OpenPKG CVS Repository
http://cvs.openpkg.org/
____________________________________________________________________________
Server: cvs.openpkg.org Name: Ralf S. Engelschall
Root: /v/openpkg/cvs Email: [EMAIL PROTECTED]
Module: openpkg-src Date: 05-Sep-2007 08:48:41
Branch: HEAD Handle: 2007090507483901
Modified files:
openpkg-src/openssh openssh.patch openssh.patch.alias
openssh.patch.chroot openssh.patch.scpbindir
openssh.patch.sftplogging openssh.spec
Log:
upgrading package: openssh 4.6p1 -> 4.7p1
Summary:
Revision Changes Path
1.21 +7 -41 openpkg-src/openssh/openssh.patch
1.11 +9 -9 openpkg-src/openssh/openssh.patch.alias
1.11 +11 -11 openpkg-src/openssh/openssh.patch.chroot
1.14 +2 -2 openpkg-src/openssh/openssh.patch.scpbindir
1.12 +42 -42 openpkg-src/openssh/openssh.patch.sftplogging
1.198 +4 -2 openpkg-src/openssh/openssh.spec
____________________________________________________________________________
patch -p0 <<'@@ .'
Index: openpkg-src/openssh/openssh.patch
============================================================================
$ cvs diff -u -r1.20 -r1.21 openssh.patch
--- openpkg-src/openssh/openssh.patch 30 Aug 2007 17:49:39 -0000 1.20
+++ openpkg-src/openssh/openssh.patch 5 Sep 2007 06:48:39 -0000 1.21
@@ -1,7 +1,7 @@
Index: Makefile.in
---- Makefile.in.orig 2006-10-23 23:44:47 +0200
-+++ Makefile.in 2007-03-10 09:30:35 +0100
-@@ -234,7 +234,7 @@
+--- Makefile.in.orig 2007-06-11 06:01:42 +0200
++++ Makefile.in 2007-09-05 08:39:34 +0200
+@@ -231,7 +231,7 @@
-rm -rf autom4te.cache
(cd scard && $(MAKE) -f Makefile.in distprep)
@@ -12,7 +12,7 @@
Index: auth-pam.h
--- auth-pam.h.orig 2004-09-11 14:17:26 +0200
-+++ auth-pam.h 2007-03-10 09:30:35 +0100
++++ auth-pam.h 2007-09-05 08:39:34 +0200
@@ -28,7 +28,7 @@
#ifdef USE_PAM
@@ -23,45 +23,11 @@
void start_pam(Authctxt *);
Index: version.h
---- version.h.orig 2007-03-06 11:21:37 +0100
-+++ version.h 2007-03-10 09:30:35 +0100
+--- version.h.orig 2007-08-15 11:14:52 +0200
++++ version.h 2007-09-05 08:39:34 +0200
@@ -3,4 +3,4 @@
- #define SSH_VERSION "OpenSSH_4.6"
+ #define SSH_VERSION "OpenSSH_4.7"
#define SSH_PORTABLE "p1"
-#define SSH_RELEASE SSH_VERSION SSH_PORTABLE
+#define SSH_RELEASE SSH_VERSION SSH_PORTABLE " @l_openpkg_release@"
-
------------------------------------------------------------------------------
-
-Bugfix (backported from OpenBSD):
-Move C/R -> kbdint special case to after the defaults have been loaded,
-which makes "ChallengeResponse" default to yes again. This was broken by
-the "Match" changes and not fixed properly subsequently.
