OpenPKG CVS Repository
  http://cvs.openpkg.org/
  ____________________________________________________________________________

  Server: cvs.openpkg.org                  Name:   Ralf S. Engelschall
  Root:   /v/openpkg/cvs                   Email:  [EMAIL PROTECTED]
  Module: openpkg-src                      Date:   01-Feb-2006 19:49:18
  Branch: HEAD                             Handle: 2006020118491800

  Modified files:
    openpkg-src/openssh     openssh.patch openssh.patch.alias
                            openssh.patch.chroot openssh.patch.scpbindir
                            openssh.patch.sftplogging openssh.spec

  Log:
    upgrading package: openssh 4.2p1 -> 4.3p1

  Summary:
    Revision    Changes     Path
    1.15        +6  -6      openpkg-src/openssh/openssh.patch
    1.6         +19 -19     openpkg-src/openssh/openssh.patch.alias
    1.6         +11 -11     openpkg-src/openssh/openssh.patch.chroot
    1.9         +4  -12     openpkg-src/openssh/openssh.patch.scpbindir
    1.6         +58 -58     openpkg-src/openssh/openssh.patch.sftplogging
    1.156       +4  -2      openpkg-src/openssh/openssh.spec
  ____________________________________________________________________________

  patch -p0 <<'@@ .'
  Index: openpkg-src/openssh/openssh.patch
  ============================================================================
  $ cvs diff -u -r1.14 -r1.15 openssh.patch
  --- openpkg-src/openssh/openssh.patch 1 Sep 2005 18:21:39 -0000       1.14
  +++ openpkg-src/openssh/openssh.patch 1 Feb 2006 18:49:18 -0000       1.15
  @@ -1,6 +1,6 @@
   Index: Makefile.in
  ---- Makefile.in.orig 2005-05-29 09:22:29 +0200
  -+++ Makefile.in      2005-09-01 20:04:23 +0200
  +--- Makefile.in.orig 2006-01-01 09:47:05 +0100
  ++++ Makefile.in      2006-02-01 19:39:50 +0100
   @@ -230,7 +230,7 @@
        -rm -rf autom4te.cache
        (cd scard && $(MAKE) -f Makefile.in distprep)
  @@ -12,7 +12,7 @@
    
   Index: auth-pam.h
   --- auth-pam.h.orig  2004-09-11 14:17:26 +0200
  -+++ auth-pam.h       2005-09-01 20:04:23 +0200
  ++++ auth-pam.h       2006-02-01 19:39:50 +0100
   @@ -28,7 +28,7 @@
    #ifdef USE_PAM
    
  @@ -23,10 +23,10 @@
    
    void start_pam(Authctxt *);
   Index: version.h
  ---- version.h.orig   2005-08-31 11:47:07 +0200
  -+++ version.h        2005-09-01 20:04:23 +0200
  +--- version.h.orig   2006-02-01 12:27:31 +0100
  ++++ version.h        2006-02-01 19:39:50 +0100
   @@ -3,4 +3,4 @@
  - #define SSH_VERSION "OpenSSH_4.2"
  + #define SSH_VERSION "OpenSSH_4.3"
    
    #define SSH_PORTABLE        "p1"
   -#define SSH_RELEASE SSH_VERSION SSH_PORTABLE
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-src/openssh/openssh.patch.alias
  ============================================================================
  $ cvs diff -u -r1.5 -r1.6 openssh.patch.alias
  --- openpkg-src/openssh/openssh.patch.alias   1 Sep 2005 18:21:39 -0000       
1.5
  +++ openpkg-src/openssh/openssh.patch.alias   1 Feb 2006 18:49:18 -0000       
1.6
  @@ -1,6 +1,6 @@
   Index: auth1.c
   --- auth1.c.orig     2005-07-17 09:26:44 +0200
  -+++ auth1.c  2005-09-01 20:05:23 +0200
  ++++ auth1.c  2006-02-01 19:40:30 +0100
   @@ -26,6 +26,9 @@
    #include "uidswap.h"
    #include "monitor_wrap.h"
  @@ -49,8 +49,8 @@
        authctxt->style = style;
    
