summaryrefslogtreecommitdiff
path: root/security/openssh/patches
diff options
context:
space:
mode:
authoritojun <itojun@pkgsrc.org>2000-05-31 15:32:44 +0000
committeritojun <itojun@pkgsrc.org>2000-05-31 15:32:44 +0000
commite1270396ddf04d55aa2b5f8825e2ce3655021457 (patch)
treed4736c8127eb172cf35deb8aad91c8e5de85584a /security/openssh/patches
parent82a9b0ca8e70646e3e0a6dacf42897992a17a8ce (diff)
downloadpkgsrc-e1270396ddf04d55aa2b5f8825e2ce3655021457.tar.gz
upgrade to 2.1.0p3.
there are too many changes to mention here. the biggest change would be the addition of SSH protocol version 2 (uses DSA).
Diffstat (limited to 'security/openssh/patches')
-rw-r--r--security/openssh/patches/patch-aa45
-rw-r--r--security/openssh/patches/patch-ab59
-rw-r--r--security/openssh/patches/patch-ad13
-rw-r--r--security/openssh/patches/patch-af14
-rw-r--r--security/openssh/patches/patch-ah22
-rw-r--r--security/openssh/patches/patch-ai12
-rw-r--r--security/openssh/patches/patch-ak12
7 files changed, 49 insertions, 128 deletions
diff --git a/security/openssh/patches/patch-aa b/security/openssh/patches/patch-aa
index 37dcf14abe1..56f3f09ef0e 100644
--- a/security/openssh/patches/patch-aa
+++ b/security/openssh/patches/patch-aa
@@ -1,41 +1,14 @@
-$NetBSD: patch-aa,v 1.6 2000/03/27 00:01:17 fredb Exp $
+$NetBSD: patch-aa,v 1.7 2000/05/31 15:32:44 itojun Exp $
---- configure.orig Thu Mar 23 16:28:48 2000
-+++ configure Sun Mar 26 17:32:51 2000
-@@ -2427,9 +2427,11 @@
-
- #include <sys/types.h>
- #include <sys/socket.h>
-+ #include <string.h>
-
- int main() {
- struct sockaddr_storage s;
-+memset(&s, 0, sizeof(s));
- ; return 0; }
- EOF
- if { (eval echo configure:2436: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
-@@ -2455,6 +2457,7 @@
- cat > conftest.$ac_ext <<EOF
- #line 2457 "configure"
- #include "confdefs.h"
+--- configure.in Tue May 30 11:57:47 2000
++++ configure.in Wed May 31 18:31:52 2000
+@@ -447,3 +447,5 @@
+ [
+#include <sys/types.h>
#include <netinet/in.h>
- int main() {
- struct sockaddr_in6 s; s.sin6_family = 0;
-@@ -2483,6 +2486,7 @@
- cat > conftest.$ac_ext <<EOF
- #line 2485 "configure"
- #include "confdefs.h"
++#include <sys/socket.h>
+ ],
+@@ -461,2 +463,3 @@
+ [
+#include <sys/types.h>
#include <netinet/in.h>
- int main() {
- struct in6_addr s; s.s6_addr[0] = 0;
-@@ -3149,7 +3153,7 @@
- if test "$cross_compiling" = yes; then
- { echo "configure: error: Cannot check for file existence when cross compiling" 1>&2; exit 1; }
- else
-- if test -r "/dev/urandom"; then
-+ if test -r "/dev/urandom" && dd if=/dev/urandom of=/dev/null bs=1 count=1; then
- eval "ac_cv_file_$ac_safe=yes"
- else
- eval "ac_cv_file_$ac_safe=no"
diff --git a/security/openssh/patches/patch-ab b/security/openssh/patches/patch-ab
deleted file mode 100644
index 12af0e999d6..00000000000
--- a/security/openssh/patches/patch-ab
+++ /dev/null
@@ -1,59 +0,0 @@
-$NetBSD: patch-ab,v 1.1 2000/01/17 05:34:34 christos Exp $
-
---- fake-getaddrinfo.c.orig Sun Jan 16 23:45:39 2000
-+++ fake-getaddrinfo.c Sun Jan 16 23:47:45 2000
-@@ -41,7 +41,7 @@
- do {
- next = ai->ai_next;
- free(ai);
-- } while (ai = next);
