OpenPKG CVS Repository
  http://cvs.openpkg.org/
  ____________________________________________________________________________

  Server: cvs.openpkg.org                  Name:   Ralf S. Engelschall
  Root:   /v/openpkg/cvs                   Email:  r...@openpkg.org
  Module: openpkg-src                      Date:   25-Feb-2009 12:30:08
  Branch: HEAD                             Handle: 2009022511300700

  Modified files:
    openpkg-src/openssh     openssh.patch openssh.patch.alias
                            openssh.patch.chroot openssh.patch.lpk
                            openssh.patch.scpbindir openssh.patch.sftplogging
                            openssh.patch.watchdog openssh.spec

  Log:
    upgrading package: openssh 5.1p1 -> 5.2p1

  Summary:
    Revision    Changes     Path
    1.24        +6  -6      openpkg-src/openssh/openssh.patch
    1.14        +18 -18     openpkg-src/openssh/openssh.patch.alias
    1.15        +6  -6      openpkg-src/openssh/openssh.patch.chroot
    1.2         +56 -59     openpkg-src/openssh/openssh.patch.lpk
    1.17        +7  -7      openpkg-src/openssh/openssh.patch.scpbindir
    1.16        +32 -26     openpkg-src/openssh/openssh.patch.sftplogging
    1.3         +31 -31     openpkg-src/openssh/openssh.patch.watchdog
    1.219       +2  -2      openpkg-src/openssh/openssh.spec
  ____________________________________________________________________________

  patch -p0 <<'@@ .'
  Index: openpkg-src/openssh/openssh.patch
  ============================================================================
  $ cvs diff -u -r1.23 -r1.24 openssh.patch
  --- openpkg-src/openssh/openssh.patch 22 Jul 2008 06:40:10 -0000      1.23
  +++ openpkg-src/openssh/openssh.patch 25 Feb 2009 11:30:07 -0000      1.24
  @@ -1,6 +1,6 @@
   Index: Makefile.in
  ---- Makefile.in.orig 2008-07-08 16:21:12 +0200
  -+++ Makefile.in      2008-07-22 08:30:25 +0200
  +--- Makefile.in.orig 2008-11-05 06:20:46 +0100
  ++++ Makefile.in      2009-02-25 11:19:48 +0100
   @@ -232,7 +232,7 @@
        -rm -rf autom4te.cache
        (cd scard && $(MAKE) -f Makefile.in distprep)
  @@ -12,7 +12,7 @@
    
   Index: auth-pam.h
   --- auth-pam.h.orig  2004-09-11 14:17:26 +0200
  -+++ auth-pam.h       2008-07-22 08:30:25 +0200
  ++++ auth-pam.h       2009-02-25 11:19:48 +0100
   @@ -28,7 +28,7 @@
    #ifdef USE_PAM
    
  @@ -23,10 +23,10 @@
    
    void start_pam(Authctxt *);
   Index: version.h
  ---- version.h.orig   2008-07-21 10:21:06 +0200
  -+++ version.h        2008-07-22 08:30:25 +0200
  +--- version.h.orig   2009-02-23 01:09:26 +0100
  ++++ version.h        2009-02-25 11:19:48 +0100
   @@ -3,4 +3,4 @@
  - #define SSH_VERSION "OpenSSH_5.1"
  + #define SSH_VERSION "OpenSSH_5.2"
    
    #define SSH_PORTABLE        "p1"
   -#define SSH_RELEASE SSH_VERSION SSH_PORTABLE
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-src/openssh/openssh.patch.alias
  ============================================================================
  $ cvs diff -u -r1.13 -r1.14 openssh.patch.alias
  --- openpkg-src/openssh/openssh.patch.alias   22 Jul 2008 06:40:10 -0000      
1.13
  +++ openpkg-src/openssh/openssh.patch.alias   25 Feb 2009 11:30:07 -0000      
1.14
  @@ -1,6 +1,6 @@
   Index: auth1.c
   --- auth1.c.orig     2008-07-09 12:54:05 +0200
  -+++ auth1.c  2008-07-22 08:31:42 +0200
  ++++ auth1.c  2009-02-25 11:20:14 +0100
   @@ -40,6 +40,9 @@
    #endif
    #include "monitor_wrap.h"
  @@ -49,8 +49,8 @@
        authctxt->style = style;
    
   Index: auth2.c
  ---- auth2.c.orig     2008-07-05 01:44:53 +0200
  -+++ auth2.c  2008-07-22 08:31:42 +0200
  +--- auth2.c.orig     2008-11-05 06:20:46 +0100
  ++++ auth2.c  2009-02-25 11:20:14 +0100
   @@ -49,6 +49,9 @@
    #include "dispatch.h"
    #include "pathnames.h"
  @@ -61,7 +61,7 @@
    
    #ifdef GSSAPI
    #include "ssh-gss.h"
  -@@ -211,6 +214,10 @@
  +@@ -217,6 +220,10 @@
        Authmethod *m = NULL;
        char *user, *service, *method, *style = NULL;
        int authenticated = 0;
  @@ -72,7 +72,7 @@
    
        if (authctxt == NULL)
                fatal("input_userauth_request: no authctxt");
  -@@ -224,6 +231,25 @@
  +@@ -230,6 +237,25 @@
        if ((style = strchr(user, ':')) != NULL)
                *style++ = 0;
    
