[prev in list] [next in list] [prev in thread] [next in thread]
List: openpkg-cvs
Subject: [CVS] OpenPKG: openpkg-src/openssh/ openssh.patch openssh.patch.alias ...
From: "Ralf S. Engelschall" <rse () openpkg ! org>
Date: 2008-03-31 7:00:52
Message-ID: 20080331070053.6B2261B5065 () master ! openpkg ! org
[Download RAW message or body]
OpenPKG CVS Repository
http://cvs.openpkg.org/
____________________________________________________________________________
Server: cvs.openpkg.org Name: Ralf S. Engelschall
Root: /v/openpkg/cvs Email: rse@openpkg.org
Module: openpkg-src Date: 31-Mar-2008 09:00:52
Branch: HEAD Handle: 2008033108005000
Modified files:
openpkg-src/openssh openssh.patch openssh.patch.alias
openssh.patch.chroot openssh.patch.scpbindir
openssh.patch.sftplogging openssh.spec
Log:
upgrading package: openssh 4.7p1 -> 4.9p1
Summary:
Revision Changes Path
1.22 +6 -6 openpkg-src/openssh/openssh.patch
1.12 +22 -22 openpkg-src/openssh/openssh.patch.alias
1.12 +20 -21 openpkg-src/openssh/openssh.patch.chroot
1.15 +4 -4 openpkg-src/openssh/openssh.patch.scpbindir
1.13 +61 -62 openpkg-src/openssh/openssh.patch.sftplogging
1.207 +2 -2 openpkg-src/openssh/openssh.spec
____________________________________________________________________________
patch -p0 <<'@@ .'
Index: openpkg-src/openssh/openssh.patch
============================================================================
$ cvs diff -u -r1.21 -r1.22 openssh.patch
--- openpkg-src/openssh/openssh.patch 5 Sep 2007 06:48:39 -0000 1.21
+++ openpkg-src/openssh/openssh.patch 31 Mar 2008 07:00:50 -0000 1.22
@@ -1,6 +1,6 @@
Index: Makefile.in
---- Makefile.in.orig 2007-06-11 06:01:42 +0200
-+++ Makefile.in 2007-09-05 08:39:34 +0200
+--- Makefile.in.orig 2008-03-13 02:41:31 +0100
++++ Makefile.in 2008-03-31 08:36:38 +0200
@@ -231,7 +231,7 @@
-rm -rf autom4te.cache
(cd scard && $(MAKE) -f Makefile.in distprep)
@@ -12,7 +12,7 @@
Index: auth-pam.h
--- auth-pam.h.orig 2004-09-11 14:17:26 +0200
-+++ auth-pam.h 2007-09-05 08:39:34 +0200
++++ auth-pam.h 2008-03-31 08:36:38 +0200
@@ -28,7 +28,7 @@
#ifdef USE_PAM
@@ -23,10 +23,10 @@
void start_pam(Authctxt *);
Index: version.h
---- version.h.orig 2007-08-15 11:14:52 +0200
-+++ version.h 2007-09-05 08:39:34 +0200
+--- version.h.orig 2008-03-27 01:18:13 +0100
++++ version.h 2008-03-31 08:36:38 +0200
@@ -3,4 +3,4 @@
- #define SSH_VERSION "OpenSSH_4.7"
+ #define SSH_VERSION "OpenSSH_4.9"
#define SSH_PORTABLE "p1"
-#define SSH_RELEASE SSH_VERSION SSH_PORTABLE
@@ .
patch -p0 <<'@@ .'