-+ } while ((ai = next) != NULL);
- }
- #endif /* !HAVE_FREEADDRINFO */
-
-@@ -53,8 +53,8 @@
- {
- struct addrinfo *ai;
-
-- if (ai = (struct addrinfo *)malloc(sizeof(struct addrinfo) +
-- sizeof(struct sockaddr_in))) {
-+ if ((ai = (struct addrinfo *)malloc(sizeof(struct addrinfo) +
-+ sizeof(struct sockaddr_in))) != NULL) {
- memset(ai, 0, sizeof(struct addrinfo) + sizeof(struct sockaddr_in));
- ai->ai_addr = (struct sockaddr *)(ai + 1);
- /* XXX -- ssh doesn't use sa_len */
-@@ -83,25 +83,27 @@
- else
- port = 0;
- if (hints && hints->ai_flags & AI_PASSIVE)
-- if (*res = malloc_ai(port, htonl(0x00000000)))
-+ if ((*res = malloc_ai(port, htonl(0x00000000))) != NULL)
- return 0;
- else
- return EAI_MEMORY;
-- if (!hostname)
-- if (*res = malloc_ai(port, htonl(0x7f000001)))
-+ if (!hostname) {
-+ if ((*res = malloc_ai(port, htonl(0x7f000001))) != NULL)
- return 0;
- else
- return EAI_MEMORY;
-- if (inet_addr(hostname) != -1)
-- if (*res = malloc_ai(port, inet_addr(hostname)))
-+ }
-+ if (inet_addr(hostname) != -1) {
-+ if ((*res = malloc_ai(port, inet_addr(hostname))) != NULL)
- return 0;
- else
- return EAI_MEMORY;
-+ }
- if ((hp = gethostbyname(hostname)) &&
- hp->h_name && hp->h_name[0] && hp->h_addr_list[0]) {
- for (i = 0; hp->h_addr_list[i]; i++)
-- if (cur = malloc_ai(port,
-- ((struct in_addr *)hp->h_addr_list[i])->s_addr)) {
-+ if ((cur = malloc_ai(port,
-+ ((struct in_addr *)hp->h_addr_list[i])->s_addr)) != NULL) {
- if (prev)
- prev->ai_next = cur;
- else
diff --git a/security/openssh/patches/patch-ad b/security/openssh/patches/patch-ad
index 96a2ebc7d93..9573514ce52 100644
--- a/security/openssh/patches/patch-ad
+++ b/security/openssh/patches/patch-ad
@@ -1,7 +1,7 @@
-$NetBSD: patch-ad,v 1.1 2000/01/17 05:34:34 christos Exp $
+$NetBSD: patch-ad,v 1.2 2000/05/31 15:32:44 itojun Exp $
---- fake-getnameinfo.c.orig Sun Jan 16 23:45:45 2000
-+++ fake-getnameinfo.c Sun Jan 16 23:48:01 2000
+--- fake-getnameinfo.c- Wed May 31 18:50:37 2000
++++ fake-getnameinfo.c Wed May 31 18:51:02 2000
@@ -37,25 +37,27 @@
else
strcpy(serv, tmpserv);
@@ -17,11 +17,10 @@ $NetBSD: patch-ad,v 1.1 2000/01/17 05:34:34 christos Exp $
return 0;
}
- else
-- if (hp = gethostbyaddr((char *)&sin->sin_addr, sizeof(struct in_addr),
-- AF_INET))
+ } else {
-+ if ((hp = gethostbyaddr((char *)&sin->sin_addr, sizeof(struct in_addr),
-+ AF_INET)) != NULL) {
+ if (NULL != (hp = gethostbyaddr((char *)&sin->sin_addr,
+- sizeof(struct in_addr), AF_INET)))
++ sizeof(struct in_addr), AF_INET))) {
if (strlen(hp->h_name) > hostlen)
return EAI_MEMORY;
else {
diff --git a/security/openssh/patches/patch-af b/security/openssh/patches/patch-af
index 241d0cacc2a..73eac1d33a0 100644
--- a/security/openssh/patches/patch-af
+++ b/security/openssh/patches/patch-af
@@ -1,11 +1,11 @@
-$NetBSD: patch-af,v 1.3 2000/03/27 00:59:13 fredb Exp $
+$NetBSD: patch-af,v 1.4 2000/05/31 15:32:44 itojun Exp $
---- ssh-agent.1.orig Sat Jan 22 02:57:40 2000
-+++ ssh-agent.1 Sun Mar 26 18:43:55 2000
-@@ -126,6 +126,7 @@
- authentication agent. These sockets should only be readable by the
- owner. The sockets should get automatically removed when the agent
- exits.
