98d557a8e3241d8635e5f8e2d6712847ec0b92741f8bdd65daecd834843
 MD5 a744152ec905f4c06f3b92142b7fec8a files/securetty 253
 RMD160 20e9b398e7bd3c6d50db92d403ade8e3f5b13cb1 files/securetty 253
@@ -93,10 +65,6 @@ AUX shadow-4.0.13-dots-in-usernames.patch 917 RMD160 999f1f6a6468527db1fbc21b7b2
 MD5 fc7dcebbbe2fae05629e848bc886f454 files/shadow-4.0.13-dots-in-usernames.patch 917
 RMD160 999f1f6a6468527db1fbc21b7b2a1113fa2aef86 files/shadow-4.0.13-dots-in-usernames.patch 917
 SHA256 ddd255ec0e5abd2aeb708ddb3f03a8dd2ecf318cfa5cdbd179f599322d1092f3 files/shadow-4.0.13-dots-in-usernames.patch 917
-AUX shadow-4.0.13-login.defs.patch 672 RMD160 bcd9b8714c26f79ea2eb7af23778d81d5397f366 SHA1 148fdb22beb5e4606d7eef6a060f19d866233442 SHA256 bc15f859c0d120b917c0a4a3c9351acbce93463bb1f9b4b76b76f11382766220
-MD5 08f11e5b0c4a987e49367f245f475728 files/shadow-4.0.13-login.defs.patch 672
-RMD160 bcd9b8714c26f79ea2eb7af23778d81d5397f366 files/shadow-4.0.13-login.defs.patch 672
-SHA256 bc15f859c0d120b917c0a4a3c9351acbce93463bb1f9b4b76b76f11382766220 files/shadow-4.0.13-login.defs.patch 672
 AUX shadow-4.0.13-long-groupnames.patch 398 RMD160 a1fdef5d2c87579838332558624f86d591b85c4b SHA1 ea8eb52bd13b4cd24c564db02ee73fff65fa0372 SHA256 e0f7969be35f190d09d355aa3b76a09f2b1b5ea9a461a27ac1b9ead982211a16
 MD5 acdc5a5ac62bfd3495bde25438b49734 files/shadow-4.0.13-long-groupnames.patch 398
 RMD160 a1fdef5d2c87579838332558624f86d591b85c4b files/shadow-4.0.13-long-groupnames.patch 398
@@ -105,70 +73,23 @@ AUX shadow-4.0.13-nonis.patch 1795 RMD160 ed7ece3f676283f24daa4d7506a0ed73a5bb4e
 MD5 dfa169094cacf64d4980b0c8d76374d8 files/shadow-4.0.13-nonis.patch 1795
 RMD160 ed7ece3f676283f24daa4d7506a0ed73a5bb4e77 files/shadow-4.0.13-nonis.patch 1795
 SHA256 4a4bbed01da45aa7217e12a070e0a86c70a4c9049bddaa881d404a362e5df145 files/shadow-4.0.13-nonis.patch 1795
-AUX shadow-4.0.13-su-fix-environment.patch 1070 RMD160 7bbac959459458a312a196388a6ab99b0e306897 SHA1 89916707d6fb4abc7516cfe7116c657c28e5ba18 SHA256 1554809ff2dbe6768ef8f8c7f14ccad8fa4eb2d5765ef67714a42fb35a34dab4
-MD5 223a6d64e1635462fcca48217644cfd0 files/shadow-4.0.13-su-fix-environment.patch 1070
-RMD160 7bbac959459458a312a196388a6ab99b0e306897 files/shadow-4.0.13-su-fix-environment.patch 1070
-SHA256 1554809ff2dbe6768ef8f8c7f14ccad8fa4eb2d5765ef67714a42fb35a34dab4 files/shadow-4.0.13-su-fix-environment.patch 1070
-AUX shadow-4.0.14-su-fix-environment.patch 701 RMD160 0375f0d5ef4e7f85b9465b0b4fad828ee6394e60 SHA1 d0bad5098f05f2194ce343a1bf95e930eadd8183 SHA256 15bf4978d71f4f3f96ddda031b608a0fecb6a95644f47b058fb1e3d38bfc99a8
-MD5 afc6edd720c3e704f48553ef9ca8631b files/shadow-4.0.14-su-fix-environment.patch 701
-RMD160 0375f0d5ef4e7f85b9465b0b4fad828ee6394e60 files/shadow-4.0.14-su-fix-environment.patch 701
-SHA256 15bf4978d71f4f3f96ddda031b608a0fecb6a95644f47b058fb1e3d38bfc99a8 files/shadow-4.0.14-su-fix-environment.patch 701
-AUX shadow-4.0.15-no-default-MAIL.patch 879 RMD160 c380e0a00ef0be8a99927de8bb6cf70f1dfd33ce SHA1 fc30b336b7f22c76ee2276d6b6d8cf361bdfffea SHA256 57aa93bae1cbaffc51250bc415384991992e6ebb6cc5bb1f3c0dc90bb3dd0354
-MD5 3ce54cb32b7564df1386544bf3d1e035 files/shadow-4.0.15-no-default-MAIL.patch 879
-RMD160 c380e0a00ef0be8a99927de8bb6cf70f1dfd33ce files/shadow-4.0.15-no-default-MAIL.patch 879
-SHA256 57aa93bae1cbaffc51250bc415384991992e6ebb6cc5bb1f3c0dc90bb3dd0354 files/shadow-4.0.15-no-default-MAIL.patch 879
-AUX shadow-4.0.15-sanity-checks.patch 1875 RMD160 10cf79e08349848cbfb407dd3e010e86c46938bd SHA1 79dd0697a5acdb9eb484a90581b8e46efa2f73be SHA256 54fbf4ab6c3593b5d66c6ad5e5e9eb1f6eef09f7198c9825ddd838835d6adfec
-MD5 186ba47908dc805ae97cdee9248e873d files/shadow-4.0.15-sanity-checks.patch 1875
-RMD160 10cf79e08349848cbfb407dd3e010e86c46938bd files/shadow-4.0.15-sanity-checks.patch 1875
-SHA256 54fbf4ab6c3593b5d66c6ad5e5e9eb1f6eef09f7198c9825ddd838835d6adfec files/shadow-4.0.15-sanity-checks.patch 1875
 AUX shadow-4.0.15-uclibc-missing-l64a.patch 1354 RMD160 6d35c4ddad876edacdd41be056fa8abd567ae802 SHA1 27012d25d41a19dcafab1fb45921bbf7aa12885d SHA256 37ac2cdea64f849e0cf9e92ccefeab05b0466541268fb4844f18a94c377c8514
 MD5 f79f1051bedb185f81f24fb9d30dcc35 files/shadow-4.0.15-uclibc-missing-l64a.patch 1354
 RMD160 6d35c4ddad876edacdd41be056fa8abd567ae802 files/shadow-4.0.15-uclibc-missing-l64a.patch 1354
 SHA256 37ac2cdea64f849e0cf9e92ccefeab05b0466541268fb4844f18a94c377c8514 files/shadow-4.0.15-uclibc-missing-l64a.patch 1354
-AUX shadow-4.0.16-check-opendir.patch 534 RMD160 d90923cb1ee74ac653e818ac5e480866e2f974d9 SHA1 19a02a4c610bb235db4df2c5adb7fdd170f87359 SHA256 5d22bb16183a44e13482b5a72d8ea971b6df227aeb9d95020e48bc89aa004b3d
-MD5 19045e99ca34233f1e790857d6aea4d8 files/shadow-4.0.16-check-opendir.patch 534
-RMD160 d90923cb1ee74ac653e818ac5e480866e2f974d9 files/shadow-4.0.16-check-opendir.patch 534
-SHA256 5d22bb16183a44e13482b5a72d8ea971b6df227aeb9d95020e48bc89aa004b3d files/shadow-4.0.16-check-opendir.patch 534
 AUX shadow-4.0.16-fix-useradd-usergroups.patch 3319 RMD160 22c4f916fe1f9da00b0d587b9976491426142f98 SHA1 b08cb5129717c040479f287e0c7851da27b77483 SHA256 b9428435b51341f23be148fa6921408b595dd965a02d1ba731d1ff5b9caba786
 MD5 1815781072561fc469f3eb8bded50009 files/shadow-4.0.16-fix-useradd-usergroups.patch 3319
 RMD160 22c4f916fe1f9da00b0d587b9976491426142f98 files/shadow-4.0.16-fix-useradd-usergroups.patch 3319
 SHA256 b9428435b51341f23be148fa6921408b595dd965a02d1ba731d1ff5b9caba786 files/shadow-4.0.16-fix-useradd-usergroups.patch 3319
-AUX shadow-4.0.16-mail-creation.patch 1636 RMD160 f682c683b795c36be8f2747d99733c34330a59f7 SHA1 e0d2732ddfdf67776b07b9c9e4f8a5edc85aeb85 SHA256 1eb04d054db0f7565fa528a6892ad3cbf52b303103c74fc1265b7e23f606848f
-MD5 c340301909c430b8c7ebf0ca5be827b2 files/shadow-4.0.16-mail-creation.patch 1636
-RMD160 f682c683b795c36be8f2747d99733c34330a59f7 files/shadow-4.0.16-mail-creation.patch 1636
-SHA256 1eb04d054db0f7565fa528a6892ad3cbf52b303103c74fc1265b7e23f606848f files/shadow-4.0.16-mail-creation.patch 1636
 AUX shadow-4.0.17-login.defs.patch 367 RMD160 e538f7942dc58b9f5b2f40ba47730aa22b91be20 SHA1 cda5c26df5df855f6fabdad6bb1a3526cb44929e SHA256 cefe0ab1203f436b0c23ce4cde3133fdcc8146d3616542af4bbc69415acf18b0
 MD5 8806250f3d4b113d2afbdfbc8b25be09 files/shadow-4.0.17-login.defs.patch 367
 RMD160 e538f7942dc58b9f5b2f40ba47730aa22b91be20 files/shadow-4.0.17-login.defs.patch 367
 SHA256 cefe0ab1203f436b0c23ce4cde3133fdcc8146d3616542af4bbc69415acf18b0 files/shadow-4.0.17-login.defs.patch 367
-AUX shadow-4.0.17-no-local-getpass.patch 785 RMD160 e70027b07b4300c5a53a78f022f055f0e95891da SHA1 6a41c1677ffbdf81388a7e0d2c6481f2aace19b8 SHA256 694c3d2bdb101f2dde963525c6a46a36b87e3f85e1051753a3676b63b054c04c
-MD5 391c3e007af4fe7929bb36bff5af8e8d files/shadow-4.0.17-no-local-getpass.patch 785
-RMD160 e70027b07b4300c5a53a78f022f055f0e95891da files/shadow-4.0.17-no-local-getpass.patch 785
-SHA256 694c3d2bdb101f2dde963525c6a46a36b87e3f85e1051753a3676b63b054c04c files/shadow-4.0.17-no-local-getpass.patch 785
 AUX shadow-4.0.18.1-useradd-usermod.patch 1081 RMD160 65bb85eba9f2e08f4febeea97d522d515f7d9fb7 SHA1 c13cf8b5c566e129d4fc62ad3ac08b6c856c992e SHA256 ca34bc36424585c9f1d64c6b4201ce62c964773c7c6c16faecdd2610ad655cfb
 MD5 aa1259020b925cd3088cb7a36fbe7753 files/shadow-4.0.18.1-useradd-usermod.patch 1081
 RMD160 65bb85eba9f2e08f4febeea97d522d515f7d9fb7 files/shadow-4.0.18.1-useradd-usermod.patch 1081
 SHA256 ca34bc36424585c9f1d64c6b4201ce62c964773c7c6c16faecdd2610ad655cfb files/shadow-4.0.18.1-useradd-usermod.patch 1081
-DIST shadow-4.0.15.tar.bz2 1294860 RMD160 b7b9ee9469561205037a1eacaa8791f069ba124c SHA1 0f7cd3366a032091fdffd2f8edf65056bd576cae SHA256 e486bdb083df453c2d15ac58887ef45a3006182c0cdb1c6092058ea588be538d
-DIST shadow-4.0.16.tar.bz2 1438030 RMD160 9ac436d89913441b448da90ece25b77e818f3bd4 SHA1 c8e739d935cb46d9cbc0654f373c2bff18110a55 SHA256 2cbd0af0b4682d91282d2d0ad3110e6dfcad4e365d25a3b6beaf7048dd477bdd
-DIST shadow-4.0.17.tar.bz2 1496220 RMD160 590fbe5d0363da44370b026282c8226ee64f4603 SHA1 326b3de0a81c1e1f9bfc75e67d45678c14fe282d SHA256 6e85b7a01d311fdb181d909b00c6e42bf08816c13e7f54d6dcc1d7a342ef98cd
 DIST shadow-4.0.18.1.tar.bz2 1516296 RMD160 05a1f609370371de3112479cb6a98d966c45fa6c SHA1 1a30458e9db05560bfc82529048bd5d60b45cf9b SHA256 3da368d87a94270c3db4bae6ff634b8db5dcbc8822d554dbfea955a676c1ab12
-EBUILD shadow-4.0.15-r2.ebuild 7810 RMD160 a0887bff99f301395aceae6c8313925669c1cb53 SHA1 ef47851674fd512896b3c2a7a251cf463117dd88 SHA256 12906e145332aa45b5e448d70114b321492a0ecbd710db24a3e4aa61fdab04da
-MD5 b3719db0344a55700774adb967703b32 shadow-4.0.15-r2.ebuild 7810
-RMD160 a0887bff99f301395aceae6c8313925669c1cb53 shadow-4.0.15-r2.ebuild 7810
-SHA256 12906e145332aa45b5e448d70114b321492a0ecbd710db24a3e4aa61fdab04da shadow-4.0.15-r2.ebuild 7810
-EBUILD shadow-4.0.16-r2.ebuild 8095 RMD160 618f4dba19abccf5aab4ee021ebc70eab424f002 SHA1 82a073100a758c82329294c6ca356a2cbc24a8ef SHA256 b583c0548b37943b9d5ee81c45ae85cb6b6f4bcea25507e3a1fd41a4034c8161
-MD5 cd659f819e7a27cd1b54c26dc0f0657c shadow-4.0.16-r2.ebuild 8095
-RMD160 618f4dba19abccf5aab4ee021ebc70eab424f002 shadow-4.0.16-r2.ebuild 8095
-SHA256 b583c0548b37943b9d5ee81c45ae85cb6b6f4bcea25507e3a1fd41a4034c8161 shadow-4.0.16-r2.ebuild 8095
-EBUILD shadow-4.0.17-r1.ebuild 5960 RMD160 7a137e375759bd33cfe1873da52345c6b9c9aa4b SHA1 fc2b9524485e564b2f78977c1e041e05b4a748ec SHA256 20eabbb11b50da2ce78787e25dd4dce7fefe664f84ffdabd26a7ec4c0b9a48d7
-MD5 a018911f12ddb6ca96dac2e0a77f9e16 shadow-4.0.17-r1.ebuild 5960
-RMD160 7a137e375759bd33cfe1873da52345c6b9c9aa4b shadow-4.0.17-r1.ebuild 5960
-SHA256 20eabbb11b50da2ce78787e25dd4dce7fefe664f84ffdabd26a7ec4c0b9a48d7 shadow-4.0.17-r1.ebuild 5960
-EBUILD shadow-4.0.17.ebuild 8025 RMD160 d0908cf457eb72e9a3fab619a129ac40c6399a45 SHA1 b0754adbea40cddd3e7ab03dce3c765291abfac2 SHA256 080a7286885b0882111214ee5e3861ceb68606d14e4f1d1acd7357d8a2003208
-MD5 acb5405f30ea521e1662c576f524bb22 shadow-4.0.17.ebuild 8025
-RMD160 d0908cf457eb72e9a3fab619a129ac40c6399a45 shadow-4.0.17.ebuild 8025
-SHA256 080a7286885b0882111214ee5e3861ceb68606d14e4f1d1acd7357d8a2003208 shadow-4.0.17.ebuild 8025
 EBUILD shadow-4.0.18.1.ebuild 5887 RMD160 fbbb0d787b65520b9b37b75850ce657b063bd508 SHA1 2665696703dac4d8de9e801a1cc56e0714f7ea85 SHA256 d744fbd725b976fa883d8d7e6ea0e5716586ee747ac91848fc6769cc1c8f9dd9
 MD5 2068a9d8485fd835e1a70fc753b351ed shadow-4.0.18.1.ebuild 5887
 RMD160 fbbb0d787b65520b9b37b75850ce657b063bd508 shadow-4.0.18.1.ebuild 5887
@@ -181,25 +102,13 @@ MISC metadata.xml 164 RMD160 f43cbec30b7074319087c9acffdb9354b17b0db3 SHA1 9c213
 MD5 9a09f8d531c582e78977dbfd96edc1f2 metadata.xml 164
 RMD160 f43cbec30b7074319087c9acffdb9354b17b0db3 metadata.xml 164
 SHA256 f5f2891f2a4791cd31350bb2bb572131ad7235cd0eeb124c9912c187ac10ce92 metadata.xml 164
-MD5 1f78dde9910133ab48d69abc6bd19a88 files/digest-shadow-4.0.15-r2 247
-RMD160 87f79656daa81999e698a293ad570f2ffac99768 files/digest-shadow-4.0.15-r2 247
-SHA256 10c8764de8a7feb230419e232290d7f8c35a28ad69e7174b509fcd358aeed237 files/digest-shadow-4.0.15-r2 247
-MD5 dc4586eb93a7af1f6ffa24a8a0385574 files/digest-shadow-4.0.16-r2 247
-RMD160 2fa0ba2c0ca819c44877181ee35df012d16caa0e files/digest-shadow-4.0.16-r2 247
-SHA256 f4adf1db93b22fcaf350fa669ba59de6c502ca80104d3fdcf18bf8ff3d7845e9 files/digest-shadow-4.0.16-r2 247
-MD5 0d5e88a5cf5d51d74de79faa25e883cf files/digest-shadow-4.0.17 247
-RMD160 1a0703c1b522ea5eb648ee638e3872b566faa2e1 files/digest-shadow-4.0.17 247
-SHA256 83147ff4ad684b84d8dfb31024d51f598d7796ace7110722d4b90a91d765b046 files/digest-shadow-4.0.17 247
-MD5 0d5e88a5cf5d51d74de79faa25e883cf files/digest-shadow-4.0.17-r1 247
-RMD160 1a0703c1b522ea5eb648ee638e3872b566faa2e1 files/digest-shadow-4.0.17-r1 247
-SHA256 83147ff4ad684b84d8dfb31024d51f598d7796ace7110722d4b90a91d765b046 files/digest-shadow-4.0.17-r1 247
 MD5 6be0a013e7aee78ebb6228308ca16fee files/digest-shadow-4.0.18.1 253
 RMD160 31ec617739d2935bd1b4dfc1d676399d5c5f50bc files/digest-shadow-4.0.18.1 253
 SHA256 6683d8ca173c809dedf056bf6e658284264bb277cab8c43e03b811ed4308d109 files/digest-shadow-4.0.18.1 253
 -----BEGIN PGP SIGNATURE-----
-Version: GnuPG v2.0.1 (GNU/Linux)
+Version: GnuPG v2.0.2 (GNU/Linux)
 
-iD8DBQFFpPT28bi6rjpTunYRAgfBAJ9xbibJrOFaSK+9vMf2IQTZKJbCMwCgx4FI
-YxObC79jQgUxLGUwmX94hUo=
-=GgHy
+iD8DBQFF2Fe78bi6rjpTunYRAhEDAKCLTLpo/qFyhj637LSw/Taoi9OfeQCgyYbc
+ipiyFbvUy/gxgfFhEN+dRX4=
+=b7TS
 -----END PGP SIGNATURE-----
diff --git a/sys-apps/shadow/files/digest-shadow-4.0.15-r2 b/sys-apps/shadow/files/digest-shadow-4.0.15-r2
deleted file mode 100644 (file)
index 13dd582..0000000
+++ /dev/null
@@ -1,3 +0,0 @@
-MD5 a0452fa989f8ba45023cc5a08136568e shadow-4.0.15.tar.bz2 1294860
-RMD160 b7b9ee9469561205037a1eacaa8791f069ba124c shadow-4.0.15.tar.bz2 1294860
-SHA256 e486bdb083df453c2d15ac58887ef45a3006182c0cdb1c6092058ea588be538d shadow-4.0.15.tar.bz2 1294860
diff --git a/sys-apps/shadow/files/digest-shadow-4.0.16-r2 b/sys-apps/shadow/files/digest-shadow-4.0.16-r2
deleted file mode 100644 (file)
index e6b69a9..0000000
+++ /dev/null
@@ -1,3 +0,0 @@
-MD5 1d91f7479143d1d705b94180c0d4874b shadow-4.0.16.tar.bz2 1438030
-RMD160 9ac436d89913441b448da90ece25b77e818f3bd4 shadow-4.0.16.tar.bz2 1438030
-SHA256 2cbd0af0b4682d91282d2d0ad3110e6dfcad4e365d25a3b6beaf7048dd477bdd shadow-4.0.16.tar.bz2 1438030
diff --git a/sys-apps/shadow/files/digest-shadow-4.0.17 b/sys-apps/shadow/files/digest-shadow-4.0.17
deleted file mode 100644 (file)
index 1e8116e..0000000
+++ /dev/null
@@ -1,3 +0,0 @@
-MD5 bc5972a195290533b4c0576276056ed9 shadow-4.0.17.tar.bz2 1496220
-RMD160 590fbe5d0363da44370b026282c8226ee64f4603 shadow-4.0.17.tar.bz2 1496220
-SHA256 6e85b7a01d311fdb181d909b00c6e42bf08816c13e7f54d6dcc1d7a342ef98cd shadow-4.0.17.tar.bz2 1496220
diff --git a/sys-apps/shadow/files/digest-shadow-4.0.17-r1 b/sys-apps/shadow/files/digest-shadow-4.0.17-r1
deleted file mode 100644 (file)
index 1e8116e..0000000
+++ /dev/null
@@ -1,3 +0,0 @@
-MD5 bc5972a195290533b4c0576276056ed9 shadow-4.0.17.tar.bz2 1496220
-RMD160 590fbe5d0363da44370b026282c8226ee64f4603 shadow-4.0.17.tar.bz2 1496220
-SHA256 6e85b7a01d311fdb181d909b00c6e42bf08816c13e7f54d6dcc1d7a342ef98cd shadow-4.0.17.tar.bz2 1496220
diff --git a/sys-apps/shadow/files/pam.d/login b/sys-apps/shadow/files/pam.d/login
deleted file mode 100644 (file)
index 31a664b..0000000
+++ /dev/null
@@ -1,12 +0,0 @@
-#%PAM-1.0
-
-auth       required    pam_securetty.so
-auth       required    pam_stack.so service=system-auth
-auth       required    pam_nologin.so
-
-account    required    pam_stack.so service=system-auth
-
-password   required    pam_stack.so service=system-auth
-
-session    required    pam_stack.so service=system-auth
-session    optional    pam_console.so
diff --git a/sys-apps/shadow/files/pam.d/other b/sys-apps/shadow/files/pam.d/other
deleted file mode 100644 (file)
index bb0b964..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
