summaryrefslogtreecommitdiff
path: root/pkg/openbsd/patch/0040-nc-Add-option-to-disable-certificate-time-checking.patch
diff options
context:
space:
mode:
Diffstat (limited to 'pkg/openbsd/patch/0040-nc-Add-option-to-disable-certificate-time-checking.patch')
-rw-r--r--pkg/openbsd/patch/0040-nc-Add-option-to-disable-certificate-time-checking.patch12
1 files changed, 6 insertions, 6 deletions
diff --git a/pkg/openbsd/patch/0040-nc-Add-option-to-disable-certificate-time-checking.patch b/pkg/openbsd/patch/0040-nc-Add-option-to-disable-certificate-time-checking.patch
index 56f4071e..ca0fe511 100644
--- a/pkg/openbsd/patch/0040-nc-Add-option-to-disable-certificate-time-checking.patch
+++ b/pkg/openbsd/patch/0040-nc-Add-option-to-disable-certificate-time-checking.patch
@@ -1,4 +1,4 @@
-From 439750086a7803d24bad1ae51a51d0949a89b6a0 Mon Sep 17 00:00:00 2001
+From 506272f64ba252c562e3036d14713de780817d1a Mon Sep 17 00:00:00 2001
From: Michael Forney <mforney@mforney.org>
Date: Thu, 20 May 2021 13:44:35 -0700
Subject: [PATCH] nc: Add option to disable certificate time checking
@@ -9,7 +9,7 @@ Subject: [PATCH] nc: Add option to disable certificate time checking
2 files changed, 8 insertions(+), 2 deletions(-)
diff --git a/usr.bin/nc/nc.1 b/usr.bin/nc/nc.1
-index 14733597c18..74a3ecc7da6 100644
+index 0ef318e0e6f..5858ef763dc 100644
--- a/usr.bin/nc/nc.1
+++ b/usr.bin/nc/nc.1
@@ -249,6 +249,8 @@ may be one of:
@@ -22,7 +22,7 @@ index 14733597c18..74a3ecc7da6 100644
which requires a client certificate on incoming connections; or
.Cm muststaple ,
diff --git a/usr.bin/nc/netcat.c b/usr.bin/nc/netcat.c
-index 489fe492fbd..89636f4f797 100644
+index 7369ed85619..29d2cb3bf29 100644
--- a/usr.bin/nc/netcat.c
+++ b/usr.bin/nc/netcat.c
@@ -70,8 +70,9 @@
@@ -37,7 +37,7 @@ index 489fe492fbd..89636f4f797 100644
/* Command Line Options */
int dflag; /* detached, no stdin */
-@@ -547,6 +548,8 @@ main(int argc, char *argv[])
+@@ -546,6 +547,8 @@ main(int argc, char *argv[])
errx(1, "clientcert is only valid with -l");
if (TLSopt & TLS_NONAME)
tls_config_insecure_noverifyname(tls_cfg);
@@ -46,7 +46,7 @@ index 489fe492fbd..89636f4f797 100644
if (TLSopt & TLS_NOVERIFY) {
if (tls_expecthash != NULL)
errx(1, "-H and -T noverify may not be used "
-@@ -1696,6 +1699,7 @@ process_tls_opt(char *s, int *flags)
+@@ -1705,6 +1708,7 @@ process_tls_opt(char *s, int *flags)
{ "muststaple", TLS_MUSTSTAPLE, NULL },
{ "noverify", TLS_NOVERIFY, NULL },
{ "noname", TLS_NONAME, NULL },
@@ -55,5 +55,5 @@ index 489fe492fbd..89636f4f797 100644
{ NULL, -1, NULL },
};
--
-2.35.1
+2.37.3