diff options
Diffstat (limited to 'security/ssh2/patches')
35 files changed, 0 insertions, 1300 deletions
diff --git a/security/ssh2/patches/patch-aa b/security/ssh2/patches/patch-aa deleted file mode 100644 index d0b99413a69..00000000000 --- a/security/ssh2/patches/patch-aa +++ /dev/null @@ -1,40 +0,0 @@ -$NetBSD: patch-aa,v 1.3 2003/08/12 19:08:56 seb Exp $ - ---- acconfig.h.orig 2003-06-30 12:22:25.000000000 +0000 -+++ acconfig.h -@@ -253,6 +253,10 @@ library. */ - and logwtmp() calls. */ - #undef HAVE_LIBUTIL_LOGIN - -+/* Define this if libutil.a contains loginx(), logoutx(), -+ and logwtmpx() calls. */ -+#undef HAVE_LIBUTIL_LOGINX -+ - /* Location of system mail spool directory. */ - #undef MAIL_SPOOL_DIRECTORY - -@@ -268,9 +272,15 @@ library. */ - /* Define this if a prototype for logout() is defined in system headers. */ - #undef HAVE_PROTO_LOGOUT - -+/* Define this if a prototype for logoutx() is defined in system headers. */ -+#undef HAVE_PROTO_LOGOUTX -+ - /* Define this if a prototype for logwtmp() is defined in system headers. */ - #undef HAVE_PROTO_LOGWTMP - -+/* Define this if a prototype for logwtmpx() is defined in system headers. */ -+#undef HAVE_PROTO_LOGWTMPX -+ - /* Define this if a prototype for initgroups() is defined in system headers. */ - #undef HAVE_PROTO_INITGROUPS - -@@ -425,6 +435,8 @@ library. */ - /* Define this to point to where sshd2 should store it's pidfile. */ - #undef SSHD_PIDDIR - -+/* Define if both utmp and utmpx entries should be handled */ -+#undef SSH_UTMP_UTMPX - - - diff --git a/security/ssh2/patches/patch-ab b/security/ssh2/patches/patch-ab deleted file mode 100644 index e472e95b411..00000000000 --- a/security/ssh2/patches/patch-ab +++ /dev/null @@ -1,121 +0,0 @@ -$NetBSD: patch-ab,v 1.3 2003/08/12 19:08:56 seb Exp $ - ---- apps/ssh/Makefile.am.orig 2003-06-30 12:22:11.000000000 +0000 -+++ apps/ssh/Makefile.am -@@ -18,7 +18,8 @@ WINCONF_OPTIONS = maintainer=sjl@ssh.com - etcdir = @ETCDIR@ - known_hosts_dir = $(etcdir)/knownhosts - host_keys_dir = $(etcdir)/hostkeys --subconfig_dir = $(etcdir)/subconfig -+egdir = $(prefix)/share/examples/${PKGBASE} -+subconfig_dir = $(egdir)/subconfig - STATIC_FLAG = @STATIC_FLAG@ - - # -@@ -569,13 +570,13 @@ COMPILE = $(CC) $(KERBEROS_INCS) $(INCLU - # - LINK = $(CCLD) $(AM_CFLAGS) $(CFLAGS) $(LDFLAGS) - # -+INSTALL_DATA_DIR= $(BSD_INSTALL_DATA_DIR) -+# - includes: - - make-install-dirs: -- -if test '!' -d $(DESTDIR)$(etcdir); then mkdir -p $(DESTDIR)$(etcdir); fi -- -if test '!' -d $(DESTDIR)$(known_hosts_dir); then mkdir -p $(DESTDIR)$(known_hosts_dir); fi -- -if test '!' -d $(DESTDIR)$(host_keys_dir); then mkdir -p $(DESTDIR)$(host_keys_dir); fi -- -if test '!' -d $(DESTDIR)$(subconfig_dir); then mkdir -p $(DESTDIR)$(subconfig_dir); fi -+ $(INSTALL_DATA_DIR) $(DESTDIR)$(egdir) -+ $(INSTALL_DATA_DIR) $(DESTDIR)$(subconfig_dir) - - generate-host-key: - -@if test -f $(DESTDIR)$(etcdir)/hostkey; \ -@@ -586,36 +587,20 @@ generate-host-key: - fi - - install-symlinks: -- -mv -f $(DESTDIR)$(bindir)/ssh $(DESTDIR)$(bindir)/ssh.old -- -mv -f $(DESTDIR)$(bindir)/ssh-agent $(DESTDIR)$(bindir)/ssh-agent.old -- -mv -f $(DESTDIR)$(bindir)/ssh-add $(DESTDIR)$(bindir)/ssh-add.old -- -mv -f $(DESTDIR)$(bindir)/ssh-askpass $(DESTDIR)$(bindir)/ssh-askpass.old -- -mv -f $(DESTDIR)$(bindir)/ssh-keygen $(DESTDIR)$(bindir)/ssh-keygen.old -- -mv -f $(DESTDIR)$(bindir)/scp $(DESTDIR)$(bindir)/scp.old -- -mv -f $(DESTDIR)$(bindir)/sftp $(DESTDIR)$(bindir)/sftp.old -- -mv -f $(DESTDIR)$(bindir)/sftp-server $(DESTDIR)$(bindir)/sftp-server.old -- -mv -f $(DESTDIR)$(bindir)/ssh-signer $(DESTDIR)$(bindir)/ssh-signer.old -- -mv -f $(DESTDIR)$(bindir)/ssh-probe $(DESTDIR)$(bindir)/ssh-probe.old -- - (cd $(DESTDIR)$(bindir) && $(LN_S) ssh2 ssh) - (cd $(DESTDIR)$(bindir) && $(LN_S) ssh-agent2 ssh-agent) - (cd $(DESTDIR)$(bindir) && $(LN_S) ssh-add2 ssh-add) -- (cd $(DESTDIR)$(bindir) && $(LN_S) ssh-askpass2 ssh-askpass) -+ case x"@CONFPROGRAMS@" in \ -+ x*askpass*) \ -+ (cd $(DESTDIR)$(bindir) && $(LN_S) ssh-askpass2 ssh-askpass) ;; \ -+ esac - (cd $(DESTDIR)$(bindir) && $(LN_S) ssh-keygen2 ssh-keygen) - (cd $(DESTDIR)$(bindir) && $(LN_S) scp2 scp) - (cd $(DESTDIR)$(bindir) && $(LN_S) sftp2 sftp) - (cd $(DESTDIR)$(bindir) && $(LN_S) sftp-server2 sftp-server) - (cd $(DESTDIR)$(bindir) && $(LN_S) ssh-signer2 ssh-signer) - (cd $(DESTDIR)$(bindir) && $(LN_S) ssh-probe2 ssh-probe) -- -mv -f $(DESTDIR)$(sbindir)/sshd $(DESTDIR)$(sbindir)/sshd.old - (cd $(DESTDIR)$(sbindir) && $(LN_S) sshd2 sshd) -- -mv -f $(DESTDIR)$(mandir)/man1/ssh.1 $(DESTDIR)$(mandir)/man1/ssh.old.1 -- -mv -f $(DESTDIR)$(mandir)/man1/ssh-add.1 $(DESTDIR)$(mandir)/man1/ssh-add.old.1 -- -mv -f $(DESTDIR)$(mandir)/man1/ssh-agent.1 $(DESTDIR)$(mandir)/man1/ssh-agent.old.1 -- -mv -f $(DESTDIR)$(mandir)/man1/ssh-keygen.1 $(DESTDIR)$(mandir)/man1/ssh-keygen.old.1 -- -mv -f $(DESTDIR)$(mandir)/man1/scp.1 $(DESTDIR)$(mandir)/man1/scp.old.1 -- -mv -f $(DESTDIR)$(mandir)/man1/sftp.1 $(DESTDIR)$(mandir)/man1/sftp.old.1 -- -mv -f $(DESTDIR)$(mandir)/man1/ssh-probe.1 $(DESTDIR)$(mandir)/man1/ssh-probe.old.1 - (cd $(DESTDIR)$(mandir)/man1 && $(LN_S) ssh2.1 ssh.1) - (cd $(DESTDIR)$(mandir)/man1 && $(LN_S) ssh-add2.1 ssh-add.1) - (cd $(DESTDIR)$(mandir)/man1 && $(LN_S) ssh-agent2.1 ssh-agent.1) -@@ -623,7 +608,6 @@ install-symlinks: - (cd $(DESTDIR)$(mandir)/man1 && $(LN_S) scp2.1 scp.1) - (cd $(DESTDIR)$(mandir)/man1 && $(LN_S) sftp2.1 sftp.1) - (cd $(DESTDIR)$(mandir)/man1 && $(LN_S) ssh-probe2.1 ssh-probe.1) -- -mv -f $(DESTDIR)$(mandir)/man8/sshd.8 $(DESTDIR)$(mandir)/man8/sshd.old.8 - (cd $(DESTDIR)$(mandir)/man8 && $(LN_S) sshd2.8 sshd.8) - - clean-up-old: -@@ -642,23 +626,13 @@ install-exec-hook: - -chown root $(DESTDIR)$(bindir)/ssh-signer2 - -chmod $(SSH_SIGNER_INSTALL_MODE) $(DESTDIR)$(bindir)/ssh-signer2 - --install-data-hook: make-install-dirs generate-host-key install-symlinks -- -@if test '!' -f $(DESTDIR)$(etcdir)/sshd2_config ; then \ -- echo Installing $(DESTDIR)$(etcdir)/sshd2_config ; \ -+install-data-hook: make-install-dirs install-symlinks -+ echo Installing $(DESTDIR)$(egdir)/sshd2_config ; \ - $(INSTALL_DATA) $(srcdir)/sshd2_config \ -- $(DESTDIR)$(etcdir)/sshd2_config ; \ -- fi -- echo Updating $(DESTDIR)$(etcdir)/sshd2_config.example ; -- $(INSTALL_DATA) $(srcdir)/sshd2_config \ -- $(DESTDIR)$(etcdir)/sshd2_config.example ; -- -@if test '!' -f $(DESTDIR)$(etcdir)/ssh2_config ; then \ -- echo Installing $(DESTDIR)$(etcdir)/ssh2_config ; \ -- $(INSTALL_DATA) $(srcdir)/ssh2_config \ -- $(DESTDIR)$(etcdir)/ssh2_config ; \ -- fi -- echo Updating $(DESTDIR)$(etcdir)/ssh2_config.example ; -+ $(DESTDIR)$(egdir)/sshd2_config ; -+ echo Installing $(DESTDIR)$(egdir)/ssh2_config ; \ - $(INSTALL_DATA) $(srcdir)/ssh2_config \ -- $(DESTDIR)$(etcdir)/ssh2_config.example ; -+ $(DESTDIR)$(egdir)/ssh2_config ; - echo Updating $(DESTDIR)$(subconfig_dir)/host_ext.example ; - $(INSTALL_DATA) $(srcdir)/subconfig/host_ext.example \ - $(DESTDIR)$(subconfig_dir)/host_ext.example ; -@@ -671,8 +645,6 @@ install-data-hook: make-install-dirs gen - echo Updating $(DESTDIR)$(subconfig_dir)/user.example ; - $(INSTALL_DATA) $(srcdir)/subconfig/user.example \ - $(DESTDIR)$(subconfig_dir)/user.example ; -- -@if test '!' -f $(DESTDIR)$(etcdir)/ssh_dummy_shell.out ; then \ -- echo Installing $(DESTDIR)$(etcdir)/ssh_dummy_shell.out ; \ -+ echo Installing $(DESTDIR)$(egdir)/ssh_dummy_shell.out ; \ - $(INSTALL_DATA) $(srcdir)/ssh_dummy_shell.out \ -- $(DESTDIR)$(etcdir)/ssh_dummy_shell.out ; \ -- fi -+ $(DESTDIR)$(egdir)/ssh_dummy_shell.out ; diff --git a/security/ssh2/patches/patch-ac b/security/ssh2/patches/patch-ac deleted file mode 100644 index 297df25e347..00000000000 --- a/security/ssh2/patches/patch-ac +++ /dev/null @@ -1,156 +0,0 @@ -$NetBSD: patch-ac,v 1.3 2004/07/25 12:29:19 grant Exp $ - ---- apps/ssh/Makefile.in.orig 2003-12-04 00:17:48.000000000 +1100 -+++ apps/ssh/Makefile.in -@@ -127,7 +127,8 @@ WINCONF_OPTIONS = maintainer=sjl@ssh.com - etcdir = @ETCDIR@ - known_hosts_dir = $(etcdir)/knownhosts - host_keys_dir = $(etcdir)/hostkeys --subconfig_dir = $(etcdir)/subconfig -+egdir = $(prefix)/share/examples/${PKGBASE} -+subconfig_dir = $(egdir)/subconfig - STATIC_FLAG = @STATIC_FLAG@ - - # -@@ -459,6 +460,8 @@ SSH_DEFS = -DETCDIR=\"$(etcdir)\" -DSSH_ - COMPILE = $(CC) $(KERBEROS_INCS) $(INCLUDES) $(SSH_DEFS) $(DEFS) $(CPPFLAGS) $(CFLAGS) $(X_CFLAGS) - # - LINK = $(CCLD) $(AM_CFLAGS) $(CFLAGS) $(LDFLAGS) -+# -+INSTALL_DATA_DIR = $(BSD_INSTALL_DATA_DIR) - mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs - CONFIG_HEADER = ../../sshconf.h - CONFIG_CLEAN_FILES = -@@ -874,7 +877,7 @@ TAGS: tags-recursive $(HEADERS) $(SOURCE - awk ' { files[$$0] = 1; } \ - END { for (i in files) print i; }'`; \ - test -z "$(ETAGS_ARGS)$$unique$(LISP)$$tags" \ -- || (cd $(srcdir) && etags -o $$here/TAGS $(ETAGS_ARGS) $$tags $$unique $(LISP)) -+ || (cd $(srcdir) && etags $(ETAGS_ARGS) $$tags $$unique $(LISP) -o $$here/TAGS) - - mostlyclean-tags: - -@@ -1005,10 +1008,8 @@ maintainer-clean-generic clean mostlycle - includes: - - make-install-dirs: -- -if test '!' -d $(DESTDIR)$(etcdir); then mkdir -p $(DESTDIR)$(etcdir); fi -- -if test '!' -d $(DESTDIR)$(known_hosts_dir); then mkdir -p $(DESTDIR)$(known_hosts_dir); fi -- -if test '!' -d $(DESTDIR)$(host_keys_dir); then mkdir -p $(DESTDIR)$(host_keys_dir); fi -- -if test '!' -d $(DESTDIR)$(subconfig_dir); then mkdir -p $(DESTDIR)$(subconfig_dir); fi -+ $(INSTALL_DATA_DIR) $(DESTDIR)$(egdir) -+ $(INSTALL_DATA_DIR) $(DESTDIR)$(subconfig_dir) - - generate-host-key: - -@if test -f $(DESTDIR)$(etcdir)/hostkey; \ -@@ -1019,45 +1020,28 @@ generate-host-key: - fi - - install-symlinks: -- -mv -f $(DESTDIR)$(bindir)/ssh $(DESTDIR)$(bindir)/ssh.old -- -mv -f $(DESTDIR)$(bindir)/ssh-agent $(DESTDIR)$(bindir)/ssh-agent.old -- -mv -f $(DESTDIR)$(bindir)/ssh-add $(DESTDIR)$(bindir)/ssh-add.old -- -mv -f $(DESTDIR)$(bindir)/ssh-askpass $(DESTDIR)$(bindir)/ssh-askpass.old -- -mv -f $(DESTDIR)$(bindir)/ssh-keygen $(DESTDIR)$(bindir)/ssh-keygen.old -- -mv -f $(DESTDIR)$(bindir)/scp $(DESTDIR)$(bindir)/scp.old -- -mv -f $(DESTDIR)$(bindir)/sftp $(DESTDIR)$(bindir)/sftp.old -- -mv -f $(DESTDIR)$(bindir)/sftp-server $(DESTDIR)$(bindir)/sftp-server.old -- -mv -f $(DESTDIR)$(bindir)/ssh-signer $(DESTDIR)$(bindir)/ssh-signer.old -- -mv -f $(DESTDIR)$(bindir)/ssh-probe $(DESTDIR)$(bindir)/ssh-probe.old -- -- (cd $(DESTDIR)$(bindir) && $(LN_S) ssh2 ssh) -- (cd $(DESTDIR)$(bindir) && $(LN_S) ssh-agent2 ssh-agent) -- (cd $(DESTDIR)$(bindir) && $(LN_S) ssh-add2 ssh-add) -- (cd $(DESTDIR)$(bindir) && $(LN_S) ssh-askpass2 ssh-askpass) -- (cd $(DESTDIR)$(bindir) && $(LN_S) ssh-keygen2 ssh-keygen) -- (cd $(DESTDIR)$(bindir) && $(LN_S) scp2 scp) -- (cd $(DESTDIR)$(bindir) && $(LN_S) sftp2 sftp) -- (cd $(DESTDIR)$(bindir) && $(LN_S) sftp-server2 sftp-server) -- (cd $(DESTDIR)$(bindir) && $(LN_S) ssh-signer2 ssh-signer) -- (cd $(DESTDIR)$(bindir) && $(LN_S) ssh-probe2 ssh-probe) -- -mv -f $(DESTDIR)$(sbindir)/sshd $(DESTDIR)$(sbindir)/sshd.old -- (cd $(DESTDIR)$(sbindir) && $(LN_S) sshd2 sshd) -- -mv -f $(DESTDIR)$(mandir)/man1/ssh.1 $(DESTDIR)$(mandir)/man1/ssh.old.1 -- -mv -f $(DESTDIR)$(mandir)/man1/ssh-add.1 $(DESTDIR)$(mandir)/man1/ssh-add.old.1 -- -mv -f $(DESTDIR)$(mandir)/man1/ssh-agent.1 $(DESTDIR)$(mandir)/man1/ssh-agent.old.1 -- -mv -f $(DESTDIR)$(mandir)/man1/ssh-keygen.1 $(DESTDIR)$(mandir)/man1/ssh-keygen.old.1 -- -mv -f $(DESTDIR)$(mandir)/man1/scp.1 $(DESTDIR)$(mandir)/man1/scp.old.1 -- -mv -f $(DESTDIR)$(mandir)/man1/sftp.1 $(DESTDIR)$(mandir)/man1/sftp.old.1 -- -mv -f $(DESTDIR)$(mandir)/man1/ssh-probe.1 $(DESTDIR)$(mandir)/man1/ssh-probe.old.1 -- (cd $(DESTDIR)$(mandir)/man1 && $(LN_S) ssh2.1 ssh.1) -- (cd $(DESTDIR)$(mandir)/man1 && $(LN_S) ssh-add2.1 ssh-add.1) -- (cd $(DESTDIR)$(mandir)/man1 && $(LN_S) ssh-agent2.1 ssh-agent.1) -- (cd $(DESTDIR)$(mandir)/man1 && $(LN_S) ssh-keygen2.1 ssh-keygen.1) -- (cd $(DESTDIR)$(mandir)/man1 && $(LN_S) scp2.1 scp.1) -- (cd $(DESTDIR)$(mandir)/man1 && $(LN_S) sftp2.1 sftp.1) -- (cd $(DESTDIR)$(mandir)/man1 && $(LN_S) ssh-probe2.1 ssh-probe.1) -- -mv -f $(DESTDIR)$(mandir)/man8/sshd.8 $(DESTDIR)$(mandir)/man8/sshd.old.8 -- (cd $(DESTDIR)$(mandir)/man8 && $(LN_S) sshd2.8 sshd.8) -+ (cd $(DESTDIR)$(bindir) && $(RM) -f ssh && $(LN_S) ssh2 ssh) -+ (cd $(DESTDIR)$(bindir) && $(RM) -f ssh-agent && $(LN_S) ssh-agent2 ssh-agent) -+ (cd $(DESTDIR)$(bindir) && $(RM) -f ssh-add && $(LN_S) ssh-add2 ssh-add) -+ case x"@CONFPROGRAMS@" in \ -+ x*askpass*) \ -+ (cd $(DESTDIR)$(bindir) && $(RM) -f ssh-askpass && $(LN_S) ssh-askpass2 ssh-askpass) ;; \ -+ esac -+ (cd $(DESTDIR)$(bindir) && $(RM) -f ssh-keygen && $(LN_S) ssh-keygen2 ssh-keygen) -+ (cd $(DESTDIR)$(bindir) && $(RM) -f scp && $(LN_S) scp2 scp) -+ (cd $(DESTDIR)$(bindir) && $(RM) -f sftp && $(LN_S) sftp2 sftp) -+ (cd $(DESTDIR)$(bindir) && $(RM) -f sftp-server && $(LN_S) sftp-server2 sftp-server) -+ (cd $(DESTDIR)$(bindir) && $(RM) -f ssh-signer && $(LN_S) ssh-signer2 ssh-signer) -+ (cd $(DESTDIR)$(bindir) && $(RM) -f ssh-probe && $(LN_S) ssh-probe2 ssh-probe) -+ (cd $(DESTDIR)$(sbindir) && $(RM) -f sshd && $(LN_S) sshd2 sshd) -+ (cd $(DESTDIR)$(mandir)/man1 && $(RM) -f ssh.1 && $(LN_S) ssh2.1 ssh.1) -+ (cd $(DESTDIR)$(mandir)/man1 && $(RM) -f ssh-add.1 && $(LN_S) ssh-add2.1 ssh-add.1) -+ (cd $(DESTDIR)$(mandir)/man1 && $(RM) -f ssh-agent.1 && $(LN_S) ssh-agent2.1 ssh-agent.1) -+ (cd $(DESTDIR)$(mandir)/man1 && $(RM) -f ssh-keygen.1 && $(LN_S) ssh-keygen2.1 ssh-keygen.1) -+ (cd $(DESTDIR)$(mandir)/man1 && $(RM) -f scp.1 && $(LN_S) scp2.1 scp.1) -+ (cd $(DESTDIR)$(mandir)/man1 && $(RM) -f sftp.1 && $(LN_S) sftp2.1 