patches for easier mirroring, to eliminate a special copy, to make www.freebsd.org/security a full copy of security.freebsd.org and be eventually be the same. For now files are just sitting there. The symlinks are missing. Discussed on: www (repository location) Discussed with: simon (so)
248 lines
8.3 KiB
Diff
248 lines
8.3 KiB
Diff
Index: crypto/openssh/auth-chall.c
|
|
===================================================================
|
|
RCS file: /home/ncvs/src/crypto/openssh/auth-chall.c,v
|
|
retrieving revision 1.6
|
|
retrieving revision 1.6.2.1
|
|
diff -p -c -r1.6 -r1.6.2.1
|
|
*** crypto/openssh/auth-chall.c 31 Mar 2003 13:45:36 -0000 1.6
|
|
--- crypto/openssh/auth-chall.c 24 Sep 2003 18:32:12 -0000 1.6.2.1
|
|
*************** verify_response(Authctxt *authctxt, cons
|
|
*** 93,99 ****
|
|
xfree(info);
|
|
}
|
|
/* if we received more prompts, we're screwed */
|
|
! res = (numprompts != 0);
|
|
}
|
|
device->free_ctx(authctxt->kbdintctxt);
|
|
authctxt->kbdintctxt = NULL;
|
|
--- 93,99 ----
|
|
xfree(info);
|
|
}
|
|
/* if we received more prompts, we're screwed */
|
|
! res = (res == 0 && numprompts == 0) ? 0 : -1;
|
|
}
|
|
device->free_ctx(authctxt->kbdintctxt);
|
|
authctxt->kbdintctxt = NULL;
|
|
Index: crypto/openssh/auth2-pam-freebsd.c
|
|
===================================================================
|
|
RCS file: /home/ncvs/src/crypto/openssh/auth2-pam-freebsd.c,v
|
|
retrieving revision 1.11
|
|
retrieving revision 1.11.2.1
|
|
diff -p -c -r1.11 -r1.11.2.1
|
|
*** crypto/openssh/auth2-pam-freebsd.c 31 Mar 2003 13:48:18 -0000 1.11
|
|
--- crypto/openssh/auth2-pam-freebsd.c 24 Sep 2003 18:32:22 -0000 1.11.2.1
|
|
*************** pam_thread_conv(int n,
|
|
*** 134,141 ****
|
|
*resp = xmalloc(n * sizeof **resp);
|
|
buffer_init(&buffer);
|
|
for (i = 0; i < n; ++i) {
|
|
! resp[i]->resp_retcode = 0;
|
|
! resp[i]->resp = NULL;
|
|
switch (msg[i]->msg_style) {
|
|
case PAM_PROMPT_ECHO_OFF:
|
|
buffer_put_cstring(&buffer, msg[i]->msg);
|
|
--- 134,141 ----
|
|
*resp = xmalloc(n * sizeof **resp);
|
|
buffer_init(&buffer);
|
|
for (i = 0; i < n; ++i) {
|
|
! (*resp)[i].resp_retcode = 0;
|
|
! (*resp)[i].resp = NULL;
|
|
switch (msg[i]->msg_style) {
|
|
case PAM_PROMPT_ECHO_OFF:
|
|
buffer_put_cstring(&buffer, msg[i]->msg);
|
|
*************** pam_thread_conv(int n,
|
|
*** 143,149 ****
|
|
ssh_msg_recv(ctxt->pam_csock, &buffer);
|
|
if (buffer_get_char(&buffer) != PAM_AUTHTOK)
|
|
goto fail;
|
|
! resp[i]->resp = buffer_get_string(&buffer, NULL);
|
|
break;
|
|
case PAM_PROMPT_ECHO_ON:
|
|
buffer_put_cstring(&buffer, msg[i]->msg);
|
|
--- 143,149 ----
|
|
ssh_msg_recv(ctxt->pam_csock, &buffer);
|
|
if (buffer_get_char(&buffer) != PAM_AUTHTOK)
|
|
goto fail;
|
|
! (*resp)[i].resp = buffer_get_string(&buffer, NULL);
|
|
break;
|
|
case PAM_PROMPT_ECHO_ON:
|
|
buffer_put_cstring(&buffer, msg[i]->msg);
|
|
*************** pam_thread_conv(int n,
|
|
*** 151,157 ****
|
|
ssh_msg_recv(ctxt->pam_csock, &buffer);
|
|
if (buffer_get_char(&buffer) != PAM_AUTHTOK)