-
-Index: servconf.c
---- servconf.c.orig 2007-08-30 11:50:17 -0300
-+++ servconf.c 2007-08-30 11:50:38 -0300
-@@ -1387,8 +1387,4 @@
- if (bad_options > 0)
- fatal("%s: terminating, %d bad configuration options",
- filename, bad_options);
--
-- /* challenge-response is implemented via keyboard interactive */
-- if (options->challenge_response_authentication == 1)
-- options->kbd_interactive_authentication = 1;
- }
-Index: sshd.c
---- sshd.c.orig 2007-08-30 11:50:30 -0300
-+++ sshd.c 2007-08-30 11:51:42 -0300
-@@ -1421,6 +1421,10 @@
- /* Fill in default values for those options not explicitly set. */
- fill_default_server_options(&options);
-
-+ /* challenge-response is implemented via keyboard interactive */
-+ if (options.challenge_response_authentication)
-+ options.kbd_interactive_authentication = 1;
-+
- /* set default channel AF */
- channel_set_af(options.address_family);
-
@@ .
patch -p0 <<'@@ .'
Index: openpkg-src/openssh/openssh.patch.alias
============================================================================
$ cvs diff -u -r1.10 -r1.11 openssh.patch.alias
--- openpkg-src/openssh/openssh.patch.alias 10 Mar 2007 08:35:34 -0000
1.10
+++ openpkg-src/openssh/openssh.patch.alias 5 Sep 2007 06:48:40 -0000
1.11
@@ -1,6 +1,6 @@
Index: auth1.c
--- auth1.c.orig 2006-09-01 07:38:36 +0200
-+++ auth1.c 2007-03-10 09:30:55 +0100
++++ auth1.c 2007-09-05 08:40:36 +0200
@@ -39,6 +39,9 @@
#endif
#include "monitor_wrap.h"
@@ -49,8 +49,8 @@
authctxt->style = style;
Index: auth2.c
---- auth2.c.orig 2007-03-01 11:31:29 +0100
-+++ auth2.c 2007-03-10 09:30:55 +0100
+--- auth2.c.orig 2007-05-20 06:58:41 +0200
++++ auth2.c 2007-09-05 08:40:36 +0200
@@ -44,6 +44,9 @@
#include "dispatch.h"
#include "pathnames.h"
@@ -99,8 +99,8 @@
/* setup auth context */
authctxt->pw = PRIVSEP(getpwnamallow(user));
Index: servconf.c
---- servconf.c.orig 2007-03-01 11:31:29 +0100
-+++ servconf.c 2007-03-10 09:30:55 +0100
+--- servconf.c.orig 2007-05-20 07:03:16 +0200
++++ servconf.c 2007-09-05 08:40:36 +0200
@@ -122,6 +122,9 @@
options->permit_tun = -1;
options->num_permitted_opens = -1;
@@ -131,7 +131,7 @@
{ NULL, sBadOption, 0 }
};
-@@ -1261,6 +1270,26 @@
+@@ -1260,6 +1269,26 @@
arg = strdelim(&cp);
break;
@@ -160,7 +160,7 @@
filename, linenum, arg);
Index: servconf.h
--- servconf.h.orig 2007-02-19 12:25:38 +0100
-+++ servconf.h 2007-03-10 09:30:55 +0100
++++ servconf.h 2007-09-05 08:40:36 +0200
@@ -141,6 +141,14 @@
int permit_tun;
@@ -177,8 +177,8 @@
void initialize_server_options(ServerOptions *);
Index: sshd_config.5
---- sshd_config.5.orig 2007-03-06 11:21:18 +0100
-+++ sshd_config.5 2007-03-10 09:30:55 +0100
+--- sshd_config.5.orig 2007-06-11 06:07:13 +0200
++++ sshd_config.5 2007-09-05 08:40:36 +0200
@@ -95,6 +95,15 @@
(use IPv6 only).
The default is
@@ .
patch -p0 <<'@@ .'
