MD5 33d9efd092b6999143ea42c99a59bfb1 files/pam.d-include/system-auth-1.1 365
RMD160 28d216f6542554bf175a43a8763827831009224d files/pam.d-include/system-auth-1.1 365
SHA256 e073f573c88515cf38fb22faa26ccf87d55d34e6d460d28ad25682958de4c13e files/pam.d-include/system-auth-1.1 365
-AUX pam.d/login 333 RMD160 8ace0beb3722c58397794265c09648d37eb217a1 SHA1 e57eee17d985274363941047c9eaea54d23e74be SHA256 7c678613cadb447e882c24fa491a4fd5d01d9345e5b7f115663fbe779c7535b9
-MD5 987d0bd2e5dd1f96dc28ae2963054022 files/pam.d/login 333
-RMD160 8ace0beb3722c58397794265c09648d37eb217a1 files/pam.d/login 333
-SHA256 7c678613cadb447e882c24fa491a4fd5d01d9345e5b7f115663fbe779c7535b9 files/pam.d/login 333
-AUX pam.d/other 142 RMD160 ccd73af37364c1c7edbe9150255fd0bcf8b12b09 SHA1 e038542a11ff3da16756518f236b6d273da1d08d SHA256 5e05df2743ec0021364b05f4bbe2e5a3a670abb5af845c3fa760731e5b7272ca
-MD5 5bff4f2134b72dabc4afa5bb296e874d files/pam.d/other 142
-RMD160 ccd73af37364c1c7edbe9150255fd0bcf8b12b09 files/pam.d/other 142
-SHA256 5e05df2743ec0021364b05f4bbe2e5a3a670abb5af845c3fa760731e5b7272ca files/pam.d/other 142
-AUX pam.d/passwd 172 RMD160 27c31ba3ad64b6bf8bb465b51c1908d85a42da16 SHA1 d4b4e6106767cf618d9817767e3d2d54215d8388 SHA256 13c8375bf208924598422d35cf9066c9e77a234b90ee8e2b845e55bc0f5876ef
-MD5 8a59937d720a19824db6e4a8cd173a4b files/pam.d/passwd 172
-RMD160 27c31ba3ad64b6bf8bb465b51c1908d85a42da16 files/pam.d/passwd 172
-SHA256 13c8375bf208924598422d35cf9066c9e77a234b90ee8e2b845e55bc0f5876ef files/pam.d/passwd 172
-AUX pam.d/shadow 171 RMD160 3cb1b04370f3492ab4caa13742e95485167cc1e8 SHA1 9d7a005421d78711d88703209f6f1b97cbcb2d97 SHA256 7f181ffaf004d4ae5ca1a6c3b9dbb87a6195c1c005d17c76b32602d812864b12
-MD5 a5721c39446539b751dceae4b054542b files/pam.d/shadow 171
-RMD160 3cb1b04370f3492ab4caa13742e95485167cc1e8 files/pam.d/shadow 171
-SHA256 7f181ffaf004d4ae5ca1a6c3b9dbb87a6195c1c005d17c76b32602d812864b12 files/pam.d/shadow 171
-AUX pam.d/su 1142 RMD160 031016dd8fb2721b668c6cf9c4e7be27ecdaa198 SHA1 dfc5a5a3c010d455dcb10cc34d686363f5c79c46 SHA256 6a8e7a11f8d7089676cecb52b2bcdc93bfb7459f6bca1b2ef01847c53fdfd9c2
-MD5 a1fc81dbd0d41face776fba4ca929d8f files/pam.d/su 1142
-RMD160 031016dd8fb2721b668c6cf9c4e7be27ecdaa198 files/pam.d/su 1142
-SHA256 6a8e7a11f8d7089676cecb52b2bcdc93bfb7459f6bca1b2ef01847c53fdfd9c2 files/pam.d/su 1142
-AUX pam.d/system-auth 373 RMD160 f0bbc8a9f69854ffadc81de532e9a993f9761ae7 SHA1 95cab48dff43b02b624050b5cb64d55159006590 SHA256 118ac8c88e9cb0f12fecfc2ff6b503f6ea151bb306cb6b58963068eea04c3668
-MD5 deed69f8fa52ca844f3669414bd5cf01 files/pam.d/system-auth 373
-RMD160 f0bbc8a9f69854ffadc81de532e9a993f9761ae7 files/pam.d/system-auth 373
-SHA256 118ac8c88e9cb0f12fecfc2ff6b503f6ea151bb306cb6b58963068eea04c3668 files/pam.d/system-auth 373
-AUX pam.d/system-auth-1.1 365 RMD160 28d216f6542554bf175a43a8763827831009224d SHA1 91af0856563242ca34c6f49ee57d90c8a9e6a0f8 SHA256 e073f573c88515cf38fb22faa26ccf87d55d34e6d460d28ad25682958de4c13e
-MD5 33d9efd092b6999143ea42c99a59bfb1 files/pam.d/system-auth-1.1 365
-RMD160 28d216f6542554bf175a43a8763827831009224d files/pam.d/system-auth-1.1 365
-SHA256 e073f573c88515cf38fb22faa26ccf87d55d34e6d460d28ad25682958de4c13e files/pam.d/system-auth-1.1 365
AUX securetty 253 RMD160 20e9b398e7bd3c6d50db92d403ade8e3f5b13cb1 SHA1 ca723296318773733d1e53486088579ff43e210b SHA256 158ba98d557a8e3241d8635e5f8e2d6712847ec0b92741f8bdd65daecd834843
MD5 a744152ec905f4c06f3b92142b7fec8a files/securetty 253
RMD160 20e9b398e7bd3c6d50db92d403ade8e3f5b13cb1 files/securetty 253
MD5 fc7dcebbbe2fae05629e848bc886f454 files/shadow-4.0.13-dots-in-usernames.patch 917
RMD160 999f1f6a6468527db1fbc21b7b2a1113fa2aef86 files/shadow-4.0.13-dots-in-usernames.patch 917
SHA256 ddd255ec0e5abd2aeb708ddb3f03a8dd2ecf318cfa5cdbd179f599322d1092f3 files/shadow-4.0.13-dots-in-usernames.patch 917
-AUX shadow-4.0.13-login.defs.patch 672 RMD160 bcd9b8714c26f79ea2eb7af23778d81d5397f366 SHA1 148fdb22beb5e4606d7eef6a060f19d866233442 SHA256 bc15f859c0d120b917c0a4a3c9351acbce93463bb1f9b4b76b76f11382766220
-MD5 08f11e5b0c4a987e49367f245f475728 files/shadow-4.0.13-login.defs.patch 672
-RMD160 bcd9b8714c26f79ea2eb7af23778d81d5397f366 files/shadow-4.0.13-login.defs.patch 672
-SHA256 bc15f859c0d120b917c0a4a3c9351acbce93463bb1f9b4b76b76f11382766220 files/shadow-4.0.13-login.defs.patch 672
AUX shadow-4.0.13-long-groupnames.patch 398 RMD160 a1fdef5d2c87579838332558624f86d591b85c4b SHA1 ea8eb52bd13b4cd24c564db02ee73fff65fa0372 SHA256 e0f7969be35f190d09d355aa3b76a09f2b1b5ea9a461a27ac1b9ead982211a16
MD5 acdc5a5ac62bfd3495bde25438b49734 files/shadow-4.0.13-long-groupnames.patch 398
RMD160 a1fdef5d2c87579838332558624f86d591b85c4b files/shadow-4.0.13-long-groupnames.patch 398
MD5 dfa169094cacf64d4980b0c8d76374d8 files/shadow-4.0.13-nonis.patch 1795
RMD160 ed7ece3f676283f24daa4d7506a0ed73a5bb4e77 files/shadow-4.0.13-nonis.patch 1795
SHA256 4a4bbed01da45aa7217e12a070e0a86c70a4c9049bddaa881d404a362e5df145 files/shadow-4.0.13-nonis.patch 1795
-AUX shadow-4.0.13-su-fix-environment.patch 1070 RMD160 7bbac959459458a312a196388a6ab99b0e306897 SHA1 89916707d6fb4abc7516cfe7116c657c28e5ba18 SHA256 1554809ff2dbe6768ef8f8c7f14ccad8fa4eb2d5765ef67714a42fb35a34dab4
-MD5 223a6d64e1635462fcca48217644cfd0 files/shadow-4.0.13-su-fix-environment.patch 1070
-RMD160 7bbac959459458a312a196388a6ab99b0e306897 files/shadow-4.0.13-su-fix-environment.patch 1070
-SHA256 1554809ff2dbe6768ef8f8c7f14ccad8fa4eb2d5765ef67714a42fb35a34dab4 files/shadow-4.0.13-su-fix-environment.patch 1070
-AUX shadow-4.0.14-su-fix-environment.patch 701 RMD160 0375f0d5ef4e7f85b9465b0b4fad828ee6394e60 SHA1 d0bad5098f05f2194ce343a1bf95e930eadd8183 SHA256 15bf4978d71f4f3f96ddda031b608a0fecb6a95644f47b058fb1e3d38bfc99a8
-MD5 afc6edd720c3e704f48553ef9ca8631b files/shadow-4.0.14-su-fix-environment.patch 701
-RMD160 0375f0d5ef4e7f85b9465b0b4fad828ee6394e60 files/shadow-4.0.14-su-fix-environment.patch 701
-SHA256 15bf4978d71f4f3f96ddda031b608a0fecb6a95644f47b058fb1e3d38bfc99a8 files/shadow-4.0.14-su-fix-environment.patch 701
-AUX shadow-4.0.15-no-default-MAIL.patch 879 RMD160 c380e0a00ef0be8a99927de8bb6cf70f1dfd33ce SHA1 fc30b336b7f22c76ee2276d6b6d8cf361bdfffea SHA256 57aa93bae1cbaffc51250bc415384991992e6ebb6cc5bb1f3c0dc90bb3dd0354
-MD5 3ce54cb32b7564df1386544bf3d1e035 files/shadow-4.0.15-no-default-MAIL.patch 879
-RMD160 c380e0a00ef0be8a99927de8bb6cf70f1dfd33ce files/shadow-4.0.15-no-default-MAIL.patch 879
-SHA256 57aa93bae1cbaffc51250bc415384991992e6ebb6cc5bb1f3c0dc90bb3dd0354 files/shadow-4.0.15-no-default-MAIL.patch 879
-AUX shadow-4.0.15-sanity-checks.patch 1875 RMD160 10cf79e08349848cbfb407dd3e010e86c46938bd SHA1 79dd0697a5acdb9eb484a90581b8e46efa2f73be SHA256 54fbf4ab6c3593b5d66c6ad5e5e9eb1f6eef09f7198c9825ddd838835d6adfec
