pkgsrc-Changes archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

CVS commit: pkgsrc/net/socat



Module Name:    pkgsrc
Committed By:   riastradh
Date:           Sun Apr  3 10:29:41 UTC 2022

Modified Files:
        pkgsrc/net/socat: Makefile distinfo
Added Files:
        pkgsrc/net/socat/patches: patch-sysutils.c patch-xio-openssl.c
            patch-xio-socket.c

Log Message:
net/socat: Patch ctype(3) abuse.


To generate a diff of this commit:
cvs rdiff -u -r1.46 -r1.47 pkgsrc/net/socat/Makefile
cvs rdiff -u -r1.33 -r1.34 pkgsrc/net/socat/distinfo
cvs rdiff -u -r0 -r1.1 pkgsrc/net/socat/patches/patch-sysutils.c \
    pkgsrc/net/socat/patches/patch-xio-openssl.c \
    pkgsrc/net/socat/patches/patch-xio-socket.c

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: pkgsrc/net/socat/Makefile
diff -u pkgsrc/net/socat/Makefile:1.46 pkgsrc/net/socat/Makefile:1.47
--- pkgsrc/net/socat/Makefile:1.46      Sun Jan 10 22:07:28 2021
+++ pkgsrc/net/socat/Makefile   Sun Apr  3 10:29:41 2022
@@ -1,6 +1,7 @@
-# $NetBSD: Makefile,v 1.46 2021/01/10 22:07:28 otis Exp $
+# $NetBSD: Makefile,v 1.47 2022/04/03 10:29:41 riastradh Exp $
 
 DISTNAME=      socat-1.7.4.1
+PKGREVISION=   1
 CATEGORIES=    net
 MASTER_SITES=  http://www.dest-unreach.org/socat/download/
 

Index: pkgsrc/net/socat/distinfo
diff -u pkgsrc/net/socat/distinfo:1.33 pkgsrc/net/socat/distinfo:1.34
--- pkgsrc/net/socat/distinfo:1.33      Tue Oct 26 11:06:57 2021
+++ pkgsrc/net/socat/distinfo   Sun Apr  3 10:29:41 2022
@@ -1,4 +1,4 @@
-$NetBSD: distinfo,v 1.33 2021/10/26 11:06:57 nia Exp $
+$NetBSD: distinfo,v 1.34 2022/04/03 10:29:41 riastradh Exp $
 
 BLAKE2s (socat-1.7.4.1.tar.gz) = 40fc322f89ca333a35c77cb25d71512404bfd116d36aecedb1773201f37b5d2e
 SHA512 (socat-1.7.4.1.tar.gz) = e43c8b23a841aea5ecc3ac324185ee4ada552a8284ec41b99245def2d8b493bca9caea1af6f646f434a7eda67a1dd71e4e037eea65fce0444840236eadb126a6
@@ -7,3 +7,6 @@ SHA1 (patch-config.h.in) = e0cb8c4075ca9
 SHA1 (patch-configure) = ba75b5f192c1359220bea019fa50603b2b5c7c3a
 SHA1 (patch-fdname.c) = c59bd921989e4d84375764fdd707b7cd6c49ceba
 SHA1 (patch-sysincludes.h) = d48307ade6bc82bea946920e7336bc5329714c08
+SHA1 (patch-sysutils.c) = 03ae8b81f0277d8dbbdf82e5b215d7099b25cc36
+SHA1 (patch-xio-openssl.c) = 26745eff5eab745ac45eb04b2243b0bc4bfd6b8d
+SHA1 (patch-xio-socket.c) = f36e6ccc3a659ec9d6d7ce4e470d8b874fe8f6ff

Added files:

Index: pkgsrc/net/socat/patches/patch-sysutils.c
diff -u /dev/null pkgsrc/net/socat/patches/patch-sysutils.c:1.1
--- /dev/null   Sun Apr  3 10:29:41 2022
+++ pkgsrc/net/socat/patches/patch-sysutils.c   Sun Apr  3 10:29:41 2022
@@ -0,0 +1,33 @@
+$NetBSD: patch-sysutils.c,v 1.1 2022/04/03 10:29:41 riastradh Exp $
+
+Fix ctype(3) abuse.
+
+--- sysutils.c.orig    2021-01-03 18:23:22.000000000 +0000
++++ sysutils.c
+@@ -745,7 +745,7 @@ int xiosetenv(const char *varname, const
+    progname = diag_get_string('p');
+    envname[0] = '\0'; strncat(envname, progname, XIO_ENVNAMELEN-1);
+    l = strlen(envname);
+-   for (i = 0; i < l; ++i)  envname[i] = toupper(envname[i]);
++   for (i = 0; i < l; ++i)  envname[i] = toupper((unsigned char)envname[i]);
+    strncat(envname+l, "_", XIO_ENVNAMELEN-l-1);
+    l += 1;
+    strncat(envname+l, varname, XIO_ENVNAMELEN-l-1);
+@@ -771,7 +771,7 @@ int xiosetenv2(const char *varname, cons
+    l += 1;
+    strncat(envname+l, varname2, XIO_ENVNAMELEN-l-1);
+    l += strlen(envname+l);
+-   for (i = 0; i < l; ++i)  envname[i] = toupper(envname[i]);
++   for (i = 0; i < l; ++i)  envname[i] = toupper((unsigned char)envname[i]);
+    return _xiosetenv(envname, value, overwrite, sep);
+ #  undef XIO_ENVNAMELEN
+ }
+@@ -799,7 +799,7 @@ int xiosetenv3(const char *varname, cons
+    l += 1;
+    strncat(envname+l, varname3, XIO_ENVNAMELEN-l-1);
+    l += strlen(envname+l);
+-   for (i = 0; i < l; ++i)  envname[i] = toupper(envname[i]);
++   for (i = 0; i < l; ++i)  envname[i] = toupper((unsigned char)envname[i]);
+    return _xiosetenv(envname, value, overwrite, sep);
+ #  undef XIO_ENVNAMELEN
+ }
Index: pkgsrc/net/socat/patches/patch-xio-openssl.c
diff -u /dev/null pkgsrc/net/socat/patches/patch-xio-openssl.c:1.1
--- /dev/null   Sun Apr  3 10:29:41 2022
+++ pkgsrc/net/socat/patches/patch-xio-openssl.c        Sun Apr  3 10:29:41 2022
@@ -0,0 +1,15 @@
+$NetBSD: patch-xio-openssl.c,v 1.1 2022/04/03 10:29:41 riastradh Exp $
+
+Fix ctype(3) abuse.
+
+--- xio-openssl.c.orig 2021-01-03 18:23:22.000000000 +0000
++++ xio-openssl.c
+@@ -1505,7 +1505,7 @@ static int openssl_delete_cert_info(void
+    progname = diag_get_string('p');
+    envprefix[0] = '\0'; strncat(envprefix, progname, XIO_ENVNAMELEN-1);
+    l = strlen(envprefix);
+-   for (i = 0; i < l; ++i)  envprefix[i] = toupper(envprefix[i]);
++   for (i = 0; i < l; ++i)  envprefix[i] = toupper((unsigned char)envprefix[i]);
+    strncat(envprefix+l, "_OPENSSL_", XIO_ENVNAMELEN-l-1);
+ 
+ #if HAVE_VAR_ENVIRON
Index: pkgsrc/net/socat/patches/patch-xio-socket.c
diff -u /dev/null pkgsrc/net/socat/patches/patch-xio-socket.c:1.1
--- /dev/null   Sun Apr  3 10:29:41 2022
+++ pkgsrc/net/socat/patches/patch-xio-socket.c Sun Apr  3 10:29:41 2022
@@ -0,0 +1,15 @@
+$NetBSD: patch-xio-socket.c,v 1.1 2022/04/03 10:29:41 riastradh Exp $
+
+Fix ctype(3) abuse.
+
+--- xio-socket.c.orig  2021-01-03 18:23:22.000000000 +0000
++++ xio-socket.c
+@@ -1595,7 +1595,7 @@ int retropt_socket_pf(struct opt *opts, 
+    char *pfname;
+ 
+    if (retropt_string(opts, OPT_PROTOCOL_FAMILY, &pfname) >= 0) {
+-      if (isdigit(pfname[0])) {
++      if (isdigit((unsigned char)pfname[0])) {
+        *pf = strtoul(pfname, NULL /*!*/, 0);
+ #if WITH_IP4
+       } else if (!strcasecmp("inet", pfname) ||



Home | Main Index | Thread Index | Old Index