[arch-commits] Commit in openssh/trunk (4 files)

2018-10-19 Thread Gaëtan Bisson via arch-commits
Date: Friday, October 19, 2018 @ 06:56:22
  Author: bisson
Revision: 336869

upstream update

Modified:
  openssh/trunk/PKGBUILD
  openssh/trunk/PKGBUILD.snap
Deleted:
  openssh/trunk/openssl-1.1.0.patch
  openssh/trunk/openssl.patch

-+
 PKGBUILD|   13 
 PKGBUILD.snap   |7 
 openssl-1.1.0.patch | 1950 --
 openssl.patch   |   12 
 4 files changed, 2 insertions(+), 1980 deletions(-)

Modified: PKGBUILD
===
--- PKGBUILD2018-10-19 06:27:51 UTC (rev 336868)
+++ PKGBUILD2018-10-19 06:56:22 UTC (rev 336869)
@@ -3,7 +3,7 @@
 # Contributor: judd 
 
 pkgname=openssh
-pkgver=7.8p1
+pkgver=7.9p1
 pkgrel=1
 pkgdesc='Premier connectivity tool for remote login with the SSH protocol'
 url='https://www.openssh.com/portable.html'
@@ -15,7 +15,6 @@
 'x11-ssh-askpass: input passphrase in X')
 validpgpkeys=('59C2118ED206D927E667EBE3D3E5F56B6D920D30')
 
source=("https://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/${pkgname}-${pkgver}.tar.gz"{,.asc}
-'openssl-1.1.0.patch'
 'sshdgenkeys.service'
 'sshd@.service'
 'sshd.service'
@@ -22,9 +21,8 @@
 'sshd.socket'
 'sshd.conf'
 'sshd.pam')
-sha256sums=('1a484bb15152c183bb2514e112aa30dd34138c3cfb032eee5490a66c507144ca'
+sha256sums=('6b4b3ba2253d84ed3771c8050728d597c91cfce898713beb7b64a305b6f11aad'
 'SKIP'
-'d92e3d759b4b5c536aaddf95891bf3baa3a589b4897c56b90103088e1d8f8ebd'
 '4031577db6416fcbaacf8a26a024ecd3939e5c10fe6a86ee3f0eea5093d533b7'
 '3a0845737207f4eda221c9c9fb64e766ade9684562d8ba4f705f7ae6826886e5'
 'c5ed9fa629f8f8dbf3bae4edbad4441c36df535088553fe82695c52d7bde30aa'
@@ -34,13 +32,6 @@
 
 backup=('etc/ssh/ssh_config' 'etc/ssh/sshd_config' 'etc/pam.d/sshd')
 
-prepare() {
-   cd "${srcdir}/${pkgname}-${pkgver}"
-
-   # OpenSSL 1.1.0 patch from 
http://vega.pgw.jp/~kabe/vsd/patch/openssh-7.4p1-openssl-1.1.0c.patch.html
-   patch -p1 -i ../openssl-1.1.0.patch
-}
-
 build() {
cd "${srcdir}/${pkgname}-${pkgver}"
 

Modified: PKGBUILD.snap
===
--- PKGBUILD.snap   2018-10-19 06:27:51 UTC (rev 336868)
+++ PKGBUILD.snap   2018-10-19 06:56:22 UTC (rev 336869)
@@ -36,13 +36,6 @@
 
 backup=('etc/ssh/ssh_config' 'etc/ssh/sshd_config' 'etc/pam.d/sshd')
 
-prepare() {
-#  cd "${srcdir}/${pkgname}-${pkgver}"
-   cd "${srcdir}/${pkgname}"
-
-   patch -p1 -i ../openssl.patch
-}
-
 build() {
 #  cd "${srcdir}/${pkgname}-${pkgver}"
cd "${srcdir}/${pkgname}"