-MD5 186ba47908dc805ae97cdee9248e873d files/shadow-4.0.15-sanity-checks.patch 1875
-RMD160 10cf79e08349848cbfb407dd3e010e86c46938bd files/shadow-4.0.15-sanity-checks.patch 1875
-SHA256 54fbf4ab6c3593b5d66c6ad5e5e9eb1f6eef09f7198c9825ddd838835d6adfec files/shadow-4.0.15-sanity-checks.patch 1875
AUX shadow-4.0.15-uclibc-missing-l64a.patch 1354 RMD160 6d35c4ddad876edacdd41be056fa8abd567ae802 SHA1 27012d25d41a19dcafab1fb45921bbf7aa12885d SHA256 37ac2cdea64f849e0cf9e92ccefeab05b0466541268fb4844f18a94c377c8514
MD5 f79f1051bedb185f81f24fb9d30dcc35 files/shadow-4.0.15-uclibc-missing-l64a.patch 1354
RMD160 6d35c4ddad876edacdd41be056fa8abd567ae802 files/shadow-4.0.15-uclibc-missing-l64a.patch 1354
SHA256 37ac2cdea64f849e0cf9e92ccefeab05b0466541268fb4844f18a94c377c8514 files/shadow-4.0.15-uclibc-missing-l64a.patch 1354
-AUX shadow-4.0.16-check-opendir.patch 534 RMD160 d90923cb1ee74ac653e818ac5e480866e2f974d9 SHA1 19a02a4c610bb235db4df2c5adb7fdd170f87359 SHA256 5d22bb16183a44e13482b5a72d8ea971b6df227aeb9d95020e48bc89aa004b3d
-MD5 19045e99ca34233f1e790857d6aea4d8 files/shadow-4.0.16-check-opendir.patch 534
-RMD160 d90923cb1ee74ac653e818ac5e480866e2f974d9 files/shadow-4.0.16-check-opendir.patch 534
-SHA256 5d22bb16183a44e13482b5a72d8ea971b6df227aeb9d95020e48bc89aa004b3d files/shadow-4.0.16-check-opendir.patch 534
AUX shadow-4.0.16-fix-useradd-usergroups.patch 3319 RMD160 22c4f916fe1f9da00b0d587b9976491426142f98 SHA1 b08cb5129717c040479f287e0c7851da27b77483 SHA256 b9428435b51341f23be148fa6921408b595dd965a02d1ba731d1ff5b9caba786
MD5 1815781072561fc469f3eb8bded50009 files/shadow-4.0.16-fix-useradd-usergroups.patch 3319
RMD160 22c4f916fe1f9da00b0d587b9976491426142f98 files/shadow-4.0.16-fix-useradd-usergroups.patch 3319
SHA256 b9428435b51341f23be148fa6921408b595dd965a02d1ba731d1ff5b9caba786 files/shadow-4.0.16-fix-useradd-usergroups.patch 3319
-AUX shadow-4.0.16-mail-creation.patch 1636 RMD160 f682c683b795c36be8f2747d99733c34330a59f7 SHA1 e0d2732ddfdf67776b07b9c9e4f8a5edc85aeb85 SHA256 1eb04d054db0f7565fa528a6892ad3cbf52b303103c74fc1265b7e23f606848f
-MD5 c340301909c430b8c7ebf0ca5be827b2 files/shadow-4.0.16-mail-creation.patch 1636
-RMD160 f682c683b795c36be8f2747d99733c34330a59f7 files/shadow-4.0.16-mail-creation.patch 1636
-SHA256 1eb04d054db0f7565fa528a6892ad3cbf52b303103c74fc1265b7e23f606848f files/shadow-4.0.16-mail-creation.patch 1636
AUX shadow-4.0.17-login.defs.patch 367 RMD160 e538f7942dc58b9f5b2f40ba47730aa22b91be20 SHA1 cda5c26df5df855f6fabdad6bb1a3526cb44929e SHA256 cefe0ab1203f436b0c23ce4cde3133fdcc8146d3616542af4bbc69415acf18b0
MD5 8806250f3d4b113d2afbdfbc8b25be09 files/shadow-4.0.17-login.defs.patch 367
RMD160 e538f7942dc58b9f5b2f40ba47730aa22b91be20 files/shadow-4.0.17-login.defs.patch 367
SHA256 cefe0ab1203f436b0c23ce4cde3133fdcc8146d3616542af4bbc69415acf18b0 files/shadow-4.0.17-login.defs.patch 367
-AUX shadow-4.0.17-no-local-getpass.patch 785 RMD160 e70027b07b4300c5a53a78f022f055f0e95891da SHA1 6a41c1677ffbdf81388a7e0d2c6481f2aace19b8 SHA256 694c3d2bdb101f2dde963525c6a46a36b87e3f85e1051753a3676b63b054c04c
-MD5 391c3e007af4fe7929bb36bff5af8e8d files/shadow-4.0.17-no-local-getpass.patch 785
-RMD160 e70027b07b4300c5a53a78f022f055f0e95891da files/shadow-4.0.17-no-local-getpass.patch 785
-SHA256 694c3d2bdb101f2dde963525c6a46a36b87e3f85e1051753a3676b63b054c04c files/shadow-4.0.17-no-local-getpass.patch 785
AUX shadow-4.0.18.1-useradd-usermod.patch 1081 RMD160 65bb85eba9f2e08f4febeea97d522d515f7d9fb7 SHA1 c13cf8b5c566e129d4fc62ad3ac08b6c856c992e SHA256 ca34bc36424585c9f1d64c6b4201ce62c964773c7c6c16faecdd2610ad655cfb
MD5 aa1259020b925cd3088cb7a36fbe7753 files/shadow-4.0.18.1-useradd-usermod.patch 1081
RMD160 65bb85eba9f2e08f4febeea97d522d515f7d9fb7 files/shadow-4.0.18.1-useradd-usermod.patch 1081
SHA256 ca34bc36424585c9f1d64c6b4201ce62c964773c7c6c16faecdd2610ad655cfb files/shadow-4.0.18.1-useradd-usermod.patch 1081
-DIST shadow-4.0.15.tar.bz2 1294860 RMD160 b7b9ee9469561205037a1eacaa8791f069ba124c SHA1 0f7cd3366a032091fdffd2f8edf65056bd576cae SHA256 e486bdb083df453c2d15ac58887ef45a3006182c0cdb1c6092058ea588be538d
-DIST shadow-4.0.16.tar.bz2 1438030 RMD160 9ac436d89913441b448da90ece25b77e818f3bd4 SHA1 c8e739d935cb46d9cbc0654f373c2bff18110a55 SHA256 2cbd0af0b4682d91282d2d0ad3110e6dfcad4e365d25a3b6beaf7048dd477bdd
-DIST shadow-4.0.17.tar.bz2 1496220 RMD160 590fbe5d0363da44370b026282c8226ee64f4603 SHA1 326b3de0a81c1e1f9bfc75e67d45678c14fe282d SHA256 6e85b7a01d311fdb181d909b00c6e42bf08816c13e7f54d6dcc1d7a342ef98cd
DIST shadow-4.0.18.1.tar.bz2 1516296 RMD160 05a1f609370371de3112479cb6a98d966c45fa6c SHA1 1a30458e9db05560bfc82529048bd5d60b45cf9b SHA256 3da368d87a94270c3db4bae6ff634b8db5dcbc8822d554dbfea955a676c1ab12
-EBUILD shadow-4.0.15-r2.ebuild 7810 RMD160 a0887bff99f301395aceae6c8313925669c1cb53 SHA1 ef47851674fd512896b3c2a7a251cf463117dd88 SHA256 12906e145332aa45b5e448d70114b321492a0ecbd710db24a3e4aa61fdab04da
-MD5 b3719db0344a55700774adb967703b32 shadow-4.0.15-r2.ebuild 7810
-RMD160 a0887bff99f301395aceae6c8313925669c1cb53 shadow-4.0.15-r2.ebuild 7810
-SHA256 12906e145332aa45b5e448d70114b321492a0ecbd710db24a3e4aa61fdab04da shadow-4.0.15-r2.ebuild 7810
-EBUILD shadow-4.0.16-r2.ebuild 8095 RMD160 618f4dba19abccf5aab4ee021ebc70eab424f002 SHA1 82a073100a758c82329294c6ca356a2cbc24a8ef SHA256 b583c0548b37943b9d5ee81c45ae85cb6b6f4bcea25507e3a1fd41a4034c8161
-MD5 cd659f819e7a27cd1b54c26dc0f0657c shadow-4.0.16-r2.ebuild 8095
-RMD160 618f4dba19abccf5aab4ee021ebc70eab424f002 shadow-4.0.16-r2.ebuild 8095
-SHA256 b583c0548b37943b9d5ee81c45ae85cb6b6f4bcea25507e3a1fd41a4034c8161 shadow-4.0.16-r2.ebuild 8095
-EBUILD shadow-4.0.17-r1.ebuild 5960 RMD160 7a137e375759bd33cfe1873da52345c6b9c9aa4b SHA1 fc2b9524485e564b2f78977c1e041e05b4a748ec SHA256 20eabbb11b50da2ce78787e25dd4dce7fefe664f84ffdabd26a7ec4c0b9a48d7
-MD5 a018911f12ddb6ca96dac2e0a77f9e16 shadow-4.0.17-r1.ebuild 5960
-RMD160 7a137e375759bd33cfe1873da52345c6b9c9aa4b shadow-4.0.17-r1.ebuild 5960
-SHA256 20eabbb11b50da2ce78787e25dd4dce7fefe664f84ffdabd26a7ec4c0b9a48d7 shadow-4.0.17-r1.ebuild 5960
-EBUILD shadow-4.0.17.ebuild 8025 RMD160 d0908cf457eb72e9a3fab619a129ac40c6399a45 SHA1 b0754adbea40cddd3e7ab03dce3c765291abfac2 SHA256 080a7286885b0882111214ee5e3861ceb68606d14e4f1d1acd7357d8a2003208
-MD5 acb5405f30ea521e1662c576f524bb22 shadow-4.0.17.ebuild 8025
-RMD160 d0908cf457eb72e9a3fab619a129ac40c6399a45 shadow-4.0.17.ebuild 8025
-SHA256 080a7286885b0882111214ee5e3861ceb68606d14e4f1d1acd7357d8a2003208 shadow-4.0.17.ebuild 8025
EBUILD shadow-4.0.18.1.ebuild 5887 RMD160 fbbb0d787b65520b9b37b75850ce657b063bd508 SHA1 2665696703dac4d8de9e801a1cc56e0714f7ea85 SHA256 d744fbd725b976fa883d8d7e6ea0e5716586ee747ac91848fc6769cc1c8f9dd9
