aboutsummaryrefslogtreecommitdiffstats
path: root/main
diff options
context:
space:
mode:
authorTimo Teräs <timo.teras@iki.fi>2015-03-19 10:50:05 +0200
committerTimo Teräs <timo.teras@iki.fi>2015-03-19 10:55:17 +0200
commit6fa5bf8273d6a98c5b0ee8299a2e0ece56f03aae (patch)
tree64b54aa9e07dfc5c098f7bc94265c992177feefd /main
parent270c6379e4f31db8c405a38cd01a816527a1fd6c (diff)
downloadaports-6fa5bf8273d6a98c5b0ee8299a2e0ece56f03aae.tar.bz2
aports-6fa5bf8273d6a98c5b0ee8299a2e0ece56f03aae.tar.xz
main/openssh: upgrade to 6.8p1
rebase manually the hpn patch
Diffstat (limited to 'main')
-rw-r--r--main/openssh/APKBUILD26
-rw-r--r--main/openssh/openssh-fix-includes.diff12
-rw-r--r--main/openssh/openssh-fix-utmp.diff26
-rw-r--r--main/openssh/openssh6.8-dynwindows.diff (renamed from main/openssh/openssh6.7-dynwindows.diff)272
4 files changed, 152 insertions, 184 deletions
diff --git a/main/openssh/APKBUILD b/main/openssh/APKBUILD
index 7e0dbc17fd..6f784f69ca 100644
--- a/main/openssh/APKBUILD
+++ b/main/openssh/APKBUILD
@@ -1,6 +1,6 @@
# Maintainer: Natanael Copa <ncopa@alpinelinux.org>
pkgname=openssh
-pkgver=6.7_p1
+pkgver=6.8_p1
_myver=${pkgver%_*}${pkgver#*_}
pkgrel=0
pkgdesc="Port of OpenBSD's free SSH release"
@@ -12,9 +12,8 @@ depends="openssh-client"
makedepends="openssl-dev zlib-dev"
subpackages="$pkgname-doc $pkgname-client $pkgname-keysign"
source="ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/$pkgname-$_myver.tar.gz
- openssh6.7-dynwindows.diff
openssh6.5-peaktput.diff
- openssh-fix-includes.diff
+ openssh6.8-dynwindows.diff
openssh-fix-utmp.diff
sshd.initd
sshd.confd
@@ -107,27 +106,24 @@ keysign() {
"$subpkgdir"/usr/lib/ssh/ || return 1
}
-md5sums="3246aa79317b1d23cae783a3bf8275d6 openssh-6.7p1.tar.gz
-2121bdcba3751877b13f2f90802d4399 openssh6.7-dynwindows.diff
+md5sums="08f72de6751acfbd0892b5f003922701 openssh-6.8p1.tar.gz
cd52fe99cb4b7d0d847bf5d710d93564 openssh6.5-peaktput.diff
-7c86680602f7ad71b0773d9e98a30d73 openssh-fix-includes.diff
-f7d9d6f96940ef66bd3c3a0aa27e57a7 openssh-fix-utmp.diff
+c6e29d7d88529a66d857657753f39694 openssh6.8-dynwindows.diff
+37fbfe9cfb9a5e2454382ea8c79ed2e1 openssh-fix-utmp.diff
bcf990d4ef7ff446160cde7dbd32bf1f sshd.initd
b35e9f3829f4cfca07168fcba98749c7 sshd.confd
2dd7e366607e95f9762273067309fd6e openssh-sftp-interactive.diff"
-sha256sums="b2f8394eae858dabbdef7dac10b99aec00c95462753e80342e530bbb6f725507 openssh-6.7p1.tar.gz
-7d02930524d1357232770e9dc5a92746e654d6dafcbd5762c8618b059f0bf7b9 openssh6.7-dynwindows.diff
+sha256sums="3ff64ce73ee124480b5bf767b9830d7d3c03bbcb6abe716b78f0192c37ce160e openssh-6.8p1.tar.gz
bf49212e47a86d10650f739532cea514a310925e6445b4f8011031b6b55f3249 openssh6.5-peaktput.diff
-c3189ba0e17e60e83851ac2d6f18ad5b08cb90cccfce31d61cccb9fd76d44d59 openssh-fix-includes.diff
-f2748da45d0bc31055727f8c80d93e1872cc043ced3202e2f6d150aca3c08dde openssh-fix-utmp.diff
+bf0f00bd88a7224ea0618f6e347a6a805c4e5acd869196725a3923d711ff1246 openssh6.8-dynwindows.diff
+1c85437fd94aa4fc269e6297e4eb790baa98c39949ec0410792c09ee31ba9782 openssh-fix-utmp.diff
2a9889ab224be7202ece80a7085aa3e85bbba9432467031b436dcd77cb92a2ac sshd.initd
29c6d57ac3ec6018cadc6ba6cd9b90c9ed46e20049b970fdcc68ee2481a2ee41 sshd.confd
4ce1ad5f767c0f4e854a0cfeef0e2e400f333c649e552df1ecc317e6a6557376 openssh-sftp-interactive.diff"
-sha512sums="2469dfcd289948374843311dd9e5f7e144ce1cebd4bfce0d387d0b75cb59f3e1af1b9ebf96bd4ab6407dfa77a013c5d25742971053e61cae2541054aeaca559d openssh-6.7p1.tar.gz
-4985134b4b1b06d9c8bc81af9f0e0690c3f23d78f3df2af70cd0030cc7ab5bd8d9aad60031ce8069902c6bb8ae6dde754aa87d6fd4587cdc6e99e7bb33f0d1bb openssh6.7-dynwindows.diff
+sha512sums="7c4457e4525a56cdabb1164ffaf6bed1c094294ae7d06dd3484dcffcd87738fcffe7019b6cae0032c254b0389832644522d5a9f2603b50637ffeb9999b5fcede openssh-6.8p1.tar.gz
e041398e177674f698480e23be037160bd07b751c754956a3ddf1b964da24c85e826fb75e7c23c9826d36761da73d08db9583c047d58a08dc7b2149a949075b1 openssh6.5-peaktput.diff
-70e2c6613ab77ec379e03ddf029c1c38e5d852bb225db40ceaa63e642d58b0261fa7c954b288710736bb1dc71f8057f2598ea0d1f5b1214135fa5e9541d5f05a openssh-fix-includes.diff