  @@ -99,29 +99,29 @@
                /* setup auth context */
                authctxt->pw = PRIVSEP(getpwnamallow(user));
   Index: servconf.c
  ---- servconf.c.orig  2008-07-04 05:51:12 +0200
  -+++ servconf.c       2008-07-22 08:32:07 +0200
  -@@ -127,6 +127,9 @@
  -     options->num_permitted_opens = -1;
  +--- servconf.c.orig  2009-01-28 06:31:23 +0100
  ++++ servconf.c       2009-02-25 12:21:31 +0100
  +@@ -128,6 +128,9 @@
        options->adm_forced_command = NULL;
        options->chroot_directory = NULL;
  +     options->zero_knowledge_password_authentication = -1;
   +#ifdef USE_ALIAS
   +    options->num_alias = 0;
   +#endif
    }
    
    void
  -@@ -302,6 +305,9 @@
  -     sGssAuthentication, sGssCleanupCreds, sAcceptEnv, sPermitTunnel,
  +@@ -306,6 +309,9 @@
        sMatch, sPermitOpen, sForceCommand, sChrootDirectory,
        sUsePrivilegeSeparation, sAllowAgentForwarding,
  +     sZeroKnowledgePasswordAuthentication,
   +#ifdef USE_ALIAS
   +    sAlias,
   +#endif
        sDeprecated, sUnsupported
    } ServerOpCodes;
    
  -@@ -415,6 +421,9 @@
  +@@ -424,6 +430,9 @@
        { "permitopen", sPermitOpen, SSHCFG_ALL },
        { "forcecommand", sForceCommand, SSHCFG_ALL },
        { "chrootdirectory", sChrootDirectory, SSHCFG_ALL },
  @@ -131,7 +131,7 @@
        { NULL, sBadOption, 0 }
    };
    
  -@@ -1288,6 +1297,26 @@
  +@@ -1301,6 +1310,26 @@
                    arg = strdelim(&cp);
                break;
    
  @@ -159,9 +159,9 @@
                logit("%s line %d: Unsupported option %s",
                    filename, linenum, arg);
   Index: servconf.h
  ---- servconf.h.orig  2008-06-10 15:01:51 +0200
  -+++ servconf.h       2008-07-22 08:31:42 +0200
  -@@ -149,6 +149,14 @@
  +--- servconf.h.orig  2009-01-28 06:31:23 +0100
  ++++ servconf.h       2009-02-25 11:20:14 +0100
  +@@ -151,6 +151,14 @@
        int     num_permitted_opens;
    
        char   *chroot_directory;
  @@ -177,8 +177,8 @@
    
    void         initialize_server_options(ServerOptions *);
   Index: sshd_config.5
  ---- sshd_config.5.orig       2008-07-02 14:35:43 +0200
  -+++ sshd_config.5    2008-07-22 08:32:30 +0200
  +--- sshd_config.5.orig       2009-02-23 01:00:24 +0100
  ++++ sshd_config.5    2009-02-25 11:20:14 +0100
   @@ -104,6 +104,15 @@
    Note that disabling agent forwarding does not improve security
    unless users are also denied shell access, as they can always install
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-src/openssh/openssh.patch.chroot
  ============================================================================
  $ cvs diff -u -r1.14 -r1.15 openssh.patch.chroot
  --- openpkg-src/openssh/openssh.patch.chroot  22 Jul 2008 06:40:11 -0000      
1.14
  +++ openpkg-src/openssh/openssh.patch.chroot  25 Feb 2009 11:30:07 -0000      
1.15
  @@ -1,6 +1,6 @@
   Index: scp.c
  ---- scp.c.orig       2008-07-04 15:10:49 +0200
  -+++ scp.c    2008-07-22 08:33:00 +0200
  +--- scp.c.orig       2008-11-03 09:23:45 +0100
  ++++ scp.c    2009-02-25 12:22:04 +0100
   @@ -140,6 +140,11 @@
    /* This is the program to execute for the secured connection. ("ssh" or -S) 
*/
    char *ssh_program = _PATH_SSH_PROGRAM;
  @@ -58,9 +58,9 @@
                /* Follow "protocol", send data. */
                (void) response();
   Index: session.c
  ---- session.c.orig   2008-06-16 15:29:18 +0200
  -+++ session.c        2008-07-22 08:33:00 +0200
  -@@ -1533,6 +1533,25 @@
  +--- session.c.orig   2009-01-28 06:29:49 +0100
  ++++ session.c        2009-02-25 12:22:04 +0100
  +@@ -1539,6 +1539,25 @@
                        free(tmp);
                        free(chroot_path);
                }
  @@ -88,7 +88,7 @@
                if (setusercontext(lc, pw, pw->pw_uid, LOGIN_SETUSER) < 0) {
   Index: sftp-server.c
   --- sftp-server.c.orig       2008-07-04 06:10:19 +0200
  -+++ sftp-server.c    2008-07-22 08:33:00 +0200
  ++++ sftp-server.c    2009-02-25 12:22:04 +0100
   @@ -1387,6 +1387,38 @@
        logit("session opened for local user %s from [%s]",
            pw->pw_name, client_addr);
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-src/openssh/openssh.patch.lpk
  ============================================================================
  $ cvs diff -u -r1.1 -r1.2 openssh.patch.lpk
  --- openpkg-src/openssh/openssh.patch.lpk     15 Nov 2008 09:14:28 -0000      
1.1
  +++ openpkg-src/openssh/openssh.patch.lpk     25 Feb 2009 11:30:07 -0000      
1.2
  @@ -1,10 +1,6 @@
  -OpenSSH LPK Patch
  -Forward ported from the upstream vendor patch
  -http://dev.inversepath.com/openssh-lpk/openssh-lpk-4.6p1-0.3.9.patch
  -
   Index: Makefile.in
  ---- Makefile.in.orig 2008-07-08 16:21:12 +0200
  -+++ Makefile.in      2008-11-15 10:10:10 +0100
  +--- Makefile.in.orig 2008-11-05 06:20:46 +0100
  ++++ Makefile.in      2009-02-25 12:22:32 +0100
   @@ -86,7 +86,7 @@
        auth-krb5.o \
        auth2-gss.o gss-serv.o gss-serv-krb5.o \
  @@ -15,8 +11,8 @@
    MANPAGES    = moduli.5.out scp.1.out ssh-add.1.out ssh-agent.1.out 
ssh-keygen.1.out ssh-keyscan.1.out ssh.1.out sshd.8.out sftp-server.8.out 
sftp.1.out ssh-rand-helper.8.out ssh-keysign.8.out sshd_config.5.out 
ssh_config.5.out
    MANPAGES_IN = moduli.5 scp.1 ssh-add.1 ssh-agent.1 ssh-keygen.1 
ssh-keyscan.1 ssh.1 sshd.8 sftp-server.8 sftp.1 ssh-rand-helper.8 ssh-keysign.8 
sshd_config.5 ssh_config.5
   Index: README.lpk
  ---- /dev/null        2008-11-15 10:10:30 +0100
  -+++ README.lpk       2008-11-15 10:10:10 +0100
  +--- /dev/null        2009-02-25 12:22:00 +0100
  ++++ README.lpk       2009-02-25 12:22:32 +0100
   @@ -0,0 +1,267 @@
   +OpenSSH LDAP PUBLIC KEY PATCH 
   +Copyright (c) 2003 Eric AUGE (e...@phear.org)
  @@ -287,7 +283,7 @@
   +  - Andrea Barisani <and...@inversepath.com>
   Index: auth-rsa.c
   --- auth-rsa.c.orig  2008-07-02 14:37:30 +0200
  -+++ auth-rsa.c       2008-11-15 10:10:10 +0100
  ++++ auth-rsa.c       2009-02-25 12:22:32 +0100
   @@ -174,10 +174,96 @@
        FILE *f;
        u_long linenum = 0;
  @@ -387,7 +383,7 @@
        debug("trying public RSA key file %s", file);
   Index: auth2-pubkey.c
   --- auth2-pubkey.c.orig      2008-07-04 04:54:25 +0200
  -+++ auth2-pubkey.c   2008-11-15 10:10:10 +0100
  ++++ auth2-pubkey.c   2009-02-25 12:22:32 +0100
   @@ -55,6 +55,10 @@
    #include "monitor_wrap.h"
    #include "misc.h"
  @@ -480,9 +476,9 @@
        f = auth_openkeyfile(file, pw, options.strict_modes);
    
