head	1.6;
access;
symbols
	RELEASE_7_4_0:1.5
	RELEASE_8_2_0:1.5
	RELEASE_6_EOL:1.5
	RELEASE_8_1_0:1.5
	RELEASE_7_3_0:1.5
	RELEASE_8_0_0:1.5
	RELEASE_7_2_0:1.5
	RELEASE_7_1_0:1.5
	RELEASE_6_4_0:1.5
	RELEASE_5_EOL:1.5
	RELEASE_7_0_0:1.5
	RELEASE_6_3_0:1.5
	PRE_XORG_7:1.5
	RELEASE_4_EOL:1.5
	RELEASE_6_2_0:1.5
	RELEASE_6_1_0:1.5
	RELEASE_5_5_0:1.5
	RELEASE_6_0_0:1.5
	RELEASE_5_4_0:1.5
	RELEASE_4_11_0:1.5
	RELEASE_5_3_0:1.5
	RELEASE_4_10_0:1.5
	RELEASE_5_2_1:1.5
	RELEASE_5_2_0:1.5
	RELEASE_4_9_0:1.5
	RELEASE_5_1_0:1.5
	RELEASE_4_8_0:1.5
	RELEASE_5_0_0:1.5
	RELEASE_4_7_0:1.5
	RELEASE_4_6_2:1.5
	RELEASE_4_6_1:1.5
	ssh_1_2_33:1.5
	ssh_1_2_32:1.5
	ssh_1_2_31:1.5
	ssh_1_2_30:1.5
	ssh_1_2_29:1.5
	ssh_1_2_28:1.5
	ssh_1_2_27:1.5
	RELEASE_4_6_0:1.5
	RELEASE_5_0_DP1:1.5
	RELEASE_4_5_0:1.5
	RELEASE_4_4_0:1.5
	RELEASE_4_3_0:1.5
	RELEASE_4_2_0:1.5
	RELEASE_4_1_1:1.5
	RELEASE_4_1_0:1.5
	RELEASE_3_5_0:1.5
	RELEASE_4_0_0:1.5
	RELEASE_3_4_0:1.4
	RELEASE_3_3_0:1.4
	RELEASE_3_2_0:1.2;
locks; strict;
comment	@# @;


1.6
date	2011.05.01.20.14.19;	author bapt;	state dead;
branches;
next	1.5;

1.5
date	2000.01.14.19.37.35;	author torstenb;	state Exp;
branches;
next	1.4;

1.4
date	99.06.18.11.37.30;	author brian;	state Exp;
branches;
next	1.3;

1.3
date	99.06.15.20.14.04;	author sada;	state Exp;
branches;
next	1.2;

1.2
date	99.05.07.15.41.49;	author brian;	state Exp;
branches;
next	1.1;

1.1
date	99.04.11.09.08.31;	author brian;	state Exp;
branches;
next	;


desc
@@


1.6
log
@Remove unmaintained expired ports from security

2011-05-01 security/aafid2: Upstream disapear and distfile is no more available
2011-05-01 security/bjorb: Upstream disapear and distfile is no more available
2011-05-01 security/borzoi: Upstream disapear and distfile is no more available
2011-05-01 security/cmd5checkpw: Upstream disapear and distfile is no more available
2011-05-01 security/cops: Upstream disapear and distfile is no more available
2011-05-01 security/find_ddos: Upstream disapear and distfile is no more available
2011-05-01 security/ftpmap: Upstream disapear and distfile is no more available
2011-05-01 security/hafiye: Upstream disapear and distfile is no more available
2011-05-01 security/ident2: Upstream disapear and distfile is no more available
2011-05-01 security/liedentd: Upstream disapear and distfile is no more available
2011-05-01 security/pam_pop3: Upstream disapear and distfile is no more available
2011-05-01 security/poc: Upstream disapear and distfile is no more available
2011-05-01 security/portscanner: Upstream disapear and distfile is no more available
2011-05-01 security/ppgen: Upstream disapear and distfile is no more available
2011-05-01 security/qident: Upstream disapear and distfile is no more available
2011-05-01 security/quintuple-agent: Upstream disapear and distfile is no more available
2011-05-01 security/rc5pipe: Upstream disapear and distfile is no more available
2011-05-01 security/rid: Upstream disapear and distfile is no more available
2011-05-01 security/ssh: Upstream disapear and distfile is no more available
2011-05-01 security/tea-total: Upstream disapear and distfile is no more available
2011-05-01 security/uberkey: Upstream disapear and distfile is no more available
@
text
@*** login.c.orig	Tue Jan 11 20:36:37 2000
--- login.c	Tue Jan 11 20:36:34 2000
***************
*** 117,122 ****
--- 117,125 ----
  #include <hpsecurity.h>
  #include <prot.h>
  #endif /* HAVE_HPUX_TCB_AUTH */
+ #ifdef __FreeBSD__
+ #include <osreldate.h>
+ #endif
  #include "ssh.h"
  
  /* Returns the time when the user last logged in.  Returns 0 if the 
***************
*** 255,261 ****
     were more standardized. */
  
  void record_login(int pid, const char *ttyname, const char *user, uid_t uid,
!                   const char *host, struct sockaddr_in *addr)
  {
    int fd;
  
--- 258,264 ----
     were more standardized. */
  
  void record_login(int pid, const char *ttyname, const char *user, uid_t uid,
! 		  const char *host, struct sockaddr *addr)
  {
    int fd;
  