   Index: auth2.c
  ---- auth2.c.orig     2005-07-17 09:26:44 +0200
  -+++ auth2.c  2005-09-01 20:05:23 +0200
  +--- auth2.c.orig     2005-09-24 04:43:51 +0200
  ++++ auth2.c  2006-02-01 19:40:30 +0100
   @@ -36,6 +36,9 @@
    #include "pathnames.h"
    #include "monitor_wrap.h"
  @@ -99,21 +99,21 @@
                /* setup auth context */
                authctxt->pw = PRIVSEP(getpwnamallow(user));
   Index: servconf.c
  ---- servconf.c.orig  2005-08-12 14:11:37 +0200
  -+++ servconf.c       2005-09-01 20:05:23 +0200
  -@@ -101,6 +101,9 @@
  -     options->authorized_keys_file = NULL;
  +--- servconf.c.orig  2005-12-13 09:33:20 +0100
  ++++ servconf.c       2006-02-01 19:41:07 +0100
  +@@ -102,6 +102,9 @@
        options->authorized_keys_file2 = NULL;
        options->num_accept_env = 0;
  +     options->permit_tun = -1;
   +#ifdef USE_ALIAS
   +    options->num_alias = 0;
   +#endif
    
        /* Needs to be accessable in many places */
        use_privsep = -1;
  -@@ -272,6 +275,9 @@
  +@@ -275,6 +278,9 @@
        sClientAliveCountMax, sAuthorizedKeysFile, sAuthorizedKeysFile2,
  -     sGssAuthentication, sGssCleanupCreds, sAcceptEnv,
  +     sGssAuthentication, sGssCleanupCreds, sAcceptEnv, sPermitTunnel,
        sUsePrivilegeSeparation,
   +#ifdef USE_ALIAS
   +    sAlias,
  @@ -121,17 +121,17 @@
        sDeprecated, sUnsupported
    } ServerOpCodes;
    
  -@@ -373,6 +379,9 @@
  -     { "authorizedkeysfile2", sAuthorizedKeysFile2 },
  +@@ -377,6 +383,9 @@
        { "useprivilegeseparation", sUsePrivilegeSeparation},
        { "acceptenv", sAcceptEnv },
  +     { "permittunnel", sPermitTunnel },
   +#ifdef USE_ALIAS
   +    { "alias", sAlias },
   +#endif
        { NULL, sBadOption }
    };
    
  -@@ -969,6 +978,26 @@
  +@@ -995,6 +1004,26 @@
                    arg = strdelim(&cp);
                break;
    
  @@ -159,12 +159,12 @@
                logit("%s line %d: Unsupported option %s",
                    filename, linenum, arg);
   Index: servconf.h
  ---- servconf.h.orig  2005-01-20 00:57:56 +0100
  -+++ servconf.h       2005-09-01 20:05:23 +0200
  -@@ -134,6 +134,14 @@
  -     char   *authorized_keys_file;   /* File containing public keys */
  -     char   *authorized_keys_file2;
  +--- servconf.h.orig  2005-12-13 09:29:03 +0100
  ++++ servconf.h       2006-02-01 19:41:39 +0100
  +@@ -137,6 +137,14 @@
        int     use_pam;                /* Enable auth via PAM */
  + 
  +     int     permit_tun;
   +#ifdef USE_ALIAS
   +#define MAX_ALIAS 256
   +    u_int num_alias;
  @@ -177,8 +177,8 @@
    
    void         initialize_server_options(ServerOptions *);
   Index: sshd_config.5
  ---- sshd_config.5.orig       2005-07-26 13:54:57 +0200
  -+++ sshd_config.5    2005-09-01 20:05:23 +0200
  +--- sshd_config.5.orig       2006-01-03 08:47:31 +0100
  ++++ sshd_config.5    2006-02-01 19:40:30 +0100
   @@ -94,6 +94,15 @@
    (use IPv6 only).
    The default is
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-src/openssh/openssh.patch.chroot
  ============================================================================
  $ cvs diff -u -r1.5 -r1.6 openssh.patch.chroot
  --- openpkg-src/openssh/openssh.patch.chroot  1 Sep 2005 18:21:39 -0000       
1.5
  +++ openpkg-src/openssh/openssh.patch.chroot  1 Feb 2006 18:49:18 -0000       
1.6
  @@ -1,6 +1,6 @@
   Index: scp.c
  ---- scp.c.orig       2005-08-02 09:07:08 +0200
  -+++ scp.c    2005-09-01 20:05:53 +0200
  +--- scp.c.orig       2006-01-31 12:11:38 +0100
  ++++ scp.c    2006-02-01 19:42:17 +0100
   @@ -102,6 +102,11 @@
    /* This is the program to execute for the secured connection. ("ssh" or -S) 
*/
    char *ssh_program = _PATH_SSH_PROGRAM;
  @@ -13,7 +13,7 @@
    /* This is used to store the pid of ssh_program */
    pid_t do_cmd_pid = -1;
    