|
|
goto fail;
|
|
! resp[i]->resp = buffer_get_string(&buffer, NULL);
|
|
break;
|
|
case PAM_ERROR_MSG:
|
|
buffer_put_cstring(&buffer, msg[i]->msg);
|
|
--- 151,157 ----
|
|
ssh_msg_recv(ctxt->pam_csock, &buffer);
|
|
if (buffer_get_char(&buffer) != PAM_AUTHTOK)
|
|
goto fail;
|
|
! (*resp)[i].resp = buffer_get_string(&buffer, NULL);
|
|
break;
|
|
case PAM_ERROR_MSG:
|
|
buffer_put_cstring(&buffer, msg[i]->msg);
|
|
*************** pam_chauthtok_conv(int n,
|
|
*** 550,569 ****
|
|
for (i = 0; i < n; ++i) {
|
|
switch (msg[i]->msg_style) {
|
|
case PAM_PROMPT_ECHO_OFF:
|
|
! resp[i]->resp =
|
|
read_passphrase(msg[i]->msg, RP_ALLOW_STDIN);
|
|
! resp[i]->resp_retcode = PAM_SUCCESS;
|
|
break;
|
|
case PAM_PROMPT_ECHO_ON:
|
|
fputs(msg[i]->msg, stderr);
|
|
fgets(input, sizeof input, stdin);
|
|
! resp[i]->resp = xstrdup(input);
|
|
! resp[i]->resp_retcode = PAM_SUCCESS;
|
|
break;
|
|
case PAM_ERROR_MSG:
|
|
case PAM_TEXT_INFO:
|
|
fputs(msg[i]->msg, stderr);
|
|
! resp[i]->resp_retcode = PAM_SUCCESS;
|
|
break;
|
|
default:
|
|
goto fail;
|
|
--- 550,569 ----
|
|
for (i = 0; i < n; ++i) {
|
|
switch (msg[i]->msg_style) {
|
|
case PAM_PROMPT_ECHO_OFF:
|
|
! (*resp)[i].resp =
|
|
read_passphrase(msg[i]->msg, RP_ALLOW_STDIN);
|
|
! (*resp)[i].resp_retcode = PAM_SUCCESS;
|
|
break;
|
|
case PAM_PROMPT_ECHO_ON:
|
|
fputs(msg[i]->msg, stderr);
|
|
fgets(input, sizeof input, stdin);
|
|
! (*resp)[i].resp = xstrdup(input);
|
|
! (*resp)[i].resp_retcode = PAM_SUCCESS;
|
|
break;
|
|
case PAM_ERROR_MSG:
|
|
case PAM_TEXT_INFO:
|
|
fputs(msg[i]->msg, stderr);
|
|
! (*resp)[i].resp_retcode = PAM_SUCCESS;
|
|
break;
|
|
default:
|
|
goto fail;
|
|
Index: crypto/openssh/ssh_config
|
|
===================================================================
|
|
RCS file: /home/ncvs/src/crypto/openssh/ssh_config,v
|
|
retrieving revision 1.21
|
|
retrieving revision 1.21.2.1
|
|
diff -p -c -r1.21 -r1.21.2.1
|
|
*** crypto/openssh/ssh_config 23 Apr 2003 17:10:53 -0000 1.21
|
|
--- crypto/openssh/ssh_config 24 Sep 2003 20:23:11 -0000 1.21.2.1
|
|
***************
|
|
*** 35,38 ****
|
|
# Cipher 3des
|
|
# Ciphers aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
|
|
# EscapeChar ~
|
|
! # VersionAddendum FreeBSD-20030423
|
|
--- 35,38 ----
|
|
# Cipher 3des
|
|
# Ciphers aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
|
|
# EscapeChar ~
|
|
! # VersionAddendum FreeBSD-20030924
|
|
Index: crypto/openssh/ssh_config.5
|
|
===================================================================
|
|
RCS file: /home/ncvs/src/crypto/openssh/ssh_config.5,v
|
|
retrieving revision 1.9
|
|
retrieving revision 1.9.2.1
|
|
diff -p -c -r1.9 -r1.9.2.1
|
|
*** crypto/openssh/ssh_config.5 23 Apr 2003 17:10:53 -0000 1.9
|
|
--- crypto/openssh/ssh_config.5 24 Sep 2003 20:23:11 -0000 1.9.2.1
|
|
*************** host key database instead of
|
|
*** 623,629 ****
|
|
Specifies a string to append to the regular version string to identify
|
|
OS- or site-specific modifications.
