summaryrefslogtreecommitdiff
path: root/debian/patches/consolekit.patch
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2013-05-07 11:47:26 +0100
committerColin Watson <cjwatson@debian.org>2013-05-07 11:47:26 +0100
commit2ea3f720daeb1ca9f765365fce3a9546961fe624 (patch)
treec4fb7d1f51fa51e7677232de806aae150e29e2ac /debian/patches/consolekit.patch
parentf5efcd3450bbf8261915e0c4a6f851229dddaa79 (diff)
parentecebda56da46a03dafff923d91c382f31faa9eec (diff)
* New upstream release (http://www.openssh.com/txt/release-6.2).
- Add support for multiple required authentication in SSH protocol 2 via an AuthenticationMethods option (closes: #195716). - Fix Sophie Germain formula in moduli(5) (closes: #698612). - Update ssh-copy-id to Phil Hands' greatly revised version (closes: #99785, #322228, #620428; LP: #518883, #835901, #1074798).
Diffstat (limited to 'debian/patches/consolekit.patch')
-rw-r--r--debian/patches/consolekit.patch55
1 files changed, 28 insertions, 27 deletions
diff --git a/debian/patches/consolekit.patch b/debian/patches/consolekit.patch
index a952e4405..d67123a1e 100644
--- a/debian/patches/consolekit.patch
+++ b/debian/patches/consolekit.patch
@@ -1,13 +1,13 @@
1Description: Add support for registering ConsoleKit sessions on login 1Description: Add support for registering ConsoleKit sessions on login
2Author: Colin Watson <cjwatson@ubuntu.com> 2Author: Colin Watson <cjwatson@ubuntu.com>
3Bug: https://bugzilla.mindrot.org/show_bug.cgi?id=1450 3Bug: https://bugzilla.mindrot.org/show_bug.cgi?id=1450
4Last-Updated: 2012-10-31 4Last-Updated: 2013-05-07
5 5
6Index: b/Makefile.in 6Index: b/Makefile.in
7=================================================================== 7===================================================================
8--- a/Makefile.in 8--- a/Makefile.in
9+++ b/Makefile.in 9+++ b/Makefile.in
10@@ -94,7 +94,8 @@ 10@@ -96,7 +96,8 @@
11 sftp-server.o sftp-common.o \ 11 sftp-server.o sftp-common.o \
12 roaming_common.o roaming_serv.o \ 12 roaming_common.o roaming_serv.o \
13 sandbox-null.o sandbox-rlimit.o sandbox-systrace.o sandbox-darwin.o \ 13 sandbox-null.o sandbox-rlimit.o sandbox-systrace.o sandbox-darwin.o \
@@ -21,9 +21,9 @@ Index: b/configure.ac
21=================================================================== 21===================================================================
22--- a/configure.ac 22--- a/configure.ac
23+++ b/configure.ac 23+++ b/configure.ac
24@@ -3672,6 +3672,30 @@ 24@@ -3801,6 +3801,30 @@
25 ] 25 AC_SUBST([GSSLIBS])
26 ) 26 AC_SUBST([K5LIBS])
27 27
28+# Check whether user wants ConsoleKit support 28+# Check whether user wants ConsoleKit support
29+CONSOLEKIT_MSG="no" 29+CONSOLEKIT_MSG="no"
@@ -52,7 +52,7 @@ Index: b/configure.ac
52 # Looking for programs, paths and files 52 # Looking for programs, paths and files
53 53
54 PRIVSEP_PATH=/var/empty 54 PRIVSEP_PATH=/var/empty
55@@ -4435,6 +4459,7 @@ 55@@ -4600,6 +4624,7 @@
56 echo " libedit support: $LIBEDIT_MSG" 56 echo " libedit support: $LIBEDIT_MSG"
57 echo " Solaris process contract support: $SPC_MSG" 57 echo " Solaris process contract support: $SPC_MSG"
58 echo " Solaris project support: $SP_MSG" 58 echo " Solaris project support: $SP_MSG"
@@ -64,7 +64,7 @@ Index: b/configure
