Compare commits
4 Commits
master
...
f33-riscv6
Author | SHA1 | Date | |
---|---|---|---|
0d4aa02047 | |||
|
6c897f6328 | ||
|
72f50c904f | ||
9a9227d2eb |
@ -2159,12 +2159,13 @@ index a302c79c..879fe917 100644
|
|||||||
if (rv != CKR_OK) {
|
if (rv != CKR_OK) {
|
||||||
error("C_GetAttributeValue failed: %lu", rv);
|
error("C_GetAttributeValue failed: %lu", rv);
|
||||||
return (NULL);
|
return (NULL);
|
||||||
@@ -717,18 +874,19 @@ pkcs11_fetch_ecdsa_pubkey(struct pkcs11_provider *p, CK_ULONG slotidx,
|
@@ -717,19 +874,19 @@ pkcs11_fetch_ecdsa_pubkey(struct pkcs11_provider *p, CK_ULONG slotidx,
|
||||||
|
* ensure that none of the others are zero length.
|
||||||
* XXX assumes CKA_ID is always first.
|
* XXX assumes CKA_ID is always first.
|
||||||
*/
|
*/
|
||||||
if (key_attr[1].ulValueLen == 0 ||
|
- if (key_attr[1].ulValueLen == 0 ||
|
||||||
- key_attr[2].ulValueLen == 0) {
|
- key_attr[2].ulValueLen == 0) {
|
||||||
+ key_attr[2].ulValueLen == 0 ||
|
+ if (key_attr[2].ulValueLen == 0 ||
|
||||||
+ key_attr[3].ulValueLen == 0) {
|
+ key_attr[3].ulValueLen == 0) {
|
||||||
error("invalid attribute length");
|
error("invalid attribute length");
|
||||||
return (NULL);
|
return (NULL);
|
||||||
@ -2259,12 +2260,13 @@ index a302c79c..879fe917 100644
|
|||||||
if (rv != CKR_OK) {
|
if (rv != CKR_OK) {
|
||||||
error("C_GetAttributeValue failed: %lu", rv);
|
error("C_GetAttributeValue failed: %lu", rv);
|
||||||
return (NULL);
|
return (NULL);
|
||||||
@@ -838,18 +998,19 @@ pkcs11_fetch_rsa_pubkey(struct pkcs11_provider *p, CK_ULONG slotidx,
|
@@ -838,19 +998,19 @@ pkcs11_fetch_rsa_pubkey(struct pkcs11_provider *p, CK_ULONG slotidx,
|
||||||
|
* ensure that none of the others are zero length.
|
||||||
* XXX assumes CKA_ID is always first.
|
* XXX assumes CKA_ID is always first.
|
||||||
*/
|
*/
|
||||||
if (key_attr[1].ulValueLen == 0 ||
|
- if (key_attr[1].ulValueLen == 0 ||
|
||||||
- key_attr[2].ulValueLen == 0) {
|
- key_attr[2].ulValueLen == 0) {
|
||||||
+ key_attr[2].ulValueLen == 0 ||
|
+ if (key_attr[2].ulValueLen == 0 ||
|
||||||
+ key_attr[3].ulValueLen == 0) {
|
+ key_attr[3].ulValueLen == 0) {
|
||||||
error("invalid attribute length");
|
error("invalid attribute length");
|
||||||
return (NULL);
|
return (NULL);
|
||||||
|
16
openssh.spec
16
openssh.spec
@ -51,14 +51,14 @@
|
|||||||
|
|
||||||
# Do not forget to bump pam_ssh_agent_auth release if you rewind the main package release to 1
|
# Do not forget to bump pam_ssh_agent_auth release if you rewind the main package release to 1
|
||||||
%global openssh_ver 8.4p1
|
%global openssh_ver 8.4p1
|
||||||
%global openssh_rel 4
|
%global openssh_rel 5
|
||||||
%global pam_ssh_agent_ver 0.10.4
|
%global pam_ssh_agent_ver 0.10.4
|
||||||
%global pam_ssh_agent_rel 1
|
%global pam_ssh_agent_rel 1
|
||||||
|
|
||||||
Summary: An open source implementation of SSH protocol version 2
|
Summary: An open source implementation of SSH protocol version 2
|
||||||
Name: openssh
|
Name: openssh
|
||||||
Version: %{openssh_ver}
|
Version: %{openssh_ver}
|
||||||
Release: %{openssh_rel}%{?dist}
|
Release: %{openssh_rel}.0.riscv64%{?dist}
|
||||||
URL: http://www.openssh.com/portable.html
|
URL: http://www.openssh.com/portable.html
|
||||||
#URL1: https://github.com/jbeverly/pam_ssh_agent_auth/
|
#URL1: https://github.com/jbeverly/pam_ssh_agent_auth/
|
||||||
Source0: ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-%{version}.tar.gz
|
Source0: ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-%{version}.tar.gz
|
||||||
@ -274,7 +274,7 @@ Requires: openssh = %{version}-%{release}
|
|||||||
%package -n pam_ssh_agent_auth
|
%package -n pam_ssh_agent_auth
|
||||||
Summary: PAM module for authentication with ssh-agent
|
Summary: PAM module for authentication with ssh-agent
|
||||||
Version: %{pam_ssh_agent_ver}
|
Version: %{pam_ssh_agent_ver}
|
||||||
Release: %{pam_ssh_agent_rel}.%{openssh_rel}%{?dist}.2
|
Release: %{pam_ssh_agent_rel}.%{openssh_rel}.0.riscv64%{?dist}.2
|
||||||
License: BSD
|
License: BSD
|
||||||
|
|
||||||
%description
|
%description
|
||||||
@ -451,7 +451,11 @@ fi
|
|||||||
--with-pam \
|
--with-pam \
|
||||||
%if %{WITH_SELINUX}
|
%if %{WITH_SELINUX}
|
||||||
--with-selinux --with-audit=linux \
|
--with-selinux --with-audit=linux \
|
||||||
|
%ifnarch riscv64
|
||||||
--with-sandbox=seccomp_filter \
|
--with-sandbox=seccomp_filter \
|
||||||
|
%else
|
||||||
|
--with-sandbox=no \
|
||||||
|
%endif
|
||||||
%endif
|
%endif
|
||||||
%if %{kerberos5}
|
%if %{kerberos5}
|
||||||
--with-kerberos5${krb5_prefix:+=${krb5_prefix}} \
|
--with-kerberos5${krb5_prefix:+=${krb5_prefix}} \
|
||||||
@ -669,6 +673,12 @@ test -f %{sysconfig_anaconda} && \
|
|||||||
%endif
|
%endif
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Thu May 06 2021 David Abdurachmanov <david.abdurachmanov@gmail.com> - 8.4p1-5 + 0.10.4-1.0.riscv64
|
||||||
|
- Dissable seccomp_filter on riscv64
|
||||||
|
|
||||||
|
* Wed Feb 03 2021 Jakub Jelen <jjelen@redhat.com> - 8.4p1-5 + 0.10.4-1
|
||||||
|
- Accept empty labels for keys from PKCS#11 (#1919007)
|
||||||
|
|
||||||
* Tue Dec 01 2020 Jakub Jelen <jjelen@redhat.com> - 8.4p1-4 + 0.10.4-1
|
* Tue Dec 01 2020 Jakub Jelen <jjelen@redhat.com> - 8.4p1-4 + 0.10.4-1
|
||||||
- Remove "PasswordAuthentication yes" from vendor configuration as it is
|
- Remove "PasswordAuthentication yes" from vendor configuration as it is
|
||||||
already default and it might be hard to override.
|
already default and it might be hard to override.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user