+--- ssh-agent.1- Wed May 31 18:52:51 2000
++++ ssh-agent.1 Wed May 31 18:52:33 2000
+@@ -133,6 +133,7 @@
+ authentication agent.
+ These sockets should only be readable by the owner.
+ The sockets should get automatically removed when the agent exits.
+.El
.Sh AUTHOR
Tatu Ylonen <ylo@cs.hut.fi>
diff --git a/security/openssh/patches/patch-ah b/security/openssh/patches/patch-ah
index 0649063bd76..c15b1b265ae 100644
--- a/security/openssh/patches/patch-ah
+++ b/security/openssh/patches/patch-ah
@@ -1,7 +1,7 @@
-$NetBSD: patch-ah,v 1.4 2000/03/27 00:59:13 fredb Exp $
+$NetBSD: patch-ah,v 1.5 2000/05/31 15:32:44 itojun Exp $
---- Makefile.in.orig Thu Mar 16 08:48:26 2000
-+++ Makefile.in Sun Mar 26 23:19:20 2000
+--- Makefile.in.orig Sat May 20 14:33:44 2000
++++ Makefile.in Wed May 31 18:55:11 2000
@@ -6,6 +6,7 @@
mandir=@mandir@
mansubdir=@mansubdir@
@@ -10,29 +10,37 @@ $NetBSD: patch-ah,v 1.4 2000/03/27 00:59:13 fredb Exp $
piddir=@piddir@
srcdir=@srcdir@
top_srcdir=@top_srcdir@
-@@ -118,19 +119,19 @@
+@@ -131,14 +132,14 @@
-rm -f $(DESTDIR)$(mandir)/$(mansubdir)1/slogin.1
ln -s ssh.1 $(DESTDIR)$(mandir)/$(mansubdir)1/slogin.1
- if [ ! -f $(DESTDIR)$(sysconfdir)/ssh_config -a ! -f $(DESTDIR)$(sysconfdir)/sshd_config ]; then \
-- $(INSTALL) -d $(DESTDIR)$(sysconfdir); \
+- ./mkinstalldirs $(DESTDIR)$(sysconfdir); \
- $(INSTALL) -m 644 ssh_config.out $(DESTDIR)$(sysconfdir)/ssh_config; \
- $(INSTALL) -m 644 sshd_config.out $(DESTDIR)$(sysconfdir)/sshd_config; \
+ if [ ! -f $(DESTDIR)$(examplesdir)/ssh_config -a ! -f $(DESTDIR)$(examplesdir)/sshd_config ]; then \
-+ $(INSTALL) -d $(DESTDIR)$(examplesdir); \
++ ./mkinstalldirs $(DESTDIR)$(examplesdir); \
+ $(INSTALL) -m 644 ssh_config.out $(DESTDIR)$(examplesdir)/ssh_config; \
+ $(INSTALL) -m 644 sshd_config.out $(DESTDIR)$(examplesdir)/sshd_config; \
fi
+ if [ -f ssh_prng_cmds -a ! -z "$(INSTALL_SSH_PRNG_CMDS)" ]; then \
+ $(PERL) fixprogs ssh_prng_cmds $(ENT); \
+- $(INSTALL) -m 644 ssh_prng_cmds.out $(DESTDIR)$(sysconfdir)/ssh_prng_cmds; \
++ $(INSTALL) -m 644 ssh_prng_cmds.out $(DESTDIR)$(examplesdir)/ssh_prng_cmds; \
+ fi
host-key: ssh-keygen
- ./ssh-keygen -b 1024 -f $(sysconfdir)/ssh_host_key -N ''
