- rediff for no fuzz
This commit is contained in:
		
							parent
							
								
									09510adc7c
								
							
						
					
					
						commit
						ec5276165c
					
				@ -1,5 +1,6 @@
 | 
				
			|||||||
--- openssh-4.2p1/contrib/gnome-ssh-askpass2.c.progress	2005-11-28 11:11:24.000000000 +0100
 | 
					diff -up openssh-5.1p1/contrib/gnome-ssh-askpass2.c.progress openssh-5.1p1/contrib/gnome-ssh-askpass2.c
 | 
				
			||||||
+++ openssh-4.2p1/contrib/gnome-ssh-askpass2.c	2005-12-20 15:22:42.000000000 +0100
 | 
					--- openssh-5.1p1/contrib/gnome-ssh-askpass2.c.progress	2008-07-23 19:05:26.000000000 +0200
 | 
				
			||||||
 | 
					+++ openssh-5.1p1/contrib/gnome-ssh-askpass2.c	2008-07-23 19:05:26.000000000 +0200
 | 
				
			||||||
@@ -53,6 +53,7 @@
 | 
					@@ -53,6 +53,7 @@
 | 
				
			||||||
 #include <string.h>
 | 
					 #include <string.h>
 | 
				
			||||||
 #include <unistd.h>
 | 
					 #include <unistd.h>
 | 
				
			||||||
@ -8,7 +9,7 @@
 | 
				
			|||||||
 #include <gtk/gtk.h>
 | 
					 #include <gtk/gtk.h>
 | 
				
			||||||
 #include <gdk/gdkx.h>
 | 
					 #include <gdk/gdkx.h>
 | 
				
			||||||
 
 | 
					 
 | 
				
			||||||
@@ -83,13 +84,24 @@
 | 
					@@ -83,13 +84,24 @@ ok_dialog(GtkWidget *entry, gpointer dia
 | 
				
			||||||
 	gtk_dialog_response(GTK_DIALOG(dialog), GTK_RESPONSE_OK);
 | 
					 	gtk_dialog_response(GTK_DIALOG(dialog), GTK_RESPONSE_OK);
 | 
				
			||||||
 }
 | 
					 }
 | 
				
			||||||
 
 | 
					 
 | 
				
			||||||
@ -34,7 +35,7 @@
 | 
				
			|||||||
 	GdkGrabStatus status;
 | 
					 	GdkGrabStatus status;
 | 
				
			||||||
 
 | 
					 
 | 
				
			||||||
 	grab_server = (getenv("GNOME_SSH_ASKPASS_GRAB_SERVER") != NULL);
 | 
					 	grab_server = (getenv("GNOME_SSH_ASKPASS_GRAB_SERVER") != NULL);
 | 
				
			||||||
@@ -102,13 +114,31 @@
 | 
					@@ -102,13 +114,31 @@ passphrase_dialog(char *message)
 | 
				
			||||||
 					"%s",
 | 
					 					"%s",
 | 
				
			||||||
 					message);
 | 
					 					message);
 | 
				
			||||||
 
 | 
					 
 | 
				
			||||||
@ -66,8 +67,8 @@
 | 
				
			|||||||
+
 | 
					+
 | 
				
			||||||
 	gtk_window_set_title(GTK_WINDOW(dialog), "OpenSSH");
 | 
					 	gtk_window_set_title(GTK_WINDOW(dialog), "OpenSSH");
 | 
				
			||||||
 	gtk_window_set_position (GTK_WINDOW(dialog), GTK_WIN_POS_CENTER);
 | 
					 	gtk_window_set_position (GTK_WINDOW(dialog), GTK_WIN_POS_CENTER);
 | 
				
			||||||
 	gtk_label_set_line_wrap(GTK_LABEL((GTK_MESSAGE_DIALOG(dialog))->label),
 | 
					 	gtk_window_set_keep_above(GTK_WINDOW(dialog), TRUE);
 | 
				
			||||||
@@ -118,6 +148,8 @@
 | 
					@@ -119,6 +149,8 @@ passphrase_dialog(char *message)
 | 
				
			||||||
 	gtk_dialog_set_default_response(GTK_DIALOG(dialog), GTK_RESPONSE_OK);
 | 
					 	gtk_dialog_set_default_response(GTK_DIALOG(dialog), GTK_RESPONSE_OK);
 | 
				
			||||||
 	g_signal_connect(G_OBJECT(entry), "activate",
 | 
					 	g_signal_connect(G_OBJECT(entry), "activate",
 | 
				
			||||||
 			 G_CALLBACK(ok_dialog), dialog);
 | 
					 			 G_CALLBACK(ok_dialog), dialog);
 | 
				
			||||||
@ -1,8 +1,9 @@
 | 
				
			|||||||
Written-by: Nalin Dahyabhai <nalin@redhat.com>
 | 
					Written-by: Nalin Dahyabhai <nalin@redhat.com>
 | 
				
			||||||
Reviewed-by: Tomas Mraz <tmraz@redhat.com>
 | 
					Reviewed-by: Tomas Mraz <tmraz@redhat.com>
 | 
				
			||||||
--- auth2-gss.c	2008-01-02 16:34:03.000000000 -0500
 | 
					diff -up openssh-5.1p1/auth2-gss.c.gssapi-role openssh-5.1p1/auth2-gss.c
 | 
				
			||||||
+++ auth2-gss.c	2008-01-02 16:33:19.000000000 -0500
 | 
					--- openssh-5.1p1/auth2-gss.c.gssapi-role	2007-12-02 12:59:45.000000000 +0100
 | 
				
			||||||
@@ -258,6 +258,7 @@
 | 
					+++ openssh-5.1p1/auth2-gss.c	2008-07-23 19:18:15.000000000 +0200
 | 
				
			||||||
 | 
					@@ -258,6 +258,7 @@ input_gssapi_mic(int type, u_int32_t ple
 | 
				
			||||||
 	Authctxt *authctxt = ctxt;
 | 
					 	Authctxt *authctxt = ctxt;
 | 
				
			||||||
 	Gssctxt *gssctxt;
 | 
					 	Gssctxt *gssctxt;
 | 
				
			||||||
 	int authenticated = 0;
 | 
					 	int authenticated = 0;
 | 
				
			||||||
@ -10,7 +11,7 @@ Reviewed-by: Tomas Mraz <tmraz@redhat.com>
 | 
				
			|||||||
 	Buffer b;
 | 
					 	Buffer b;
 | 
				
			||||||
 	gss_buffer_desc mic, gssbuf;
 | 
					 	gss_buffer_desc mic, gssbuf;
 | 
				
			||||||
 	u_int len;
 | 
					 	u_int len;
 | 
				
			||||||
@@ -270,7 +271,11 @@
 | 
					@@ -270,7 +271,11 @@ input_gssapi_mic(int type, u_int32_t ple
 | 
				
			||||||
 	mic.value = packet_get_string(&len);
 | 
					 	mic.value = packet_get_string(&len);
 | 
				
			||||||
 	mic.length = len;
 | 
					 	mic.length = len;
 | 
				
			||||||
 
 | 
					 
 | 
				
			||||||
@ -23,8 +24,8 @@ Reviewed-by: Tomas Mraz <tmraz@redhat.com>
 | 
				
			|||||||
 	    "gssapi-with-mic");
 | 
					 	    "gssapi-with-mic");
 | 
				
			||||||
 
 | 
					 
 | 
				
			||||||
 	gssbuf.value = buffer_ptr(&b);
 | 
					 	gssbuf.value = buffer_ptr(&b);
 | 
				
			||||||
@@ -285,6 +290,8 @@
 | 
					@@ -282,6 +287,8 @@ input_gssapi_mic(int type, u_int32_t ple
 | 
				
			||||||
 	}
 | 
					 		logit("GSSAPI MIC check failed");
 | 
				
			||||||
 
 | 
					 
 | 
				
			||||||
 	buffer_free(&b);
 | 
					 	buffer_free(&b);
 | 
				
			||||||
+	if (micuser != authctxt->user)
 | 
					+	if (micuser != authctxt->user)
 | 
				
			||||||
@ -1,7 +1,7 @@
 | 
				
			|||||||
diff -up openssh-4.7p1/misc.c.mls openssh-4.7p1/misc.c
 | 
					diff -up openssh-5.1p1/misc.c.mls openssh-5.1p1/misc.c
 | 
				
			||||||
--- openssh-4.7p1/misc.c.mls	2007-01-05 06:24:48.000000000 +0100
 | 
					--- openssh-5.1p1/misc.c.mls	2008-06-13 06:48:59.000000000 +0200
 | 
				
			||||||
+++ openssh-4.7p1/misc.c	2007-09-06 17:39:28.000000000 +0200
 | 
					+++ openssh-5.1p1/misc.c	2008-07-23 18:53:37.000000000 +0200
 | 
				
			||||||
@@ -418,6 +418,7 @@ char *
 | 
					@@ -427,6 +427,7 @@ char *
 | 
				
			||||||
 colon(char *cp)
 | 
					 colon(char *cp)
 | 
				
			||||||
 {
 | 
					 {
 | 
				
			||||||
 	int flag = 0;
 | 
					 	int flag = 0;
 | 
				
			||||||
@ -9,7 +9,7 @@ diff -up openssh-4.7p1/misc.c.mls openssh-4.7p1/misc.c
 | 
				
			|||||||
 
 | 
					 
 | 
				
			||||||
 	if (*cp == ':')		/* Leading colon is part of file name. */
 | 
					 	if (*cp == ':')		/* Leading colon is part of file name. */
 | 
				
			||||||
 		return (0);
 | 
					 		return (0);
 | 
				
			||||||
@@ -431,8 +432,13 @@ colon(char *cp)
 | 
					@@ -440,8 +441,13 @@ colon(char *cp)
 | 
				