  -@@ -231,7 +236,11 @@
  +@@ -278,7 +283,11 @@
        addargs(&args, "-oClearAllForwardings yes");
    
        fflag = tflag = 0;
  @@ -25,7 +25,7 @@
                switch (ch) {
                /* User-visible flags. */
                case '1':
  -@@ -292,6 +301,11 @@
  +@@ -339,6 +348,11 @@
                        setmode(0, O_BINARY);
    #endif
                        break;
  @@ -37,7 +37,7 @@
                default:
                        usage();
                }
  -@@ -307,6 +321,19 @@
  +@@ -354,6 +368,19 @@
        remin = STDIN_FILENO;
        remout = STDOUT_FILENO;
    
  @@ -58,9 +58,9 @@
                /* Follow "protocol", send data. */
                (void) response();
   Index: session.c
  ---- session.c.orig   2005-08-31 18:59:49 +0200
  -+++ session.c        2005-09-01 20:05:53 +0200
  -@@ -1310,6 +1310,26 @@
  +--- session.c.orig   2005-12-24 04:59:12 +0100
  ++++ session.c        2006-02-01 19:42:17 +0100
  +@@ -1301,6 +1301,26 @@
                        exit(1);
                }
                endgrent();
  @@ -88,9 +88,9 @@
                if (options.gss_authentication) {
                        temporarily_use_uid(pw);
   Index: sftp-server.c
  ---- sftp-server.c.orig       2005-06-17 04:59:35 +0200
  -+++ sftp-server.c    2005-09-01 20:05:53 +0200
  -@@ -1045,6 +1045,38 @@
  +--- sftp-server.c.orig       2006-01-02 13:40:51 +0100
  ++++ sftp-server.c    2006-02-01 19:42:17 +0100
  +@@ -1049,6 +1049,38 @@
        log_init("sftp-server", SYSLOG_LEVEL_DEBUG1, SYSLOG_FACILITY_AUTH, 0);
    #endif
    
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-src/openssh/openssh.patch.scpbindir
  ============================================================================
  $ cvs diff -u -r1.8 -r1.9 openssh.patch.scpbindir
  --- openpkg-src/openssh/openssh.patch.scpbindir       1 Sep 2005 18:21:39 
-0000       1.8
  +++ openpkg-src/openssh/openssh.patch.scpbindir       1 Feb 2006 18:49:18 
-0000       1.9
  @@ -1,14 +1,6 @@
  -This patch provides a workaround for the nasty issue that scp(1) is
  -found on the server side only if it is in $PATH (due to a ~/.bashrc,
  -/etc/profile, etc). The default $PATH is out of scope for OpenPKG and is
  -different across platforms anyway. Nevertheless we want to ensure that
  -with OpenPKG on the server side, scp(1) is always usable (on the client
  -side) without having to adjust the system and/or user environment (on
  -the server side).
  -
   Index: session.c
  ---- session.c.orig   2005-08-31 18:59:49 +0200
  -+++ session.c        2005-09-01 20:06:43 +0200
  +--- session.c.orig   2005-12-24 04:59:12 +0100
  ++++ session.c        2006-02-01 19:43:26 +0100
   @@ -67,6 +67,10 @@
    #include "ssh-gss.h"
    #endif
  @@ -20,7 +12,7 @@
    /* func */
    