Index: openpkg-src/openssh/openssh.patch.alias
============================================================================
$ cvs diff -u -r1.11 -r1.12 openssh.patch.alias
--- openpkg-src/openssh/openssh.patch.alias 5 Sep 2007 06:48:40 -0000 1.11
+++ openpkg-src/openssh/openssh.patch.alias 31 Mar 2008 07:00:50 -0000 1.12
@@ -1,6 +1,6 @@
Index: auth1.c
---- auth1.c.orig 2006-09-01 07:38:36 +0200
-+++ auth1.c 2007-09-05 08:40:36 +0200
+--- auth1.c.orig 2007-10-26 06:25:13 +0200
++++ auth1.c 2008-03-31 08:34:25 +0200
@@ -39,6 +39,9 @@
#endif
#include "monitor_wrap.h"
@@ -49,8 +49,8 @@
authctxt->style = style;
Index: auth2.c
---- auth2.c.orig 2007-05-20 06:58:41 +0200
-+++ auth2.c 2007-09-05 08:40:36 +0200
+--- auth2.c.orig 2007-10-26 06:26:16 +0200
++++ auth2.c 2008-03-31 08:34:25 +0200
@@ -44,6 +44,9 @@
#include "dispatch.h"
#include "pathnames.h"
@@ -61,7 +61,7 @@
#ifdef GSSAPI
#include "ssh-gss.h"
-@@ -143,6 +146,10 @@
+@@ -142,6 +145,10 @@
Authmethod *m = NULL;
char *user, *service, *method, *style = NULL;
int authenticated = 0;
@@ -72,7 +72,7 @@
if (authctxt == NULL)
fatal("input_userauth_request: no authctxt");
-@@ -156,6 +163,25 @@
+@@ -155,6 +162,25 @@
if ((style = strchr(user, ':')) != NULL)
*style++ = 0;
@@ -99,21 +99,21 @@
/* setup auth context */
authctxt->pw = PRIVSEP(getpwnamallow(user));
Index: servconf.c
---- servconf.c.orig 2007-05-20 07:03:16 +0200
-+++ servconf.c 2007-09-05 08:40:36 +0200
-@@ -122,6 +122,9 @@
- options->permit_tun = -1;
+--- servconf.c.orig 2008-02-10 12:48:55 +0100
++++ servconf.c 2008-03-31 08:35:14 +0200
+@@ -123,6 +123,9 @@
options->num_permitted_opens = -1;
options->adm_forced_command = NULL;
+ options->chroot_directory = NULL;
+#ifdef USE_ALIAS
+ options->num_alias = 0;
+#endif
}
void
-@@ -293,6 +296,9 @@
+@@ -294,6 +297,9 @@
sGssAuthentication, sGssCleanupCreds, sAcceptEnv, sPermitTunnel,
- sMatch, sPermitOpen, sForceCommand,
+ sMatch, sPermitOpen, sForceCommand, sChrootDirectory,
sUsePrivilegeSeparation,
+#ifdef USE_ALIAS
+ sAlias,
@@ -121,17 +121,17 @@
sDeprecated, sUnsupported
} ServerOpCodes;
-@@ -403,6 +409,9 @@
- { "match", sMatch, SSHCFG_ALL },
+@@ -405,6 +411,9 @@
{ "permitopen", sPermitOpen, SSHCFG_ALL },
{ "forcecommand", sForceCommand, SSHCFG_ALL },
+ { "chrootdirectory", sChrootDirectory, SSHCFG_ALL },
+#ifdef USE_ALIAS
+ { "alias", sAlias },
+#endif
{ NULL, sBadOption, 0 }
};
-@@ -1260,6 +1269,26 @@
+@@ -1276,6 +1285,26 @@
arg = strdelim(&cp);
break;
@@ -159,12 +159,12 @@
logit("%s line %d: Unsupported option %s",
filename, linenum, arg);
Index: servconf.h
---- servconf.h.orig 2007-02-19 12:25:38 +0100
-+++ servconf.h 2007-09-05 08:40:36 +0200
-@@ -141,6 +141,14 @@
- int permit_tun;
-
+--- servconf.h.orig 2008-03-07 08:31:24 +0100
++++ servconf.h 2008-03-31 08:34:49 +0200
+@@ -146,6 +146,14 @@
int num_permitted_opens;
+
+ char *chroot_directory;
+#ifdef USE_ALIAS
+#define MAX_ALIAS 256
+ u_int num_alias;
@@ -177,8 +177,8 @@
void initialize_server_options(ServerOptions *);
Index: sshd_config.5
---- sshd_config.5.orig 2007-06-11 06:07:13 +0200
-+++ sshd_config.5 2007-09-05 08:40:36 +0200
+--- sshd_config.5.orig 2008-03-27 01:02:02 +0100
++++ sshd_config.5 2008-03-31 08:34:25 +0200
@@ -95,6 +95,15 @@
(use IPv6 only).
The default is
@@ .
patch -p0 <<'@@ .'