-cc909f68d9da1b264926973b96d36162b5c588299c98d62f526faf2ef1273d98bb8d8dea4d482770a2aef88bcbf15fa61144401aef9ab916c15e1623bcf449b5 openssh-fix-utmp.diff
+307ca56d2bae53f2f2852a695de440843a457c4000524d1b7dbcf2f46f70ae4f8ba7309273b62287ad5eef2005e2911dd737a0f55605352397b8f557d78e18df openssh6.8-dynwindows.diff
+f35fffcd26635249ce5d820e7b3e406e586f2d2d7f6a045f221e2f9fb53aebc1ab1dd1e603b3389462296ed77921a1d08456e7aaa3825cbed08f405b381a58e1 openssh-fix-utmp.diff
eeafefcb8a3357b498591480b39dc0116ab3440c88faeaeaddeac0b860f9e268abe6f603bc27893b79945acde06a45a7616d1bdc6ca27201cd8dc522f49b207e sshd.initd
b9ae816af54a55e134a9307e376f05367b815f1b3fd545c2a2c312d18aedcf907f413e8bad8db980cdd9aad4011a72a79e1e94594f69500939a9cb46287f2f81 sshd.confd
c1d09c65dbc347f0904edc30f91aa9a24b0baee50309536182455b544f1e3f85a8cecfa959e32be8b101d8282ef06dde3febbbc3f315489339dcf04155c859a9 openssh-sftp-interactive.diff"
diff --git a/main/openssh/openssh-fix-includes.diff b/main/openssh/openssh-fix-includes.diff
deleted file mode 100644
index 33c0f8a2fe..0000000000
--- a/main/openssh/openssh-fix-includes.diff
+++ /dev/null
@@ -1,12 +0,0 @@
---- openssh-6.2p2/includes.h.orig
-+++ openssh-6.2p2/includes.h
-@@ -21,6 +21,8 @@
- #define _GNU_SOURCE /* activate extra prototypes for glibc */
-
- #include <sys/types.h>
-+#include <sys/param.h>
-+#include <sys/time.h>
- #include <sys/socket.h> /* For CMSG_* */
-
- #ifdef HAVE_LIMITS_H
-
diff --git a/main/openssh/openssh-fix-utmp.diff b/main/openssh/openssh-fix-utmp.diff
index 6bfe49df65..275e80590d 100644
--- a/main/openssh/openssh-fix-utmp.diff
+++ b/main/openssh/openssh-fix-utmp.diff
@@ -1,21 +1,11 @@
---- openssh-6.2p2/loginrec.c.orig
-+++ openssh-6.2p2/loginrec.c
-@@ -784,12 +784,12 @@
+--- openssh-6.8p1.orig/loginrec.c 2015-03-17 07:49:20.000000000 -0200
++++ openssh-6.8p1/loginrec.c 2015-03-19 10:45:45.780276841 -0200
+@@ -783,7 +783,7 @@
+ if (li->hostaddr.sa.sa_family == AF_INET)
+ utx->ut_addr = li->hostaddr.sa_in.sin_addr.s_addr;
+ # endif
+-# ifdef HAVE_ADDR_V6_IN_UTMP
++# ifdef HAVE_ADDR_V6_IN_UTMPX
/* this is just a 128-bit IPv6 address */
if (li->hostaddr.sa.sa_family == AF_INET6) {
sa6 = ((struct sockaddr_in6 *)&li->hostaddr.sa);
-- memcpy(ut->ut_addr_v6, sa6->sin6_addr.s6_addr, 16);
-+ memcpy(utx->ut_addr_v6, sa6->sin6_addr.s6_addr, 16);
- if (IN6_IS_ADDR_V4MAPPED(&sa6->sin6_addr)) {
-- ut->ut_addr_v6[0] = ut->ut_addr_v6[3];
-- ut->ut_addr_v6[1] = 0;
-- ut->ut_addr_v6[2] = 0;
-- ut->ut_addr_v6[3] = 0;
-+ utx->ut_addr_v6[0] = utx->ut_addr_v6[3];
-+ utx->ut_addr_v6[1] = 0;
-+ utx->ut_addr_v6[2] = 0;
-+ utx->ut_addr_v6[3] = 0;
- }
- }
- # endif
-
diff --git a/main/openssh/openssh6.7-dynwindows.diff b/main/openssh/openssh6.8-dynwindows.diff
index b49e7688b0..161173dbb3 100644
--- a/main/openssh/openssh6.7-dynwindows.diff
+++ b/main/openssh/openssh6.8-dynwindows.diff
@@ -1,6 +1,6 @@
-diff -ru openssh-6.7p1.orig/buffer.h openssh-6.7p1/buffer.h
---- openssh-6.7p1.orig/buffer.h 2014-05-15 07:33:44.000000000 -0300
-+++ openssh-6.7p1/buffer.h 2014-11-21 09:42:27.601954473 -0200
+diff -ruNp openssh-6.8p1.orig/buffer.h openssh-6.8p1/buffer.h
+--- openssh-6.8p1.orig/buffer.h 2015-03-17 07:49:20.000000000 -0200
++++ openssh-6.8p1/buffer.h 2015-03-19 10:13:33.493591054 -0200
@@ -16,6 +16,9 @@
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
@@ -11,10 +11,10 @@ diff -ru openssh-6.7p1.orig/buffer.h openssh-6.7p1/buffer.h
/* Emulation wrappers for legacy OpenSSH buffer API atop sshbuf */
#ifndef BUFFER_H
-diff -ru openssh-6.7p1.orig/channels.c openssh-6.7p1/channels.c
---- openssh-6.7p1.orig/channels.c 2014-07-18 07:11:25.000000000 -0300
-+++ openssh-6.7p1/channels.c 2014-11-21 09:42:27.601954473 -0200
-@@ -179,8 +179,14 @@
+diff -ruNp openssh-6.8p1.orig/channels.c openssh-6.8p1/channels.c
+--- openssh-6.8p1.orig/channels.c 2015-03-17 07:49:20.000000000 -0200
++++ openssh-6.8p1/channels.c 2015-03-19 10:13:33.496924388 -0200
+@@ -183,8 +183,14 @@ static void port_open_helper(Channel *c,
static int connect_next(struct channel_connect *);
static void channel_connect_ctx_free(struct channel_connect *);
