summaryrefslogtreecommitdiff
blob: a52e6d7ae1288db403d7fcaa6034160cf4c7628f (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
Use of tainted arguments in exec is deprecated at /var/www/cgi-bin/cvsweb.cgi line 2043.
===================================================================
RCS file: /home2/webcvs/mirror/kdebase/kioslave/ldap/configure.in.in,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -p -r1.18 -r1.19
--- kioslave/ldap/configure.in.in	2004/02/12 20:14:04	1.18
+++ kioslave/ldap/configure.in.in	2004/08/29 14:50:59	1.19
@@ -95,7 +95,7 @@ NOTFOUND) AC_MSG_RESULT(searched but not
   ;;
 esac
 
-AC_CHECK_HEADERS(sasl.h)
+AC_CHECK_HEADERS(sasl/sasl.h sasl.h)
 
 AC_SUBST(LDAP_INCS)
 AC_SUBST(LDAP_LIBS)
Use of tainted arguments in exec is deprecated at /var/www/cgi-bin/cvsweb.cgi line 2043.
===================================================================
RCS file: /home2/webcvs/mirror/kdebase/kioslave/ldap/kio_ldap.cpp,v
retrieving revision 1.41
retrieving revision 1.41.2.1
diff -u -p -r1.41 -r1.41.2.1
--- kioslave/ldap/kio_ldap.cpp	2004/07/03 21:48:18	1.41
+++ kioslave/ldap/kio_ldap.cpp	2004/08/29 14:55:42	1.41.2.1
@@ -21,9 +21,13 @@
 #include <kinstance.h>
 #include <klocale.h>
 
+#ifdef HAVE_SASL_SASL_H //prefer libsasl2
+#include <sasl/sasl.h>
+#else
 #ifdef HAVE_SASL_H
 #include <sasl.h>
 #endif
+#endif
 #include <kabc/ldif.h>
 
 #include "kio_ldap.h"
@@ -506,7 +510,7 @@ typedef struct kldap_sasl_defaults_t {
   QString authzid;
 } kldap_sasl_defaults;
 
-#ifdef HAVE_SASL_H
+#if defined HAVE_SASL_H || defined HAVE_SASL_SASL_H
 static int kldap_sasl_interact( LDAP *, unsigned, void *defaults, void *in )
 {
   sasl_interact_t *interact = ( sasl_interact_t * ) in;
@@ -644,7 +648,7 @@ void LDAPProtocol::openConnection()
   while (!auth) {
     if ( mAuthSASL ) {
       kdDebug(7125) << "sasl_authentication mechanism:" << mechanism << endl;
-#ifdef HAVE_SASL_H      
+#if defined HAVE_SASL_H || defined HAVE_SASL_SASL_H
       defaults.realm = mRealm;
       defaults.authcid = mUser;
       defaults.passwd = mPassword;
@@ -658,7 +662,7 @@ void LDAPProtocol::openConnection()
     }
     kdDebug(7125) << "user: " << mUser << " bindname: " << mBindName << endl;
     if ( ( !mAuthSASL && mPassword.isEmpty() && !mBindName.isEmpty() ) || ( ret = ( 
-#ifdef HAVE_SASL_H      
+#if defined HAVE_SASL_H || defined HAVE_SASL_SASL_H
       mAuthSASL ? 
         ldap_sasl_interactive_bind_s( mLDAP, NULL, mechanism.utf8(), 
           NULL, NULL, LDAP_SASL_QUIET, &kldap_sasl_interact, &defaults ) :