Deleted: openssl-1.1.0.patch
===
--- openssl-1.1.0.patch 2018-10-19 06:27:51 UTC (rev 336868)
+++ openssl-1.1.0.patch 2018-10-19 06:56:22 UTC (rev 336869)
@@ -1,1950 +0,0 @@
-diff -aurp old/auth-pam.c new/auth-pam.c
 old/auth-pam.c 2018-08-22 22:41:42.0 -0700
-+++ new/auth-pam.c 2018-08-23 21:31:53.324592767 -0700
-@@ -128,6 +128,10 @@ extern u_int utmp_len;
- typedef pthread_t sp_pthread_t;
- #else
- typedef pid_t sp_pthread_t;
-+# define pthread_create(a, b, c, d)_ssh_compat_pthread_create(a, b, c, d)
-+# define pthread_exit(a)   _ssh_compat_pthread_exit(a)
-+# define pthread_cancel(a) _ssh_compat_pthread_cancel(a)
-+# define pthread_join(a, b)_ssh_compat_pthread_join(a, b)
- #endif
- 
- struct pam_ctxt {
-diff -aurp old/cipher.c new/cipher.c
 old/cipher.c   2018-08-22 22:41:42.0 -0700
-+++ new/cipher.c   2018-08-23 21:31:53.327926112 -0700
-@@ -299,7 +299,10 @@ cipher_init(struct sshcipher_ctx **ccp,
-   goto out;
-   }
-   }
--  if (EVP_CipherInit(cc->evp, NULL, (u_char *)key, NULL, -1) == 0) {
-+  /* in OpenSSL 1.1.0, EVP_CipherInit clears all previous setups;
-+ use EVP_CipherInit_ex for augmenting */
-+  if (EVP_CipherInit_ex(cc->evp, NULL, NULL, (u_char *)key, NULL, -1) == 
0)
-+  {
-   ret = SSH_ERR_LIBCRYPTO_ERROR;
-   goto out;
-   }
-@@ -485,7 +488,7 @@ cipher_get_keyiv(struct sshcipher_ctx *c
-  len, iv))
-  return SSH_ERR_LIBCRYPTO_ERROR;
-   } else
--  memcpy(iv, cc->evp->iv, len);
-+  memcpy(iv, EVP_CIPHER_CTX_iv(cc->evp), len);
- #endif
-   return 0;
- }
-@@ -519,14 +522,19 @@ cipher_set_keyiv(struct sshcipher_ctx *c
-   EVP_CTRL_GCM_SET_IV_FIXED, -1, (void *)iv))
-   return SSH_ERR_LIBCRYPTO_ERROR;
-   } else
--  memcpy(cc->evp->iv, iv, evplen);
-+  memcpy(EVP_CIPHER_CTX_iv(cc->evp), iv, evplen);
- #endif
-   return 0;
- }
- 
- #ifdef WITH_OPENSSL
--#define EVP_X_STATE(evp)  (evp)->cipher_data
--#define EVP_X_STATE_LEN(evp)  (evp)->cipher->ctx_size
-+# if 

[arch-commits] Commit in openssh/trunk (4 files)

2018-08-23 Thread Gaëtan Bisson via arch-commits
Date: Friday, August 24, 2018 @ 05:02:21
  Author: bisson
Revision: 332897

upstream update

Modified:
  openssh/trunk/PKGBUILD
  openssh/trunk/PKGBUILD.snap
  openssh/trunk/openssl-1.1.0.patch
Deleted:
  openssh/trunk/tuntap.patch

-+
 PKGBUILD|   12 --
 PKGBUILD.snap   |2 
 openssl-1.1.0.patch |  203 --
 tuntap.patch|   35 
 4 files changed, 105 insertions(+), 147 deletions(-)

Modified: PKGBUILD
===
--- PKGBUILD2018-08-24 04:48:59 UTC (rev 332896)
+++ PKGBUILD2018-08-24 05:02:21 UTC (rev 332897)
@@ -4,8 +4,8 @@
 # Contributor: judd 
 
 pkgname=openssh
-pkgver=7.7p1
-pkgrel=2
+pkgver=7.8p1
+pkgrel=1
 pkgdesc='Premier connectivity tool for remote login with the SSH protocol'
 url='https://www.openssh.com/portable.html'
 license=('custom:BSD')
@@ -17,7 +17,6 @@
 validpgpkeys=('59C2118ED206D927E667EBE3D3E5F56B6D920D30')
 
