From a67f71987f5987d79d76ea9f68975007c74a45db Mon Sep 17 00:00:00 2001 From: Waldemar Brodkorb Date: Wed, 13 May 2015 15:38:06 -0500 Subject: add missing patches to krb5 --- .../krb5/patches/patch-src_lib_krb5_ccache_cc_file_c | 20 ++++++++++++++++++++ ...rc_plugins_preauth_pkinit_pkinit_crypto_openssl_c | 11 +++++++++++ 2 files changed, 31 insertions(+) create mode 100644 package/krb5/patches/patch-src_lib_krb5_ccache_cc_file_c create mode 100644 package/krb5/patches/patch-src_plugins_preauth_pkinit_pkinit_crypto_openssl_c diff --git a/package/krb5/patches/patch-src_lib_krb5_ccache_cc_file_c b/package/krb5/patches/patch-src_lib_krb5_ccache_cc_file_c new file mode 100644 index 000000000..be64a4947 --- /dev/null +++ b/package/krb5/patches/patch-src_lib_krb5_ccache_cc_file_c @@ -0,0 +1,20 @@ +--- krb5-1.13.1.orig/src/lib/krb5/ccache/cc_file.c 2015-02-11 21:16:43.000000000 -0600 ++++ krb5-1.13.1/src/lib/krb5/ccache/cc_file.c 2015-05-02 15:20:59.335427054 -0500 +@@ -401,7 +401,7 @@ read_principal(krb5_context context, krb + { + krb5_error_code ret; + struct k5buf buf; +- size_t maxsize; ++ size_t maxsize = 0; + + *princ = NULL; + k5_cc_mutex_assert_locked(context, &((fcc_data *)id->data)->lock); +@@ -1088,7 +1088,7 @@ fcc_next_cred(krb5_context context, krb5 + krb5_fcc_cursor *fcursor = *cursor; + fcc_data *data = id->data; + struct k5buf buf; +- size_t maxsize; ++ size_t maxsize = 0; + + memset(creds, 0, sizeof(*creds)); + k5_cc_mutex_lock(context, &data->lock); diff --git a/package/krb5/patches/patch-src_plugins_preauth_pkinit_pkinit_crypto_openssl_c b/package/krb5/patches/patch-src_plugins_preauth_pkinit_pkinit_crypto_openssl_c new file mode 100644 index 000000000..41831586e --- /dev/null +++ b/package/krb5/patches/patch-src_plugins_preauth_pkinit_pkinit_crypto_openssl_c @@ -0,0 +1,11 @@ +--- krb5-1.13.1.orig/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c 2015-02-11 21:16:43.000000000 -0600 ++++ krb5-1.13.1/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c 2015-05-02 15:39:13.727426998 -0500 +@@ -3593,7 +3593,7 @@ pkinit_open_session(krb5_context context + { + CK_ULONG i, r; + unsigned char *cp; +- size_t label_len; ++ size_t label_len = 0; + CK_ULONG count = 0; + CK_SLOT_ID_PTR slotlist; + CK_TOKEN_INFO tinfo; -- cgit v1.2.3