Index: openpkg-src/openssh/openssh.patch.chroot
============================================================================
$ cvs diff -u -r1.10 -r1.11 openssh.patch.chroot
--- openpkg-src/openssh/openssh.patch.chroot 10 Mar 2007 08:35:34 -0000
1.10
+++ openpkg-src/openssh/openssh.patch.chroot 5 Sep 2007 06:48:40 -0000
1.11
@@ -1,7 +1,7 @@
Index: scp.c
---- scp.c.orig 2007-02-19 12:14:11 +0100
-+++ scp.c 2007-03-10 09:31:17 +0100
-@@ -128,6 +128,11 @@
+--- scp.c.orig 2007-08-08 06:29:58 +0200
++++ scp.c 2007-09-05 08:41:00 +0200
+@@ -131,6 +131,11 @@
/* This is the program to execute for the secured connection. ("ssh" or -S)
*/
char *ssh_program = _PATH_SSH_PROGRAM;
@@ -13,7 +13,7 @@
/* This is used to store the pid of ssh_program */
pid_t do_cmd_pid = -1;
-@@ -310,7 +315,11 @@
+@@ -313,7 +318,11 @@
addargs(&args, "-oClearAllForwardings yes");
fflag = tflag = 0;
@@ -25,7 +25,7 @@
switch (ch) {
/* User-visible flags. */
case '1':
-@@ -371,6 +380,11 @@
+@@ -374,6 +383,11 @@
setmode(0, O_BINARY);
#endif
break;
@@ -37,7 +37,7 @@
default:
usage();
}
-@@ -386,6 +400,19 @@
+@@ -389,6 +403,19 @@
remin = STDIN_FILENO;
remout = STDOUT_FILENO;
@@ -58,8 +58,8 @@
/* Follow "protocol", send data. */
(void) response();
Index: session.c
---- session.c.orig 2007-02-19 12:10:25 +0100
-+++ session.c 2007-03-10 09:31:17 +0100
+--- session.c.orig 2007-08-16 15:28:04 +0200
++++ session.c 2007-09-05 08:41:00 +0200
@@ -1337,6 +1337,26 @@
exit(1);
}
@@ -88,9 +88,9 @@
if (options.gss_authentication) {
temporarily_use_uid(pw);
Index: sftp-server.c
---- sftp-server.c.orig 2007-01-05 06:31:03 +0100
-+++ sftp-server.c 2007-03-10 09:31:17 +0100
-@@ -1270,6 +1270,38 @@
+--- sftp-server.c.orig 2007-05-20 07:09:05 +0200
++++ sftp-server.c 2007-09-05 08:41:00 +0200
+@@ -1273,6 +1273,38 @@
handle_init();
@@ .
patch -p0 <<'@@ .'
Index: openpkg-src/openssh/openssh.patch.scpbindir
============================================================================
$ cvs diff -u -r1.13 -r1.14 openssh.patch.scpbindir
--- openpkg-src/openssh/openssh.patch.scpbindir 10 Mar 2007 08:35:34
-0000 1.13
+++ openpkg-src/openssh/openssh.patch.scpbindir 5 Sep 2007 06:48:40
-0000 1.14
@@ -1,6 +1,6 @@
Index: session.c
---- session.c.orig 2007-02-19 12:10:25 +0100
-+++ session.c 2007-03-10 09:31:39 +0100
+--- session.c.orig 2007-08-16 15:28:04 +0200
++++ session.c 2007-09-05 08:41:17 +0200
@@ -92,6 +92,10 @@
#include <kafs.h>
#endif
@@ .
patch -p0 <<'@@ .'
