diff options
author | marius <marius@FreeBSD.org> | 2006-08-28 08:03:21 +0800 |
---|---|---|
committer | marius <marius@FreeBSD.org> | 2006-08-28 08:03:21 +0800 |
commit | 75c48b46e0201b487afb9c14d77f14800bb83387 (patch) | |
tree | bf02b3c424e7d0c9854e213099c4eae0ddc1e0e3 /security/ssh2/files/patch-apps::ssh::ssh-agent2.c | |
parent | 30a34b1a02506e27b1ca4e714658656f30289642 (diff) | |
download | freebsd-ports-gnome-75c48b46e0201b487afb9c14d77f14800bb83387.tar.gz freebsd-ports-gnome-75c48b46e0201b487afb9c14d77f14800bb83387.tar.zst freebsd-ports-gnome-75c48b46e0201b487afb9c14d77f14800bb83387.zip |
- Cast the arguments of ssh_conn_send_channel_data_type() and
ssh_encode_{array_alloc,buffer}() calls as appropriate in order to
fix argument size problems on 64-bit platforms and that manifest
themselves on amd64 and ia64. [1]
- Allow the tcsetattr(3) calls in ssh_rl_{restore,set}_tty_modes_for_fd()
to be interrupted by signal. This fixes occasional problems when
connecting to a host for the first time.
- Use the base zlib instead of the one shipping with SSH; although the
latter has an enhancement allowing a minor SSH-specific optimization,
using the base one has the benefit of not needing to track security
vulnerabilities of zlib in this port (SSH 3.2.9.1 ships with zlib
1.1.4 which is not know to be vulnerable though).
- Try to make the description of the WITHOUT_X11 option of the port
Makefile to be more sentence-like.
PR: 98016 [1]
Approved by: netchild
Obtained from: NetBSD [1]
Diffstat (limited to 'security/ssh2/files/patch-apps::ssh::ssh-agent2.c')
-rw-r--r-- | security/ssh2/files/patch-apps::ssh::ssh-agent2.c | 11 |
1 files changed, 11 insertions, 0 deletions
diff --git a/security/ssh2/files/patch-apps::ssh::ssh-agent2.c b/security/ssh2/files/patch-apps::ssh::ssh-agent2.c new file mode 100644 index 000000000000..5ca8b5130566 --- /dev/null +++ b/security/ssh2/files/patch-apps::ssh::ssh-agent2.c @@ -0,0 +1,11 @@ +--- apps/ssh/ssh-agent2.c.orig 2003-12-03 15:17:27.000000000 +0200 ++++ apps/ssh/ssh-agent2.c +@@ -1802,7 +1802,7 @@ void ssh_agenti_ssh1_encode_mp(SshBuffer + num_buf = ssh_xmalloc(num_buf_len); + ssh_mp_get_buf(num_buf, num_buf_len, n); + ssh_encode_buffer(buffer, +- SSH_FORMAT_DATA, len_buf, 2, ++ SSH_FORMAT_DATA, len_buf, (size_t) 2, + SSH_FORMAT_DATA, num_buf, num_buf_len, + SSH_FORMAT_END); + ssh_xfree(num_buf); |