    Session *session_new(void);
  -@@ -660,6 +664,21 @@
  +@@ -651,6 +655,21 @@
    void
    do_exec(Session *s, const char *command)
    {
  @@ -42,7 +34,7 @@
        if (forced_command) {
                original_command = command;
                command = forced_command;
  -@@ -684,6 +703,8 @@
  +@@ -675,6 +694,8 @@
                do_exec_no_pty(s, command);
    
        original_command = NULL;
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-src/openssh/openssh.patch.sftplogging
  ============================================================================
  $ cvs diff -u -r1.5 -r1.6 openssh.patch.sftplogging
  --- openpkg-src/openssh/openssh.patch.sftplogging     1 Sep 2005 18:21:39 
-0000       1.5
  +++ openpkg-src/openssh/openssh.patch.sftplogging     1 Feb 2006 18:49:18 
-0000       1.6
  @@ -1,9 +1,9 @@
   Index: servconf.c
  ---- servconf.c.orig  2005-08-12 14:11:37 +0200
  -+++ servconf.c       2005-09-01 20:09:58 +0200
  -@@ -102,6 +102,15 @@
  -     options->authorized_keys_file2 = NULL;
  +--- servconf.c.orig  2005-12-13 09:33:20 +0100
  ++++ servconf.c       2006-02-01 19:44:14 +0100
  +@@ -103,6 +103,15 @@
        options->num_accept_env = 0;
  +     options->permit_tun = -1;
    
   +    options->log_sftp = LOG_SFTP_NOT_SET;
   +        options->sftp_log_facility = SYSLOG_FACILITY_NOT_SET;
  @@ -17,9 +17,9 @@
        /* Needs to be accessable in many places */
        use_privsep = -1;
    }
  -@@ -230,6 +239,24 @@
  -     if (options->authorized_keys_file == NULL)
  -             options->authorized_keys_file = _PATH_SSH_USER_PERMITTED_KEYS;
  +@@ -233,6 +242,24 @@
  +     if (options->permit_tun == -1)
  +             options->permit_tun = SSH_TUNMODE_NO;
    
   +    /* Turn sftp-server logging off by default */
   +    if (options->log_sftp == LOG_SFTP_NOT_SET)
  @@ -42,9 +42,9 @@
        /* Turn privilege separation on by default */
        if (use_privsep == -1)
                use_privsep = 1;
  -@@ -272,6 +299,9 @@
  +@@ -275,6 +302,9 @@
        sClientAliveCountMax, sAuthorizedKeysFile, sAuthorizedKeysFile2,
  -     sGssAuthentication, sGssCleanupCreds, sAcceptEnv,
  +     sGssAuthentication, sGssCleanupCreds, sAcceptEnv, sPermitTunnel,
        sUsePrivilegeSeparation,
   +    sLogSftp, sSftpLogFacility, sSftpLogLevel,
   +    sSftpUmask,
  @@ -52,7 +52,7 @@
        sDeprecated, sUnsupported
    } ServerOpCodes;
    
  -@@ -281,6 +311,12 @@
  +@@ -284,6 +314,12 @@
        ServerOpCodes opcode;
    } keywords[] = {
        /* Portable-specific options */
  @@ -65,7 +65,7 @@
    #ifdef USE_PAM
        { "usepam", sUsePAM },
    #else
  -@@ -442,6 +478,8 @@
  +@@ -446,6 +482,8 @@
        ServerOpCodes opcode;
        u_short port;
        u_int i;
  @@ -74,7 +74,7 @@
    
        cp = line;
        arg = strdelim(&cp);
  -@@ -928,6 +966,58 @@
  +@@ -932,6 +970,58 @@
        case sBanner:
                charptr = &options->banner;
                goto parse_filename;
  @@ -134,8 +134,8 @@
         * These options can contain %X options expanded at
         * connect time, so that you can specify paths like:
   Index: servconf.h
  ---- servconf.h.orig  2005-01-20 00:57:56 +0100
  -+++ servconf.h       2005-09-01 20:09:17 +0200
  +--- servconf.h.orig  2005-12-13 09:29:03 +0100
  ++++ servconf.h       2006-02-01 19:45:29 +0100
   @@ -35,6 +35,19 @@
    #define     PERMIT_NO_PASSWD        2
    #define     PERMIT_YES              3
  @@ -156,13 +156,13 @@
    #define DEFAULT_AUTH_FAIL_MAX       6       /* Default for MaxAuthTries */
    
    typedef struct {
  -@@ -134,6 +147,13 @@
  -     char   *authorized_keys_file;   /* File containing public keys */
  -     char   *authorized_keys_file2;
  +@@ -137,6 +150,13 @@
        int     use_pam;                /* Enable auth via PAM */
  + 
  +     int     permit_tun;
   +    int     log_sftp;               /* perform sftp-server logging */
  -+        SyslogFacility sftp_log_facility;    /* Facility for sftp subsystem 
logging. */
  -+        LogLevel sftp_log_level;     /* Level for sftp subsystem logging. */
  ++    SyslogFacility sftp_log_facility;    /* Facility for sftp subsystem 
logging. */
  ++    LogLevel sftp_log_level;     /* Level for sftp subsystem logging. */
   +    char    sftp_umask[SFTP_UMASK_LENGTH];          /* Sftp Umask */
   +    int     sftp_permit_chmod;
   +    int     sftp_permit_chown;
  @@ -171,8 +171,8 @@
    
