head 1.9; access; symbols pkgsrc-2026Q1:1.9.0.124 pkgsrc-2026Q1-base:1.9 pkgsrc-2025Q4:1.9.0.122 pkgsrc-2025Q4-base:1.9 pkgsrc-2025Q3:1.9.0.120 pkgsrc-2025Q3-base:1.9 pkgsrc-2025Q2:1.9.0.118 pkgsrc-2025Q2-base:1.9 pkgsrc-2025Q1:1.9.0.116 pkgsrc-2025Q1-base:1.9 pkgsrc-2024Q4:1.9.0.114 pkgsrc-2024Q4-base:1.9 pkgsrc-2024Q3:1.9.0.112 pkgsrc-2024Q3-base:1.9 pkgsrc-2024Q2:1.9.0.110 pkgsrc-2024Q2-base:1.9 pkgsrc-2024Q1:1.9.0.108 pkgsrc-2024Q1-base:1.9 pkgsrc-2023Q4:1.9.0.106 pkgsrc-2023Q4-base:1.9 pkgsrc-2023Q3:1.9.0.104 pkgsrc-2023Q3-base:1.9 pkgsrc-2023Q2:1.9.0.102 pkgsrc-2023Q2-base:1.9 pkgsrc-2023Q1:1.9.0.100 pkgsrc-2023Q1-base:1.9 pkgsrc-2022Q4:1.9.0.98 pkgsrc-2022Q4-base:1.9 pkgsrc-2022Q3:1.9.0.96 pkgsrc-2022Q3-base:1.9 pkgsrc-2022Q2:1.9.0.94 pkgsrc-2022Q2-base:1.9 pkgsrc-2022Q1:1.9.0.92 pkgsrc-2022Q1-base:1.9 pkgsrc-2021Q4:1.9.0.90 pkgsrc-2021Q4-base:1.9 pkgsrc-2021Q3:1.9.0.88 pkgsrc-2021Q3-base:1.9 pkgsrc-2021Q2:1.9.0.86 pkgsrc-2021Q2-base:1.9 pkgsrc-2021Q1:1.9.0.84 pkgsrc-2021Q1-base:1.9 pkgsrc-2020Q4:1.9.0.82 pkgsrc-2020Q4-base:1.9 pkgsrc-2020Q3:1.9.0.80 pkgsrc-2020Q3-base:1.9 pkgsrc-2020Q2:1.9.0.76 pkgsrc-2020Q2-base:1.9 pkgsrc-2020Q1:1.9.0.56 pkgsrc-2020Q1-base:1.9 pkgsrc-2019Q4:1.9.0.78 pkgsrc-2019Q4-base:1.9 pkgsrc-2019Q3:1.9.0.74 pkgsrc-2019Q3-base:1.9 pkgsrc-2019Q2:1.9.0.72 pkgsrc-2019Q2-base:1.9 pkgsrc-2019Q1:1.9.0.70 pkgsrc-2019Q1-base:1.9 pkgsrc-2018Q4:1.9.0.68 pkgsrc-2018Q4-base:1.9 pkgsrc-2018Q3:1.9.0.66 pkgsrc-2018Q3-base:1.9 pkgsrc-2018Q2:1.9.0.64 pkgsrc-2018Q2-base:1.9 pkgsrc-2018Q1:1.9.0.62 pkgsrc-2018Q1-base:1.9 pkgsrc-2017Q4:1.9.0.60 pkgsrc-2017Q4-base:1.9 pkgsrc-2017Q3:1.9.0.58 pkgsrc-2017Q3-base:1.9 pkgsrc-2017Q2:1.9.0.54 pkgsrc-2017Q2-base:1.9 pkgsrc-2017Q1:1.9.0.52 pkgsrc-2017Q1-base:1.9 pkgsrc-2016Q4:1.9.0.50 pkgsrc-2016Q4-base:1.9 pkgsrc-2016Q3:1.9.0.48 pkgsrc-2016Q3-base:1.9 pkgsrc-2016Q2:1.9.0.46 pkgsrc-2016Q2-base:1.9 pkgsrc-2016Q1:1.9.0.44 pkgsrc-2016Q1-base:1.9 pkgsrc-2015Q4:1.9.0.42 pkgsrc-2015Q4-base:1.9 pkgsrc-2015Q3:1.9.0.40 pkgsrc-2015Q3-base:1.9 pkgsrc-2015Q2:1.9.0.38 pkgsrc-2015Q2-base:1.9 pkgsrc-2015Q1:1.9.0.36 pkgsrc-2015Q1-base:1.9 pkgsrc-2014Q4:1.9.0.34 pkgsrc-2014Q4-base:1.9 pkgsrc-2014Q3:1.9.0.32 pkgsrc-2014Q3-base:1.9 pkgsrc-2014Q2:1.9.0.30 pkgsrc-2014Q2-base:1.9 pkgsrc-2014Q1:1.9.0.28 pkgsrc-2014Q1-base:1.9 pkgsrc-2013Q4:1.9.0.26 pkgsrc-2013Q4-base:1.9 pkgsrc-2013Q3:1.9.0.24 pkgsrc-2013Q3-base:1.9 pkgsrc-2013Q2:1.9.0.22 pkgsrc-2013Q2-base:1.9 pkgsrc-2013Q1:1.9.0.20 pkgsrc-2013Q1-base:1.9 pkgsrc-2012Q4:1.9.0.18 pkgsrc-2012Q4-base:1.9 pkgsrc-2012Q3:1.9.0.16 pkgsrc-2012Q3-base:1.9 pkgsrc-2012Q2:1.9.0.14 pkgsrc-2012Q2-base:1.9 pkgsrc-2012Q1:1.9.0.12 pkgsrc-2012Q1-base:1.9 pkgsrc-2011Q4:1.9.0.10 pkgsrc-2011Q4-base:1.9 pkgsrc-2011Q3:1.9.0.8 pkgsrc-2011Q3-base:1.9 