   Index: config.h.in
  ---- config.h.in.orig 2008-07-21 10:30:49 +0200
  -+++ config.h.in      2008-11-15 10:10:10 +0100
  -@@ -560,6 +560,9 @@
  +--- config.h.in.orig 2009-02-23 01:18:12 +0100
  ++++ config.h.in      2009-02-25 12:22:32 +0100
  +@@ -563,6 +563,9 @@
    /* Define to 1 if you have the <linux/if_tun.h> header file. */
    #undef HAVE_LINUX_IF_TUN_H
    
  @@ -493,9 +489,9 @@
    #undef HAVE_LOGIN
    
   Index: configure.ac
  ---- configure.ac.orig        2008-07-09 13:07:19 +0200
  -+++ configure.ac     2008-11-15 10:10:10 +0100
  -@@ -1299,6 +1299,37 @@
  +--- configure.ac.orig        2009-02-16 05:37:03 +0100
  ++++ configure.ac     2009-02-25 12:22:32 +0100
  +@@ -1314,6 +1314,37 @@
        esac ]
    )
    
  @@ -533,7 +529,7 @@
    dnl    Checks for library functions. Please keep in alphabetical order
    AC_CHECK_FUNCS( \
        arc4random \
  -@@ -4137,6 +4168,7 @@
  +@@ -4163,6 +4194,7 @@
    echo "                 Smartcard support: $SCARD_MSG"
    echo "                     S/KEY support: $SKEY_MSG"
    echo "              TCP Wrappers support: $TCPW_MSG"
  @@ -542,8 +538,8 @@
    echo "                   libedit support: $LIBEDIT_MSG"
    echo "  Solaris process contract support: $SPC_MSG"
   Index: configure
  ---- configure.orig   2008-07-21 10:30:50 +0200
  -+++ configure        2008-11-15 10:10:10 +0100
  +--- configure.orig   2009-02-23 01:18:14 +0100
  ++++ configure        2009-02-25 12:22:32 +0100
   @@ -1340,6 +1340,7 @@
      --with-tcp-wrappers[=PATH] Enable tcpwrappers support (optionally in PATH)
      --with-libedit[=PATH]   Enable libedit support for sftp
  @@ -552,7 +548,7 @@
      --with-ssl-dir=PATH     Specify path to OpenSSL installation
      --without-openssl-header-check Disable OpenSSL version consistency check
      --with-ssl-engine       Enable OpenSSL (hardware) ENGINE support
  -@@ -12568,6 +12569,85 @@
  +@@ -12767,6 +12768,85 @@
    fi
    
    
  @@ -638,7 +634,7 @@
    
    
    