-#%PAM-1.0
-
-auth       required    pam_deny.so
-
-account    required    pam_deny.so
-
-password   required    pam_deny.so
-
-session    required    pam_deny.so
diff --git a/sys-apps/shadow/files/pam.d/passwd b/sys-apps/shadow/files/pam.d/passwd
deleted file mode 100644 (file)
index c09409b..0000000
+++ /dev/null
@@ -1,7 +0,0 @@
-#%PAM-1.0
-
-auth       required    pam_stack.so service=system-auth
-
-account    required    pam_stack.so service=system-auth
-
-password   required    pam_stack.so service=system-auth
diff --git a/sys-apps/shadow/files/pam.d/shadow b/sys-apps/shadow/files/pam.d/shadow
deleted file mode 100644 (file)
index 28db08c..0000000
+++ /dev/null
@@ -1,8 +0,0 @@
-#%PAM-1.0 
-
-auth       sufficient  pam_rootok.so
-auth       required    pam_permit.so
-
-account    required    pam_stack.so service=system-auth
-
-password   required    pam_permit.so
diff --git a/sys-apps/shadow/files/pam.d/su b/sys-apps/shadow/files/pam.d/su
deleted file mode 100644 (file)
index e5b1d83..0000000
+++ /dev/null
@@ -1,32 +0,0 @@
-#%PAM-1.0
-
-auth       sufficient  pam_rootok.so
-
-# If you want to restrict users begin allowed to su even more,
-# create /etc/security/suauth.allow (or to that matter) that is only
-# writable by root, and add users that are allowed to su to that
-# file, one per line.
-#auth       required     pam_listfile.so item=ruser sense=allow onerr=fail file=/etc/security/suauth.allow
-
-# Uncomment this to allow users in the wheel group to su without
-# entering a passwd.
-#auth       sufficient   pam_wheel.so use_uid trust
-
-# Alternatively to above, you can implement a list of users that do
-# not need to supply a passwd with a list.
-#auth       sufficient   pam_listfile.so item=ruser sense=allow onerr=fail file=/etc/security/suauth.nopass
-
-# Comment this to allow any user, even those not in the 'wheel'
-# group to su
-auth       required     pam_wheel.so use_uid
-
-auth       required    pam_stack.so service=system-auth
-
-account    required    pam_stack.so service=system-auth
-
-password   required    pam_stack.so service=system-auth
-
-session    required    pam_stack.so service=system-auth
-session    required     pam_env.so
-session    optional    pam_xauth.so
-
diff --git a/sys-apps/shadow/files/pam.d/system-auth b/sys-apps/shadow/files/pam.d/system-auth
deleted file mode 100644 (file)
index d6d008f..0000000
+++ /dev/null
@@ -1,14 +0,0 @@
-#%PAM-1.0
-
-auth       required    pam_env.so
-auth       sufficient  pam_unix.so likeauth nullok nodelay
-auth       required    pam_deny.so
-
-account    required    pam_unix.so
-
-password   required    pam_cracklib.so retry=3
-password   sufficient  pam_unix.so nullok md5 shadow use_authtok
-password   required    pam_deny.so
-
-session    required    pam_limits.so
-session    required    pam_unix.so
diff --git a/sys-apps/shadow/files/pam.d/system-auth-1.1 b/sys-apps/shadow/files/pam.d/system-auth-1.1
deleted file mode 100644 (file)
index fe80483..0000000
+++ /dev/null
@@ -1,14 +0,0 @@
-#%PAM-1.0
-
-auth       required    pam_env.so
-auth       sufficient  pam_unix.so likeauth nullok
-auth       required    pam_deny.so
-
-account    required    pam_unix.so
-
-password   required    pam_cracklib.so retry=3
-password   sufficient  pam_unix.so nullok md5 shadow use_authtok
-password   required    pam_deny.so
-
-session    required    pam_limits.so
-session    required    pam_unix.so
diff --git a/sys-apps/shadow/files/shadow-4.0.13-login.defs.patch b/sys-apps/shadow/files/shadow-4.0.13-login.defs.patch
deleted file mode 100644 (file)
index 4ac4b4e..0000000
+++ /dev/null
@@ -1,25 +0,0 @@
-Index: etc/login.defs
-===================================================================
-RCS file: /cvsroot/shadow/etc/login.defs,v
-retrieving revision 1.8
-diff -u -p -U0 -r1.8 login.defs
---- etc/login.defs     1 Sep 2005 19:57:45 -0000       1.8
-+++ etc/login.defs     10 Oct 2005 22:17:39 -0000
-@@ -38 +38 @@
--MAIL_CHECK_ENAB               yes
-+MAIL_CHECK_ENAB               no
-@@ -205 +205 @@
--SU_WHEEL_ONLY no
-+SU_WHEEL_ONLY yes
-@@ -210 +210 @@
--CRACKLIB_DICTPATH     /var/cache/cracklib/cracklib_dict
-+CRACKLIB_DICTPATH     /usr/lib/cracklib_dict
-@@ -227 +227 @@
--LOGIN_RETRIES         5
-+LOGIN_RETRIES         3
-@@ -279 +279 @@
--#MD5_CRYPT_ENAB       no
-+MD5_CRYPT_ENAB        yes
-@@ -330 +330 @@
--#GETPASS_ASTERISKS 1
-+GETPASS_ASTERISKS 0
diff --git a/sys-apps/shadow/files/shadow-4.0.13-su-fix-environment.patch b/sys-apps/shadow/files/shadow-4.0.13-su-fix-environment.patch
deleted file mode 100644 (file)
index 5db08fd..0000000
+++ /dev/null
@@ -1,39 +0,0 @@
-The patch from upstream (shadow-4.0.11.1-SUPATH.patch) sets environ too
-early when using PAM, so move it to !USE_PAM.  Also set USER and SHELL.
-
---- shadow-4.0.11.1/src/su.c   2005-08-04 12:34:35.000000000 +0200
-+++ shadow-4.0.11.1.az/src/su.c        2005-08-04 12:38:57.000000000 +0200
-@@ -594,11 +594,6 @@
-               addenv ("PATH", cp);
-       }
-
--#ifndef USE_PAM
--      /* setup the environment for PAM later on, else we run into auth problems */
--      environ = newenvp;      /* make new environment active */
--#endif
--
-       if (getenv ("IFS"))     /* don't export user IFS ... */
-               addenv ("IFS= \t\n", NULL);     /* ... instead, set a safe IFS */
-@@ -666,6 +664,8 @@
-               exit (1);
-       }
- #else                         /* !USE_PAM */
-+      environ = newenvp;      /* make new environment active */
-+      
-       if (!amroot)            /* no limits if su from root */
-               setup_limits (&pwent);
-@@ -676,8 +676,11 @@
-       if (fakelogin)
-               setup_env (&pwent);
- #if 1                         /* Suggested by Joey Hess. XXX - is this right?  */
--      else
-+      else {
-               addenv ("HOME", pwent.pw_dir);
-+              addenv ("USER", pwent.pw_name);
-+              addenv ("SHELL", pwent.pw_shell);
-+      }
- #endif
-       /*
diff --git a/sys-apps/shadow/files/shadow-4.0.14-su-fix-environment.patch b/sys-apps/shadow/files/shadow-4.0.14-su-fix-environment.patch
deleted file mode 100644 (file)
index b537c7b..0000000
+++ /dev/null
@@ -1,26 +0,0 @@
-The patch from upstream (shadow-4.0.11.1-SUPATH.patch) sets environ too
-early when using PAM, so move it to !USE_PAM.
-
---- shadow-4.0.14/src/su.c
-+++ shadow-4.0.14/src/su.c
-@@ -594,11 +594,6 @@
-               addenv ("PATH", cp);
-       }
-
--#ifndef USE_PAM
--      /* setup the environment for PAM later on, else we run into auth problems */
--      environ = newenvp;      /* make new environment active */
--#endif
--
-       if (getenv ("IFS"))     /* don't export user IFS ... */
-               addenv ("IFS= \t\n", NULL);     /* ... instead, set a safe IFS */
-@@ -666,6 +664,8 @@
-               exit (1);
-       }
- #else                         /* !USE_PAM */
-+      environ = newenvp;      /* make new environment active */
-+      
-       if (!amroot)            /* no limits if su from root */
-               setup_limits (&pwent);
diff --git a/sys-apps/shadow/files/shadow-4.0.15-no-default-MAIL.patch b/sys-apps/shadow/files/shadow-4.0.15-no-default-MAIL.patch
deleted file mode 100644 (file)
index f797293..0000000
+++ /dev/null
@@ -1,30 +0,0 @@
-if MAIL_CHECK_ENAB is disabled, then don't export the MAIL envvar
-
---- libmisc/setupenv.c
-+++ libmisc/setupenv.c
-@@ -265,16 +265,18 @@
-        * knows the prefix.