MD5 2068a9d8485fd835e1a70fc753b351ed shadow-4.0.18.1.ebuild 5887
RMD160 fbbb0d787b65520b9b37b75850ce657b063bd508 shadow-4.0.18.1.ebuild 5887
MD5 9a09f8d531c582e78977dbfd96edc1f2 metadata.xml 164
RMD160 f43cbec30b7074319087c9acffdb9354b17b0db3 metadata.xml 164
SHA256 f5f2891f2a4791cd31350bb2bb572131ad7235cd0eeb124c9912c187ac10ce92 metadata.xml 164
-MD5 1f78dde9910133ab48d69abc6bd19a88 files/digest-shadow-4.0.15-r2 247
-RMD160 87f79656daa81999e698a293ad570f2ffac99768 files/digest-shadow-4.0.15-r2 247
-SHA256 10c8764de8a7feb230419e232290d7f8c35a28ad69e7174b509fcd358aeed237 files/digest-shadow-4.0.15-r2 247
-MD5 dc4586eb93a7af1f6ffa24a8a0385574 files/digest-shadow-4.0.16-r2 247
-RMD160 2fa0ba2c0ca819c44877181ee35df012d16caa0e files/digest-shadow-4.0.16-r2 247
-SHA256 f4adf1db93b22fcaf350fa669ba59de6c502ca80104d3fdcf18bf8ff3d7845e9 files/digest-shadow-4.0.16-r2 247
-MD5 0d5e88a5cf5d51d74de79faa25e883cf files/digest-shadow-4.0.17 247
-RMD160 1a0703c1b522ea5eb648ee638e3872b566faa2e1 files/digest-shadow-4.0.17 247
-SHA256 83147ff4ad684b84d8dfb31024d51f598d7796ace7110722d4b90a91d765b046 files/digest-shadow-4.0.17 247
-MD5 0d5e88a5cf5d51d74de79faa25e883cf files/digest-shadow-4.0.17-r1 247
-RMD160 1a0703c1b522ea5eb648ee638e3872b566faa2e1 files/digest-shadow-4.0.17-r1 247
-SHA256 83147ff4ad684b84d8dfb31024d51f598d7796ace7110722d4b90a91d765b046 files/digest-shadow-4.0.17-r1 247
MD5 6be0a013e7aee78ebb6228308ca16fee files/digest-shadow-4.0.18.1 253
RMD160 31ec617739d2935bd1b4dfc1d676399d5c5f50bc files/digest-shadow-4.0.18.1 253
SHA256 6683d8ca173c809dedf056bf6e658284264bb277cab8c43e03b811ed4308d109 files/digest-shadow-4.0.18.1 253
-----BEGIN PGP SIGNATURE-----
-Version: GnuPG v2.0.1 (GNU/Linux)
+Version: GnuPG v2.0.2 (GNU/Linux)
-iD8DBQFFpPT28bi6rjpTunYRAgfBAJ9xbibJrOFaSK+9vMf2IQTZKJbCMwCgx4FI
-YxObC79jQgUxLGUwmX94hUo=
-=GgHy
+iD8DBQFF2Fe78bi6rjpTunYRAhEDAKCLTLpo/qFyhj637LSw/Taoi9OfeQCgyYbc
+ipiyFbvUy/gxgfFhEN+dRX4=
+=b7TS
-----END PGP SIGNATURE-----
+++ /dev/null
-MD5 a0452fa989f8ba45023cc5a08136568e shadow-4.0.15.tar.bz2 1294860
-RMD160 b7b9ee9469561205037a1eacaa8791f069ba124c shadow-4.0.15.tar.bz2 1294860
-SHA256 e486bdb083df453c2d15ac58887ef45a3006182c0cdb1c6092058ea588be538d shadow-4.0.15.tar.bz2 1294860
+++ /dev/null
-MD5 1d91f7479143d1d705b94180c0d4874b shadow-4.0.16.tar.bz2 1438030
-RMD160 9ac436d89913441b448da90ece25b77e818f3bd4 shadow-4.0.16.tar.bz2 1438030
-SHA256 2cbd0af0b4682d91282d2d0ad3110e6dfcad4e365d25a3b6beaf7048dd477bdd shadow-4.0.16.tar.bz2 1438030
+++ /dev/null
-MD5 bc5972a195290533b4c0576276056ed9 shadow-4.0.17.tar.bz2 1496220
-RMD160 590fbe5d0363da44370b026282c8226ee64f4603 shadow-4.0.17.tar.bz2 1496220
-SHA256 6e85b7a01d311fdb181d909b00c6e42bf08816c13e7f54d6dcc1d7a342ef98cd shadow-4.0.17.tar.bz2 1496220
+++ /dev/null
-MD5 bc5972a195290533b4c0576276056ed9 shadow-4.0.17.tar.bz2 1496220
-RMD160 590fbe5d0363da44370b026282c8226ee64f4603 shadow-4.0.17.tar.bz2 1496220
-SHA256 6e85b7a01d311fdb181d909b00c6e42bf08816c13e7f54d6dcc1d7a342ef98cd shadow-4.0.17.tar.bz2 1496220
+++ /dev/null
-#%PAM-1.0
-
-auth required pam_securetty.so
-auth required pam_stack.so service=system-auth
-auth required pam_nologin.so
-
-account required pam_stack.so service=system-auth
-
-password required pam_stack.so service=system-auth
-
-session required pam_stack.so service=system-auth
-session optional pam_console.so
+++ /dev/null
-#%PAM-1.0
-
-auth required pam_deny.so
-
-account required pam_deny.so
-
-password required pam_deny.so
-
-session required pam_deny.so
+++ /dev/null
-#%PAM-1.0
-
-auth required pam_stack.so service=system-auth
-
-account required pam_stack.so service=system-auth
-
-password required pam_stack.so service=system-auth
+++ /dev/null
-#%PAM-1.0
-
-auth sufficient pam_rootok.so
-auth required pam_permit.so
-
-account required pam_stack.so service=system-auth
-
-password required pam_permit.so
+++ /dev/null
-#%PAM-1.0
-
-auth sufficient pam_rootok.so
-
-# If you want to restrict users begin allowed to su even more,
-# create /etc/security/suauth.allow (or to that matter) that is only
-# writable by root, and add users that are allowed to su to that
-# file, one per line.
-#auth required pam_listfile.so item=ruser sense=allow onerr=fail file=/etc/security/suauth.allow
-
-# Uncomment this to allow users in the wheel group to su without
-# entering a passwd.
-#auth sufficient pam_wheel.so use_uid trust
-
-# Alternatively to above, you can implement a list of users that do
-# not need to supply a passwd with a list.
-#auth sufficient pam_listfile.so item=ruser sense=allow onerr=fail file=/etc/security/suauth.nopass
-
-# Comment this to allow any user, even those not in the 'wheel'
-# group to su
-auth required pam_wheel.so use_uid
-
-auth required pam_stack.so service=system-auth
-
-account required pam_stack.so service=system-auth
-
-password required pam_stack.so service=system-auth
-
-session required pam_stack.so service=system-auth
-session required pam_env.so
-session optional pam_xauth.so
-
+++ /dev/null
-#%PAM-1.0
-
-auth required pam_env.so
-auth sufficient pam_unix.so likeauth nullok nodelay
-auth required pam_deny.so
-
-account required pam_unix.so
-
-password required pam_cracklib.so retry=3
-password sufficient pam_unix.so nullok md5 shadow use_authtok
-password required pam_deny.so
-
-session required pam_limits.so
-session required pam_unix.so
+++ /dev/null
-#%PAM-1.0
-
-auth required pam_env.so
-auth sufficient pam_unix.so likeauth nullok
-auth required pam_deny.so
-
-account required pam_unix.so
-
-password required pam_cracklib.so retry=3
-password sufficient pam_unix.so nullok md5 shadow use_authtok
-password required pam_deny.so
-
-session required pam_limits.so
-session required pam_unix.so
+++ /dev/null
-Index: etc/login.defs
-===================================================================
-RCS file: /cvsroot/shadow/etc/login.defs,v
-retrieving revision 1.8
-diff -u -p -U0 -r1.8 login.defs
---- etc/login.defs 1 Sep 2005 19:57:45 -0000 1.8
-+++ etc/login.defs 10 Oct 2005 22:17:39 -0000
-@@ -38 +38 @@
--MAIL_CHECK_ENAB yes
-+MAIL_CHECK_ENAB no
-@@ -205 +205 @@
--SU_WHEEL_ONLY no
-+SU_WHEEL_ONLY yes
-@@ -210 +210 @@
--CRACKLIB_DICTPATH /var/cache/cracklib/cracklib_dict
-+CRACKLIB_DICTPATH /usr/lib/cracklib_dict
-@@ -227 +227 @@
--LOGIN_RETRIES 5
-+LOGIN_RETRIES 3
-@@ -279 +279 @@
--#MD5_CRYPT_ENAB no
-+MD5_CRYPT_ENAB yes
-@@ -330 +330 @@
--#GETPASS_ASTERISKS 1
-+GETPASS_ASTERISKS 0
+++ /dev/null
-The patch from upstream (shadow-4.0.11.1-SUPATH.patch) sets environ too
-early when using PAM, so move it to !USE_PAM. Also set USER and SHELL.