sftp.1) -+ (cd $(DESTDIR)$(mandir)/man1 && $(RM) -f sshprobe.1 && $(LN_S) ssh-probe2.1 ssh-probe.1) -+ (cd $(DESTDIR)$(mandir)/man8 && $(RM) -f sshd.8 && $(LN_S) sshd2.8 sshd.8) - - clean-up-old: - -rm -f $(DESTDIR)$(bindir)/ssh.old $(DESTDIR)$(bindir)/ssh-agent.old \ -@@ -1075,23 +1059,13 @@ install-exec-hook: - -chown root $(DESTDIR)$(bindir)/ssh-signer2 - -chmod $(SSH_SIGNER_INSTALL_MODE) $(DESTDIR)$(bindir)/ssh-signer2 - --install-data-hook: make-install-dirs generate-host-key install-symlinks -- -@if test '!' -f $(DESTDIR)$(etcdir)/sshd2_config ; then \ -- echo Installing $(DESTDIR)$(etcdir)/sshd2_config ; \ -- $(INSTALL_DATA) $(srcdir)/sshd2_config \ -- $(DESTDIR)$(etcdir)/sshd2_config ; \ -- fi -- echo Updating $(DESTDIR)$(etcdir)/sshd2_config.example ; -+install-data-hook: make-install-dirs install-symlinks -+ echo Installing $(DESTDIR)$(egdir)/sshd2_config ; \ - $(INSTALL_DATA) $(srcdir)/sshd2_config \ -- $(DESTDIR)$(etcdir)/sshd2_config.example ; -- -@if test '!' -f $(DESTDIR)$(etcdir)/ssh2_config ; then \ -- echo Installing $(DESTDIR)$(etcdir)/ssh2_config ; \ -- $(INSTALL_DATA) $(srcdir)/ssh2_config \ -- $(DESTDIR)$(etcdir)/ssh2_config ; \ -- fi -- echo Updating $(DESTDIR)$(etcdir)/ssh2_config.example ; -+ $(DESTDIR)$(egdir)/sshd2_config ; -+ echo Installing $(DESTDIR)$(egdir)/ssh2_config ; \ - $(INSTALL_DATA) $(srcdir)/ssh2_config \ -- $(DESTDIR)$(etcdir)/ssh2_config.example ; -+ $(DESTDIR)$(egdir)/ssh2_config ; - echo Updating $(DESTDIR)$(subconfig_dir)/host_ext.example ; - $(INSTALL_DATA) $(srcdir)/subconfig/host_ext.example \ - $(DESTDIR)$(subconfig_dir)/host_ext.example ; -@@ -1104,11 +1078,9 @@ install-data-hook: make-install-dirs gen - echo Updating $(DESTDIR)$(subconfig_dir)/user.example ; - $(INSTALL_DATA) $(srcdir)/subconfig/user.example \ - $(DESTDIR)$(subconfig_dir)/user.example ; -- -@if test '!' -f $(DESTDIR)$(etcdir)/ssh_dummy_shell.out ; then \ -- echo Installing $(DESTDIR)$(etcdir)/ssh_dummy_shell.out ; \ -+ echo Installing $(DESTDIR)$(egdir)/ssh_dummy_shell.out ; \ - $(INSTALL_DATA) $(srcdir)/ssh_dummy_shell.out \ -- $(DESTDIR)$(etcdir)/ssh_dummy_shell.out ; \ -- fi -+ $(DESTDIR)$(egdir)/ssh_dummy_shell.out ; - - # Tell versions [3.59,3.63) of GNU make to not export all variables. - # Otherwise a system limit (for SysV at least) may be exceeded. diff --git a/security/ssh2/patches/patch-ad b/security/ssh2/patches/patch-ad deleted file mode 100644 index ed8cf533651..00000000000 --- a/security/ssh2/patches/patch-ad +++ /dev/null @@ -1,70 +0,0 @@ -$NetBSD: patch-ad,v 1.2 2003/08/12 19:08:57 seb Exp $ - ---- configure.in.orig 2003-06-30 12:22:25.000000000 +0000 -+++ configure.in -@@ -1558,9 +1558,7 @@ dnl - *-*-netbsd*) - # no_shadows_password_checking=yes ? - # ^ (see above comment) -- -- # At least NetBSD 1.6 has a nonfunctional utmpx. -- no_utmpx=yes -+ AC_DEFINE(SSH_UTMP_UTMPX) - ;; - *) - ;; -@@ -1791,6 +1789,8 @@ if test -z "$no_libbsd"; then - fi - AC_CHECK_LIB(util, login, AC_DEFINE(HAVE_LIBUTIL_LOGIN) - LIBS="$LIBS -lutil") -+AC_CHECK_LIB(util, loginx, AC_DEFINE(HAVE_LIBUTIL_LOGINX) -+ LIBS="$LIBS -lutil") - - if test -z "$no_vhangup"; then - AC_CHECK_FUNCS(vhangup) -@@ -1942,6 +1942,22 @@ if test "$ac_cv_have_proto_logout" = "ye - fi - AC_MSG_RESULT($ac_cv_have_proto_logout) - -+AC_MSG_CHECKING([whether there is a prototype for logoutx]) -+AC_CACHE_VAL(ac_cv_have_proto_logoutx, -+ [ AC_TRY_COMPILE(changequote(<<, >>)dnl -+ << $session_wtmp_includes -+/* If someone has a prototype like this for anything, then... well. */ -+void * logoutx(void *, int *, char *, int, char, void *[6][8][10][3][4], ...); -+>>, -+ changequote([, ])dnl -+ [ ; ], -+ ac_cv_have_proto_logoutx=no, -+ ac_cv_have_proto_logoutx=yes)]) -+if test "$ac_cv_have_proto_logoutx" = "yes"; then -+ AC_DEFINE(HAVE_PROTO_LOGOUTX) -+fi -+AC_MSG_RESULT($ac_cv_have_proto_logoutx) -+ - AC_MSG_CHECKING([whether there is a prototype for logwtmp]) - AC_CACHE_VAL(ac_cv_have_proto_logwtmp, - [ AC_TRY_COMPILE(changequote(<<, >>)dnl -@@ -1958,6 +1974,22 @@ if test "$ac_cv_have_proto_logwtmp" = "y - fi - AC_MSG_RESULT($ac_cv_have_proto_logwtmp) - -+AC_MSG_CHECKING([whether there is a prototype for logwtmpx]) -+AC_CACHE_VAL(ac_cv_have_proto_logwtmpx, -+ [ AC_TRY_COMPILE(changequote(<<, >>)dnl -+ << $session_wtmp_includes -+/* If someone has a prototype like this for anything, then... well. */ -+void * logwtmpx(void *, int *, char *, int, char, void *[6][8][10][3][4], ...); -+>>, -+ changequote([, ])dnl -+ [ ; ], -+ ac_cv_have_proto_logwtmpx=no, -+ ac_cv_have_proto_logwtmpx=yes)]) -+if test "$ac_cv_have_proto_logwtmpx" = "yes"; then -+ AC_DEFINE(HAVE_PROTO_LOGWTMPX) -+fi -+AC_MSG_RESULT($ac_cv_have_proto_logwtmpx) -+ - AC_CHECK_FUNCS(initgroups) - - if test "X$ac_cv_func_initgroups" = "Xyes"; then diff --git a/security/ssh2/patches/patch-ae b/security/ssh2/patches/patch-ae deleted file mode 100644 index f58a9c770be..00000000000 --- a/security/ssh2/patches/patch-ae +++ /dev/null @@ -1,157 +0,0 @@ -$NetBSD: patch-ae,v 1.3 2003/08/12 19:08:57 seb Exp $ - ---- configure.orig 2003-06-30 12:22:32.000000000 +0000 -+++ configure -@@ -6631,9 +6631,10 @@ EOF - *-*-netbsd*) - # no_shadows_password_checking=yes ? - # ^ (see above comment) -+ cat >> confdefs.h <<\EOF -+#define SSH_UTMP_UTMPX 1 -+EOF - -- # At least NetBSD 1.6 has a nonfunctional utmpx. -- no_utmpx=yes - ;; - *) - ;; -@@ -8339,6 +8340,50 @@ else - echo "$ac_t""no" 1>&6 - fi - -+echo $ac_n "checking for loginx in -lutil""... $ac_c" 1>&6 -+echo "configure:8345: checking for loginx in -lutil" >&5 -+ac_lib_var=`echo util'_'loginx | sed 'y%./+-%__p_%'` -+if eval "test \"`echo '$''{'ac_cv_lib_$ac_lib_var'+set}'`\" = set"; then -+ echo $ac_n "(cached) $ac_c" 1>&6 -+else -+ ac_save_LIBS="$LIBS" -+LIBS="-lutil $LIBS" -+cat > conftest.$ac_ext <<EOF -+#line 8353 "configure" -+#include "confdefs.h" -+/* Override any gcc2 internal prototype to avoid an error. */ -+/* We use char because int might match the return type of a gcc2 -+ builtin and then its argument prototype would still apply. */ -+char loginx(); -+ -+int main() { -+loginx() -+; return 0; } -+EOF -+if { (eval echo configure:8364: \"$ac_link\") 1>&5; (eval $ac_link) 2>&5; } && test -s conftest${ac_exeext}; then -+ rm -rf conftest* -+ eval "ac_cv_lib_$ac_lib_var=yes" -+else -+ echo "configure: failed program was:" >&5 -+ cat conftest.$ac_ext >&5 -+ rm -rf conftest* -+ eval "ac_cv_lib_$ac_lib_var=no" -+fi -+rm -f conftest* -+LIBS="$ac_save_LIBS" -+ -+fi -+if eval "test \"`echo '$ac_cv_lib_'$ac_lib_var`\" = yes"; then -+ echo "$ac_t""yes" 1>&6 -+ cat >> confdefs.h <<\EOF -+#define HAVE_LIBUTIL_LOGINX 1 -+EOF -+ -+ LIBS="$LIBS -lutil" -+else -+ echo "$ac_t""no" 1>&6 -+fi -+ - - if test -z "$no_vhangup"; then - for ac_func in vhangup -@@ -8678,8 +8723,44 @@ EOF - fi - echo "$ac_t""$ac_cv_have_proto_logout" 1>&6 - -+echo $ac_n "checking whether there is a prototype for logoutx""... $ac_c" 1>&6 -+echo "configure:8728: checking whether there is a prototype for logoutx" >&5 -+if eval "test \"`echo '$''{'ac_cv_have_proto_logoutx'+set}'`\" = set"; then -+ echo $ac_n "(cached) $ac_c" 1>&6 -+else -+ cat > conftest.