rcolebaugh / rpms / openssh

Forked from rpms/openssh 2 years ago
Clone

Blame SOURCES/pam_ssh_agent_auth-0.10.3-no-xfree.patch

1d31ef
diff -up openssh-7.4p1/pam_ssh_agent_auth-0.10.3/get_command_line.c.psaa-xfree openssh-7.4p1/pam_ssh_agent_auth-0.10.3/get_command_line.c
1d31ef
--- openssh-7.4p1/pam_ssh_agent_auth-0.10.3/get_command_line.c.psaa-xfree	2017-02-13 16:06:46.260653300 +0100
1d31ef
+++ openssh-7.4p1/pam_ssh_agent_auth-0.10.3/get_command_line.c	2017-02-13 16:07:22.228619884 +0100
1d31ef
@@ -105,9 +105,9 @@ pamsshagentauth_free_command_line(char *
1d31ef
 {
1d31ef
     size_t i;
1d31ef
     for (i = 0; i < n_args; i++)
1d31ef
-        pamsshagentauth_xfree(argv[i]);
1d31ef
+        free(argv[i]);
1d31ef
 
1d31ef
-    pamsshagentauth_xfree(argv);
1d31ef
+    free(argv);
1d31ef
     return;
1d31ef
 }
1d31ef
 
1d31ef
diff -up openssh-7.4p1/pam_ssh_agent_auth-0.10.3/iterate_ssh_agent_keys.c.psaa-xfree openssh-7.4p1/pam_ssh_agent_auth-0.10.3/iterate_ssh_agent_keys.c
1d31ef
--- openssh-7.4p1/pam_ssh_agent_auth-0.10.3/iterate_ssh_agent_keys.c.psaa-xfree	2017-02-13 16:06:46.261653299 +0100
1d31ef
+++ openssh-7.4p1/pam_ssh_agent_auth-0.10.3/iterate_ssh_agent_keys.c	2017-02-13 16:08:01.263583622 +0100
1d31ef
@@ -170,7 +170,7 @@ pamsshagentauth_session_id2_gen(Buffer *
1d31ef
     /* pamsshagentauth_debug3("action: %s", action_logbuf); */
1d31ef
     pamsshagentauth_buffer_put_string(session_id2, action_agentbuf.buf + action_agentbuf.offset, action_agentbuf.end - action_agentbuf.offset);
1d31ef
     if (free_logbuf) { 
1d31ef
-        pamsshagentauth_xfree(action_logbuf);
1d31ef
+        free(action_logbuf);
1d31ef
         pamsshagentauth_buffer_free(&action_agentbuf);
1d31ef
     }
1d31ef
     /* pamsshagentauth_debug3("hostname: %s", hostname); */
1d31ef
@@ -306,9 +306,9 @@ pamsshagentauth_find_authorized_keys(con
1d31ef
                 if(userauth_pubkey_from_id(ruser, id, &session_id2)) {
1d31ef
                     retval = 1;
1d31ef
                 }
1d31ef
-                pamsshagentauth_xfree(id->filename);
1d31ef
+                free(id->filename);
1d31ef
                 pamsshagentauth_key_free(id->key);
1d31ef
-                pamsshagentauth_xfree(id);
1d31ef
+                free(id);
1d31ef
                 if(retval == 1)
1d31ef
                     break;
1d31ef
             }
1d31ef
diff -up openssh-7.4p1/pam_ssh_agent_auth-0.10.3/pam_user_key_allowed2.c.psaa-xfree openssh-7.4p1/pam_ssh_agent_auth-0.10.3/pam_user_key_allowed2.c
1d31ef
--- openssh-7.4p1/pam_ssh_agent_auth-0.10.3/pam_user_key_allowed2.c.psaa-xfree	2017-02-13 16:06:46.261653299 +0100
1d31ef
+++ openssh-7.4p1/pam_ssh_agent_auth-0.10.3/pam_user_key_allowed2.c	2017-02-13 16:08:25.507561099 +0100
1d31ef
@@ -105,7 +105,7 @@ pamsshagentauth_check_authkeys_file(FILE
1d31ef
             fp = pamsshagentauth_key_fingerprint(found, SSH_FP_MD5, SSH_FP_HEX);
1d31ef
             pamsshagentauth_logit("Found matching %s key: %s",
1d31ef
                                   pamsshagentauth_key_type(found), fp);
1d31ef
-            pamsshagentauth_xfree(fp);
1d31ef
+            free(fp);
1d31ef
             break;
1d31ef
         }
1d31ef
     }
1d31ef
diff -up openssh-7.4p1/pam_ssh_agent_auth-0.10.3/userauth_pubkey_from_id.c.psaa-xfree openssh-7.4p1/pam_ssh_agent_auth-0.10.3/userauth_pubkey_from_id.c
1d31ef
--- openssh-7.4p1/pam_ssh_agent_auth-0.10.3/userauth_pubkey_from_id.c.psaa-xfree	2017-02-13 16:06:46.261653299 +0100
1d31ef
+++ openssh-7.4p1/pam_ssh_agent_auth-0.10.3/userauth_pubkey_from_id.c	2017-02-13 16:08:44.164543767 +0100
1d31ef
@@ -93,9 +93,9 @@ userauth_pubkey_from_id(const char *ruse
1d31ef
     /* if(&b != NULL) */
1d31ef
     pamsshagentauth_buffer_free(&b);
1d31ef
     if(sig != NULL)
1d31ef
-        pamsshagentauth_xfree(sig);
1d31ef
+        free(sig);
1d31ef
     if(pkblob != NULL)
1d31ef
-        pamsshagentauth_xfree(pkblob);
1d31ef
+        free(pkblob);
1d31ef
     CRYPTO_cleanup_all_ex_data();
1d31ef
     return authenticated;
1d31ef
 }