source=("https://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/${pkgname}-${pkgver}.tar.gz"{,.asc}
 'openssl-1.1.0.patch'
-'tuntap.patch'
 'sshdgenkeys.service'
 'sshd@.service'
 'sshd.service'
@@ -24,10 +23,9 @@
 'sshd.socket'
 'sshd.conf'
 'sshd.pam')
-sha256sums=('d73be7e684e99efcd024be15a30bffcbe41b012b2f7b3c9084aed621775e6b8f'
+sha256sums=('1a484bb15152c183bb2514e112aa30dd34138c3cfb032eee5490a66c507144ca'
 'SKIP'
-'fa91849cc3161916f563bda5413676342e0bcc2705857e9d01b73c70e4904adf'
-'bd3698425ece4853d67a9f9e934d37ad22948754c9b82e0a872eb854e94220ce'
+'d92e3d759b4b5c536aaddf95891bf3baa3a589b4897c56b90103088e1d8f8ebd'
 '4031577db6416fcbaacf8a26a024ecd3939e5c10fe6a86ee3f0eea5093d533b7'
 '3a0845737207f4eda221c9c9fb64e766ade9684562d8ba4f705f7ae6826886e5'
 'c5ed9fa629f8f8dbf3bae4edbad4441c36df535088553fe82695c52d7bde30aa'
@@ -42,8 +40,6 @@
 
# OpenSSL 1.1.0 patch from 
http://vega.pgw.jp/~kabe/vsd/patch/openssh-7.4p1-openssl-1.1.0c.patch.html
patch -p1 -i ../openssl-1.1.0.patch
-
-   patch -p1 -i ../tuntap.patch
 }
 
 build() {

Modified: PKGBUILD.snap
===
--- PKGBUILD.snap   2018-08-24 04:48:59 UTC (rev 332896)
+++ PKGBUILD.snap   2018-08-24 05:02:21 UTC (rev 332897)
@@ -6,7 +6,7 @@
 pkgname=openssh
 pkgver=7.7snap20180330
 pkgrel=1
-pkgdesc='Free version of the SSH connectivity tools'
+pkgdesc='Premier connectivity tool for remote login with the SSH protocol'
 url='https://www.openssh.com/portable.html'
 license=('custom:BSD')
 arch=('x86_64')

Modified: openssl-1.1.0.patch
===
--- openssl-1.1.0.patch 2018-08-24 04:48:59 UTC (rev 332896)
+++ openssl-1.1.0.patch 2018-08-24 05:02:21 UTC (rev 332897)
@@ -1,6 +1,6 @@
 diff -aurp old/auth-pam.c new/auth-pam.c
 old/auth-pam.c 2018-03-22 16:21:14.0 -1000
-+++ new/auth-pam.c 2018-03-23 10:05:03.886621278 -1000
+--- old/auth-pam.c 2018-08-22 22:41:42.0 -0700
 new/auth-pam.c 2018-08-23 21:31:53.324592767 -0700
 @@ -128,6 +128,10 @@ extern u_int utmp_len;
  typedef pthread_t sp_pthread_t;
  #else
@@ -13,9 +13,9 @@
  
  struct pam_ctxt {
 diff -aurp old/cipher.c new/cipher.c
 old/cipher.c   2018-03-22 16:21:14.0 -1000
-+++ new/cipher.c   2018-03-23 10:05:03.886621278 -1000
-@@ -297,7 +297,10 @@ cipher_init(struct sshcipher_ctx **ccp,
+--- old/cipher.c   2018-08-22 22:41:42.0 -0700
 new/cipher.c   2018-08-23 21:31:53.327926112 -0700
+@@ -299,7 +299,10 @@ cipher_init(struct sshcipher_ctx **ccp,
goto out;
}
}
@@ -27,7 +27,7 @@
ret = SSH_ERR_LIBCRYPTO_ERROR;
goto out;
}
-@@ -483,7 +486,7 @@ cipher_get_keyiv(struct sshcipher_ctx *c
+@@ -485,7 +488,7 @@ cipher_get_keyiv(struct sshcipher_ctx *c
   len, iv))
   return SSH_ERR_LIBCRYPTO_ERROR;
} else
@@ -36,7 +36,7 @@
  #endif
return 0;
  }
-@@ -517,14 +520,19 @@ cipher_set_keyiv(struct sshcipher_ctx *c
+@@ -519,14 +522,19 @@ cipher_set_keyiv(struct sshcipher_ctx *c
EVP_CTRL_GCM_SET_IV_FIXED, -1, (void *)iv))
return SSH_ERR_LIBCRYPTO_ERROR;
} else
@@ -60,8 +60,8 @@
  