$ac_ext <<EOF -+#line 8733 "configure" -+#include "confdefs.h" -+ $session_wtmp_includes -+/* If someone has a prototype like this for anything, then... well. */ -+void * logoutx(void *, int *, char *, int, char, void *[6][8][10][3][4], ...); -+ -+int main() { -+ ; -+; return 0; } -+EOF -+if { (eval echo configure:8743: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then -+ rm -rf conftest* -+ ac_cv_have_proto_logoutx=no -+else -+ echo "configure: failed program was:" >&5 -+ cat conftest.$ac_ext >&5 -+ rm -rf conftest* -+ ac_cv_have_proto_logoutx=yes -+fi -+rm -f conftest* -+fi -+ -+if test "$ac_cv_have_proto_logoutx" = "yes"; then -+ cat >> confdefs.h <<\EOF -+#define HAVE_PROTO_LOGOUTX 1 -+EOF -+ -+fi -+echo "$ac_t""$ac_cv_have_proto_logoutx" 1>&6 -+ - echo $ac_n "checking whether there is a prototype for logwtmp""... $ac_c" 1>&6 --echo "configure:8683: checking whether there is a prototype for logwtmp" >&5 -+echo "configure:8764: checking whether there is a prototype for logwtmp" >&5 - if eval "test \"`echo '$''{'ac_cv_have_proto_logwtmp'+set}'`\" = set"; then - echo $ac_n "(cached) $ac_c" 1>&6 - else -@@ -8714,6 +8795,42 @@ EOF - fi - echo "$ac_t""$ac_cv_have_proto_logwtmp" 1>&6 - -+echo $ac_n "checking whether there is a prototype for logwtmpx""... $ac_c" 1>&6 -+echo "configure:8800: checking whether there is a prototype for logwtmpx" >&5 -+if eval "test \"`echo '$''{'ac_cv_have_proto_logwtmpx'+set}'`\" = set"; then -+ echo $ac_n "(cached) $ac_c" 1>&6 -+else -+ cat > conftest.$ac_ext <<EOF -+#line 8805 "configure" -+#include "confdefs.h" -+ $session_wtmp_includes -+/* If someone has a prototype like this for anything, then... well. */ -+void * logwtmpx(void *, int *, char *, int, char, void *[6][8][10][3][4], ...); -+ -+int main() { -+ ; -+; return 0; } -+EOF -+if { (eval echo configure:8815: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then -+ rm -rf conftest* -+ ac_cv_have_proto_logwtmpx=no -+else -+ echo "configure: failed program was:" >&5 -+ cat conftest.$ac_ext >&5 -+ rm -rf conftest* -+ ac_cv_have_proto_logwtmpx=yes -+fi -+rm -f conftest* -+fi -+ -+if test "$ac_cv_have_proto_logwtmpx" = "yes"; then -+ cat >> confdefs.h <<\EOF -+#define HAVE_PROTO_LOGWTMPX 1 -+EOF -+ -+fi -+echo "$ac_t""$ac_cv_have_proto_logwtmpx" 1>&6 -+ - for ac_func in initgroups - do - echo $ac_n "checking for $ac_func""... $ac_c" 1>&6 diff --git a/security/ssh2/patches/patch-af b/security/ssh2/patches/patch-af deleted file mode 100644 index f263ae111b8..00000000000 --- a/security/ssh2/patches/patch-af +++ /dev/null @@ -1,54 +0,0 @@ -$NetBSD: patch-af,v 1.4 2003/08/12 19:08:58 seb Exp $ - ---- lib/sshsession/wtmp.c.orig 2003-06-30 12:22:13.000000000 +0000 -+++ lib/sshsession/wtmp.c -@@ -34,6 +34,13 @@ In particular, this updates: - # include <sys/mkdev.h> /* for minor() */ - # endif /* HAVE_SYS_MKDEV_H */ - # endif /* !SCO */ -+# if !defined(WTMPX_FILE) -+# if defined(_WTMPX_FILE) /* Solaris without _XPG4_2 or with __EXTENSIONS__ */ -+# define WTMPX_FILE _WTMPX_FILE -+# elif defined(_PATH_WTMPX) /* NetBSD at least */ -+# define WTMPX_FILE _PATH_WTMPX -+# endif -+# endif - #endif /* HAVE_UTMPX_H */ - #ifdef HAVE_USERSEC_H - # include <usersec.h> -@@ -62,9 +69,15 @@ void login(const struct utmp *); - #ifndef HAVE_PROTO_LOGOUT - int logout(const char *); - #endif /* !HAVE_PROTO_LOGOUT */ -+#ifndef HAVE_PROTO_LOGOUTX -+int logoutx(const char *, int, int); -+#endif /* !HAVE_PROTO_LOGOUTX */ - #ifndef HAVE_PROTO_LOGWTMP - void logwtmp(const char *, const char *, const char *); - #endif /* !HAVE_PROTO_LOGWTMP */ -+#ifndef HAVE_PROTO_LOGWTMPX -+void logwtmpx(const char *, const char *, const char *, int, int); -+#endif /* !HAVE_PROTO_LOGWTMPX */ - - /* Returns the time when the user last logged in, and name of the host - from which the user logged in from. Returns 0 if the information -@@ -217,7 +230,7 @@ void ssh_user_record_login(SshUser user, - # endif /* LASTLOG_IS_DIR */ - #endif /* HAVE_LASTLOG_H || HAVE_LASTLOG */ - --#if defined(HAVE_UTMP_H) && !defined(HAVE_UTMPX_H) -+#if defined(HAVE_UTMP_H) && (!defined(HAVE_UTMPX_H) || defined(SSH_UTMP_UTMPX)) - struct utmp u; - const char *utmp, *wtmp; - -@@ -587,6 +600,10 @@ void ssh_user_record_logout(pid_t pid, c - const char *line = ttyname + 5; /* /dev/ttyq8 -> ttyq8 */ - if (logout((char *)line)) - logwtmp((char *)line, "", ""); -+# ifdef HAVE_LIBUTIL_LOGINX -+ if (logoutx((char *)line, 0, DEAD_PROCESS)) -+ logwtmpx((char *)line, "", "", 0, DEAD_PROCESS); -+# endif - #else /* HAVE_LIBUTIL_LOGIN */ - ssh_user_record_login(NULL, pid, ttyname, "", ""); - #endif /* HAVE_LIBUTIL_LOGIN */ diff --git a/security/ssh2/patches/patch-ag b/security/ssh2/patches/patch-ag deleted file mode 100644 index 53c31bae90f..00000000000 --- a/security/ssh2/patches/patch-ag +++ /dev/null @@ -1,47 +0,0 @@ -$NetBSD: patch-ag,v 1.2 2003/08/12 19:08:58 seb Exp $ - ---- sshconf.h.in.orig 2003-06-30 12:22:30.000000000 +0000 -+++ sshconf.h.in -@@ -1,4 +1,4 @@ --/* sshconf.h.in. Generated automatically from configure.in by autoheader 2.13. */ -+/* sshconf.h.in. Generated automatically from configure.in by autoheader. */ - #ifndef SSHCONF_H - #define SSHCONF_H - -@@ -256,6 +256,10 @@ library. */ - and logwtmp() calls. */ - #undef HAVE_LIBUTIL_LOGIN - -+/* Define this if libutil.a contains loginx(), logoutx(), -+ and logwtmpx() calls. */ -+#undef HAVE_LIBUTIL_LOGINX -+ - /* Location of system mail spool directory. */ - #undef MAIL_SPOOL_DIRECTORY - -@@ -271,9 +275,15 @@ library. */ - /* Define this if a prototype for logout() is defined in system headers. */ - #undef HAVE_PROTO_LOGOUT - -+/* Define this if a prototype for logoutx() is defined in system headers. */ -+#undef HAVE_PROTO_LOGOUTX -+ - /* Define this if a prototype for logwtmp() is defined in system headers. */ - #undef HAVE_PROTO_LOGWTMP - -+/* Define this if a prototype for logwtmpx() is defined in system headers. */ -+#undef HAVE_PROTO_LOGWTMPX -+ - /* Define this if a prototype for initgroups() is defined in system headers. */ - #undef HAVE_PROTO_INITGROUPS - -@@ -407,6 +417,9 @@ library. */ - /* Define this to point to where sshd2 should store it's pidfile. */ - #undef SSHD_PIDDIR - -+/* Define if both utmp and utmpx entries should be handled */ -+#undef SSH_UTMP_UTMPX -+ - /* Enable the RSA code. */ - #undef WITH_RSA - diff --git a/security/ssh2/patches/patch-ah b/security/ssh2/patches/patch-ah deleted file mode 100644 index f3491201f37..00000000000 --- a/security/ssh2/patches/patch-ah +++ /dev/null @@ -1,28 +0,0 @@ -$NetBSD: patch-ah,v 