Index: openpkg-src/openssh/openssh.patch.chroot
============================================================================
$ cvs diff -u -r1.11 -r1.12 openssh.patch.chroot
--- openpkg-src/openssh/openssh.patch.chroot 5 Sep 2007 06:48:40 -0000 1.11
+++ openpkg-src/openssh/openssh.patch.chroot 31 Mar 2008 07:00:50 -0000 1.12
@@ -1,7 +1,7 @@
Index: scp.c
---- scp.c.orig 2007-08-08 06:29:58 +0200
-+++ scp.c 2007-09-05 08:41:00 +0200
-@@ -131,6 +131,11 @@
+--- scp.c.orig 2008-03-14 01:59:50 +0100
++++ scp.c 2008-03-31 08:37:01 +0200
+@@ -140,6 +140,11 @@
/* This is the program to execute for the secured connection. ("ssh" or -S) */
char *ssh_program = _PATH_SSH_PROGRAM;
@@ -13,7 +13,7 @@
/* This is used to store the pid of ssh_program */
pid_t do_cmd_pid = -1;
-@@ -313,7 +318,11 @@
+@@ -323,7 +328,11 @@
addargs(&args, "-oClearAllForwardings yes");
fflag = tflag = 0;
@@ -25,7 +25,7 @@
switch (ch) {
/* User-visible flags. */
case '1':
-@@ -374,6 +383,11 @@
+@@ -384,6 +393,11 @@
setmode(0, O_BINARY);
#endif
break;
@@ -37,7 +37,7 @@
default:
usage();
}
-@@ -389,6 +403,19 @@
+@@ -399,6 +413,19 @@
remin = STDIN_FILENO;
remout = STDOUT_FILENO;
@@ -58,12 +58,12 @@
/* Follow "protocol", send data. */
(void) response();
Index: session.c
---- session.c.orig 2007-08-16 15:28:04 +0200
-+++ session.c 2007-09-05 08:41:00 +0200
-@@ -1337,6 +1337,26 @@
- exit(1);
+--- session.c.orig 2008-03-27 01:03:05 +0100
++++ session.c 2008-03-31 08:39:07 +0200
+@@ -1426,6 +1426,25 @@
+ free(tmp);
+ free(chroot_path);
}
- endgrent();
+# ifdef USE_CHROOT
+ {
+ char *user_dir;
@@ -75,8 +75,7 @@
+ if (strncmp(new_root, "/./", 3) == 0) {
+ *new_root = '\0';
+ new_root += 2;
-+ if (chroot(user_dir) == -1)
-+ fatal("Couldn't chroot to user directory \"%s\"", user_dir);
++ safe_chroot(user_dir, pw->pw_uid);
+ pw->pw_dir = new_root;
+ break;
+ }
@@ -84,15 +83,15 @@
+ }
+ }
+# endif /* USE_CHROOT */
- #ifdef GSSAPI
- if (options.gss_authentication) {
- temporarily_use_uid(pw);
-Index: sftp-server.c
---- sftp-server.c.orig 2007-05-20 07:09:05 +0200
-+++ sftp-server.c 2007-09-05 08:41:00 +0200
-@@ -1273,6 +1273,38 @@
- handle_init();
+ #ifdef HAVE_LOGIN_CAP
+ if (setusercontext(lc, pw, pw->pw_uid, LOGIN_SETUSER) < 0) {
+Index: sftp-server.c
+--- sftp-server.c.orig 2008-03-07 08:33:53 +0100
++++ sftp-server.c 2008-03-31 08:37:01 +0200
+@@ -1302,6 +1302,38 @@
+ logit("session opened for local user %s from [%s]",
+ pw->pw_name, client_addr);
+#ifdef USE_CHROOT
+{
@@ .
patch -p0 <<'@@ .'