  -@@ -30135,6 +30215,7 @@
  +@@ -30543,6 +30623,7 @@
    echo "                 Smartcard support: $SCARD_MSG"
    echo "                     S/KEY support: $SKEY_MSG"
    echo "              TCP Wrappers support: $TCPW_MSG"
  @@ -647,11 +643,11 @@
    echo "                   libedit support: $LIBEDIT_MSG"
    echo "  Solaris process contract support: $SPC_MSG"
   Index: ldapauth.c
  ---- /dev/null        2008-11-15 10:10:30 +0100
  -+++ ldapauth.c       2008-11-15 10:10:30 +0100
  +--- /dev/null        2009-02-25 12:22:00 +0100
  ++++ ldapauth.c       2009-02-25 12:22:32 +0100
   @@ -0,0 +1,576 @@
   +/* 
  -+ * $Id: openssh.patch.lpk,v 1.1 2008/11/15 09:14:28 rse Exp $
  ++ * $Id: openssh.patch.lpk,v 1.2 2009/02/25 11:30:07 rse Exp $
   + */
   +
   +/*
  @@ -1227,11 +1223,11 @@
   +
   +#endif /* WITH_LDAP_PUBKEY */
   Index: ldapauth.h
  ---- /dev/null        2008-11-15 10:10:30 +0100
  -+++ ldapauth.h       2008-11-15 10:10:10 +0100
  +--- /dev/null        2009-02-25 12:22:00 +0100
  ++++ ldapauth.h       2009-02-25 12:22:32 +0100
   @@ -0,0 +1,124 @@
   +/*
  -+ * $Id: openssh.patch.lpk,v 1.1 2008/11/15 09:14:28 rse Exp $ 
  ++ * $Id: openssh.patch.lpk,v 1.2 2009/02/25 11:30:07 rse Exp $ 
   + */
   +
   +/*
  @@ -1355,8 +1351,8 @@
   +
   +#endif
   Index: lpk-user-example.txt
  ---- /dev/null        2008-11-15 10:10:30 +0100
  -+++ lpk-user-example.txt     2008-11-15 10:10:10 +0100
  +--- /dev/null        2009-02-25 12:22:00 +0100
  ++++ lpk-user-example.txt     2009-02-25 12:22:32 +0100
   @@ -0,0 +1,117 @@
   +
   +Post to ML -> User Made Quick Install Doc.
  @@ -1476,8 +1472,8 @@
   +
   +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
   Index: openssh-lpk_openldap.schema
  ---- /dev/null        2008-11-15 10:10:30 +0100
  -+++ openssh-lpk_openldap.schema      2008-11-15 10:10:10 +0100
  +--- /dev/null        2009-02-25 12:22:00 +0100
  ++++ openssh-lpk_openldap.schema      2009-02-25 12:22:32 +0100
   @@ -0,0 +1,19 @@
   +#
   +# LDAP Public Key Patch schema for use with openssh-ldappubkey
  @@ -1499,8 +1495,8 @@
   +    MUST ( sshPublicKey $ uid ) 
   +    )
   Index: openssh-lpk_sun.schema
  ---- /dev/null        2008-11-15 10:10:30 +0100
  -+++ openssh-lpk_sun.schema   2008-11-15 10:10:10 +0100
  +--- /dev/null        2009-02-25 12:22:00 +0100
  ++++ openssh-lpk_sun.schema   2009-02-25 12:22:32 +0100
   @@ -0,0 +1,21 @@
   +#
   +# LDAP Public Key Patch schema for use with openssh-ldappubkey
  @@ -1524,8 +1520,8 @@
   +    MUST ( sshPublicKey $ uid ) 
   +    )
   Index: servconf.c
  ---- servconf.c.orig  2008-07-04 05:51:12 +0200
  -+++ servconf.c       2008-11-15 10:10:10 +0100
  +--- servconf.c.orig  2009-01-28 06:31:23 +0100
  ++++ servconf.c       2009-02-25 12:24:13 +0100
   @@ -42,6 +42,10 @@
    #include "channels.h"
    #include "groupaccess.h"
  @@ -1534,13 +1530,13 @@
   +#include "ldapauth.h"
   +#endif
   +
  - static void add_listen_addr(ServerOptions *, char *, u_short);
  - static void add_one_listen_addr(ServerOptions *, char *, u_short);
  + static void add_listen_addr(ServerOptions *, char *, int);
  + static void add_one_listen_addr(ServerOptions *, char *, int);
    
  -@@ -127,6 +131,24 @@
  -     options->num_permitted_opens = -1;
  +@@ -128,6 +132,24 @@
        options->adm_forced_command = NULL;
        options->chroot_directory = NULL;
  +     options->zero_knowledge_password_authentication = -1;
   +#ifdef WITH_LDAP_PUBKEY
   +    /* XXX dirty */
   +    options->lpk.ld = NULL;
  @@ -1562,10 +1558,10 @@
    }
    
    void
  -@@ -258,6 +280,32 @@
  -             options->authorized_keys_file = _PATH_SSH_USER_PERMITTED_KEYS;
  -     if (options->permit_tun == -1)
  -             options->permit_tun = SSH_TUNMODE_NO;
  +@@ -262,6 +284,33 @@
  +     if (options->zero_knowledge_password_authentication == -1)
  +             options->zero_knowledge_password_authentication = 0;
  + 
   +#ifdef WITH_LDAP_PUBKEY
   +    if (options->lpk.on == -1)
   +        options->lpk.on = _DEFAULT_LPK_ON;
  @@ -1592,12 +1588,13 @@
   +    if (options->lpk.l_conf == NULL)
   +        options->lpk.l_conf = _DEFAULT_LPK_LDP;
   +#endif
  - 
  ++
        /* Turn privilege separation on by default */
        if (use_privsep == -1)
  -@@ -303,6 +351,12 @@
  -     sMatch, sPermitOpen, sForceCommand, sChrootDirectory,
  +             use_privsep = 1;
  +@@ -307,6 +356,12 @@
        sUsePrivilegeSeparation, sAllowAgentForwarding,
  +     sZeroKnowledgePasswordAuthentication,
        sDeprecated, sUnsupported
   +#ifdef WITH_LDAP_PUBKEY
   +    ,sLdapPublickey, sLdapServers, sLdapUserDN
  @@ -1608,7 +1605,7 @@
    } ServerOpCodes;
    
    #define SSHCFG_GLOBAL       0x01    /* allowed in main section of 
sshd_config */
  -@@ -408,6 +462,20 @@
  +@@ -417,6 +472,20 @@
        { "clientalivecountmax", sClientAliveCountMax, SSHCFG_GLOBAL },
        { "authorizedkeysfile", sAuthorizedKeysFile, SSHCFG_GLOBAL },
        { "authorizedkeysfile2", sAuthorizedKeysFile2, SSHCFG_GLOBAL },
  @@ -1629,7 +1626,7 @@
        { "useprivilegeseparation", sUsePrivilegeSeparation, SSHCFG_GLOBAL },
        { "acceptenv", sAcceptEnv, SSHCFG_GLOBAL },
        { "permittunnel", sPermitTunnel, SSHCFG_GLOBAL },
  -@@ -1294,6 +1362,107 @@
  +@@ -1307,6 +1376,107 @@
                while (arg)
                    arg = strdelim(&cp);
                break;
  @@ -1738,8 +1735,8 @@
        default:
                fatal("%s line %d: Missing handler for opcode %s (%d)",
   Index: servconf.h
  ---- servconf.h.orig  2008-06-10 15:01:51 +0200
  -+++ servconf.h       2008-11-15 10:10:10 +0100
  +--- servconf.h.orig  2009-01-28 06:31:23 +0100
  ++++ servconf.h       2009-02-25 12:22:32 +0100
   @@ -16,6 +16,10 @@
    #ifndef SERVCONF_H
    #define SERVCONF_H
  @@ -1751,7 +1748,7 @@
    #define MAX_PORTS           256     /* Max # ports. */
    
