openssh-7.3_p1-x509-9.2-warnings.patch 3.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110
  1. diff --git a/kex.c b/kex.c
  2. index 143227a..c9b84c2 100644
  3. --- a/kex.c
  4. +++ b/kex.c
  5. @@ -345,9 +345,9 @@ kex_reset_dispatch(struct ssh *ssh)
  6. static int
  7. kex_send_ext_info(struct ssh *ssh)
  8. {
  9. +#ifdef EXPERIMENTAL_RSA_SHA2_256
  10. int r;
  11. -#ifdef EXPERIMENTAL_RSA_SHA2_256
  12. /* IMPORTANT NOTE:
  13. * Do not offer rsa-sha2-* until is resolved misconfiguration issue
  14. * with allowed public key algorithms!
  15. diff --git a/key-eng.c b/key-eng.c
  16. index 9bc50fd..bc0d03d 100644
  17. --- a/key-eng.c
  18. +++ b/key-eng.c
  19. @@ -786,7 +786,6 @@ ssh_engines_shutdown() {
  20. while (buffer_len(&eng_list) > 0) {
  21. u_int k = 0;
  22. char *s;
  23. - ENGINE *e;
  24. s = buffer_get_cstring_ret(&eng_list, &k);
  25. ssh_engine_reset(s);
  26. diff --git a/monitor.c b/monitor.c
  27. index 345d3df..0de30ad 100644
  28. --- a/monitor.c
  29. +++ b/monitor.c
  30. @@ -707,7 +707,7 @@ mm_answer_sign(int sock, Buffer *m)
  31. (r = sshbuf_get_string(m, &p, &datlen)) != 0 ||
  32. (r = sshbuf_get_cstring(m, &alg, &alglen)) != 0)
  33. fatal("%s: buffer error: %s", __func__, ssh_err(r));
  34. - if (keyid > INT_MAX)
  35. + if (keyid32 > INT_MAX)
  36. fatal("%s: invalid key ID", __func__);
  37. keyid = keyid32; /*save cast*/
  38. diff --git a/readconf.c b/readconf.c
  39. index beb38a0..1cbda7e 100644
  40. --- a/readconf.c
  41. +++ b/readconf.c
  42. @@ -1459,7 +1459,9 @@ parse_int:
  43. case oHostKeyAlgorithms:
  44. charptr = &options->hostkeyalgorithms;
  45. +# if 0
  46. parse_keytypes:
  47. +# endif
  48. arg = strdelim(&s);
  49. if (!arg || *arg == '\0')
  50. fatal("%.200s line %d: Missing argument.",
  51. diff --git a/servconf.c b/servconf.c
  52. index a540138..e77a344 100644
  53. --- a/servconf.c
  54. +++ b/servconf.c
  55. @@ -1574,7 +1573,9 @@ parse_string:
  56. case sHostKeyAlgorithms:
  57. charptr = &options->hostkeyalgorithms;
  58. +# if 0
  59. parse_keytypes:
  60. +#endif
  61. arg = strdelim(&cp);
  62. if (!arg || *arg == '\0')
  63. fatal("%s line %d: Missing argument.",
  64. diff --git a/ssh-pkcs11.c b/ssh-pkcs11.c
  65. index 50f04b7..3f9a7bf 100644
  66. --- a/ssh-pkcs11.c
  67. +++ b/ssh-pkcs11.c
  68. @@ -273,21 +273,18 @@ pkcs11_dsa_finish(DSA *dsa)
  69. }
  70. #ifdef OPENSSL_HAS_ECC
  71. +#ifdef HAVE_EC_KEY_METHOD_NEW
  72. /* openssl callback for freeing an EC key */
  73. static void
  74. pkcs11_ec_finish(EC_KEY *ec)
  75. {
  76. struct pkcs11_key *k11;
  77. -#ifdef HAVE_EC_KEY_METHOD_NEW
  78. k11 = EC_KEY_get_ex_data(ec, ssh_pkcs11_ec_ctx_index);
  79. EC_KEY_set_ex_data(ec, ssh_pkcs11_ec_ctx_index, NULL);
  80. -#else
  81. - k11 = ECDSA_get_ex_data(ec, ssh_pkcs11_ec_ctx_index);
  82. - ECDSA_set_ex_data(ec, ssh_pkcs11_ec_ctx_index, NULL);
  83. -#endif
  84. pkcs11_key_free(k11);
  85. }
  86. +#endif /*def HAVE_EC_KEY_METHOD_NEW*/
  87. #endif /*def OPENSSL_HAS_ECC*/
  88. diff --git a/sshconnect.c b/sshconnect.c
  89. index fd2a70e..0960be1 100644
  90. --- a/sshconnect.c
  91. +++ b/sshconnect.c
  92. @@ -605,7 +605,7 @@ send_client_banner(int connection_out, int minor1)
  93. {
  94. /* Send our own protocol version identification. */
  95. if (compat20) {
  96. - xasprintf(&client_version_string, "SSH-%d.%d-%.100s PKIX[%d]\r\n",
  97. + xasprintf(&client_version_string, "SSH-%d.%d-%.100s PKIX[%s]\r\n",
  98. PROTOCOL_MAJOR_2, PROTOCOL_MINOR_2, SSH_VERSION, SSH_X509);
  99. } else {
  100. xasprintf(&client_version_string, "SSH-%d.%d-%.100s\n",