summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDirk Meyer <dinoex@FreeBSD.org>2002-06-26 18:53:33 +0000
committerDirk Meyer <dinoex@FreeBSD.org>2002-06-26 18:53:33 +0000
commit3ecee7d612c42a213646e2cf3def939a2912e038 (patch)
treeb014b2b88ee16892e0679e30005f9e630d349a65
parent- Chase checksum for sasl-1.5.27-ldap-ssl-filter-mysql-patch4.tgz (diff)
nuke obsolete file
Notes
Notes: svn path=/head/; revision=62041
-rw-r--r--security/hpn-ssh/files/patch-auth2-chall.c61
-rw-r--r--security/openssh-portable/files/patch-auth2-chall.c61
2 files changed, 0 insertions, 122 deletions
diff --git a/security/hpn-ssh/files/patch-auth2-chall.c b/security/hpn-ssh/files/patch-auth2-chall.c
deleted file mode 100644
index a596ee778e81..000000000000
--- a/security/hpn-ssh/files/patch-auth2-chall.c
+++ /dev/null
@@ -1,61 +0,0 @@
---- auth2-chall.c 2002/06/19 00:27:55 1.18
-+++ auth2-chall.c 2002/06/26 13:55:37 1.19
-@@ -63,6 +63,7 @@
- char *devices;
- void *ctxt;
- KbdintDevice *device;
-+ u_int nreq;
- };
-
- static KbdintAuthctxt *
-@@ -90,6 +91,7 @@
- debug("kbdint_alloc: devices '%s'", kbdintctxt->devices);
- kbdintctxt->ctxt = NULL;
- kbdintctxt->device = NULL;
-+ kbdintctxt->nreq = 0;
-
- return kbdintctxt;
- }
-@@ -209,26 +211,26 @@
- KbdintAuthctxt *kbdintctxt;
- char *name, *instr, **prompts;
- int i;
-- u_int numprompts, *echo_on;
-+ u_int *echo_on;
-
- kbdintctxt = authctxt->kbdintctxt;
- if (kbdintctxt->device->query(kbdintctxt->ctxt,
-- &name, &instr, &numprompts, &prompts, &echo_on))
-+ &name, &instr, &kbdintctxt->nreq, &prompts, &echo_on))
- return 0;
-
- packet_start(SSH2_MSG_USERAUTH_INFO_REQUEST);
- packet_put_cstring(name);
- packet_put_cstring(instr);
- packet_put_cstring(""); /* language not used */
-- packet_put_int(numprompts);
-- for (i = 0; i < numprompts; i++) {
-+ packet_put_int(kbdintctxt->nreq);
-+ for (i = 0; i < kbdintctxt->nreq; i++) {
- packet_put_cstring(prompts[i]);
- packet_put_char(echo_on[i]);
- }
- packet_send();
- packet_write_wait();
-
-- for (i = 0; i < numprompts; i++)
-+ for (i = 0; i < kbdintctxt->nreq; i++)
- xfree(prompts[i]);
- xfree(prompts);
- xfree(echo_on);
-@@ -256,6 +258,10 @@
-
- authctxt->postponed = 0; /* reset */
- nresp = packet_get_int();
-+ if (nresp != kbdintctxt->nreq)
-+ fatal("input_userauth_info_response: wrong number of replies");
-+ if (nresp > 100)
-+ fatal("input_userauth_info_response: too many replies");
- if (nresp > 0) {
- response = xmalloc(nresp * sizeof(char*));
- for (i = 0; i < nresp; i++)
diff --git a/security/openssh-portable/files/patch-auth2-chall.c b/security/openssh-portable/files/patch-auth2-chall.c
deleted file mode 100644
index a596ee778e81..000000000000
--- a/security/openssh-portable/files/patch-auth2-chall.c
+++ /dev/null
@@ -1,61 +0,0 @@
---- auth2-chall.c 2002/06/19 00:27:55 1.18
-+++ auth2-chall.c 2002/06/26 13:55:37 1.19
-@@ -63,6 +63,7 @@
- char *devices;
- void *ctxt;
- KbdintDevice *device;
-+ u_int nreq;
- };
-
- static KbdintAuthctxt *
-@@ -90,6 +91,7 @@
- debug("kbdint_alloc: devices '%s'", kbdintctxt->devices);
- kbdintctxt->ctxt = NULL;
- kbdintctxt->device = NULL;
-+ kbdintctxt->nreq = 0;
-
- return kbdintctxt;
- }
-@@ -209,26 +211,26 @@
- KbdintAuthctxt *kbdintctxt;
- char *name, *instr, **prompts;
- int i;
-- u_int numprompts, *echo_on;
-+ u_int *echo_on;
-
- kbdintctxt = authctxt->kbdintctxt;
- if (kbdintctxt->device->query(kbdintctxt->ctxt,
-- &name, &instr, &numprompts, &prompts, &echo_on))
-+ &name, &instr, &kbdintctxt->nreq, &prompts, &echo_on))
- return 0;
-
- packet_start(SSH2_MSG_USERAUTH_INFO_REQUEST);
- packet_put_cstring(name);
- packet_put_cstring(instr);
- packet_put_cstring(""); /* language not used */
-- packet_put_int(numprompts);
-- for (i = 0; i < numprompts; i++) {
-+ packet_put_int(kbdintctxt->nreq);
-+ for (i = 0; i < kbdintctxt->nreq; i++) {
- packet_put_cstring(prompts[i]);
- packet_put_char(echo_on[i]);
- }
- packet_send();
- packet_write_wait();
-
-- for (i = 0; i < numprompts; i++)
-+ for (i = 0; i < kbdintctxt->nreq; i++)
- xfree(prompts[i]);
- xfree(prompts);
- xfree(echo_on);
-@@ -256,6 +258,10 @@
-
- authctxt->postponed = 0; /* reset */
- nresp = packet_get_int();
-+ if (nresp != kbdintctxt->nreq)
-+ fatal("input_userauth_info_response: wrong number of replies");
-+ if (nresp > 100)
-+ fatal("input_userauth_info_response: too many replies");
- if (nresp > 0) {
- response = xmalloc(nresp * sizeof(char*));
- for (i = 0; i < nresp; i++)