diff options
author | areq | 2003-01-15 13:32:33 (GMT) |
---|---|---|
committer | cvs2git | 2012-06-24 12:13:13 (GMT) |
commit | 1ddc2345ee07bc7f6134b30f83e9b5cf353fe124 (patch) | |
tree | deb8860bc03379a21da161439e9e1ae94cc910b5 | |
parent | 8e9d9d35cb936c2431fbe440f61242840dc89a7b (diff) | |
download | netatalk-1ddc2345ee07bc7f6134b30f83e9b5cf353fe124.zip netatalk-1ddc2345ee07bc7f6134b30f83e9b5cf353fe124.tar.gz |
- to build with openssl 0.9.7
Changed files:
netatalk-openssl.patch -> 1.1
-rw-r--r-- | netatalk-openssl.patch | 58 |
1 files changed, 58 insertions, 0 deletions
diff --git a/netatalk-openssl.patch b/netatalk-openssl.patch new file mode 100644 index 0000000..b8547e3 --- /dev/null +++ b/netatalk-openssl.patch @@ -0,0 +1,58 @@ +--- netatalk-1.6.0/bin/afppasswd/afppasswd.c.org Wed Jan 15 11:29:09 2003 ++++ netatalk-1.6.0/bin/afppasswd/afppasswd.c Wed Jan 15 11:25:54 2003 +@@ -114,7 +114,7 @@ + /* decrypt the password */ + ecb_encrypt((C_Block *) buf, (C_Block *) buf, schedule, DES_DECRYPT); + } +- memset(schedule, 0, sizeof(schedule)); ++ memset(&schedule, 0, sizeof(schedule)); + } + + if (newpwd) { +--- netatalk-1.6.0/etc/uams/uams_randnum.c.org Wed Jan 15 12:14:51 2003 ++++ netatalk-1.6.0/etc/uams/uams_randnum.c Wed Jan 15 12:16:12 2003 +@@ -217,7 +217,7 @@ + /* decrypt the password */ + ecb_encrypt((C_Block *) p, (C_Block *) p, schedule, DES_DECRYPT); + } +- memset(schedule, 0, sizeof(schedule)); ++ memset(&schedule, 0, sizeof(schedule)); + } + + if (set) { +@@ -383,7 +383,7 @@ + memset(seskey, 0, sizeof(seskey)); + ecb_encrypt((C_Block *) randbuf, (C_Block *) randbuf, + seskeysched, DES_ENCRYPT); +- memset(seskeysched, 0, sizeof(seskeysched)); ++ memset(&seskeysched, 0, sizeof(seskeysched)); + + /* test against what the client sent */ + if (memcmp( randbuf, ibuf, sizeof(randbuf) )) { /* != */ +@@ -431,7 +431,7 @@ + /* test against client's reply */ + if (memcmp(randbuf, ibuf, sizeof(randbuf))) { /* != */ + memset(randbuf, 0, sizeof(randbuf)); +- memset(seskeysched, 0, sizeof(seskeysched)); ++ memset(&seskeysched, 0, sizeof(seskeysched)); + return AFPERR_NOTAUTH; + } + ibuf += sizeof(randbuf); +@@ -440,7 +440,7 @@ + /* encrypt client's challenge and send back */ + ecb_encrypt( (C_Block *) ibuf, (C_Block *) rbuf, + seskeysched, DES_ENCRYPT); +- memset(seskeysched, 0, sizeof(seskeysched)); ++ memset(&seskeysched, 0, sizeof(seskeysched)); + *rbuflen = sizeof(randbuf); + + *uam_pwd = randpwd; +@@ -495,7 +495,7 @@ + err = randpass(pwd, passwdfile, ibuf + PASSWDLEN, sizeof(seskey), 1); + + /* zero out some fields */ +- memset(seskeysched, 0, sizeof(seskeysched)); ++ memset(&seskeysched, 0, sizeof(seskeysched)); + memset(seskey, 0, sizeof(seskey)); + memset(ibuf, 0, sizeof(seskey)); /* old passwd */ + memset(ibuf + PASSWDLEN, 0, sizeof(seskey)); /* new passwd */ |