			||||||
 			return (cp+1);
 | 
					 			return (cp+1);
 | 
				
			||||||
 		if (*cp == ':' && !flag)
 | 
					 		if (*cp == ':' && !flag)
 | 
				
			||||||
 			return (cp);
 | 
					 			return (cp);
 | 
				
			||||||
@ -25,10 +25,10 @@ diff -up openssh-4.7p1/misc.c.mls openssh-4.7p1/misc.c
 | 
				
			|||||||
 	}
 | 
					 	}
 | 
				
			||||||
 	return (0);
 | 
					 	return (0);
 | 
				
			||||||
 }
 | 
					 }
 | 
				
			||||||
diff -up openssh-4.7p1/session.c.mls openssh-4.7p1/session.c
 | 
					diff -up openssh-5.1p1/session.c.mls openssh-5.1p1/session.c
 | 
				
			||||||
--- openssh-4.7p1/session.c.mls	2007-09-06 17:39:28.000000000 +0200
 | 
					--- openssh-5.1p1/session.c.mls	2008-06-16 15:29:18.000000000 +0200
 | 
				
			||||||
+++ openssh-4.7p1/session.c	2007-09-06 17:39:28.000000000 +0200
 | 
					+++ openssh-5.1p1/session.c	2008-07-23 18:53:37.000000000 +0200
 | 
				
			||||||
@@ -1347,10 +1347,6 @@ do_setusercontext(struct passwd *pw)
 | 
					@@ -1550,10 +1550,6 @@ do_setusercontext(struct passwd *pw)
 | 
				
			||||||
 #endif
 | 
					 #endif
 | 
				
			||||||
 	if (getuid() != pw->pw_uid || geteuid() != pw->pw_uid)
 | 
					 	if (getuid() != pw->pw_uid || geteuid() != pw->pw_uid)
 | 
				
			||||||
 		fatal("Failed to set uids to %u.", (u_int) pw->pw_uid);
 | 
					 		fatal("Failed to set uids to %u.", (u_int) pw->pw_uid);
 | 
				
			||||||
@ -39,9 +39,9 @@ diff -up openssh-4.7p1/session.c.mls openssh-4.7p1/session.c
 | 
				
			|||||||
 }
 | 
					 }
 | 
				
			||||||
 
 | 
					 
 | 
				
			||||||
 static void
 | 
					 static void
 | 
				
			||||||
diff -up openssh-4.7p1/openbsd-compat/port-linux.c.mls openssh-4.7p1/openbsd-compat/port-linux.c
 | 
					diff -up openssh-5.1p1/openbsd-compat/port-linux.c.mls openssh-5.1p1/openbsd-compat/port-linux.c
 | 
				
			||||||
--- openssh-4.7p1/openbsd-compat/port-linux.c.mls	2007-09-06 17:39:28.000000000 +0200
 | 
					--- openssh-5.1p1/openbsd-compat/port-linux.c.mls	2008-07-23 18:53:37.000000000 +0200
 | 
				
			||||||
+++ openssh-4.7p1/openbsd-compat/port-linux.c	2007-08-07 17:38:18.000000000 +0200
 | 
					+++ openssh-5.1p1/openbsd-compat/port-linux.c	2008-07-23 18:53:37.000000000 +0200
 | 
				
			||||||
@@ -33,12 +33,23 @@
 | 
					@@ -33,12 +33,23 @@
 | 
				
			||||||
 #include "key.h"
 | 
					 #include "key.h"
 | 
				
			||||||
 #include "hostfile.h"
 | 
					 #include "hostfile.h"
 | 
				
			||||||
@ -65,7 +65,7 @@ diff -up openssh-4.7p1/openbsd-compat/port-linux.c.mls openssh-4.7p1/openbsd-com
 | 
				
			|||||||
+extern int rexeced_flag;
 | 
					+extern int rexeced_flag;
 | 
				
			||||||
 
 | 
					 
 | 
				
			||||||
 /* Wrapper around is_selinux_enabled() to log its return value once only */
 | 
					 /* Wrapper around is_selinux_enabled() to log its return value once only */
 | 
				
			||||||
 static int
 | 
					 int
 | 
				
			||||||
@@ -54,17 +65,173 @@ ssh_selinux_enabled(void)
 | 
					@@ -54,17 +65,173 @@ ssh_selinux_enabled(void)
 | 
				
			||||||
 	return (enabled);
 | 
					 	return (enabled);
 | 
				
			||||||
 }
 | 
					 }
 | 
				
			||||||
@ -246,7 +246,7 @@ diff -up openssh-4.7p1/openbsd-compat/port-linux.c.mls openssh-4.7p1/openbsd-com
 | 
				
			|||||||
 #ifdef HAVE_GETSEUSERBYNAME
 | 
					 #ifdef HAVE_GETSEUSERBYNAME
 | 
				
			||||||
 	if ((r=getseuserbyname(pwname, &sename, &lvl)) != 0) {
 | 
					 	if ((r=getseuserbyname(pwname, &sename, &lvl)) != 0) {
 | 
				
			||||||
 		sename = NULL;
 | 
					 		sename = NULL;
 | 
				
			||||||
@@ -72,37 +239,62 @@ ssh_selinux_getctxbyname(char *pwname)
 | 
					@@ -72,38 +239,63 @@ ssh_selinux_getctxbyname(char *pwname)
 | 
				
			||||||
 	}
 | 
					 	}
 | 
				
			||||||
 #else
 | 
					 #else
 | 
				
			||||||
 	sename = pwname;
 | 
					 	sename = pwname;
 | 
				
			||||||
@ -300,7 +300,7 @@ diff -up openssh-4.7p1/openbsd-compat/port-linux.c.mls openssh-4.7p1/openbsd-com
 | 
				
			|||||||
+			    reqlvl = "";
 | 
					+			    reqlvl = "";
 | 
				
			||||||
+
 | 
					+
 | 
				
			||||||
+			debug("%s: current connection level '%s'", __func__, reqlvl);
 | 
					+			debug("%s: current connection level '%s'", __func__, reqlvl);
 | 
				
			||||||
 		}
 | 
					+		}
 | 
				
			||||||
+		
 | 
					+		
 | 
				
			||||||
+		if ((reqlvl != NULL && reqlvl[0]) || (role != NULL && role[0])) {
 | 
					+		if ((reqlvl != NULL && reqlvl[0]) || (role != NULL && role[0])) {
 | 
				
			||||||
+			r = get_user_context(sename, role, reqlvl, user_sc);
 | 
					+			r = get_user_context(sename, role, reqlvl, user_sc);
 | 
				
			||||||
@ -323,14 +323,15 @@ diff -up openssh-4.7p1/openbsd-compat/port-linux.c.mls openssh-4.7p1/openbsd-com
 | 
				
			|||||||
+			}
 | 
					+			}
 | 
				
			||||||
+		} else {
 | 
					+		} else {
 | 
				
			||||||
+			*user_sc = *default_sc;
 | 
					+			*user_sc = *default_sc;
 | 
				
			||||||
+		}
 | 
					 		}
 | 
				
			||||||
+	}
 | 
					 	}
 | 
				
			||||||
+	if (r != 0) {
 | 
					+	if (r != 0) {
 | 
				
			||||||
+		error("%s: Failed to get default SELinux security "
 | 
					+		error("%s: Failed to get default SELinux security "
 | 
				
			||||||
+		    "context for %s", __func__, pwname);
 | 
					+		    "context for %s", __func__, pwname);
 | 
				
			||||||
 	}
 | 
					+	}
 | 
				
			||||||
 
 | 
					 
 | 
				
			||||||
 #ifdef HAVE_GETSEUSERBYNAME
 | 
					 #ifdef HAVE_GETSEUSERBYNAME
 | 
				
			||||||
 | 
					 	if (sename != NULL)
 | 
				
			||||||
@@ -111,14 +303,20 @@ ssh_selinux_getctxbyname(char *pwname)
 | 
					@@ -111,14 +303,20 @@ ssh_selinux_getctxbyname(char *pwname)
 | 
				
			||||||
 	if (lvl != NULL)
 | 
					 	if (lvl != NULL)
 | 
				
			||||||
 		xfree(lvl);
 | 
					 		xfree(lvl);
 | 
				
			||||||
@ -418,10 +419,10 @@ diff -up openssh-4.7p1/openbsd-compat/port-linux.c.mls openssh-4.7p1/openbsd-com
 | 
				
			|||||||
 
 | 
					 
 | 
				
			||||||
 	/* XXX: should these calls fatal() upon failure in enforcing mode? */
 | 
					 	/* XXX: should these calls fatal() upon failure in enforcing mode? */
 | 
				
			||||||
 
 | 
					 
 | 
				
			||||||
diff -up openssh-4.7p1/configure.ac.mls openssh-4.7p1/configure.ac
 | 
					diff -up openssh-5.1p1/configure.ac.mls openssh-5.1p1/configure.ac
 | 
				
			||||||
--- openssh-4.7p1/configure.ac.mls	2007-10-17 19:05:10.000000000 +0200
 | 
					--- openssh-5.1p1/configure.ac.mls	2008-07-23 18:53:37.000000000 +0200
 | 
				
			||||||
+++ openssh-4.7p1/configure.ac	2007-10-17 19:05:38.000000000 +0200
 | 
					+++ openssh-5.1p1/configure.ac	2008-07-23 18:53:37.000000000 +0200
 | 
				
			||||||
@@ -3213,6 +3213,7 @@ AC_ARG_WITH(selinux,
 | 
					@@ -3311,6 +3311,7 @@ AC_ARG_WITH(selinux,
 | 
				
			||||||
 		SSHDLIBS="$SSHDLIBS $LIBSELINUX"
 | 
					 		SSHDLIBS="$SSHDLIBS $LIBSELINUX"
 | 
				
			||||||
 		LIBS="$LIBS $LIBSELINUX"
 | 
					 		LIBS="$LIBS $LIBSELINUX"
 | 
				
			||||||
 		AC_CHECK_FUNCS(getseuserbyname get_default_context_with_level)
 | 
					 		AC_CHECK_FUNCS(getseuserbyname get_default_context_with_level)
 | 
				
