summaryrefslogtreecommitdiff
path: root/pkg/openssh/patch/0002-printf-p-specifier-requires-void-argument.patch
diff options
context:
space:
mode:
authorMichael Forney <mforney@mforney.org>2020-04-22 02:19:18 -0700
committerMichael Forney <mforney@mforney.org>2020-04-22 22:55:05 -0700
commitd36ce79317be230c6559f8e1abba88095f998fb1 (patch)
tree3cfa4dfc2445c282b3d82eb65f5dd931b7e40672 /pkg/openssh/patch/0002-printf-p-specifier-requires-void-argument.patch
parent0dbae24a86415b956640738c921ddc4079a424c3 (diff)
openssh: Update to latest git and port to BearSSL
Diffstat (limited to 'pkg/openssh/patch/0002-printf-p-specifier-requires-void-argument.patch')
-rw-r--r--pkg/openssh/patch/0002-printf-p-specifier-requires-void-argument.patch133
1 files changed, 0 insertions, 133 deletions
diff --git a/pkg/openssh/patch/0002-printf-p-specifier-requires-void-argument.patch b/pkg/openssh/patch/0002-printf-p-specifier-requires-void-argument.patch
deleted file mode 100644
index bf7cda22..00000000
--- a/pkg/openssh/patch/0002-printf-p-specifier-requires-void-argument.patch
+++ /dev/null
@@ -1,133 +0,0 @@
-From de0c266e353663043097e1a8bc3a8959f1ee2bcd Mon Sep 17 00:00:00 2001
-From: Michael Forney <mforney@mforney.org>
-Date: Wed, 27 Nov 2019 19:16:26 -0800
-Subject: [PATCH] printf %p specifier requires `void *` argument
-
----
- monitor.c | 4 ++--
- session.c | 2 +-
- ssh-pkcs11-helper.c | 2 +-
- ssh-pkcs11.c | 16 +++++++++-------
- sshbuf-misc.c | 2 +-
- 5 files changed, 14 insertions(+), 12 deletions(-)
-
-diff --git a/monitor.c b/monitor.c
-index dc6d78d3..d5c91465 100644
---- a/monitor.c
-+++ b/monitor.c
-@@ -1166,7 +1166,7 @@ mm_answer_keyallowed(struct ssh *ssh, int sock, struct sshbuf *m)
- (r = sshbuf_get_u32(m, &pubkey_auth_attempt)) != 0)
- fatal("%s: buffer error: %s", __func__, ssh_err(r));
-
-- debug3("%s: key_from_blob: %p", __func__, key);
-+ debug3("%s: key_from_blob: %p", __func__, (void *)key);
-
- if (key != NULL && authctxt->valid) {
- /* These should not make it past the privsep child */
-@@ -1434,7 +1434,7 @@ mm_answer_keyverify(struct ssh *ssh, int sock, struct sshbuf *m)
-
- ret = sshkey_verify(key, signature, signaturelen, data, datalen,
- sigalg, ssh->compat, &sig_details);
-- debug3("%s: %s %p signature %s%s%s", __func__, auth_method, key,
-+ debug3("%s: %s %p signature %s%s%s", __func__, auth_method, (void *)key,
- (ret == 0) ? "verified" : "unverified",
- (ret != 0) ? ": " : "", (ret != 0) ? ssh_err(ret) : "");
-
-diff --git a/session.c b/session.c
-index 8c0e54f7..86e02fb0 100644
---- a/session.c
-+++ b/session.c
-@@ -1791,7 +1791,7 @@ session_dump(void)
- s->used,
- s->next_unused,
- s->self,
-- s,
-+ (void *)s,
- s->chanid,
- (long)s->pid);
- }