@@ -29,7 +29,7 @@ diff -ru openssh-6.7p1.orig/channels.c openssh-6.7p1/channels.c
Channel *
channel_by_id(int id)
{
-@@ -329,6 +335,7 @@
+@@ -333,6 +339,7 @@ channel_new(char *ctype, int type, int r
c->local_window_max = window;
c->local_consumed = 0;
c->local_maxpacket = maxpack;
@@ -37,7 +37,7 @@ diff -ru openssh-6.7p1.orig/channels.c openssh-6.7p1/channels.c
c->remote_id = -1;
c->remote_name = xstrdup(remote_name);
c->remote_window = 0;
-@@ -833,11 +840,35 @@
+@@ -837,11 +844,35 @@ channel_pre_open_13(Channel *c, fd_set *
FD_SET(c->sock, writeset);
}
@@ -73,7 +73,7 @@ diff -ru openssh-6.7p1.orig/channels.c openssh-6.7p1/channels.c
if (c->istate == CHAN_INPUT_OPEN &&
limit > 0 &&
buffer_len(&c->input) < limit &&
-@@ -1842,14 +1873,21 @@
+@@ -1846,14 +1877,21 @@ channel_check_window(Channel *c)
c->local_maxpacket*3) ||
c->local_window < c->local_window_max/2) &&
c->local_consumed > 0) {
@@ -97,7 +97,7 @@ diff -ru openssh-6.7p1.orig/channels.c openssh-6.7p1/channels.c
c->local_consumed = 0;
}
return 1;
-@@ -2781,6 +2819,15 @@
+@@ -2794,6 +2832,15 @@ channel_fwd_bind_addr(const char *listen
return addr;
}
@@ -113,7 +113,7 @@ diff -ru openssh-6.7p1.orig/channels.c openssh-6.7p1/channels.c
static int
channel_setup_fwd_listener_tcpip(int type, struct Forward *fwd,
int *allocated_listen_port, struct ForwardOptions *fwd_opts)
-@@ -2905,9 +2952,15 @@
+@@ -2918,9 +2965,15 @@ channel_setup_fwd_listener_tcpip(int typ
}
/* Allocate a channel number for the socket. */
@@ -129,7 +129,7 @@ diff -ru openssh-6.7p1.orig/channels.c openssh-6.7p1/channels.c
c->path = xstrdup(host);
c->host_port = fwd->connect_port;
c->listening_addr = addr == NULL ? NULL : xstrdup(addr);
-@@ -3939,10 +3992,17 @@
+@@ -3952,10 +4005,17 @@ x11_create_display_inet(int x11_display_
*chanids = xcalloc(num_socks + 1, sizeof(**chanids));
for (n = 0; n < num_socks; n++) {
sock = socks[n];
@@ -147,10 +147,10 @@ diff -ru openssh-6.7p1.orig/channels.c openssh-6.7p1/channels.c
nc->single_connection = single_connection;
(*chanids)[n] = nc->self;
}
-diff -ru openssh-6.7p1.orig/channels.h openssh-6.7p1/channels.h
---- openssh-6.7p1.orig/channels.h 2014-07-18 07:11:26.000000000 -0300
-+++ openssh-6.7p1/channels.h 2014-11-21 09:42:27.601954473 -0200
-@@ -134,8 +134,10 @@
+diff -ruNp openssh-6.8p1.orig/channels.h openssh-6.8p1/channels.h
+--- openssh-6.8p1.orig/channels.h 2015-03-17 07:49:20.000000000 -0200
++++ openssh-6.8p1/channels.h 2015-03-19 10:13:33.496924388 -0200
+@@ -134,8 +134,10 @@ struct Channel {
u_int local_window_max;
u_int local_consumed;
u_int local_maxpacket;
@@ -161,7 +161,7 @@ diff -ru openssh-6.7p1.orig/channels.h openssh-6.7p1/channels.h
char *ctype; /* type */
-@@ -171,8 +173,10 @@
+@@ -171,8 +173,10 @@ struct Channel {
/* default window/packet sizes for tcp/x11-fwd-channel */
#define CHAN_SES_PACKET_DEFAULT (32*1024)
#define CHAN_SES_WINDOW_DEFAULT (64*CHAN_SES_PACKET_DEFAULT)
@@ -172,7 +172,7 @@ diff -ru openssh-6.7p1.orig/channels.h openssh-6.7p1/channels.h
#define CHAN_X11_PACKET_DEFAULT (16*1024)
#define CHAN_X11_WINDOW_DEFAULT (4*CHAN_X11_PACKET_DEFAULT)
-@@ -311,4 +315,7 @@
+@@ -311,4 +315,7 @@ void chan_rcvd_ieof(Channel *);
void chan_write_failed(Channel *);
void chan_obuf_empty(Channel *);
@@ -180,10 +180,10 @@ diff -ru openssh-6.7p1.orig/channels.h openssh-6.7p1/channels.h
+void channel_set_hpn(int, int);
+
#endif
-diff -ru openssh-6.7p1.orig/clientloop.c openssh-6.7p1/clientloop.c
---- openssh-6.7p1.orig/clientloop.c 2014-07-18 07:11:26.000000000 -0300
-+++ openssh-6.7p1/clientloop.c 2014-11-21 09:42:27.601954473 -0200
-@@ -1899,9 +1899,15 @@
+diff -ruNp openssh-6.8p1.orig/clientloop.c openssh-6.8p1/clientloop.c
+--- openssh-6.8p1.orig/clientloop.c 2015-03-17 07:49:20.000000000 -0200
++++ openssh-6.8p1/clientloop.c 2015-03-19 10:16:54.303593060 -0200
+@@ -1909,9 +1909,15 @@ client_request_x11(const char *request_t
sock = x11_connect_display();
if (sock < 0)
return NULL;
@@ -199,24 +199,25 @@ diff -ru openssh-6.7p1.orig/clientloop.c openssh-6.7p1/clientloop.c
c->force_drain = 1;
return c;
}
-@@ -1921,9 +1927,15 @@
