X Strike Force XFree86 SVN commit: rev 714 - trunk/debian/patches
Author: branden
Date: 2003-10-24 20:35:48 -0500 (Fri, 24 Oct 2003)
New Revision: 714
Modified:
trunk/debian/patches/000_stolen_from_HEAD.diff
trunk/debian/patches/002_xdm_fixes.diff
Log:
Fix cut-n-paste errors made when backporting patch. Resync.
- debian/patches/000_stolen_from_HEAD.diff
- debian/patches/002_xdm_fixes.diff
Modified: trunk/debian/patches/000_stolen_from_HEAD.diff
===================================================================
--- trunk/debian/patches/000_stolen_from_HEAD.diff 2003-10-24 22:36:18 UTC (rev 713)
+++ trunk/debian/patches/000_stolen_from_HEAD.diff 2003-10-25 01:35:48 UTC (rev 714)
@@ -5393,28 +5393,27 @@
}
if (versions[version_index].major_version > Dont_Check)
---- xc/programs/xdm/session.c~ 2003-10-24 13:04:08.000000000 -0500
-+++ xc/programs/xdm/session.c 2003-10-24 13:07:21.000000000 -0500
-@@ -93,14 +93,14 @@
+--- xc/programs/xdm/session.c~ 2003-10-24 20:29:10.000000000 -0500
++++ xc/programs/xdm/session.c 2003-10-24 20:29:42.000000000 -0500
+@@ -93,13 +93,15 @@
extern char *crypt(CRYPT_ARGS);
#endif
#ifdef USE_PAM
-pam_handle_t **thepamhp()
--{
+pam_handle_t **
+thepamhp(void)
+ {
static pam_handle_t *pamh = NULL;
return &pamh;
}
-pam_handle_t *thepamh()
--{
+pam_handle_t *
+thepamh(void)
+ {
pam_handle_t **pamhp;
- pamhp = thepamhp();
-@@ -535,8 +535,9 @@
+@@ -535,8 +537,9 @@
#ifdef HAS_SETUSERCONTEXT
struct passwd* pwd;
#endif
@@ -5426,7 +5425,7 @@
#endif
if (verify->argv) {
-@@ -552,7 +553,7 @@
+@@ -552,7 +555,7 @@
}
#ifdef USE_PAM
if (pamh) pam_open_session(pamh, 0);
@@ -5435,7 +5434,7 @@
switch (pid = fork ()) {
case 0:
CleanUpChild ();
-@@ -598,8 +599,12 @@
+@@ -598,8 +601,13 @@
}
#endif /* QNX4 doesn't support multi-groups, no initgroups() */
#ifdef USE_PAM
@@ -5447,6 +5446,7 @@
+ LogError ("pam_setcred for \"%s\" failed: %s\n",
+ name, pam_strerror(pamh, pam_error));
+ return(0);
++ }
}
#endif
if (setuid(verify->uid) < 0)
Modified: trunk/debian/patches/002_xdm_fixes.diff
===================================================================
--- trunk/debian/patches/002_xdm_fixes.diff 2003-10-24 22:36:18 UTC (rev 713)
+++ trunk/debian/patches/002_xdm_fixes.diff 2003-10-25 01:35:48 UTC (rev 714)
@@ -1395,8 +1395,8 @@
} else {
user_pass = sp->sp_pwdp;
}
---- xc/programs/xdm/session.c~ 2003-10-24 13:23:21.000000000 -0500
-+++ xc/programs/xdm/session.c 2003-10-24 13:28:30.000000000 -0500
+--- xc/programs/xdm/session.c~ 2003-10-24 20:29:42.000000000 -0500
++++ xc/programs/xdm/session.c 2003-10-24 20:31:51.000000000 -0500
@@ -60,17 +60,17 @@
#endif
@@ -1422,7 +1422,7 @@
#else
/* should be in <grp.h> */
extern void setgrent(void);