Index: openpkg-src/openssh/openssh.patch.scpbindir
============================================================================
$ cvs diff -u -r1.14 -r1.15 openssh.patch.scpbindir
--- openpkg-src/openssh/openssh.patch.scpbindir 5 Sep 2007 06:48:40 -0000 1.14
+++ openpkg-src/openssh/openssh.patch.scpbindir 31 Mar 2008 07:00:50 -0000 1.15
@@ -1,7 +1,7 @@
Index: session.c
---- session.c.orig 2007-08-16 15:28:04 +0200
-+++ session.c 2007-09-05 08:41:17 +0200
-@@ -92,6 +92,10 @@
+--- session.c.orig 2008-03-27 01:03:05 +0100
++++ session.c 2008-03-31 08:56:59 +0200
+@@ -94,6 +94,10 @@
#include <kafs.h>
#endif
@@ -12,7 +12,7 @@
/* func */
Session *session_new(void);
-@@ -680,6 +684,21 @@
+@@ -673,6 +677,21 @@
void
do_exec(Session *s, const char *command)
{
@@ .
patch -p0 <<'@@ .'
Index: openpkg-src/openssh/openssh.patch.sftplogging
============================================================================
$ cvs diff -u -r1.12 -r1.13 openssh.patch.sftplogging
--- openpkg-src/openssh/openssh.patch.sftplogging 5 Sep 2007 06:48:40 -0000 1.12
+++ openpkg-src/openssh/openssh.patch.sftplogging 31 Mar 2008 07:00:50 -0000 1.13
@@ -1,20 +1,20 @@
Index: servconf.c
---- servconf.c.orig 2007-05-20 07:03:16 +0200
-+++ servconf.c 2007-09-05 08:41:42 +0200
-@@ -122,6 +122,12 @@
- options->permit_tun = -1;
+--- servconf.c.orig 2008-02-10 12:48:55 +0100
++++ servconf.c 2008-03-31 08:58:32 +0200
+@@ -123,6 +123,12 @@
options->num_permitted_opens = -1;
options->adm_forced_command = NULL;
-+ options->log_sftp = LOG_SFTP_NOT_SET;
-+ options->sftp_log_facility = SYSLOG_FACILITY_NOT_SET;
-+ options->sftp_log_level = SYSLOG_LEVEL_NOT_SET;
-+ memset(options->sftp_umask, 0, SFTP_UMASK_LENGTH);
-+ options->sftp_permit_chmod = SFTP_PERMIT_NOT_SET;
-+ options->sftp_permit_chown = SFTP_PERMIT_NOT_SET;
+ options->chroot_directory = NULL;
++ options->log_sftp = LOG_SFTP_NOT_SET;
++ options->sftp_log_facility = SYSLOG_FACILITY_NOT_SET;
++ options->sftp_log_level = SYSLOG_LEVEL_NOT_SET;
++ memset(options->sftp_umask, 0, SFTP_UMASK_LENGTH);
++ options->sftp_permit_chmod = SFTP_PERMIT_NOT_SET;
++ options->sftp_permit_chown = SFTP_PERMIT_NOT_SET;
}
void
-@@ -250,6 +256,24 @@
+@@ -251,6 +257,24 @@
if (options->permit_tun == -1)
options->permit_tun = SSH_TUNMODE_NO;
@@ -39,9 +39,9 @@
/* Turn privilege separation on by default */
if (use_privsep == -1)
use_privsep = 1;
-@@ -293,6 +317,9 @@
+@@ -294,6 +318,9 @@
sGssAuthentication, sGssCleanupCreds, sAcceptEnv, sPermitTunnel,
- sMatch, sPermitOpen, sForceCommand,
+ sMatch, sPermitOpen, sForceCommand, sChrootDirectory,
sUsePrivilegeSeparation,
+ sLogSftp, sSftpLogFacility, sSftpLogLevel,
+ sSftpUmask,
@@ -49,7 +49,7 @@
sDeprecated, sUnsupported