+@@ -146,10 +147,10 @@
+ ./ssh-keygen -d -f $(sysconfdir)/ssh_host_dsa_key -N ""
uninstallall: uninstall
- -rm -f $(DESTDIR)$(sysconfdir)/ssh_config
- -rm -f $(DESTDIR)$(sysconfdir)/sshd_config
+- -rm -f $(DESTDIR)$(sysconfdir)/ssh_prng_cmds
- -rmdir $(DESTDIR)$(sysconfdir)
+ -rm -f $(DESTDIR)$(examplesdir)/ssh_config
+ -rm -f $(DESTDIR)$(examplesdir)/sshd_config
++ -rm -f $(DESTDIR)$(examplesdir)/ssh_prng_cmds
+ -rmdir $(DESTDIR)$(examplesdir)
-rmdir $(DESTDIR)$(bindir)
-rmdir $(DESTDIR)$(sbindir)
diff --git a/security/openssh/patches/patch-ai b/security/openssh/patches/patch-ai
index ebf1fb8192e..ce21a10b93d 100644
--- a/security/openssh/patches/patch-ai
+++ b/security/openssh/patches/patch-ai
@@ -1,11 +1,11 @@
-$NetBSD: patch-ai,v 1.1 2000/03/27 00:59:13 fredb Exp $
+$NetBSD: patch-ai,v 1.2 2000/05/31 15:32:44 itojun Exp $
---- ssh-keygen.1.orig Sat Jan 22 02:57:40 2000
-+++ ssh-keygen.1 Sun Mar 26 18:45:41 2000
-@@ -124,6 +124,7 @@
+--- ssh-keygen.1- Wed May 31 18:55:33 2000
++++ ssh-keygen.1 Wed May 31 18:55:48 2000
+@@ -188,6 +188,7 @@
on all machines
- where you wish to log in using RSA authentication. There is no
- need to keep the contents of this file secret.
+ where you wish to log in using DSA authentication.
+ There is no need to keep the contents of this file secret.
+.El
.Sh AUTHOR
Tatu Ylonen <ylo@cs.hut.fi>
diff --git a/security/openssh/patches/patch-ak b/security/openssh/patches/patch-ak
index e890751c707..3e6acd0829b 100644
--- a/security/openssh/patches/patch-ak
+++ b/security/openssh/patches/patch-ak
@@ -1,11 +1,11 @@
-$NetBSD: patch-ak,v 1.1 2000/03/27 01:33:08 fredb Exp $
+$NetBSD: patch-ak,v 1.2 2000/05/31 15:32:44 itojun Exp $
---- sshd.8.orig Fri Mar 17 06:40:18 2000
-+++ sshd.8 Sun Mar 26 19:29:22 2000
-@@ -765,6 +765,7 @@
+--- sshd.8- Wed May 31 18:56:16 2000
++++ sshd.8 Wed May 31 18:56:26 2000
+@@ -940,6 +940,7 @@
This can be used to specify
- machine-specific login-time initializations globally. This file
- should be writable only by root, and should be world-readable.
+ machine-specific login-time initializations globally.
+ This file should be writable only by root, and should be world-readable.
+.El
.Sh AUTHOR
OpenSSH