pkgsrc-2011Q2:1.9.0.6 pkgsrc-2011Q2-base:1.9 pkgsrc-2011Q1:1.9.0.4 pkgsrc-2011Q1-base:1.9 pkgsrc-2010Q4:1.9.0.2 pkgsrc-2010Q4-base:1.9 pkgsrc-2010Q3:1.7.0.28 pkgsrc-2010Q3-base:1.7 pkgsrc-2010Q2:1.7.0.26 pkgsrc-2010Q2-base:1.7 pkgsrc-2010Q1:1.7.0.24 pkgsrc-2010Q1-base:1.7 pkgsrc-2009Q4:1.7.0.22 pkgsrc-2009Q4-base:1.7 pkgsrc-2009Q3:1.7.0.20 pkgsrc-2009Q3-base:1.7 pkgsrc-2009Q2:1.7.0.18 pkgsrc-2009Q2-base:1.7 pkgsrc-2009Q1:1.7.0.16 pkgsrc-2009Q1-base:1.7 pkgsrc-2008Q4:1.7.0.14 pkgsrc-2008Q4-base:1.7 pkgsrc-2008Q3:1.7.0.12 pkgsrc-2008Q3-base:1.7 cube-native-xorg:1.7.0.10 cube-native-xorg-base:1.7 pkgsrc-2008Q2:1.7.0.8 pkgsrc-2008Q2-base:1.7 cwrapper:1.7.0.6 pkgsrc-2008Q1:1.7.0.4 pkgsrc-2008Q1-base:1.7 pkgsrc-2007Q4:1.7.0.2 pkgsrc-2007Q4-base:1.7 pkgsrc-2007Q3:1.6.0.6 pkgsrc-2007Q3-base:1.6 pkgsrc-2007Q2:1.6.0.4 pkgsrc-2007Q2-base:1.6 pkgsrc-2007Q1:1.6.0.2 pkgsrc-2007Q1-base:1.6 pkgsrc-2006Q4:1.5.0.16 pkgsrc-2006Q4-base:1.5 pkgsrc-2006Q3:1.5.0.14 pkgsrc-2006Q3-base:1.5 pkgsrc-2006Q2:1.5.0.12 pkgsrc-2006Q2-base:1.5 pkgsrc-2006Q1:1.5.0.10 pkgsrc-2006Q1-base:1.5 pkgsrc-2005Q4:1.5.0.8 pkgsrc-2005Q4-base:1.5 pkgsrc-2005Q3:1.5.0.6 pkgsrc-2005Q3-base:1.5 pkgsrc-2005Q2:1.5.0.4 pkgsrc-2005Q2-base:1.5 pkgsrc-2005Q1:1.5.0.2 pkgsrc-2005Q1-base:1.5 pkgsrc-2004Q4:1.4.0.2 pkgsrc-2004Q4-base:1.4 pkgsrc-2004Q3:1.3.0.8 pkgsrc-2004Q3-base:1.3 pkgsrc-2004Q2:1.3.0.6 pkgsrc-2004Q2-base:1.3 pkgsrc-2004Q1:1.3.0.4 pkgsrc-2004Q1-base:1.3 pkgsrc-2003Q4:1.3.0.2 pkgsrc-2003Q4-base:1.3 buildlink2:1.1.1.1.0.2 buildlink2-base:1.1.1.1 netbsd-1-5-PATCH003:1.1.1.1 netbsd-1-5-PATCH001:1.1.1.1 pkgsrc-base:1.1.1.1 TNF:1.1.1; locks; strict; comment @# @; 1.9 date 2010.11.16.09.53.50; author adam; state Exp; branches; next 1.8; 1.8 date 2010.10.28.08.06.19; author adam; state Exp; branches; next 1.7; 1.7 date 2007.11.27.08.27.06; author adam; state Exp; branches; next 1.6; 1.6 date 2007.01.15.03.24.03; author taca; state Exp; branches; next 1.5; 1.5 date 2005.01.12.02.30.09; author xtraeme; state Exp; branches 1.5.16.1; next 1.4; 1.4 date 2004.11.19.19.08.43; author jlam; state dead; branches; next 1.3; 1.3 date 2003.11.05.13.10.27; author rtr; state Exp; branches; next 1.2; 1.2 date 2002.07.13.21.35.15; author wiz; state dead; branches; next 1.1; 1.1 date 2000.10.21.18.47.46; author rh; state Exp; branches 1.1.1.1; next ; 1.5.16.1 date 2007.01.17.17.10.31; author salo; state Exp; branches; next ; 1.1.1.1 date 2000.10.21.18.47.46; author rh; state Exp; branches; next ; desc @@ 1.9 log @Changes 186: * fix for BUG-424: build fails on Darwin @ text @$NetBSD$ --- pam_ldap.c.orig 2010-11-08 00:58:44.000000000 +0000 +++ pam_ldap.c @@@@ -3411,7 +3411,7 @@@@ pam_sm_authenticate (pam_handle_t * pamh int rc; const char *username; char *p; - int use_first_pass = 0, try_first_pass = 0, ignore_flags = 0; + int use_first_pass = 0, try_first_pass = 0, ignore_flags = 0, migrate = 0; int i; pam_ldap_session_t *session = NULL; const char *configFile = NULL; @@@@ -3432,6 +3432,8 @@@@ pam_sm_authenticate (pam_handle_t * pamh ; else if (!strcmp (argv[i], "debug")) ; + else if (!strcmp (argv[i], "migrate")) + migrate = 1; else syslog (LOG_ERR, "illegal option %s", argv[i]); } @@@@ -3445,6 +3447,22 @@@@ pam_sm_authenticate (pam_handle_t * pamh return rc; rc = pam_get_item (pamh, PAM_AUTHTOK, (CONST_ARG void **) &p); + /* start of migrate facility in "pam_ldap authentication" */ + if (migrate==1 && rc==PAM_SUCCESS) + { + /* check if specified username exists in LDAP */ + if (_get_user_info(session,username)==PAM_SUCCESS) + { + /* + overwrite old LDAP userPassword with a new password + obtained during pam authentication process + - rootbinddn and ldap.secret must be set + */ + rc=_update_authtok(pamh,session,username,NULL,p); + return PAM_IGNORE; + } + } + /* end of migrate facility in "pam_ldap authentication" */ if (rc == PAM_SUCCESS && (use_first_pass || try_first_pass)) { rc = _do_authentication (pamh, session, username, p); @@@@ -3721,7 +3739,7 @@@@ pam_sm_chauthtok (pam_handle_t * pamh, i if (curpass == NULL) return PAM_MAXTRIES; /* maximum tries exceeded */ else - pam_set_item (pamh, PAM_OLDAUTHTOK, (void *) curpass); + pam_set_item (pamh, PAM_OLDAUTHTOK, (void *) strdup(curpass)); } else { @ 1.8 log @Changes 185: * fix: LDAP write on userPassword fails when chasing referral and cached policy error is POLICY_ERROR_PASSWORD_EXPIRED * fix: only request attributes that are actually used * fix: canonicalize PAM_USER name @ text @d3 1 a3 1 --- pam_ldap.c.orig 2009-11-06 10:29:34.000000000 +0000 d5 1 a5 14 @@@@ -131,12 +131,7 @@@@ #include "pam_ldap.h" #include "md5.h" -#if defined(HAVE_SECURITY_PAM_MISC_H) || defined(HAVE_PAM_PAM_MISC_H) - /* FIXME: is there something better to check? */ #define CONST_ARG const -#else -#define CONST_ARG -#endif #ifndef HAVE_LDAP_MEMFREE #define ldap_memfree(x) free(x) @@@@ -3411,7 +3406,7 @@@@ pam_sm_authenticate (pam_handle_t * pamh d14 1 a14 1 @@@@ -3432,6 +3427,8 @@@@ pam_sm_authenticate (pam_handle_t * pamh d23 1 a23 1 @@@@ -3445,6 +3442,22 @@@@ pam_sm_authenticate (pam_handle_t * pamh d46 1 a46 17 @@@@ -3707,11 +3720,11 @@@@ pam_sm_chauthtok (pam_handle_t * pamh, i { _conv_sendmsg (appconv, "Password change aborted", PAM_ERROR_MSG, no_warn); -#ifdef PAM_AUTHTOK_RECOVERY_ERR - return PAM_AUTHTOK_RECOVERY_ERR; -#else +#ifdef PAM_AUTHTOK_RECOVER_ERR return PAM_AUTHTOK_RECOVER_ERR; -#endif /* PAM_AUTHTOK_RECOVERY_ERR */ +#else + return PAM_AUTHTOK_RECOVERY_ERR; +#endif } else { @@@@ -3725,7 +3738,7 @@@@ pam_sm_chauthtok (pam_handle_t * pamh, i a54 64 @@@@ -3753,11 +3766,11 @@@@ pam_sm_chauthtok (pam_handle_t * pamh, i syslog (LOG_ERR, "pam_ldap: error getting old authentication token (%s)", pam_strerror (pamh, rc)); -#ifdef PAM_AUTHTOK_RECOVERY_ERR - return PAM_AUTHTOK_RECOVERY_ERR; -#else +#ifdef PAM_AUTHTOK_RECOVER_ERR return PAM_AUTHTOK_RECOVER_ERR; -#endif /* PAM_AUTHTOK_RECOVERY_ERR */ +#else + return PAM_AUTHTOK_RECOVERY_ERR; +#endif /* PAM_AUTHTOK_RECOVER_ERR */ } if (try_first_pass || use_first_pass) @@@@ -3767,11 +3780,11 @@@@ pam_sm_chauthtok (pam_handle_t * pamh, i newpass = NULL; if (use_first_pass && newpass == NULL) -#ifdef PAM_AUTHTOK_RECOVERY_ERR - return PAM_AUTHTOK_RECOVERY_ERR; -#else +#ifdef PAM_AUTHTOK_RECOVER_ERR return PAM_AUTHTOK_RECOVER_ERR; -#endif /* PAM_AUTHTOK_RECOVERY_ERR */ +#else + return PAM_AUTHTOK_RECOVERY_ERR; +#endif /* PAM_AUTHTOK_RECOVER_ERR */ } tries = 0; @@@@ -3821,11 +3834,11 @@@@ pam_sm_chauthtok (pam_handle_t * pamh, i } else { -#ifdef PAM_AUTHTOK_RECOVERY_ERR - return PAM_AUTHTOK_RECOVERY_ERR; -#else +#ifdef PAM_AUTHTOK_RECOVER_ERR return PAM_AUTHTOK_RECOVER_ERR; -#endif /* PAM_AUTHTOK_RECOVERY_ERR */ +#else + return PAM_AUTHTOK_RECOVERY_ERR; +#endif /* PAM_AUTHTOK_RECOVER_ERR */ } if (cmiscptr == NULL) @@@@ -3857,11 +3870,11 @@@@ pam_sm_chauthtok (pam_handle_t * pamh, i { _conv_sendmsg (appconv, "Password change aborted", PAM_ERROR_MSG, no_warn); -#ifdef PAM_AUTHTOK_RECOVERY_ERR - return PAM_AUTHTOK_RECOVERY_ERR; -#else +#ifdef PAM_AUTHTOK_RECOVER_ERR return PAM_AUTHTOK_RECOVER_ERR; -#endif /* PAM_AUTHTOK_RECOVERY_ERR */ +#else + return PAM_AUTHTOK_RECOVERY_ERR; +#endif /* PAM_AUTHTOK_RECOVER_ERR */ } } else if (!strcmp (newpass, miscptr)) @ 1.7 log @Changes 184: * fix for BUG 312: pam_ldap does not try to reconnect when LDAP server closed the connection @ text @d3 1 a3 1 --- pam_ldap.c.orig 2007-08-12 18:35:00.000000000 +0200 d18 1 a18 1 @@@@ -3281,7 +3276,7 @@@@ pam_sm_authenticate (pam_handle_t * pamh d27 1 a27 1 @@@@ -3302,6 +3297,8 @@@@ pam_sm_authenticate (pam_handle_t * pamh d36 1 a36 1 @@@@ -3315,6 +3312,22 @@@@ pam_sm_authenticate (pam_handle_t * pamh d59 1 a59 1 @@@@ -3563,11 +3576,11 @@@@ pam_sm_chauthtok (pam_handle_t * pamh, i d75 1 a75 1 @@@@ -3581,7 +3594,7 @@@@ pam_sm_chauthtok (pam_handle_t * pamh, i d84 1 a84 1 @@@@ -3609,11 +3622,11 @@@@ pam_sm_chauthtok (pam_handle_t * pamh, i d100 1 a100 1 @@@@ -3623,11 +3636,11 @@@@ pam_sm_chauthtok (pam_handle_t * pamh, i d116 1 a116 1 @@@@ -3677,11 +3690,11 @@@@ pam_sm_chauthtok (pam_handle_t * pamh, i d132 1 a132 1 @@@@ -3713,11 +3726,11 @@@@ pam_sm_chauthtok (pam_handle_t * pamh, i @ 1.6 log @Update pam-ldap to 183. - Fix miscellaneous pkglint warnings. - Fix security problem; CAN-2006-5170. $Id: ChangeLog,v 1.212 2006/10/05 23:23:52 lukeh Exp $ =============================================================== 183 Luke Howard * fix for BUG#291: don't suppress password policy errors which should not be suppressed 182 Luke Howard * fix for BUG#269: compile time error in call to ldap_sasl_interactive_bind_s() 181 Luke Howard * fix for BUG#256: don't send password policy request control if pam_lookup_policy no specified * fix for BUG#254: check gethostbyname() result * fix for BUG#237: typo in ldap_get_lderrno() implementation * fix for BUG#207: if ldap_start_tls_s() fails return PAM_AUTHINFO_UNAVAIL * fix for BUG#261: sslpath example wrong * fix for BUG#268: POLICY_ERROR_CHANGE_AFTER_RESET should be handled as POLICY_ERROR_PASSWORD_EXPIRED, other password policy errors to be treated as fatal @ text @d1 1 a1 1 $NetBSD: patch-ab,v 1.5 2005/01/12 02:30:09 xtraeme Exp $ d3 2 a4 2 --- pam_ldap.c.orig Sun Oct 31 02:42:54 2004 +++ pam_ldap.c Sun Oct 31 02:48:03 2004 d18 1 a18 1 @@@@ -3137,7 +3132,7 @@@@ d27 1 a27 1 @@@@ -3158,6 +3153,8 @@@@ d36 1 a36 1 @@@@ -3171,6 +3168,22 @@@@ d59 1 a59 1 @@@@ -3419,11 +3432,11 @@@@ d75 1 a75 1 @@@@ -3437,7 +3450,7 @@@@ d84 1 a84 1 @@@@ -3465,11 +3478,11 @@@@ d100 1 a100 1 @@@@ -3479,11 +3492,11 @@@@ d116 1 a116 1 @@@@ -3533,11 +3546,11 @@@@ d132 1 a132 1 @@@@ -3569,11 +3582,11 @@@@ @ 1.5 log @Make this build on NetBSD -current which uses OpenPAM (should fix the build with FreeBSD too). Patch stolen from FreeBSD/ports. @ text @d1 1 a1 1 $NetBSD$ a147 1 @ 1.5.16.1 log @Pullup ticket 1994 - requested by taca security update for pam-ldap Revisions pulled up: - pkgsrc/security/pam-ldap/Makefile 1.27 - pkgsrc/security/pam-ldap/distinfo 1.9 - pkgsrc/security/pam-ldap/patches/patch-ab 1.6 Module Name: pkgsrc Committed By: taca Date: Mon Jan 15 03:24:03 UTC 2007 Modified Files: pkgsrc/security/pam-ldap: Makefile distinfo pkgsrc/security/pam-ldap/patches: patch-ab Log Message: Update pam-ldap to 183. - Fix miscellaneous pkglint warnings. - Fix security problem; CAN-2006-5170. $Id: ChangeLog,v 1.212 2006/10/05 23:23:52 lukeh Exp $ =============================================================== 183 Luke Howard * fix for BUG#291: don't suppress password policy errors which should not be suppressed 182 Luke Howard * fix for BUG#269: compile time error in call to ldap_sasl_interactive_bind_s() 181 Luke Howard * fix for BUG#256: don't send password policy request control if pam_lookup_policy no specified * fix for BUG#254: check gethostbyname() result * fix for BUG#237: typo in ldap_get_lderrno() implementation * fix for BUG#207: if ldap_start_tls_s() fails return PAM_AUTHINFO_UNAVAIL * fix for BUG#261: sslpath example wrong * fix for BUG#268: POLICY_ERROR_CHANGE_AFTER_RESET should be handled as POLICY_ERROR_PASSWORD_EXPIRED, other password policy errors to be treated as fatal @ text @d1 1 a1 1 $NetBSD: patch-ab,v 1.6 2007/01/15 03:24:03 taca Exp $ d148 1 @ 1.4 log @Update security/pam-ldap to version 176. pkgsrc-related changes in this update include: * The configuration file (shared with nss_ldap.so and sudo) has been moved to ${PKG_SYSCONFDIR}/ldap.conf. Any secrets file is found in ${PKG_SYSCONFDIR}/ldap.secret. * Use the pkg.install framework to copy the config file from the example directory to the real location. * Use libtool to build and install the PAM module. Changes from version 150 include: * preliminary SASL bind support * include password policy schema file * preliminary support for draft-behera-ldap-password-policy-07.txt * support for service-based authorization (based on patch from Manon Goo) * add ignore_authinfo_unavail flag * pam_filter works again * fix from Thorsten Kukuk (SuSE) to handle scope-less nss_base_passwd configuration * AD password change fix * fix from Thorsten Kukuk (SuSE) to handle aborted password changes * support for multiple service search descriptors from Symas * support non-experimental password change exop * patch from Howard Chu to use linker grouping on Solaris @ text @d1 147 a147 1 $NetBSD: patch-ab,v 1.3 2003/11/05 13:10:27 rtr Exp $ a148 12 --- pam_ldap.h.orig 2002-06-08 14:49:15.000000000 +1000 +++ pam_ldap.h @@@@ -19,6 +19,9 @@@@ * Boston, MA 02111-1307, USA. */ +/* pam_ldap 164 defines LDAP_FILT_MAXSIZ 1024 */ +#define LDAP_FILT_MAXSIZ 1024 + #ifdef HAVE_SECURITY_PAM_APPL_H #include #elif defined(HAVE_PAM_PAM_APPL_H) @ 1.3 log @patch-ab for previous distinfo commit @ text @d1 1 a1 1 $NetBSD$ @ 1.2 log @Update to 150. Last version was 77, so ChangeLog would be too big to add here -- lots of new features and bug fixes. Distfile has version number now, so this should fix pkg/17588. @ text @d1 1 a1 1 $NetBSD: patch-ab,v 1.1 2000/10/21 18:47:46 rh Exp $ d3 5 a7 3 --- pam_ldap.c.orig Sat Oct 21 18:19:15 2000 +++ pam_ldap.c @@@@ -533,7 +533,7 @@@@ d9 6 a14 25 result = *presult; - fp = fopen ("/etc/ldap.conf", "r"); + fp = fopen (ETCPAMDIR "/ldap.conf", "r"); if (fp == NULL) { /* @@@@ -722,7 +722,7 @@@@ if (result->rootbinddn != NULL) { - fp = fopen ("/etc/ldap.secret", "r"); + fp = fopen (ETCPAMDIR "/ldap.secret", "r"); if (fp != NULL) { if (fgets (b, sizeof (b), fp) != NULL) @@@@ -741,7 +741,7 @@@@ { _pam_drop (result->rootbinddn); syslog (LOG_WARNING, - "pam_ldap: could not open secret file /etc/ldap.secret (%s)", + "pam_ldap: could not open secret file " ETCPAMDIR "/ldap.secret (%s)", strerror (errno)); } } @ 1.1 log @Initial revision @ text @d1 1 a1 1 $NetBSD$ @ 1.1.1.1 log @Initial import of pam-ldap-77, a pluggable authentication module for LDAP directories @ text @@