  int
 diff -aurp old/cipher.h new/cipher.h
 old/cipher.h   2018-03-22 16:21:14.0 -1000
-+++ new/cipher.h   2018-03-23 10:05:03.886621278 -1000
+--- old/cipher.h   2018-08-22 22:41:42.0 -0700
 new/cipher.h   2018-08-23 21:31:53.327926112 -0700
 @@ -46,7 +46,18 @@
  #define CIPHER_DECRYPT0
  
@@ -82,9 +82,9 @@
  const struct sshcipher *cipher_by_name(const char *);
  const char *cipher_warning_message(const struct sshcipher_ctx *);
 diff -aurp 

[arch-commits] Commit in openssh/trunk (4 files)

2017-03-20 Thread Gaëtan Bisson
Date: Monday, March 20, 2017 @ 21:48:15
  Author: bisson
Revision: 291134

rebuild for openssl-1.1.0

Added:
  openssh/trunk/openssl-1.1.0.patch
Modified:
  openssh/trunk/PKGBUILD
Deleted:
  openssh/trunk/openssh-7.4p1-openssl-1.1.0c.patch
  openssh/trunk/pthread-defines.patch

+
 PKGBUILD   |   11 
 openssh-7.4p1-openssl-1.1.0c.patch | 2282 ---
 openssl-1.1.0.patch| 2217 ++
 pthread-defines.patch  |   14 
 4 files changed, 2221 insertions(+), 2303 deletions(-)

Modified: PKGBUILD
===
--- PKGBUILD2017-03-20 21:46:08 UTC (rev 291133)
+++ PKGBUILD2017-03-20 21:48:15 UTC (rev 291134)
@@ -5,7 +5,7 @@
 
 pkgname=openssh
 pkgver=7.5p1
-pkgrel=1
+pkgrel=2
 pkgdesc='Free version of the SSH connectivity tools'
 url='https://www.openssh.com/portable.html'
 license=('custom:BSD')
@@ -16,8 +16,7 @@
 'x11-ssh-askpass: input passphrase in X')
 validpgpkeys=('59C2118ED206D927E667EBE3D3E5F56B6D920D30')
 
source=("https://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/${pkgname}-${pkgver}.tar.gz"{,.asc}
-'openssh-7.4p1-openssl-1.1.0c.patch'
-'pthread-defines.patch'
+'openssl-1.1.0.patch'
 'sshdgenkeys.service'
 'sshd@.service'
 'sshd.service'
@@ -26,8 +25,7 @@
 'sshd.pam')
 sha256sums=('9846e3c5fab9f0547400b4d2c017992f914222b3fd1f8eee6c7dc6bc5e59f9f0'
 'SKIP'
-'8f76e62ba7a0d0b9a4a328ab1d42cb4bd3c84fd34e5256c8a1e9786c631ce441'
-'241d8b2adbd50b0431da810f24e960442eef9226da55ea3489034590b421835f'
+'b895b5f8e9f7d3a60286bf0a5b313d0b2ae2891ee1358e4862f1a0f1ad0ddc7d'
 '4031577db6416fcbaacf8a26a024ecd3939e5c10fe6a86ee3f0eea5093d533b7'
 '69cc2abaaae0aa8071b8eac338b2df725f60ce73381843179b74eaac78ba7f1d'
 'c5ed9fa629f8f8dbf3bae4edbad4441c36df535088553fe82695c52d7bde30aa'
@@ -40,8 +38,7 @@
 prepare() {
cd $pkgname-$pkgver
# OpenSSL 1.1.0 patch from 
http://vega.pgw.jp/~kabe/vsd/patch/openssh-7.4p1-openssl-1.1.0c.patch.html
-#  patch -Np0 -i ../openssh-7.4p1-openssl-1.1.0c.patch
-#  patch -Np1 -i ../pthread-defines.patch
+   patch -Np1 -i ../openssl-1.1.0.patch
 }
 