Index: openpkg-src/openssh/openssh.patch.sftplogging
============================================================================
$ cvs diff -u -r1.11 -r1.12 openssh.patch.sftplogging
--- openpkg-src/openssh/openssh.patch.sftplogging 10 Mar 2007 08:35:34
-0000 1.11
+++ openpkg-src/openssh/openssh.patch.sftplogging 5 Sep 2007 06:48:40
-0000 1.12
@@ -1,6 +1,6 @@
Index: servconf.c
---- servconf.c.orig 2007-03-01 11:31:29 +0100
-+++ servconf.c 2007-03-10 09:32:01 +0100
+--- servconf.c.orig 2007-05-20 07:03:16 +0200
++++ servconf.c 2007-09-05 08:41:42 +0200
@@ -122,6 +122,12 @@
options->permit_tun = -1;
options->num_permitted_opens = -1;
@@ -62,7 +62,7 @@
#ifdef USE_PAM
{ "usepam", sUsePAM, SSHCFG_GLOBAL },
#else
-@@ -626,6 +659,8 @@
+@@ -625,6 +658,8 @@
u_short port;
u_int i, flags = 0;
size_t len;
@@ -71,7 +71,7 @@
cp = line;
if ((arg = strdelim(&cp)) == NULL)
-@@ -1146,6 +1181,58 @@
+@@ -1145,6 +1180,58 @@
case sBanner:
charptr = &options->banner;
goto parse_filename;
@@ -132,7 +132,7 @@
* connect time, so that you can specify paths like:
Index: servconf.h
--- servconf.h.orig 2007-02-19 12:25:38 +0100
-+++ servconf.h 2007-03-10 09:32:01 +0100
++++ servconf.h 2007-09-05 08:41:42 +0200
@@ -34,6 +34,19 @@
#define PERMIT_NO_PASSWD 2
#define PERMIT_YES 3
@@ -168,8 +168,8 @@
void initialize_server_options(ServerOptions *);
Index: session.c
---- session.c.orig 2007-02-19 12:10:25 +0100
-+++ session.c 2007-03-10 09:32:01 +0100
+--- session.c.orig 2007-08-16 15:28:04 +0200
++++ session.c 2007-09-05 08:41:42 +0200
@@ -138,6 +138,15 @@
static int is_child = 0;
@@ -263,8 +263,8 @@
if (options.permit_user_env && !options.use_login) {
snprintf(buf, sizeof buf, "%.200s/.ssh/environment",
Index: sftp-server.8
---- sftp-server.8.orig 2006-09-26 12:14:28 +0200
-+++ sftp-server.8 2007-03-10 09:32:01 +0100
+--- sftp-server.8.orig 2007-06-05 10:27:13 +0200
++++ sftp-server.8 2007-09-05 08:41:42 +0200
@@ -49,6 +49,20 @@
.Cm Subsystem
declaration.
@@ -287,8 +287,8 @@
for more information.
.Pp
Index: sftp-server.c
---- sftp-server.c.orig 2007-01-05 06:31:03 +0100
-+++ sftp-server.c 2007-03-10 09:32:01 +0100
+--- sftp-server.c.orig 2007-05-20 07:09:05 +0200
++++ sftp-server.c 2007-09-05 08:42:11 +0200
@@ -53,6 +53,12 @@
/* Our verbosity */
LogLevel log_level = SYSLOG_LEVEL_ERROR;
@@ -302,7 +302,7 @@
/* Our client */
struct passwd *pw = NULL;
char *client_addr = NULL;
-@@ -498,6 +504,12 @@
+@@ -499,6 +505,12 @@
a = get_attrib();