-        */
--      if ((cp = getdef_str ("MAIL_DIR")))
--              addenv_path ("MAIL", cp, info->pw_name);
--      else if ((cp = getdef_str ("MAIL_FILE")))
--              addenv_path ("MAIL", info->pw_dir, cp);
--      else {
-+      if (getdef_bool ("MAIL_CHECK_ENAB")) {
-+              if ((cp = getdef_str ("MAIL_DIR")))
-+                      addenv_path ("MAIL", cp, info->pw_name);
-+              else if ((cp = getdef_str ("MAIL_FILE")))
-+                      addenv_path ("MAIL", info->pw_dir, cp);
-+              else {
- #if defined(MAIL_SPOOL_FILE)
--              addenv_path ("MAIL", info->pw_dir, MAIL_SPOOL_FILE);
-+                      addenv_path ("MAIL", info->pw_dir, MAIL_SPOOL_FILE);
- #elif defined(MAIL_SPOOL_DIR)
--              addenv_path ("MAIL", MAIL_SPOOL_DIR, info->pw_name);
-+                      addenv_path ("MAIL", MAIL_SPOOL_DIR, info->pw_name);
- #endif
-+              }
-       }
-       /*
diff --git a/sys-apps/shadow/files/shadow-4.0.15-sanity-checks.patch b/sys-apps/shadow/files/shadow-4.0.15-sanity-checks.patch
deleted file mode 100644 (file)
index 2bced65..0000000
+++ /dev/null
@@ -1,75 +0,0 @@
-===================================================================
-RCS file: /cvsroot/shadow/src/useradd.c,v
-retrieving revision 1.93
-retrieving revision 1.94
-diff -u -r1.93 -r1.94
---- shadow/src/useradd.c       2006/05/07 17:44:39     1.93
-+++ shadow/src/useradd.c       2006/05/19 13:36:25     1.94
-@@ -1585,46 +1585,38 @@
-  */
- static void create_mail (void)
- {
--      char *ms;
-+      char *spool, *file;
-       int fd;
--      struct group *mail;
--      gid_t mail_gid;
-+      struct group *gr;
-+      gid_t gid;
-       mode_t mode;
-+      spool = getdef_str ("MAIL_DIR") ? : "/var/mail";
-+      file = alloca (strlen (spool) + strlen (user_name) + 2);
-+      sprintf (file, "%s/%s", spool, user_name);
-+      fd = open (file, O_CREAT | O_WRONLY | O_TRUNC | O_EXCL, 0);
-+      if (fd < 0) {
-+              perror (_("Creating mailbox"));
-+              return;
-+      }
-+
-       if (strcasecmp (create_mail_spool, "yes") == 0) {
--              mail = getgrnam ("mail");
--              if (mail == NULL) {
-+              gr = getgrnam ("mail");
-+              if (!gr) {
-                       fprintf (stderr,
-                                _
--                               ("No group named \"mail\" exists, creating mail spool with mode 0600.\n"));
-+                               ("Group 'mail' not found. Creating the mailbox with 0600 mode.\n"));
-+                      gid = user_gid;
-                       mode = 0600;
--                      mail_gid = user_gid;
-               } else {
-+                      gid = gr->gr_gid;
-                       mode = 0660;
--                      mail_gid = mail->gr_gid;
-               }
--              ms = malloc (strlen (user_name) + 11);
--              if (ms != NULL) {
--                      sprintf (ms, "/var/mail/%s", user_name);
--                      if (access (ms, R_OK) != 0) {
--                              fd = open (ms,
--                                         O_CREAT | O_EXCL |
--                                         O_WRONLY | O_TRUNC, 0);
--                              if (fd != -1) {
--                                      fchown (fd, user_id, mail_gid);
--                                      fchmod (fd, mode);
--                                      close (fd);
--                              }
--                      } else {
--                              fprintf (stderr,
--                                       _
--                                       ("Can't create mail spool for user %s.\n"),
--                                       user_name);
--                              fail_exit (E_MAIL_SPOOL);
--                      }
--              }
--              free (ms);
-+              if (fchown (fd, user_id, gid) || fchmod (fd, mode))
-+                      perror (_("Setting mailbox permissions"));
-+
-+              close (fd);
-       }
- }
diff --git a/sys-apps/shadow/files/shadow-4.0.16-check-opendir.patch b/sys-apps/shadow/files/shadow-4.0.16-check-opendir.patch
deleted file mode 100644 (file)
index e0403cb..0000000
+++ /dev/null
@@ -1,21 +0,0 @@
-http://bugs.gentoo.org/139148
-
-e-mailed upstream
-
-Index: libmisc/copydir.c
-===================================================================
-RCS file: /cvsroot/shadow/libmisc/copydir.c,v
-retrieving revision 1.14
-diff -u -p -r1.14 copydir.c
---- libmisc/copydir.c  7 May 2006 18:10:10 -0000       1.14
-+++ libmisc/copydir.c  4 Jul 2006 19:42:22 -0000
-@@ -396,7 +396,8 @@ int remove_tree (const char *root)
-        * is made set-ID.
-        */
--      dir = opendir (root);
-+      if (!(dir = opendir (root)))
-+              return -1;
-       while ((ent = readdir (dir))) {
diff --git a/sys-apps/shadow/files/shadow-4.0.16-mail-creation.patch b/sys-apps/shadow/files/shadow-4.0.16-mail-creation.patch
deleted file mode 100644 (file)
index f4772a0..0000000
+++ /dev/null
@@ -1,64 +0,0 @@
-rip out fixes from upstream for mail creation bug
-
-http://bugs.gentoo.org/139346
-
-Index: useradd.c
-===================================================================
-RCS file: /cvsroot/shadow/src/useradd.c,v
-retrieving revision 1.96
-retrieving revision 1.99
-diff -u -p -r1.96 -r1.99
---- shadow/src/useradd.c       30 May 2006 18:28:45 -0000      1.96
-+++ shadow/src/useradd.c       22 Jun 2006 11:30:32 -0000      1.99
-@@ -1246,6 +1247,11 @@ static void process_flags (int argc, cha
-       if (!sflg)
-               user_shell = def_shell;
-+
-+      /* TODO: add handle change default spool mail creation by 
-+         -K CREATE_MAIL_SPOOL={yes,no}. It need rewrite internal API for handle
-+         shadow tools configuration */
-+      create_mail_spool = def_create_mail_spool;
- }
- /*
-@@ -1599,24 +1605,24 @@ static void create_mail (void)
-               if (fd < 0) {
-                       perror (_("Creating mailbox file"));
-                       return;
-+              }
--                      gr = getgrnam ("mail");
--                      if (!gr) {
--                              fprintf (stderr,
--                                       _
--                                       ("Group 'mail' not found. Creating the user mailbox file with 0600 mode.\n"));
--                              gid = user_gid;
--                              mode = 0600;
--                      } else {
--                              gid = gr->gr_gid;
--                              mode = 0660;
--                      }
-+              gr = getgrnam ("mail");
-+              if (!gr) {
-+                      fprintf (stderr,
-+                               _
-+                               ("Group 'mail' not found. Creating the user mailbox file with 0600 mode.\n"));
-+                      gid = user_gid;
-+                      mode = 0600;
-+              } else {
-+                      gid = gr->gr_gid;
-+                      mode = 0660;
-+              }
--                      if (fchown (fd, user_id, gid) || fchmod (fd, mode))
--                              perror (_("Setting mailbox file permissions"));
-+              if (fchown (fd, user_id, gid) || fchmod (fd, mode))
-+                      perror (_("Setting mailbox file permissions"));
--                      close (fd);
--              }
-+              close (fd);
-       }
- }
diff --git a/sys-apps/shadow/files/shadow-4.0.17-no-local-getpass.patch b/sys-apps/shadow/files/shadow-4.0.17-no-local-getpass.patch
deleted file mode 100644 (file)
index 3292e9a..0000000
+++ /dev/null
@@ -1,23 +0,0 @@
-libshadow_getpass() was punted in 4.0.17
-
-http://bugs.gentoo.org/139966
-
-Patch by Ulrich Mueller
-
-Index: configure.in
-===================================================================
-RCS file: /cvsroot/shadow/configure.in,v
-retrieving revision 1.145
-diff -u -p -r1.145 configure.in
---- configure.in       25 Jun 2006 12:30:47 -0000      1.145
-+++ configure.in       15 Jul 2006 04:51:29 -0000
-@@ -329,9 +329,6 @@ if test "$with_skey" = "yes"; then
-       ],[
-               skeychallenge((void*)0, (void*)0, (void*)0, 0);
-       ],[AC_DEFINE(SKEY_BSD_STYLE, 1, [Define to support newer BSD S/Key API])])
--      dnl libshadow_getpass() handles password prompt with enabled echo
--      AC_DEFINE(getpass, libshadow_getpass,
--              [Define to libshadow_getpass to use our own version of getpass().])
- fi
- AM_GNU_GETTEXT_VERSION(0.12.1)
diff --git a/sys-apps/shadow/shadow-4.0.15-r2.ebuild b/sys-apps/shadow/shadow-4.0.15-r2.ebuild
deleted file mode 100644 (file)
index c4ca342..0000000
+++ /dev/null
@@ -1,264 +0,0 @@
-# Copyright 1999-2006 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-apps/shadow/shadow-4.0.15-r2.ebuild,v 1.12 2006/10/17 14:21:36 dsd Exp $
-
-inherit eutils libtool toolchain-funcs flag-o-matic autotools pam
-
-# We should remove this login after pam-0.78 goes stable.