			||||||
@ -429,10 +430,10 @@ diff -up openssh-4.7p1/configure.ac.mls openssh-4.7p1/configure.ac
 | 
				
			|||||||
 		LIBS="$save_LIBS"
 | 
					 		LIBS="$save_LIBS"
 | 
				
			||||||
 	fi ]
 | 
					 	fi ]
 | 
				
			||||||
 )
 | 
					 )
 | 
				
			||||||
diff -up openssh-4.7p1/sshd.c.mls openssh-4.7p1/sshd.c
 | 
					diff -up openssh-5.1p1/sshd.c.mls openssh-5.1p1/sshd.c
 | 
				
			||||||
--- openssh-4.7p1/sshd.c.mls	2007-09-06 17:39:28.000000000 +0200
 | 
					--- openssh-5.1p1/sshd.c.mls	2008-07-23 18:53:37.000000000 +0200
 | 
				
			||||||
+++ openssh-4.7p1/sshd.c	2007-09-06 17:39:28.000000000 +0200
 | 
					+++ openssh-5.1p1/sshd.c	2008-07-23 18:53:37.000000000 +0200
 | 
				
			||||||
@@ -1838,6 +1838,9 @@ main(int ac, char **av)
 | 
					@@ -1896,6 +1896,9 @@ main(int ac, char **av)
 | 
				
			||||||
 		restore_uid();
 | 
					 		restore_uid();
 | 
				
			||||||
 	}
 | 
					 	}
 | 
				
			||||||
 #endif
 | 
					 #endif
 | 
				
			||||||
@ -1,7 +1,7 @@
 | 
				
			|||||||
diff -up openssh-4.7p1/key.c.nss-keys openssh-4.7p1/key.c
 | 
					diff -up openssh-5.1p1/key.c.nss-keys openssh-5.1p1/key.c
 | 
				
			||||||
--- openssh-4.7p1/key.c.nss-keys	2007-08-08 06:28:26.000000000 +0200
 | 
					--- openssh-5.1p1/key.c.nss-keys	2008-07-11 09:35:09.000000000 +0200
 | 
				
			||||||
+++ openssh-4.7p1/key.c	2007-11-20 14:40:17.000000000 +0100
 | 
					+++ openssh-5.1p1/key.c	2008-07-23 19:16:00.000000000 +0200
 | 
				
			||||||
@@ -93,6 +93,54 @@ key_new(int type)
 | 
					@@ -96,6 +96,54 @@ key_new(int type)
 | 
				
			||||||
 	return k;
 | 
					 	return k;
 | 
				
			||||||
 }
 | 
					 }
 | 
				
			||||||
 
 | 
					 
 | 
				
			||||||
@ -56,7 +56,7 @@ diff -up openssh-4.7p1/key.c.nss-keys openssh-4.7p1/key.c
 | 
				
			|||||||
 Key *
 | 
					 Key *
 | 
				
			||||||
 key_new_private(int type)
 | 
					 key_new_private(int type)
 | 
				
			||||||
 {
 | 
					 {
 | 
				
			||||||
@@ -148,6 +196,19 @@ key_free(Key *k)
 | 
					@@ -151,6 +199,19 @@ key_free(Key *k)
 | 
				
			||||||
 		fatal("key_free: bad key type %d", k->type);
 | 
					 		fatal("key_free: bad key type %d", k->type);
 | 
				
			||||||
 		break;
 | 
					 		break;
 | 
				
			||||||
 	}
 | 
					 	}
 | 
				
			||||||
@ -76,9 +76,9 @@ diff -up openssh-4.7p1/key.c.nss-keys openssh-4.7p1/key.c
 | 
				
			|||||||
 	xfree(k);
 | 
					 	xfree(k);
 | 
				
			||||||
 }
 | 
					 }
 | 
				
			||||||
 
 | 
					 
 | 
				
			||||||
diff -up openssh-4.7p1/ssh-dss.c.nss-keys openssh-4.7p1/ssh-dss.c
 | 
					diff -up openssh-5.1p1/ssh-dss.c.nss-keys openssh-5.1p1/ssh-dss.c
 | 
				
			||||||
--- openssh-4.7p1/ssh-dss.c.nss-keys	2006-11-07 13:14:42.000000000 +0100
 | 
					--- openssh-5.1p1/ssh-dss.c.nss-keys	2006-11-07 13:14:42.000000000 +0100
 | 
				
			||||||
+++ openssh-4.7p1/ssh-dss.c	2007-11-20 14:26:43.000000000 +0100
 | 
					+++ openssh-5.1p1/ssh-dss.c	2008-07-23 19:16:00.000000000 +0200
 | 
				
			||||||
@@ -39,6 +39,10 @@
 | 
					@@ -39,6 +39,10 @@
 | 
				
			||||||
 #include "log.h"
 | 
					 #include "log.h"
 | 
				
			||||||
 #include "key.h"
 | 
					 #include "key.h"
 | 
				
			||||||
@ -136,10 +136,10 @@ diff -up openssh-4.7p1/ssh-dss.c.nss-keys openssh-4.7p1/ssh-dss.c
 | 
				
			|||||||
 	if (datafellows & SSH_BUG_SIGBLOB) {
 | 
					 	if (datafellows & SSH_BUG_SIGBLOB) {
 | 
				
			||||||
 		if (lenp != NULL)
 | 
					 		if (lenp != NULL)
 | 
				
			||||||
 			*lenp = SIGBLOB_LEN;
 | 
					 			*lenp = SIGBLOB_LEN;
 | 
				
			||||||
diff -up openssh-4.7p1/ssh-agent.c.nss-keys openssh-4.7p1/ssh-agent.c
 | 
					diff -up openssh-5.1p1/ssh-agent.c.nss-keys openssh-5.1p1/ssh-agent.c
 | 
				
			||||||
--- openssh-4.7p1/ssh-agent.c.nss-keys	2007-03-21 10:45:07.000000000 +0100
 | 
					--- openssh-5.1p1/ssh-agent.c.nss-keys	2008-07-04 15:10:49.000000000 +0200
 | 
				
			||||||
+++ openssh-4.7p1/ssh-agent.c	2007-11-20 14:26:43.000000000 +0100
 | 
					+++ openssh-5.1p1/ssh-agent.c	2008-07-23 19:16:00.000000000 +0200
 | 
				
			||||||
@@ -79,6 +79,10 @@
 | 
					@@ -80,6 +80,10 @@
 | 
				
			||||||
 #include "scard.h"
 | 
					 #include "scard.h"
 | 
				
			||||||
 #endif
 | 
					 #endif
 | 
				
			||||||
 
 | 
					 
 | 
				
			||||||
@ -150,7 +150,7 @@ diff -up openssh-4.7p1/ssh-agent.c.nss-keys openssh-4.7p1/ssh-agent.c
 | 
				
			|||||||
 #if defined(HAVE_SYS_PRCTL_H)
 | 
					 #if defined(HAVE_SYS_PRCTL_H)
 | 
				
			||||||
 #include <sys/prctl.h>	/* For prctl() and PR_SET_DUMPABLE */
 | 
					 #include <sys/prctl.h>	/* For prctl() and PR_SET_DUMPABLE */
 | 
				
			||||||
 #endif
 | 
					 #endif
 | 
				
			||||||
@@ -701,6 +705,114 @@ send:
 | 
					@@ -714,6 +718,114 @@ send:
 | 
				
			||||||
 }
 | 
					 }
 | 
				
			||||||
 #endif /* SMARTCARD */
 | 
					 #endif /* SMARTCARD */
 | 
				
			||||||
 
 | 
					 
 | 
				
			||||||
@ -265,7 +265,7 @@ diff -up openssh-4.7p1/ssh-agent.c.nss-keys openssh-4.7p1/ssh-agent.c
 | 
				
			|||||||
 /* dispatch incoming messages */
 | 
					 /* dispatch incoming messages */
 | 
				
			||||||
 
 | 
					 
 | 
				
			||||||
 static void
 | 
					 static void
 | 
				
			||||||
@@ -793,6 +905,15 @@ process_message(SocketEntry *e)
 | 
					@@ -806,6 +918,15 @@ process_message(SocketEntry *e)
 | 
				
			||||||
 		process_remove_smartcard_key(e);
 | 
					 		process_remove_smartcard_key(e);
 | 
				
			||||||
 		break;
 | 
					 		break;
 | 
				
			||||||
 #endif /* SMARTCARD */
 | 
					 #endif /* SMARTCARD */
 | 
				
			||||||
@ -281,9 +281,9 @@ diff -up openssh-4.7p1/ssh-agent.c.nss-keys openssh-4.7p1/ssh-agent.c
 | 
				
			|||||||
 	default:
 | 
					 	default:
 | 
				
			||||||
 		/* Unknown message.  Respond with failure. */
 | 
					 		/* Unknown message.  Respond with failure. */
 | 
				
			||||||
 		error("Unknown message %d", type);
 | 
					 		error("Unknown message %d", type);
 | 
				
			||||||
diff -up openssh-4.7p1/authfd.h.nss-keys openssh-4.7p1/authfd.h
 | 
					diff -up openssh-5.1p1/authfd.h.nss-keys openssh-5.1p1/authfd.h
 | 
				
			||||||
--- openssh-4.7p1/authfd.h.nss-keys	2006-08-05 04:39:39.000000000 +0200
 | 
					--- openssh-5.1p1/authfd.h.nss-keys	2006-08-05 04:39:39.000000000 +0200
 | 
				
			||||||
+++ openssh-4.7p1/authfd.h	2007-11-20 14:26:43.000000000 +0100
 | 
					+++ openssh-5.1p1/authfd.h	2008-07-23 19:16:00.000000000 +0200
 | 
				