64=================================================================== 64===================================================================
65--- a/configure 65--- a/configure
66+++ b/configure 66+++ b/configure
67@@ -735,6 +735,7 @@ 67@@ -737,6 +737,7 @@
68 with_sandbox 68 with_sandbox
69 with_selinux 69 with_selinux
70 with_kerberos5 70 with_kerberos5
@@ -72,7 +72,7 @@ Index: b/configure
72 with_privsep_path 72 with_privsep_path
73 with_xauth 73 with_xauth
74 enable_strip 74 enable_strip
75@@ -1425,6 +1426,7 @@ 75@@ -1427,6 +1428,7 @@
76 --with-sandbox=style Specify privilege separation sandbox (no, darwin, rlimit, systrace, seccomp_filter) 76 --with-sandbox=style Specify privilege separation sandbox (no, darwin, rlimit, systrace, seccomp_filter)
77 --with-selinux Enable SELinux support 77 --with-selinux Enable SELinux support
78 --with-kerberos5=PATH Enable Kerberos 5 support 78 --with-kerberos5=PATH Enable Kerberos 5 support
@@ -80,8 +80,8 @@ Index: b/configure
80 --with-privsep-path=xxx Path for privilege separation chroot (default=/var/empty) 80 --with-privsep-path=xxx Path for privilege separation chroot (default=/var/empty)
81 --with-xauth=PATH Specify path to xauth program 81 --with-xauth=PATH Specify path to xauth program
82 --with-maildir=/path/to/mail Specify your system mail directory 82 --with-maildir=/path/to/mail Specify your system mail directory
83@@ -15683,6 +15685,135 @@ 83@@ -16002,6 +16004,135 @@
84 fi 84
85 85
86 86
87+# Check whether user wants ConsoleKit support 87+# Check whether user wants ConsoleKit support
@@ -216,7 +216,7 @@ Index: b/configure
216 # Looking for programs, paths and files 216 # Looking for programs, paths and files
217 217
218 PRIVSEP_PATH=/var/empty 218 PRIVSEP_PATH=/var/empty
219@@ -18155,6 +18286,7 @@ 219@@ -18527,6 +18658,7 @@
220 echo " libedit support: $LIBEDIT_MSG" 220 echo " libedit support: $LIBEDIT_MSG"
221 echo " Solaris process contract support: $SPC_MSG" 221 echo " Solaris process contract support: $SPC_MSG"
222 echo " Solaris project support: $SP_MSG" 222 echo " Solaris project support: $SP_MSG"
@@ -522,7 +522,7 @@ Index: b/monitor.c
522 static Authctxt *authctxt; 522 static Authctxt *authctxt;
523 static BIGNUM *ssh1_challenge = NULL; /* used for ssh1 rsa auth */ 523 static BIGNUM *ssh1_challenge = NULL; /* used for ssh1 rsa auth */
524 524
525@@ -283,6 +290,9 @@ 525@@ -284,6 +291,9 @@
526 {MONITOR_REQ_AUDIT_EVENT, MON_PERMIT, mm_answer_audit_event}, 526 {MONITOR_REQ_AUDIT_EVENT, MON_PERMIT, mm_answer_audit_event},
527 {MONITOR_REQ_AUDIT_COMMAND, MON_PERMIT, mm_answer_audit_command}, 527 {MONITOR_REQ_AUDIT_COMMAND, MON_PERMIT, mm_answer_audit_command},
528 #endif 528 #endif
@@ -532,7 +532,7 @@ Index: b/monitor.c
532 {0, 0, NULL} 532 {0, 0, NULL}
533 }; 533 };
534 534
535@@ -325,6 +335,9 @@ 535@@ -326,6 +336,9 @@
536 {MONITOR_REQ_AUDIT_EVENT, MON_PERMIT, mm_answer_audit_event}, 536 {MONITOR_REQ_AUDIT_EVENT, MON_PERMIT, mm_answer_audit_event},
537 {MONITOR_REQ_AUDIT_COMMAND, MON_PERMIT|MON_ONCE, mm_answer_audit_command}, 537 {MONITOR_REQ_AUDIT_COMMAND, MON_PERMIT|MON_ONCE, mm_answer_audit_command},
538 #endif 538 #endif
@@ -542,7 +542,7 @@ Index: b/monitor.c
542 {0, 0, NULL} 542 {0, 0, NULL}
543 }; 543 };
544 544
545@@ -495,6 +508,9 @@ 545@@ -514,6 +527,9 @@