-
---- shadow-4.0.11.1/src/su.c 2005-08-04 12:34:35.000000000 +0200
-+++ shadow-4.0.11.1.az/src/su.c 2005-08-04 12:38:57.000000000 +0200
-@@ -594,11 +594,6 @@
- addenv ("PATH", cp);
- }
-
--#ifndef USE_PAM
-- /* setup the environment for PAM later on, else we run into auth problems */
-- environ = newenvp; /* make new environment active */
--#endif
--
- if (getenv ("IFS")) /* don't export user IFS ... */
- addenv ("IFS= \t\n", NULL); /* ... instead, set a safe IFS */
-
-@@ -666,6 +664,8 @@
- exit (1);
- }
- #else /* !USE_PAM */
-+ environ = newenvp; /* make new environment active */
-+
- if (!amroot) /* no limits if su from root */
- setup_limits (&pwent);
-
-@@ -676,8 +676,11 @@
- if (fakelogin)
- setup_env (&pwent);
- #if 1 /* Suggested by Joey Hess. XXX - is this right? */
-- else
-+ else {
- addenv ("HOME", pwent.pw_dir);
-+ addenv ("USER", pwent.pw_name);
-+ addenv ("SHELL", pwent.pw_shell);
-+ }
- #endif
-
- /*
+++ /dev/null
-The patch from upstream (shadow-4.0.11.1-SUPATH.patch) sets environ too
-early when using PAM, so move it to !USE_PAM.
-
---- shadow-4.0.14/src/su.c
-+++ shadow-4.0.14/src/su.c
-@@ -594,11 +594,6 @@
- addenv ("PATH", cp);
- }
-
--#ifndef USE_PAM
-- /* setup the environment for PAM later on, else we run into auth problems */
-- environ = newenvp; /* make new environment active */
--#endif
--
- if (getenv ("IFS")) /* don't export user IFS ... */
- addenv ("IFS= \t\n", NULL); /* ... instead, set a safe IFS */
-
-@@ -666,6 +664,8 @@
- exit (1);
- }
- #else /* !USE_PAM */
-+ environ = newenvp; /* make new environment active */
-+
- if (!amroot) /* no limits if su from root */
- setup_limits (&pwent);
-
+++ /dev/null
-if MAIL_CHECK_ENAB is disabled, then don't export the MAIL envvar
-
---- libmisc/setupenv.c
-+++ libmisc/setupenv.c
-@@ -265,16 +265,18 @@
- * knows the prefix.
- */
-
-- if ((cp = getdef_str ("MAIL_DIR")))
-- addenv_path ("MAIL", cp, info->pw_name);
-- else if ((cp = getdef_str ("MAIL_FILE")))
-- addenv_path ("MAIL", info->pw_dir, cp);
-- else {
-+ if (getdef_bool ("MAIL_CHECK_ENAB")) {
-+ if ((cp = getdef_str ("MAIL_DIR")))
-+ addenv_path ("MAIL", cp, info->pw_name);
-+ else if ((cp = getdef_str ("MAIL_FILE")))
-+ addenv_path ("MAIL", info->pw_dir, cp);
-+ else {
- #if defined(MAIL_SPOOL_FILE)
-- addenv_path ("MAIL", info->pw_dir, MAIL_SPOOL_FILE);
-+ addenv_path ("MAIL", info->pw_dir, MAIL_SPOOL_FILE);
- #elif defined(MAIL_SPOOL_DIR)
-- addenv_path ("MAIL", MAIL_SPOOL_DIR, info->pw_name);
-+ addenv_path ("MAIL", MAIL_SPOOL_DIR, info->pw_name);
- #endif
-+ }
- }
-
- /*
+++ /dev/null
-===================================================================
-RCS file: /cvsroot/shadow/src/useradd.c,v
-retrieving revision 1.93
-retrieving revision 1.94
-diff -u -r1.93 -r1.94
---- shadow/src/useradd.c 2006/05/07 17:44:39 1.93
-+++ shadow/src/useradd.c 2006/05/19 13:36:25 1.94
-@@ -1585,46 +1585,38 @@
- */
- static void create_mail (void)
- {
-- char *ms;
-+ char *spool, *file;
- int fd;
-- struct group *mail;
-- gid_t mail_gid;
-+ struct group *gr;
-+ gid_t gid;
- mode_t mode;
-
-+ spool = getdef_str ("MAIL_DIR") ? : "/var/mail";
-+ file = alloca (strlen (spool) + strlen (user_name) + 2);
-+ sprintf (file, "%s/%s", spool, user_name);
-+ fd = open (file, O_CREAT | O_WRONLY | O_TRUNC | O_EXCL, 0);
-+ if (fd < 0) {
-+ perror (_("Creating mailbox"));
-+ return;
-+ }
-+
- if (strcasecmp (create_mail_spool, "yes") == 0) {
-- mail = getgrnam ("mail");
-- if (mail == NULL) {
-+ gr = getgrnam ("mail");
-+ if (!gr) {
- fprintf (stderr,
- _
-- ("No group named \"mail\" exists, creating mail spool with mode 0600.\n"));
-+ ("Group 'mail' not found. Creating the mailbox with 0600 mode.\n"));
-+ gid = user_gid;
- mode = 0600;
-- mail_gid = user_gid;
- } else {
-+ gid = gr->gr_gid;
- mode = 0660;
-- mail_gid = mail->gr_gid;
- }
-
-- ms = malloc (strlen (user_name) + 11);
-- if (ms != NULL) {
-- sprintf (ms, "/var/mail/%s", user_name);
-- if (access (ms, R_OK) != 0) {
-- fd = open (ms,
-- O_CREAT | O_EXCL |
-- O_WRONLY | O_TRUNC, 0);
-- if (fd != -1) {
-- fchown (fd, user_id, mail_gid);
-- fchmod (fd, mode);
-- close (fd);
-- }
-- } else {
-- fprintf (stderr,
-- _
-- ("Can't create mail spool for user %s.\n"),
-- user_name);
-- fail_exit (E_MAIL_SPOOL);
-- }
-- }
-- free (ms);
-+ if (fchown (fd, user_id, gid) || fchmod (fd, mode))
-+ perror (_("Setting mailbox permissions"));
-+
-+ close (fd);
- }
- }
-
+++ /dev/null
-http://bugs.gentoo.org/139148
-
-e-mailed upstream
-
-Index: libmisc/copydir.c
-===================================================================
-RCS file: /cvsroot/shadow/libmisc/copydir.c,v
-retrieving revision 1.14
-diff -u -p -r1.14 copydir.c
---- libmisc/copydir.c 7 May 2006 18:10:10 -0000 1.14
-+++ libmisc/copydir.c 4 Jul 2006 19:42:22 -0000
-@@ -396,7 +396,8 @@ int remove_tree (const char *root)
- * is made set-ID.
- */
-
-- dir = opendir (root);
-+ if (!(dir = opendir (root)))
-+ return -1;
-
- while ((ent = readdir (dir))) {
-
+++ /dev/null
-rip out fixes from upstream for mail creation bug
-
-http://bugs.gentoo.org/139346
-
-Index: useradd.c
-===================================================================
-RCS file: /cvsroot/shadow/src/useradd.c,v
-retrieving revision 1.96
-retrieving revision 1.99
-diff -u -p -r1.96 -r1.99
---- shadow/src/useradd.c 30 May 2006 18:28:45 -0000 1.96
-+++ shadow/src/useradd.c 22 Jun 2006 11:30:32 -0000 1.99
-@@ -1246,6 +1247,11 @@ static void process_flags (int argc, cha
-
- if (!sflg)
- user_shell = def_shell;
-+
-+ /* TODO: add handle change default spool mail creation by
-+ -K CREATE_MAIL_SPOOL={yes,no}. It need rewrite internal API for handle
-+ shadow tools configuration */
-+ create_mail_spool = def_create_mail_spool;
- }
-
- /*
-@@ -1599,24 +1605,24 @@ static void create_mail (void)
- if (fd < 0) {
- perror (_("Creating mailbox file"));
- return;
-+ }
-
-- gr = getgrnam ("mail");
-- if (!gr) {
-- fprintf (stderr,
-- _
-- ("Group 'mail' not found. Creating the user mailbox file with 0600 mode.\n"));
-- gid = user_gid;
-- mode = 0600;
-- } else {
-- gid = gr->gr_gid;
-- mode = 0660;
-- }
-+ gr = getgrnam ("mail");
-+ if (!gr) {
-+ fprintf (stderr,
-+ _
-+ ("Group 'mail' not found. Creating the user mailbox file with 0600 mode.\n"));
-+ gid = user_gid;
-+ mode = 0600;
-+ } else {
-+ gid = gr->gr_gid;
-+ mode = 0660;
-+ }
-
-- if (fchown (fd, user_id, gid) || fchmod (fd, mode))
-- perror (_("Setting mailbox file permissions"));
-+ if (fchown (fd, user_id, gid) || fchmod (fd, mode))
-+ perror (_("Setting mailbox file permissions"));
-
-- close (fd);
-- }
-+ close (fd);
- }
- }
-
+++ /dev/null
-libshadow_getpass() was punted in 4.0.17
-
-http://bugs.gentoo.org/139966
-
-Patch by Ulrich Mueller
-
-Index: configure.in
-===================================================================
-RCS file: /cvsroot/shadow/configure.in,v
-retrieving revision 1.145
-diff -u -p -r1.145 configure.in
---- configure.in 25 Jun 2006 12:30:47 -0000 1.145
-+++ configure.in 15 Jul 2006 04:51:29 -0000
-@@ -329,9 +329,6 @@ if test "$with_skey" = "yes"; then
- ],[
- skeychallenge((void*)0, (void*)0, (void*)0, 0);
- ],[AC_DEFINE(SKEY_BSD_STYLE, 1, [Define to support newer BSD S/Key API])])
-- dnl libshadow_getpass() handles password prompt with enabled echo
-- AC_DEFINE(getpass, libshadow_getpass,
-- [Define to libshadow_getpass to use our own version of getpass().])