			||||||
@@ -49,6 +49,12 @@
 | 
					@@ -49,6 +49,12 @@
 | 
				
			||||||
 #define SSH2_AGENTC_ADD_ID_CONSTRAINED		25
 | 
					 #define SSH2_AGENTC_ADD_ID_CONSTRAINED		25
 | 
				
			||||||
 #define SSH_AGENTC_ADD_SMARTCARD_KEY_CONSTRAINED 26
 | 
					 #define SSH_AGENTC_ADD_SMARTCARD_KEY_CONSTRAINED 26
 | 
				
			||||||
@ -306,10 +306,10 @@ diff -up openssh-4.7p1/authfd.h.nss-keys openssh-4.7p1/authfd.h
 | 
				
			|||||||
 
 | 
					 
 | 
				
			||||||
 int
 | 
					 int
 | 
				
			||||||
 ssh_decrypt_challenge(AuthenticationConnection *, Key *, BIGNUM *, u_char[16],
 | 
					 ssh_decrypt_challenge(AuthenticationConnection *, Key *, BIGNUM *, u_char[16],
 | 
				
			||||||
diff -up openssh-4.7p1/configure.ac.nss-keys openssh-4.7p1/configure.ac
 | 
					diff -up openssh-5.1p1/configure.ac.nss-keys openssh-5.1p1/configure.ac
 | 
				
			||||||
--- openssh-4.7p1/configure.ac.nss-keys	2007-11-20 14:26:43.000000000 +0100
 | 
					--- openssh-5.1p1/configure.ac.nss-keys	2008-07-23 19:16:00.000000000 +0200
 | 
				
			||||||
+++ openssh-4.7p1/configure.ac	2007-11-20 14:26:43.000000000 +0100
 | 
					+++ openssh-5.1p1/configure.ac	2008-07-23 19:16:00.000000000 +0200
 | 
				
			||||||
@@ -3230,6 +3230,20 @@ AC_ARG_WITH(linux-audit,
 | 
					@@ -3328,6 +3328,20 @@ AC_ARG_WITH(linux-audit,
 | 
				
			||||||
 	fi ]
 | 
					 	fi ]
 | 
				
			||||||
 )
 | 
					 )
 | 
				
			||||||
 
 | 
					 
 | 
				
			||||||
@ -330,7 +330,7 @@ diff -up openssh-4.7p1/configure.ac.nss-keys openssh-4.7p1/configure.ac
 | 
				
			|||||||
 # Check whether user wants Kerberos 5 support
 | 
					 # Check whether user wants Kerberos 5 support
 | 
				
			||||||
 KRB5_MSG="no"
 | 
					 KRB5_MSG="no"
 | 
				
			||||||
 AC_ARG_WITH(kerberos5,
 | 
					 AC_ARG_WITH(kerberos5,
 | 
				
			||||||
@@ -4052,6 +4066,7 @@ echo "                   OSF SIA support
 | 
					@@ -4157,6 +4171,7 @@ echo "                   OSF SIA support
 | 
				
			||||||
 echo "                 KerberosV support: $KRB5_MSG"
 | 
					 echo "                 KerberosV support: $KRB5_MSG"
 | 
				
			||||||
 echo "                   SELinux support: $SELINUX_MSG"
 | 
					 echo "                   SELinux support: $SELINUX_MSG"
 | 
				
			||||||
 echo "               Linux audit support: $LINUX_AUDIT_MSG"
 | 
					 echo "               Linux audit support: $LINUX_AUDIT_MSG"
 | 
				
			||||||
@ -338,9 +338,9 @@ diff -up openssh-4.7p1/configure.ac.nss-keys openssh-4.7p1/configure.ac
 | 
				
			|||||||
 echo "                 Smartcard support: $SCARD_MSG"
 | 
					 echo "                 Smartcard support: $SCARD_MSG"
 | 
				
			||||||
 echo "                     S/KEY support: $SKEY_MSG"
 | 
					 echo "                     S/KEY support: $SKEY_MSG"
 | 
				
			||||||
 echo "              TCP Wrappers support: $TCPW_MSG"
 | 
					 echo "              TCP Wrappers support: $TCPW_MSG"
 | 
				
			||||||
diff -up /dev/null openssh-4.7p1/README.nss
 | 
					diff -up /dev/null openssh-5.1p1/README.nss
 | 
				
			||||||
--- /dev/null	2007-11-05 08:22:09.502001637 +0100
 | 
					--- /dev/null	2008-07-15 11:15:04.125063641 +0200
 | 
				
			||||||
+++ openssh-4.7p1/README.nss	2007-11-20 14:26:43.000000000 +0100
 | 
					+++ openssh-5.1p1/README.nss	2008-07-23 19:16:00.000000000 +0200
 | 
				
			||||||
@@ -0,0 +1,36 @@
 | 
					@@ -0,0 +1,36 @@
 | 
				
			||||||
+How to use NSS tokens with OpenSSH?
 | 
					+How to use NSS tokens with OpenSSH?
 | 
				
			||||||
+
 | 
					+
 | 
				
			||||||
@ -378,9 +378,9 @@ diff -up /dev/null openssh-4.7p1/README.nss
 | 
				
			|||||||
+	if you want to use a specific token and/or key:
 | 
					+	if you want to use a specific token and/or key:
 | 
				
			||||||
+	
 | 
					+	
 | 
				
			||||||
+	$ ssh-keygen -n -D 'My PKCS11 Token' 'My Key ID'
 | 
					+	$ ssh-keygen -n -D 'My PKCS11 Token' 'My Key ID'
 | 
				
			||||||
diff -up openssh-4.7p1/authfd.c.nss-keys openssh-4.7p1/authfd.c
 | 
					diff -up openssh-5.1p1/authfd.c.nss-keys openssh-5.1p1/authfd.c
 | 
				
			||||||
--- openssh-4.7p1/authfd.c.nss-keys	2006-09-01 07:38:36.000000000 +0200
 | 
					--- openssh-5.1p1/authfd.c.nss-keys	2006-09-01 07:38:36.000000000 +0200
 | 
				
			||||||
+++ openssh-4.7p1/authfd.c	2007-11-20 14:26:43.000000000 +0100
 | 
					+++ openssh-5.1p1/authfd.c	2008-07-23 19:16:00.000000000 +0200
 | 
				
			||||||
@@ -626,6 +626,45 @@ ssh_update_card(AuthenticationConnection
 | 
					@@ -626,6 +626,45 @@ ssh_update_card(AuthenticationConnection
 | 
				
			||||||
 	return decode_reply(type);
 | 
					 	return decode_reply(type);
 | 
				
			||||||
 }
 | 
					 }
 | 
				
			||||||
@ -427,9 +427,9 @@ diff -up openssh-4.7p1/authfd.c.nss-keys openssh-4.7p1/authfd.c
 | 
				
			|||||||
 /*
 | 
					 /*
 | 
				
			||||||
  * Removes all identities from the agent.  This call is not meant to be used
 | 
					  * Removes all identities from the agent.  This call is not meant to be used
 | 
				
			||||||
  * by normal applications.
 | 
					  * by normal applications.
 | 
				
			||||||
diff -up openssh-4.7p1/readconf.h.nss-keys openssh-4.7p1/readconf.h
 | 
					diff -up openssh-5.1p1/readconf.h.nss-keys openssh-5.1p1/readconf.h
 | 
				
			||||||
--- openssh-4.7p1/readconf.h.nss-keys	2006-08-05 04:39:40.000000000 +0200
 | 
					--- openssh-5.1p1/readconf.h.nss-keys	2008-06-29 16:04:03.000000000 +0200
 | 
				
			||||||
+++ openssh-4.7p1/readconf.h	2007-11-20 14:26:43.000000000 +0100
 | 
					+++ openssh-5.1p1/readconf.h	2008-07-23 19:16:00.000000000 +0200
 | 
				
			||||||
@@ -84,6 +84,8 @@ typedef struct {
 | 
					@@ -84,6 +84,8 @@ typedef struct {
 | 
				
			||||||
 	char   *preferred_authentications;
 | 
					 	char   *preferred_authentications;
 | 
				
			||||||
 	char   *bind_address;	/* local socket address for connection to sshd */
 | 
					 	char   *bind_address;	/* local socket address for connection to sshd */
 | 
				
			||||||
@ -439,9 +439,9 @@ diff -up openssh-4.7p1/readconf.h.nss-keys openssh-4.7p1/readconf.h
 | 
				
			|||||||
 	int	verify_host_key_dns;	/* Verify host key using DNS */
 | 
					 	int	verify_host_key_dns;	/* Verify host key using DNS */
 | 
				
			||||||
 
 | 
					 
 | 
				
			||||||
 	int     num_identity_files;	/* Number of files for RSA/DSA identities. */
 | 
					 	int     num_identity_files;	/* Number of files for RSA/DSA identities. */
 | 
				
			||||||
diff -up /dev/null openssh-4.7p1/nsskeys.c
 | 
					diff -up /dev/null openssh-5.1p1/nsskeys.c
 | 
				
			||||||
--- /dev/null	2007-11-05 08:22:09.502001637 +0100
 | 
					--- /dev/null	2008-07-15 11:15:04.125063641 +0200
 | 
				
			||||||
+++ openssh-4.7p1/nsskeys.c	2007-11-20 14:26:43.000000000 +0100
 | 
					+++ openssh-5.1p1/nsskeys.c	2008-07-23 19:16:00.000000000 +0200
 | 
				
			||||||
@@ -0,0 +1,327 @@
 | 
					@@ -0,0 +1,327 @@
 | 
				
			||||||
+/*
 | 
					+/*
 | 
				
			||||||
+ * Copyright (c) 2001 Markus Friedl.  All rights reserved.
 | 
					+ * Copyright (c) 2001 Markus Friedl.  All rights reserved.
 | 
				
			||||||
@ -770,9 +770,9 @@ diff -up /dev/null openssh-4.7p1/nsskeys.c
 | 
				
			|||||||
+}
 | 
					+}
 | 
				
			||||||
+
 | 
					+
 | 
				
			||||||
+#endif /* HAVE_LIBNSS */
 | 
					+#endif /* HAVE_LIBNSS */
 | 
				
			||||||
diff -up openssh-4.7p1/ssh.c.nss-keys openssh-4.7p1/ssh.c
 | 
					diff -up openssh-5.1p1/ssh.c.nss-keys openssh-5.1p1/ssh.c
 | 
				
			||||||
--- openssh-4.7p1/ssh.c.nss-keys	2007-08-08 06:32:41.000000000 +0200
 | 
					--- openssh-5.1p1/ssh.c.nss-keys	2008-07-04 04:53:50.000000000 +0200
 | 
				
			||||||
+++ openssh-4.7p1/ssh.c	2007-11-20 14:26:43.000000000 +0100
 | 
					+++ openssh-5.1p1/ssh.c	2008-07-23 19:16:00.000000000 +0200
 | 
				
			||||||
@@ -104,6 +104,9 @@
 | 
					@@ -104,6 +104,9 @@
 | 
				
			||||||
 #ifdef SMARTCARD
 | 
					 #ifdef SMARTCARD
 | 
				
			||||||
 #include "scard.h"
 | 
					 #include "scard.h"
 | 
				
			||||||
@ -783,7 +783,7 @@ diff -up openssh-4.7p1/ssh.c.nss-keys openssh-4.7p1/ssh.c
 | 
				
			|||||||
 
 | 
					 
 | 
				
			||||||
 extern char *__progname;
 | 
					 extern char *__progname;
 | 
				
			||||||
 
 | 
					 
 | 
				
			||||||
@@ -1217,9 +1220,11 @@ load_public_identity_files(void)
 | 
					@@ -1235,9 +1238,11 @@ load_public_identity_files(void)
 | 
				
			||||||
 	int i = 0;
 | 
					 	int i = 0;
 | 
				
			||||||
 	Key *public;
 | 
					 	Key *public;
 | 
				
			||||||
 	struct passwd *pw;
 | 
					 	struct passwd *pw;
 | 
				
			||||||
@ -796,7 +796,7 @@ diff -up openssh-4.7p1/ssh.c.nss-keys openssh-4.7p1/ssh.c
 | 
				
			|||||||
 	if (options.smartcard_device != NULL &&
 | 
					 	if (options.smartcard_device != NULL &&
 | 
				
			||||||
 	    options.num_identity_files < SSH_MAX_IDENTITY_FILES &&
 | 
					 	    options.num_identity_files < SSH_MAX_IDENTITY_FILES &&
 | 
				
			||||||
 	    (keys = sc_get_keys(options.smartcard_device, NULL)) != NULL) {
 | 
					 	    (keys = sc_get_keys(options.smartcard_device, NULL)) != NULL) {
 | 
				
			||||||
@@ -1240,6 +1245,27 @@ load_public_identity_files(void)
 | 
					@@ -1260,6 +1265,27 @@ load_public_identity_files(void)
 | 
				
			||||||
 		xfree(keys);
 | 
					 		xfree(keys);
 | 
				
			||||||
 	}
 | 
					 	}
 | 
				
			||||||
 #endif /* SMARTCARD */
 | 
					 #endif /* SMARTCARD */
 | 
				
			||||||
@ -823,10 +823,10 @@ diff -up openssh-4.7p1/ssh.c.nss-keys openssh-4.7p1/ssh.c
 | 
				
			|||||||
+
 | 
					+
 | 
				
			||||||
 	if ((pw = getpwuid(original_real_uid)) == NULL)
 | 
					 	if ((pw = getpwuid(original_real_uid)) == NULL)
 | 
				
			||||||
 		fatal("load_public_identity_files: getpwuid failed");
 | 
					 		fatal("load_public_identity_files: getpwuid failed");
 | 
				
			||||||
 	if (gethostname(thishost, sizeof(thishost)) == -1)
 | 
					 	pwname = xstrdup(pw->pw_name);
 | 
				
			||||||
diff -up /dev/null openssh-4.7p1/nsskeys.h
 | 
					diff -up /dev/null openssh-5.1p1/nsskeys.h
 | 
				
			||||||
--- /dev/null	2007-11-05 08:22:09.502001637 +0100
 | 
					--- /dev/null	2008-07-15 11:15:04.125063641 +0200
 | 
				
			||||||
+++ openssh-4.7p1/nsskeys.h	2007-11-20 14:26:43.000000000 +0100
 | 
					+++ openssh-5.1p1/nsskeys.h	2008-07-23 19:16:00.000000000 +0200
 | 
				
			||||||
@@ -0,0 +1,39 @@
 | 
					@@ -0,0 +1,39 @@
 | 
				
			||||||
+/*
 | 
					+/*
 | 
				
			||||||
+ * Copyright (c) 2001 Markus Friedl.  All rights reserved.
 | 
					+ * Copyright (c) 2001 Markus Friedl.  All rights reserved.
 | 
				
			||||||
@ -867,9 +867,9 @@ diff -up /dev/null openssh-4.7p1/nsskeys.h
 | 
				
			|||||||
+
 | 
					+
 | 
				
			||||||
+#endif
 | 
					+#endif
 | 
				
			||||||
+#endif
 | 
					+#endif
 | 
				
			||||||
diff -up openssh-4.7p1/Makefile.in.nss-keys openssh-4.7p1/Makefile.in
 | 
					diff -up openssh-5.1p1/Makefile.in.nss-keys openssh-5.1p1/Makefile.in
 | 
				
			||||||
--- openssh-4.7p1/Makefile.in.nss-keys	2007-06-11 06:01:42.000000000 +0200
 | 
					--- openssh-5.1p1/Makefile.in.nss-keys	2008-07-08 16:21:12.000000000 +0200
 | 
				
			||||||
+++ openssh-4.7p1/Makefile.in	2007-11-20 14:26:43.000000000 +0100
 | 
					+++ openssh-5.1p1/Makefile.in	2008-07-23 19:16:00.000000000 +0200
 | 
				
			||||||
@@ -71,7 +71,7 @@ LIBSSH_OBJS=acss.o authfd.o authfile.o b
 | 
					@@ -71,7 +71,7 @@ LIBSSH_OBJS=acss.o authfd.o authfile.o b
 | 
				
			||||||
 	atomicio.o key.o dispatch.o kex.o mac.o uidswap.o uuencode.o misc.o \
 | 
					 	atomicio.o key.o dispatch.o kex.o mac.o uidswap.o uuencode.o misc.o \
 | 
				
			||||||
 	monitor_fdpass.o rijndael.o ssh-dss.o ssh-rsa.o dh.o kexdh.o \
 | 
					 	monitor_fdpass.o rijndael.o ssh-dss.o ssh-rsa.o dh.o kexdh.o \
 | 
				
			||||||
@ -878,10 +878,10 @@ diff -up openssh-4.7p1/Makefile.in.nss-keys openssh-4.7p1/Makefile.in
 | 
				
			|||||||
+	entropy.o scard-opensc.o gss-genr.o umac.o nsskeys.o
 | 
					+	entropy.o scard-opensc.o gss-genr.o umac.o nsskeys.o
 | 
				
			||||||
 
 | 
					 
 | 
				
			||||||
 SSHOBJS= ssh.o readconf.o clientloop.o sshtty.o \
 | 
					 SSHOBJS= ssh.o readconf.o clientloop.o sshtty.o \
 | 
				
			||||||
 	sshconnect.o sshconnect1.o sshconnect2.o
 | 
					 	sshconnect.o sshconnect1.o sshconnect2.o mux.o
 | 
				
			||||||
diff -up openssh-4.7p1/key.h.nss-keys openssh-4.7p1/key.h
 | 
					diff -up openssh-5.1p1/key.h.nss-keys openssh-5.1p1/key.h
 | 
				
			||||||
--- openssh-4.7p1/key.h.nss-keys	2006-08-05 04:39:40.000000000 +0200
 | 
					--- openssh-5.1p1/key.h.nss-keys	2008-06-12 20:40:35.000000000 +0200
 | 
				
			||||||
+++ openssh-4.7p1/key.h	2007-11-20 14:26:43.000000000 +0100
 | 
					+++ openssh-5.1p1/key.h	2008-07-23 19:16:00.000000000 +0200
 | 
				
			||||||
@@ -29,11 +29,17 @@
 | 
					@@ -29,11 +29,17 @@
 | 
				
			||||||
 #include <openssl/rsa.h>
 | 
					 #include <openssl/rsa.h>
 | 
				
			||||||
 #include <openssl/dsa.h>
 | 
					 #include <openssl/dsa.h>
 | 
				
			||||||
@ -900,7 +900,7 @@ diff -up openssh-4.7p1/key.h.nss-keys openssh-4.7p1/key.h
 | 
				
			|||||||
 	KEY_UNSPEC
 | 
					 	KEY_UNSPEC
 | 
				
			||||||
 };
 | 
					 };
 | 
				
			||||||
 enum fp_type {
 | 
					 enum fp_type {
 | 
				
			||||||
@@ -47,16 +53,30 @@ enum fp_rep {
 | 
					@@ -48,16 +54,30 @@ enum fp_rep {
 | 
				
			||||||
 
 | 
					 
 | 
				
			||||||
 /* key is stored in external hardware */
 | 
					 /* key is stored in external hardware */
 | 
				
			||||||
 #define KEY_FLAG_EXT		0x0001
 | 
					 #define KEY_FLAG_EXT		0x0001
 | 
				
			||||||
@ -931,12 +931,12 @@ diff -up openssh-4.7p1/key.h.nss-keys openssh-4.7p1/key.h
 | 
				
			|||||||
 void		 key_free(Key *);
 | 
					 void		 key_free(Key *);
 | 
				
			||||||
 Key		*key_demote(const Key *);
 | 
					 Key		*key_demote(const Key *);
 | 
				
			||||||
 int		 key_equal(const Key *, const Key *);
 | 
					 int		 key_equal(const Key *, const Key *);
 | 
				
			||||||
diff -up openssh-4.7p1/ssh-add.c.nss-keys openssh-4.7p1/ssh-add.c
 | 
					diff -up openssh-5.1p1/ssh-add.c.nss-keys openssh-5.1p1/ssh-add.c
 | 
				
			||||||
--- openssh-4.7p1/ssh-add.c.nss-keys	2006-09-01 07:38:37.000000000 +0200
 | 
					--- openssh-5.1p1/ssh-add.c.nss-keys	2008-02-28 09:13:52.000000000 +0100
 | 
				
			||||||
+++ openssh-4.7p1/ssh-add.c	2007-11-20 14:26:43.000000000 +0100
 | 
					+++ openssh-5.1p1/ssh-add.c	2008-07-23 19:16:00.000000000 +0200
 | 
				
			||||||
@@ -43,6 +43,14 @@
 | 
					@@ -44,6 +44,14 @@
 | 
				
			||||||
 
 | 
					 | 
				
			||||||
 #include <openssl/evp.h>
 | 
					 #include <openssl/evp.h>
 | 
				
			||||||
 | 
					 #include "openbsd-compat/openssl-compat.h"
 | 
				
			||||||
 
 | 
					 
 | 
				
			||||||
+#ifdef HAVE_LIBNSS
 | 
					+#ifdef HAVE_LIBNSS
 | 
				
			||||||
+#include <nss.h>
 | 
					+#include <nss.h>
 | 
				
			||||||
@ -949,7 +949,7 @@ diff -up openssh-4.7p1/ssh-add.c.nss-keys openssh-4.7p1/ssh-add.c
 | 
				
			|||||||
 #include <fcntl.h>
 | 
					 #include <fcntl.h>
 | 
				
			||||||
 #include <pwd.h>
 | 
					 #include <pwd.h>
 | 
				
			||||||
 #include <stdarg.h>
 | 
					 #include <stdarg.h>
 | 
				
			||||||
@@ -56,6 +64,7 @@
 | 
					@@ -57,6 +65,7 @@
 | 
				
			||||||
 #include "rsa.h"
 | 
					 #include "rsa.h"
 | 
				
			||||||
 #include "log.h"
 | 
					 #include "log.h"
 | 
				
			||||||
 #include "key.h"
 | 
					 #include "key.h"
 | 
				
			||||||
@ -957,7 +957,7 @@ diff -up openssh-4.7p1/ssh-add.c.nss-keys openssh-4.7p1/ssh-add.c
 | 
				
			|||||||
 #include "buffer.h"
 | 
					 #include "buffer.h"
 | 
				
			||||||
 #include "authfd.h"
 | 
					 #include "authfd.h"
 | 
				
			||||||
 #include "authfile.h"
 | 
					 #include "authfile.h"
 | 
				
			||||||
@@ -306,6 +315,117 @@ do_file(AuthenticationConnection *ac, in
 | 
					@@ -307,6 +316,117 @@ do_file(AuthenticationConnection *ac, in
 | 
				
			||||||
 	return 0;
 | 
					 	return 0;
 | 
				
			||||||
 }
 | 
					 }
 | 
				
			||||||
 
 | 
					 
 | 
				
			||||||
@ -1075,7 +1075,7 @@ diff -up openssh-4.7p1/ssh-add.c.nss-keys openssh-4.7p1/ssh-add.c
 | 
				
			|||||||
 static void
 | 
					 static void
 | 
				
			||||||
 usage(void)
 | 
					 usage(void)
 | 
				
			||||||
 {
 | 
					 {
 | 
				
			||||||
@@ -333,6 +453,10 @@ main(int argc, char **argv)
 | 
					@@ -334,6 +454,10 @@ main(int argc, char **argv)
 | 
				
			||||||
 	AuthenticationConnection *ac = NULL;
 | 
					 	AuthenticationConnection *ac = NULL;
 | 
				
			||||||
 	char *sc_reader_id = NULL;
 | 
					 	char *sc_reader_id = NULL;
 | 
				
			||||||
 	int i, ch, deleting = 0, ret = 0;
 | 
					 	int i, ch, deleting = 0, ret = 0;
 | 
				
			||||||
@ -1086,7 +1086,7 @@ diff -up openssh-4.7p1/ssh-add.c.nss-keys openssh-4.7p1/ssh-add.c
 | 
				
			|||||||
 
 | 
					 
 | 
				
			||||||
 	/* Ensure that fds 0, 1 and 2 are open or directed to /dev/null */
 | 
					 	/* Ensure that fds 0, 1 and 2 are open or directed to /dev/null */
 | 
				
			||||||
 	sanitise_stdfd();
 | 
					 	sanitise_stdfd();
 | 
				
			||||||
@@ -350,7 +474,7 @@ main(int argc, char **argv)
 | 
					@@ -351,7 +475,7 @@ main(int argc, char **argv)
 | 
				
			||||||
 		    "Could not open a connection to your authentication agent.\n");
 | 
					 		    "Could not open a connection to your authentication agent.\n");
 | 
				
			||||||
 		exit(2);
 | 
					 		exit(2);
 | 
				
			||||||
 	}
 | 
					 	}
 | 
				
			||||||
@ -1095,7 +1095,7 @@ diff -up openssh-4.7p1/ssh-add.c.nss-keys openssh-4.7p1/ssh-add.c
 | 
				
			|||||||
 		switch (ch) {
 | 
					 		switch (ch) {
 | 
				
			||||||
 		case 'l':
 | 
					 		case 'l':
 | 
				
			||||||
 		case 'L':
 | 
					 		case 'L':
 | 
				
			||||||
@@ -372,6 +496,11 @@ main(int argc, char **argv)
 | 
					@@ -373,6 +497,11 @@ main(int argc, char **argv)
 | 
				
			||||||
 			if (delete_all(ac) == -1)
 | 
					 			if (delete_all(ac) == -1)
 | 
				
			||||||
 				ret = 1;
 | 
					 				ret = 1;
 | 
				
			||||||
 			goto done;
 | 
					 			goto done;
 | 
				
			||||||
@ -1107,7 +1107,7 @@ diff -up openssh-4.7p1/ssh-add.c.nss-keys openssh-4.7p1/ssh-add.c
 | 
				
			|||||||
 		case 's':
 | 
					 		case 's':
 | 
				
			||||||
 			sc_reader_id = optarg;
 | 
					 			sc_reader_id = optarg;
 | 
				
			||||||
 			break;
 | 
					 			break;
 | 
				
			||||||
@@ -386,6 +515,11 @@ main(int argc, char **argv)
 | 
					@@ -387,6 +516,11 @@ main(int argc, char **argv)
 | 
				
			||||||
 				goto done;
 | 
					 				goto done;
 | 
				
			||||||
 			}
 | 
					 			}
 | 
				
			||||||
 			break;
 | 
					 			break;
 | 
				
			||||||
@ -1119,7 +1119,7 @@ diff -up openssh-4.7p1/ssh-add.c.nss-keys openssh-4.7p1/ssh-add.c
 | 
				
			|||||||
 		default:
 | 
					 		default:
 | 
				
			||||||
 			usage();
 | 
					 			usage();
 | 
				
			||||||
 			ret = 1;
 | 
					 			ret = 1;
 | 
				
			||||||
@@ -399,6 +533,40 @@ main(int argc, char **argv)
 | 
					@@ -400,6 +534,40 @@ main(int argc, char **argv)
 | 
				
			||||||
 			ret = 1;
 | 
					 			ret = 1;
 | 
				
			||||||
 		goto done;
 | 
					 		goto done;
 | 
				
			||||||
 	}
 | 
					 	}
 | 
				
			||||||
@ -1160,9 +1160,9 @@ diff -up openssh-4.7p1/ssh-add.c.nss-keys openssh-4.7p1/ssh-add.c
 | 
				
			|||||||
 	if (argc == 0) {
 | 
					 	if (argc == 0) {
 | 
				
			||||||
 		char buf[MAXPATHLEN];
 | 
					 		char buf[MAXPATHLEN];
 | 
				
			||||||
 		struct passwd *pw;
 | 
					 		struct passwd *pw;
 | 
				
			||||||
diff -up openssh-4.7p1/ssh-rsa.c.nss-keys openssh-4.7p1/ssh-rsa.c
 | 
					diff -up openssh-5.1p1/ssh-rsa.c.nss-keys openssh-5.1p1/ssh-rsa.c
 | 
				
			||||||
--- openssh-4.7p1/ssh-rsa.c.nss-keys	2006-09-01 07:38:37.000000000 +0200
 | 
					--- openssh-5.1p1/ssh-rsa.c.nss-keys	2006-09-01 07:38:37.000000000 +0200
 | 
				
			||||||
+++ openssh-4.7p1/ssh-rsa.c	2007-11-20 14:26:43.000000000 +0100
 | 
					+++ openssh-5.1p1/ssh-rsa.c	2008-07-23 19:16:00.000000000 +0200
 | 
				
			||||||
@@ -32,6 +32,10 @@
 | 
					@@ -32,6 +32,10 @@
 | 
				
			||||||
 #include "compat.h"
 | 
					 #include "compat.h"
 | 
				
			||||||
 #include "ssh.h"
 | 
					 #include "ssh.h"
 | 
				
			||||||
@ -1233,10 +1233,10 @@ diff -up openssh-4.7p1/ssh-rsa.c.nss-keys openssh-4.7p1/ssh-rsa.c
 | 
				
			|||||||
 	/* encode signature */
 | 
					 	/* encode signature */
 | 
				
			||||||
 	buffer_init(&b);
 | 
					 	buffer_init(&b);
 | 
				
			||||||
 	buffer_put_cstring(&b, "ssh-rsa");
 | 
					 	buffer_put_cstring(&b, "ssh-rsa");
 | 
				
			||||||
diff -up openssh-4.7p1/ssh-keygen.c.nss-keys openssh-4.7p1/ssh-keygen.c
 | 
					diff -up openssh-5.1p1/ssh-keygen.c.nss-keys openssh-5.1p1/ssh-keygen.c
 | 
				
			||||||
--- openssh-4.7p1/ssh-keygen.c.nss-keys	2007-02-19 12:10:25.000000000 +0100
 | 
					--- openssh-5.1p1/ssh-keygen.c.nss-keys	2008-07-14 03:28:29.000000000 +0200
 | 
				
			||||||
+++ openssh-4.7p1/ssh-keygen.c	2007-11-20 14:26:43.000000000 +0100
 | 
					+++ openssh-5.1p1/ssh-keygen.c	2008-07-23 19:16:00.000000000 +0200
 | 
				
			||||||
@@ -52,6 +52,11 @@
 | 
					@@ -53,6 +53,11 @@
 | 
				
			||||||
 #include "scard.h"
 | 
					 #include "scard.h"
 | 
				
			||||||
 #endif
 | 
					 #endif
 | 
				
			||||||
 
 | 
					 
 | 
				
			||||||
@ -1248,7 +1248,7 @@ diff -up openssh-4.7p1/ssh-keygen.c.nss-keys openssh-4.7p1/ssh-keygen.c
 | 
				
			|||||||
 /* Number of bits in the RSA/DSA key.  This value can be set on the command line. */
 | 
					 /* Number of bits in the RSA/DSA key.  This value can be set on the command line. */
 | 
				
			||||||
 #define DEFAULT_BITS		2048
 | 
					 #define DEFAULT_BITS		2048
 | 
				
			||||||
 #define DEFAULT_BITS_DSA	1024
 | 
					 #define DEFAULT_BITS_DSA	1024
 | 
				
			||||||
@@ -499,6 +504,26 @@ do_download(struct passwd *pw, const cha
 | 
					@@ -501,6 +506,26 @@ do_download(struct passwd *pw, const cha
 | 
				
			||||||
 }
 | 
					 }
 | 
				
			||||||
 #endif /* SMARTCARD */
 | 
					 #endif /* SMARTCARD */
 | 
				
			||||||
 
 | 
					 
 | 
				
			||||||
@ -1275,7 +1275,7 @@ diff -up openssh-4.7p1/ssh-keygen.c.nss-keys openssh-4.7p1/ssh-keygen.c
 | 
				
			|||||||
 static void
 | 
					 static void
 | 
				
			||||||
 do_fingerprint(struct passwd *pw)
 | 
					 do_fingerprint(struct passwd *pw)
 | 
				
			||||||
 {
 | 
					 {
 | 
				
			||||||
@@ -1056,7 +1081,8 @@ main(int argc, char **argv)
 | 
					@@ -1083,7 +1108,8 @@ main(int argc, char **argv)
 | 
				
			||||||
 	Key *private, *public;
 | 
					 	Key *private, *public;
 | 
				
			||||||
 	struct passwd *pw;
 | 
					 	struct passwd *pw;
 | 
				
			||||||
 	struct stat st;
 | 
					 	struct stat st;
 | 
				
			||||||
@ -1284,8 +1284,8 @@ diff -up openssh-4.7p1/ssh-keygen.c.nss-keys openssh-4.7p1/ssh-keygen.c
 | 
				
			|||||||
+	int use_nss = 0;
 | 
					+	int use_nss = 0;
 | 
				
			||||||
 	u_int32_t memory = 0, generator_wanted = 0, trials = 100;
 | 
					 	u_int32_t memory = 0, generator_wanted = 0, trials = 100;
 | 
				
			||||||
 	int do_gen_candidates = 0, do_screen_candidates = 0;
 | 
					 	int do_gen_candidates = 0, do_screen_candidates = 0;
 | 
				
			||||||
 	int log_level = SYSLOG_LEVEL_INFO;
 | 
					 	BIGNUM *start = NULL;
 | 
				
			||||||
@@ -1090,7 +1116,7 @@ main(int argc, char **argv)
 | 
					@@ -1116,7 +1142,7 @@ main(int argc, char **argv)
 | 
				
			||||||
 	}
 | 
					 	}
 | 
				
			||||||
 
 | 
					 
 | 
				
			||||||
 	while ((opt = getopt(argc, argv,
 | 
					 	while ((opt = getopt(argc, argv,
 | 
				
			||||||
@ -1294,7 +1294,7 @@ diff -up openssh-4.7p1/ssh-keygen.c.nss-keys openssh-4.7p1/ssh-keygen.c
 | 
				
			|||||||
 		switch (opt) {
 | 
					 		switch (opt) {
 | 
				
			||||||
 		case 'b':
 | 
					 		case 'b':
 | 
				
			||||||
 			bits = (u_int32_t)strtonum(optarg, 768, 32768, &errstr);
 | 
					 			bits = (u_int32_t)strtonum(optarg, 768, 32768, &errstr);
 | 
				
			||||||
@@ -1130,6 +1156,10 @@ main(int argc, char **argv)
 | 
					@@ -1156,6 +1182,10 @@ main(int argc, char **argv)
 | 
				
			||||||
 		case 'g':
 | 
					 		case 'g':
 | 
				
			||||||
 			print_generic = 1;
 | 
					 			print_generic = 1;
 | 
				
			||||||
 			break;
 | 
					 			break;
 | 
				
			||||||
@ -1305,7 +1305,7 @@ diff -up openssh-4.7p1/ssh-keygen.c.nss-keys openssh-4.7p1/ssh-keygen.c
 | 
				
			|||||||
 		case 'P':
 | 
					 		case 'P':
 | 
				
			||||||
 			identity_passphrase = optarg;
 | 
					 			identity_passphrase = optarg;
 | 
				
			||||||
 			break;
 | 
					 			break;
 | 
				
			||||||
@@ -1161,10 +1191,10 @@ main(int argc, char **argv)
 | 
					@@ -1187,10 +1217,10 @@ main(int argc, char **argv)
 | 
				
			||||||
 		case 't':
 | 
					 		case 't':
 | 
				
			||||||
 			key_type_name = optarg;
 | 
					 			key_type_name = optarg;
 | 
				
			||||||
 			break;
 | 
					 			break;
 | 
				
			||||||
@ -1319,7 +1319,7 @@ diff -up openssh-4.7p1/ssh-keygen.c.nss-keys openssh-4.7p1/ssh-keygen.c
 | 
				
			|||||||
 			reader_id = optarg;
 | 
					 			reader_id = optarg;
 | 
				
			||||||
 			break;
 | 
					 			break;
 | 
				
			||||||
 		case 'v':
 | 
					 		case 'v':
 | 
				
			||||||
@@ -1269,6 +1299,17 @@ main(int argc, char **argv)
 | 
					@@ -1299,6 +1329,17 @@ main(int argc, char **argv)
 | 
				
			||||||
 			exit(0);
 | 
					 			exit(0);
 | 
				
			||||||
 		}
 | 
					 		}
 | 
				
			||||||
 	}
 | 
					 	}
 | 
				
			||||||
@ -1337,9 +1337,9 @@ diff -up openssh-4.7p1/ssh-keygen.c.nss-keys openssh-4.7p1/ssh-keygen.c
 | 
				
			|||||||
 	if (reader_id != NULL) {
 | 
					 	if (reader_id != NULL) {
 | 
				
			||||||
 #ifdef SMARTCARD
 | 
					 #ifdef SMARTCARD
 | 
				
			||||||
 		if (download)
 | 
					 		if (download)
 | 
				
			||||||
diff -up openssh-4.7p1/readconf.c.nss-keys openssh-4.7p1/readconf.c
 | 
					diff -up openssh-5.1p1/readconf.c.nss-keys openssh-5.1p1/readconf.c
 | 
				
			||||||
--- openssh-4.7p1/readconf.c.nss-keys	2007-03-21 10:46:03.000000000 +0100
 | 
					--- openssh-5.1p1/readconf.c.nss-keys	2008-06-29 16:04:03.000000000 +0200
 | 
				
			||||||
+++ openssh-4.7p1/readconf.c	2007-11-20 14:26:43.000000000 +0100
 | 
					+++ openssh-5.1p1/readconf.c	2008-07-23 19:16:00.000000000 +0200
 | 
				
			||||||
@@ -124,6 +124,7 @@ typedef enum {
 | 
					@@ -124,6 +124,7 @@ typedef enum {
 | 
				
			||||||
 	oKbdInteractiveAuthentication, oKbdInteractiveDevices, oHostKeyAlias,
 | 
					 	oKbdInteractiveAuthentication, oKbdInteractiveDevices, oHostKeyAlias,
 | 
				
			||||||
 	oDynamicForward, oPreferredAuthentications, oHostbasedAuthentication,
 | 
					 	oDynamicForward, oPreferredAuthentications, oHostbasedAuthentication,
 | 
				
			||||||
@ -1348,7 +1348,7 @@ diff -up openssh-4.7p1/readconf.c.nss-keys openssh-4.7p1/readconf.c
 | 
				
			|||||||
 	oClearAllForwardings, oNoHostAuthenticationForLocalhost,
 | 
					 	oClearAllForwardings, oNoHostAuthenticationForLocalhost,
 | 
				
			||||||
 	oEnableSSHKeysign, oRekeyLimit, oVerifyHostKeyDNS, oConnectTimeout,
 | 
					 	oEnableSSHKeysign, oRekeyLimit, oVerifyHostKeyDNS, oConnectTimeout,
 | 
				
