diff options
author | Colin Watson <cjwatson@debian.org> | 2013-05-07 11:47:26 +0100 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2013-05-07 11:47:26 +0100 |
commit | 2ea3f720daeb1ca9f765365fce3a9546961fe624 (patch) | |
tree | c4fb7d1f51fa51e7677232de806aae150e29e2ac /debian/patches/consolekit.patch | |
parent | f5efcd3450bbf8261915e0c4a6f851229dddaa79 (diff) | |
parent | ecebda56da46a03dafff923d91c382f31faa9eec (diff) |
* New upstream release (http://www.openssh.com/txt/release-6.2).
- Add support for multiple required authentication in SSH protocol 2 via
an AuthenticationMethods option (closes: #195716).
- Fix Sophie Germain formula in moduli(5) (closes: #698612).
- Update ssh-copy-id to Phil Hands' greatly revised version (closes:
#99785, #322228, #620428; LP: #518883, #835901, #1074798).
Diffstat (limited to 'debian/patches/consolekit.patch')
-rw-r--r-- | debian/patches/consolekit.patch | 55 |
1 files changed, 28 insertions, 27 deletions
diff --git a/debian/patches/consolekit.patch b/debian/patches/consolekit.patch index a952e4405..d67123a1e 100644 --- a/debian/patches/consolekit.patch +++ b/debian/patches/consolekit.patch | |||
@@ -1,13 +1,13 @@ | |||
1 | Description: Add support for registering ConsoleKit sessions on login | 1 | Description: Add support for registering ConsoleKit sessions on login |
2 | Author: Colin Watson <cjwatson@ubuntu.com> | 2 | Author: Colin Watson <cjwatson@ubuntu.com> |
3 | Bug: https://bugzilla.mindrot.org/show_bug.cgi?id=1450 | 3 | Bug: https://bugzilla.mindrot.org/show_bug.cgi?id=1450 |
4 | Last-Updated: 2012-10-31 | 4 | Last-Updated: 2013-05-07 |
5 | 5 | ||
6 | Index: b/Makefile.in | 6 | Index: b/Makefile.in |
7 | =================================================================== | 7 | =================================================================== |
8 | --- a/Makefile.in | 8 | --- a/Makefile.in |
9 | +++ b/Makefile.in | 9 | +++ b/Makefile.in |
10 | @@ -94,7 +94,8 @@ | 10 | @@ -96,7 +96,8 @@ |
11 | sftp-server.o sftp-common.o \ | 11 | sftp-server.o sftp-common.o \ |
12 | roaming_common.o roaming_serv.o \ | 12 | roaming_common.o roaming_serv.o \ |
13 | sandbox-null.o sandbox-rlimit.o sandbox-systrace.o sandbox-darwin.o \ | 13 | sandbox-null.o sandbox-rlimit.o sandbox-systrace.o sandbox-darwin.o \ |
@@ -21,9 +21,9 @@ Index: b/configure.ac | |||
21 | =================================================================== | 21 | =================================================================== |
22 | --- a/configure.ac | 22 | --- a/configure.ac |
23 | +++ b/configure.ac | 23 | +++ b/configure.ac |
24 | @@ -3672,6 +3672,30 @@ | 24 | @@ -3801,6 +3801,30 @@ |
25 | ] | 25 | AC_SUBST([GSSLIBS]) |
26 | ) | 26 | AC_SUBST([K5LIBS]) |
27 | 27 | ||
28 | +# Check whether user wants ConsoleKit support | 28 | +# Check whether user wants ConsoleKit support |
29 | +CONSOLEKIT_MSG="no" | 29 | +CONSOLEKIT_MSG="no" |
@@ -52,7 +52,7 @@ Index: b/configure.ac | |||
52 | # Looking for programs, paths and files | 52 | # Looking for programs, paths and files |
53 | 53 | ||
54 | PRIVSEP_PATH=/var/empty | 54 | PRIVSEP_PATH=/var/empty |
55 | @@ -4435,6 +4459,7 @@ | 55 | @@ -4600,6 +4624,7 @@ |
56 | echo " libedit support: $LIBEDIT_MSG" | 56 | echo " libedit support: $LIBEDIT_MSG" |
57 | echo " Solaris process contract support: $SPC_MSG" | 57 | echo " Solaris process contract support: $SPC_MSG" |
58 | echo " Solaris project support: $SP_MSG" | 58 | echo " Solaris project support: $SP_MSG" |
@@ -64,7 +64,7 @@ Index: b/configure | |||
64 | =================================================================== | 64 | =================================================================== |
65 | --- a/configure | 65 | --- a/configure |
66 | +++ b/configure | 66 | +++ b/configure |
67 | @@ -735,6 +735,7 @@ | 67 | @@ -737,6 +737,7 @@ |
68 | with_sandbox | 68 | with_sandbox |
69 | with_selinux | 69 | with_selinux |
70 | with_kerberos5 | 70 | with_kerberos5 |
@@ -72,7 +72,7 @@ Index: b/configure | |||
72 | with_privsep_path | 72 | with_privsep_path |
73 | with_xauth | 73 | with_xauth |
74 | enable_strip | 74 | enable_strip |
75 | @@ -1425,6 +1426,7 @@ | 75 | @@ -1427,6 +1428,7 @@ |
76 | --with-sandbox=style Specify privilege separation sandbox (no, darwin, rlimit, systrace, seccomp_filter) | 76 | --with-sandbox=style Specify privilege separation sandbox (no, darwin, rlimit, systrace, seccomp_filter) |
77 | --with-selinux Enable SELinux support | 77 | --with-selinux Enable SELinux support |
78 | --with-kerberos5=PATH Enable Kerberos 5 support | 78 | --with-kerberos5=PATH Enable Kerberos 5 support |
@@ -80,8 +80,8 @@ Index: b/configure | |||
80 | --with-privsep-path=xxx Path for privilege separation chroot (default=/var/empty) | 80 | --with-privsep-path=xxx Path for privilege separation chroot (default=/var/empty) |
81 | --with-xauth=PATH Specify path to xauth program | 81 | --with-xauth=PATH Specify path to xauth program |
82 | --with-maildir=/path/to/mail Specify your system mail directory | 82 | --with-maildir=/path/to/mail Specify your system mail directory |
83 | @@ -15683,6 +15685,135 @@ | 83 | @@ -16002,6 +16004,135 @@ |
84 | fi | 84 | |
85 | 85 | ||
86 | 86 | ||
87 | +# Check whether user wants ConsoleKit support | 87 | +# Check whether user wants ConsoleKit support |
@@ -216,7 +216,7 @@ Index: b/configure | |||
216 | # Looking for programs, paths and files | 216 | # Looking for programs, paths and files |
217 | 217 | ||
218 | PRIVSEP_PATH=/var/empty | 218 | PRIVSEP_PATH=/var/empty |
219 | @@ -18155,6 +18286,7 @@ | 219 | @@ -18527,6 +18658,7 @@ |
220 | echo " libedit support: $LIBEDIT_MSG" | 220 | echo " libedit support: $LIBEDIT_MSG" |
221 | echo " Solaris process contract support: $SPC_MSG" | 221 | echo " Solaris process contract support: $SPC_MSG" |
222 | echo " Solaris project support: $SP_MSG" | 222 | echo " Solaris project support: $SP_MSG" |
@@ -522,7 +522,7 @@ Index: b/monitor.c | |||
522 | static Authctxt *authctxt; | 522 | static Authctxt *authctxt; |
523 | static BIGNUM *ssh1_challenge = NULL; /* used for ssh1 rsa auth */ | 523 | static BIGNUM *ssh1_challenge = NULL; /* used for ssh1 rsa auth */ |
524 | 524 | ||
525 | @@ -283,6 +290,9 @@ | 525 | @@ -284,6 +291,9 @@ |
526 | {MONITOR_REQ_AUDIT_EVENT, MON_PERMIT, mm_answer_audit_event}, | 526 | {MONITOR_REQ_AUDIT_EVENT, MON_PERMIT, mm_answer_audit_event}, |
527 | {MONITOR_REQ_AUDIT_COMMAND, MON_PERMIT, mm_answer_audit_command}, | 527 | {MONITOR_REQ_AUDIT_COMMAND, MON_PERMIT, mm_answer_audit_command}, |
528 | #endif | 528 | #endif |
@@ -532,7 +532,7 @@ Index: b/monitor.c | |||
532 | {0, 0, NULL} | 532 | {0, 0, NULL} |
533 | }; | 533 | }; |
534 | 534 | ||
535 | @@ -325,6 +335,9 @@ | 535 | @@ -326,6 +336,9 @@ |
536 | {MONITOR_REQ_AUDIT_EVENT, MON_PERMIT, mm_answer_audit_event}, | 536 | {MONITOR_REQ_AUDIT_EVENT, MON_PERMIT, mm_answer_audit_event}, |
537 | {MONITOR_REQ_AUDIT_COMMAND, MON_PERMIT|MON_ONCE, mm_answer_audit_command}, | 537 | {MONITOR_REQ_AUDIT_COMMAND, MON_PERMIT|MON_ONCE, mm_answer_audit_command}, |
538 | #endif | 538 | #endif |
@@ -542,7 +542,7 @@ Index: b/monitor.c | |||
542 | {0, 0, NULL} | 542 | {0, 0, NULL} |
543 | }; | 543 | }; |
544 | 544 | ||
545 | @@ -495,6 +508,9 @@ | 545 | @@ -514,6 +527,9 @@ |
546 | monitor_permit(mon_dispatch, MONITOR_REQ_PTY, 1); | 546 | monitor_permit(mon_dispatch, MONITOR_REQ_PTY, 1); |
547 | monitor_permit(mon_dispatch, MONITOR_REQ_PTYCLEANUP, 1); | 547 | monitor_permit(mon_dispatch, MONITOR_REQ_PTYCLEANUP, 1); |
548 | } | 548 | } |
@@ -552,7 +552,7 @@ Index: b/monitor.c | |||
552 | 552 | ||
553 | for (;;) | 553 | for (;;) |
554 | monitor_read(pmonitor, mon_dispatch, NULL); | 554 | monitor_read(pmonitor, mon_dispatch, NULL); |
555 | @@ -2196,6 +2212,34 @@ | 555 | @@ -2232,6 +2248,34 @@ |
556 | buffer_put_int(m, major); | 556 | buffer_put_int(m, major); |
557 | buffer_put_string(m, hash.value, hash.length); | 557 | buffer_put_string(m, hash.value, hash.length); |
558 | 558 | ||
@@ -591,19 +591,20 @@ Index: b/monitor.h | |||
591 | =================================================================== | 591 | =================================================================== |
592 | --- a/monitor.h | 592 | --- a/monitor.h |
593 | +++ b/monitor.h | 593 | +++ b/monitor.h |
594 | @@ -62,6 +62,7 @@ | 594 | @@ -75,6 +75,8 @@ |
595 | MONITOR_REQ_PAM_RESPOND, MONITOR_ANS_PAM_RESPOND, | 595 | |
596 | MONITOR_REQ_PAM_FREE_CTX, MONITOR_ANS_PAM_FREE_CTX, | 596 | MONITOR_REQ_AUTHROLE = 300, |
597 | MONITOR_REQ_AUDIT_EVENT, MONITOR_REQ_AUDIT_COMMAND, | 597 | |
598 | + MONITOR_REQ_CONSOLEKIT_REGISTER, MONITOR_ANS_CONSOLEKIT_REGISTER, | 598 | + MONITOR_REQ_CONSOLEKIT_REGISTER = 400, MONITOR_ANS_CONSOLEKIT_REGISTER = 401, |
599 | MONITOR_REQ_TERM, | 599 | + |
600 | MONITOR_REQ_JPAKE_STEP1, MONITOR_ANS_JPAKE_STEP1, | 600 | }; |
601 | MONITOR_REQ_JPAKE_GET_PWDATA, MONITOR_ANS_JPAKE_GET_PWDATA, | 601 | |
602 | struct mm_master; | ||
602 | Index: b/monitor_wrap.c | 603 | Index: b/monitor_wrap.c |
603 | =================================================================== | 604 | =================================================================== |
604 | --- a/monitor_wrap.c | 605 | --- a/monitor_wrap.c |
605 | +++ b/monitor_wrap.c | 606 | +++ b/monitor_wrap.c |
606 | @@ -1310,6 +1310,37 @@ | 607 | @@ -1311,6 +1311,37 @@ |
607 | mm_ssh_gssapi_sign(Gssctxt *ctx, gss_buffer_desc *data, gss_buffer_desc *hash) | 608 | mm_ssh_gssapi_sign(Gssctxt *ctx, gss_buffer_desc *data, gss_buffer_desc *hash) |
608 | { | 609 | { |
609 | Buffer m; | 610 | Buffer m; |
@@ -666,7 +667,7 @@ Index: b/session.c | |||
666 | 667 | ||
667 | #if defined(KRB5) && defined(USE_AFS) | 668 | #if defined(KRB5) && defined(USE_AFS) |
668 | #include <kafs.h> | 669 | #include <kafs.h> |
669 | @@ -1129,6 +1130,9 @@ | 670 | @@ -1132,6 +1133,9 @@ |
670 | #if !defined (HAVE_LOGIN_CAP) && !defined (HAVE_CYGWIN) | 671 | #if !defined (HAVE_LOGIN_CAP) && !defined (HAVE_CYGWIN) |
671 | char *path = NULL; | 672 | char *path = NULL; |
672 | #endif | 673 | #endif |
@@ -676,7 +677,7 @@ Index: b/session.c | |||
676 | 677 | ||
677 | /* Initialize the environment. */ | 678 | /* Initialize the environment. */ |
678 | envsize = 100; | 679 | envsize = 100; |
679 | @@ -1273,6 +1277,11 @@ | 680 | @@ -1276,6 +1280,11 @@ |
680 | child_set_env(&env, &envsize, "KRB5CCNAME", | 681 | child_set_env(&env, &envsize, "KRB5CCNAME", |
681 | s->authctxt->krb5_ccname); | 682 | s->authctxt->krb5_ccname); |
682 | #endif | 683 | #endif |
@@ -688,7 +689,7 @@ Index: b/session.c | |||
688 | #ifdef USE_PAM | 689 | #ifdef USE_PAM |
689 | /* | 690 | /* |
690 | * Pull in any environment variables that may have | 691 | * Pull in any environment variables that may have |
691 | @@ -2300,6 +2309,10 @@ | 692 | @@ -2308,6 +2317,10 @@ |
692 | 693 | ||
693 | debug("session_pty_cleanup: session %d release %s", s->self, s->tty); | 694 | debug("session_pty_cleanup: session %d release %s", s->self, s->tty); |
694 | 695 | ||