- sock = ssh_get_authentication_socket();
- if (sock < 0)
+@@ -1934,10 +1940,16 @@ client_request_agent(const char *request
+ __func__, ssh_err(r));
return NULL;
+ }
+ if (options.hpn_disabled)
c = channel_new("authentication agent connection",
SSH_CHANNEL_OPEN, sock, sock, -1,
- CHAN_X11_WINDOW_DEFAULT, CHAN_TCP_PACKET_DEFAULT, 0,
-+ CHAN_X11_WINDOW_DEFAULT, CHAN_TCP_WINDOW_DEFAULT, 0,
-+ "authentication agent connection", 1);
++ CHAN_X11_WINDOW_DEFAULT, CHAN_TCP_WINDOW_DEFAULT, 0,
+ "authentication agent connection", 1);
+ else
+ c = channel_new("authentication agent connection",
+ SSH_CHANNEL_OPEN, sock, sock, -1,
+ options.hpn_buffer_size, options.hpn_buffer_size, 0,
- "authentication agent connection", 1);
++ "authentication agent connection", 1);
c->force_drain = 1;
return c;
-@@ -1951,10 +1963,18 @@
+ }
+@@ -1964,10 +1976,18 @@ client_request_tun_fwd(int tun_mode, int
return -1;
}
@@ -236,28 +237,25 @@ diff -ru openssh-6.7p1.orig/clientloop.c openssh-6.7p1/clientloop.c
#if defined(SSH_TUN_FILTER)
if (options.tun_open == SSH_TUNMODE_POINTOPOINT)
channel_register_filter(c->self, sys_tun_infilter,
-diff -ru openssh-6.7p1.orig/compat.c openssh-6.7p1/compat.c
---- openssh-6.7p1.orig/compat.c 2014-04-20 06:33:59.000000000 -0300
-+++ openssh-6.7p1/compat.c 2014-11-21 09:42:27.601954473 -0200
-@@ -175,6 +175,15 @@
- if (match_pattern_list(version, check[i].pat,
- strlen(check[i].pat), 0) == 1) {
- datafellows = check[i].bugs;
+diff -ruNp openssh-6.8p1.orig/compat.c openssh-6.8p1/compat.c
+--- openssh-6.8p1.orig/compat.c 2015-03-17 07:49:20.000000000 -0200
++++ openssh-6.8p1/compat.c 2015-03-19 10:25:00.433597851 -0200
+@@ -177,6 +177,12 @@ compat_datafellows(const char *version)
+ debug("match: %s pat %s compat 0x%08x",
+ version, check[i].pat, check[i].bugs);
+ datafellows = check[i].bugs; /* XXX for now */
+ /* Check to see if the remote side is OpenSSH and not HPN */
-+ if(strstr(version,"OpenSSH") != NULL)
-+ {
-+ if (strstr(version,"hpn") == NULL)
-+ {
-+ datafellows |= SSH_BUG_LARGEWINDOW;
-+ debug("Remote is NON-HPN aware");
-+ }
++ if (strstr(version,"OpenSSH") != NULL &&
++ strstr(version,"hpn") == NULL) {
++ datafellows |= SSH_BUG_LARGEWINDOW;
++ debug("Remote is NON-HPN aware");
+ }
- debug("match: %s pat %s compat 0x%08x",
- version, check[i].pat, datafellows);
- return;
-diff -ru openssh-6.7p1.orig/compat.h openssh-6.7p1/compat.h
---- openssh-6.7p1.orig/compat.h 2014-04-20 06:25:31.000000000 -0300
-+++ openssh-6.7p1/compat.h 2014-11-21 09:47:51.058623939 -0200
+ return check[i].bugs;
+ }
+ }
+diff -ruNp openssh-6.8p1.orig/compat.h openssh-6.8p1/compat.h
+--- openssh-6.8p1.orig/compat.h 2015-03-17 07:49:20.000000000 -0200
++++ openssh-6.8p1/compat.h 2015-03-19 10:13:33.496924388 -0200
@@ -60,6 +60,7 @@
#define SSH_NEW_OPENSSH 0x04000000
#define SSH_BUG_DYNAMIC_RPORT 0x08000000
@@ -266,19 +264,19 @@ diff -ru openssh-6.7p1.orig/compat.h openssh-6.7p1/compat.h
void enable_compat13(void);
void enable_compat20(void);
-diff -ru openssh-6.7p1.orig/readconf.c openssh-6.7p1/readconf.c
---- openssh-6.7p1.orig/readconf.c 2014-07-18 07:11:26.000000000 -0300
-+++ openssh-6.7p1/readconf.c 2014-11-21 09:49:31.348624811 -0200
-@@ -151,6 +151,7 @@
- oCanonicalDomains, oCanonicalizeHostname, oCanonicalizeMaxDots,
+diff -ruNp openssh-6.8p1.orig/readconf.c openssh-6.8p1/readconf.c
+--- openssh-6.8p1.orig/readconf.c 2015-03-17 07:49:20.000000000 -0200
++++ openssh-6.8p1/readconf.c 2015-03-19 10:26:16.100265293 -0200
+@@ -157,6 +157,7 @@ typedef enum {
oCanonicalizeFallbackLocal, oCanonicalizePermittedCNAMEs,
- oStreamLocalBindMask, oStreamLocalBindUnlink,
+ oStreamLocalBindMask, oStreamLocalBindUnlink, oRevokedHostKeys,
+ oFingerprintHash, oUpdateHostkeys, oHostbasedKeyTypes,
+ oTcpRcvBufPoll, oTcpRcvBuf, oHPNDisabled, oHPNBufferSize,
oIgnoredUnknownOption, oDeprecated, oUnsupported
} OpCodes;
-@@ -267,6 +268,11 @@
- { "streamlocalbindunlink", oStreamLocalBindUnlink },
+@@ -277,6 +278,11 @@ static struct {
+ { "hostbasedkeytypes", oHostbasedKeyTypes },
{ "ignoreunknown", oIgnoreUnknown },
+ { "tcprcvbufpoll", oTcpRcvBufPoll },