***************
*** 301,317 ****
    strncpy(u.ut_user, user, sizeof(u.ut_user));
  #endif /* HAVE_NAME_IN_UTMP */
  #ifdef HAVE_HOST_IN_UTMP
-   strncpy(u.ut_host, host, sizeof(u.ut_host));
  #ifdef __FreeBSD__
    if (strlen(host) > sizeof(u.ut_host)) {
      strncpy(u.ut_host, get_remote_ipaddr(), sizeof(u.ut_host));
!   }
  #endif /* __FreeBSD__ */
  #endif /* HAVE_HOST_IN_UTMP */
  #ifdef HAVE_ADDR_IN_UTMP
    if (addr)
      memcpy(&u.ut_addr, &addr->sin_addr, sizeof(u.ut_addr));
    else
      memset(&u.ut_addr, 0, sizeof(u.ut_addr));
  #endif
  
--- 304,325 ----
    strncpy(u.ut_user, user, sizeof(u.ut_user));
  #endif /* HAVE_NAME_IN_UTMP */
  #ifdef HAVE_HOST_IN_UTMP
  #ifdef __FreeBSD__
+ #if __FreeBSD_version >= 320000
+   trimdomain(host, sizeof u.ut_host);
+ #endif
    if (strlen(host) > sizeof(u.ut_host)) {
      strncpy(u.ut_host, get_remote_ipaddr(), sizeof(u.ut_host));
!   } else
  #endif /* __FreeBSD__ */
+   strncpy(u.ut_host, host, sizeof(u.ut_host));
  #endif /* HAVE_HOST_IN_UTMP */
  #ifdef HAVE_ADDR_IN_UTMP
+ #if 0 /* XXX */
    if (addr)
      memcpy(&u.ut_addr, &addr->sin_addr, sizeof(u.ut_addr));
    else
+ #endif /* XXX */
      memset(&u.ut_addr, 0, sizeof(u.ut_addr));
  #endif
  
@


1.5
log
@Add IPv6 support to ssh.
The IPv6 patch was obtained from the kame repository and has been
been writen by KIKUCHI Takahiro <kick@@kyoto.wide.ad.jp>

Due to the whole mess with different patches it was necessary to include
both the IPv6 patch and patch-ssh-1.2.27-bsd.tty.chown in ${PATCHDIR}.
Since both patches modify the configure script it was also necessary
to rebuild it via autoconf from configure.in. I've decided to use
USE_AUTOCONF instead of including the re-build configure script in
${FILESDIR}

Obtained from:	KAME/WIDE
@
text
@@


1.4
log
@Only use trimdomain() if __FreeBSD_version > 320000
It was available in 3.0 & 3.1 but would truncate at UT_HOSTSIZE-1
@
text
@d1 73
a73 30
--- login.c.orig	Wed May 12 12:19:26 1999
+++ login.c	Fri Jun 18 12:11:20 1999
@@@@ -117,6 +117,9 @@@@
 #include <hpsecurity.h>
 #include <prot.h>
 #endif /* HAVE_HPUX_TCB_AUTH */
+#ifdef __FreeBSD__
+#include <osreldate.h>
+#endif
 #include "ssh.h"
 
 /* Returns the time when the user last logged in.  Returns 0 if the 
@@@@ -301,12 +304,15 @@@@
   strncpy(u.ut_user, user, sizeof(u.ut_user));
 #endif /* HAVE_NAME_IN_UTMP */
 #ifdef HAVE_HOST_IN_UTMP
-  strncpy(u.ut_host, host, sizeof(u.ut_host));
 #ifdef __FreeBSD__
+#if __FreeBSD_version >= 320000
+  trimdomain(host, sizeof u.ut_host);
+#endif
   if (strlen(host) > sizeof(u.ut_host)) {
     strncpy(u.ut_host, get_remote_ipaddr(), sizeof(u.ut_host));
-  }
+  } else
 #endif /* __FreeBSD__ */
+  strncpy(u.ut_host, host, sizeof(u.ut_host));
 #endif /* HAVE_HOST_IN_UTMP */
 #ifdef HAVE_ADDR_IN_UTMP
   if (addr)
@


1.3
log
@PR:	ports/12037
Submitted by:	Issei Suzuki <issei@@jp.FreeBSD.ORG>
Upgrade to 1.2.27.
# I'm not maintainer but it seems that torstenb is too busy to
# look the PR and many people want new version ssh port.
@
text
@d1 13
a13 3
--- login.c.orig	Wed May 12 20:19:26 1999
+++ login.c	Sun Jun  6 01:51:33 1999
@@@@ -301,12 +301,13 @@@@
d19 1
d21 1
@


1.2
log
@Always use trimdomain(), not just #if __FreeBSD_version >= 400004
The port maintainer must be away....
@
text
@d1 3
a3 3
--- login.c.orig	Wed Jul  8 17:40:36 1998
+++ login.c	Mon May  3 23:52:39 1999
@@@@ -287,12 +287,13 @@@@
@


1.1
log
@Call trimdomain() to reduce the size of the ut_host
field before reveting to storing an IP number.
Reviewed by: torstenb@@
@
text
@d2 2
a3 13
+++ login.c	Fri Apr  9 01:31:08 1999
@@@@ -104,6 +104,10 @@@@
 #endif /* HAVE_HPUX_TCB_AUTH */
 #include "ssh.h"
 
+#ifdef __FreeBSD__
+#include <osreldate.h>
+#endif
+
 /* Returns the time when the user last logged in.  Returns 0 if the 
    information is not available.  This must be called before record_login. 
    The host the user logged in from will be returned in buf. */
@@@@ -287,12 +291,15 @@@@
a8 1
+#if __FreeBSD_version >= 400004
a9 1
+#endif
@