    void         initialize_server_options(ServerOptions *);
   Index: session.c
  ---- session.c.orig   2005-08-31 18:59:49 +0200
  -+++ session.c        2005-09-01 20:09:17 +0200
  +--- session.c.orig   2005-12-24 04:59:12 +0100
  ++++ session.c        2006-02-01 19:44:14 +0100
   @@ -113,6 +113,15 @@
    
    static int is_child = 0;
  @@ -189,7 +189,7 @@
    /* Name and directory of socket for authentication agent forwarding. */
    static char *auth_sock_name = NULL;
    static char *auth_sock_dir = NULL;
  -@@ -984,6 +993,7 @@
  +@@ -975,6 +984,7 @@
        env = xmalloc(envsize * sizeof(char *));
        env[0] = NULL;
    
  @@ -197,7 +197,7 @@
    #ifdef HAVE_CYGWIN
        /*
         * The Windows environment contains some setting which are
  -@@ -1144,6 +1154,67 @@
  +@@ -1135,6 +1145,67 @@
                child_set_env(&env, &envsize, SSH_AUTHSOCKET_ENV_NAME,
                    auth_sock_name);
    
  @@ -267,7 +267,7 @@
                snprintf(buf, sizeof buf, "%.200s/.ssh/environment",
   Index: sftp-server.8
   --- sftp-server.8.orig       2003-10-15 07:50:43 +0200
  -+++ sftp-server.8    2005-09-01 20:09:17 +0200
  ++++ sftp-server.8    2006-02-01 19:44:14 +0100
   @@ -41,6 +41,20 @@
    .Cm Subsystem
    option.
  @@ -290,9 +290,9 @@
    for more information.
    .Sh SEE ALSO
   Index: sftp-server.c
  ---- sftp-server.c.orig       2005-06-17 04:59:35 +0200
  -+++ sftp-server.c    2005-09-01 20:09:17 +0200
  -@@ -31,6 +31,13 @@
  +--- sftp-server.c.orig       2006-01-02 13:40:51 +0100
  ++++ sftp-server.c    2006-02-01 19:44:14 +0100
  +@@ -32,6 +32,13 @@
    #define get_string(lenp)            buffer_get_string(&iqueue, lenp);
    #define TRACE                               debug
    
  @@ -306,7 +306,7 @@
    extern char *__progname;
    
    /* input and output queue */
  -@@ -381,6 +388,14 @@
  +@@ -382,6 +389,14 @@
        a = get_attrib();
        flags = flags_from_portable(pflags);
        mode = (a->flags & SSH2_FILEXFER_ATTR_PERMISSIONS) ? a->perm : 0666;
  @@ -321,7 +321,7 @@
        TRACE("open id %u name %s flags %d mode 0%o", id, name, pflags, mode);
        fd = open(name, flags, mode);
        if (fd < 0) {
  -@@ -394,6 +409,8 @@
  +@@ -395,6 +410,8 @@
                        status = SSH2_FX_OK;
                }
        }
  @@ -330,15 +330,15 @@
        if (status != SSH2_FX_OK)
                send_status(id, status);
        xfree(name);
  -@@ -430,6 +447,7 @@
  -         (u_int64_t)off, len);
  +@@ -431,6 +448,7 @@
  +         (unsigned long long)off, len);
        if (len > sizeof buf) {
                len = sizeof buf;
   +            if ( permit_logging == 1 )
                logit("read change len %d", len);
        }
        fd = handle_to_fd(handle);
  -@@ -449,6 +467,8 @@
  +@@ -450,6 +468,8 @@
                        }
                }
        }
  @@ -347,7 +347,7 @@
        if (status != SSH2_FX_OK)
                send_status(id, status);
    }
  -@@ -483,10 +503,13 @@
  +@@ -484,10 +504,13 @@
                        } else if ((size_t)ret == len) {
                                status = SSH2_FX_OK;
                        } else {
  @@ -361,7 +361,7 @@
        send_status(id, status);
        xfree(data);
    }
  -@@ -579,24 +602,46 @@
  +@@ -580,24 +603,46 @@
        a = get_attrib();
        TRACE("setstat id %u name %s", id, name);
        if (a->flags & SSH2_FILEXFER_ATTR_SIZE) {
  @@ -408,7 +408,7 @@
        }
        send_status(id, status);
        xfree(name);
  -@@ -611,6 +656,9 @@
  +@@ -612,6 +657,9 @@
        int status = SSH2_FX_OK;
        char *name;
    