flags = flags_from_portable(pflags);
mode = (a->flags & SSH2_FILEXFER_ATTR_PERMISSIONS) ? a->perm : 0666;
@@ -315,7 +315,7 @@
logit("open \"%s\" flags %s mode 0%o",
name, string_from_portable(pflags), mode);
fd = open(name, flags, mode);
-@@ -512,6 +524,8 @@
+@@ -513,6 +525,8 @@
status = SSH2_FX_OK;
}
}
@@ -324,7 +324,7 @@
if (status != SSH2_FX_OK)
send_status(id, status);
xfree(name);
-@@ -569,6 +583,8 @@
+@@ -570,6 +584,8 @@
}
}
}
@@ -333,7 +333,7 @@
if (status != SSH2_FX_OK)
send_status(id, status);
}
-@@ -608,6 +624,8 @@
+@@ -609,6 +625,8 @@
}
}
}
@@ -342,7 +342,7 @@
send_status(id, status);
xfree(data);
}
-@@ -708,10 +726,19 @@
+@@ -710,10 +728,19 @@
status = errno_to_portable(errno);
}
if (a->flags & SSH2_FILEXFER_ATTR_PERMISSIONS) {
@@ -362,7 +362,7 @@
}
if (a->flags & SSH2_FILEXFER_ATTR_ACMODTIME) {
char buf[64];
-@@ -725,11 +752,20 @@
+@@ -727,11 +754,20 @@
status = errno_to_portable(errno);
}
if (a->flags & SSH2_FILEXFER_ATTR_UIDGID) {
@@ -383,7 +383,7 @@
}
send_status(id, status);
xfree(name);
-@@ -743,6 +779,9 @@
+@@ -745,6 +781,9 @@
int handle, fd, ret;
int status = SSH2_FX_OK;
@@ -393,7 +393,7 @@
id = get_int();
handle = get_handle();
a = get_attrib();
-@@ -760,6 +799,7 @@
+@@ -763,6 +802,7 @@
status = errno_to_portable(errno);
}
if (a->flags & SSH2_FILEXFER_ATTR_PERMISSIONS) {
@@ -401,7 +401,7 @@
logit("set \"%s\" mode %04o", name, a->perm);
#ifdef HAVE_FCHMOD
ret = fchmod(fd, a->perm & 0777);
-@@ -768,6 +808,14 @@
+@@ -771,6 +811,14 @@
#endif
if (ret == -1)
status = errno_to_portable(errno);
@@ -416,7 +416,7 @@
}
if (a->flags & SSH2_FILEXFER_ATTR_ACMODTIME) {
char buf[64];
-@@ -785,6 +833,7 @@
+@@ -788,6 +836,7 @@
status = errno_to_portable(errno);
}
if (a->flags & SSH2_FILEXFER_ATTR_UIDGID) {
@@ -424,7 +424,7 @@
logit("set \"%s\" owner %lu group %lu", name,
(u_long)a->uid, (u_long)a->gid);
#ifdef HAVE_FCHOWN
-@@ -794,6 +843,14 @@
+@@ -797,6 +846,14 @@
#endif
if (ret == -1)
status = errno_to_portable(errno);
@@ -439,7 +439,7 @@
}
}
send_status(id, status);
-@@ -824,6 +881,8 @@
+@@ -827,6 +884,8 @@
}
}
@@ -448,7 +448,7 @@
if (status != SSH2_FX_OK)
send_status(id, status);
xfree(path);
-@@ -899,6 +958,8 @@
+@@ -902,6 +961,8 @@
logit("remove name \"%s\"", name);
ret = unlink(name);
status = (ret == -1) ? errno_to_portable(errno) : SSH2_FX_OK;
@@ -457,7 +457,7 @@
send_status(id, status);
xfree(name);
}
-@@ -916,6 +977,12 @@
+@@ -919,6 +980,12 @@
a = get_attrib();
mode = (a->flags & SSH2_FILEXFER_ATTR_PERMISSIONS) ?
