]> git.pld-linux.org Git - packages/netatalk.git/commitdiff
- to build with openssl 0.9.7
authorareq <areq@pld-linux.org>
Wed, 15 Jan 2003 13:32:33 +0000 (13:32 +0000)
committercvs2git <feedback@pld-linux.org>
Sun, 24 Jun 2012 12:13:13 +0000 (12:13 +0000)
Changed files:
    netatalk-openssl.patch -> 1.1

netatalk-openssl.patch [new file with mode: 0644]

diff --git a/netatalk-openssl.patch b/netatalk-openssl.patch
new file mode 100644 (file)
index 0000000..b8547e3
--- /dev/null
@@ -0,0 +1,58 @@
+--- netatalk-1.6.0/bin/afppasswd/afppasswd.c.org       Wed Jan 15 11:29:09 2003
++++ netatalk-1.6.0/bin/afppasswd/afppasswd.c   Wed Jan 15 11:25:54 2003
+@@ -114,7 +114,7 @@
+       /* decrypt the password */
+       ecb_encrypt((C_Block *) buf, (C_Block *) buf, schedule, DES_DECRYPT);
+     }
+-    memset(schedule, 0, sizeof(schedule));      
++    memset(&schedule, 0, sizeof(schedule));      
+   }
+   if (newpwd) {
+--- netatalk-1.6.0/etc/uams/uams_randnum.c.org Wed Jan 15 12:14:51 2003
++++ netatalk-1.6.0/etc/uams/uams_randnum.c     Wed Jan 15 12:16:12 2003
+@@ -217,7 +217,7 @@
+       /* decrypt the password */
+       ecb_encrypt((C_Block *) p, (C_Block *) p, schedule, DES_DECRYPT);
+       }
+-      memset(schedule, 0, sizeof(schedule));
++      memset(&schedule, 0, sizeof(schedule));
+   }
+   if (set) {
+@@ -383,7 +383,7 @@
+   memset(seskey, 0, sizeof(seskey));
+   ecb_encrypt((C_Block *) randbuf, (C_Block *) randbuf,
+              seskeysched, DES_ENCRYPT);
+-  memset(seskeysched, 0, sizeof(seskeysched));
++  memset(&seskeysched, 0, sizeof(seskeysched));
+   /* test against what the client sent */
+   if (memcmp( randbuf, ibuf, sizeof(randbuf) )) { /* != */
+@@ -431,7 +431,7 @@
+   /* test against client's reply */
+   if (memcmp(randbuf, ibuf, sizeof(randbuf))) { /* != */
+     memset(randbuf, 0, sizeof(randbuf));
+-    memset(seskeysched, 0, sizeof(seskeysched));
++    memset(&seskeysched, 0, sizeof(seskeysched));
+     return AFPERR_NOTAUTH;
+   }
+   ibuf += sizeof(randbuf);
+@@ -440,7 +440,7 @@
+   /* encrypt client's challenge and send back */
+   ecb_encrypt( (C_Block *) ibuf, (C_Block *) rbuf,
+              seskeysched, DES_ENCRYPT);
+-  memset(seskeysched, 0, sizeof(seskeysched));
++  memset(&seskeysched, 0, sizeof(seskeysched));
+   *rbuflen = sizeof(randbuf);
+   
+   *uam_pwd = randpwd;
+@@ -495,7 +495,7 @@
+       err = randpass(pwd, passwdfile, ibuf + PASSWDLEN, sizeof(seskey), 1);
+     /* zero out some fields */
+-    memset(seskeysched, 0, sizeof(seskeysched));
++    memset(&seskeysched, 0, sizeof(seskeysched));
+     memset(seskey, 0, sizeof(seskey));
+     memset(ibuf, 0, sizeof(seskey)); /* old passwd */
+     memset(ibuf + PASSWDLEN, 0, sizeof(seskey)); /* new passwd */
This page took 0.433798 seconds and 4 git commands to generate.