summaryrefslogtreecommitdiff
path: root/package/dsniff/patches/patch-ssh_c
diff options
context:
space:
mode:
authorWaldemar Brodkorb <wbx@openadk.org>2015-01-14 00:44:04 +0100
committerWaldemar Brodkorb <wbx@openadk.org>2015-01-14 00:44:58 +0100
commit689c389d2205779757da6cff0a27c3c2beb7d867 (patch)
tree929da3993ad08c5215567f9904cac329d46c33c6 /package/dsniff/patches/patch-ssh_c
parent2267158ebee2af86e17b7c1a681d24f48b823865 (diff)
remove old package
Diffstat (limited to 'package/dsniff/patches/patch-ssh_c')
-rw-r--r--package/dsniff/patches/patch-ssh_c46
1 files changed, 0 insertions, 46 deletions
diff --git a/package/dsniff/patches/patch-ssh_c b/package/dsniff/patches/patch-ssh_c
deleted file mode 100644
index 2bf20f1f6..000000000
--- a/package/dsniff/patches/patch-ssh_c
+++ /dev/null
@@ -1,46 +0,0 @@
-$Id: update-patches 24 2008-08-31 14:56:13Z wbx $
---- dsniff-2.4.orig/ssh.c 2001-03-15 09:33:04.000000000 +0100
-+++ dsniff-2.4/ssh.c 2009-05-09 23:17:07.000000000 +0200
-@@ -331,12 +331,14 @@ SSH_accept(SSH *ssh)
- ssh->encrypt = des3_encrypt;
- ssh->decrypt = des3_decrypt;
- }
-+#ifndef OPENSSL_NO_BF
- else if (cipher == SSH_CIPHER_BLOWFISH) {
- ssh->estate = blowfish_init(ssh->sesskey,sizeof(ssh->sesskey));
- ssh->dstate = blowfish_init(ssh->sesskey,sizeof(ssh->sesskey));
- ssh->encrypt = blowfish_encrypt;
- ssh->decrypt = blowfish_decrypt;
- }
-+#endif
-
- /* Send verification. */
- msg[0] = SSH_SMSG_SUCCESS;
-@@ -461,18 +463,20 @@ SSH_connect(SSH *ssh)
- return (-1);
- }
- /* Set cipher. */
-- if (cipher == SSH_CIPHER_BLOWFISH) {
-- ssh->estate = blowfish_init(ssh->sesskey,sizeof(ssh->sesskey));
-- ssh->dstate = blowfish_init(ssh->sesskey,sizeof(ssh->sesskey));
-- ssh->encrypt = blowfish_encrypt;
-- ssh->decrypt = blowfish_decrypt;
-- }
-- else if (cipher == SSH_CIPHER_3DES) {
-+ if (cipher == SSH_CIPHER_3DES) {
- ssh->estate = des3_init(ssh->sesskey, sizeof(ssh->sesskey));
- ssh->dstate = des3_init(ssh->sesskey, sizeof(ssh->sesskey));
- ssh->encrypt = des3_encrypt;
- ssh->decrypt = des3_decrypt;
- }
-+#ifndef OPENSSL_NO_BF
-+ else if (cipher == SSH_CIPHER_BLOWFISH) {
-+ ssh->estate = blowfish_init(ssh->sesskey,sizeof(ssh->sesskey));
-+ ssh->dstate = blowfish_init(ssh->sesskey,sizeof(ssh->sesskey));
-+ ssh->encrypt = blowfish_encrypt;
-+ ssh->decrypt = blowfish_decrypt;
-+ }
-+#endif
- /* Get server response. */
- if ((i = SSH_recv(ssh, pkt, sizeof(pkt))) <= 0) {
- warn("SSH_recv");