-FORCE_SYSTEMAUTH_UPDATE="no"
-
-DESCRIPTION="Utilities to deal with user accounts"
-HOMEPAGE="http://shadow.pld.org.pl/"
-SRC_URI="ftp://ftp.pld.org.pl/software/${PN}/${P}.tar.bz2"
-
-LICENSE="BSD"
-SLOT="0"
-KEYWORDS="alpha amd64 arm hppa ia64 m68k mips ppc ppc64 s390 sh sparc x86"
-IUSE="nls pam selinux skey nousuid cracklib"
-
-RDEPEND="cracklib? ( >=sys-libs/cracklib-2.7-r3 )
-       pam? ( virtual/pam )
-       !sys-apps/pam-login
-       skey? ( app-admin/skey )
-       selinux? ( >=sys-libs/libselinux-1.28 )
-       nls? ( virtual/libintl )"
-DEPEND="${RDEPEND}
-       >=sys-apps/portage-2.0.51-r2
-       nls? ( sys-devel/gettext )"
-
-src_unpack() {
-       unpack ${A}
-       cd "${S}"
-
-       # uclibc support, corrects NIS usage
-       epatch "${FILESDIR}"/${PN}-4.0.13-nonis.patch
-
-       # If su should not simulate a login shell, use '/bin/sh' as shell to enable
-       # running of commands as user with /bin/false as shell, closing bug #15015.
-       # *** This one could be a security hole; disable for now ***
-       #epatch "${FILESDIR}"/${P}-nologin-run-sh.patch
-
-       # tweak the default login.defs
-       epatch "${FILESDIR}"/${PN}-4.0.13-login.defs.patch
-
-       # Make user/group names more flexible #3485 / #22920
-       epatch "${FILESDIR}"/${PN}-4.0.13-dots-in-usernames.patch
-       epatch "${FILESDIR}"/${PN}-4.0.13-long-groupnames.patch
-
-       # Fix compiling with gcc-2.95.x
-       epatch "${FILESDIR}"/${PN}-4.0.12-gcc2.patch
-
-       # Patch from upstream enables the new environment too early for PAM
-       epatch "${FILESDIR}"/${PN}-4.0.14-su-fix-environment.patch
-
-       # lock down setuid perms #47208
-       epatch "${FILESDIR}"/${PN}-4.0.11.1-perms.patch
-
-       epatch "${FILESDIR}"/${PN}-4.0.15-uclibc-missing-l64a.patch
-       epatch "${FILESDIR}"/${PN}-4.0.15-no-default-MAIL.patch
-       epatch "${FILESDIR}"/${PN}-4.0.15-sanity-checks.patch #133615
-
-       # Needed by the UCLIBC patches
-       eautoconf || die
-
-       elibtoolize
-       epunt_cxx
-}
-
-src_compile() {
-       append-ldflags $(bindnow-flags)
-       tc-is-cross-compiler && export ac_cv_func_setpgrp_void=yes
-       econf \
-               --disable-desrpc \
-               --with-libcrypt \
-               --enable-shared=no \
-               --enable-static=yes \
-               $(use_with cracklib libcrack) \
-               $(use_with pam libpam) \
-               $(use_with skey) \
-               $(use_with selinux) \
-               $(use_enable nls) \
-               || die "bad configure"
-       emake || die "compile problem"
-}
-
-src_install() {
-       local perms=4711
-       use nousuid && perms=711
-       make DESTDIR=${D} suiduperms=${perms} install || die "install problem"
-       dosym useradd /usr/sbin/adduser
-
-       # Remove libshadow and libmisc; see bug 37725 and the following
-       # comment from shadow's README.linux:
-       #   Currently, libshadow.a is for internal use only, so if you see
-       #   -lshadow in a Makefile of some other package, it is safe to
-       #   remove it.
-       rm -f "${D}"/{,usr/}$(get_libdir)/lib{misc,shadow}.{a,la}
-
-       insinto /etc
-       # Using a securetty with devfs device names added
-       # (compat names kept for non-devfs compatibility)
-       insopts -m0600 ; doins "${FILESDIR}"/securetty
-       if ! use pam; then
-               insopts -m0600
-               doins etc/login.access etc/limits
-       else
-               newpamd "${FILESDIR}/login.pamd" login
-               use selinux || sed -i -e '/@selinux@/d' ${D}/etc/pam.d/login
-               use selinux && sed -i -e 's:@selinux@::g' ${D}/etc/pam.d/login
-
-               insinto /etc
-               insopts -m0644
-               newins "${FILESDIR}/login.defs" login.defs
-
-               # Also install another one that we can use to check if
-               # we need to update it if FORCE_LOGIN_DEFS = "yes"
-               [ "${FORCE_LOGIN_DEFS}" = "yes" ] \
-                       && newins "${FILESDIR}/login.defs" login.defs.new
-       fi
-       # Output arch-specific cruft
-       case $(tc-arch) in
-               ppc*)  echo "hvc0" >> "${D}"/etc/securetty
-                      echo "hvsi0" >> "${D}"/etc/securetty;;
-               hppa)  echo "ttyB0" >> "${D}"/etc/securetty;;
-               arm)   echo "ttyFB0" >> "${D}"/etc/securetty;;
-       esac
-
-       # needed for 'adduser -D'
-       insinto /etc/default
-       insopts -m0600
-       doins "${FILESDIR}"/default/useradd
-
-       # move passwd to / to help recover broke systems #64441
-       mv "${D}"/usr/bin/passwd "${D}"/bin/
-       dosym /bin/passwd /usr/bin/passwd
-
-       if use pam ; then
-               local INSTALL_SYSTEM_PAMD="yes"
-
-               # Do not install below pam.d files if we have pam-0.78 or later
-               has_version '>=sys-libs/pam-0.78' && \
-                       INSTALL_SYSTEM_PAMD="no"
-
-               for x in "${FILESDIR}"/pam.d-include/*; do
-                       case "${x##*/}" in
-                               "login")
-                                       # We do no longer install this one, as its from
-                                       # pam-login now.
-                                       ;;
-                               "system-auth"|"system-auth-1.1"|"other")
-                                       # These we only install if we do not have pam-0.78
-                                       # or later.
-                                       [ "${INSTALL_SYSTEM_PAMD}" = "yes" ] && [ -f ${x} ] && \
-                                               dopamd ${x}
-                                       ;;
-                               "su")
-                                       # Disable support for pam_env and pam_wheel on openpam
-                                       has_version sys-libs/pam && dopamd ${x}
-                                       ;;
-                               "su-openpam")
-                                       has_version sys-libs/openpam && newpamd ${x} su
-                                       ;;
-                               *)
-                                       [ -f ${x} ] && dopamd ${x}
-                                       ;;
-                       esac
-               done
-               for x in chage chsh chfn chpasswd newusers \
-                        user{add,del,mod} group{add,del,mod} ; do
-                       newpamd "${FILESDIR}"/pam.d-include/shadow ${x}
-               done
-
-               # Only add this one if needed.
-               if [ "${FORCE_SYSTEMAUTH_UPDATE}" = "yes" ]; then
-                       newpamd "${FILESDIR}"/pam.d-include/system-auth-1.1 system-auth.new || \
-                               die "Failed to install system-auth.new!"
-               fi
-
-               # remove manpages that pam will install for us
-               # and/or don't apply when using pam
-
-               find "${D}"/usr/share/man \
-                       '(' -name 'limits.5*' -o -name 'suauth.5*' ')' \
-                       -exec rm {} \;
-       else
-               insinto /etc
-               insopts -m0644
-               newins etc/login.defs login.defs
-       fi
-
-       # Remove manpages that are handled by other packages
-       find "${D}"/usr/share/man \
-               '(' -name id.1 -o -name passwd.5 -o -name getspnam.3 ')' \
-               -exec rm {} \;
-
-       cd "${S}"
-       dodoc ChangeLog NEWS TODO
-       newdoc README README.download
-       cd doc
-       dodoc HOWTO LSM README* WISHLIST *.txt
-}
-
-pkg_preinst() {
-       rm -f "${ROOT}"/etc/pam.d/system-auth.new \
-               "${ROOT}/etc/login.defs.new"
-}
-
-pkg_postinst() {
-       # Enable shadow groups (we need ROOT=/ here, as grpconv only
-       # operate on / ...).
-       if [[ ${ROOT} == / && ! -f /etc/gshadow ]] ; then
-               if grpck -r &>/dev/null; then
-                       grpconv
-               else
-                       ewarn "Running 'grpck' returned errors.  Please run it by hand, and then"
-                       ewarn "run 'grpconv' afterwards!"
-               fi
-       fi
-
-       use pam || return 0
-
-       if [ "${FORCE_SYSTEMAUTH_UPDATE}" = "yes" ]; then
-               local CHECK1=$(md5sum "${ROOT}"/etc/pam.d/system-auth | cut -d ' ' -f 1)
-               local CHECK2=$(md5sum "${ROOT}"/etc/pam.d/system-auth.new | cut -d ' ' -f 1)
-
-               if [ "${CHECK1}" != "${CHECK2}" ]; then
-                       ewarn "Due to a security issue, ${ROOT}etc/pam.d/system-auth "
-                       ewarn "is being updated automatically. Your old "
-                       ewarn "system-auth will be backed up as:"
-                       ewarn
-                       ewarn "  ${ROOT}etc/pam.d/system-auth.bak"
-                       echo
-
-                       cp -pPR "${ROOT}"/etc/pam.d/system-auth \
-                               "${ROOT}"/etc/pam.d/system-auth.bak;
-                       mv -f "${ROOT}"/etc/pam.d/system-auth.new \
-                               "${ROOT}"/etc/pam.d/system-auth
-                       rm -f "${ROOT}"/etc/pam.d/._cfg????_system-auth
-               else
-                       rm -f "${ROOT}"/etc/pam.d/system-auth.new
-               fi
-       fi
-
-       [ "${FORCE_LOGIN_DEFS}" != "yes" ] && return 0
-
-       ewarn "Due to a compatibility issue, ${ROOT}etc/login.defs "
-       ewarn "is being updated automatically. Your old login.defs"
-       ewarn "will be backed up as:  ${ROOT}etc/login.defs.bak"
-       echo
-
-       local CHECK1="`md5sum ${ROOT}/etc/login.defs | cut -d ' ' -f 1`"
-       local CHECK2="`md5sum ${ROOT}/etc/login.defs.new | cut -d ' ' -f 1`"
-
-       if [ "${CHECK1}" != "${CHECK2}" ]
-       then
-               cp -pPR ${ROOT}/etc/login.defs ${ROOT}/etc/login.defs.bak
-               mv -f ${ROOT}/etc/login.defs.new ${ROOT}/etc/login.defs
-       elif [ ! -f ${ROOT}/etc/login.defs ]
-       then
-               mv -f ${ROOT}/etc/login.defs.new ${ROOT}/etc/login.defs
-       else
-               rm -f ${ROOT}/etc/login.defs.new
-       fi
-}
-
diff --git a/sys-apps/shadow/shadow-4.0.16-r2.ebuild b/sys-apps/shadow/shadow-4.0.16-r2.ebuild
deleted file mode 100644 (file)
index d8ac385..0000000
+++ /dev/null
@@ -1,270 +0,0 @@
-# Copyright 1999-2006 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-apps/shadow/shadow-4.0.16-r2.ebuild,v 1.2 2006/10/17 14:21:36 dsd Exp $
-
-inherit eutils libtool toolchain-funcs flag-o-matic autotools pam
-
-# We should remove this login after pam-0.78 goes stable.
