head 1.2; access; symbols pkgsrc-2013Q2:1.2.0.4 pkgsrc-2013Q2-base:1.2 pkgsrc-2012Q4:1.2.0.2 pkgsrc-2012Q4-base:1.2 pkgsrc-2012Q3:1.1.0.54 pkgsrc-2012Q3-base:1.1 pkgsrc-2012Q2:1.1.0.52 pkgsrc-2012Q2-base:1.1 pkgsrc-2012Q1:1.1.0.50 pkgsrc-2012Q1-base:1.1 pkgsrc-2011Q4:1.1.0.48 pkgsrc-2011Q4-base:1.1 pkgsrc-2011Q3:1.1.0.46 pkgsrc-2011Q3-base:1.1 pkgsrc-2011Q2:1.1.0.44 pkgsrc-2011Q2-base:1.1 pkgsrc-2011Q1:1.1.0.42 pkgsrc-2011Q1-base:1.1 pkgsrc-2010Q4:1.1.0.40 pkgsrc-2010Q4-base:1.1 pkgsrc-2010Q3:1.1.0.38 pkgsrc-2010Q3-base:1.1 pkgsrc-2010Q2:1.1.0.36 pkgsrc-2010Q2-base:1.1 pkgsrc-2010Q1:1.1.0.34 pkgsrc-2010Q1-base:1.1 pkgsrc-2009Q4:1.1.0.32 pkgsrc-2009Q4-base:1.1 pkgsrc-2009Q3:1.1.0.30 pkgsrc-2009Q3-base:1.1 pkgsrc-2009Q2:1.1.0.28 pkgsrc-2009Q2-base:1.1 pkgsrc-2009Q1:1.1.0.26 pkgsrc-2009Q1-base:1.1 pkgsrc-2008Q4:1.1.0.24 pkgsrc-2008Q4-base:1.1 pkgsrc-2008Q3:1.1.0.22 pkgsrc-2008Q3-base:1.1 cube-native-xorg:1.1.0.20 cube-native-xorg-base:1.1 pkgsrc-2008Q2:1.1.0.18 pkgsrc-2008Q2-base:1.1 cwrapper:1.1.0.16 pkgsrc-2008Q1:1.1.0.14 pkgsrc-2008Q1-base:1.1 pkgsrc-2007Q4:1.1.0.12 pkgsrc-2007Q4-base:1.1 pkgsrc-2007Q3:1.1.0.10 pkgsrc-2007Q3-base:1.1 pkgsrc-2007Q2:1.1.0.8 pkgsrc-2007Q2-base:1.1 pkgsrc-2007Q1:1.1.0.6 pkgsrc-2007Q1-base:1.1 pkgsrc-2006Q4:1.1.0.4 pkgsrc-2006Q4-base:1.1 pkgsrc-2006Q3:1.1.0.2 pkgsrc-2006Q3-base:1.1; locks; strict; comment @# @; 1.2 date 2012.12.12.22.04.50; author gendalia; state dead; branches; next 1.1; 1.1 date 2006.09.22.13.58.46; author kivinen; state Exp; branches; next ; desc @@ 1.2 log @"Hygiene demands it." Sources are from 2003, current tectia client/server has vulnterabilities, there are no security eyes on this version. @ text @$NetBSD: patch-bc,v 1.1 2006/09/22 13:58:46 kivinen Exp $ --- apps/ssh/lib/sshproto/tests/t-userauth.c.orig 2003-12-03 15:17:34.000000000 +0200 +++ apps/ssh/lib/sshproto/tests/t-userauth.c @@@@ -336,7 +336,7 @@@@ void simple_password_client(SshAuthClien ssh_debug("simple_password_client: sending pongpong %ld", pd->count); #endif ssh_encode_buffer(b, - SSH_FORMAT_BOOLEAN, TRUE, + SSH_FORMAT_BOOLEAN, (Boolean) TRUE, SSH_FORMAT_UINT32, pd->count, SSH_FORMAT_END); if (pd->count < pingpong_count) @@@@ -357,7 +357,7 @@@@ void simple_password_client(SshAuthClien ssh_debug("simple_password_client: sending req"); #endif ssh_encode_buffer(b, - SSH_FORMAT_BOOLEAN, FALSE, + SSH_FORMAT_BOOLEAN, (Boolean) FALSE, SSH_FORMAT_UINT32_STR, pass, strlen(pass), SSH_FORMAT_END); (*completion_proc)(SSH_AUTH_CLIENT_SEND, user, b, @@@@ -392,7 +392,7 @@@@ void simple_password_client(SshAuthClien #endif b = ssh_xbuffer_allocate(); ssh_encode_buffer(b, - SSH_FORMAT_BOOLEAN, TRUE, + SSH_FORMAT_BOOLEAN, (Boolean) TRUE, SSH_FORMAT_UINT32, pd->count, SSH_FORMAT_END); if (pd->count < pingpong_count) @ 1.1 log @ Fixed RSA e=3 bug (most likely nobody uses e=3 rsa keys on ssh anyways, but better to make sure). Fixed some more ssh_*_{en,de}code calls missing necessary casts. Disabled x11-security extension on x86_64 as it does not work there (uses xauth instead). Updated pkgrevision. @ text @d1 1 a1 1 $NetBSD$ @