- fi
-
- AM_GNU_GETTEXT_VERSION(0.12.1)
+++ /dev/null
-# Copyright 1999-2006 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-apps/shadow/shadow-4.0.15-r2.ebuild,v 1.12 2006/10/17 14:21:36 dsd Exp $
-
-inherit eutils libtool toolchain-funcs flag-o-matic autotools pam
-
-# We should remove this login after pam-0.78 goes stable.
-FORCE_SYSTEMAUTH_UPDATE="no"
-
-DESCRIPTION="Utilities to deal with user accounts"
-HOMEPAGE="http://shadow.pld.org.pl/"
-SRC_URI="ftp://ftp.pld.org.pl/software/${PN}/${P}.tar.bz2"
-
-LICENSE="BSD"
-SLOT="0"
-KEYWORDS="alpha amd64 arm hppa ia64 m68k mips ppc ppc64 s390 sh sparc x86"
-IUSE="nls pam selinux skey nousuid cracklib"
-
-RDEPEND="cracklib? ( >=sys-libs/cracklib-2.7-r3 )
- pam? ( virtual/pam )
- !sys-apps/pam-login
- skey? ( app-admin/skey )
- selinux? ( >=sys-libs/libselinux-1.28 )
- nls? ( virtual/libintl )"
-DEPEND="${RDEPEND}
- >=sys-apps/portage-2.0.51-r2
- nls? ( sys-devel/gettext )"
-
-src_unpack() {
- unpack ${A}
- cd "${S}"
-
- # uclibc support, corrects NIS usage
- epatch "${FILESDIR}"/${PN}-4.0.13-nonis.patch
-
- # If su should not simulate a login shell, use '/bin/sh' as shell to enable
- # running of commands as user with /bin/false as shell, closing bug #15015.
- # *** This one could be a security hole; disable for now ***
- #epatch "${FILESDIR}"/${P}-nologin-run-sh.patch
-
- # tweak the default login.defs
- epatch "${FILESDIR}"/${PN}-4.0.13-login.defs.patch
-
- # Make user/group names more flexible #3485 / #22920
- epatch "${FILESDIR}"/${PN}-4.0.13-dots-in-usernames.patch
- epatch "${FILESDIR}"/${PN}-4.0.13-long-groupnames.patch
-
- # Fix compiling with gcc-2.95.x
- epatch "${FILESDIR}"/${PN}-4.0.12-gcc2.patch
-
- # Patch from upstream enables the new environment too early for PAM
- epatch "${FILESDIR}"/${PN}-4.0.14-su-fix-environment.patch
-
- # lock down setuid perms #47208
- epatch "${FILESDIR}"/${PN}-4.0.11.1-perms.patch
-
- epatch "${FILESDIR}"/${PN}-4.0.15-uclibc-missing-l64a.patch
- epatch "${FILESDIR}"/${PN}-4.0.15-no-default-MAIL.patch
- epatch "${FILESDIR}"/${PN}-4.0.15-sanity-checks.patch #133615
-
- # Needed by the UCLIBC patches
- eautoconf || die
-
- elibtoolize
- epunt_cxx
-}
-
-src_compile() {
- append-ldflags $(bindnow-flags)
- tc-is-cross-compiler && export ac_cv_func_setpgrp_void=yes
- econf \
- --disable-desrpc \
- --with-libcrypt \
- --enable-shared=no \
- --enable-static=yes \
- $(use_with cracklib libcrack) \
- $(use_with pam libpam) \
- $(use_with skey) \
- $(use_with selinux) \
- $(use_enable nls) \
- || die "bad configure"
- emake || die "compile problem"
-}
-
-src_install() {
- local perms=4711
- use nousuid && perms=711
- make DESTDIR=${D} suiduperms=${perms} install || die "install problem"
- dosym useradd /usr/sbin/adduser
-
- # Remove libshadow and libmisc; see bug 37725 and the following
- # comment from shadow's README.linux:
- # Currently, libshadow.a is for internal use only, so if you see
- # -lshadow in a Makefile of some other package, it is safe to
- # remove it.
- rm -f "${D}"/{,usr/}$(get_libdir)/lib{misc,shadow}.{a,la}
-
- insinto /etc
- # Using a securetty with devfs device names added
- # (compat names kept for non-devfs compatibility)
- insopts -m0600 ; doins "${FILESDIR}"/securetty
- if ! use pam; then
- insopts -m0600
- doins etc/login.access etc/limits
- else
- newpamd "${FILESDIR}/login.pamd" login
- use selinux || sed -i -e '/@selinux@/d' ${D}/etc/pam.d/login
- use selinux && sed -i -e 's:@selinux@::g' ${D}/etc/pam.d/login
-
- insinto /etc
- insopts -m0644
- newins "${FILESDIR}/login.defs" login.defs
-
- # Also install another one that we can use to check if
- # we need to update it if FORCE_LOGIN_DEFS = "yes"
- [ "${FORCE_LOGIN_DEFS}" = "yes" ] \
- && newins "${FILESDIR}/login.defs" login.defs.new
- fi
- # Output arch-specific cruft
- case $(tc-arch) in
- ppc*) echo "hvc0" >> "${D}"/etc/securetty
- echo "hvsi0" >> "${D}"/etc/securetty;;
- hppa) echo "ttyB0" >> "${D}"/etc/securetty;;
- arm) echo "ttyFB0" >> "${D}"/etc/securetty;;
- esac
-
- # needed for 'adduser -D'
- insinto /etc/default
- insopts -m0600
- doins "${FILESDIR}"/default/useradd
-
- # move passwd to / to help recover broke systems #64441
- mv "${D}"/usr/bin/passwd "${D}"/bin/
- dosym /bin/passwd /usr/bin/passwd
-
- if use pam ; then
- local INSTALL_SYSTEM_PAMD="yes"
-
- # Do not install below pam.d files if we have pam-0.78 or later
- has_version '>=sys-libs/pam-0.78' && \
- INSTALL_SYSTEM_PAMD="no"
-
- for x in "${FILESDIR}"/pam.d-include/*; do
- case "${x##*/}" in
- "login")
- # We do no longer install this one, as its from
- # pam-login now.
- ;;
- "system-auth"|"system-auth-1.1"|"other")
- # These we only install if we do not have pam-0.78
- # or later.
- [ "${INSTALL_SYSTEM_PAMD}" = "yes" ] && [ -f ${x} ] && \
- dopamd ${x}
- ;;
- "su")
- # Disable support for pam_env and pam_wheel on openpam
- has_version sys-libs/pam && dopamd ${x}
- ;;
- "su-openpam")
- has_version sys-libs/openpam && newpamd ${x} su
- ;;
- *)
- [ -f ${x} ] && dopamd ${x}
- ;;
- esac
- done
- for x in chage chsh chfn chpasswd newusers \
- user{add,del,mod} group{add,del,mod} ; do
- newpamd "${FILESDIR}"/pam.d-include/shadow ${x}
- done
-
- # Only add this one if needed.
- if [ "${FORCE_SYSTEMAUTH_UPDATE}" = "yes" ]; then
- newpamd "${FILESDIR}"/pam.d-include/system-auth-1.1 system-auth.new || \
- die "Failed to install system-auth.new!"
- fi
-
- # remove manpages that pam will install for us
- # and/or don't apply when using pam
-
- find "${D}"/usr/share/man \
- '(' -name 'limits.5*' -o -name 'suauth.5*' ')' \
- -exec rm {} \;
- else
- insinto /etc
- insopts -m0644
- newins etc/login.defs login.defs
- fi
-
- # Remove manpages that are handled by other packages
- find "${D}"/usr/share/man \
- '(' -name id.1 -o -name passwd.5 -o -name getspnam.3 ')' \
- -exec rm {} \;
-
- cd "${S}"
- dodoc ChangeLog NEWS TODO
- newdoc README README.download
- cd doc
- dodoc HOWTO LSM README* WISHLIST *.txt
-}
-
-pkg_preinst() {
- rm -f "${ROOT}"/etc/pam.d/system-auth.new \
- "${ROOT}/etc/login.defs.new"
-}
-
-pkg_postinst() {
- # Enable shadow groups (we need ROOT=/ here, as grpconv only
- # operate on / ...).
- if [[ ${ROOT} == / && ! -f /etc/gshadow ]] ; then
- if grpck -r &>/dev/null; then
- grpconv
- else
- ewarn "Running 'grpck' returned errors. Please run it by hand, and then"
- ewarn "run 'grpconv' afterwards!"
- fi
- fi
-
- use pam || return 0
-
- if [ "${FORCE_SYSTEMAUTH_UPDATE}" = "yes" ]; then
- local CHECK1=$(md5sum "${ROOT}"/etc/pam.d/system-auth | cut -d ' ' -f 1)
- local CHECK2=$(md5sum "${ROOT}"/etc/pam.d/system-auth.new | cut -d ' ' -f 1)
-
- if [ "${CHECK1}" != "${CHECK2}" ]; then
- ewarn "Due to a security issue, ${ROOT}etc/pam.d/system-auth "
- ewarn "is being updated automatically. Your old "
- ewarn "system-auth will be backed up as:"
- ewarn
- ewarn " ${ROOT}etc/pam.d/system-auth.bak"
- echo
-
- cp -pPR "${ROOT}"/etc/pam.d/system-auth \
- "${ROOT}"/etc/pam.d/system-auth.bak;
- mv -f "${ROOT}"/etc/pam.d/system-auth.new \
- "${ROOT}"/etc/pam.d/system-auth
- rm -f "${ROOT}"/etc/pam.d/._cfg????_system-auth
- else
- rm -f "${ROOT}"/etc/pam.d/system-auth.new
- fi
- fi
-
- [ "${FORCE_LOGIN_DEFS}" != "yes" ] && return 0
-
- ewarn "Due to a compatibility issue, ${ROOT}etc/login.defs "
- ewarn "is being updated automatically. Your old login.defs"
- ewarn "will be backed up as: ${ROOT}etc/login.defs.bak"
- echo
-
- local CHECK1="`md5sum ${ROOT}/etc/login.defs | cut -d ' ' -f 1`"
- local CHECK2="`md5sum ${ROOT}/etc/login.defs.new | cut -d ' ' -f 1`"
-
- if [ "${CHECK1}" != "${CHECK2}" ]
- then
- cp -pPR ${ROOT}/etc/login.defs ${ROOT}/etc/login.defs.bak
- mv -f ${ROOT}/etc/login.defs.new ${ROOT}/etc/login.defs
- elif [ ! -f ${ROOT}/etc/login.defs ]
- then
- mv -f ${ROOT}/etc/login.defs.new ${ROOT}/etc/login.defs
- else
- rm -f ${ROOT}/etc/login.defs.new
- fi
-}
-
+++ /dev/null
-# Copyright 1999-2006 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-apps/shadow/shadow-4.0.16-r2.ebuild,v 1.2 2006/10/17 14:21:36 dsd Exp $
-
-inherit eutils libtool toolchain-funcs flag-o-matic autotools pam
-
-# We should remove this login after pam-0.78 goes stable.