  @@ -418,7 +418,7 @@
        id = get_int();
        handle = get_handle();
        a = get_attrib();
  -@@ -621,11 +669,14 @@
  +@@ -622,11 +670,14 @@
                status = SSH2_FX_FAILURE;
        } else {
                if (a->flags & SSH2_FILEXFER_ATTR_SIZE) {
  @@ -433,7 +433,7 @@
    #ifdef HAVE_FCHMOD
                        ret = fchmod(fd, a->perm & 0777);
    #else
  -@@ -633,8 +684,18 @@
  +@@ -634,8 +685,18 @@
    #endif
                        if (ret == -1)
                                status = errno_to_portable(errno);
  @@ -452,7 +452,7 @@
    #ifdef HAVE_FUTIMES
                        ret = futimes(fd, attrib_to_tv(a));
    #else
  -@@ -644,6 +705,7 @@
  +@@ -645,6 +706,7 @@
                                status = errno_to_portable(errno);
                }
                if (a->flags & SSH2_FILEXFER_ATTR_UIDGID) {
  @@ -460,7 +460,7 @@
    #ifdef HAVE_FCHOWN
                        ret = fchown(fd, a->uid, a->gid);
    #else
  -@@ -651,6 +713,14 @@
  +@@ -652,6 +714,14 @@
    #endif
                        if (ret == -1)
                                status = errno_to_portable(errno);
  @@ -475,7 +475,7 @@
                }
        }
        send_status(id, status);
  -@@ -680,6 +750,8 @@
  +@@ -681,6 +751,8 @@
                }
    
        }
  @@ -484,7 +484,7 @@
        if (status != SSH2_FX_OK)
                send_status(id, status);
        xfree(path);
  -@@ -753,6 +825,8 @@
  +@@ -754,6 +826,8 @@
        TRACE("remove id %u name %s", id, name);
        ret = unlink(name);
        status = (ret == -1) ? errno_to_portable(errno) : SSH2_FX_OK;
  @@ -493,7 +493,7 @@
        send_status(id, status);
        xfree(name);
    }
  -@@ -770,9 +844,19 @@
  +@@ -771,9 +845,19 @@
        a = get_attrib();
        mode = (a->flags & SSH2_FILEXFER_ATTR_PERMISSIONS) ?
            a->perm & 0777 : 0777;
  @@ -513,7 +513,7 @@
        send_status(id, status);
        xfree(name);
    }
  -@@ -789,6 +873,8 @@
  +@@ -790,6 +874,8 @@
        TRACE("rmdir id %u name %s", id, name);
        ret = rmdir(name);
        status = (ret == -1) ? errno_to_portable(errno) : SSH2_FX_OK;
  @@ -522,7 +522,7 @@
        send_status(id, status);
        xfree(name);
    }
  -@@ -815,6 +901,8 @@
  +@@ -816,6 +902,8 @@
                s.name = s.long_name = resolvedname;
                send_names(id, 1, &s);
        }
  @@ -531,7 +531,7 @@
        xfree(path);
    }
    
  -@@ -870,6 +958,8 @@
  +@@ -871,6 +959,8 @@
                        status = SSH2_FX_OK;
        }
        send_status(id, status);
  @@ -540,7 +540,7 @@
        xfree(oldpath);
        xfree(newpath);
    }
  -@@ -895,6 +985,8 @@
  +@@ -896,6 +986,8 @@
                s.name = s.long_name = buf;
                send_names(id, 1, &s);
        }
  @@ -549,7 +549,7 @@
        xfree(path);
    }
    