a->perm & 0777 : 0777;
@@ -470,7 +470,7 @@
debug3("request %u: mkdir", id);
logit("mkdir name \"%s\" mode 0%o", name, mode);
ret = mkdir(name, mode);
-@@ -937,6 +1004,8 @@
+@@ -940,6 +1007,8 @@
logit("rmdir name \"%s\"", name);
ret = rmdir(name);
status = (ret == -1) ? errno_to_portable(errno) : SSH2_FX_OK;
@@ -479,7 +479,7 @@
send_status(id, status);
xfree(name);
}
-@@ -964,6 +1033,8 @@
+@@ -967,6 +1036,8 @@
s.name = s.long_name = resolvedname;
send_names(id, 1, &s);
}
@@ -488,7 +488,7 @@
xfree(path);
}
-@@ -1020,6 +1091,8 @@
+@@ -1023,6 +1094,8 @@
status = SSH2_FX_OK;
}
send_status(id, status);
@@ -497,7 +497,7 @@
xfree(oldpath);
xfree(newpath);
}
-@@ -1046,6 +1119,8 @@
+@@ -1049,6 +1122,8 @@
s.name = s.long_name = buf;
send_names(id, 1, &s);
}
@@ -506,7 +506,7 @@
xfree(path);
}
-@@ -1065,6 +1140,8 @@
+@@ -1068,6 +1143,8 @@
ret = symlink(oldpath, newpath);
status = (ret == -1) ? errno_to_portable(errno) : SSH2_FX_OK;
send_status(id, status);
@@ -515,16 +515,16 @@
xfree(oldpath);
xfree(newpath);
}
-@@ -1212,6 +1289,8 @@
+@@ -1215,6 +1292,8 @@
ssize_t len, olen, set_size;
SyslogFacility log_facility = SYSLOG_FACILITY_AUTH;
- char *cp;
-+ unsigned int val = 0;
-+ char *umask_env;
+ char *cp, buf[4*4096];
++ unsigned int val = 0;
++ char *umask_env;
extern char *optarg;
extern char *__progname;
-@@ -1250,6 +1329,12 @@
+@@ -1253,6 +1332,12 @@
}
}
@@ -537,7 +537,7 @@
log_init(__progname, log_level, log_facility, log_stderr);
if ((cp = getenv("SSH_CONNECTION")) != NULL) {
-@@ -1273,6 +1358,39 @@
+@@ -1276,6 +1361,39 @@
in = dup(STDIN_FILENO);
out = dup(STDOUT_FILENO);
@@ -578,8 +578,8 @@
setmode(in, O_BINARY);
setmode(out, O_BINARY);
Index: sshd_config.5
---- sshd_config.5.orig 2007-03-06 11:21:18 +0100
-+++ sshd_config.5 2007-03-10 09:32:01 +0100
+--- sshd_config.5.orig 2007-06-11 06:07:13 +0200
++++ sshd_config.5 2007-09-05 08:41:42 +0200
@@ -483,6 +483,10 @@
DEBUG and DEBUG1 are equivalent.
DEBUG2 and DEBUG3 each specify higher levels of debugging output.
@@ -591,7 +591,7 @@
.It Cm MACs
Specifies the available MAC (message authentication code) algorithms.
The MAC algorithm is used in protocol version 2
-@@ -722,6 +726,37 @@
+@@ -725,6 +729,37 @@
.It Cm ServerKeyBits
Defines the number of bits in the ephemeral protocol version 1 server key.
The minimum value is 512, and the default is 768.
@@ -630,9 +630,9 @@
Specifies whether
.Xr sshd 8
Index: sshd_config
---- sshd_config.orig 2006-07-24 06:06:47 +0200
-+++ sshd_config 2007-03-10 09:32:01 +0100
-@@ -105,6 +105,17 @@
+--- sshd_config.orig 2007-03-21 10:42:25 +0100
++++ sshd_config 2007-09-05 08:41:42 +0200
+@@ -109,6 +109,17 @@
# override default of no subsystems
Subsystem sftp /usr/libexec/sftp-server
@@ .
patch -p0 <<'@@ .'
Index: openpkg-src/openssh/openssh.spec
============================================================================
$ cvs diff -u -r1.197 -r1.198 openssh.spec
--- openpkg-src/openssh/openssh.spec 30 Aug 2007 17:49:39 -0000 1.197
+++ openpkg-src/openssh/openssh.spec 5 Sep 2007 06:48:40 -0000 1.198
@@ -22,8 +22,10 @@
## SUCH DAMAGE.
##
+# FIXME: with_hpn=yes still broken after upgrade
+
# package versions
-%define V_base 4.6
+%define V_base 4.7
%define V_portable p1
%define V_watchdog 4.4p1
%define V_ldap_base 4.6p1
@@ -42,7 +44,7 @@
Group: SSH
License: BSD
Version: %{V_base}%{V_portable}
-Release: 20070830
+Release: 20070905
# package options
%option with_fsl yes
@@ .
______________________________________________________________________
OpenPKG http://openpkg.org
CVS Repository Commit List [email protected]