 build() {

Deleted: openssh-7.4p1-openssl-1.1.0c.patch
===
--- openssh-7.4p1-openssl-1.1.0c.patch  2017-03-20 21:46:08 UTC (rev 291133)
+++ openssh-7.4p1-openssl-1.1.0c.patch  2017-03-20 21:48:15 UTC (rev 291134)
@@ -1,2282 +0,0 @@
-Index: cipher-3des1.c
-===
-RCS file: /home/kabe/cvsroot/openssh/cipher-3des1.c,v
-retrieving revision 1.1.1.2
-diff -u -r1.1.1.2 cipher-3des1.c
 cipher-3des1.c 23 Dec 2016 02:49:10 -  1.1.1.2
-+++ cipher-3des1.c 23 Dec 2016 06:54:21 -
-@@ -44,7 +44,7 @@
-  */
- struct ssh1_3des_ctx
- {
--  EVP_CIPHER_CTX  k1, k2, k3;
-+  EVP_CIPHER_CTX  *k1, *k2, *k3;
- };
- 
- const EVP_CIPHER * evp_ssh1_3des(void);
-@@ -65,7 +65,7 @@
-   if (key == NULL)
-   return 1;
-   if (enc == -1)
--  enc = ctx->encrypt;
-+  enc = EVP_CIPHER_CTX_encrypting(ctx);
-   k1 = k2 = k3 = (u_char *) key;
-   k2 += 8;
-   if (EVP_CIPHER_CTX_key_length(ctx) >= 16+8) {
-@@ -74,12 +74,17 @@
-   else
-   k1 += 16;
-   }
--  EVP_CIPHER_CTX_init(>k1);
--  EVP_CIPHER_CTX_init(>k2);
--  EVP_CIPHER_CTX_init(>k3);
--  if (EVP_CipherInit(>k1, EVP_des_cbc(), k1, NULL, enc) == 0 ||
--  EVP_CipherInit(>k2, EVP_des_cbc(), k2, NULL, !enc) == 0 ||
--  EVP_CipherInit(>k3, EVP_des_cbc(), k3, NULL, enc) == 0) {
-+  c->k1 = c->k2 = c->k3 = NULL;
-+  c->k1 = EVP_CIPHER_CTX_new();
-+  c->k2 = EVP_CIPHER_CTX_new();
-+  c->k3 = EVP_CIPHER_CTX_new();
-+  if (c->k1 == NULL || c->k2 == NULL || c->k3 == NULL ||
-+  EVP_CipherInit(c->k1, EVP_des_cbc(), k1, NULL, enc) == 0 ||
-+  EVP_CipherInit(c->k2, EVP_des_cbc(), k2, NULL, !enc) == 0 ||
-+  EVP_CipherInit(c->k3, EVP_des_cbc(), k3, NULL, enc) == 0) {
-+  EVP_CIPHER_CTX_free(c->k1);
-+  EVP_CIPHER_CTX_free(c->k2);
-+  EVP_CIPHER_CTX_free(c->k3);
-   explicit_bzero(c, sizeof(*c));
-   free(c);
-   EVP_CIPHER_CTX_set_app_data(ctx, NULL);
-@@ -95,9 +100,9 @@
- 
-   if ((c = EVP_CIPHER_CTX_get_app_data(ctx)) == NULL)
-   return 0;
--  if (EVP_Cipher(>k1, dest, (u_char *)src, len) == 0 ||
--  EVP_Cipher(>k2, dest, dest, len) == 0 ||
--  EVP_Cipher(>k3, dest, dest, len) == 0)
-+  if (EVP_Cipher(c->k1, dest, (u_char *)src, len) == 0 ||
-+  EVP_Cipher(c->k2, dest, dest, len) == 0 ||
-+  EVP_Cipher(c->k3, dest, dest,