summaryrefslogtreecommitdiff
path: root/package/openssh/patches/patch-sshconnect2_c
diff options
context:
space:
mode:
authorWaldemar Brodkorb <wbx@openadk.org>2009-12-05 12:15:12 +0100
committerWaldemar Brodkorb <wbx@openadk.org>2009-12-05 12:15:12 +0100
commit65b27b644c5817eb63fe7b8392236c37e0386f9b (patch)
tree31dcf3f300443fae37ed57c6c86fec960e3de9da /package/openssh/patches/patch-sshconnect2_c
parent9230fde0381a7dcc7e3d86e954382a01a8fcfd63 (diff)
update some packages to latest upstream
- openssh, aircrack-ng, autoconf, lighttpd - use mplayer svn version
Diffstat (limited to 'package/openssh/patches/patch-sshconnect2_c')
-rw-r--r--package/openssh/patches/patch-sshconnect2_c16
1 files changed, 8 insertions, 8 deletions
diff --git a/package/openssh/patches/patch-sshconnect2_c b/package/openssh/patches/patch-sshconnect2_c
index 405989001..1e6f16b1f 100644
--- a/package/openssh/patches/patch-sshconnect2_c
+++ b/package/openssh/patches/patch-sshconnect2_c
@@ -1,6 +1,6 @@
---- openssh-5.2p1.orig/sshconnect2.c 2008-11-05 06:20:47.000000000 +0100
-+++ openssh-5.2p1/sshconnect2.c 2009-09-18 12:30:37.000000000 +0200
-@@ -921,14 +921,14 @@ jpake_password_to_secret(Authctxt *authc
+--- openssh-5.3p1.orig/sshconnect2.c 2009-03-05 14:58:22.000000000 +0100
++++ openssh-5.3p1/sshconnect2.c 2009-12-05 12:10:19.000000000 +0100
+@@ -922,14 +922,14 @@ jpake_password_to_secret(Authctxt *authc
&secret, &secret_len) != 0)
fatal("%s: hash_buffer", __func__);
@@ -18,7 +18,7 @@
xfree(secret);
return ret;
-@@ -965,8 +965,8 @@ input_userauth_jpake_server_step1(int ty
+@@ -966,8 +966,8 @@ input_userauth_jpake_server_step1(int ty
/* Obtain password and derive secret */
pctx->s = jpake_password_to_secret(authctxt, crypt_scheme, salt);
@@ -29,7 +29,7 @@
xfree(crypt_scheme);
xfree(salt);
JPAKE_DEBUG_BN((pctx->s, "%s: s = ", __func__));
-@@ -981,8 +981,8 @@ input_userauth_jpake_server_step1(int ty
+@@ -982,8 +982,8 @@ input_userauth_jpake_server_step1(int ty
&pctx->a,
&x2_s_proof, &x2_s_proof_len);
@@ -40,7 +40,7 @@
xfree(x3_proof);
xfree(x4_proof);
-@@ -994,7 +994,7 @@ input_userauth_jpake_server_step1(int ty
+@@ -995,7 +995,7 @@ input_userauth_jpake_server_step1(int ty
packet_put_string(x2_s_proof, x2_s_proof_len);
packet_send();
@@ -49,7 +49,7 @@
xfree(x2_s_proof);
/* Expect step 2 packet from peer */
-@@ -1034,7 +1034,7 @@ input_userauth_jpake_server_step2(int ty
+@@ -1035,7 +1035,7 @@ input_userauth_jpake_server_step2(int ty
&pctx->k,
&pctx->h_k_cid_sessid, &pctx->h_k_cid_sessid_len);
@@ -58,7 +58,7 @@
xfree(x4_s_proof);
JPAKE_DEBUG_CTX((pctx, "confirm sending in %s", __func__));
-@@ -1700,8 +1700,8 @@ userauth_jpake(Authctxt *authctxt)
+@@ -1701,8 +1701,8 @@ userauth_jpake(Authctxt *authctxt)
packet_put_string(x2_proof, x2_proof_len);
packet_send();