@@ -289,7 +287,7 @@ diff -ru openssh-6.7p1.orig/readconf.c openssh-6.7p1/readconf.c
{ NULL, oBadOption }
};
-@@ -877,6 +883,18 @@
+@@ -904,6 +910,18 @@ parse_time:
intptr = &options->check_host_ip;
goto parse_flag;
@@ -308,7 +306,7 @@ diff -ru openssh-6.7p1.orig/readconf.c openssh-6.7p1/readconf.c
case oVerifyHostKeyDNS:
intptr = &options->verify_host_key_dns;
multistate_ptr = multistate_yesnoask;
-@@ -1039,6 +1057,10 @@
+@@ -1067,6 +1085,10 @@ parse_int:
intptr = &options->connection_attempts;
goto parse_int;
@@ -319,7 +317,7 @@ diff -ru openssh-6.7p1.orig/readconf.c openssh-6.7p1/readconf.c
case oCipher:
intptr = &options->cipher;
arg = strdelim(&s);
-@@ -1602,6 +1624,10 @@
+@@ -1665,6 +1687,10 @@ initialize_options(Options * options)
options->ip_qos_interactive = -1;
options->ip_qos_bulk = -1;
options->request_tty = -1;
@@ -330,7 +328,7 @@ diff -ru openssh-6.7p1.orig/readconf.c openssh-6.7p1/readconf.c
options->proxy_use_fdpass = -1;
options->ignored_unknown = NULL;
options->num_canonical_domains = 0;
-@@ -1752,6 +1778,28 @@
+@@ -1819,6 +1845,28 @@ fill_default_options(Options * options)
options->server_alive_interval = 0;
if (options->server_alive_count_max == -1)
options->server_alive_count_max = 3;
@@ -359,10 +357,10 @@ diff -ru openssh-6.7p1.orig/readconf.c openssh-6.7p1/readconf.c
if (options->control_master == -1)
options->control_master = 0;
if (options->control_persist == -1) {
-diff -ru openssh-6.7p1.orig/readconf.h openssh-6.7p1/readconf.h
---- openssh-6.7p1.orig/readconf.h 2014-07-18 07:11:26.000000000 -0300
-+++ openssh-6.7p1/readconf.h 2014-11-21 09:42:27.605287806 -0200
-@@ -57,6 +57,10 @@
+diff -ruNp openssh-6.8p1.orig/readconf.h openssh-6.8p1/readconf.h
+--- openssh-6.8p1.orig/readconf.h 2015-03-17 07:49:20.000000000 -0200
++++ openssh-6.8p1/readconf.h 2015-03-19 10:13:33.496924388 -0200
+@@ -57,6 +57,10 @@ typedef struct {
int compression_level; /* Compression level 1 (fast) to 9
* (best). */
int tcp_keep_alive; /* Set SO_KEEPALIVE. */
@@ -373,19 +371,19 @@ diff -ru openssh-6.7p1.orig/readconf.h openssh-6.7p1/readconf.h
int ip_qos_interactive; /* IP ToS/DSCP/class for interactive */
int ip_qos_bulk; /* IP ToS/DSCP/class for bulk traffic */
LogLevel log_level; /* Level for logging. */
-diff -ru openssh-6.7p1.orig/scp.c openssh-6.7p1/scp.c
---- openssh-6.7p1.orig/scp.c 2014-07-02 08:29:01.000000000 -0300
-+++ openssh-6.7p1/scp.c 2014-11-21 09:42:27.605287806 -0200
-@@ -749,7 +749,7 @@
+diff -ruNp openssh-6.8p1.orig/scp.c openssh-6.8p1/scp.c
+--- openssh-6.8p1.orig/scp.c 2015-03-17 07:49:20.000000000 -0200
++++ openssh-6.8p1/scp.c 2015-03-19 10:14:40.790258386 -0200
+@@ -750,7 +750,7 @@ source(int argc, char **argv)
off_t i, statbytes;
size_t amt, nr;
int fd = -1, haderr, indx;
-- char *last, *name, buf[2048], encname[MAXPATHLEN];
-+ char *last, *name, buf[16384], encname[MAXPATHLEN];
+- char *last, *name, buf[2048], encname[PATH_MAX];
++ char *last, *name, buf[16384], encname[PATH_MAX];
int len;
for (indx = 0; indx < argc; ++indx) {
-@@ -918,7 +918,7 @@
+@@ -919,7 +919,7 @@ sink(int argc, char **argv)
off_t size, statbytes;
unsigned long long ull;
int setimes, targisdir, wrerrno = 0;
@@ -394,10 +392,10 @@ diff -ru openssh-6.7p1.orig/scp.c openssh-6.7p1/scp.c
struct timeval tv[2];
#define atime tv[0]
-diff -ru openssh-6.7p1.orig/servconf.c openssh-6.7p1/servconf.c
---- openssh-6.7p1.orig/servconf.c 2014-07-18 07:11:26.000000000 -0300
-+++ openssh-6.7p1/servconf.c 2014-11-21 09:42:27.605287806 -0200
-@@ -154,6 +154,9 @@
+diff -ruNp openssh-6.8p1.orig/servconf.c openssh-6.8p1/servconf.c
+--- openssh-6.8p1.orig/servconf.c 2015-03-17 07:49:20.000000000 -0200
++++ openssh-6.8p1/servconf.c 2015-03-19 10:27:19.056932557 -0200
+@@ -159,6 +159,9 @@ initialize_server_options(ServerOptions
options->revoked_keys_file = NULL;
options->trusted_user_ca_keys = NULL;
options->authorized_principals_file = NULL;
@@ -407,19 +405,15 @@ diff -ru openssh-6.7p1.orig/servconf.c openssh-6.7p1/servconf.c
options->ip_qos_interactive = -1;
options->ip_qos_bulk = -1;
options->version_addendum = NULL;
-@@ -162,6 +165,11 @@