} ServerOpCodes;
-@@ -307,6 +334,12 @@
+@@ -308,6 +335,12 @@
u_int flags;
} keywords[] = {
/* Portable-specific options */
@@ -62,7 +62,7 @@
#ifdef USE_PAM
{ "usepam", sUsePAM, SSHCFG_GLOBAL },
#else
-@@ -625,6 +658,8 @@
+@@ -629,6 +662,8 @@
u_short port;
u_int i, flags = 0;
size_t len;
@@ -71,11 +71,10 @@
cp = line;
if ((arg = strdelim(&cp)) == NULL)
-@@ -1145,6 +1180,58 @@
- case sBanner:
+@@ -1150,6 +1185,58 @@
charptr = &options->banner;
goto parse_filename;
-+
+
+ case sLogSftp:
+ intptr = &options->log_sftp;
+ goto parse_flag;
@@ -127,12 +126,13 @@
+ intptr = &options->sftp_permit_chown;
+ goto parse_flag;
+
++
/*
* These options can contain %X options expanded at
* connect time, so that you can specify paths like:
Index: servconf.h
---- servconf.h.orig 2007-02-19 12:25:38 +0100
-+++ servconf.h 2007-09-05 08:41:42 +0200
+--- servconf.h.orig 2008-03-07 08:31:24 +0100
++++ servconf.h 2008-03-31 08:58:54 +0200
@@ -34,6 +34,19 @@
#define PERMIT_NO_PASSWD 2
#define PERMIT_YES 3
@@ -152,25 +152,24 @@
+
#define DEFAULT_AUTH_FAIL_MAX 6 /* Default for MaxAuthTries */
- typedef struct {
-@@ -141,6 +154,13 @@
- int permit_tun;
-
+ /* Magic name for internal sftp-server */
+@@ -146,6 +159,12 @@
int num_permitted_opens;
+
+ char *chroot_directory;
+ int log_sftp; /* perform sftp-server logging */
+ SyslogFacility sftp_log_facility; /* Facility for sftp subsystem logging. */
+ LogLevel sftp_log_level; /* Level for sftp subsystem logging. */
+ char sftp_umask[SFTP_UMASK_LENGTH]; /* Sftp Umask */
+ int sftp_permit_chmod;
+ int sftp_permit_chown;
-+
} ServerOptions;
void initialize_server_options(ServerOptions *);
Index: session.c
---- session.c.orig 2007-08-16 15:28:04 +0200
-+++ session.c 2007-09-05 08:41:42 +0200
-@@ -138,6 +138,15 @@
+--- session.c.orig 2008-03-27 01:03:05 +0100
++++ session.c 2008-03-31 08:57:29 +0200
+@@ -144,6 +144,15 @@
static int is_child = 0;
@@ -186,7 +185,7 @@
/* Name and directory of socket for authentication agent forwarding. */
static char *auth_sock_name = NULL;
static char *auth_sock_dir = NULL;
-@@ -1011,6 +1020,7 @@
+@@ -1012,6 +1021,7 @@
env = xcalloc(envsize, sizeof(char *));
env[0] = NULL;
@@ -194,7 +193,7 @@
#ifdef HAVE_CYGWIN
/*
* The Windows environment contains some setting which are
-@@ -1171,6 +1181,67 @@
+@@ -1172,6 +1182,67 @@
child_set_env(&env, &envsize, SSH_AUTHSOCKET_ENV_NAME,
auth_sock_name);
@@ -264,7 +263,7 @@
snprintf(buf, sizeof buf, "%.200s/.ssh/environment",
Index: sftp-server.8
--- sftp-server.8.orig 2007-06-05 10:27:13 +0200
-+++ sftp-server.8 2007-09-05 08:41:42 +0200
++++ sftp-server.8 2008-03-31 08:57:29 +0200
@@ -49,6 +49,20 @@
.Cm Subsystem
declaration.
@@ -287,8 +286,8 @@
for more information.