-FORCE_SYSTEMAUTH_UPDATE="no"
-
-DESCRIPTION="Utilities to deal with user accounts"
-HOMEPAGE="http://shadow.pld.org.pl/"
-SRC_URI="ftp://ftp.pld.org.pl/software/${PN}/${P}.tar.bz2"
-
-LICENSE="BSD"
-SLOT="0"
-KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86"
-IUSE="nls pam selinux skey nousuid cracklib"
-
-RDEPEND="cracklib? ( >=sys-libs/cracklib-2.7-r3 )
- pam? ( virtual/pam )
- !sys-apps/pam-login
- skey? ( app-admin/skey )
- selinux? ( >=sys-libs/libselinux-1.28 )
- nls? ( virtual/libintl )"
-DEPEND="${RDEPEND}
- >=sys-apps/portage-2.0.51-r2
- nls? ( sys-devel/gettext )"
-
-src_unpack() {
- unpack ${A}
- cd "${S}"
-
- # uclibc support, corrects NIS usage
- epatch "${FILESDIR}"/${PN}-4.0.13-nonis.patch
-
- # If su should not simulate a login shell, use '/bin/sh' as shell to enable
- # running of commands as user with /bin/false as shell, closing bug #15015.
- # *** This one could be a security hole; disable for now ***
- #epatch "${FILESDIR}"/${P}-nologin-run-sh.patch
-
- # tweak the default login.defs
- epatch "${FILESDIR}"/${PN}-4.0.13-login.defs.patch
-
- # Make user/group names more flexible #3485 / #22920
- epatch "${FILESDIR}"/${PN}-4.0.13-dots-in-usernames.patch
- epatch "${FILESDIR}"/${PN}-4.0.13-long-groupnames.patch
-
- # Fix compiling with gcc-2.95.x
- epatch "${FILESDIR}"/${PN}-4.0.12-gcc2.patch
-
- # Patch from upstream enables the new environment too early for PAM
- epatch "${FILESDIR}"/${PN}-4.0.14-su-fix-environment.patch
-
- # lock down setuid perms #47208
- epatch "${FILESDIR}"/${PN}-4.0.11.1-perms.patch
-
- epatch "${FILESDIR}"/${PN}-4.0.15-uclibc-missing-l64a.patch
-
- epatch "${FILESDIR}"/${PN}-4.0.16-check-opendir.patch #139148
- epatch "${FILESDIR}"/${PN}-4.0.16-fix-useradd-usergroups.patch #128715
- epatch "${FILESDIR}"/${PN}-4.0.16-mail-creation.patch #139346
-
- # Needed by the UCLIBC patches
- eautoconf || die
-
- elibtoolize
- epunt_cxx
-}
-
-src_compile() {
- append-ldflags $(bindnow-flags)
- tc-is-cross-compiler && export ac_cv_func_setpgrp_void=yes
- econf \
- --disable-desrpc \
- --with-libcrypt \
- --enable-shared=no \
- --enable-static=yes \
- $(use_with cracklib libcrack) \
- $(use_with pam libpam) \
- $(use_with skey) \
- $(use_with selinux) \
- $(use_enable nls) \
- || die "bad configure"
- emake || die "compile problem"
-}
-
-src_install() {
- local perms=4711
- use nousuid && perms=711
- make DESTDIR="${D}" suiduperms=${perms} install || die "install problem"
- dosym useradd /usr/sbin/adduser
-
- # Remove libshadow and libmisc; see bug 37725 and the following
- # comment from shadow's README.linux:
- # Currently, libshadow.a is for internal use only, so if you see
- # -lshadow in a Makefile of some other package, it is safe to
- # remove it.
- rm -f "${D}"/{,usr/}$(get_libdir)/lib{misc,shadow}.{a,la}
-
- insinto /etc
- # Using a securetty with devfs device names added
- # (compat names kept for non-devfs compatibility)
- insopts -m0600 ; doins "${FILESDIR}"/securetty
- if ! use pam ; then
- insopts -m0600
- doins etc/login.access etc/limits
- else
- newpamd "${FILESDIR}/login.pamd" login
- use selinux || sed -i -e '/@selinux@/d' "${D}"/etc/pam.d/login
- use selinux && sed -i -e 's:@selinux@::g' "${D}"/etc/pam.d/login
-
- insinto /etc
- insopts -m0644
- newins "${FILESDIR}/login.defs" login.defs
-
- # Also install another one that we can use to check if
- # we need to update it if FORCE_LOGIN_DEFS = "yes"
- [ "${FORCE_LOGIN_DEFS}" = "yes" ] \
- && newins "${FILESDIR}/login.defs" login.defs.new
- fi
- # Output arch-specific cruft
- case $(tc-arch) in
- ppc*) echo "hvc0" >> "${D}"/etc/securetty
- echo "hvsi0" >> "${D}"/etc/securetty;;
- hppa) echo "ttyB0" >> "${D}"/etc/securetty;;
- arm) echo "ttyFB0" >> "${D}"/etc/securetty;;
- esac
-
- # needed for 'adduser -D'
- insinto /etc/default
- insopts -m0600
- doins "${FILESDIR}"/default/useradd
-
- # move passwd to / to help recover broke systems #64441
- mv "${D}"/usr/bin/passwd "${D}"/bin/
- dosym /bin/passwd /usr/bin/passwd
-
- if use pam ; then
- local INSTALL_SYSTEM_PAMD="yes"
-
- # Do not install below pam.d files if we have pam-0.78 or later
- has_version '>=sys-libs/pam-0.78' && \
- INSTALL_SYSTEM_PAMD="no"
-
- for x in "${FILESDIR}"/pam.d-include/*; do
- case "${x##*/}" in
- "login")
- # We do no longer install this one, as its from
- # pam-login now.
- ;;
- "system-auth"|"system-auth-1.1"|"other")
- # These we only install if we do not have pam-0.78
- # or later.
- [ "${INSTALL_SYSTEM_PAMD}" = "yes" ] && [ -f ${x} ] && \
- dopamd ${x}
- ;;
- "su")
- # Disable support for pam_env and pam_wheel on openpam
- has_version sys-libs/pam && dopamd ${x}
- ;;
- "su-openpam")
- has_version sys-libs/openpam && newpamd ${x} su
- ;;
- *)
- [ -f ${x} ] && dopamd ${x}
- ;;
- esac
- done
- for x in chage chsh chfn chpasswd newusers \
- user{add,del,mod} group{add,del,mod} ; do
- newpamd "${FILESDIR}"/pam.d-include/shadow ${x}
- done
-
- # Only add this one if needed.
- if [ "${FORCE_SYSTEMAUTH_UPDATE}" = "yes" ]; then
- newpamd "${FILESDIR}"/pam.d-include/system-auth-1.1 system-auth.new || \
- die "Failed to install system-auth.new!"
- fi
-
- # remove manpages that pam will install for us
- # and/or don't apply when using pam
-
- find "${D}"/usr/share/man \
- '(' -name 'limits.5*' -o -name 'suauth.5*' ')' \
- -exec rm {} \;
- else
- insinto /etc
- insopts -m0644
- newins etc/login.defs login.defs
- fi
-
- # libshadow_getpass() is only used sometimes now which means
- # GETPASS_ASTERISKS may not always be applicable
- use skey || sed -i -e '/^GETPASS_ASTERISKS/s:^:#:' "${D}"/etc/login.defs
-
- # Remove manpages that are handled by other packages
- find "${D}"/usr/share/man \
- '(' -name id.1 -o -name passwd.5 -o -name getspnam.3 ')' \
- -exec rm {} \;
-
- cd "${S}"
- dodoc ChangeLog NEWS TODO
- newdoc README README.download
- cd doc
- dodoc HOWTO LSM README* WISHLIST *.txt
-}
-
-pkg_preinst() {
- rm -f "${ROOT}"/etc/pam.d/system-auth.new \
- "${ROOT}/etc/login.defs.new"
-}
-
-pkg_postinst() {
- # Enable shadow groups (we need ROOT=/ here, as grpconv only
- # operate on / ...).
- if [[ ${ROOT} == / && ! -f /etc/gshadow ]] ; then
- if grpck -r &>/dev/null; then
- grpconv
- else
- ewarn "Running 'grpck' returned errors. Please run it by hand, and then"
- ewarn "run 'grpconv' afterwards!"