|
|
The default is
|
|
! .Dq FreeBSD-20030423 .
|
|
.It Cm XAuthLocation
|
|
Specifies the full pathname of the
|
|
.Xr xauth 1
|
|
--- 623,629 ----
|
|
Specifies a string to append to the regular version string to identify
|
|
OS- or site-specific modifications.
|
|
The default is
|
|
! .Dq FreeBSD-20030924 .
|
|
.It Cm XAuthLocation
|
|
Specifies the full pathname of the
|
|
.Xr xauth 1
|
|
Index: crypto/openssh/sshd_config
|
|
===================================================================
|
|
RCS file: /home/ncvs/src/crypto/openssh/sshd_config,v
|
|
retrieving revision 1.32
|
|
retrieving revision 1.32.2.1
|
|
diff -p -c -r1.32 -r1.32.2.1
|
|
*** crypto/openssh/sshd_config 23 Apr 2003 17:10:53 -0000 1.32
|
|
--- crypto/openssh/sshd_config 24 Sep 2003 20:23:11 -0000 1.32.2.1
|
|
***************
|
|
*** 14,20 ****
|
|
# Note that some of FreeBSD's defaults differ from OpenBSD's, and
|
|
# FreeBSD has a few additional options.
|
|
|
|
! #VersionAddendum FreeBSD-20030423
|
|
|
|
#Port 22
|
|
#Protocol 2,1
|
|
--- 14,20 ----
|
|
# Note that some of FreeBSD's defaults differ from OpenBSD's, and
|
|
# FreeBSD has a few additional options.
|
|
|
|
! #VersionAddendum FreeBSD-20030924
|
|
|
|
#Port 22
|
|
#Protocol 2,1
|
|
Index: crypto/openssh/sshd_config.5
|
|
===================================================================
|
|
RCS file: /home/ncvs/src/crypto/openssh/sshd_config.5,v
|
|
retrieving revision 1.11
|
|
retrieving revision 1.11.2.1
|
|
diff -p -c -r1.11 -r1.11.2.1
|
|
*** crypto/openssh/sshd_config.5 23 Apr 2003 17:10:53 -0000 1.11
|
|
--- crypto/openssh/sshd_config.5 24 Sep 2003 20:23:11 -0000 1.11.2.1
|
|
*************** The default is
|
|
*** 650,656 ****
|
|
Specifies a string to append to the regular version string to identify
|
|
OS- or site-specific modifications.
|
|
The default is
|
|
! .Dq FreeBSD-20030423 .
|
|
.It Cm X11DisplayOffset
|
|
Specifies the first display number available for
|
|
.Nm sshd Ns 's
|
|
--- 650,656 ----
|
|
Specifies a string to append to the regular version string to identify
|
|
OS- or site-specific modifications.
|
|
The default is
|
|
! .Dq FreeBSD-20030924 .
|
|
.It Cm X11DisplayOffset
|
|
Specifies the first display number available for
|
|
.Nm sshd Ns 's
|
|
Index: crypto/openssh/version.h
|
|
===================================================================
|
|
RCS file: /home/ncvs/src/crypto/openssh/version.h,v
|
|
retrieving revision 1.20.2.2
|
|
retrieving revision 1.20.2.3
|
|
diff -p -c -r1.20.2.2 -r1.20.2.3
|
|
*** crypto/openssh/version.h 17 Sep 2003 14:47:55 -0000 1.20.2.2
|
|
--- crypto/openssh/version.h 24 Sep 2003 20:23:11 -0000 1.20.2.3
|
|
***************
|
|
*** 5,11 ****
|
|
|
|
#define SSH_VERSION (ssh_version_get())
|
|
#define SSH_VERSION_BASE "OpenSSH_3.6.1p1"
|
|
! #define SSH_VERSION_ADDENDUM "FreeBSD-20030917"
|
|
|
|
const char *ssh_version_get(void);
|
|
void ssh_version_set_addendum(const char *add);
|
|
--- 5,11 ----
|
|
|
|
#define SSH_VERSION (ssh_version_get())
|
|
#define SSH_VERSION_BASE "OpenSSH_3.6.1p1"
|
|
! #define SSH_VERSION_ADDENDUM "FreeBSD-20030924"
|
|
|
|
const char *ssh_version_get(void);
|
|
void ssh_version_set_addendum(const char *add);
|