summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorareq2003-01-15 13:32:33 (GMT)
committercvs2git2012-06-24 12:13:13 (GMT)
commit1ddc2345ee07bc7f6134b30f83e9b5cf353fe124 (patch)
treedeb8860bc03379a21da161439e9e1ae94cc910b5
parent8e9d9d35cb936c2431fbe440f61242840dc89a7b (diff)
downloadnetatalk-1ddc2345ee07bc7f6134b30f83e9b5cf353fe124.zip
netatalk-1ddc2345ee07bc7f6134b30f83e9b5cf353fe124.tar.gz
- to build with openssl 0.9.7
Changed files: netatalk-openssl.patch -> 1.1
-rw-r--r--netatalk-openssl.patch58
1 files changed, 58 insertions, 0 deletions
diff --git a/netatalk-openssl.patch b/netatalk-openssl.patch
new file mode 100644
index 0000000..b8547e3
--- /dev/null
+++ b/netatalk-openssl.patch
@@ -0,0 +1,58 @@
+--- netatalk-1.6.0/bin/afppasswd/afppasswd.c.org Wed Jan 15 11:29:09 2003
++++ netatalk-1.6.0/bin/afppasswd/afppasswd.c Wed Jan 15 11:25:54 2003
+@@ -114,7 +114,7 @@
+ /* decrypt the password */
+ ecb_encrypt((C_Block *) buf, (C_Block *) buf, schedule, DES_DECRYPT);
+ }
+- memset(schedule, 0, sizeof(schedule));
++ memset(&schedule, 0, sizeof(schedule));
+ }
+
+ if (newpwd) {
+--- netatalk-1.6.0/etc/uams/uams_randnum.c.org Wed Jan 15 12:14:51 2003
++++ netatalk-1.6.0/etc/uams/uams_randnum.c Wed Jan 15 12:16:12 2003
+@@ -217,7 +217,7 @@
+ /* decrypt the password */
+ ecb_encrypt((C_Block *) p, (C_Block *) p, schedule, DES_DECRYPT);
+ }
+- memset(schedule, 0, sizeof(schedule));
++ memset(&schedule, 0, sizeof(schedule));
+ }
+
+ if (set) {
+@@ -383,7 +383,7 @@
+ memset(seskey, 0, sizeof(seskey));
+ ecb_encrypt((C_Block *) randbuf, (C_Block *) randbuf,
+ seskeysched, DES_ENCRYPT);
+- memset(seskeysched, 0, sizeof(seskeysched));
++ memset(&seskeysched, 0, sizeof(seskeysched));
+
+ /* test against what the client sent */
+ if (memcmp( randbuf, ibuf, sizeof(randbuf) )) { /* != */
+@@ -431,7 +431,7 @@
+ /* test against client's reply */
+ if (memcmp(randbuf, ibuf, sizeof(randbuf))) { /* != */
+ memset(randbuf, 0, sizeof(randbuf));
+- memset(seskeysched, 0, sizeof(seskeysched));
++ memset(&seskeysched, 0, sizeof(seskeysched));
+ return AFPERR_NOTAUTH;
+ }
+ ibuf += sizeof(randbuf);
+@@ -440,7 +440,7 @@
+ /* encrypt client's challenge and send back */
+ ecb_encrypt( (C_Block *) ibuf, (C_Block *) rbuf,
+ seskeysched, DES_ENCRYPT);
+- memset(seskeysched, 0, sizeof(seskeysched));
++ memset(&seskeysched, 0, sizeof(seskeysched));
+ *rbuflen = sizeof(randbuf);
+
+ *uam_pwd = randpwd;
+@@ -495,7 +495,7 @@
+ err = randpass(pwd, passwdfile, ibuf + PASSWDLEN, sizeof(seskey), 1);
+
+ /* zero out some fields */
+- memset(seskeysched, 0, sizeof(seskeysched));
++ memset(&seskeysched, 0, sizeof(seskeysched));
+ memset(seskey, 0, sizeof(seskey));
+ memset(ibuf, 0, sizeof(seskey)); /* old passwd */
+ memset(ibuf + PASSWDLEN, 0, sizeof(seskey)); /* new passwd */