- fi
- fi
-
- use pam || return 0
-
- if [ "${FORCE_SYSTEMAUTH_UPDATE}" = "yes" ]; then
- local CHECK1=$(md5sum "${ROOT}"/etc/pam.d/system-auth | cut -d ' ' -f 1)
- local CHECK2=$(md5sum "${ROOT}"/etc/pam.d/system-auth.new | cut -d ' ' -f 1)
-
- if [ "${CHECK1}" != "${CHECK2}" ]; then
- ewarn "Due to a security issue, ${ROOT}etc/pam.d/system-auth "
- ewarn "is being updated automatically. Your old "
- ewarn "system-auth will be backed up as:"
- ewarn
- ewarn " ${ROOT}etc/pam.d/system-auth.bak"
- echo
-
- cp -pPR "${ROOT}"/etc/pam.d/system-auth \
- "${ROOT}"/etc/pam.d/system-auth.bak;
- mv -f "${ROOT}"/etc/pam.d/system-auth.new \
- "${ROOT}"/etc/pam.d/system-auth
- rm -f "${ROOT}"/etc/pam.d/._cfg????_system-auth
- else
- rm -f "${ROOT}"/etc/pam.d/system-auth.new
- fi
- fi
-
- [ "${FORCE_LOGIN_DEFS}" != "yes" ] && return 0
-
- ewarn "Due to a compatibility issue, ${ROOT}etc/login.defs "
- ewarn "is being updated automatically. Your old login.defs"
- ewarn "will be backed up as: ${ROOT}etc/login.defs.bak"
- echo
-
- local CHECK1="`md5sum ${ROOT}/etc/login.defs | cut -d ' ' -f 1`"
- local CHECK2="`md5sum ${ROOT}/etc/login.defs.new | cut -d ' ' -f 1`"
-
- if [ "${CHECK1}" != "${CHECK2}" ]
- then
- cp -pPR ${ROOT}/etc/login.defs ${ROOT}/etc/login.defs.bak
- mv -f ${ROOT}/etc/login.defs.new ${ROOT}/etc/login.defs
- elif [ ! -f ${ROOT}/etc/login.defs ]
- then
- mv -f ${ROOT}/etc/login.defs.new ${ROOT}/etc/login.defs
- else
- rm -f ${ROOT}/etc/login.defs.new
- fi
-}
-
+++ /dev/null
-# Copyright 1999-2006 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-apps/shadow/shadow-4.0.17-r1.ebuild,v 1.4 2006/10/17 14:21:36 dsd Exp $
-
-inherit eutils libtool toolchain-funcs flag-o-matic autotools pam
-
-DESCRIPTION="Utilities to deal with user accounts"
-HOMEPAGE="http://shadow.pld.org.pl/"
-SRC_URI="ftp://ftp.pld.org.pl/software/${PN}/${P}.tar.bz2"
-
-LICENSE="BSD"
-SLOT="0"
-KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86"
-IUSE="nls pam selinux skey nousuid cracklib"
-
-RDEPEND="cracklib? ( >=sys-libs/cracklib-2.7-r3 )
- pam? ( virtual/pam )
- !sys-apps/pam-login
- skey? ( app-admin/skey )
- selinux? ( >=sys-libs/libselinux-1.28 )
- nls? ( virtual/libintl )"
-DEPEND="${RDEPEND}
- >=sys-apps/portage-2.0.51-r2
- nls? ( sys-devel/gettext )"
-
-src_unpack() {
- unpack ${A}
- cd "${S}"
-
- # uclibc support, corrects NIS usage
- epatch "${FILESDIR}"/${PN}-4.0.13-nonis.patch
-
- # If su should not simulate a login shell, use '/bin/sh' as shell to enable
- # running of commands as user with /bin/false as shell, closing bug #15015.
- # *** This one could be a security hole; disable for now ***
- #epatch "${FILESDIR}"/${P}-nologin-run-sh.patch
-
- # tweak the default login.defs
- epatch "${FILESDIR}"/${PN}-4.0.17-login.defs.patch
-
- # Make user/group names more flexible #3485 / #22920
- epatch "${FILESDIR}"/${PN}-4.0.13-dots-in-usernames.patch
- epatch "${FILESDIR}"/${PN}-4.0.13-long-groupnames.patch
-
- # Fix compiling with gcc-2.95.x
- epatch "${FILESDIR}"/${PN}-4.0.12-gcc2.patch
-
- # Patch from upstream enables the new environment too early for PAM
- epatch "${FILESDIR}"/${PN}-4.0.14-su-fix-environment.patch
-
- # lock down setuid perms #47208
- epatch "${FILESDIR}"/${PN}-4.0.11.1-perms.patch
-
- epatch "${FILESDIR}"/${PN}-4.0.15-uclibc-missing-l64a.patch
-
- epatch "${FILESDIR}"/${PN}-4.0.16-fix-useradd-usergroups.patch #128715
-
- epatch "${FILESDIR}"/${PN}-4.0.17-no-local-getpass.patch
-
- # Needed by the UCLIBC patches
- eautoconf || die
-
- elibtoolize
- epunt_cxx
-}
-
-src_compile() {
- append-ldflags $(bindnow-flags)
- tc-is-cross-compiler && export ac_cv_func_setpgrp_void=yes
- econf \
- --disable-desrpc \
- --with-libcrypt \
- --enable-shared=no \
- --enable-static=yes \
- $(use_with cracklib libcrack) \
- $(use_with pam libpam) \
- $(use_with skey) \
- $(use_with selinux) \
- $(use_enable nls) \
- || die "bad configure"
- emake || die "compile problem"
-}
-
-src_install() {
- local perms=4711
- use nousuid && perms=711
- make DESTDIR="${D}" suiduperms=${perms} install || die "install problem"
- dosym useradd /usr/sbin/adduser
-
- # Remove libshadow and libmisc; see bug 37725 and the following
- # comment from shadow's README.linux:
- # Currently, libshadow.a is for internal use only, so if you see
- # -lshadow in a Makefile of some other package, it is safe to
- # remove it.
- rm -f "${D}"/{,usr/}$(get_libdir)/lib{misc,shadow}.{a,la}
-
- insinto /etc
- # Using a securetty with devfs device names added
- # (compat names kept for non-devfs compatibility)
- insopts -m0600 ; doins "${FILESDIR}"/securetty
- if ! use pam ; then
- insopts -m0600
- doins etc/login.access etc/limits
- else
- newpamd "${FILESDIR}/login.pamd" login
- use selinux || sed -i -e '/@selinux@/d' "${D}"/etc/pam.d/login
- use selinux && sed -i -e 's:@selinux@::g' "${D}"/etc/pam.d/login
- fi
- # Output arch-specific cruft
- case $(tc-arch) in
- ppc*) echo "hvc0" >> "${D}"/etc/securetty
- echo "hvsi0" >> "${D}"/etc/securetty;;
- hppa) echo "ttyB0" >> "${D}"/etc/securetty;;
- arm) echo "ttyFB0" >> "${D}"/etc/securetty;;
- esac
-
- # needed for 'adduser -D'
- insinto /etc/default
- insopts -m0600
- doins "${FILESDIR}"/default/useradd
-
- # move passwd to / to help recover broke systems #64441
- mv "${D}"/usr/bin/passwd "${D}"/bin/
- dosym /bin/passwd /usr/bin/passwd
-
- if use pam ; then
- local INSTALL_SYSTEM_PAMD="yes"
-
- # Do not install below pam.d files if we have pam-0.78 or later
- has_version '>=sys-libs/pam-0.78' && \
- INSTALL_SYSTEM_PAMD="no"
-
- for x in "${FILESDIR}"/pam.d-include/*; do
- case "${x##*/}" in
- "login")
- # We do no longer install this one, as its from
- # pam-login now.
- ;;
- "system-auth"|"system-auth-1.1"|"other")
- # These we only install if we do not have pam-0.78
- # or later.
- [ "${INSTALL_SYSTEM_PAMD}" = "yes" ] && [ -f ${x} ] && \
- dopamd ${x}
- ;;
- "su")
- # Disable support for pam_env and pam_wheel on openpam
- has_version sys-libs/pam && dopamd ${x}
- ;;
- "su-openpam")
- has_version sys-libs/openpam && newpamd ${x} su
- ;;
- *)
- [ -f ${x} ] && dopamd ${x}
- ;;
- esac
- done
- for x in chage chsh chfn chpasswd newusers \
- user{add,del,mod} group{add,del,mod} ; do
- newpamd "${FILESDIR}"/pam.d-include/shadow ${x}
- done
-
- # remove manpages that pam will install for us
- # and/or don't apply when using pam
-
- find "${D}"/usr/share/man \
- '(' -name 'limits.5*' -o -name 'suauth.5*' ')' \
- -exec rm {} \;
- fi
-
- cd "${S}"
- insinto /etc
- insopts -m0644
- newins etc/login.defs login.defs
-
- # comment out options that pam hates
- if use pam ; then
- awk -f "${FILESDIR}"/login_defs.awk \
- lib/getdef.c etc/login.defs \
- > "${D}"/etc/login.defs
- fi
-
- # Remove manpages that are handled by other packages
- find "${D}"/usr/share/man \
- '(' -name id.1 -o -name passwd.5 -o -name getspnam.3 ')' \
- -exec rm {} \;
-
- cd "${S}"
- dodoc ChangeLog NEWS TODO
- newdoc README README.download
- cd doc
- dodoc HOWTO README* WISHLIST *.txt
-}
-
-pkg_preinst() {
- rm -f "${ROOT}"/etc/pam.d/system-auth.new \
- "${ROOT}/etc/login.defs.new"
-}
-
-pkg_postinst() {
- # Enable shadow groups (we need ROOT=/ here, as grpconv only
- # operate on / ...).
- if [[ ${ROOT} == / && ! -f /etc/gshadow ]] ; then
- if grpck -r &>/dev/null; then
- grpconv
- else
- ewarn "Running 'grpck' returned errors. Please run it by hand, and then"
- ewarn "run 'grpconv' afterwards!"
- fi
- fi
-}
+++ /dev/null
-# Copyright 1999-2006 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-apps/shadow/shadow-4.0.17.ebuild,v 1.3 2006/10/17 14:21:36 dsd Exp $
-
-inherit eutils libtool toolchain-funcs flag-o-matic autotools pam
-
-# We should remove this login after pam-0.78 goes stable.
