Hello community,

here is the log from the commit of package openssh for openSUSE:Factory checked 
in at 2016-04-12 18:59:51
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/openssh (Old)
 and      /work/SRC/openSUSE:Factory/.openssh.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "openssh"

Changes:
--------
--- /work/SRC/openSUSE:Factory/openssh/openssh.changes  2016-01-16 
11:55:46.000000000 +0100
+++ /work/SRC/openSUSE:Factory/.openssh.new/openssh.changes     2016-04-12 
18:59:52.000000000 +0200
@@ -1,0 +2,7 @@
+Wed Apr  6 11:42:35 UTC 2016 - ku...@suse.com
+
+- openssh-6.6p1-ldap.patch: replace TRUE/FALSE with 1/0, since
+  this defines did come via an indirect header inclusion and are
+  not everywhere defined.
+
+-------------------------------------------------------------------

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
openssh.spec: same change
++++++ openssh-6.6p1-ldap.patch ++++++
--- /var/tmp/diff_new_pack.UfBC0M/_old  2016-04-12 18:59:53.000000000 +0200
+++ /var/tmp/diff_new_pack.UfBC0M/_new  2016-04-12 18:59:53.000000000 +0200
@@ -798,7 +798,7 @@
 +      timeout.tv_sec = options.bind_timelimit;
 +      timeout.tv_usec = 0;
 +      result = NULL;
-+      if ((rc = ldap_result (ld, msgid, FALSE, &timeout, &result)) < 1) {
++      if ((rc = ldap_result (ld, msgid, 0, &timeout, &result)) < 1) {
 +              error ("ldap_result %s", ldap_err2string (ldap_get_lderrno (ld, 
0, 0)));
 +              ldap_msgfree (result);
 +              return LDAP_OPERATIONS_ERROR;
@@ -899,7 +899,7 @@
 +                      }
 +
 +                      if (options.ssl_on != SSL_OFF) {
-+                              if ((ld = ldapssl_init (options.host, 
options.port, TRUE)) == NULL)
++                              if ((ld = ldapssl_init (options.host, 
options.port, 1)) == NULL)
 +                                  fatal ("ldapssl_init failed");
 +                              debug3 ("LDAPssl init");
 +                      }
@@ -1103,7 +1103,7 @@
 +
 +      timeout.tv_sec = options.bind_timelimit;
 +      timeout.tv_usec = 0;
-+      if ((rc = ldap_result (ld, msgid, FALSE, &timeout, &result)) < 1) {
++      if ((rc = ldap_result (ld, msgid, 0, &timeout, &result)) < 1) {
 +              ld_errno = ldap_get_lderrno (ld, 0, 0);
 +
 +              error ("ldap_result %s", ldap_err2string (ld_errno));
@@ -1114,7 +1114,7 @@
 +
 +#if defined(HAVE_LDAP_PARSE_RESULT) && defined(HAVE_LDAP_CONTROLS_FREE)
 +      controls = NULL;
-+      if ((parserc = ldap_parse_result (ld, result, &rc, 0, 0, 0, &controls, 
TRUE)) != LDAP_SUCCESS)
++      if ((parserc = ldap_parse_result (ld, result, &rc, 0, 0, 0, &controls, 
1)) != LDAP_SUCCESS)
 +          fatal ("ldap_parse_result %s", ldap_err2string (parserc));
 +      debug3 ("LDAP parse result OK");
 +
@@ -1122,7 +1122,7 @@
 +              ldap_controls_free (controls);
 +      }
 +#else
-+      rc = ldap_result2error (session->ld, result, TRUE);
++      rc = ldap_result2error (session->ld, result, 1);
 +#endif
 +      if (rc != LDAP_SUCCESS)
 +          fatal ("error trying to bind as user \"%s\" (%s)",




Reply via email to