1.3 2004/05/28 12:00:10 kivinen Exp $ - ---- lib/sshutil/sshsysutil/sshunixfdstream.c.orig 2003-12-03 15:17:31.000000000 +0200 -+++ lib/sshutil/sshsysutil/sshunixfdstream.c -@@ -337,16 +337,21 @@ int ssh_stream_fd_write(void *context, c - if (sdata->writefd >= 0) - { - len = write(sdata->writefd, buf, size); -- if (len >= 0) -+ if (len > 0) - return len; - -- if (errno == EAGAIN || errno == EWOULDBLOCK || errno == EINTR) -+ if (errno == EAGAIN || errno == EWOULDBLOCK || errno == EINTR || -+ /* Special case for NetBSD 2.0, it may return len = 0 and errno = 0 -+ which simply means, try again */ -+ (len == 0 && errno == 0)) - { - /* Cannot write more at this time. */ - sdata->write_has_failed = TRUE; - ssh_stream_fd_request(sdata); - return -1; - } -+ else if (len == 0) -+ return 0; - - /* A real error occurred while writing. */ - sdata->write_has_failed = TRUE; diff --git a/security/ssh2/patches/patch-ai b/security/ssh2/patches/patch-ai deleted file mode 100644 index 6c49a0d4364..00000000000 --- a/security/ssh2/patches/patch-ai +++ /dev/null @@ -1,23 +0,0 @@ -$NetBSD: patch-ai,v 1.2 2006/09/22 13:58:46 kivinen Exp $ - ---- apps/ssh/authc-kbd-interactive.c.orig 2003-12-03 15:17:26.000000000 +0200 -+++ apps/ssh/authc-kbd-interactive.c -@@ -103,7 +103,7 @@ SSH_FSM_STEP(ssh_kbd_process_packet) - - ssh_encode_buffer(gdata->response_packet, - SSH_FORMAT_CHAR, SSH_MSG_USERAUTH_INFO_RESPONSE, -- SSH_FORMAT_UINT32, gdata->num_prompts, -+ SSH_FORMAT_UINT32, (SshUInt32) gdata->num_prompts, - SSH_FORMAT_END); - - -@@ -345,7 +345,8 @@ void ssh_client_auth_kbd_interact(SshAut - /* language tag */ - SSH_FORMAT_UINT32_STR, lang_tag, strlen(lang_tag), - /* XXX devices, what do we support? */ -- SSH_FORMAT_UINT32_STR, "", 0L, -+ SSH_FORMAT_UINT32_STR, "", -+ (size_t) 0L, - SSH_FORMAT_END); - (*completion)(SSH_AUTH_CLIENT_SEND_AND_CONTINUE, - user, buffer, completion_context); diff --git a/security/ssh2/patches/patch-aj b/security/ssh2/patches/patch-aj deleted file mode 100644 index b4ae7f76dec..00000000000 --- a/security/ssh2/patches/patch-aj +++ /dev/null @@ -1,24 +0,0 @@ -$NetBSD: patch-aj,v 1.1 2005/08/24 09:13:24 kivinen Exp $ - ---- apps/ssh/lib/sshproto/sshconn.c.orig 2003-12-03 15:17:34.000000000 +0200 -+++ apps/ssh/lib/sshproto/sshconn.c -@@ -452,7 +452,8 @@ Boolean ssh_conn_send_channel_data_type( - (unsigned int) SSH_MSG_CHANNEL_DATA, - SSH_FORMAT_UINT32, (SshUInt32) - channel->remote_id, -- SSH_FORMAT_UINT32_STR, buf, len, -+ SSH_FORMAT_UINT32_STR, buf, -+ (size_t) len, - SSH_FORMAT_END); - } - else -@@ -465,7 +466,8 @@ Boolean ssh_conn_send_channel_data_type( - SSH_FORMAT_UINT32, (SshUInt32) - channel->remote_id, - SSH_FORMAT_UINT32, (SshUInt32) i, -- SSH_FORMAT_UINT32_STR, buf, len, -+ SSH_FORMAT_UINT32_STR, buf, -+ (size_t) len, - SSH_FORMAT_END); - } - diff --git a/security/ssh2/patches/patch-ak b/security/ssh2/patches/patch-ak deleted file mode 100644 index e5ee668bae2..00000000000 --- a/security/ssh2/patches/patch-ak +++ /dev/null @@ -1,22 +0,0 @@ -$NetBSD: patch-ak,v 1.1 2005/08/24 09:13:24 kivinen Exp $ - ---- apps/ssh/lib/sshproto/trcommon.c.orig 2003-12-03 15:17:33.000000000 +0200 -+++ apps/ssh/lib/sshproto/trcommon.c -@@ -555,7 +555,7 @@ void ssh_tr_send_packet(SshTransportComm - SSH_DEBUG(5, ("Outgoing empty, sending empty ignore packet.")); - ret = ssh_encode_buffer(&new_packet, - SSH_FORMAT_CHAR, (unsigned int) SSH_MSG_IGNORE, -- SSH_FORMAT_UINT32, 0L, -+ SSH_FORMAT_UINT32, (SshUInt32) 0L, - SSH_FORMAT_END); - SSH_VERIFY(ret > 0); - ssh_tr_encode_packet(tr, ssh_buffer_ptr(&new_packet), -@@ -3171,7 +3171,7 @@ void ssh_tr_process_up_incoming_packet(S - - ssh_encode_buffer(new_packet, - SSH_FORMAT_CHAR, (unsigned int) SSH_MSG_IGNORE, -- SSH_FORMAT_UINT32, ignore_len, -+ SSH_FORMAT_UINT32, (SshUInt32) ignore_len, - SSH_FORMAT_END); - - ssh_xbuffer_append_space(new_packet, &datap, ignore_len); diff --git a/security/ssh2/patches/patch-al b/security/ssh2/patches/patch-al deleted file mode 100644 index 002bf10a3d8..00000000000 --- a/security/ssh2/patches/patch-al +++ /dev/null @@ -1,13 +0,0 @@ -$NetBSD: patch-al,v 1.1 2005/08/24 09:13:24 kivinen Exp $ - ---- apps/ssh/ssh-agent2.c.orig 2003-12-03 15:17:27.000000000 +0200 -+++ apps/ssh/ssh-agent2.c -@@ -1802,7 +1802,7 @@ void ssh_agenti_ssh1_encode_mp(SshBuffer - num_buf = ssh_xmalloc(num_buf_len); - ssh_mp_get_buf(num_buf, num_buf_len, n); - ssh_encode_buffer(buffer, -- SSH_FORMAT_DATA, len_buf, 2, -+ SSH_FORMAT_DATA, len_buf, (size_t) 2, - SSH_FORMAT_DATA, num_buf, num_buf_len, - SSH_FORMAT_END); - ssh_xfree(num_buf); diff --git a/security/ssh2/patches/patch-am b/security/ssh2/patches/patch-am deleted file mode 100644 index 404076dfa52..00000000000 --- a/security/ssh2/patches/patch-am +++ /dev/null @@ -1,13 +0,0 @@ -$NetBSD: patch-am,v 1.1 2005/08/24 09:13:24 kivinen Exp $ - ---- apps/ssh/ssh-signer2.c.orig 2003-12-03 15:17:26.000000000 +0200 -+++ apps/ssh/ssh-signer2.c -@@ -264,7 +264,7 @@ SSH_FSM_STEP(signer_send_error) - (unsigned int) gdata->error_code_to_ssh2, - SSH_FORMAT_UINT32_STR, gdata->error_message_to_ssh2, - strlen(gdata->error_message_to_ssh2), -- SSH_FORMAT_UINT32_STR, "en", 2, -+ SSH_FORMAT_UINT32_STR, "en", (size_t) 2, - SSH_FORMAT_END); - - ssh_packet_wrapper_can_receive(gdata->wrapper, FALSE); diff --git a/security/ssh2/patches/patch-an b/security/ssh2/patches/patch-an deleted file mode 100644 index 35e9ef845c2..00000000000 --- a/security/ssh2/patches/patch-an +++ /dev/null @@ -1,13 +0,0 @@ -$NetBSD: patch-an,v 1.1 2005/08/24 09:13:24 kivinen Exp $ - ---- apps/ssh/ssh1proto.c.orig 2003-12-03 15:17:26.000000000 +0200 -+++ apps/ssh/ssh1proto.c -@@ -3918,7 +3918,7 @@ void ssh1_handle_packet_smsg_auth_rsa_ch - SSH_FORMAT_UINT32_STR, - challenge_buf, challenge_len, - SSH_FORMAT_UINT32_STR, -- ssh1->session_id, 16, -+ ssh1->session_id, (size_t) 16, - SSH_FORMAT_END); - ssh_xfree(challenge_buf); - ssh1->mode = SSH1_AGENT_OPERATION_IN_PROGRESS; diff --git a/security/ssh2/patches/patch-ao b/security/ssh2/patches/patch-ao deleted file mode 100644 index cf5c2729401..00000000000 --- a/security/ssh2/patches/patch-ao +++ /dev/null @@ -1,17 +0,0 @@ -$NetBSD: patch-ao,v 1.1 2005/08/24 09:13:24 kivinen Exp $ - ---- apps/ssh/sshchsession.c.orig 2003-12-03 15:17:23.000000000 +0200 -+++ apps/ssh/sshchsession.c -@@ -2315,9 +2315,9 @@ void ssh_channel_session_eof_callback(vo - { - ssh_encode_buffer(&buffer, - SSH_FORMAT_UINT32, (SshUInt32) -exit_status, -- SSH_FORMAT_BOOLEAN, FALSE, -- SSH_FORMAT_UINT32_STR, NULL, 0, -- SSH_FORMAT_UINT32_STR, NULL, 0, -+ SSH_FORMAT_BOOLEAN, (Boolean) FALSE, -+ SSH_FORMAT_UINT32_STR, NULL, (size_t) 0, -+ SSH_FORMAT_UINT32_STR, NULL, (size_t) 0, - SSH_FORMAT_END); - - diff --git a/security/ssh2/patches/patch-ap b/security/ssh2/patches/patch-ap deleted file mode 100644 index 7d8de244a5d..00000000000 --- a/security/ssh2/patches/patch-ap +++ /dev/null @@ -1,14 +0,0 @@ -$NetBSD: patch-ap,v 1.1 2005/08/24 09:13:24 kivinen Exp $ - ---- apps/ssh/sshpamserver.c.orig 2003-12-03 15:17:26.000000000 +0200 -+++ apps/ssh/sshpamserver.c -@@ -306,7 +306,8 @@ int send_packet(int fd, SshPacketType pa - - buffer = ssh_xbuffer_allocate(); - ssh_encode_buffer(buffer, -- SSH_FORMAT_UINT32, ssh_buffer_len(packet) + 1, -+ SSH_FORMAT_UINT32, -+ (SshUInt32) (ssh_buffer_len(packet) + 1), - SSH_FORMAT_CHAR, (unsigned int)packet_type, - SSH_FORMAT_DATA, ssh_buffer_ptr(packet), - ssh_buffer_len(packet), diff --git a/security/ssh2/patches/patch-aq b/security/ssh2/patches/patch-aq deleted file mode 100644 index 69d4a5d4f8f..00000000000 --- a/security/ssh2/patches/patch-aq +++ /dev/null @@ -1,24 +0,0 @@ -$NetBSD: patch-aq,v 1.1 2006/09/22 13:58:46 kivinen Exp $ - ---- apps/ssh/agentclient.c.orig 2003-12-03 15:17:24.000000000 +0200 -+++ apps/ssh/agentclient.c -@@ -831,7 +831,8 @@ void ssh_agent_lock(SshAgent agent, cons - ssh_packet_wrapper_send_encode(agent->wrapper, - SSH_AGENT_LOCK, - SSH_FORMAT_UINT32_STR, -- password, (password ? strlen(password) : 0), -+ password, (size_t) -+ (password ? strlen(password) : 0), - SSH_FORMAT_END); - } - -@@ -858,7 +859,8 @@ void ssh_agent_unlock(SshAgent agent, co - ssh_packet_wrapper_send_encode(agent->wrapper, - SSH_AGENT_UNLOCK, - SSH_FORMAT_UINT32_STR, -- password, (password ? strlen(password) : 0), -+ password, (size_t) -+ (password ? strlen(password) : 0), - SSH_FORMAT_END); - } - diff --git a/security/ssh2/patches/patch-ar b/security/ssh2/patches/patch-ar deleted file mode 100644 index c70b8a1680b..00000000000 --- a/security/ssh2/patches/patch-ar +++ /dev/null @@ -1,18 +0,0 @@ -$NetBSD: patch-ar,v 1.1 2006/09/22 13:58:46 kivinen Exp $ - ---- apps/ssh/authc-kerberos-tgt.c.orig 2003-12-03 15:17:25.000000000 +0200 -+++ apps/ssh/authc-kerberos-tgt.c -@@ -181,9 +181,11 @@ void ssh_client_auth_kerberos_tgt(SshAut - b = ssh_xbuffer_allocate(); - ssh_encode_buffer(b, - SSH_FORMAT_UINT32_STR, -- auth_data.data, auth_data.length, -+ auth_data.data, -+ (size_t) auth_data.length, - SSH_FORMAT_UINT32_STR, -- tgt_data.data, tgt_data.length, -+ tgt_data.data, -+ (size_t) tgt_data.length, - SSH_FORMAT_END); - - /* Send the authentication request (and complete this operation). */ diff --git a/security/ssh2/patches/patch-as b/security/ssh2/patches/patch-as deleted file mode 100644 index ded58eb29f9..00000000000 --- a/security/ssh2/patches/patch-as +++ /dev/null @@ -1,14 +0,0 @@ -$NetBSD: patch-as,v 1.1 2006/09/22 13:58:46 kivinen Exp $ - ---- apps/ssh/authc-kerberos.c.orig 2003-12-03 15:17:25.000000000 +0200 -+++ apps/ssh/authc-kerberos.c -@@ -127,7 +127,8 @@ void ssh_client_auth_kerberos(SshAuthCli - b = ssh_xbuffer_allocate(); - ssh_encode_buffer(b, - SSH_FORMAT_UINT32_STR, -- auth_data.data, auth_data.length, -+ auth_data.data, -+ (size_t) auth_data.length, - SSH_FORMAT_END); - - /* Send the authentication request (and complete this operation). */ diff --git a/security/ssh2/patches/patch-at b/security/ssh2/patches/patch-at deleted file mode 100644 index ae0ac5bb0e5..00000000000 --- a/security/ssh2/patches/patch-at +++ /dev/null @@ -1,37 +0,0 @@ -$NetBSD: patch-at,v 1.1 2006/09/22 13:58:46 kivinen Exp $ - ---- apps/ssh/authc-pam.c.orig 2003-12-03 15:17:26.000000000 +0200 -+++ apps/ssh/authc-pam.c -@@ -81,8 +81,10 @@ SSH_FSM_STEP(ssh_pamc_process_packet) - SSH_TRACE(4, ("Received %d messages.", num_msgs)); - - ssh_encode_buffer(gdata->response_packet, -- SSH_FORMAT_BOOLEAN, TRUE, -- SSH_FORMAT_UINT32, gdata->num_msgs, -+ SSH_FORMAT_BOOLEAN, -+ (Boolean) TRUE, -+ SSH_FORMAT_UINT32, -+ (SshUInt32) gdata->num_msgs, - SSH_FORMAT_END); - - SSH_FSM_SET_NEXT(ssh_pamc_process_next_msg); -@@ -234,7 +236,8 @@ SSH_FSM_STEP(ssh_pamc_append_response) - gdata->response_retcode = SSH_PAM_DEFAULT_RESP_RETCODE; - - ssh_encode_buffer(gdata->response_packet, -- SSH_FORMAT_CHAR, gdata->response_retcode, -+ SSH_FORMAT_CHAR, -+ (unsigned int) gdata->response_retcode, - SSH_FORMAT_UINT32_STR, - gdata->response_len ? gdata->response : "", - gdata->response_len, -@@ -341,7 +344,8 @@ void ssh_client_auth_pam(SshAuthClientOp - SSH_TRACE(2, ("Starting pam auth...")); - buffer = ssh_xbuffer_allocate(); - ssh_encode_buffer(buffer, -- SSH_FORMAT_BOOLEAN, FALSE, -+ SSH_FORMAT_BOOLEAN, -+ (Boolean) FALSE, - SSH_FORMAT_END); - (*completion)(SSH_AUTH_CLIENT_SEND_AND_CONTINUE, - user, buffer, completion_context); diff --git a/security/ssh2/patches/patch-au b/security/ssh2/patches/patch-au deleted file mode 100644 index 1bbfda42773..00000000000 --- a/security/ssh2/patches/patch-au +++ /dev/null @@ -1,24 +0,0 @@ -$NetBSD: patch-au,v 1.1 2006/09/22 13:58:46 kivinen Exp $ - ---- apps/ssh/authc-passwd.c.orig 2003-12-03 15:17:24.000000000 +0200 -+++ apps/ssh/authc-passwd.c -@@ -136,7 +136,8 @@ void ssh_client_auth_passwd(SshAuthClien - - b = ssh_xbuffer_allocate(); - ret_val = ssh_encode_buffer(b, -- SSH_FORMAT_BOOLEAN, FALSE, -+ SSH_FORMAT_BOOLEAN, -+ (Boolean) FALSE, - SSH_FORMAT_UINT32_STR, password, - strlen(password), - SSH_FORMAT_END); -@@ -229,7 +230,8 @@ void ssh_client_auth_passwd(SshAuthClien - b = ssh_xbuffer_allocate(); - - ret_val = ssh_encode_buffer(b, -- SSH_FORMAT_BOOLEAN, TRUE, -+ SSH_FORMAT_BOOLEAN, -+ (Boolean) TRUE, - SSH_FORMAT_UINT32_STR, - old_password, strlen(old_password), - SSH_FORMAT_UINT32_STR, diff --git a/security/ssh2/patches/patch-av b/security/ssh2/patches/patch-av deleted file mode 100644 index 01403b8eb06..00000000000 --- a/security/ssh2/patches/patch-av +++ /dev/null @@ -1,63 +0,0 @@ -$NetBSD: patch-av,v 1.1 2006/09/22 13:58:46 kivinen Exp $ - ---- apps/ssh/authc-pubkey.c.orig 2003-12-03 15:17:24.000000000 +0200 -+++ apps/ssh/authc-pubkey.c -@@ -208,7 +208,8 @@ SshBuffer ssh_client_auth_pubkey_try_key - if (!draft_incompatibility) - { - ssh_encode_buffer(b, -- SSH_FORMAT_BOOLEAN, FALSE, -+ SSH_FORMAT_BOOLEAN, -+ (Boolean) FALSE, - SSH_FORMAT_UINT32_STR, c->pubkey_alg, - strlen((char *)c->pubkey_alg), - SSH_FORMAT_UINT32_STR, c->pubkeyblob, -@@ -219,7 +220,8 @@ SshBuffer ssh_client_auth_pubkey_try_key - { - /* Remote end has publickey draft incompatibility bug. */ - ssh_encode_buffer(b, -- SSH_FORMAT_BOOLEAN, FALSE, -+ SSH_FORMAT_BOOLEAN, -+ (Boolean) FALSE, - /* Against the draft. Here should be string - 'publickey algorithm'*/ - SSH_FORMAT_UINT32_STR, c->pubkeyblob, -@@ -328,7 +330,8 @@ void ssh_client_auth_pubkey_sign_complet - ) - { - ssh_encode_buffer(b, -- SSH_FORMAT_BOOLEAN, TRUE, -+ SSH_FORMAT_BOOLEAN, -+ (Boolean) TRUE, - SSH_FORMAT_UINT32_STR, c->pubkey_alg, - strlen((char *)c->pubkey_alg), - SSH_FORMAT_UINT32_STR, c->pubkeyblob, -@@ -341,7 +344,8 @@ void ssh_client_auth_pubkey_sign_complet - { - /* Remote end has publickey draft incompatibility bug. */ - ssh_encode_buffer(b, -- SSH_FORMAT_BOOLEAN, TRUE, -+ SSH_FORMAT_BOOLEAN, -+ (Boolean) TRUE, - /* Against the draft. Here should be string - 'publickey algorithm'*/ - SSH_FORMAT_UINT32_STR, -@@ -702,7 +706,8 @@ Boolean ssh_client_auth_pubkey_send_sign - strlen(service), - SSH_FORMAT_UINT32_STR, SSH_AUTH_PUBKEY, - strlen(SSH_AUTH_PUBKEY), -- SSH_FORMAT_BOOLEAN, TRUE, -+ SSH_FORMAT_BOOLEAN, -+ (Boolean) TRUE, - SSH_FORMAT_UINT32_STR, c->pubkey_alg, - strlen(c->pubkey_alg), - SSH_FORMAT_UINT32_STR, c->pubkeyblob, -@@ -722,7 +727,7 @@ Boolean ssh_client_auth_pubkey_send_sign - strlen(service), - /* against the draft. Here should - be 'string "publickey"'*/ -- SSH_FORMAT_BOOLEAN, TRUE, -+ SSH_FORMAT_BOOLEAN, (Boolean) TRUE, - /* against the draft. Here should - be 'string public key algorith - name'*/ diff --git a/security/ssh2/patches/patch-aw b/security/ssh2/patches/patch-aw deleted file mode 100644 index 545965a90db..00000000000 --- a/security/ssh2/patches/patch-aw +++ /dev/null @@ -1,31 +0,0 @@ -$NetBSD: patch-aw,v 1.1 2006/09/22 13:58:46 kivinen Exp $ - ---- apps/ssh/authc-securid.c.orig 2003-12-03 15:17:26.000000000 +0200 -+++ apps/ssh/authc-securid.c -@@ -133,7 +133,7 @@ SSH_FSM_STEP(ssh_securid_send_pin) - - ssh_encode_buffer(gdata->response_packet, - SSH_FORMAT_BOOLEAN, -- TRUE, -+ (Boolean) TRUE, - SSH_FORMAT_UINT32_STR, - gdata->pin_info->final_pin, - strlen(gdata->pin_info->final_pin), -@@ -333,7 +333,7 @@ SSH_FSM_STEP(ssh_securid_challenge) - gdata->response_packet = ssh_xbuffer_allocate(); - ssh_encode_buffer(gdata->response_packet, - SSH_FORMAT_BOOLEAN, -- TRUE, -+ (Boolean) TRUE, - SSH_FORMAT_UINT32_STR, passphrase, strlen(passphrase), - SSH_FORMAT_END); - -@@ -451,7 +451,7 @@ void ssh_client_auth_securid(SshAuthClie - b = ssh_xbuffer_allocate(); - ssh_encode_buffer(b, - SSH_FORMAT_BOOLEAN, -- FALSE, -+ (Boolean) FALSE, - SSH_FORMAT_UINT32_STR, passcode, strlen(passcode), - SSH_FORMAT_END); - diff --git a/security/ssh2/patches/patch-ax b/security/ssh2/patches/patch-ax deleted file mode 100644 index 5660f5c082d..00000000000 --- a/security/ssh2/patches/patch-ax +++ /dev/null @@ -1,14 +0,0 @@ -$NetBSD: patch-ax,v 1.1 2006/09/22 13:58:46 kivinen Exp $ - ---- apps/ssh/auths-kbd-interactive.c.orig 2003-12-03 15:17:26.000000000 +0200 -+++ apps/ssh/auths-kbd-interactive.c -@@ -203,7 +203,8 @@ SSH_FSM_STEP(ssh_server_kbd_int_create_r - lang_tag = "en"; - - ret = ssh_encode_buffer(state->packet, -- SSH_FORMAT_CHAR, SSH_MSG_USERAUTH_INFO_REQUEST, -+ SSH_FORMAT_CHAR, -+ (unsigned int) SSH_MSG_USERAUTH_INFO_REQUEST, - SSH_FORMAT_UINT32_STR, name, strlen(name), - SSH_FORMAT_UINT32_STR, state->instruction, - strlen(state->instruction), diff --git a/security/ssh2/patches/patch-ay b/security/ssh2/patches/patch-ay deleted file mode 100644 index 5acb44f6fcb..00000000000 --- a/security/ssh2/patches/patch-ay +++ /dev/null @@ -1,14 +0,0 @@ -$NetBSD: patch-ay,v 1.1 2006/09/22 13:58:46 kivinen Exp $ - ---- apps/ssh/auths-pam.c.orig 2003-12-03 15:17:26.000000000 +0200 -+++ apps/ssh/auths-pam.c -@@ -255,7 +255,8 @@ void received_packet_cb(SshPacketType pa - - ssh_buffer_clear(gdata->client_packet); - ssh_encode_buffer(gdata->client_packet, -- SSH_FORMAT_CHAR, SSH_MSG_USERAUTH_PAM_MSG, -+ SSH_FORMAT_CHAR, -+ (unsigned int) SSH_MSG_USERAUTH_PAM_MSG, - SSH_FORMAT_DATA, data, len, - SSH_FORMAT_END); - (*gdata->completion_proc)(SSH_AUTH_SERVER_CONTINUE_WITH_PACKET_BACK, diff --git a/security/ssh2/patches/patch-az b/security/ssh2/patches/patch-az deleted file mode 100644 index 6641854e3c9..00000000000 --- a/security/ssh2/patches/patch-az +++ /dev/null @@ -1,22 +0,0 @@ -$NetBSD: patch-az,v 1.1 2006/09/22 13:58:46 kivinen Exp $ - ---- apps/ssh/auths-pubkey.c.orig 2003-12-03 15:17:25.000000000 +0200 -+++ apps/ssh/auths-pubkey.c -@@ -1103,7 +1103,7 @@ Boolean ssh_server_auth_pubkey_verify(Ss - strlen(service), - SSH_FORMAT_UINT32_STR, SSH_AUTH_PUBKEY, - strlen(SSH_AUTH_PUBKEY), -- SSH_FORMAT_BOOLEAN, TRUE, -+ SSH_FORMAT_BOOLEAN, (Boolean) TRUE, - SSH_FORMAT_UINT32_STR, certs_type, - strlen((char *)certs_type), - SSH_FORMAT_UINT32_STR, certs, tbloblen, -@@ -1122,7 +1122,7 @@ Boolean ssh_server_auth_pubkey_verify(Ss - strlen(service), - /* against the draft. Here should be 'string - "publickey"'*/ -- SSH_FORMAT_BOOLEAN, TRUE, -+ SSH_FORMAT_BOOLEAN, (Boolean) TRUE, - /* against the draft. Here should be 'string - public key algorith name'*/ - SSH_FORMAT_UINT32_STR, certs, tbloblen, diff --git a/security/ssh2/patches/patch-ba b/security/ssh2/patches/patch-ba deleted file mode 100644 index 4e3573fe87c..00000000000 --- a/security/ssh2/patches/patch-ba +++ /dev/null @@ -1,13 +0,0 @@ -$NetBSD: patch-ba,v 1.1 2006/09/22 13:58:46 kivinen Exp $ - ---- apps/ssh/auths-securid.c.orig 2003-12-03 15:17:26.000000000 +0200 -+++ apps/ssh/auths-securid.c -@@ -265,7 +265,7 @@ SSH_FSM_STEP(server_securid_get_next_cod - SSH_FORMAT_CHAR, - (unsigned int)SSH_MSG_USERAUTH_SECURID_CHALLENGE, - SSH_FORMAT_BOOLEAN, -- TRUE, -+ (Boolean) TRUE, - SSH_FORMAT_END); - - (*gdata->completion_proc)(SSH_AUTH_SERVER_CONTINUE_WITH_PACKET_BACK, diff --git a/security/ssh2/patches/patch-bb b/security/ssh2/patches/patch-bb deleted file mode 100644 index 96fce95fa58..00000000000 --- a/security/ssh2/patches/patch-bb +++ /dev/null @@ -1,13 +0,0 @@ -$NetBSD: patch-bb,v 1.1 2006/09/22 13:58:46 kivinen Exp $ - ---- apps/ssh/lib/sshproto/sshauthc.c.orig 2003-12-03 15:17:34.000000000 +0200 -+++ apps/ssh/lib/sshproto/sshauthc.c -@@ -378,7 +378,7 @@ void ssh_authc_completion_proc(SshAuthCl - auth->methods[i].name), - SSH_FORMAT_DATA, - packet ? ssh_buffer_ptr(packet) : NULL, -- packet ? ssh_buffer_len(packet) : 0, -+ packet ? ssh_buffer_len(packet) : (size_t) 0, - SSH_FORMAT_END); - - /* Mark that we have one more request out waiting for reply. */ diff --git a/security/ssh2/patches/patch-bc b/security/ssh2/patches/patch-bc deleted file mode 100644 index 2b11257d04c..00000000000 --- a/security/ssh2/patches/patch-bc +++ /dev/null @@ -1,31 +0,0 @@ -$NetBSD: patch-bc,v 1.1 2006/09/22 13:58:46 kivinen Exp $ - ---- apps/ssh/lib/sshproto/tests/t-userauth.c.orig 2003-12-03 15:17:34.000000000 +0200 -+++ apps/ssh/lib/sshproto/tests/t-userauth.c -@@ -336,7 +336,7 @@ void simple_password_client(SshAuthClien - ssh_debug("simple_password_client: sending pongpong %ld", pd->count); - #endif - ssh_encode_buffer(b, -- SSH_FORMAT_BOOLEAN, TRUE, -+ SSH_FORMAT_BOOLEAN, (Boolean) TRUE, - SSH_FORMAT_UINT32, pd->count, - SSH_FORMAT_END); - if (pd->count < pingpong_count) -@@ -357,7 +357,7 @@ void simple_password_client(SshAuthClien - ssh_debug("simple_password_client: sending req"); - #endif - ssh_encode_buffer(b, -- SSH_FORMAT_BOOLEAN, FALSE, -+ SSH_FORMAT_BOOLEAN, (Boolean) FALSE, - SSH_FORMAT_UINT32_STR, pass, strlen(pass), - SSH_FORMAT_END); - (*completion_proc)(SSH_AUTH_CLIENT_SEND, user, b, -@@ -392,7 +392,7 @@ void simple_password_client(SshAuthClien - #endif - b = ssh_xbuffer_allocate(); - ssh_encode_buffer(b, -- SSH_FORMAT_BOOLEAN, TRUE, -+ SSH_FORMAT_BOOLEAN, (Boolean) TRUE, - SSH_FORMAT_UINT32, pd->count, - SSH_FORMAT_END); - if (pd->count < pingpong_count) diff --git a/security/ssh2/patches/patch-bd b/security/ssh2/patches/patch-bd deleted file mode 100644 index bec995dde74..00000000000 --- a/security/ssh2/patches/patch-bd +++ /dev/null @@ -1,14 +0,0 @@ -$NetBSD: patch-bd,v 1.1 2006/09/22 13:58:46 kivinen Exp $ - ---- apps/ssh/sshchx11.c.orig 2003-12-03 15:17:25.000000000 +0200 -+++ apps/ssh/sshchx11.c -@@ -492,7 +492,8 @@ void ssh_channel_x11_send_request(SshCom - - ssh_buffer_init(&buffer); - ssh_encode_buffer(&buffer, -- SSH_FORMAT_BOOLEAN, FALSE, /* XXX single-connection */ -+ SSH_FORMAT_BOOLEAN, -+ (Boolean) FALSE, /* XXX single-connection */ - SSH_FORMAT_UINT32_STR, - ct->x11_fake_proto, ct->x11_fake_proto_len, - SSH_FORMAT_UINT32_STR, new_data, strlen(new_data), diff --git a/security/ssh2/patches/patch-be b/security/ssh2/patches/patch-be deleted file mode 100644 index 089477ce77d..00000000000 --- a/security/ssh2/patches/patch-be +++ /dev/null @@ -1,27 +0,0 @@ -$NetBSD: patch-be,v 1.1 2006/09/22 13:58:46 kivinen Exp $ - ---- lib/sshutil/sshnet/sshinetencode.c.orig 2003-12-03 15:17:31.000000000 +0200 -+++ lib/sshutil/sshnet/sshinetencode.c -@@ -31,9 +31,10 @@ size_t ssh_encode_ipaddr_array(unsigned - SSH_ASSERT(desired_len <= SSH_MAX_IPADDR_ENCODED_LENGTH); - if ((got = ssh_encode_array(buf, bufsize, - SSH_FORMAT_CHAR, (unsigned int) ip->type, -- SSH_FORMAT_UINT32, ip->mask_len, -+ SSH_FORMAT_UINT32, (SshUInt32) ip->mask_len, - SSH_FORMAT_DATA, -- ip->addr_data, SSH_IP_ADDR_LEN(ip), -+ ip->addr_data, -+ (size_t) SSH_IP_ADDR_LEN(ip), - SSH_FORMAT_END)) != desired_len) - return 0; - return desired_len; -@@ -91,7 +92,8 @@ size_t ssh_decode_ipaddr_array(const uns - if ((got = ssh_decode_array(buf + point, len - point, - SSH_FORMAT_UINT32, &mask_len, - SSH_FORMAT_DATA, -- ip->addr_data, SSH_IP_ADDR_LEN(ip), -+ ip->addr_data, -+ (size_t) SSH_IP_ADDR_LEN(ip), - SSH_FORMAT_END)) != (4 + SSH_IP_ADDR_LEN(ip))) - return 0; - diff --git a/security/ssh2/patches/patch-bf b/security/ssh2/patches/patch-bf deleted file mode 100644 index 8b274c1e6bf..00000000000 --- a/security/ssh2/patches/patch-bf +++ /dev/null @@ -1,27 +0,0 @@ -$NetBSD: patch-bf,v 1.1 2006/09/22 13:58:46 kivinen Exp $ - ---- lib/sshutil/sshnet/sshsocks.c.orig 2003-12-03 15:17:31.000000000 +0200 -+++ lib/sshutil/sshnet/sshsocks.c -@@ -375,8 +375,10 @@ SocksError ssh_socks_server_parse_open(S - return SSH_SOCKS_ERROR_INVALID_ARGUMENT; - } - ret = ssh_decode_array(data + bytes, len - bytes, -- SSH_FORMAT_DATA, ip, ip_addr_len, -- SSH_FORMAT_DATA, port_buf, 2, -+ SSH_FORMAT_DATA, ip, -+ (size_t) ip_addr_len, -+ SSH_FORMAT_DATA, port_buf, -+ (size_t) 2, - SSH_FORMAT_END); - if (ret <= 0) - { -@@ -734,7 +736,8 @@ SocksError ssh_socks4_client_generate_op - - ret = ssh_encode_buffer(buffer, - SSH_FORMAT_DATA, username, strlen(username), -- SSH_FORMAT_DATA, "\0", 1, -+ SSH_FORMAT_DATA, "\0", -+ (size_t) 1, - SSH_FORMAT_END); - if (ret == 0) - { diff --git a/security/ssh2/patches/patch-bg b/security/ssh2/patches/patch-bg deleted file mode 100644 index 3fa4dbd1b2c..00000000000 --- a/security/ssh2/patches/patch-bg +++ /dev/null @@ -1,49 +0,0 @@ -$NetBSD: patch-bg,v 1.1 2006/09/22 13:58:46 kivinen Exp $ - ---- lib/sshcrypto/sshpk/sshrgf.c.orig 2003-12-03 15:17:33.000000000 +0200 -+++ lib/sshcrypto/sshpk/sshrgf.c -@@ -412,6 +412,7 @@ rgf_pkcs1_verify(Boolean do_unpad, - unsigned char *digest; - size_t digest_len, return_len; - Boolean rv; -+ int ps_len, digestinfo_len; - - if (hash->context == NULL) - return SSH_RGF_OP_FAILED; -@@ -419,6 +420,9 @@ rgf_pkcs1_verify(Boolean do_unpad, - *output_msg = NULL; - *output_msg_len = 0; - -+ ps_len = 0; -+ digestinfo_len = 0; -+ - /* Decode the msg. */ - if ((ber_buf = ssh_malloc(max_output_msg_len)) == NULL) - return SSH_RGF_OP_FAILED; -@@ -457,8 +461,25 @@ rgf_pkcs1_verify(Boolean do_unpad, - (*hash->def->rgf_hash_finalize)(hash, digest); - hash_oid = (*hash->def->rgf_hash_asn1_oid)(hash); - -+ /* size of 'ff' padding */ -+ for(ps_len = 0; decrypted_signature[ps_len+2] == 255; ps_len++) -+ ; -+ -+ /* size of encoded digestinfo from the signature */ -+ switch(decrypted_signature[ps_len+4]){ -+ case 0x20: -+ digestinfo_len = 18; -+ break; -+ case 0x21: -+ digestinfo_len = 15; -+ break; -+ default : -+ digestinfo_len = 19; -+ } -+ - /* Compare. */ -- if (hash_oid == NULL || digest_len != return_len) -+ if (hash_oid == NULL || digest_len != return_len || -+ digestinfo_len + digest_len + 3 + ps_len != decrypted_signature_len) - { - ssh_free(oid); - ssh_free(temp_buf); diff --git a/security/ssh2/patches/patch-bh b/security/ssh2/patches/patch-bh deleted file mode 100644 index 2d1bd9bbe55..00000000000 --- a/security/ssh2/patches/patch-bh +++ /dev/null @@ -1,12 +0,0 @@ -$NetBSD: patch-bh,v 1.1 2006/11/02 12:31:58 kivinen Exp $ - ---- apps/ssh/scp2.c.orig 2003-12-03 15:17:22.000000000 +0200 -+++ apps/ssh/scp2.c -@@ -833,6 +833,7 @@ void scp_simple_progress_cb(SshFileCopyC - - fprintf(stdout, "%s | %4sB | %4sB/s | TOC: %s\r\n", - file_name, num_buffer, tr_rate_buffer, toc_buffer); -+ fflush(stdout); - ssh_xfree(file_name); - } - diff --git a/security/ssh2/patches/patch-bi b/security/ssh2/patches/patch-bi deleted file mode 100644 index cbaa3eae295..00000000000 --- a/security/ssh2/patches/patch-bi +++ /dev/null @@ -1,41 +0,0 @@ -$NetBSD: patch-bi,v 1.1 2006/11/02 12:31:58 kivinen Exp $ - ---- lib/sshutil/sshnet/sshunixtcp.c.orig 2003-12-03 15:17:31.000000000 +0200 -+++ lib/sshutil/sshnet/sshunixtcp.c -@@ -1459,7 +1459,6 @@ char *ssh_tcp_get_host_by_addr_sync(cons - #else /* VXWORKS */ - unsigned char outbuf[16]; - size_t outbuflen = 16; -- struct in_addr in_addr; - struct hostent *hp; - char *name; - int i; -@@ -1467,8 +1466,16 @@ char *ssh_tcp_get_host_by_addr_sync(cons - if (!ssh_inet_strtobin(addr, outbuf, &outbuflen)) - return NULL; - -- memmove(&in_addr.s_addr, outbuf, outbuflen); -- hp = gethostbyaddr((char *)&in_addr, sizeof(struct in_addr), AF_INET); -+#ifdef AF_INET6 -+ hp = gethostbyaddr((char *)outbuf, outbuflen, -+ (outbuflen == 16) ? AF_INET6 : AF_INET); -+#else /* AF_INET6 */ -+ if (outbuflen == 16) -+ return NULL; -+ hp = gethostbyaddr((char *)outbuf, outbuflen, -+ AF_INET); -+#endif /* AF_INET6 */ -+ - if (!hp) - return NULL; - -@@ -1491,7 +1498,8 @@ char *ssh_tcp_get_host_by_addr_sync(cons - - /* Look for the address from the list of addresses. */ - for (i = 0; hp->h_addr_list[i]; i++) -- if (memcmp(hp->h_addr_list[i], &in_addr, sizeof(in_addr)) == 0) -+ if (hp->h_length == outbuflen && -+ memcmp(hp->h_addr_list[i], outbuf, outbuflen) == 0) - break; - /* If we reached the end of the list, the address was not there. */ - if (!hp->h_addr_list[i]) |