summaryrefslogtreecommitdiff
path: root/www
diff options
context:
space:
mode:
authorjlam <jlam@pkgsrc.org>2007-09-07 23:01:59 +0000
committerjlam <jlam@pkgsrc.org>2007-09-07 23:01:59 +0000
commite16856228230fc00d9f6bd0ac42b97194c35d5be (patch)
tree0b94521bdf546998a4f32a278820b24830da98f1 /www
parentb295235413b4a9800a2c36666f5c9b1adc33b4af (diff)
downloadpkgsrc-e16856228230fc00d9f6bd0ac42b97194c35d5be.tar.gz
auth-bozo.c cheats and assumes that libcrypto.so is linked against
libcrypt.so and so just include <unistd.h> is enough to use crypt(). This doesn't work when the assumption fails. Since we always build with SSL support in pkgsrc, just use the DES_crypt() from the OpenSSL libraries.
Diffstat (limited to 'www')
-rw-r--r--www/bozohttpd/distinfo3
-rw-r--r--www/bozohttpd/patches/patch-aa26
2 files changed, 28 insertions, 1 deletions
diff --git a/www/bozohttpd/distinfo b/www/bozohttpd/distinfo
index 435b6c5c7f0..eeef201ceae 100644
--- a/www/bozohttpd/distinfo
+++ b/www/bozohttpd/distinfo
@@ -1,5 +1,6 @@
-$NetBSD: distinfo,v 1.41 2006/05/18 02:48:53 rpaulo Exp $
+$NetBSD: distinfo,v 1.42 2007/09/07 23:01:59 jlam Exp $
SHA1 (bozohttpd-20060517.tar.bz2) = 45ed3c268fffc884db93ebc975121b7c79060fa8
RMD160 (bozohttpd-20060517.tar.bz2) = edf15fe2998ca2fae0035f8380639e8741d0406a
Size (bozohttpd-20060517.tar.bz2) = 33032 bytes
+SHA1 (patch-aa) = f1934786cb309cee8ec1c77e0760ee1e79b90f8f
diff --git a/www/bozohttpd/patches/patch-aa b/www/bozohttpd/patches/patch-aa
new file mode 100644
index 00000000000..4ed13e14168
--- /dev/null
+++ b/www/bozohttpd/patches/patch-aa
@@ -0,0 +1,26 @@
+$NetBSD: patch-aa,v 1.17 2007/09/07 23:01:59 jlam Exp $
+
+--- auth-bozo.c.orig Wed May 17 08:19:10 2006
++++ auth-bozo.c
+@@ -37,7 +37,12 @@
+ #include <sys/param.h>
+
+ #include <string.h>
++
++#ifndef NO_SSL_SUPPORT
++#include <openssl/des.h>
++#else
+ #include <unistd.h>
++#endif
+
+ #include "bozohttpd.h"
+
+@@ -97,7 +102,7 @@ auth_check(http_req *request, const char
+ request->hr_authpass));
+ if (strcmp(request->hr_authuser, user) != 0)
+ continue;
+- if (strcmp(crypt(request->hr_authpass, pass), pass))
++ if (strcmp(DES_crypt(request->hr_authpass, pass), pass))
+ break;
+ fclose(fp);
+ return;