+@@ -175,6 +178,7 @@ option_clear_or_none(const char *o)
void
fill_default_server_options(ServerOptions *options)
{
-+ /* needed for hpn socket tests */
-+ int sock;
-+ int socksize;
-+ int socksizelen = sizeof(int);
-+
++ int sock, socksize, socksizelen = sizeof(int);
+ int i;
+
/* Portable-specific options */
- if (options->use_pam == -1)
- options->use_pam = 0;
-@@ -302,6 +310,41 @@
+@@ -321,6 +325,41 @@ fill_default_server_options(ServerOption
}
if (options->permit_tun == -1)
options->permit_tun = SSH_TUNMODE_NO;
@@ -461,7 +455,7 @@ diff -ru openssh-6.7p1.orig/servconf.c openssh-6.7p1/servconf.c
if (options->ip_qos_interactive == -1)
options->ip_qos_interactive = IPTOS_LOWDELAY;
if (options->ip_qos_bulk == -1)
-@@ -357,6 +400,7 @@
+@@ -396,6 +435,7 @@ typedef enum {
sUsePrivilegeSeparation, sAllowAgentForwarding,
sHostCertificate,
sRevokedKeys, sTrustedUserCAKeys, sAuthorizedPrincipalsFile,
@@ -469,7 +463,7 @@ diff -ru openssh-6.7p1.orig/servconf.c openssh-6.7p1/servconf.c
sKexAlgorithms, sIPQoS, sVersionAddendum,
sAuthorizedKeysCommand, sAuthorizedKeysCommandUser,
sAuthenticationMethods, sHostKeyAgent, sPermitUserRC,
-@@ -483,6 +527,9 @@
+@@ -524,6 +564,9 @@ static struct {
{ "revokedkeys", sRevokedKeys, SSHCFG_ALL },
{ "trustedusercakeys", sTrustedUserCAKeys, SSHCFG_ALL },
{ "authorizedprincipalsfile", sAuthorizedPrincipalsFile, SSHCFG_ALL },
@@ -479,7 +473,7 @@ diff -ru openssh-6.7p1.orig/servconf.c openssh-6.7p1/servconf.c
{ "kexalgorithms", sKexAlgorithms, SSHCFG_GLOBAL },
{ "ipqos", sIPQoS, SSHCFG_ALL },
{ "authorizedkeyscommand", sAuthorizedKeysCommand, SSHCFG_ALL },
-@@ -518,6 +565,7 @@
+@@ -560,6 +603,7 @@ parse_token(const char *cp, const char *
for (i = 0; keywords[i].name; i++)
if (strcasecmp(cp, keywords[i].name) == 0) {
@@ -487,7 +481,7 @@ diff -ru openssh-6.7p1.orig/servconf.c openssh-6.7p1/servconf.c
*flags = keywords[i].flags;
return keywords[i].opcode;
}
-@@ -1060,6 +1108,19 @@
+@@ -1104,6 +1148,19 @@ process_server_config_line(ServerOptions
*intptr = value;
break;
@@ -507,10 +501,10 @@ diff -ru openssh-6.7p1.orig/servconf.c openssh-6.7p1/servconf.c
case sIgnoreUserKnownHosts:
intptr = &options->ignore_user_known_hosts;
goto parse_flag;
-diff -ru openssh-6.7p1.orig/servconf.h openssh-6.7p1/servconf.h
---- openssh-6.7p1.orig/servconf.h 2014-07-18 07:11:26.000000000 -0300
-+++ openssh-6.7p1/servconf.h 2014-11-21 09:42:27.605287806 -0200
-@@ -166,6 +166,9 @@
+diff -ruNp openssh-6.8p1.orig/servconf.h openssh-6.8p1/servconf.h
+--- openssh-6.8p1.orig/servconf.h 2015-03-17 07:49:20.000000000 -0200
++++ openssh-6.8p1/servconf.h 2015-03-19 10:13:33.500257721 -0200
+@@ -168,6 +168,9 @@ typedef struct {
char *adm_forced_command;
int use_pam; /* Enable auth via PAM */
@@ -520,10 +514,10 @@ diff -ru openssh-6.7p1.orig/servconf.h openssh-6.7p1/servconf.h
int permit_tun;
-diff -ru openssh-6.7p1.orig/serverloop.c openssh-6.7p1/serverloop.c
---- openssh-6.7p1.orig/serverloop.c 2014-08-19 04:14:17.000000000 -0300
-+++ openssh-6.7p1/serverloop.c 2014-11-21 09:42:27.605287806 -0200
-@@ -1047,8 +1047,12 @@
+diff -ruNp openssh-6.8p1.orig/serverloop.c openssh-6.8p1/serverloop.c
+--- openssh-6.8p1.orig/serverloop.c 2015-03-17 07:49:20.000000000 -0200
++++ openssh-6.8p1/serverloop.c 2015-03-19 10:13:33.500257721 -0200
+@@ -1051,8 +1051,12 @@ server_request_tun(void)
sock = tun_open(tun, mode);
if (sock < 0)
goto done;
@@ -536,7 +530,7 @@ diff -ru openssh-6.7p1.orig/serverloop.c openssh-6.7p1/serverloop.c
c->datagram = 1;
#if defined(SSH_TUN_FILTER)
if (mode == SSH_TUNMODE_POINTOPOINT)
-@@ -1084,6 +1088,8 @@
+@@ -1088,6 +1092,8 @@ server_request_session(void)
c = channel_new("session", SSH_CHANNEL_LARVAL,
-1, -1, -1, /*window size*/0, CHAN_SES_PACKET_DEFAULT,
0, "server-session", 1);
@@ -545,10 +539,10 @@ diff -ru openssh-6.7p1.orig/serverloop.c openssh-6.7p1/serverloop.c
if (session_open(the_authctxt, c->self) != 1) {
debug("session open failed, free channel %d", c->self);
channel_free(c);
-diff -ru openssh-6.7p1.orig/session.c openssh-6.7p1/session.c
---- openssh-6.7p1.orig/session.c 2014-07-18 07:11:26.000000000 -0300