.Pp
Index: sftp-server.c
---- sftp-server.c.orig 2007-05-20 07:09:05 +0200
-+++ sftp-server.c 2007-09-05 08:42:11 +0200
+--- sftp-server.c.orig 2008-03-07 08:33:53 +0100
++++ sftp-server.c 2008-03-31 08:57:29 +0200
@@ -53,6 +53,12 @@
/* Our verbosity */
LogLevel log_level = SYSLOG_LEVEL_ERROR;
@@ -302,7 +301,7 @@
/* Our client */
struct passwd *pw = NULL;
char *client_addr = NULL;
-@@ -499,6 +505,12 @@
+@@ -509,6 +515,12 @@
a = get_attrib();
flags = flags_from_portable(pflags);
mode = (a->flags & SSH2_FILEXFER_ATTR_PERMISSIONS) ? a->perm : 0666;
@@ -315,7 +314,7 @@
logit("open \"%s\" flags %s mode 0%o",
name, string_from_portable(pflags), mode);
fd = open(name, flags, mode);
-@@ -513,6 +525,8 @@
+@@ -523,6 +535,8 @@
status = SSH2_FX_OK;
}
}
@@ -324,7 +323,7 @@
if (status != SSH2_FX_OK)
send_status(id, status);
xfree(name);
-@@ -570,6 +584,8 @@
+@@ -580,6 +594,8 @@
}
}
}
@@ -333,7 +332,7 @@
if (status != SSH2_FX_OK)
send_status(id, status);
}
-@@ -609,6 +625,8 @@
+@@ -619,6 +635,8 @@
}
}
}
@@ -342,7 +341,7 @@
send_status(id, status);
xfree(data);
}
-@@ -710,10 +728,19 @@
+@@ -720,10 +738,19 @@
status = errno_to_portable(errno);
}
if (a->flags & SSH2_FILEXFER_ATTR_PERMISSIONS) {
@@ -362,7 +361,7 @@
}
if (a->flags & SSH2_FILEXFER_ATTR_ACMODTIME) {
char buf[64];
-@@ -727,11 +754,20 @@
+@@ -737,11 +764,20 @@
status = errno_to_portable(errno);
}
if (a->flags & SSH2_FILEXFER_ATTR_UIDGID) {
@@ -383,7 +382,7 @@
}
send_status(id, status);
xfree(name);
-@@ -745,6 +781,9 @@
+@@ -755,6 +791,9 @@
int handle, fd, ret;
int status = SSH2_FX_OK;
@@ -393,7 +392,7 @@
id = get_int();
handle = get_handle();
a = get_attrib();
-@@ -763,6 +802,7 @@
+@@ -773,6 +812,7 @@
status = errno_to_portable(errno);
}
if (a->flags & SSH2_FILEXFER_ATTR_PERMISSIONS) {
@@ -401,7 +400,7 @@
logit("set \"%s\" mode %04o", name, a->perm);
#ifdef HAVE_FCHMOD
ret = fchmod(fd, a->perm & 0777);
-@@ -771,6 +811,14 @@
+@@ -781,6 +821,14 @@
#endif
if (ret == -1)
status = errno_to_portable(errno);
@@ -416,7 +415,7 @@
}
if (a->flags & SSH2_FILEXFER_ATTR_ACMODTIME) {
char buf[64];
-@@ -788,6 +836,7 @@
+@@ -798,6 +846,7 @@
status = errno_to_portable(errno);
}
if (a->flags & SSH2_FILEXFER_ATTR_UIDGID) {
@@ -424,7 +423,7 @@
logit("set \"%s\" owner %lu group %lu", name,
(u_long)a->uid, (u_long)a->gid);
#ifdef HAVE_FCHOWN
-@@ -797,6 +846,14 @@
+@@ -807,6 +856,14 @@
#endif
if (ret == -1)
status = errno_to_portable(errno);
@@ -439,7 +438,7 @@
}
}
send_status(id, status);
-@@ -827,6 +884,8 @@
+@@ -837,6 +894,8 @@
}
}
@@ -448,7 +447,7 @@
if (status != SSH2_FX_OK)
send_status(id, status);
xfree(path);
-@@ -902,6 +961,8 @@
+@@ -912,6 +971,8 @@
logit("remove name \"%s\"", name);
ret = unlink(name);
status = (ret == -1) ? errno_to_portable(errno) : SSH2_FX_OK;
@@ -457,7 +456,7 @@
send_status(id, status);
xfree(name);
}
-@@ -919,6 +980,12 @@
+@@ -929,6 +990,12 @@
a = get_attrib();
mode = (a->flags & SSH2_FILEXFER_ATTR_PERMISSIONS) ?