			||||||
 	oAddressFamily, oGssAuthentication, oGssDelegateCreds,
 | 
					 	oAddressFamily, oGssAuthentication, oGssDelegateCreds,
 | 
				
			||||||
@@ -209,6 +210,13 @@ static struct {
 | 
					@@ -210,6 +211,13 @@ static struct {
 | 
				
			||||||
 #else
 | 
					 #else
 | 
				
			||||||
 	{ "smartcarddevice", oUnsupported },
 | 
					 	{ "smartcarddevice", oUnsupported },
 | 
				
			||||||
 #endif
 | 
					 #endif
 | 
				
			||||||
@ -1362,7 +1362,7 @@ diff -up openssh-4.7p1/readconf.c.nss-keys openssh-4.7p1/readconf.c
 | 
				
			|||||||
 	{ "clearallforwardings", oClearAllForwardings },
 | 
					 	{ "clearallforwardings", oClearAllForwardings },
 | 
				
			||||||
 	{ "enablesshkeysign", oEnableSSHKeysign },
 | 
					 	{ "enablesshkeysign", oEnableSSHKeysign },
 | 
				
			||||||
 	{ "verifyhostkeydns", oVerifyHostKeyDNS },
 | 
					 	{ "verifyhostkeydns", oVerifyHostKeyDNS },
 | 
				
			||||||
@@ -601,6 +609,14 @@ parse_string:
 | 
					@@ -603,6 +611,14 @@ parse_string:
 | 
				
			||||||
 		charptr = &options->smartcard_device;
 | 
					 		charptr = &options->smartcard_device;
 | 
				
			||||||
 		goto parse_string;
 | 
					 		goto parse_string;
 | 
				
			||||||
 
 | 
					 
 | 
				
			||||||
@ -1377,7 +1377,7 @@ diff -up openssh-4.7p1/readconf.c.nss-keys openssh-4.7p1/readconf.c
 | 
				
			|||||||
 	case oProxyCommand:
 | 
					 	case oProxyCommand:
 | 
				
			||||||
 		charptr = &options->proxy_command;
 | 
					 		charptr = &options->proxy_command;
 | 
				
			||||||
 parse_command:
 | 
					 parse_command:
 | 
				
			||||||
@@ -1049,6 +1065,8 @@ initialize_options(Options * options)
 | 
					@@ -1055,6 +1071,8 @@ initialize_options(Options * options)
 | 
				
			||||||
 	options->preferred_authentications = NULL;
 | 
					 	options->preferred_authentications = NULL;
 | 
				
			||||||
 	options->bind_address = NULL;
 | 
					 	options->bind_address = NULL;
 | 
				
			||||||
 	options->smartcard_device = NULL;
 | 
					 	options->smartcard_device = NULL;
 | 
				
			||||||
@ -1386,7 +1386,7 @@ diff -up openssh-4.7p1/readconf.c.nss-keys openssh-4.7p1/readconf.c
 | 
				
			|||||||
 	options->enable_ssh_keysign = - 1;
 | 
					 	options->enable_ssh_keysign = - 1;
 | 
				
			||||||
 	options->no_host_authentication_for_localhost = - 1;
 | 
					 	options->no_host_authentication_for_localhost = - 1;
 | 
				
			||||||
 	options->identities_only = - 1;
 | 
					 	options->identities_only = - 1;
 | 
				
			||||||
@@ -1177,6 +1195,8 @@ fill_default_options(Options * options)
 | 
					@@ -1184,6 +1202,8 @@ fill_default_options(Options * options)
 | 
				
			||||||
 		options->no_host_authentication_for_localhost = 0;
 | 
					 		options->no_host_authentication_for_localhost = 0;
 | 
				
			||||||
 	if (options->identities_only == -1)
 | 
					 	if (options->identities_only == -1)
 | 
				
			||||||
 		options->identities_only = 0;
 | 
					 		options->identities_only = 0;
 | 
				
			||||||
@ -1,8 +1,9 @@
 | 
				
			|||||||
--- scp.orig	2007-12-22 20:37:27.000000000 +0100
 | 
					diff -up openssh-5.1p1/scp.1.manpage openssh-5.1p1/scp.1
 | 
				
			||||||
+++ scp.1	2007-12-22 20:36:42.000000000 +0100
 | 
					--- openssh-5.1p1/scp.1.manpage	2008-07-12 09:12:49.000000000 +0200
 | 
				
			||||||
@@ -60,6 +60,14 @@
 | 
					+++ openssh-5.1p1/scp.1	2008-07-23 19:18:15.000000000 +0200
 | 
				
			||||||
 that the file is to be copied to/from that host.
 | 
					@@ -66,6 +66,14 @@ treating file names containing
 | 
				
			||||||
 Copies between two remote hosts are permitted.
 | 
					 as host specifiers.
 | 
				
			||||||
 | 
					 Copies between two remote hosts are also permitted.
 | 
				
			||||||
 .Pp
 | 
					 .Pp
 | 
				
			||||||
+When copying a source file to a target file which already exists,
 | 
					+When copying a source file to a target file which already exists,
 | 
				
			||||||
+.Nm 
 | 
					+.Nm 
 | 
				
			||||||
							
								
								
									
										14
									
								
								openssh.spec
									
									
									
									
									
								
							
							
						
						
									
										14
									
								
								openssh.spec
									
									
									
									
									
								
							@ -79,7 +79,7 @@ Patch2: openssh-5.1p1-skip-initial.patch
 | 
				
			|||||||
Patch3: openssh-3.8.1p1-krb5-config.patch
 | 
					Patch3: openssh-3.8.1p1-krb5-config.patch
 | 
				
			||||||
Patch4: openssh-5.1p1-vendor.patch
 | 
					Patch4: openssh-5.1p1-vendor.patch
 | 
				
			||||||
Patch12: openssh-5.1p1-selinux.patch
 | 
					Patch12: openssh-5.1p1-selinux.patch
 | 
				
			||||||
Patch13: openssh-4.7p1-mls.patch
 | 
					Patch13: openssh-5.1p1-mls.patch
 | 
				
			||||||
Patch16: openssh-4.7p1-audit.patch
 | 
					Patch16: openssh-4.7p1-audit.patch
 | 
				
			||||||
Patch17: openssh-4.3p2-cve-2007-3102.patch
 | 
					Patch17: openssh-4.3p2-cve-2007-3102.patch
 | 
				
			||||||
Patch18: openssh-5.0p1-pam_selinux.patch
 | 
					Patch18: openssh-5.0p1-pam_selinux.patch
 | 
				
			||||||
@ -87,15 +87,15 @@ Patch22: openssh-3.9p1-askpass-keep-above.patch
 | 
				
			|||||||
Patch24: openssh-4.3p1-fromto-remote.patch
 | 
					Patch24: openssh-4.3p1-fromto-remote.patch
 | 
				
			||||||
Patch27: openssh-5.1p1-log-in-chroot.patch
 | 
					Patch27: openssh-5.1p1-log-in-chroot.patch
 | 
				
			||||||
Patch30: openssh-4.0p1-exit-deadlock.patch
 | 
					Patch30: openssh-4.0p1-exit-deadlock.patch
 | 
				
			||||||
Patch35: openssh-4.2p1-askpass-progress.patch
 | 
					Patch35: openssh-5.1p1-askpass-progress.patch
 | 
				
			||||||
Patch38: openssh-4.3p2-askpass-grab-info.patch
 | 
					Patch38: openssh-4.3p2-askpass-grab-info.patch
 | 
				
			||||||
Patch39: openssh-4.3p2-no-v6only.patch
 | 
					Patch39: openssh-4.3p2-no-v6only.patch
 | 
				
			||||||
Patch44: openssh-4.3p2-allow-ip-opts.patch
 | 
					Patch44: openssh-4.3p2-allow-ip-opts.patch
 | 
				
			||||||
Patch49: openssh-4.3p2-gssapi-canohost.patch
 | 
					Patch49: openssh-4.3p2-gssapi-canohost.patch
 | 
				
			||||||
Patch51: openssh-4.7p1-nss-keys.patch
 | 
					Patch51: openssh-5.1p1-nss-keys.patch
 | 
				
			||||||
Patch54: openssh-4.7p1-gssapi-role.patch
 | 
					Patch54: openssh-5.1p1-gssapi-role.patch
 | 
				
			||||||
Patch55: openssh-5.1p1-cloexec.patch
 | 
					Patch55: openssh-5.1p1-cloexec.patch
 | 
				
			||||||
Patch62: openssh-3.9p1-scp-manpage.patch
 | 
					Patch62: openssh-5.1p1-scp-manpage.patch
 | 
				
			||||||
 | 
					
 | 
				
			||||||
License: BSD
 | 
					License: BSD
 | 
				
			||||||
Group: Applications/Internet
 | 
					Group: Applications/Internet
 | 
				
			||||||
@ -224,9 +224,9 @@ an X11 passphrase dialog for OpenSSH.
 | 
				
			|||||||
%patch44 -p1 -b .ip-opts
 | 
					%patch44 -p1 -b .ip-opts
 | 
				
			||||||
%patch49 -p1 -b .canohost
 | 
					%patch49 -p1 -b .canohost
 | 
				
			||||||
%patch51 -p1 -b .nss-keys
 | 
					%patch51 -p1 -b .nss-keys
 | 
				
			||||||
%patch54 -p0 -b .gssapi-role
 | 
					%patch54 -p1 -b .gssapi-role
 | 
				
			||||||
%patch55 -p1 -b .cloexec
 | 
					%patch55 -p1 -b .cloexec
 | 
				
			||||||
%patch62 -p0 -b .manpage
 | 
					%patch62 -p1 -b .manpage
 | 
				
			||||||
 | 
					
 | 
				
			||||||
autoreconf
 | 
					autoreconf
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
				
			|||||||
		Loading…
	
		Reference in New Issue
	
	Block a user