-+++ openssh-6.7p1/session.c 2014-11-21 09:42:27.605287806 -0200
-@@ -219,6 +219,7 @@
+diff -ruNp openssh-6.8p1.orig/session.c openssh-6.8p1/session.c
+--- openssh-6.8p1.orig/session.c 2015-03-17 07:49:20.000000000 -0200
++++ openssh-6.8p1/session.c 2015-03-19 10:13:33.500257721 -0200
+@@ -220,6 +220,7 @@ auth_input_request_forwarding(struct pas
goto authsock_err;
/* Allocate a channel for the authentication agent socket. */
@@ -556,7 +550,7 @@ diff -ru openssh-6.7p1.orig/session.c openssh-6.7p1/session.c
nc = channel_new("auth socket",
SSH_CHANNEL_AUTH_SOCKET, sock, sock, -1,
CHAN_X11_WINDOW_DEFAULT, CHAN_X11_PACKET_DEFAULT,
-@@ -2328,10 +2329,16 @@
+@@ -2329,10 +2330,16 @@ session_set_fds(Session *s, int fdin, in
*/
if (s->chanid == -1)
fatal("no channel for session %d", s->self);
@@ -573,10 +567,10 @@ diff -ru openssh-6.7p1.orig/session.c openssh-6.7p1/session.c
}
/*
-diff -ru openssh-6.7p1.orig/sftp.1 openssh-6.7p1/sftp.1
---- openssh-6.7p1.orig/sftp.1 2014-05-15 06:47:37.000000000 -0300
-+++ openssh-6.7p1/sftp.1 2014-11-21 09:42:27.605287806 -0200
-@@ -261,7 +261,8 @@
+diff -ruNp openssh-6.8p1.orig/sftp.1 openssh-6.8p1/sftp.1
+--- openssh-6.8p1.orig/sftp.1 2015-03-17 07:49:20.000000000 -0200
++++ openssh-6.8p1/sftp.1 2015-03-19 10:13:33.500257721 -0200
+@@ -263,7 +263,8 @@ diagnostic messages from
Specify how many requests may be outstanding at any one time.
Increasing this may slightly improve file transfer speed
but will increase memory usage.
@@ -586,10 +580,10 @@ diff -ru openssh-6.7p1.orig/sftp.1 openssh-6.7p1/sftp.1
.It Fl r
Recursively copy entire directories when uploading and downloading.
Note that
-diff -ru openssh-6.7p1.orig/sftp.c openssh-6.7p1/sftp.c
---- openssh-6.7p1.orig/sftp.c 2014-07-09 06:07:06.000000000 -0300
-+++ openssh-6.7p1/sftp.c 2014-11-21 09:42:27.605287806 -0200
-@@ -68,7 +68,7 @@
+diff -ruNp openssh-6.8p1.orig/sftp.c openssh-6.8p1/sftp.c
+--- openssh-6.8p1.orig/sftp.c 2015-03-19 09:58:59.000000000 -0200
++++ openssh-6.8p1/sftp.c 2015-03-19 10:13:33.500257721 -0200
+@@ -71,7 +71,7 @@ typedef void EditLine;
#include "sftp-client.h"
#define DEFAULT_COPY_BUFLEN 32768 /* Size of buffer for up/download */
@@ -598,10 +592,10 @@ diff -ru openssh-6.7p1.orig/sftp.c openssh-6.7p1/sftp.c
/* File to read commands from */
FILE* infile;
-diff -ru openssh-6.7p1.orig/ssh.c openssh-6.7p1/ssh.c
---- openssh-6.7p1.orig/ssh.c 2014-07-18 08:04:11.000000000 -0300
-+++ openssh-6.7p1/ssh.c 2014-11-21 09:42:27.608621140 -0200
-@@ -1682,6 +1682,9 @@
+diff -ruNp openssh-6.8p1.orig/ssh.c openssh-6.8p1/ssh.c
+--- openssh-6.8p1.orig/ssh.c 2015-03-17 07:49:20.000000000 -0200
++++ openssh-6.8p1/ssh.c 2015-03-19 10:13:33.503591053 -0200
+@@ -1811,6 +1811,9 @@ ssh_session2_open(void)
{
Channel *c;
int window, packetmax, in, out, err;
@@ -611,7 +605,7 @@ diff -ru openssh-6.7p1.orig/ssh.c openssh-6.7p1/ssh.c
if (stdin_null_flag) {
in = open(_PATH_DEVNULL, O_RDONLY);
-@@ -1702,9 +1705,74 @@
+@@ -1831,9 +1834,74 @@ ssh_session2_open(void)
if (!isatty(err))
set_nonblock(err);
@@ -687,7 +681,7 @@ diff -ru openssh-6.7p1.orig/ssh.c openssh-6.7p1/ssh.c
window >>= 1;
packetmax >>= 1;
}
-@@ -1713,6 +1781,10 @@
+@@ -1842,6 +1910,10 @@ ssh_session2_open(void)
window, packetmax, CHAN_EXTENDED_WRITE,
"client-session", /*nonblock*/0);
@@ -698,10 +692,10 @@ diff -ru openssh-6.7p1.orig/ssh.c openssh-6.7p1/ssh.c
debug3("ssh_session2_open: channel_new: %d", c->self);
channel_send_open(c->self);
-diff -ru openssh-6.7p1.orig/sshconnect.c openssh-6.7p1/sshconnect.c
---- openssh-6.7p1.orig/sshconnect.c 2014-07-18 07:11:26.000000000 -0300
-+++ openssh-6.7p1/sshconnect.c 2014-11-21 09:42:27.608621140 -0200
-@@ -264,6 +264,31 @@
+diff -ruNp openssh-6.8p1.orig/sshconnect.c openssh-6.8p1/sshconnect.c
+--- openssh-6.8p1.orig/sshconnect.c 2015-03-17 07:49:20.000000000 -0200
++++ openssh-6.8p1/sshconnect.c 2015-03-19 10:13:33.503591053 -0200
+@@ -267,6 +267,31 @@ ssh_kill_proxy_command(void)
}
/*
@@ -733,7 +727,7 @@ diff -ru openssh-6.7p1.orig/sshconnect.c openssh-6.7p1/sshconnect.c
* Creates a (possibly privileged) socket for use as the ssh connection.