  -@@ -913,6 +1005,8 @@
  +@@ -914,6 +1006,8 @@
        ret = symlink(oldpath, newpath);
        status = (ret == -1) ? errno_to_portable(errno) : SSH2_FX_OK;
        send_status(id, status);
  @@ -558,7 +558,7 @@
        xfree(oldpath);
        xfree(newpath);
    }
  -@@ -1034,6 +1128,8 @@
  +@@ -1035,6 +1129,8 @@
    {
        fd_set *rset, *wset;
        int in, out, max;
  @@ -566,8 +566,8 @@
   +    char *umask_env;
        ssize_t len, olen, set_size;
    
  -     /* XXX should use getopt */
  -@@ -1041,6 +1137,16 @@
  +     /* Ensure that fds 0, 1 and 2 are open or directed to /dev/null */
  +@@ -1045,6 +1141,16 @@
        __progname = ssh_get_progname(av[0]);
        handle_init();
    
  @@ -584,7 +584,7 @@
    #ifdef DEBUG_SFTP_SERVER
        log_init("sftp-server", SYSLOG_LEVEL_DEBUG1, SYSLOG_FACILITY_AUTH, 0);
    #endif
  -@@ -1048,6 +1154,39 @@
  +@@ -1052,6 +1158,39 @@
        in = dup(STDIN_FILENO);
        out = dup(STDOUT_FILENO);
    
  @@ -624,7 +624,7 @@
    #ifdef HAVE_CYGWIN
        setmode(in, O_BINARY);
        setmode(out, O_BINARY);
  -@@ -1087,6 +1226,8 @@
  +@@ -1091,6 +1230,8 @@
                        len = read(in, buf, sizeof buf);
                        if (len == 0) {
                                debug("read eof");
  @@ -634,8 +634,8 @@
                        } else if (len < 0) {
                                error("read error");
   Index: sshd_config.5
  ---- sshd_config.5.orig       2005-07-26 13:54:57 +0200
  -+++ sshd_config.5    2005-09-01 20:09:17 +0200
  +--- sshd_config.5.orig       2006-01-03 08:47:31 +0100
  ++++ sshd_config.5    2006-02-01 19:44:14 +0100
   @@ -426,6 +426,10 @@
    DEBUG and DEBUG1 are equivalent.
    DEBUG2 and DEBUG3 each specify higher levels of debugging output.
  @@ -647,7 +647,7 @@
    .It Cm MACs
    Specifies the available MAC (message authentication code) algorithms.
    The MAC algorithm is used in protocol version 2
  -@@ -585,6 +589,37 @@
  +@@ -597,6 +601,37 @@
    .It Cm ServerKeyBits
    Defines the number of bits in the ephemeral protocol version 1 server key.
    The minimum value is 512, and the default is 768.
  @@ -686,9 +686,9 @@
    Specifies whether
    .Nm sshd
   Index: sshd_config
  ---- sshd_config.orig 2005-07-26 13:54:57 +0200
  -+++ sshd_config      2005-09-01 20:09:17 +0200
  -@@ -102,3 +102,14 @@
  +--- sshd_config.orig 2005-12-13 09:29:03 +0100
  ++++ sshd_config      2006-02-01 19:44:14 +0100
  +@@ -103,3 +103,14 @@
    
    # override default of no subsystems
    Subsystem   sftp    /usr/libexec/sftp-server
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-src/openssh/openssh.spec
  ============================================================================
  $ cvs diff -u -r1.155 -r1.156 openssh.spec
  --- openpkg-src/openssh/openssh.spec  1 Jan 2006 13:18:09 -0000       1.155
  +++ openpkg-src/openssh/openssh.spec  1 Feb 2006 18:49:18 -0000       1.156
  @@ -22,8 +22,10 @@
   ##  SUCH DAMAGE.
   ##
   
  +#   FIXME: rse: with_ldap broken after upgrade to OpenSSH 4.3p1
  +
   #   package versions
  -%define       V_base        4.2
  +%define       V_base        4.3
   %define       V_portable    p1
   %define       V_watchdog    4.0p1
   %define       V_ldap_base   4.1p1
  @@ -41,7 +43,7 @@
   Group:        Security
   License:      BSD
   Version:      %{V_base}%{V_portable}
  -Release:      20051226
  +Release:      20060201
   
   #   package options
   %option       with_fsl          yes
  @@ .
______________________________________________________________________
The OpenPKG Project                                    www.openpkg.org
CVS Repository Commit List                     [email protected]

Reply via email to