-FORCE_SYSTEMAUTH_UPDATE="no"
-
-DESCRIPTION="Utilities to deal with user accounts"
-HOMEPAGE="http://shadow.pld.org.pl/"
-SRC_URI="ftp://ftp.pld.org.pl/software/${PN}/${P}.tar.bz2"
-
-LICENSE="BSD"
-SLOT="0"
-KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86"
-IUSE="nls pam selinux skey nousuid cracklib"
-
-RDEPEND="cracklib? ( >=sys-libs/cracklib-2.7-r3 )
-       pam? ( virtual/pam )
-       !sys-apps/pam-login
-       skey? ( app-admin/skey )
-       selinux? ( >=sys-libs/libselinux-1.28 )
-       nls? ( virtual/libintl )"
-DEPEND="${RDEPEND}
-       >=sys-apps/portage-2.0.51-r2
-       nls? ( sys-devel/gettext )"
-
-src_unpack() {
-       unpack ${A}
-       cd "${S}"
-
-       # uclibc support, corrects NIS usage
-       epatch "${FILESDIR}"/${PN}-4.0.13-nonis.patch
-
-       # If su should not simulate a login shell, use '/bin/sh' as shell to enable
-       # running of commands as user with /bin/false as shell, closing bug #15015.
-       # *** This one could be a security hole; disable for now ***
-       #epatch "${FILESDIR}"/${P}-nologin-run-sh.patch
-
-       # tweak the default login.defs
-       epatch "${FILESDIR}"/${PN}-4.0.13-login.defs.patch
-
-       # Make user/group names more flexible #3485 / #22920
-       epatch "${FILESDIR}"/${PN}-4.0.13-dots-in-usernames.patch
-       epatch "${FILESDIR}"/${PN}-4.0.13-long-groupnames.patch
-
-       # Fix compiling with gcc-2.95.x
-       epatch "${FILESDIR}"/${PN}-4.0.12-gcc2.patch
-
-       # Patch from upstream enables the new environment too early for PAM
-       epatch "${FILESDIR}"/${PN}-4.0.14-su-fix-environment.patch
-
-       # lock down setuid perms #47208
-       epatch "${FILESDIR}"/${PN}-4.0.11.1-perms.patch
-
-       epatch "${FILESDIR}"/${PN}-4.0.15-uclibc-missing-l64a.patch
-
-       epatch "${FILESDIR}"/${PN}-4.0.16-check-opendir.patch #139148
-       epatch "${FILESDIR}"/${PN}-4.0.16-fix-useradd-usergroups.patch #128715
-       epatch "${FILESDIR}"/${PN}-4.0.16-mail-creation.patch #139346
-
-       # Needed by the UCLIBC patches
-       eautoconf || die
-
-       elibtoolize
-       epunt_cxx
-}
-
-src_compile() {
-       append-ldflags $(bindnow-flags)
-       tc-is-cross-compiler && export ac_cv_func_setpgrp_void=yes
-       econf \
-               --disable-desrpc \
-               --with-libcrypt \
-               --enable-shared=no \
-               --enable-static=yes \
-               $(use_with cracklib libcrack) \
-               $(use_with pam libpam) \
-               $(use_with skey) \
-               $(use_with selinux) \
-               $(use_enable nls) \
-               || die "bad configure"
-       emake || die "compile problem"
-}
-
-src_install() {
-       local perms=4711
-       use nousuid && perms=711
-       make DESTDIR="${D}" suiduperms=${perms} install || die "install problem"
-       dosym useradd /usr/sbin/adduser
-
-       # Remove libshadow and libmisc; see bug 37725 and the following
-       # comment from shadow's README.linux:
-       #   Currently, libshadow.a is for internal use only, so if you see
-       #   -lshadow in a Makefile of some other package, it is safe to
-       #   remove it.
-       rm -f "${D}"/{,usr/}$(get_libdir)/lib{misc,shadow}.{a,la}
-
-       insinto /etc
-       # Using a securetty with devfs device names added
-       # (compat names kept for non-devfs compatibility)
-       insopts -m0600 ; doins "${FILESDIR}"/securetty
-       if ! use pam ; then
-               insopts -m0600
-               doins etc/login.access etc/limits
-       else
-               newpamd "${FILESDIR}/login.pamd" login
-               use selinux || sed -i -e '/@selinux@/d' "${D}"/etc/pam.d/login
-               use selinux && sed -i -e 's:@selinux@::g' "${D}"/etc/pam.d/login
-
-               insinto /etc
-               insopts -m0644
-               newins "${FILESDIR}/login.defs" login.defs
-
-               # Also install another one that we can use to check if
-               # we need to update it if FORCE_LOGIN_DEFS = "yes"
-               [ "${FORCE_LOGIN_DEFS}" = "yes" ] \
-                       && newins "${FILESDIR}/login.defs" login.defs.new
-       fi
-       # Output arch-specific cruft
-       case $(tc-arch) in
-               ppc*)  echo "hvc0" >> "${D}"/etc/securetty
-                      echo "hvsi0" >> "${D}"/etc/securetty;;
-               hppa)  echo "ttyB0" >> "${D}"/etc/securetty;;
-               arm)   echo "ttyFB0" >> "${D}"/etc/securetty;;
-       esac
-
-       # needed for 'adduser -D'
-       insinto /etc/default
-       insopts -m0600
-       doins "${FILESDIR}"/default/useradd
-
-       # move passwd to / to help recover broke systems #64441
-       mv "${D}"/usr/bin/passwd "${D}"/bin/
-       dosym /bin/passwd /usr/bin/passwd
-
-       if use pam ; then
-               local INSTALL_SYSTEM_PAMD="yes"
-
-               # Do not install below pam.d files if we have pam-0.78 or later
-               has_version '>=sys-libs/pam-0.78' && \
-                       INSTALL_SYSTEM_PAMD="no"
-
-               for x in "${FILESDIR}"/pam.d-include/*; do
-                       case "${x##*/}" in
-                               "login")
-                                       # We do no longer install this one, as its from
-                                       # pam-login now.
-                                       ;;
-                               "system-auth"|"system-auth-1.1"|"other")
-                                       # These we only install if we do not have pam-0.78
-                                       # or later.
-                                       [ "${INSTALL_SYSTEM_PAMD}" = "yes" ] && [ -f ${x} ] && \
-                                               dopamd ${x}
-                                       ;;
-                               "su")
-                                       # Disable support for pam_env and pam_wheel on openpam
-                                       has_version sys-libs/pam && dopamd ${x}
-                                       ;;
-                               "su-openpam")
-                                       has_version sys-libs/openpam && newpamd ${x} su
-                                       ;;
-                               *)
-                                       [ -f ${x} ] && dopamd ${x}
-                                       ;;
-                       esac
-               done
-               for x in chage chsh chfn chpasswd newusers \
-                        user{add,del,mod} group{add,del,mod} ; do
-                       newpamd "${FILESDIR}"/pam.d-include/shadow ${x}
-               done
-
-               # Only add this one if needed.
-               if [ "${FORCE_SYSTEMAUTH_UPDATE}" = "yes" ]; then
-                       newpamd "${FILESDIR}"/pam.d-include/system-auth-1.1 system-auth.new || \
-                               die "Failed to install system-auth.new!"
-               fi
-
-               # remove manpages that pam will install for us
-               # and/or don't apply when using pam
-
-               find "${D}"/usr/share/man \
-                       '(' -name 'limits.5*' -o -name 'suauth.5*' ')' \
-                       -exec rm {} \;
-       else
-               insinto /etc
-               insopts -m0644
-               newins etc/login.defs login.defs
-       fi
-
-       # libshadow_getpass() is only used sometimes now which means
-       # GETPASS_ASTERISKS may not always be applicable
-       use skey || sed -i -e '/^GETPASS_ASTERISKS/s:^:#:' "${D}"/etc/login.defs
-
-       # Remove manpages that are handled by other packages
-       find "${D}"/usr/share/man \
-               '(' -name id.1 -o -name passwd.5 -o -name getspnam.3 ')' \
-               -exec rm {} \;
-
-       cd "${S}"
-       dodoc ChangeLog NEWS TODO
-       newdoc README README.download
-       cd doc
-       dodoc HOWTO LSM README* WISHLIST *.txt
-}
-
-pkg_preinst() {
-       rm -f "${ROOT}"/etc/pam.d/system-auth.new \
-               "${ROOT}/etc/login.defs.new"
-}
-
-pkg_postinst() {
-       # Enable shadow groups (we need ROOT=/ here, as grpconv only
-       # operate on / ...).
-       if [[ ${ROOT} == / && ! -f /etc/gshadow ]] ; then
-               if grpck -r &>/dev/null; then
-                       grpconv
-               else
-                       ewarn "Running 'grpck' returned errors.  Please run it by hand, and then"
-                       ewarn "run 'grpconv' afterwards!"