-@@ -83,27 +83,29 @@
+@@ -83,29 +83,31 @@
extern void endspent(void);
#endif
#if defined(CSRG_BASED)
@@ -1445,6 +1445,7 @@
pam_handle_t **
-thepamhp(void)
+thepamhp (void)
+ {
static pam_handle_t *pamh = NULL;
return &pamh;
}
@@ -1452,6 +1453,7 @@
pam_handle_t *
-thepamh(void)
+thepamh (void)
+ {
pam_handle_t **pamhp;
- pamhp = thepamhp();
@@ -1459,7 +1461,7 @@
if (pamhp)
return *pamhp;
else
-@@ -136,12 +138,12 @@
+@@ -138,12 +140,12 @@
endgrent,
#ifdef USESHADOW
getspnam,
@@ -1475,7 +1477,7 @@
endpwent,
#endif
crypt,
-@@ -189,7 +191,7 @@
+@@ -191,7 +193,7 @@
}
#if defined(_POSIX_SOURCE) || defined(SYSV) || defined(SVR4)
@@ -1484,7 +1486,7 @@
#endif
static void
-@@ -246,7 +248,7 @@
+@@ -248,7 +250,7 @@
static int
IOErrorHandler (Display *dpy)
{
@@ -1493,7 +1495,7 @@
exit(RESERVER_DISPLAY);
/*NOTREACHED*/
return 0;
-@@ -255,7 +257,7 @@
+@@ -257,7 +259,7 @@
static int
ErrorHandler(Display *dpy, XErrorEvent *event)
{
@@ -1502,7 +1504,7 @@
if (XmuPrintDefaultErrorMessage (dpy, event, stderr) == 0) return 0;
exit(UNMANAGE_DISPLAY);
/*NOTREACHED*/
-@@ -288,13 +290,13 @@
+@@ -290,13 +292,13 @@
#ifdef GREET_USER_STATIC
greet_user_proc = GreetUser;
#else
@@ -1518,7 +1520,7 @@
exit(UNMANAGE_DISPLAY);
}
#endif
-@@ -500,7 +502,7 @@
+@@ -502,7 +504,7 @@
code = Krb5DisplayCCache(d->name, &ccache);
if (code)
@@ -1527,7 +1529,7 @@
error_message(code));
else {
code = krb5_cc_destroy(ccache);
-@@ -508,8 +510,8 @@
+@@ -510,8 +512,8 @@
if (code == KRB5_FCC_NOFILE) {
Debug ("No Kerberos ccache file found to destroy\n");
} else
@@ -1538,7 +1540,7 @@
} else
Debug ("Kerberos ccache destroyed\n");
krb5_cc_close(ccache);
-@@ -578,23 +580,22 @@
+@@ -580,23 +582,22 @@
#ifndef AIXV3
#ifndef HAS_SETUSERCONTEXT
@@ -1572,8 +1574,8 @@
return (0);
}
#endif /* QNX4 doesn't support multi-groups, no initgroups() */
-@@ -607,10 +608,9 @@
- return(0);
+@@ -610,10 +611,9 @@
+ }
}
#endif
- if (setuid(verify->uid) < 0)
@@ -1586,7 +1588,7 @@
return (0);
}
#else /* HAS_SETUSERCONTEXT */
-@@ -618,20 +618,17 @@
+@@ -621,20 +621,17 @@
* Set the user's credentials: uid, gid, groups,
* environment variables, resource limits, and umask.
*/
@@ -1616,7 +1618,7 @@
return (0);
}
#endif /* HAS_SETUSERCONTEXT */
-@@ -640,9 +637,9 @@
+@@ -643,9 +640,9 @@
* Set the user's credentials: uid, gid, groups,
* audit classes, user limits, and umask.
*/
@@ -1629,7 +1631,7 @@
return (0);
}
#endif /* AIXV3 */
-@@ -756,13 +753,13 @@
+@@ -759,13 +756,13 @@
execute (failsafeArgv, verify->userEnviron);
exit (1);
case -1:
@@ -1647,7 +1649,7 @@
Debug ("StartSession, fork succeeded %d\n", pid);
*pidp = pid;
return 1;
-@@ -929,9 +926,10 @@
+@@ -932,9 +929,10 @@
return env;
}
Reply to: