head	1.8;
access;
symbols
	RELEASE_4_5_0:1.7
	RELEASE_4_4_0:1.7
	RELEASE_4_3_0:1.7
	RELEASE_4_2_0:1.7
	RELEASE_4_1_1:1.7
	RELEASE_4_1_0:1.6
	RELEASE_3_5_0:1.6
	RELEASE_4_0_0:1.5
	RELEASE_3_4_0:1.5
	RELEASE_3_3_0:1.5
	RELEASE_3_2_0:1.4
	RELEASE_3_1_0:1.4;
locks; strict;
comment	@# @;


1.8
date	2002.02.22.02.52.25;	author knu;	state dead;
branches;
next	1.7;

1.7
date	2000.09.02.03.56.56;	author kris;	state Exp;
branches;
next	1.6;

1.6
date	2000.05.29.03.16.42;	author steve;	state Exp;
branches;
next	1.5;

1.5
date	99.06.18.20.02.25;	author ache;	state Exp;
branches;
next	1.4;

1.4
date	99.02.05.06.11.36;	author ache;	state Exp;
branches;
next	1.3;

1.3
date	99.01.28.23.10.18;	author ache;	state Exp;
branches;
next	1.2;

1.2
date	98.11.23.07.41.52;	author kuriyama;	state dead;
branches;
next	1.1;

1.1
date	98.11.10.13.20.21;	author ache;	state Exp;
branches;
next	;


desc
@@


1.8
log
@- Update to 3.1.0.

  PR:		ports/34740
  Submitted by:	larse@@ISI.EDU

- Add %%PORTDOCS%% to pkg-plist.

- Assign MAINTAINER to the submitter.

  Requested by:	issei (previous MAINTAINER)
@
text
@--- configure.orig	Thu Aug 24 17:41:37 2000
+++ configure	Sun Aug 27 01:16:15 2000
@@@@ -6021,7 +6021,7 @@@@
 char tgetent();
 
 int main() {
-tgetent()
+XXXtgetent()
 ; return 0; }
 EOF
 if { (eval echo configure:6028: \"$ac_link\") 1>&5; (eval $ac_link) 2>&5; } && test -s conftest${ac_exeext}; then
@@@@ -6145,7 +6145,7 @@@@
   echo "$ac_t""no" 1>&6
 fi
 
-for ac_hdr in termcap.h term.h curses.h termios.h termio.h
+for ac_hdr in termcap.h termios.h termio.h
 do
 ac_safe=`echo "$ac_hdr" | sed 'y%./+-%__p_%'`
 echo $ac_n "checking for $ac_hdr""... $ac_c" 1>&6
@


1.7
log
@Upgrade to ssh-2.3.0.

PR:	ports/20869
Submitted by:	Issei Suzuki <issei@@issei.org> (Maintainer)
@
text
@@


1.6
log
@Update to version 2.1.0pl2.

PR:		18620
Submitted by:	maintainer
@
text
@d1 3
a3 3
--- configure.orig	Wed May 17 18:01:34 2000
+++ configure	Wed May 17 18:10:35 2000
@@@@ -5373,7 +5373,7 @@@@
d11 2
a12 2
 if { (eval echo configure:5380: \"$ac_link\") 1>&5; (eval $ac_link) 2>&5; } && test -s conftest${ac_exeext}; then
@@@@ -5497,7 +5497,7 @@@@
@


1.5
log
@upgrade to 2.0.13
XXXtgetent from original PR fixed

PR: 12279
Submitted by: Issei Suzuki <issei@@issei.org>
@
text
@d1 3
a3 3
--- configure.orig	Tue May 11 12:34:58 1999
+++ configure	Fri Jun 18 23:36:10 1999
@@@@ -5003,7 +5003,7 @@@@
d11 2
a12 2
 if { (eval echo configure:5010: \"$ac_link\") 1>&5; (eval $ac_link) 2>&5; } && test -s conftest; then
@@@@ -5033,7 +5033,7 @@@@
@


1.4
log
@upgrade to 2.0.12
@
text
@d1 3
a3 3
--- configure.orig	Fri Jan 29 14:30:18 1999
+++ configure	Fri Feb  5 08:55:50 1999
@@@@ -4874,7 +4874,7 @@@@
d11 2
a12 2
 if { (eval echo configure:4881: \"$ac_link\") 1>&5; (eval $ac_link) 2>&5; } && test -s conftest; then
@@@@ -4904,7 +4904,7 @@@@
@