-diff --git a/ssh-pkcs11-helper.c b/ssh-pkcs11-helper.c
-index 17220d62..9269cc25 100644
---- a/ssh-pkcs11-helper.c
-+++ b/ssh-pkcs11-helper.c
-@@ -98,7 +98,7 @@ lookup_key(struct sshkey *k)
- struct pkcs11_keyinfo *ki;
-
- TAILQ_FOREACH(ki, &pkcs11_keylist, next) {
-- debug("check %p %s %s", ki, ki->providername, ki->label);
-+ debug("check %p %s %s", (void *)ki, ki->providername, ki->label);
- if (sshkey_equal(k, ki->key))
- return (ki->key);
- }
-diff --git a/ssh-pkcs11.c b/ssh-pkcs11.c
-index a302c79c..255534ba 100644
---- a/ssh-pkcs11.c
-+++ b/ssh-pkcs11.c
-@@ -112,7 +112,7 @@ pkcs11_provider_finalize(struct pkcs11_provider *p)
- CK_ULONG i;
-
- debug("pkcs11_provider_finalize: %p refcount %d valid %d",
-- p, p->refcount, p->valid);
-+ (void *)p, p->refcount, p->valid);
- if (!p->valid)
- return;
- for (i = 0; i < p->nslots; i++) {
-@@ -135,10 +135,12 @@ pkcs11_provider_finalize(struct pkcs11_provider *p)
- static void
- pkcs11_provider_unref(struct pkcs11_provider *p)
- {
-- debug("pkcs11_provider_unref: %p refcount %d", p, p->refcount);
-+ debug("pkcs11_provider_unref: %p refcount %d", (void *)p, p->refcount);
- if (--p->refcount <= 0) {
-- if (p->valid)
-- error("pkcs11_provider_unref: %p still valid", p);
-+ if (p->valid) {
-+ error("pkcs11_provider_unref: %p still valid",
-+ (void *)p);
-+ }
- free(p->name);
- free(p->slotlist);
- free(p->slotinfo);
-@@ -166,7 +168,7 @@ pkcs11_provider_lookup(char *provider_id)
- struct pkcs11_provider *p;
-
- TAILQ_FOREACH(p, &pkcs11_providers, next) {
-- debug("check %p %s", p, p->name);
-+ debug("check %p %s", (void *)p, p->name);
- if (!strcmp(provider_id, p->name))
- return (p);
- }
-@@ -323,7 +325,7 @@ pkcs11_check_obj_bool_attrib(struct pkcs11_key *k11, CK_OBJECT_HANDLE obj,
- }
- *val = flag != 0;
- debug("%s: provider %p slot %lu object %lu: attrib %lu = %d",
-- __func__, k11->provider, k11->slotidx, obj, type, *val);
-+ __func__, (void *)k11->provider, k11->slotidx, obj, type, *val);
- return (0);
- }
-
-@@ -415,7 +417,7 @@ pkcs11_rsa_private_encrypt(int flen, const u_char *from, u_char *to, RSA *rsa,
- int rval = -1;
-
- if ((k11 = RSA_get_ex_data(rsa, rsa_idx)) == NULL) {
-- error("RSA_get_ex_data failed for rsa %p", rsa);
-+ error("RSA_get_ex_data failed for rsa %p", (void *)rsa);
- return (-1);
- }
-
-diff --git a/sshbuf-misc.c b/sshbuf-misc.c
-index c0336e86..a0e01a80 100644
---- a/sshbuf-misc.c
-+++ b/sshbuf-misc.c
-@@ -65,7 +65,7 @@ sshbuf_dump_data(const void *s, size_t len, FILE *f)
- void
- sshbuf_dump(struct sshbuf *buf, FILE *f)
- {
-- fprintf(f, "buffer %p len = %zu\n", buf, sshbuf_len(buf));
-+ fprintf(f, "buffer %p len = %zu\n", (void *)buf, sshbuf_len(buf));
- sshbuf_dump_data(sshbuf_ptr(buf), sshbuf_len(buf), f);
- }
-
---
-2.25.0
-