-               fi
-       fi
-
-       use pam || return 0
-
-       if [ "${FORCE_SYSTEMAUTH_UPDATE}" = "yes" ]; then
-               local CHECK1=$(md5sum "${ROOT}"/etc/pam.d/system-auth | cut -d ' ' -f 1)
-               local CHECK2=$(md5sum "${ROOT}"/etc/pam.d/system-auth.new | cut -d ' ' -f 1)
-
-               if [ "${CHECK1}" != "${CHECK2}" ]; then
-                       ewarn "Due to a security issue, ${ROOT}etc/pam.d/system-auth "
-                       ewarn "is being updated automatically. Your old "
-                       ewarn "system-auth will be backed up as:"
-                       ewarn
-                       ewarn "  ${ROOT}etc/pam.d/system-auth.bak"
-                       echo
-
-                       cp -pPR "${ROOT}"/etc/pam.d/system-auth \
-                               "${ROOT}"/etc/pam.d/system-auth.bak;
-                       mv -f "${ROOT}"/etc/pam.d/system-auth.new \
-                               "${ROOT}"/etc/pam.d/system-auth
-                       rm -f "${ROOT}"/etc/pam.d/._cfg????_system-auth
-               else
-                       rm -f "${ROOT}"/etc/pam.d/system-auth.new
-               fi
-       fi
-
-       [ "${FORCE_LOGIN_DEFS}" != "yes" ] && return 0
-
-       ewarn "Due to a compatibility issue, ${ROOT}etc/login.defs "
-       ewarn "is being updated automatically. Your old login.defs"
-       ewarn "will be backed up as:  ${ROOT}etc/login.defs.bak"
-       echo
-
-       local CHECK1="`md5sum ${ROOT}/etc/login.defs | cut -d ' ' -f 1`"
-       local CHECK2="`md5sum ${ROOT}/etc/login.defs.new | cut -d ' ' -f 1`"
-
-       if [ "${CHECK1}" != "${CHECK2}" ]
-       then
-               cp -pPR ${ROOT}/etc/login.defs ${ROOT}/etc/login.defs.bak
-               mv -f ${ROOT}/etc/login.defs.new ${ROOT}/etc/login.defs
-       elif [ ! -f ${ROOT}/etc/login.defs ]
-       then
-               mv -f ${ROOT}/etc/login.defs.new ${ROOT}/etc/login.defs
-       else
-               rm -f ${ROOT}/etc/login.defs.new
-       fi
-}
-
diff --git a/sys-apps/shadow/shadow-4.0.17-r1.ebuild b/sys-apps/shadow/shadow-4.0.17-r1.ebuild
deleted file mode 100644 (file)
index 21e60b5..0000000
+++ /dev/null
@@ -1,210 +0,0 @@
-# Copyright 1999-2006 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-apps/shadow/shadow-4.0.17-r1.ebuild,v 1.4 2006/10/17 14:21:36 dsd Exp $
-
-inherit eutils libtool toolchain-funcs flag-o-matic autotools pam
-
-DESCRIPTION="Utilities to deal with user accounts"
-HOMEPAGE="http://shadow.pld.org.pl/"
-SRC_URI="ftp://ftp.pld.org.pl/software/${PN}/${P}.tar.bz2"
-
-LICENSE="BSD"
-SLOT="0"
-KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86"
-IUSE="nls pam selinux skey nousuid cracklib"
-
-RDEPEND="cracklib? ( >=sys-libs/cracklib-2.7-r3 )
-       pam? ( virtual/pam )
-       !sys-apps/pam-login
-       skey? ( app-admin/skey )
-       selinux? ( >=sys-libs/libselinux-1.28 )
-       nls? ( virtual/libintl )"
-DEPEND="${RDEPEND}
-       >=sys-apps/portage-2.0.51-r2
-       nls? ( sys-devel/gettext )"
-
-src_unpack() {
-       unpack ${A}
-       cd "${S}"
-
-       # uclibc support, corrects NIS usage
-       epatch "${FILESDIR}"/${PN}-4.0.13-nonis.patch
-
-       # If su should not simulate a login shell, use '/bin/sh' as shell to enable
-       # running of commands as user with /bin/false as shell, closing bug #15015.
-       # *** This one could be a security hole; disable for now ***
-       #epatch "${FILESDIR}"/${P}-nologin-run-sh.patch
-
-       # tweak the default login.defs
-       epatch "${FILESDIR}"/${PN}-4.0.17-login.defs.patch
-
-       # Make user/group names more flexible #3485 / #22920
-       epatch "${FILESDIR}"/${PN}-4.0.13-dots-in-usernames.patch
-       epatch "${FILESDIR}"/${PN}-4.0.13-long-groupnames.patch
-
-       # Fix compiling with gcc-2.95.x
-       epatch "${FILESDIR}"/${PN}-4.0.12-gcc2.patch
-
-       # Patch from upstream enables the new environment too early for PAM
-       epatch "${FILESDIR}"/${PN}-4.0.14-su-fix-environment.patch
-
-       # lock down setuid perms #47208
-       epatch "${FILESDIR}"/${PN}-4.0.11.1-perms.patch
-
-       epatch "${FILESDIR}"/${PN}-4.0.15-uclibc-missing-l64a.patch
-
-       epatch "${FILESDIR}"/${PN}-4.0.16-fix-useradd-usergroups.patch #128715
-
-       epatch "${FILESDIR}"/${PN}-4.0.17-no-local-getpass.patch
-
-       # Needed by the UCLIBC patches
-       eautoconf || die
-
-       elibtoolize
-       epunt_cxx
-}
-
-src_compile() {
-       append-ldflags $(bindnow-flags)
-       tc-is-cross-compiler && export ac_cv_func_setpgrp_void=yes
-       econf \
-               --disable-desrpc \
-               --with-libcrypt \
-               --enable-shared=no \
-               --enable-static=yes \
-               $(use_with cracklib libcrack) \
-               $(use_with pam libpam) \
-               $(use_with skey) \
-               $(use_with selinux) \
-               $(use_enable nls) \
-               || die "bad configure"
-       emake || die "compile problem"
-}
-
-src_install() {
-       local perms=4711
-       use nousuid && perms=711
-       make DESTDIR="${D}" suiduperms=${perms} install || die "install problem"
-       dosym useradd /usr/sbin/adduser
-
-       # Remove libshadow and libmisc; see bug 37725 and the following
-       # comment from shadow's README.linux:
-       #   Currently, libshadow.a is for internal use only, so if you see
-       #   -lshadow in a Makefile of some other package, it is safe to
-       #   remove it.
-       rm -f "${D}"/{,usr/}$(get_libdir)/lib{misc,shadow}.{a,la}
-
-       insinto /etc
-       # Using a securetty with devfs device names added
-       # (compat names kept for non-devfs compatibility)
-       insopts -m0600 ; doins "${FILESDIR}"/securetty
-       if ! use pam ; then
-               insopts -m0600
-               doins etc/login.access etc/limits
-       else
-               newpamd "${FILESDIR}/login.pamd" login
-               use selinux || sed -i -e '/@selinux@/d' "${D}"/etc/pam.d/login
-               use selinux && sed -i -e 's:@selinux@::g' "${D}"/etc/pam.d/login
-       fi
-       # Output arch-specific cruft
-       case $(tc-arch) in
-               ppc*)  echo "hvc0" >> "${D}"/etc/securetty
-                      echo "hvsi0" >> "${D}"/etc/securetty;;
-               hppa)  echo "ttyB0" >> "${D}"/etc/securetty;;
-               arm)   echo "ttyFB0" >> "${D}"/etc/securetty;;
-       esac
-
-       # needed for 'adduser -D'
-       insinto /etc/default
-       insopts -m0600
-       doins "${FILESDIR}"/default/useradd
-
-       # move passwd to / to help recover broke systems #64441
-       mv "${D}"/usr/bin/passwd "${D}"/bin/
-       dosym /bin/passwd /usr/bin/passwd
-
-       if use pam ; then
-               local INSTALL_SYSTEM_PAMD="yes"
-
-               # Do not install below pam.d files if we have pam-0.78 or later
-               has_version '>=sys-libs/pam-0.78' && \
-                       INSTALL_SYSTEM_PAMD="no"
-
-               for x in "${FILESDIR}"/pam.d-include/*; do
-                       case "${x##*/}" in
-                               "login")
-                                       # We do no longer install this one, as its from
-                                       # pam-login now.
-                                       ;;
-                               "system-auth"|"system-auth-1.1"|"other")
-                                       # These we only install if we do not have pam-0.78
-                                       # or later.
-                                       [ "${INSTALL_SYSTEM_PAMD}" = "yes" ] && [ -f ${x} ] && \
-                                               dopamd ${x}
-                                       ;;
-                               "su")
-                                       # Disable support for pam_env and pam_wheel on openpam
-                                       has_version sys-libs/pam && dopamd ${x}
-                                       ;;
-                               "su-openpam")
-                                       has_version sys-libs/openpam && newpamd ${x} su
-                                       ;;
-                               *)
-                                       [ -f ${x} ] && dopamd ${x}
-                                       ;;
-                       esac
-               done
-               for x in chage chsh chfn chpasswd newusers \
-                        user{add,del,mod} group{add,del,mod} ; do
-                       newpamd "${FILESDIR}"/pam.d-include/shadow ${x}
-               done
-
-               # remove manpages that pam will install for us
-               # and/or don't apply when using pam
-
-               find "${D}"/usr/share/man \
-                       '(' -name 'limits.5*' -o -name 'suauth.5*' ')' \
-                       -exec rm {} \;
-       fi
-
-       cd "${S}"
-       insinto /etc
-       insopts -m0644
-       newins etc/login.defs login.defs
-
-       # comment out options that pam hates
-       if use pam ; then
-               awk -f "${FILESDIR}"/login_defs.awk \
-                       lib/getdef.c etc/login.defs \
-                       > "${D}"/etc/login.defs
-       fi
-
-       # Remove manpages that are handled by other packages
-       find "${D}"/usr/share/man \
-               '(' -name id.1 -o -name passwd.5 -o -name getspnam.3 ')' \
-               -exec rm {} \;
-
-       cd "${S}"
-       dodoc ChangeLog NEWS TODO
-       newdoc README README.download
-       cd doc
-       dodoc HOWTO README* WISHLIST *.txt
-}
-
-pkg_preinst() {
-       rm -f "${ROOT}"/etc/pam.d/system-auth.new \
-               "${ROOT}/etc/login.defs.new"
-}
-
-pkg_postinst() {
-       # Enable shadow groups (we need ROOT=/ here, as grpconv only
-       # operate on / ...).
-       if [[ ${ROOT} == / && ! -f /etc/gshadow ]] ; then
-               if grpck -r &>/dev/null; then
-                       grpconv
-               else
-                       ewarn "Running 'grpck' returned errors.  Please run it by hand, and then"
-                       ewarn "run 'grpconv' afterwards!"
-               fi
-       fi
-}
diff --git a/sys-apps/shadow/shadow-4.0.17.ebuild b/sys-apps/shadow/shadow-4.0.17.ebuild
deleted file mode 100644 (file)
index 5ed1891..0000000
+++ /dev/null
@@ -1,270 +0,0 @@
-# Copyright 1999-2006 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-apps/shadow/shadow-4.0.17.ebuild,v 1.3 2006/10/17 14:21:36 dsd Exp $
-
-inherit eutils libtool toolchain-funcs flag-o-matic autotools pam
-
-# We should remove this login after pam-0.78 goes stable.
