diff options
author | jlam <jlam@pkgsrc.org> | 2007-09-07 23:01:59 +0000 |
---|---|---|
committer | jlam <jlam@pkgsrc.org> | 2007-09-07 23:01:59 +0000 |
commit | c2860d2f12654c33c36dd17be38ecb2391e89835 (patch) | |
tree | 0b94521bdf546998a4f32a278820b24830da98f1 /www/bozohttpd | |
parent | 7deab2d49da392bb4cb3aeabd26fdb4aa0563bbe (diff) | |
download | pkgsrc-c2860d2f12654c33c36dd17be38ecb2391e89835.tar.gz |
auth-bozo.c cheats and assumes that libcrypto.so is linked against
libcrypt.so and so just include <unistd.h> is enough to use crypt().
This doesn't work when the assumption fails. Since we always build
with SSL support in pkgsrc, just use the DES_crypt() from the OpenSSL
libraries.
Diffstat (limited to 'www/bozohttpd')
-rw-r--r-- | www/bozohttpd/distinfo | 3 | ||||
-rw-r--r-- | www/bozohttpd/patches/patch-aa | 26 |
2 files changed, 28 insertions, 1 deletions
diff --git a/www/bozohttpd/distinfo b/www/bozohttpd/distinfo index 435b6c5c7f0..eeef201ceae 100644 --- a/www/bozohttpd/distinfo +++ b/www/bozohttpd/distinfo @@ -1,5 +1,6 @@ -$NetBSD: distinfo,v 1.41 2006/05/18 02:48:53 rpaulo Exp $ +$NetBSD: distinfo,v 1.42 2007/09/07 23:01:59 jlam Exp $ SHA1 (bozohttpd-20060517.tar.bz2) = 45ed3c268fffc884db93ebc975121b7c79060fa8 RMD160 (bozohttpd-20060517.tar.bz2) = edf15fe2998ca2fae0035f8380639e8741d0406a Size (bozohttpd-20060517.tar.bz2) = 33032 bytes +SHA1 (patch-aa) = f1934786cb309cee8ec1c77e0760ee1e79b90f8f diff --git a/www/bozohttpd/patches/patch-aa b/www/bozohttpd/patches/patch-aa new file mode 100644 index 00000000000..4ed13e14168 --- /dev/null +++ b/www/bozohttpd/patches/patch-aa @@ -0,0 +1,26 @@ +$NetBSD: patch-aa,v 1.17 2007/09/07 23:01:59 jlam Exp $ + +--- auth-bozo.c.orig Wed May 17 08:19:10 2006 ++++ auth-bozo.c +@@ -37,7 +37,12 @@ + #include <sys/param.h> + + #include <string.h> ++ ++#ifndef NO_SSL_SUPPORT ++#include <openssl/des.h> ++#else + #include <unistd.h> ++#endif + + #include "bozohttpd.h" + +@@ -97,7 +102,7 @@ auth_check(http_req *request, const char + request->hr_authpass)); + if (strcmp(request->hr_authuser, user) != 0) + continue; +- if (strcmp(crypt(request->hr_authpass, pass), pass)) ++ if (strcmp(DES_crypt(request->hr_authpass, pass), pass)) + break; + fclose(fp); + return; |