    #define MAX_ALLOW_USERS             256     /* Max # users on allow list. */
  -@@ -145,6 +149,9 @@
  +@@ -147,6 +151,9 @@
        int     use_pam;                /* Enable auth via PAM */
    
        int     permit_tun;
  @@ -1762,9 +1759,9 @@
        int     num_permitted_opens;
    
   Index: sshd.c
  ---- sshd.c.orig      2008-07-11 09:36:49 +0200
  -+++ sshd.c   2008-11-15 10:10:10 +0100
  -@@ -127,6 +127,10 @@
  +--- sshd.c.orig      2009-01-28 06:31:23 +0100
  ++++ sshd.c   2009-02-25 12:22:32 +0100
  +@@ -126,6 +126,10 @@
    int deny_severity;
    #endif /* LIBWRAP */
    
  @@ -1775,7 +1772,7 @@
    #ifndef O_NOCTTY
    #define O_NOCTTY    0
    #endif
  -@@ -1484,6 +1488,16 @@
  +@@ -1483,6 +1487,16 @@
                exit(1);
        }
    
  @@ -1793,9 +1790,9 @@
    
        /* Store privilege separation user for later use if required. */
   Index: sshd_config.5
  ---- sshd_config.5.orig       2008-07-02 14:35:43 +0200
  -+++ sshd_config.5    2008-11-15 10:10:10 +0100
  -@@ -1003,6 +1003,62 @@
  +--- sshd_config.5.orig       2009-02-23 01:00:24 +0100
  ++++ sshd_config.5    2009-02-25 12:22:32 +0100
  +@@ -1005,6 +1005,62 @@
    program.
    The default is
    .Pa /usr/X11R6/bin/xauth .
  @@ -1860,7 +1857,7 @@
    .Xr sshd 8
   Index: sshd_config
   --- sshd_config.orig 2008-07-02 14:35:43 +0200
  -+++ sshd_config      2008-11-15 10:10:10 +0100
  ++++ sshd_config      2009-02-25 12:22:32 +0100
   @@ -109,6 +109,19 @@
    # no default banner path
    #Banner none
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-src/openssh/openssh.patch.scpbindir
  ============================================================================
  $ cvs diff -u -r1.16 -r1.17 openssh.patch.scpbindir
  --- openpkg-src/openssh/openssh.patch.scpbindir       22 Jul 2008 06:40:11 
-0000      1.16
  +++ openpkg-src/openssh/openssh.patch.scpbindir       25 Feb 2009 11:30:07 
-0000      1.17
  @@ -1,9 +1,9 @@
   Index: session.c
  ---- session.c.orig   2008-06-16 15:29:18 +0200
  -+++ session.c        2008-07-22 08:31:23 +0200
  -@@ -95,6 +95,10 @@
  - #include <kafs.h>
  - #endif
  +--- session.c.orig   2009-01-28 06:29:49 +0100
  ++++ session.c        2009-02-25 12:24:37 +0100
  +@@ -101,6 +101,10 @@
  +       c[sizeof(INTERNAL_SFTP_NAME) - 1] == ' ' || \
  +       c[sizeof(INTERNAL_SFTP_NAME) - 1] == '\t'))
    
   +#ifndef SCPBINDIR
   +#define SCPBINDIR "@l_prefix@/bin"
  @@ -12,7 +12,7 @@
    /* func */
    
    Session *session_new(void);
  -@@ -777,6 +781,20 @@
  +@@ -783,6 +787,20 @@
    do_exec(Session *s, const char *command)
    {
        int ret;
  @@ -33,7 +33,7 @@
    
        if (options.adm_forced_command) {
                original_command = command;
  -@@ -813,6 +831,8 @@
  +@@ -819,6 +837,8 @@
                ret = do_exec_no_pty(s, command);
    
        original_command = NULL;
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-src/openssh/openssh.patch.sftplogging
  ============================================================================
  $ cvs diff -u -r1.15 -r1.16 openssh.patch.sftplogging
  --- openpkg-src/openssh/openssh.patch.sftplogging     15 Nov 2008 08:40:42 
-0000      1.15
  +++ openpkg-src/openssh/openssh.patch.sftplogging     25 Feb 2009 11:30:07 
-0000      1.16
  @@ -1,10 +1,10 @@
   Index: servconf.c
  ---- servconf.c.orig  2008-07-04 05:51:12 +0200
  -+++ servconf.c       2008-07-22 08:33:33 +0200
  -@@ -127,6 +127,12 @@
  -     options->num_permitted_opens = -1;
  +--- servconf.c.orig  2009-01-28 06:31:23 +0100
  ++++ servconf.c       2009-02-25 12:25:26 +0100
  +@@ -128,6 +128,12 @@
        options->adm_forced_command = NULL;
        options->chroot_directory = NULL;
  +     options->zero_knowledge_password_authentication = -1;
   +    options->log_sftp = LOG_SFTP_NOT_SET;
   +    options->sftp_log_facility = SYSLOG_FACILITY_NOT_SET;
   +    options->sftp_log_level = SYSLOG_LEVEL_NOT_SET;
  @@ -14,9 +14,9 @@
    }
    
    void
  -@@ -259,6 +265,24 @@
  -     if (options->permit_tun == -1)
  -             options->permit_tun = SSH_TUNMODE_NO;
  +@@ -262,6 +268,24 @@
  +     if (options->zero_knowledge_password_authentication == -1)
  +             options->zero_knowledge_password_authentication = 0;
    
