From 65b27b644c5817eb63fe7b8392236c37e0386f9b Mon Sep 17 00:00:00 2001 From: Waldemar Brodkorb Date: Sat, 5 Dec 2009 12:15:12 +0100 Subject: update some packages to latest upstream - openssh, aircrack-ng, autoconf, lighttpd - use mplayer svn version --- package/openssh/patches/patch-sshconnect2_c | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) (limited to 'package/openssh/patches/patch-sshconnect2_c') diff --git a/package/openssh/patches/patch-sshconnect2_c b/package/openssh/patches/patch-sshconnect2_c index 405989001..1e6f16b1f 100644 --- a/package/openssh/patches/patch-sshconnect2_c +++ b/package/openssh/patches/patch-sshconnect2_c @@ -1,6 +1,6 @@ ---- openssh-5.2p1.orig/sshconnect2.c 2008-11-05 06:20:47.000000000 +0100 -+++ openssh-5.2p1/sshconnect2.c 2009-09-18 12:30:37.000000000 +0200 -@@ -921,14 +921,14 @@ jpake_password_to_secret(Authctxt *authc +--- openssh-5.3p1.orig/sshconnect2.c 2009-03-05 14:58:22.000000000 +0100 ++++ openssh-5.3p1/sshconnect2.c 2009-12-05 12:10:19.000000000 +0100 +@@ -922,14 +922,14 @@ jpake_password_to_secret(Authctxt *authc &secret, &secret_len) != 0) fatal("%s: hash_buffer", __func__); @@ -18,7 +18,7 @@ xfree(secret); return ret; -@@ -965,8 +965,8 @@ input_userauth_jpake_server_step1(int ty +@@ -966,8 +966,8 @@ input_userauth_jpake_server_step1(int ty /* Obtain password and derive secret */ pctx->s = jpake_password_to_secret(authctxt, crypt_scheme, salt); @@ -29,7 +29,7 @@ xfree(crypt_scheme); xfree(salt); JPAKE_DEBUG_BN((pctx->s, "%s: s = ", __func__)); -@@ -981,8 +981,8 @@ input_userauth_jpake_server_step1(int ty +@@ -982,8 +982,8 @@ input_userauth_jpake_server_step1(int ty &pctx->a, &x2_s_proof, &x2_s_proof_len); @@ -40,7 +40,7 @@ xfree(x3_proof); xfree(x4_proof); -@@ -994,7 +994,7 @@ input_userauth_jpake_server_step1(int ty +@@ -995,7 +995,7 @@ input_userauth_jpake_server_step1(int ty packet_put_string(x2_s_proof, x2_s_proof_len); packet_send(); @@ -49,7 +49,7 @@ xfree(x2_s_proof); /* Expect step 2 packet from peer */ -@@ -1034,7 +1034,7 @@ input_userauth_jpake_server_step2(int ty +@@ -1035,7 +1035,7 @@ input_userauth_jpake_server_step2(int ty &pctx->k, &pctx->h_k_cid_sessid, &pctx->h_k_cid_sessid_len); @@ -58,7 +58,7 @@ xfree(x4_s_proof); JPAKE_DEBUG_CTX((pctx, "confirm sending in %s", __func__)); -@@ -1700,8 +1700,8 @@ userauth_jpake(Authctxt *authctxt) +@@ -1701,8 +1701,8 @@ userauth_jpake(Authctxt *authctxt) packet_put_string(x2_proof, x2_proof_len); packet_send(); -- cgit v1.2.3 From 6233951bd273bc9245859d95a44a2278d55a7b65 Mon Sep 17 00:00:00 2001 From: Waldemar Brodkorb Date: Sun, 4 Apr 2010 10:05:26 +0200 Subject: update to latest upstream --- package/openssh/patches/patch-sshconnect2_c | 71 ----------------------------- 1 file changed, 71 deletions(-) delete mode 100644 package/openssh/patches/patch-sshconnect2_c (limited to 'package/openssh/patches/patch-sshconnect2_c') diff --git a/package/openssh/patches/patch-sshconnect2_c b/package/openssh/patches/patch-sshconnect2_c deleted file mode 100644 index 1e6f16b1f..000000000 --- a/package/openssh/patches/patch-sshconnect2_c +++ /dev/null @@ -1,71 +0,0 @@ ---- openssh-5.3p1.orig/sshconnect2.c 2009-03-05 14:58:22.000000000 +0100 -+++ openssh-5.3p1/sshconnect2.c 2009-12-05 12:10:19.000000000 +0100 -@@ -922,14 +922,14 @@ jpake_password_to_secret(Authctxt *authc - &secret, &secret_len) != 0) - fatal("%s: hash_buffer", __func__); - -- bzero(password, strlen(password)); -- bzero(crypted, strlen(crypted)); -+ memset(password, 0, strlen(password)); -+ memset(crypted, 0, strlen(crypted)); - xfree(password); - xfree(crypted); - - if ((ret = BN_bin2bn(secret, secret_len, NULL)) == NULL) - fatal("%s: BN_bin2bn (secret)", __func__); -- bzero(secret, secret_len); -+ memset(secret, 0, secret_len); - xfree(secret); - - return ret; -@@ -966,8 +966,8 @@ input_userauth_jpake_server_step1(int ty - - /* Obtain password and derive secret */ - pctx->s = jpake_password_to_secret(authctxt, crypt_scheme, salt); -- bzero(crypt_scheme, strlen(crypt_scheme)); -- bzero(salt, strlen(salt)); -+ memset(crypt_scheme, 0, strlen(crypt_scheme)); -+ memset(salt, 0, strlen(salt)); - xfree(crypt_scheme); - xfree(salt); - JPAKE_DEBUG_BN((pctx->s, "%s: s = ", __func__)); -@@ -982,8 +982,8 @@ input_userauth_jpake_server_step1(int ty - &pctx->a, - &x2_s_proof, &x2_s_proof_len); - -- bzero(x3_proof, x3_proof_len); -- bzero(x4_proof, x4_proof_len); -+ memset(x3_proof, 0, x3_proof_len); -+ memset(x4_proof, 0, x4_proof_len); - xfree(x3_proof); - xfree(x4_proof); - -@@ -995,7 +995,7 @@ input_userauth_jpake_server_step1(int ty - packet_put_string(x2_s_proof, x2_s_proof_len); - packet_send(); - -- bzero(x2_s_proof, x2_s_proof_len); -+ memset(x2_s_proof, 0, x2_s_proof_len); - xfree(x2_s_proof); - - /* Expect step 2 packet from peer */ -@@ -1035,7 +1035,7 @@ input_userauth_jpake_server_step2(int ty - &pctx->k, - &pctx->h_k_cid_sessid, &pctx->h_k_cid_sessid_len); - -- bzero(x4_s_proof, x4_s_proof_len); -+ memset(x4_s_proof, 0, x4_s_proof_len); - xfree(x4_s_proof); - - JPAKE_DEBUG_CTX((pctx, "confirm sending in %s", __func__)); -@@ -1701,8 +1701,8 @@ userauth_jpake(Authctxt *authctxt) - packet_put_string(x2_proof, x2_proof_len); - packet_send(); - -- bzero(x1_proof, x1_proof_len); -- bzero(x2_proof, x2_proof_len); -+ memset(x1_proof, 0, x1_proof_len); -+ memset(x2_proof, 0, x2_proof_len); - xfree(x1_proof); - xfree(x2_proof); - -- cgit v1.2.3