1.3
log
@remove curses bloat
@
text
@d1 3
a3 3
--- configure.orig	Mon Nov 16 15:24:41 1998
+++ configure	Fri Jan 29 00:24:27 1999
@@@@ -4825,7 +4825,7 @@@@
d11 2
a12 2
 if { (eval echo configure:4832: \"$ac_link\") 1>&5; (eval $ac_link) 2>&5; } && test -s conftest; then
@@@@ -4855,7 +4855,7 @@@@
@


1.2
log
@Oops, I forgot to remove old patches...
@
text
@d1 4
a4 3
--- sshconnect.c.orig	Wed Jul  8 20:40:38 1998
+++ sshconnect.c	Tue Nov 10 15:43:45 1998
@@@@ -282,7 +282,7 @@@@
d6 9
a14 4
       /* Child.  Permanently give up superuser privileges. */
       if (setuid(getuid()) < 0)
-	fatal("setuid: %s", strerror(errno));
+	fatal("setuid: %.100s", strerror(errno));
d16 5
a20 277
       /* Redirect stdin and stdout. */
       close(pin[1]);
@@@@ -944,7 +944,7 @@@@
   if (!ssh_context)
     {
       if ((r = krb5_init_context(&ssh_context)))
-	fatal("Kerberos V5: %s while initializing krb5.", error_message(r));
+	fatal("Kerberos V5: %.100s while initializing krb5.", error_message(r));
       krb5_init_ets(ssh_context);
     }
   
@@@@ -959,14 +959,14 @@@@
 				   "host", KRB5_NT_SRV_HST,
 				   &creds.server)))
     {
-      debug("Kerberos V5: error while constructing service name: %s.",
+      debug("Kerberos V5: error while constructing service name: %.100s.",
 	    error_message(r));
       goto cleanup;
     }
   if ((r = krb5_cc_get_principal(ssh_context, ccache,
 				 &creds.client)))
     {
-      debug("Kerberos V5: failure on principal (%s).",
+      debug("Kerberos V5: failure on principal (%.100s).",
 	    error_message(r));
       goto cleanup;
     }
@@@@ -975,7 +975,7 @@@@
   if ((r = krb5_get_credentials(ssh_context, 0,
 				ccache, &creds, &new_creds)))
     {
-      debug("Kerberos V5: failure on credentials(%s).",
+      debug("Kerberos V5: failure on credentials(%.100s).",
 	    error_message(r));
       goto cleanup;
     }
@@@@ -987,7 +987,7 @@@@
     {
       if ((r = krb5_auth_con_init(ssh_context, &auth_context)))
 	{
-	  debug("Kerberos V5: failed to init auth_context (%s)",
+	  debug("Kerberos V5: failed to init auth_context (%.100s)",
 		error_message(r));
 	  goto cleanup;
         }
@@@@ -998,7 +998,7 @@@@
   if ((r = krb5_mk_req_extended(ssh_context, &auth_context, ap_opts,
 				0, new_creds, &auth)))
     {
-      debug("Kerberos V5: failed krb5_mk_req_extended (%s)",
+      debug("Kerberos V5: failed krb5_mk_req_extended (%.100s)",
 	    error_message(r));
       goto cleanup;
     }
@@@@ -1046,7 +1046,7 @@@@
       
       if (r = krb5_rd_rep(ssh_context, auth_context, &auth, &repl))
 	{
-	  packet_disconnect("Kerberos V5 Authentication failed: %s",
+	  packet_disconnect("Kerberos V5 Authentication failed: %.100s",
 			    error_message(r));
 	  goto cleanup;
 	}
@@@@ -1090,7 +1090,7 @@@@
   krb5_data outbuf;
   krb5_error_code r;
   int type;
-  char server_name[128];
+  char server_name[512];
   
   remotehost = (char *) get_canonical_hostname();
   memset(&outbuf, 0 , sizeof(outbuf));
@@@@ -1100,14 +1100,14 @@@@
   if (!ssh_context)
     {
       if ((r = krb5_init_context(&ssh_context)))
-	fatal("Kerberos V5: %s while initializing krb5.", error_message(r));
+	fatal("Kerberos V5: %.100s while initializing krb5.", error_message(r));
       krb5_init_ets(ssh_context);
     }
   if (!auth_context)
     {
       if ((r = krb5_auth_con_init(ssh_context, &auth_context)))
 	{
-	  debug("Kerberos V5: failed to init auth_context (%s)",
+	  debug("Kerberos V5: failed to init auth_context (%.100s)",
 		error_message(r));
 	  return 0 ;
         }
@@@@ -1124,7 +1124,7 @@@@
     if ((r = krb5_cc_get_principal(ssh_context, ccache,
                                    &client)))
       {
-        debug("Kerberos V5: failure on principal (%s)",
+        debug("Kerberos V5: failure on principal (%.100s)",
 	      error_message(r));
         return 0 ;
       }
@@@@ -1136,7 +1136,7 @@@@
        principal and point it to clients realm. This way
        we pass over a TGT of the clients realm. */
     
