head	1.3;
access;
symbols
	RELEASE_4_6_2:1.2
	RELEASE_4_6_1:1.2
	ssh_1_2_31:1.2
	ssh_1_2_30:1.2
	ssh_1_2_29:1.2
	ssh_1_2_28:1.2
	ssh_1_2_27:1.2
	RELEASE_4_6_0:1.2
	RELEASE_5_0_DP1:1.2
	RELEASE_4_5_0:1.2
	RELEASE_4_4_0:1.2
	RELEASE_4_3_0:1.2;
locks; strict;
comment	@# @;


1.3
date	2002.06.29.21.39.04;	author obrien;	state dead;
branches;
next	1.2;

1.2
date	2001.02.09.23.06.50;	author kris;	state Exp;
branches;
next	1.1;

1.1
date	2001.02.09.22.56.39;	author kris;	state Exp;
branches;
next	;


desc
@@


1.3
log
@Update to version 1.2.32.
@
text
@--- rsaglue.c   1999/12/10 23:27:25     1.8
+++ rsaglue.c   2001/02/03 09:42:05
@@@@ -264,7 +268,15 @@@@
   mpz_clear(&aux);

   if (value[0] != 0 || value[1] != 2)
-    fatal("Bad result from rsa_private_decrypt");
+    {
+      static time_t last_kill_time = 0;
+      if (time(NULL) - last_kill_time > 60 && getppid() != 1)
+       {
+         last_kill_time = time(NULL);
+         kill(getppid(), SIGALRM);
+       }
+      fatal("Bad result from rsa_private_decrypt");
+    }

   for (i = 2; i < len && value[i]; i++)
     ;

@


1.2
log
@Sigh, the patch released by ssh.com was wrong (kill() had the arguments
in the wrong order). Fix this, and bump PORTREVISION again. The window
was only a few minutes, but this won't disrupt things, and someone may
have updated in that window given the prominence of the problem.

Obtained from:	Matt Power <mhpower@@BOS.BINDVIEW.COM> via Bugtraq
@
text
@@


1.1
log
@Commit fixes for the two recent security problems found by BINDVIEW
and Core-SDI, and bump PORTREVISION.
@
text
@d13 1
a13 1
+         kill(SIGALRM, getppid());
@