a->perm & 0777 : 0777;
@@ -470,7 +469,7 @@
debug3("request %u: mkdir", id);
logit("mkdir name \"%s\" mode 0%o", name, mode);
ret = mkdir(name, mode);
-@@ -940,6 +1007,8 @@
+@@ -950,6 +1017,8 @@
logit("rmdir name \"%s\"", name);
ret = rmdir(name);
status = (ret == -1) ? errno_to_portable(errno) : SSH2_FX_OK;
@@ -479,7 +478,7 @@
send_status(id, status);
xfree(name);
}
-@@ -967,6 +1036,8 @@
+@@ -977,6 +1046,8 @@
s.name = s.long_name = resolvedname;
send_names(id, 1, &s);
}
@@ -488,7 +487,7 @@
xfree(path);
}
-@@ -1023,6 +1094,8 @@
+@@ -1033,6 +1104,8 @@
status = SSH2_FX_OK;
}
send_status(id, status);
@@ -497,7 +496,7 @@
xfree(oldpath);
xfree(newpath);
}
-@@ -1049,6 +1122,8 @@
+@@ -1059,6 +1132,8 @@
s.name = s.long_name = buf;
send_names(id, 1, &s);
}
@@ -506,7 +505,7 @@
xfree(path);
}
-@@ -1068,6 +1143,8 @@
+@@ -1078,6 +1153,8 @@
ret = symlink(oldpath, newpath);
status = (ret == -1) ? errno_to_portable(errno) : SSH2_FX_OK;
send_status(id, status);
@@ -515,7 +514,7 @@
xfree(oldpath);
xfree(newpath);
}
-@@ -1215,6 +1292,8 @@
+@@ -1249,6 +1326,8 @@
ssize_t len, olen, set_size;
SyslogFacility log_facility = SYSLOG_FACILITY_AUTH;
char *cp, buf[4*4096];
@@ -524,7 +523,7 @@
extern char *optarg;
extern char *__progname;
-@@ -1253,6 +1332,12 @@
+@@ -1284,6 +1363,12 @@
}
}
@@ -537,7 +536,7 @@
log_init(__progname, log_level, log_facility, log_stderr);
if ((cp = getenv("SSH_CONNECTION")) != NULL) {
-@@ -1276,6 +1361,39 @@
+@@ -1305,6 +1390,39 @@
in = dup(STDIN_FILENO);
out = dup(STDOUT_FILENO);
@@ -578,9 +577,9 @@
setmode(in, O_BINARY);
setmode(out, O_BINARY);
Index: sshd_config.5
---- sshd_config.5.orig 2007-06-11 06:07:13 +0200
-+++ sshd_config.5 2007-09-05 08:41:42 +0200
-@@ -483,6 +483,10 @@
+--- sshd_config.5.orig 2008-03-27 01:02:02 +0100
++++ sshd_config.5 2008-03-31 08:57:29 +0200
+@@ -530,6 +530,10 @@
DEBUG and DEBUG1 are equivalent.
DEBUG2 and DEBUG3 each specify higher levels of debugging output.
Logging with a DEBUG level violates the privacy of users and is not recommended.
@@ -591,7 +590,7 @@
.It Cm MACs
Specifies the available MAC (message authentication code) algorithms.
The MAC algorithm is used in protocol version 2
-@@ -725,6 +729,37 @@
+@@ -773,6 +777,37 @@
.It Cm ServerKeyBits
Defines the number of bits in the ephemeral protocol version 1 server key.
The minimum value is 512, and the default is 768.
@@ -630,9 +629,9 @@
Specifies whether
.Xr sshd 8
Index: sshd_config
---- sshd_config.orig 2007-03-21 10:42:25 +0100
-+++ sshd_config 2007-09-05 08:41:42 +0200
-@@ -109,6 +109,17 @@
+--- sshd_config.orig 2008-02-10 12:40:12 +0100
++++ sshd_config 2008-03-31 08:57:29 +0200
+@@ -110,6 +110,17 @@
# override default of no subsystems
Subsystem sftp /usr/libexec/sftp-server
@@ .
patch -p0 <<'@@ .'
Index: openpkg-src/openssh/openssh.spec
============================================================================
$ cvs diff -u -r1.206 -r1.207 openssh.spec
--- openpkg-src/openssh/openssh.spec 8 Feb 2008 06:48:05 -0000 1.206
+++ openpkg-src/openssh/openssh.spec 31 Mar 2008 07:00:50 -0000 1.207
@@ -22,7 +22,7 @@
##
# package versions
-%define V_base 4.7
+%define V_base 4.9
%define V_portable p1
%define V_watchdog 4.4p1
%define V_ldap_base 4.6p1
@@ -41,7 +41,7 @@
Group: SSH
License: BSD
Version: %{V_base}%{V_portable}
-Release: 20080208
+Release: 20080331
# package options
%option with_fsl yes
@@ .
______________________________________________________________________
OpenPKG http://openpkg.org
CVS Repository Commit List openpkg-cvs@openpkg.org
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic