[packages/adcli] - updated to 0.9.2
qboosh
qboosh at pld-linux.org
Sun Mar 2 11:39:50 CET 2025
commit 7c22bf21e44be303c041d053e3fa12161f38b90e
Author: Jakub Bogusz <qboosh at pld-linux.org>
Date: Sun Mar 2 10:39:50 2025 +0100
- updated to 0.9.2
adcli-heimdal.patch | 165 ++++++++++++++++++++++++++++++++++++++++++++++------
adcli.spec | 7 ++-
2 files changed, 151 insertions(+), 21 deletions(-)
---
diff --git a/adcli.spec b/adcli.spec
index 81298e8..edf0b33 100644
--- a/adcli.spec
+++ b/adcli.spec
@@ -6,12 +6,13 @@
Summary: Helper library and tools for Active Directory client operations
Summary(pl.UTF-8): Biblioteka pomocnicza i narzędzia do operacji klienckich usługi Active Directory
Name: adcli
-Version: 0.8.2
+Version: 0.9.2
Release: 1
License: LGPL v2+
Group: Applications/System
-Source0: https://www.freedesktop.org/software/realmd/releases/%{name}-%{version}.tar.gz
-# Source0-md5: 921848209eeb8ca7ec9685243806af26
+#Source0Download: https://gitlab.freedesktop.org/realmd/adcli/-/releases
+Source0: https://gitlab.freedesktop.org/realmd/adcli/uploads/ea560656ac921b3fe0d455976aaae9be/%{name}-%{version}.tar.gz
+# Source0-md5: 7f6ae35ac2c16632812641c724b32e30
Patch0: %{name}-heimdal.patch
URL: https://www.freedesktop.org/software/realmd/adcli/
BuildRequires: cyrus-sasl-devel
diff --git a/adcli-heimdal.patch b/adcli-heimdal.patch
index 9a146b6..553aa5c 100644
--- a/adcli-heimdal.patch
+++ b/adcli-heimdal.patch
@@ -76,8 +76,8 @@
#include <ldap.h>
typedef enum {
---- adcli-0.8.1/library/adenroll.c.orig 2015-12-11 11:37:01.000000000 +0100
-+++ adcli-0.8.1/library/adenroll.c 2016-01-25 17:48:42.724601210 +0100
+--- adcli-0.9.2/library/adenroll.c.orig 2022-09-28 13:23:05.000000000 +0200
++++ adcli-0.9.2/library/adenroll.c 2025-03-02 10:27:04.407010335 +0100
@@ -28,7 +28,7 @@
#include "seq.h"
@@ -87,7 +87,16 @@
#include <ldap.h>
#include <sasl/sasl.h>
-@@ -855,7 +855,7 @@ set_password_with_user_creds (adcli_enro
+@@ -774,7 +774,7 @@ calculate_enctypes (adcli_enroll *enroll
+ }
+
+ new_value = _adcli_krb5_format_enctypes (new_enctypes);
+- krb5_free_enctypes (adcli_conn_get_krb5_context (enroll->conn), new_enctypes);
++ krb5_xfree (new_enctypes);
+ if (new_value == NULL) {
+ free (value);
+ _adcli_warn ("The encryption types desired are not available in active directory");
+@@ -1542,7 +1542,7 @@ set_password_with_user_creds (adcli_enro
message ? ": " : "", message ? message : "");
res = ADCLI_ERR_CREDENTIALS;
#ifdef HAVE_KRB5_CHPW_MESSAGE
@@ -96,7 +105,7 @@
#else
free (message);
#endif
-@@ -919,7 +919,7 @@ set_password_with_computer_creds (adcli_
+@@ -1614,7 +1614,7 @@ set_password_with_computer_creds (adcli_
message ? ": " : "", message ? message : "");
res = ADCLI_ERR_CREDENTIALS;
#ifdef HAVE_KRB5_CHPW_MESSAGE
@@ -105,7 +114,7 @@
#else
free (message);
#endif
-@@ -1245,10 +1245,10 @@ ensure_host_keytab (adcli_result res,
+@@ -2010,10 +2010,10 @@ ensure_host_keytab (adcli_result res,
return res;
if (!enroll->keytab_name) {
@@ -118,7 +127,7 @@
return_unexpected_if_fail (code == 0);
enroll->keytab_name = name;
-@@ -1274,13 +1274,13 @@ load_keytab_entry (krb5_context k5,
+@@ -2039,13 +2039,13 @@ load_keytab_entry (krb5_context k5,
/* Skip over any entry without a principal or realm */
principal = entry->principal;
@@ -134,7 +143,7 @@
adcli_conn_set_domain_realm (enroll->conn, value);
_adcli_info ("Found realm in keytab: %s", value);
realm = adcli_conn_get_domain_realm (enroll->conn);