   +    /* Turn sftp-server logging off by default */
   +    if (options->log_sftp == LOG_SFTP_NOT_SET)
  @@ -39,17 +39,17 @@
        /* Turn privilege separation on by default */
        if (use_privsep == -1)
                use_privsep = 1;
  -@@ -302,6 +326,9 @@
  -     sGssAuthentication, sGssCleanupCreds, sAcceptEnv, sPermitTunnel,
  +@@ -306,6 +330,9 @@
        sMatch, sPermitOpen, sForceCommand, sChrootDirectory,
        sUsePrivilegeSeparation, sAllowAgentForwarding,
  +     sZeroKnowledgePasswordAuthentication,
   +    sLogSftp, sSftpLogFacility, sSftpLogLevel,
   +    sSftpUmask,
   +    sSftpPermitChown, sSftpPermitChmod,
        sDeprecated, sUnsupported
    } ServerOpCodes;
    
  -@@ -316,6 +343,12 @@
  +@@ -320,6 +347,12 @@
        u_int flags;
    } keywords[] = {
        /* Portable-specific options */
  @@ -62,8 +62,8 @@
    #ifdef USE_PAM
        { "usepam", sUsePAM, SSHCFG_GLOBAL },
    #else
  -@@ -636,6 +669,8 @@
  -     u_short port;
  +@@ -645,6 +678,8 @@
  +     int port;
        u_int i, flags = 0;
        size_t len;
   +    unsigned int umaskvalue = 0;
  @@ -71,7 +71,7 @@
    
        cp = line;
        if ((arg = strdelim(&cp)) == NULL)
  -@@ -1165,6 +1200,58 @@
  +@@ -1178,6 +1213,58 @@
                charptr = &options->banner;
                goto parse_filename;
    
  @@ -130,8 +130,9 @@
        /*
         * These options can contain %X options expanded at
         * connect time, so that you can specify paths like:
  ---- servconf.h.orig  2008-06-10 15:01:51 +0200
  -+++ servconf.h       2008-07-22 08:33:13 +0200
  +Index: servconf.h
  +--- servconf.h.orig  2009-01-28 06:31:23 +0100
  ++++ servconf.h       2009-02-25 12:25:01 +0100
   @@ -34,6 +34,19 @@
    #define     PERMIT_NO_PASSWD        2
    #define     PERMIT_YES              3
  @@ -152,7 +153,7 @@
    #define DEFAULT_AUTH_FAIL_MAX       6       /* Default for MaxAuthTries */
    #define DEFAULT_SESSIONS_MAX        10      /* Default for MaxSessions */
    
  -@@ -149,6 +162,12 @@
  +@@ -151,6 +164,12 @@
        int     num_permitted_opens;
    
        char   *chroot_directory;
  @@ -165,9 +166,10 @@
    }       ServerOptions;
    
    void         initialize_server_options(ServerOptions *);
  ---- session.c.orig   2008-06-16 15:29:18 +0200
  -+++ session.c        2008-07-22 08:33:13 +0200
  -@@ -146,6 +146,15 @@
  +Index: session.c
  +--- session.c.orig   2009-01-28 06:29:49 +0100
  ++++ session.c        2009-02-25 12:25:01 +0100
  +@@ -152,6 +152,15 @@
    
    static int is_child = 0;
    
  @@ -183,7 +185,7 @@
    /* Name and directory of socket for authentication agent forwarding. */
    static char *auth_sock_name = NULL;
    static char *auth_sock_dir = NULL;
  -@@ -1279,6 +1289,67 @@
  +@@ -1285,6 +1294,67 @@
                child_set_env(&env, &envsize, SSH_AUTHSOCKET_ENV_NAME,
                    auth_sock_name);
    
  @@ -251,8 +253,9 @@
        /* read $HOME/.ssh/environment. */
        if (options.permit_user_env && !options.use_login) {
                snprintf(buf, sizeof buf, "%.200s/.ssh/environment",
  +Index: sftp-server.8
   --- sftp-server.8.orig       2008-07-21 10:20:40 +0200
  -+++ sftp-server.8    2008-07-22 08:33:14 +0200
  ++++ sftp-server.8    2009-02-25 12:25:01 +0100
   @@ -49,6 +49,20 @@
    .Cm Subsystem
    declaration.
  @@ -274,8 +277,9 @@
    .Xr sshd_config 5
    for more information.
    .Pp
  +Index: sftp-server.c
   --- sftp-server.c.orig       2008-07-04 06:10:19 +0200
  -+++ sftp-server.c    2008-07-22 08:35:27 +0200
  ++++ sftp-server.c    2009-02-25 12:25:01 +0100
   @@ -59,6 +59,12 @@
    /* Our verbosity */
    LogLevel log_level = SYSLOG_LEVEL_ERROR;
  @@ -564,8 +568,9 @@
    #ifdef HAVE_CYGWIN
        setmode(in, O_BINARY);
        setmode(out, O_BINARY);
  ---- sshd_config.5.orig       2008-07-02 14:35:43 +0200
  -+++ sshd_config.5    2008-07-22 08:35:50 +0200
  +Index: sshd_config.5
  +--- sshd_config.5.orig       2009-02-23 01:00:24 +0100
  ++++ sshd_config.5    2009-02-25 12:25:01 +0100
   @@ -539,6 +539,10 @@
    DEBUG and DEBUG1 are equivalent.
    DEBUG2 and DEBUG3 each specify higher levels of debugging output.
  @@ -577,7 +582,7 @@
    .It Cm MACs
    Specifies the available MAC (message authentication code) algorithms.
    The MAC algorithm is used in protocol version 2
  -@@ -812,6 +816,37 @@
  +@@ -814,6 +818,37 @@
    .It Cm ServerKeyBits
    Defines the number of bits in the ephemeral protocol version 1 server key.
    The minimum value is 512, and the default is 1024.
  @@ -615,8 +620,9 @@
    .It Cm StrictModes
    Specifies whether
    .Xr sshd 8
  +Index: sshd_config
   --- sshd_config.orig 2008-07-02 14:35:43 +0200
  -+++ sshd_config      2008-07-22 08:33:14 +0200
  ++++ sshd_config      2009-02-25 12:25:01 +0100
   @@ -112,6 +112,17 @@
    # override default of no subsystems
    Subsystem   sftp    /usr/libexec/sftp-server
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-src/openssh/openssh.patch.watchdog
  ============================================================================
  $ cvs diff -u -r1.2 -r1.3 openssh.patch.watchdog
  --- openpkg-src/openssh/openssh.patch.watchdog        22 Nov 2008 08:25:55 
-0000      1.2
  +++ openpkg-src/openssh/openssh.patch.watchdog        25 Feb 2009 11:30:07 
-0000      1.3
  @@ -4,9 +4,9 @@
   http://www.sc.isc.tohoku.ac.jp/~hgot/sources/openssh-4.4p1-watchdog.patch.tgz
   
