diff options
author | Waldemar Brodkorb <wbx@openadk.org> | 2009-12-05 12:15:12 +0100 |
---|---|---|
committer | Waldemar Brodkorb <wbx@openadk.org> | 2009-12-05 12:15:12 +0100 |
commit | 65b27b644c5817eb63fe7b8392236c37e0386f9b (patch) | |
tree | 31dcf3f300443fae37ed57c6c86fec960e3de9da /package/openssh/patches/patch-monitor_c | |
parent | 9230fde0381a7dcc7e3d86e954382a01a8fcfd63 (diff) |
update some packages to latest upstream
- openssh, aircrack-ng, autoconf, lighttpd
- use mplayer svn version
Diffstat (limited to 'package/openssh/patches/patch-monitor_c')
-rw-r--r-- | package/openssh/patches/patch-monitor_c | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/package/openssh/patches/patch-monitor_c b/package/openssh/patches/patch-monitor_c index 8992b3e6e..db7e7a370 100644 --- a/package/openssh/patches/patch-monitor_c +++ b/package/openssh/patches/patch-monitor_c @@ -1,6 +1,6 @@ ---- openssh-5.2p1.orig/monitor.c 2009-02-14 06:33:31.000000000 +0100 -+++ openssh-5.2p1/monitor.c 2009-09-18 12:31:53.000000000 +0200 -@@ -2029,8 +2029,8 @@ mm_answer_jpake_step1(int sock, Buffer * +--- openssh-5.3p1.orig/monitor.c 2009-06-21 10:58:46.000000000 +0200 ++++ openssh-5.3p1/monitor.c 2009-12-05 12:10:19.000000000 +0100 +@@ -2042,8 +2042,8 @@ mm_answer_jpake_step1(int sock, Buffer * debug3("%s: sending step1", __func__); mm_request_send(sock, MONITOR_ANS_JPAKE_STEP1, m); @@ -11,7 +11,7 @@ xfree(x3_proof); xfree(x4_proof); -@@ -2059,8 +2059,8 @@ mm_answer_jpake_get_pwdata(int sock, Buf +@@ -2072,8 +2072,8 @@ mm_answer_jpake_get_pwdata(int sock, Buf debug3("%s: sending pwdata", __func__); mm_request_send(sock, MONITOR_ANS_JPAKE_GET_PWDATA, m); @@ -22,7 +22,7 @@ xfree(hash_scheme); xfree(salt); -@@ -2099,8 +2099,8 @@ mm_answer_jpake_step2(int sock, Buffer * +@@ -2112,8 +2112,8 @@ mm_answer_jpake_step2(int sock, Buffer * JPAKE_DEBUG_CTX((pctx, "step2 done in %s", __func__)); @@ -33,7 +33,7 @@ xfree(x1_proof); xfree(x2_proof); -@@ -2112,7 +2112,7 @@ mm_answer_jpake_step2(int sock, Buffer * +@@ -2125,7 +2125,7 @@ mm_answer_jpake_step2(int sock, Buffer * debug3("%s: sending step2", __func__); mm_request_send(sock, MONITOR_ANS_JPAKE_STEP2, m); @@ -42,7 +42,7 @@ xfree(x4_s_proof); monitor_permit(mon_dispatch, MONITOR_REQ_JPAKE_KEY_CONFIRM, 1); -@@ -2146,7 +2146,7 @@ mm_answer_jpake_key_confirm(int sock, Bu +@@ -2159,7 +2159,7 @@ mm_answer_jpake_key_confirm(int sock, Bu JPAKE_DEBUG_CTX((pctx, "key_confirm done in %s", __func__)); @@ -51,7 +51,7 @@ buffer_clear(m); /* pctx->k is sensitive, not sent */ -@@ -2180,7 +2180,7 @@ mm_answer_jpake_check_confirm(int sock, +@@ -2193,7 +2193,7 @@ mm_answer_jpake_check_confirm(int sock, JPAKE_DEBUG_CTX((pctx, "check_confirm done in %s", __func__)); |