-@@ -1289,7 +1289,7 @@ load_keytab_entry (krb5_context k5,
+@@ -2054,7 +2054,7 @@ load_keytab_entry (krb5_context k5,
/* Only look at entries that match the realm */
len = strlen (realm);
@@ -143,7 +152,7 @@
return TRUE;
code = krb5_unparse_name_flags (k5, principal, KRB5_PRINCIPAL_UNPARSE_NO_REALM, &name);
-@@ -1396,6 +1396,7 @@ build_principal_salts (adcli_enroll *enr
+@@ -2164,6 +2164,7 @@ build_principal_salts (adcli_enroll *enr
{
krb5_error_code code;
krb5_data *salts;
@@ -151,7 +160,7 @@
const int count = 3;
int i = 0;
-@@ -1403,8 +1404,9 @@ build_principal_salts (adcli_enroll *enr
+@@ -2171,8 +2172,9 @@ build_principal_salts (adcli_enroll *enr
return_val_if_fail (salts != NULL, NULL);
/* Build up the salts, first a standard kerberos salt */
@@ -162,7 +171,37 @@
/* Then a Windows 2003 computer account salt */
code = _adcli_krb5_w2k3_salt (k5, principal, enroll->computer_name, &salts[i++]);
-@@ -2123,7 +2125,7 @@ adcli_enroll_set_keytab_name (adcli_enro
+@@ -2287,7 +2289,7 @@ add_principal_to_keytab (adcli_enroll *e
+
+ salts = build_principal_salts (enroll, k5, principal);
+ if (salts == NULL) {
+- krb5_free_enctypes (k5, enctypes);
++ krb5_xfree (enctypes);
+ return ADCLI_ERR_UNEXPECTED;
+ }
+
+@@ -2309,7 +2311,7 @@ add_principal_to_keytab (adcli_enroll *e
+
+ free_principal_salts (k5, salts);
+ }
+- krb5_free_enctypes (k5, enctypes);
++ krb5_xfree (enctypes);
+
+ if (code != 0) {
+ _adcli_err ("Couldn't add keytab entries: %s: %s",
+@@ -2660,7 +2662,11 @@ adcli_enroll_add_keytab_for_service_acco
+ adcli_result res;
+ krb5_context k5;
+ krb5_error_code code;
++#ifdef MAX_KEYTAB_NAME_LEN
+ char def_keytab_name[MAX_KEYTAB_NAME_LEN];
++#else
++ char def_keytab_name[1100];
++#endif
+ char *lc_dom_name;
+ int ret;
+
+@@ -3214,7 +3220,7 @@ adcli_enroll_set_keytab_name (adcli_enro
if (enroll->keytab_name_is_krb5) {
k5 = adcli_conn_get_krb5_context (enroll->conn);
return_if_fail (k5 != NULL);
@@ -171,8 +210,55 @@
} else {
free (enroll->keytab_name);
}
---- adcli-0.7.5/library/adkrb5.c.orig 2013-04-17 22:57:03.000000000 +0200
-+++ adcli-0.7.5/library/adkrb5.c 2014-12-23 19:50:58.044401806 +0100
+@@ -3300,7 +3306,7 @@ adcli_enroll_get_permitted_keytab_enctyp
+
+ new_enctypes = calloc (c + 1, sizeof (krb5_enctype));
+ if (new_enctypes == NULL) {
+- krb5_free_enctypes (k5, permitted_enctypes);
++ krb5_xfree (permitted_enctypes);
+ return NULL;
+ }
+
+@@ -3317,7 +3323,7 @@ adcli_enroll_get_permitted_keytab_enctyp
+ }
+ }
+
+- krb5_free_enctypes (k5, permitted_enctypes);
++ krb5_xfree (permitted_enctypes);
+
+ return new_enctypes;
+ }
+@@ -3723,11 +3729,15 @@ test_adcli_enroll_get_permitted_keytab_e
+ assert_num_eq (enctypes[c], permitted_enctypes[c]);
+ }
+ assert_num_eq (enctypes[c], 0);
+- krb5_free_enctypes (k5, enctypes);
++ krb5_xfree (enctypes);
+
+ /* check that ENCTYPE_UNKNOWN is filtered out */
+ check_enctypes[0] = permitted_enctypes[0];
++#ifdef ENCTYPE_UNKNOWN
+ check_enctypes[1] = ENCTYPE_UNKNOWN;
++#else
++ check_enctypes[1] = 0x1ff;
++#endif
+ check_enctypes[2] = 0;
+ adcli_enroll_set_keytab_enctypes (enroll, check_enctypes);
+
+@@ -3735,9 +3745,9 @@ test_adcli_enroll_get_permitted_keytab_e
+ assert_ptr_not_null (enctypes);
+ assert_num_eq (enctypes[0], permitted_enctypes[0]);
+ assert_num_eq (enctypes[1], 0);
+- krb5_free_enctypes (k5, enctypes);
++ krb5_xfree (enctypes);
+
+- krb5_free_enctypes (k5, permitted_enctypes);