   Index: clientloop.c
  ---- clientloop.c.orig        2008-07-16 14:40:52 +0200
  -+++ clientloop.c     2008-11-15 10:14:27 +0100
  -@@ -155,6 +155,7 @@
  +--- clientloop.c.orig        2009-02-14 06:28:21 +0100
  ++++ clientloop.c     2009-02-25 12:25:48 +0100
  +@@ -154,6 +154,7 @@
    static u_int buffer_high;/* Soft max buffer size. */
    static int connection_in;   /* Connection to server (input). */
    static int connection_out;  /* Connection to server (output). */
  @@ -14,7 +14,7 @@
    static int need_rekeying;   /* Set to non-zero if rekeying is requested. */
    static int session_closed = 0;      /* In SSH2: login session closed. */
    
  -@@ -568,16 +569,19 @@
  +@@ -567,16 +568,19 @@
         * event pending.
         */
    
  @@ -41,7 +41,7 @@
    
                /*
                 * We have to clear the select masks, because we return.
  -@@ -593,8 +597,43 @@
  +@@ -592,8 +596,43 @@
                snprintf(buf, sizeof buf, "select: %s\r\n", strerror(errno));
                buffer_append(&stderr_buffer, buf, strlen(buf));
                quit_pending = 1;
  @@ -87,7 +87,7 @@
    }
    
    static void
  -@@ -1305,6 +1344,7 @@
  +@@ -1311,6 +1350,7 @@
        debug("Entering interactive session.");
    
        start_time = get_current_time();
  @@ -96,8 +96,8 @@
        /* Initialize variables. */
        escape_pending1 = 0;
   Index: readconf.c
  ---- readconf.c.orig  2008-06-29 16:04:03 +0200
  -+++ readconf.c       2008-11-15 10:14:27 +0100
  +--- readconf.c.orig  2009-02-14 06:28:21 +0100
  ++++ readconf.c       2009-02-25 12:25:48 +0100
   @@ -118,7 +118,7 @@
        oUser, oHost, oEscapeChar, oRhostsRSAAuthentication, oProxyCommand,
        oGlobalKnownHostsFile, oUserKnownHostsFile, oConnectionAttempts,
  @@ -115,7 +115,7 @@
        { "numberofpasswordprompts", oNumberOfPasswordPrompts },
        { "loglevel", oLogLevel },
        { "dynamicforward", oDynamicForward },
  -@@ -492,6 +493,10 @@
  +@@ -501,6 +502,10 @@
                intptr = &options->no_host_authentication_for_localhost;
                goto parse_flag;
    
  @@ -126,7 +126,7 @@
        case oNumberOfPasswordPrompts:
                intptr = &options->number_of_password_prompts;
                goto parse_int;
  -@@ -1027,6 +1032,7 @@
  +@@ -1019,6 +1024,7 @@
        options->strict_host_key_checking = -1;
        options->compression = -1;
        options->tcp_keep_alive = -1;
  @@ -134,7 +134,7 @@
        options->compression_level = -1;
        options->port = -1;
        options->address_family = -1;
  -@@ -1126,6 +1132,8 @@
  +@@ -1119,6 +1125,8 @@
                options->compression = 0;
        if (options->tcp_keep_alive == -1)
                options->tcp_keep_alive = 1;
  @@ -144,9 +144,9 @@
                options->compression_level = 6;
        if (options->port == -1)
   Index: readconf.h
  ---- readconf.h.orig  2008-06-29 16:04:03 +0200
  -+++ readconf.h       2008-11-15 10:14:27 +0100
  -@@ -56,6 +56,9 @@
  +--- readconf.h.orig  2009-02-14 06:28:21 +0100
  ++++ readconf.h       2009-02-25 12:25:48 +0100
  +@@ -57,6 +57,9 @@
        int     compression_level;      /* Compression level 1 (fast) to 9
                                         * (best). */
        int     tcp_keep_alive; /* Set SO_KEEPALIVE. */
  @@ -157,8 +157,8 @@
    