-FORCE_SYSTEMAUTH_UPDATE="no"
-
-DESCRIPTION="Utilities to deal with user accounts"
-HOMEPAGE="http://shadow.pld.org.pl/"
-SRC_URI="ftp://ftp.pld.org.pl/software/${PN}/${P}.tar.bz2"
-
-LICENSE="BSD"
-SLOT="0"
-KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86"
-IUSE="nls pam selinux skey nousuid cracklib"
-
-RDEPEND="cracklib? ( >=sys-libs/cracklib-2.7-r3 )
- pam? ( virtual/pam )
- !sys-apps/pam-login
- skey? ( app-admin/skey )
- selinux? ( >=sys-libs/libselinux-1.28 )
- nls? ( virtual/libintl )"
-DEPEND="${RDEPEND}
- >=sys-apps/portage-2.0.51-r2
- nls? ( sys-devel/gettext )"
-
-src_unpack() {
- unpack ${A}
- cd "${S}"
-
- # uclibc support, corrects NIS usage
- epatch "${FILESDIR}"/${PN}-4.0.13-nonis.patch
-
- # If su should not simulate a login shell, use '/bin/sh' as shell to enable
- # running of commands as user with /bin/false as shell, closing bug #15015.
- # *** This one could be a security hole; disable for now ***
- #epatch "${FILESDIR}"/${P}-nologin-run-sh.patch
-
- # tweak the default login.defs
- epatch "${FILESDIR}"/${PN}-4.0.13-login.defs.patch
-
- # Make user/group names more flexible #3485 / #22920
- epatch "${FILESDIR}"/${PN}-4.0.13-dots-in-usernames.patch
- epatch "${FILESDIR}"/${PN}-4.0.13-long-groupnames.patch
-
- # Fix compiling with gcc-2.95.x
- epatch "${FILESDIR}"/${PN}-4.0.12-gcc2.patch
-
- # Patch from upstream enables the new environment too early for PAM
- epatch "${FILESDIR}"/${PN}-4.0.14-su-fix-environment.patch
-
- # lock down setuid perms #47208
- epatch "${FILESDIR}"/${PN}-4.0.11.1-perms.patch
-
- epatch "${FILESDIR}"/${PN}-4.0.15-uclibc-missing-l64a.patch
-
- epatch "${FILESDIR}"/${PN}-4.0.16-fix-useradd-usergroups.patch #128715
-
- epatch "${FILESDIR}"/${PN}-4.0.17-no-local-getpass.patch
-
- # Needed by the UCLIBC patches
- eautoconf || die
-
- elibtoolize
- epunt_cxx
-}
-
-src_compile() {
- append-ldflags $(bindnow-flags)
- tc-is-cross-compiler && export ac_cv_func_setpgrp_void=yes
- econf \
- --disable-desrpc \
- --with-libcrypt \
- --enable-shared=no \
- --enable-static=yes \
- $(use_with cracklib libcrack) \
- $(use_with pam libpam) \
- $(use_with skey) \
- $(use_with selinux) \
- $(use_enable nls) \
- || die "bad configure"
- emake || die "compile problem"
-}
-
-src_install() {
- local perms=4711
- use nousuid && perms=711
- make DESTDIR="${D}" suiduperms=${perms} install || die "install problem"
- dosym useradd /usr/sbin/adduser
-
- # Remove libshadow and libmisc; see bug 37725 and the following
- # comment from shadow's README.linux:
- # Currently, libshadow.a is for internal use only, so if you see
- # -lshadow in a Makefile of some other package, it is safe to
- # remove it.
- rm -f "${D}"/{,usr/}$(get_libdir)/lib{misc,shadow}.{a,la}
-
- insinto /etc
- # Using a securetty with devfs device names added
- # (compat names kept for non-devfs compatibility)
- insopts -m0600 ; doins "${FILESDIR}"/securetty
- if ! use pam ; then
- insopts -m0600
- doins etc/login.access etc/limits
- else
- newpamd "${FILESDIR}/login.pamd" login
- use selinux || sed -i -e '/@selinux@/d' "${D}"/etc/pam.d/login
- use selinux && sed -i -e 's:@selinux@::g' "${D}"/etc/pam.d/login
-
- insinto /etc
- insopts -m0644
- newins "${FILESDIR}/login.defs" login.defs
-
- # Also install another one that we can use to check if
- # we need to update it if FORCE_LOGIN_DEFS = "yes"
- [ "${FORCE_LOGIN_DEFS}" = "yes" ] \
- && newins "${FILESDIR}/login.defs" login.defs.new
- fi
- # Output arch-specific cruft
- case $(tc-arch) in
- ppc*) echo "hvc0" >> "${D}"/etc/securetty
- echo "hvsi0" >> "${D}"/etc/securetty;;
- hppa) echo "ttyB0" >> "${D}"/etc/securetty;;
- arm) echo "ttyFB0" >> "${D}"/etc/securetty;;
- esac
-
- # needed for 'adduser -D'
- insinto /etc/default
- insopts -m0600
- doins "${FILESDIR}"/default/useradd
-
- # move passwd to / to help recover broke systems #64441
- mv "${D}"/usr/bin/passwd "${D}"/bin/
- dosym /bin/passwd /usr/bin/passwd
-
- if use pam ; then
- local INSTALL_SYSTEM_PAMD="yes"
-
- # Do not install below pam.d files if we have pam-0.78 or later
- has_version '>=sys-libs/pam-0.78' && \
- INSTALL_SYSTEM_PAMD="no"
-
- for x in "${FILESDIR}"/pam.d-include/*; do
- case "${x##*/}" in
- "login")
- # We do no longer install this one, as its from
- # pam-login now.
- ;;
- "system-auth"|"system-auth-1.1"|"other")
- # These we only install if we do not have pam-0.78
- # or later.
- [ "${INSTALL_SYSTEM_PAMD}" = "yes" ] && [ -f ${x} ] && \
- dopamd ${x}
- ;;
- "su")
- # Disable support for pam_env and pam_wheel on openpam
- has_version sys-libs/pam && dopamd ${x}
- ;;
- "su-openpam")
- has_version sys-libs/openpam && newpamd ${x} su
- ;;
- *)
- [ -f ${x} ] && dopamd ${x}
- ;;
- esac
- done
- for x in chage chsh chfn chpasswd newusers \
- user{add,del,mod} group{add,del,mod} ; do
- newpamd "${FILESDIR}"/pam.d-include/shadow ${x}
- done
-
- # Only add this one if needed.
- if [ "${FORCE_SYSTEMAUTH_UPDATE}" = "yes" ]; then
- newpamd "${FILESDIR}"/pam.d-include/system-auth-1.1 system-auth.new || \
- die "Failed to install system-auth.new!"
- fi
-
- # remove manpages that pam will install for us
- # and/or don't apply when using pam
-
- find "${D}"/usr/share/man \
- '(' -name 'limits.5*' -o -name 'suauth.5*' ')' \
- -exec rm {} \;
- else
- insinto /etc
- insopts -m0644
- newins etc/login.defs login.defs
- fi
-
- # libshadow_getpass() is only used sometimes now which means
- # GETPASS_ASTERISKS may not always be applicable
- use skey || sed -i -e '/^GETPASS_ASTERISKS/s:^:#:' "${D}"/etc/login.defs
-
- # Remove manpages that are handled by other packages
- find "${D}"/usr/share/man \
- '(' -name id.1 -o -name passwd.5 -o -name getspnam.3 ')' \
- -exec rm {} \;
-
- cd "${S}"
- dodoc ChangeLog NEWS TODO
- newdoc README README.download
- cd doc
- dodoc HOWTO LSM README* WISHLIST *.txt
-}
-
-pkg_preinst() {
- rm -f "${ROOT}"/etc/pam.d/system-auth.new \
- "${ROOT}/etc/login.defs.new"
-}
-
-pkg_postinst() {
- # Enable shadow groups (we need ROOT=/ here, as grpconv only
- # operate on / ...).
- if [[ ${ROOT} == / && ! -f /etc/gshadow ]] ; then
- if grpck -r &>/dev/null; then
- grpconv
- else
- ewarn "Running 'grpck' returned errors. Please run it by hand, and then"
- ewarn "run 'grpconv' afterwards!"
- fi
- fi
-
- use pam || return 0
-
- if [ "${FORCE_SYSTEMAUTH_UPDATE}" = "yes" ]; then
- local CHECK1=$(md5sum "${ROOT}"/etc/pam.d/system-auth | cut -d ' ' -f 1)
- local CHECK2=$(md5sum "${ROOT}"/etc/pam.d/system-auth.new | cut -d ' ' -f 1)
-
- if [ "${CHECK1}" != "${CHECK2}" ]; then
- ewarn "Due to a security issue, ${ROOT}etc/pam.d/system-auth "
- ewarn "is being updated automatically. Your old "
- ewarn "system-auth will be backed up as:"
- ewarn
- ewarn " ${ROOT}etc/pam.d/system-auth.bak"
- echo
-
- cp -pPR "${ROOT}"/etc/pam.d/system-auth \
- "${ROOT}"/etc/pam.d/system-auth.bak;
- mv -f "${ROOT}"/etc/pam.d/system-auth.new \
- "${ROOT}"/etc/pam.d/system-auth
- rm -f "${ROOT}"/etc/pam.d/._cfg????_system-auth
- else
- rm -f "${ROOT}"/etc/pam.d/system-auth.new
- fi
- fi
-
- [ "${FORCE_LOGIN_DEFS}" != "yes" ] && return 0
-
- ewarn "Due to a compatibility issue, ${ROOT}etc/login.defs "
- ewarn "is being updated automatically. Your old login.defs"
- ewarn "will be backed up as: ${ROOT}etc/login.defs.bak"
- echo
-
- local CHECK1="`md5sum ${ROOT}/etc/login.defs | cut -d ' ' -f 1`"
- local CHECK2="`md5sum ${ROOT}/etc/login.defs.new | cut -d ' ' -f 1`"
-
- if [ "${CHECK1}" != "${CHECK2}" ]
- then
- cp -pPR ${ROOT}/etc/login.defs ${ROOT}/etc/login.defs.bak
- mv -f ${ROOT}/etc/login.defs.new ${ROOT}/etc/login.defs
- elif [ ! -f ${ROOT}/etc/login.defs ]
- then
- mv -f ${ROOT}/etc/login.defs.new ${ROOT}/etc/login.defs
- else
- rm -f ${ROOT}/etc/login.defs.new
- fi
-}
-