From 8edb1cd5a6a03b391003a1047e0b3ca6d22acd45 Mon Sep 17 00:00:00 2001 From: Waldemar Brodkorb Date: Sun, 13 Jun 2010 18:06:45 +0200 Subject: bulk package update --- package/davfs2/patches/patch-src_webdav_c | 62 +++++++++++-------------------- 1 file changed, 21 insertions(+), 41 deletions(-) (limited to 'package/davfs2/patches/patch-src_webdav_c') diff --git a/package/davfs2/patches/patch-src_webdav_c b/package/davfs2/patches/patch-src_webdav_c index 35ad27492..20b125f1a 100644 --- a/package/davfs2/patches/patch-src_webdav_c +++ b/package/davfs2/patches/patch-src_webdav_c @@ -1,55 +1,35 @@ -$Id$ - - cf. http://sourceforge.net/tracker/index.php?func=detail&aid=1594808&group_id=26275&atid=386747 - ---- davfs2-1.3.3.orig/src/webdav.c 2008-06-28 19:20:07.000000000 +0200 -+++ davfs2-1.3.3/src/webdav.c 2008-12-08 00:37:23.000000000 +0100 -@@ -23,7 +23,6 @@ +--- davfs2-1.4.6.orig/src/webdav.c 2010-02-16 20:29:59.000000000 +0100 ++++ davfs2-1.4.6/src/webdav.c 2010-05-30 09:52:01.161613627 +0200 +@@ -52,6 +52,8 @@ + #include + #endif - #include "config.h" - --#include - #include - #include - #include -@@ -34,6 +33,7 @@ - #include - #include - #include +#include - #include - #include - -@@ -406,6 +406,11 @@ void dav_init_webdav(const char *scheme, - suri = (ne_uri *) ne_calloc(sizeof(ne_uri)); - ne_fill_server_uri(session, suri); - -+ /* begin of GMX hack */ -+ ne_server_capabilities caps; -+ ne_options(session, "/", &caps); -+ /* end of GMX hack */ + - if (use_locks) { - locks = ne_lockstore_create(); - if (lock_owner == NULL) { -@@ -1859,13 +1864,18 @@ static int ssl_verify(void *userdata, in - "or there might be a man-in-the-middle-attack.\n")); - printf(_("Accept certificate for this session? [y,N] ")); - char *s = NULL; -+ regex_t *re; - size_t n = 0; - ssize_t len = 0; + #include + #include + #include +@@ -1918,6 +1920,7 @@ quota_result(void *userdata, const ne_ur + static int + ssl_verify(void *userdata, int failures, const ne_ssl_certificate *cert) + { ++ regex_t *re; + char *issuer = ne_ssl_readable_dname(ne_ssl_cert_issuer(cert)); + char *subject = ne_ssl_readable_dname(ne_ssl_cert_subject(cert)); + char *digest = ne_calloc(NE_SSL_DIGESTLEN); +@@ -1964,8 +1967,13 @@ ssl_verify(void *userdata, int failures, len = getline(&s, &n, stdin); if (len < 0) abort(); -- if (rpmatch(s) < 1) -- ret = -1; +- if (rpmatch(s) > 0) +- ret = 0; + if (regcomp(&re, "^[yY]", REG_EXTENDED) != 0) { + if (regexec(&re, s, (size_t)0, NULL, 0) < 1) { + regfree(&re); + ret = -1; + } ++ ret = 0; + } free(s); - } } + -- cgit v1.2.3