546 monitor_permit(mon_dispatch, MONITOR_REQ_PTY, 1); 546 monitor_permit(mon_dispatch, MONITOR_REQ_PTY, 1);
547 monitor_permit(mon_dispatch, MONITOR_REQ_PTYCLEANUP, 1); 547 monitor_permit(mon_dispatch, MONITOR_REQ_PTYCLEANUP, 1);
548 } 548 }
@@ -552,7 +552,7 @@ Index: b/monitor.c
552 552
553 for (;;) 553 for (;;)
554 monitor_read(pmonitor, mon_dispatch, NULL); 554 monitor_read(pmonitor, mon_dispatch, NULL);
555@@ -2196,6 +2212,34 @@ 555@@ -2232,6 +2248,34 @@
556 buffer_put_int(m, major); 556 buffer_put_int(m, major);
557 buffer_put_string(m, hash.value, hash.length); 557 buffer_put_string(m, hash.value, hash.length);
558 558
@@ -591,19 +591,20 @@ Index: b/monitor.h
591=================================================================== 591===================================================================
592--- a/monitor.h 592--- a/monitor.h
593+++ b/monitor.h 593+++ b/monitor.h
594@@ -62,6 +62,7 @@ 594@@ -75,6 +75,8 @@
595 MONITOR_REQ_PAM_RESPOND, MONITOR_ANS_PAM_RESPOND, 595
596 MONITOR_REQ_PAM_FREE_CTX, MONITOR_ANS_PAM_FREE_CTX, 596 MONITOR_REQ_AUTHROLE = 300,
597 MONITOR_REQ_AUDIT_EVENT, MONITOR_REQ_AUDIT_COMMAND, 597
598+ MONITOR_REQ_CONSOLEKIT_REGISTER, MONITOR_ANS_CONSOLEKIT_REGISTER, 598+ MONITOR_REQ_CONSOLEKIT_REGISTER = 400, MONITOR_ANS_CONSOLEKIT_REGISTER = 401,
599 MONITOR_REQ_TERM, 599+
600 MONITOR_REQ_JPAKE_STEP1, MONITOR_ANS_JPAKE_STEP1, 600 };
601 MONITOR_REQ_JPAKE_GET_PWDATA, MONITOR_ANS_JPAKE_GET_PWDATA, 601
602 struct mm_master;
602Index: b/monitor_wrap.c 603Index: b/monitor_wrap.c
603=================================================================== 604===================================================================
604--- a/monitor_wrap.c 605--- a/monitor_wrap.c
605+++ b/monitor_wrap.c 606+++ b/monitor_wrap.c
606@@ -1310,6 +1310,37 @@ 607@@ -1311,6 +1311,37 @@
607 mm_ssh_gssapi_sign(Gssctxt *ctx, gss_buffer_desc *data, gss_buffer_desc *hash) 608 mm_ssh_gssapi_sign(Gssctxt *ctx, gss_buffer_desc *data, gss_buffer_desc *hash)
608 { 609 {
609 Buffer m; 610 Buffer m;
@@ -666,7 +667,7 @@ Index: b/session.c
666 667
667 #if defined(KRB5) && defined(USE_AFS) 668 #if defined(KRB5) && defined(USE_AFS)
668 #include <kafs.h> 669 #include <kafs.h>
669@@ -1129,6 +1130,9 @@ 670@@ -1132,6 +1133,9 @@
670 #if !defined (HAVE_LOGIN_CAP) && !defined (HAVE_CYGWIN) 671 #if !defined (HAVE_LOGIN_CAP) && !defined (HAVE_CYGWIN)
671 char *path = NULL; 672 char *path = NULL;
672 #endif 673 #endif
@@ -676,7 +677,7 @@ Index: b/session.c
676 677
677 /* Initialize the environment. */ 678 /* Initialize the environment. */
678 envsize = 100; 679 envsize = 100;
679@@ -1273,6 +1277,11 @@ 680@@ -1276,6 +1280,11 @@
680 child_set_env(&env, &envsize, "KRB5CCNAME", 681 child_set_env(&env, &envsize, "KRB5CCNAME",
681 s->authctxt->krb5_ccname); 682 s->authctxt->krb5_ccname);
682 #endif 683 #endif
@@ -688,7 +689,7 @@ Index: b/session.c
688 #ifdef USE_PAM 689 #ifdef USE_PAM
689 /* 690 /*
690 * Pull in any environment variables that may have 691 * Pull in any environment variables that may have
691@@ -2300,6 +2309,10 @@ 692@@ -2308,6 +2317,10 @@
692 693
693 debug("session_pty_cleanup: session %d release %s", s->self, s->tty); 694 debug("session_pty_cleanup: session %d release %s", s->self, s->tty);
694 695