pkgsrc-Changes archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
CVS commit: pkgsrc/net/socat
Module Name: pkgsrc
Committed By: riastradh
Date: Sun Apr 3 10:29:41 UTC 2022
Modified Files:
pkgsrc/net/socat: Makefile distinfo
Added Files:
pkgsrc/net/socat/patches: patch-sysutils.c patch-xio-openssl.c
patch-xio-socket.c
Log Message:
net/socat: Patch ctype(3) abuse.
To generate a diff of this commit:
cvs rdiff -u -r1.46 -r1.47 pkgsrc/net/socat/Makefile
cvs rdiff -u -r1.33 -r1.34 pkgsrc/net/socat/distinfo
cvs rdiff -u -r0 -r1.1 pkgsrc/net/socat/patches/patch-sysutils.c \
pkgsrc/net/socat/patches/patch-xio-openssl.c \
pkgsrc/net/socat/patches/patch-xio-socket.c
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Modified files:
Index: pkgsrc/net/socat/Makefile
diff -u pkgsrc/net/socat/Makefile:1.46 pkgsrc/net/socat/Makefile:1.47
--- pkgsrc/net/socat/Makefile:1.46 Sun Jan 10 22:07:28 2021
+++ pkgsrc/net/socat/Makefile Sun Apr 3 10:29:41 2022
@@ -1,6 +1,7 @@
-# $NetBSD: Makefile,v 1.46 2021/01/10 22:07:28 otis Exp $
+# $NetBSD: Makefile,v 1.47 2022/04/03 10:29:41 riastradh Exp $
DISTNAME= socat-1.7.4.1
+PKGREVISION= 1
CATEGORIES= net
MASTER_SITES= http://www.dest-unreach.org/socat/download/
Index: pkgsrc/net/socat/distinfo
diff -u pkgsrc/net/socat/distinfo:1.33 pkgsrc/net/socat/distinfo:1.34
--- pkgsrc/net/socat/distinfo:1.33 Tue Oct 26 11:06:57 2021
+++ pkgsrc/net/socat/distinfo Sun Apr 3 10:29:41 2022
@@ -1,4 +1,4 @@
-$NetBSD: distinfo,v 1.33 2021/10/26 11:06:57 nia Exp $
+$NetBSD: distinfo,v 1.34 2022/04/03 10:29:41 riastradh Exp $
BLAKE2s (socat-1.7.4.1.tar.gz) = 40fc322f89ca333a35c77cb25d71512404bfd116d36aecedb1773201f37b5d2e
SHA512 (socat-1.7.4.1.tar.gz) = e43c8b23a841aea5ecc3ac324185ee4ada552a8284ec41b99245def2d8b493bca9caea1af6f646f434a7eda67a1dd71e4e037eea65fce0444840236eadb126a6
@@ -7,3 +7,6 @@ SHA1 (patch-config.h.in) = e0cb8c4075ca9
SHA1 (patch-configure) = ba75b5f192c1359220bea019fa50603b2b5c7c3a
SHA1 (patch-fdname.c) = c59bd921989e4d84375764fdd707b7cd6c49ceba
SHA1 (patch-sysincludes.h) = d48307ade6bc82bea946920e7336bc5329714c08
+SHA1 (patch-sysutils.c) = 03ae8b81f0277d8dbbdf82e5b215d7099b25cc36
+SHA1 (patch-xio-openssl.c) = 26745eff5eab745ac45eb04b2243b0bc4bfd6b8d
+SHA1 (patch-xio-socket.c) = f36e6ccc3a659ec9d6d7ce4e470d8b874fe8f6ff
Added files:
Index: pkgsrc/net/socat/patches/patch-sysutils.c
diff -u /dev/null pkgsrc/net/socat/patches/patch-sysutils.c:1.1
--- /dev/null Sun Apr 3 10:29:41 2022
+++ pkgsrc/net/socat/patches/patch-sysutils.c Sun Apr 3 10:29:41 2022
@@ -0,0 +1,33 @@
+$NetBSD: patch-sysutils.c,v 1.1 2022/04/03 10:29:41 riastradh Exp $
+
+Fix ctype(3) abuse.
+
+--- sysutils.c.orig 2021-01-03 18:23:22.000000000 +0000
++++ sysutils.c
+@@ -745,7 +745,7 @@ int xiosetenv(const char *varname, const
+ progname = diag_get_string('p');
+ envname[0] = '\0'; strncat(envname, progname, XIO_ENVNAMELEN-1);
+ l = strlen(envname);
+- for (i = 0; i < l; ++i) envname[i] = toupper(envname[i]);
++ for (i = 0; i < l; ++i) envname[i] = toupper((unsigned char)envname[i]);
+ strncat(envname+l, "_", XIO_ENVNAMELEN-l-1);
+ l += 1;
+ strncat(envname+l, varname, XIO_ENVNAMELEN-l-1);
+@@ -771,7 +771,7 @@ int xiosetenv2(const char *varname, cons
+ l += 1;
+ strncat(envname+l, varname2, XIO_ENVNAMELEN-l-1);
+ l += strlen(envname+l);
+- for (i = 0; i < l; ++i) envname[i] = toupper(envname[i]);
++ for (i = 0; i < l; ++i) envname[i] = toupper((unsigned char)envname[i]);
+ return _xiosetenv(envname, value, overwrite, sep);
+ # undef XIO_ENVNAMELEN
+ }
+@@ -799,7 +799,7 @@ int xiosetenv3(const char *varname, cons
+ l += 1;
+ strncat(envname+l, varname3, XIO_ENVNAMELEN-l-1);
+ l += strlen(envname+l);
+- for (i = 0; i < l; ++i) envname[i] = toupper(envname[i]);
++ for (i = 0; i < l; ++i) envname[i] = toupper((unsigned char)envname[i]);
+ return _xiosetenv(envname, value, overwrite, sep);
+ # undef XIO_ENVNAMELEN
+ }
Index: pkgsrc/net/socat/patches/patch-xio-openssl.c
diff -u /dev/null pkgsrc/net/socat/patches/patch-xio-openssl.c:1.1
--- /dev/null Sun Apr 3 10:29:41 2022
+++ pkgsrc/net/socat/patches/patch-xio-openssl.c Sun Apr 3 10:29:41 2022
@@ -0,0 +1,15 @@
+$NetBSD: patch-xio-openssl.c,v 1.1 2022/04/03 10:29:41 riastradh Exp $
+
+Fix ctype(3) abuse.
+
+--- xio-openssl.c.orig 2021-01-03 18:23:22.000000000 +0000
++++ xio-openssl.c
+@@ -1505,7 +1505,7 @@ static int openssl_delete_cert_info(void
+ progname = diag_get_string('p');
+ envprefix[0] = '\0'; strncat(envprefix, progname, XIO_ENVNAMELEN-1);
+ l = strlen(envprefix);
+- for (i = 0; i < l; ++i) envprefix[i] = toupper(envprefix[i]);
++ for (i = 0; i < l; ++i) envprefix[i] = toupper((unsigned char)envprefix[i]);
+ strncat(envprefix+l, "_OPENSSL_", XIO_ENVNAMELEN-l-1);
+
+ #if HAVE_VAR_ENVIRON
Index: pkgsrc/net/socat/patches/patch-xio-socket.c
diff -u /dev/null pkgsrc/net/socat/patches/patch-xio-socket.c:1.1
--- /dev/null Sun Apr 3 10:29:41 2022
+++ pkgsrc/net/socat/patches/patch-xio-socket.c Sun Apr 3 10:29:41 2022
@@ -0,0 +1,15 @@
+$NetBSD: patch-xio-socket.c,v 1.1 2022/04/03 10:29:41 riastradh Exp $
+
+Fix ctype(3) abuse.
+
+--- xio-socket.c.orig 2021-01-03 18:23:22.000000000 +0000
++++ xio-socket.c
+@@ -1595,7 +1595,7 @@ int retropt_socket_pf(struct opt *opts,
+ char *pfname;
+
+ if (retropt_string(opts, OPT_PROTOCOL_FAMILY, &pfname) >= 0) {
+- if (isdigit(pfname[0])) {
++ if (isdigit((unsigned char)pfname[0])) {
+ *pf = strtoul(pfname, NULL /*!*/, 0);
+ #if WITH_IP4
+ } else if (!strcasecmp("inet", pfname) ||
Home |
Main Index |
Thread Index |
Old Index