-FORCE_SYSTEMAUTH_UPDATE="no"
-
-DESCRIPTION="Utilities to deal with user accounts"
-HOMEPAGE="http://shadow.pld.org.pl/"
-SRC_URI="ftp://ftp.pld.org.pl/software/${PN}/${P}.tar.bz2"
-
-LICENSE="BSD"
-SLOT="0"
-KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86"
-IUSE="nls pam selinux skey nousuid cracklib"
-
-RDEPEND="cracklib? ( >=sys-libs/cracklib-2.7-r3 )
-       pam? ( virtual/pam )
-       !sys-apps/pam-login
-       skey? ( app-admin/skey )
-       selinux? ( >=sys-libs/libselinux-1.28 )
-       nls? ( virtual/libintl )"
-DEPEND="${RDEPEND}
-       >=sys-apps/portage-2.0.51-r2
-       nls? ( sys-devel/gettext )"
-
-src_unpack() {
-       unpack ${A}
-       cd "${S}"
-
-       # uclibc support, corrects NIS usage
-       epatch "${FILESDIR}"/${PN}-4.0.13-nonis.patch
-
-       # If su should not simulate a login shell, use '/bin/sh' as shell to enable
-       # running of commands as user with /bin/false as shell, closing bug #15015.
-       # *** This one could be a security hole; disable for now ***
-       #epatch "${FILESDIR}"/${P}-nologin-run-sh.patch
-
-       # tweak the default login.defs
-       epatch "${FILESDIR}"/${PN}-4.0.13-login.defs.patch
-
-       # Make user/group names more flexible #3485 / #22920
-       epatch "${FILESDIR}"/${PN}-4.0.13-dots-in-usernames.patch
-       epatch "${FILESDIR}"/${PN}-4.0.13-long-groupnames.patch
-
-       # Fix compiling with gcc-2.95.x
-       epatch "${FILESDIR}"/${PN}-4.0.12-gcc2.patch
-
-       # Patch from upstream enables the new environment too early for PAM
-       epatch "${FILESDIR}"/${PN}-4.0.14-su-fix-environment.patch
-
-       # lock down setuid perms #47208
-       epatch "${FILESDIR}"/${PN}-4.0.11.1-perms.patch
-
-       epatch "${FILESDIR}"/${PN}-4.0.15-uclibc-missing-l64a.patch
-
-       epatch "${FILESDIR}"/${PN}-4.0.16-fix-useradd-usergroups.patch #128715
-
-       epatch "${FILESDIR}"/${PN}-4.0.17-no-local-getpass.patch
-
-       # Needed by the UCLIBC patches
-       eautoconf || die
-
-       elibtoolize
-       epunt_cxx
-}
-
-src_compile() {
-       append-ldflags $(bindnow-flags)
-       tc-is-cross-compiler && export ac_cv_func_setpgrp_void=yes
-       econf \
-               --disable-desrpc \
-               --with-libcrypt \
-               --enable-shared=no \
-               --enable-static=yes \
-               $(use_with cracklib libcrack) \
-               $(use_with pam libpam) \
-               $(use_with skey) \
-               $(use_with selinux) \
-               $(use_enable nls) \
-               || die "bad configure"
-       emake || die "compile problem"
-}
-
-src_install() {
-       local perms=4711
-       use nousuid && perms=711
-       make DESTDIR="${D}" suiduperms=${perms} install || die "install problem"
-       dosym useradd /usr/sbin/adduser
-
-       # Remove libshadow and libmisc; see bug 37725 and the following
-       # comment from shadow's README.linux:
-       #   Currently, libshadow.a is for internal use only, so if you see
-       #   -lshadow in a Makefile of some other package, it is safe to
-       #   remove it.
-       rm -f "${D}"/{,usr/}$(get_libdir)/lib{misc,shadow}.{a,la}
-
-       insinto /etc
-       # Using a securetty with devfs device names added
-       # (compat names kept for non-devfs compatibility)
-       insopts -m0600 ; doins "${FILESDIR}"/securetty
-       if ! use pam ; then
-               insopts -m0600
-               doins etc/login.access etc/limits
-       else
-               newpamd "${FILESDIR}/login.pamd" login
-               use selinux || sed -i -e '/@selinux@/d' "${D}"/etc/pam.d/login
-               use selinux && sed -i -e 's:@selinux@::g' "${D}"/etc/pam.d/login
-
-               insinto /etc
-               insopts -m0644
-               newins "${FILESDIR}/login.defs" login.defs
-
-               # Also install another one that we can use to check if
-               # we need to update it if FORCE_LOGIN_DEFS = "yes"
-               [ "${FORCE_LOGIN_DEFS}" = "yes" ] \
-                       && newins "${FILESDIR}/login.defs" login.defs.new
-       fi
-       # Output arch-specific cruft
-       case $(tc-arch) in
-               ppc*)  echo "hvc0" >> "${D}"/etc/securetty
-                      echo "hvsi0" >> "${D}"/etc/securetty;;
-               hppa)  echo "ttyB0" >> "${D}"/etc/securetty;;
-               arm)   echo "ttyFB0" >> "${D}"/etc/securetty;;
-       esac
-
-       # needed for 'adduser -D'
-       insinto /etc/default
-       insopts -m0600
-       doins "${FILESDIR}"/default/useradd
-
-       # move passwd to / to help recover broke systems #64441
-       mv "${D}"/usr/bin/passwd "${D}"/bin/
-       dosym /bin/passwd /usr/bin/passwd
-
-       if use pam ; then
-               local INSTALL_SYSTEM_PAMD="yes"
-
-               # Do not install below pam.d files if we have pam-0.78 or later
-               has_version '>=sys-libs/pam-0.78' && \
-                       INSTALL_SYSTEM_PAMD="no"
-
-               for x in "${FILESDIR}"/pam.d-include/*; do
-                       case "${x##*/}" in
-                               "login")
-                                       # We do no longer install this one, as its from
-                                       # pam-login now.
-                                       ;;
-                               "system-auth"|"system-auth-1.1"|"other")
-                                       # These we only install if we do not have pam-0.78
-                                       # or later.
-                                       [ "${INSTALL_SYSTEM_PAMD}" = "yes" ] && [ -f ${x} ] && \
-                                               dopamd ${x}
-                                       ;;
-                               "su")
-                                       # Disable support for pam_env and pam_wheel on openpam
-                                       has_version sys-libs/pam && dopamd ${x}
-                                       ;;
-                               "su-openpam")
-                                       has_version sys-libs/openpam && newpamd ${x} su
-                                       ;;
-                               *)
-                                       [ -f ${x} ] && dopamd ${x}
-                                       ;;
-                       esac
-               done
-               for x in chage chsh chfn chpasswd newusers \
-                        user{add,del,mod} group{add,del,mod} ; do
-                       newpamd "${FILESDIR}"/pam.d-include/shadow ${x}
-               done
-
-               # Only add this one if needed.
-               if [ "${FORCE_SYSTEMAUTH_UPDATE}" = "yes" ]; then
-                       newpamd "${FILESDIR}"/pam.d-include/system-auth-1.1 system-auth.new || \
-                               die "Failed to install system-auth.new!"
-               fi
-
-               # remove manpages that pam will install for us
-               # and/or don't apply when using pam
-
-               find "${D}"/usr/share/man \
-                       '(' -name 'limits.5*' -o -name 'suauth.5*' ')' \
-                       -exec rm {} \;
-       else
-               insinto /etc
-               insopts -m0644
-               newins etc/login.defs login.defs
-       fi
-
-       # libshadow_getpass() is only used sometimes now which means
-       # GETPASS_ASTERISKS may not always be applicable
-       use skey || sed -i -e '/^GETPASS_ASTERISKS/s:^:#:' "${D}"/etc/login.defs
-
-       # Remove manpages that are handled by other packages
-       find "${D}"/usr/share/man \
-               '(' -name id.1 -o -name passwd.5 -o -name getspnam.3 ')' \
-               -exec rm {} \;
-
-       cd "${S}"
-       dodoc ChangeLog NEWS TODO
-       newdoc README README.download
-       cd doc
-       dodoc HOWTO LSM README* WISHLIST *.txt
-}
-
-pkg_preinst() {
-       rm -f "${ROOT}"/etc/pam.d/system-auth.new \
-               "${ROOT}/etc/login.defs.new"
-}
-
-pkg_postinst() {
-       # Enable shadow groups (we need ROOT=/ here, as grpconv only
-       # operate on / ...).
-       if [[ ${ROOT} == / && ! -f /etc/gshadow ]] ; then
-               if grpck -r &>/dev/null; then
-                       grpconv
-               else
-                       ewarn "Running 'grpck' returned errors.  Please run it by hand, and then"
-                       ewarn "run 'grpconv' afterwards!"
-               fi
-       fi
-
-       use pam || return 0
-
-       if [ "${FORCE_SYSTEMAUTH_UPDATE}" = "yes" ]; then
-               local CHECK1=$(md5sum "${ROOT}"/etc/pam.d/system-auth | cut -d ' ' -f 1)
-               local CHECK2=$(md5sum "${ROOT}"/etc/pam.d/system-auth.new | cut -d ' ' -f 1)
-
-               if [ "${CHECK1}" != "${CHECK2}" ]; then
-                       ewarn "Due to a security issue, ${ROOT}etc/pam.d/system-auth "
-                       ewarn "is being updated automatically. Your old "
-                       ewarn "system-auth will be backed up as:"
-                       ewarn
-                       ewarn "  ${ROOT}etc/pam.d/system-auth.bak"
-                       echo
-
-                       cp -pPR "${ROOT}"/etc/pam.d/system-auth \
-                               "${ROOT}"/etc/pam.d/system-auth.bak;
-                       mv -f "${ROOT}"/etc/pam.d/system-auth.new \
-                               "${ROOT}"/etc/pam.d/system-auth
-                       rm -f "${ROOT}"/etc/pam.d/._cfg????_system-auth
-               else
-                       rm -f "${ROOT}"/etc/pam.d/system-auth.new
-               fi
-       fi
-
-       [ "${FORCE_LOGIN_DEFS}" != "yes" ] && return 0
-
-       ewarn "Due to a compatibility issue, ${ROOT}etc/login.defs "
-       ewarn "is being updated automatically. Your old login.defs"
-       ewarn "will be backed up as:  ${ROOT}etc/login.defs.bak"
-       echo
-
-       local CHECK1="`md5sum ${ROOT}/etc/login.defs | cut -d ' ' -f 1`"
-       local CHECK2="`md5sum ${ROOT}/etc/login.defs.new | cut -d ' ' -f 1`"
-
-       if [ "${CHECK1}" != "${CHECK2}" ]
-       then
-               cp -pPR ${ROOT}/etc/login.defs ${ROOT}/etc/login.defs.bak
-               mv -f ${ROOT}/etc/login.defs.new ${ROOT}/etc/login.defs
-       elif [ ! -f ${ROOT}/etc/login.defs ]
-       then
-               mv -f ${ROOT}/etc/login.defs.new ${ROOT}/etc/login.defs
-       else
-               rm -f ${ROOT}/etc/login.defs.new
-       fi
-}
-