++ krb5_xfree (permitted_enctypes);
+
+ adcli_enroll_unref (enroll);
+ adcli_conn_unref (conn);
+--- adcli-0.9.2/library/adkrb5.c.orig 2022-04-29 07:30:33.000000000 +0200
++++ adcli-0.9.2/library/adkrb5.c 2025-03-02 10:11:23.548774068 +0100
@@ -27,7 +27,7 @@
#include "adprivate.h"
@@ -182,7 +268,7 @@
#include <assert.h>
#include <ctype.h>
-@@ -78,7 +78,7 @@ _adcli_krb5_keytab_clear (krb5_context k
+@@ -82,7 +82,7 @@ _adcli_krb5_keytab_clear (krb5_context k
/* See if we should remove this entry */
if (!match_func (k5, &entry, match_data)) {
@@ -191,7 +277,7 @@
continue;
}
-@@ -91,7 +91,7 @@ _adcli_krb5_keytab_clear (krb5_context k
+@@ -95,7 +95,7 @@ _adcli_krb5_keytab_clear (krb5_context k
return_val_if_fail (code == 0, code);
code = krb5_kt_remove_entry (k5, keytab, &entry);
@@ -200,7 +286,50 @@
if (code != 0)
return code;
-@@ -138,9 +138,10 @@ _adcli_krb5_keytab_add_entries (krb5_con
+@@ -225,7 +225,7 @@ match_enctype_and_kvno (krb5_context k5,
+
+ assert (closure->enctype);
+
+- code = krb5_c_enctype_compare (k5, closure->enctype, entry->key.enctype,
++ code = krb5_c_enctype_compare (k5, closure->enctype, krb5_keyblock_get_enctype(&entry->keyblock),
+ &similar);
+
+ if (code == 0 && entry->vno == closure->kvno && similar) {
+@@ -262,12 +262,12 @@ _adcli_krb5_get_keyblock (krb5_context k
+
+ /* See if we should remove this entry */
+ if (!match_func (k5, &entry, match_data)) {
+- krb5_free_keytab_entry_contents (k5, &entry);
++ krb5_kt_free_entry (k5, &entry);
+ continue;
+ }
+
+- code = krb5_copy_keyblock_contents (k5, &entry.key, keyblock);
+- krb5_free_keytab_entry_contents (k5, &entry);
++ code = krb5_copy_keyblock_contents (k5, &entry.keyblock, keyblock);
++ krb5_kt_free_entry (k5, &entry);
+ break;
+
+
+@@ -300,7 +300,7 @@ _adcli_krb5_keytab_copy_entries (krb5_co
+
+ memset (&entry, 0, sizeof (entry));
+
+- code = _adcli_krb5_get_keyblock (k5, keytab, &entry.key,
++ code = _adcli_krb5_get_keyblock (k5, keytab, &entry.keyblock,
+ match_enctype_and_kvno, &closure);
+ if (code != 0 || closure.matched == 0) {
+ return code != 0 ? code : ENOKEY;
+@@ -312,7 +312,7 @@ _adcli_krb5_keytab_copy_entries (krb5_co
+ code = krb5_kt_add_entry (k5, keytab, &entry);
+
+ entry.principal = NULL;
+- krb5_free_keytab_entry_contents (k5, &entry);
++ krb5_kt_free_entry (k5, &entry);
+
+ if (code != 0)
+ return code;
+@@ -335,9 +335,10 @@ _adcli_krb5_keytab_add_entries (krb5_con
int i;
for (i = 0; enctypes[i] != 0; i++) {
@@ -212,7 +341,7 @@
if (code != 0)
return code;
-@@ -150,7 +151,7 @@ _adcli_krb5_keytab_add_entries (krb5_con
+@@ -347,7 +348,7 @@ _adcli_krb5_keytab_add_entries (krb5_con
code = krb5_kt_add_entry (k5, keytab, &entry);
entry.principal = NULL;
@@ -221,7 +350,7 @@
if (code != 0)
return code;
-@@ -225,11 +226,12 @@ _adcli_krb5_w2k3_salt (krb5_context k5,
+@@ -441,11 +442,12 @@ _adcli_krb5_w2k3_salt (krb5_context k5,
const char *host_netbios,
krb5_data *salt)
{
@@ -235,7 +364,7 @@
/*
* The format for the w2k3 computer account salt is:
-@@ -239,37 +241,37 @@ _adcli_krb5_w2k3_salt (krb5_context k5,
+@@ -455,37 +457,37 @@ _adcli_krb5_w2k3_salt (krb5_context k5,
realm = krb5_princ_realm (k5, principal);
host_length = strlen (host_netbios);
================================================================
---- gitweb:
http://git.pld-linux.org/gitweb.cgi/packages/adcli.git/commitdiff/7c22bf21e44be303c041d053e3fa12161f38b90e
More information about the pld-cvs-commit
mailing list