        int     port;           /* Port to connect. */
   Index: servconf.c
  ---- servconf.c.orig  2008-07-04 05:51:12 +0200
  -+++ servconf.c       2008-11-15 10:14:27 +0100
  +--- servconf.c.orig  2009-01-28 06:31:23 +0100
  ++++ servconf.c       2009-02-25 12:25:48 +0100
   @@ -80,6 +80,8 @@
        options->xauth_location = NULL;
        options->strict_modes = -1;
  @@ -168,7 +168,7 @@
        options->log_facility = SYSLOG_FACILITY_NOT_SET;
        options->log_level = SYSLOG_LEVEL_NOT_SET;
        options->rhosts_rsa_authentication = -1;
  -@@ -185,6 +187,10 @@
  +@@ -186,6 +188,10 @@
                options->strict_modes = 1;
        if (options->tcp_keep_alive == -1)
                options->tcp_keep_alive = 1;
  @@ -179,7 +179,7 @@
        if (options->log_facility == SYSLOG_FACILITY_NOT_SET)
                options->log_facility = SYSLOG_FACILITY_AUTH;
        if (options->log_level == SYSLOG_LEVEL_NOT_SET)
  -@@ -290,7 +296,7 @@
  +@@ -293,7 +299,7 @@
        sListenAddress, sAddressFamily,
        sPrintMotd, sPrintLastLog, sIgnoreRhosts,
        sX11Forwarding, sX11DisplayOffset, sX11UseLocalhost,
  @@ -188,7 +188,7 @@
        sPermitUserEnvironment, sUseLogin, sAllowTcpForwarding, sCompression,
        sAllowUsers, sDenyUsers, sAllowGroups, sDenyGroups,
        sIgnoreUserKnownHosts, sCiphers, sMacs, sProtocol, sPidFile,
  -@@ -386,6 +392,8 @@
  +@@ -395,6 +401,8 @@
        { "compression", sCompression, SSHCFG_GLOBAL },
        { "tcpkeepalive", sTCPKeepAlive, SSHCFG_GLOBAL },
        { "keepalive", sTCPKeepAlive, SSHCFG_GLOBAL },  /* obsolete alias */
  @@ -197,7 +197,7 @@
        { "allowtcpforwarding", sAllowTcpForwarding, SSHCFG_ALL },
        { "allowagentforwarding", sAllowAgentForwarding, SSHCFG_ALL },
        { "allowusers", sAllowUsers, SSHCFG_GLOBAL },
  -@@ -930,6 +938,14 @@
  +@@ -943,6 +951,14 @@
                intptr = &options->tcp_keep_alive;
                goto parse_flag;
    
  @@ -213,8 +213,8 @@
                intptr = &options->permit_empty_passwd;
                goto parse_flag;
   Index: servconf.h
  ---- servconf.h.orig  2008-06-10 15:01:51 +0200
  -+++ servconf.h       2008-11-15 10:14:27 +0100
  +--- servconf.h.orig  2009-01-28 06:31:23 +0100
  ++++ servconf.h       2009-02-25 12:25:48 +0100
   @@ -67,6 +67,10 @@
        char   *xauth_location; /* Location of xauth program */
        int     strict_modes;   /* If true, require string home dir modes. */
  @@ -227,8 +227,8 @@
        char   *macs;           /* Supported SSH2 macs. */
        int     protocol;       /* Supported protocol versions. */
   Index: serverloop.c
  ---- serverloop.c.orig        2008-07-04 15:10:49 +0200
  -+++ serverloop.c     2008-11-15 10:15:01 +0100
  +--- serverloop.c.orig        2009-02-14 06:33:09 +0100
  ++++ serverloop.c     2009-02-25 12:25:48 +0100
   @@ -106,6 +106,8 @@
    static int connection_closed = 0;   /* Connection to client closed. */
    static u_int buffer_high;   /* "Soft" max buffer size. */
  @@ -400,8 +400,8 @@
                if (!rekeying) {
                        channel_after_select(readset, writeset);
   Index: ssh.1
  ---- ssh.1.orig       2008-07-04 04:53:50 +0200
  -+++ ssh.1    2008-11-15 10:14:27 +0100
  +--- ssh.1.orig       2009-02-14 06:34:05 +0100
  ++++ ssh.1    2009-02-25 12:25:48 +0100
   @@ -470,6 +470,7 @@
    .It GSSAPIAuthentication
    .It GSSAPIDelegateCredentials
  @@ -411,8 +411,8 @@
    .It HostbasedAuthentication
    .It HostKeyAlgorithms
   Index: ssh_config.5
  ---- ssh_config.5.orig        2008-06-29 16:04:03 +0200
  -+++ ssh_config.5     2008-11-15 10:14:27 +0100
  +--- ssh_config.5.orig        2009-02-23 00:53:58 +0100
  ++++ ssh_config.5     2009-02-25 12:25:48 +0100
   @@ -500,6 +500,23 @@
    will not be converted automatically,
    but may be manually hashed using
  @@ -438,9 +438,9 @@
    Specifies whether to try rhosts based authentication with public key
    authentication.
   Index: sshd_config.5
  ---- sshd_config.5.orig       2008-07-02 14:35:43 +0200
  -+++ sshd_config.5    2008-11-15 10:14:27 +0100
  -@@ -932,6 +932,30 @@
  +--- sshd_config.5.orig       2009-02-23 01:00:24 +0100
  ++++ sshd_config.5    2009-02-25 12:25:48 +0100
  +@@ -934,6 +934,30 @@
    escalation by containing any corruption within the unprivileged processes.
    The default is
    .Dq yes .
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-src/openssh/openssh.spec
  ============================================================================
  $ cvs diff -u -r1.218 -r1.219 openssh.spec
  --- openpkg-src/openssh/openssh.spec  23 Dec 2008 09:12:41 -0000      1.218
  +++ openpkg-src/openssh/openssh.spec  25 Feb 2009 11:30:07 -0000      1.219
  @@ -22,7 +22,7 @@
   ##
   
   #   package versions
  -%define       V_base        5.1
  +%define       V_base        5.2
   %define       V_portable    p1
   %define       V_connect     100
   %define       V_hpn         5.1p1-hpn13v5
  @@ -38,7 +38,7 @@
   Group:        SSH
   License:      BSD
   Version:      %{V_base}%{V_portable}
  -Release:      20081223
  +Release:      20090225
   
   #   package options
   %option       with_fsl          yes
  @@ .
______________________________________________________________________
OpenPKG                                             http://openpkg.org
CVS Repository Commit List                     openpkg-cvs@openpkg.org

Reply via email to