pkgsrc/security/putty/patches/patch-misc.c
ryoon 9ac7444af9 Update to 0.64
* Avoid compilation error on tolower and char type.

Changelog:
2015-02-28 PuTTY 0.64 released, fixing a SECURITY HOLE

PuTTY 0.64, released today, fixes a security hole in 0.63 and before:
private-key-not-wiped-2. Also diffie-hellman-range-check has been argued
to be a security hole. In addition to these and other less critical bug
fixes, 0.64 also supports the major new feature of sharing an SSH connection
between multiple instances of PuTTY and its tools, and a command-line and
config option to specify the expected host key(s).
2015-04-08 18:45:21 +00:00

13 lines
491 B
C

$NetBSD: patch-misc.c,v 1.1 2015/04/08 18:45:22 ryoon Exp $
--- misc.c.orig 2015-02-28 15:33:27.000000000 +0000
+++ misc.c
@@ -964,7 +964,7 @@ int validate_manual_hostkey(char *key)
if (q[3*i+2] != ':')
goto not_fingerprint; /* sorry */
for (i = 0; i < 16*3 - 1; i++)
- key[i] = tolower(q[i]);
+ key[i] = tolower((unsigned char)(q[i]));
key[16*3 - 1] = '\0';
return TRUE;
}