*/
static int
-@@ -279,6 +304,9 @@
+@@ -282,6 +307,9 @@ ssh_create_socket(int privileged, struct
}
fcntl(sock, F_SETFD, FD_CLOEXEC);
@@ -743,7 +737,7 @@ diff -ru openssh-6.7p1.orig/sshconnect.c openssh-6.7p1/sshconnect.c
/* Bind the socket to an alternative local IP address */
if (options.bind_address == NULL && !privileged)
return sock;
-@@ -521,10 +549,10 @@
+@@ -524,10 +552,10 @@ send_client_banner(int connection_out, i
/* Send our own protocol version identification. */
if (compat20) {
xasprintf(&client_version_string, "SSH-%d.%d-%.100s\r\n",
@@ -756,10 +750,10 @@ diff -ru openssh-6.7p1.orig/sshconnect.c openssh-6.7p1/sshconnect.c
}
if (roaming_atomicio(vwrite, connection_out, client_version_string,
strlen(client_version_string)) != strlen(client_version_string))
-diff -ru openssh-6.7p1.orig/sshd.c openssh-6.7p1/sshd.c
---- openssh-6.7p1.orig/sshd.c 2014-08-26 21:11:55.000000000 -0300
-+++ openssh-6.7p1/sshd.c 2014-11-21 09:42:27.608621140 -0200
-@@ -432,7 +432,7 @@
+diff -ruNp openssh-6.8p1.orig/sshd.c openssh-6.8p1/sshd.c
+--- openssh-6.8p1.orig/sshd.c 2015-03-17 07:49:20.000000000 -0200
++++ openssh-6.8p1/sshd.c 2015-03-19 10:13:33.503591053 -0200
+@@ -431,7 +431,7 @@ sshd_exchange_identification(int sock_in
}
xasprintf(&server_version_string, "SSH-%d.%d-%.100s%s%s%s",
@@ -768,7 +762,7 @@ diff -ru openssh-6.7p1.orig/sshd.c openssh-6.7p1/sshd.c
*options.version_addendum == '\0' ? "" : " ",
options.version_addendum, newline);
-@@ -1092,6 +1092,8 @@
+@@ -1149,6 +1149,8 @@ server_listen(void)
int ret, listen_sock, on = 1;
struct addrinfo *ai;
char ntop[NI_MAXHOST], strport[NI_MAXSERV];
@@ -777,7 +771,7 @@ diff -ru openssh-6.7p1.orig/sshd.c openssh-6.7p1/sshd.c
for (ai = options.listen_addrs; ai; ai = ai->ai_next) {
if (ai->ai_family != AF_INET && ai->ai_family != AF_INET6)
-@@ -1132,6 +1134,11 @@
+@@ -1189,6 +1191,11 @@ server_listen(void)
debug("Bind to port %s on %s.", strport, ntop);
@@ -789,7 +783,7 @@ diff -ru openssh-6.7p1.orig/sshd.c openssh-6.7p1/sshd.c
/* Bind the socket to the desired port. */
if (bind(listen_sock, ai->ai_addr, ai->ai_addrlen) < 0) {
error("Bind to port %s on %s failed: %.200s.",
-@@ -2060,6 +2067,9 @@
+@@ -2132,6 +2139,9 @@ main(int ac, char **av)
remote_ip, remote_port,
get_local_ipaddr(sock_in), get_local_port());
@@ -799,10 +793,10 @@ diff -ru openssh-6.7p1.orig/sshd.c openssh-6.7p1/sshd.c
/*
* We don't want to listen forever unless the other side
* successfully authenticates itself. So we set up an alarm which is
-diff -ru openssh-6.7p1.orig/sshd_config openssh-6.7p1/sshd_config
---- openssh-6.7p1.orig/sshd_config 2014-01-12 10:20:47.000000000 -0200
-+++ openssh-6.7p1/sshd_config 2014-11-21 09:42:27.608621140 -0200
-@@ -125,6 +125,17 @@
+diff -ruNp openssh-6.8p1.orig/sshd_config openssh-6.8p1/sshd_config
+--- openssh-6.8p1.orig/sshd_config 2015-03-17 07:49:20.000000000 -0200
++++ openssh-6.8p1/sshd_config 2015-03-19 10:13:33.503591053 -0200
+@@ -125,6 +125,17 @@ UsePrivilegeSeparation sandbox # Defaul
# override default of no subsystems
Subsystem sftp /usr/libexec/sftp-server
@@ -820,11 +814,11 @@ diff -ru openssh-6.7p1.orig/sshd_config openssh-6.7p1/sshd_config
# Example of overriding settings on a per-user basis
#Match User anoncvs
# X11Forwarding no
-diff -ru openssh-6.7p1.orig/version.h openssh-6.7p1/version.h
---- openssh-6.7p1.orig/version.h 2014-04-20 06:25:31.000000000 -0300
-+++ openssh-6.7p1/version.h 2014-11-21 09:42:27.608621140 -0200
+diff -ruNp openssh-6.8p1.orig/version.h openssh-6.8p1/version.h
+--- openssh-6.8p1.orig/version.h 2015-03-17 07:49:20.000000000 -0200
++++ openssh-6.8p1/version.h 2015-03-19 10:13:33.503591053 -0200
@@ -3,4 +3,5 @@
- #define SSH_VERSION "OpenSSH_6.7"
+ #define SSH_VERSION "OpenSSH_6.8"
#define SSH_PORTABLE "p1"
-#define SSH_RELEASE SSH_VERSION SSH_PORTABLE