-    sprintf(server_name,"host/%s@@", remotehost);
+    sprintf(server_name,"host/%.100s@@", remotehost);
     strncat(server_name,client->realm.data,client->realm.length);
     krb5_parse_name(ssh_context,server_name, &server);
     server->type = KRB5_NT_SRV_HST;
@@@@ -1145,7 +1145,7 @@@@
     if ((r = krb5_fwd_tgt_creds(ssh_context, auth_context, 0, client, 
  			        server, ccache, 1, &outbuf)))
       {
-	debug("Kerberos V5 krb5_fwd_tgt_creds failure (%s)",
+	debug("Kerberos V5 krb5_fwd_tgt_creds failure (%.100s)",
 	      error_message(r));
 	krb5_free_principal(ssh_context, client);
         krb5_free_principal(ssh_context, server);
@@@@ -1416,7 +1416,7 @@@@
       error("Someone could be eavesdropping on you right now (man-in-the-middle attack)!");
       error("It is also possible that the host key has just been changed.");
       error("Please contact your system administrator.");
-      error("Add correct host key in %s to get rid of this message.", 
+      error("Add correct host key in %.100s to get rid of this message.",
 	    options->user_hostfile);
       
       /* If strict host key checking is in use, the user will have to edit
@@@@ -1589,7 +1589,7 @@@@
   if (!ssh_context)
     {
       if ((problem = krb5_init_context(&ssh_context)))
-	fatal("Kerberos V5: %s while initializing krb5.",
+	fatal("Kerberos V5: %.100s while initializing krb5.",
 	      error_message(problem));
       krb5_init_ets(ssh_context);
     }
@@@@ -1605,7 +1605,7 @@@@
 	  if ((problem = krb5_cc_get_principal(ssh_context, ccache,
 					       &client)))
 	    {
-	      debug("Kerberos V5: failure on principal (%s).",
+	      debug("Kerberos V5: failure on principal (%.100s).",
                     error_message(problem));
 	    }
 	  else {
--- auth-kerberos.c.orig	Wed Jul  8 20:40:35 1998
+++ auth-kerberos.c	Tue Nov 10 15:50:15 1998
@@@@ -63,11 +63,11 @@@@
 	  krb5_auth_con_free(ssh_context, auth_context);
 	  auth_context = 0;
 	}
-      log_msg("Kerberos ticket authentication of user %s failed: %s",
+      log_msg("Kerberos ticket authentication of user %.100s failed: %.100s",
 	      server_user, error_message(problem));
       
-      debug("Kerberos krb5_auth_con_genaddrs (%s).", error_message(problem));
-      packet_send_debug("Kerberos krb5_auth_con_genaddrs: %s",
+      debug("Kerberos krb5_auth_con_genaddrs (%.100s).", error_message(problem));
+      packet_send_debug("Kerberos krb5_auth_con_genaddrs: %.100s",
 			error_message(problem));
       return 0;
     }
@@@@ -80,11 +80,11 @@@@
 	  krb5_auth_con_free(ssh_context, auth_context);
 	  auth_context = 0;  
 	}
-      log_msg("Kerberos ticket authentication of user %s failed: %s",
+      log_msg("Kerberos ticket authentication of user %.100s failed: %.100s",
 	      server_user, error_message(problem));
       
-      debug("Kerberos V5 rd_req failed (%s).", error_message(problem));
-      packet_send_debug("Kerberos V5 krb5_rd_req: %s", error_message(problem));
+      debug("Kerberos V5 rd_req failed (%.100s).", error_message(problem));
+      packet_send_debug("Kerberos V5 krb5_rd_req: %.100s", error_message(problem));
       return 0;
     }
   
@@@@ -93,22 +93,22 @@@@
   if (problem)
     {
       krb5_free_ticket(ssh_context, ticket);
-      log_msg("Kerberos ticket authentication of user %s failed: %s",
+      log_msg("Kerberos ticket authentication of user %.100s failed: %.100s",
 	      server_user, error_message(problem));
       
-      debug("Kerberos krb5_unparse_name failed (%s).", error_message(problem));
-      packet_send_debug("Kerberos krb5_unparse_name: %s",
+      debug("Kerberos krb5_unparse_name failed (%.100s).", error_message(problem));
+      packet_send_debug("Kerberos krb5_unparse_name: %.100s",
 			error_message(problem));
       return 0;
     }
   if (strncmp(server, "host/", strlen("host/")))
     {
       krb5_free_ticket(ssh_context, ticket);
-      log_msg("Kerberos ticket authentication of user %s failed: invalid service name (%s)",
+      log_msg("Kerberos ticket authentication of user %.100s failed: invalid service name (%.100s)",
 	      server_user, server);
       
-      debug("Kerberos invalid service name (%s).", server);
-      packet_send_debug("Kerberos invalid service name (%s).", server);
+      debug("Kerberos invalid service name (%.100s).", server);
+      packet_send_debug("Kerberos invalid service name (%.100s).", server);
       krb5_xfree(server);
       return 0;
     }
@@@@ -122,11 +122,11 @@@@
   
   if (problem)
     {
-      log_msg("Kerberos ticket authentication of user %s failed: %s",
+      log_msg("Kerberos ticket authentication of user %.100s failed: %.100s",
 	      server_user, error_message(problem));
-      debug("Kerberos krb5_copy_principal failed (%s).", 
+      debug("Kerberos krb5_copy_principal failed (%.100s).",
 	    error_message(problem));
-      packet_send_debug("Kerberos krb5_copy_principal: %s", 
+      packet_send_debug("Kerberos krb5_copy_principal: %.100s",
 			error_message(problem));
       return 0;
     }
@@@@ -135,11 +135,11 @@@@
   /* Make the reply - so that mutual authentication can be done */
   if ((problem = krb5_mk_rep(ssh_context, auth_context, &reply)))
     {
-      log_msg("Kerberos ticket authentication of user %s failed: %s",
+      log_msg("Kerberos ticket authentication of user %.100s failed: %.100s",
 	      server_user, error_message(problem));
-      debug("Kerberos krb5_mk_rep failed (%s).",
+      debug("Kerberos krb5_mk_rep failed (%.100s).",
 	    error_message(problem));
-      packet_send_debug("Kerberos krb5_mk_rep failed: %s",
+      packet_send_debug("Kerberos krb5_mk_rep failed: %.100s",
 			error_message(problem));
       return 0;
     }
@@@@ -160,7 +160,7 @@@@
 {
   krb5_creds **creds;
   krb5_error_code retval;
-  static char ccname[128];
+  static char ccname[512];
   krb5_ccache ccache = NULL;
   struct passwd *pwd;
   extern char *ticket;
@@@@ -208,9 +208,9 @@@@
   
   if (retval = krb5_rd_cred(ssh_context, auth_context, krb5data, &creds, NULL))
     {
-      log_msg("Kerberos V5 tgt rejected for user %.100s : %s", server_user,
+      log_msg("Kerberos V5 tgt rejected for user %.100s : %.100s", server_user,
 	      error_message(retval));
-      packet_send_debug("Kerberos V5 tgt rejected for %.100s : %s",
+      packet_send_debug("Kerberos V5 tgt rejected for %.100s : %.100s",
 			server_user,
 			error_message(retval));
       packet_start(SSH_SMSG_FAILURE);
@@@@ -234,7 +234,7 @@@@
     goto errout;
   
   ticket = xmalloc(strlen(ccname) + 1);
-  (void) sprintf(ticket, "%s", ccname);
+  (void) sprintf(ticket, "%.100s", ccname);
   
   /* Successful */
   packet_start(SSH_SMSG_SUCCESS);
@@@@ -244,9 +244,9 @@@@
   
 errout:
   krb5_free_tgt_creds(ssh_context, creds);
-  log_msg("Kerberos V5 tgt rejected for user %.100s :%s", server_user,
+  log_msg("Kerberos V5 tgt rejected for user %.100s :%.100s", server_user,
 	  error_message(retval));
-  packet_send_debug("Kerberos V5 tgt rejected for %.100s : %s", server_user,
+  packet_send_debug("Kerberos V5 tgt rejected for %.100s : %.100s", server_user,
 		    error_message(retval));
   packet_start(SSH_SMSG_FAILURE);
   packet_send();
@


1.1
log
@add official kerberos patch
@
text
@@

