diff options
| author | Jose Alonso Cardenas Marquez <acm@FreeBSD.org> | 2025-10-08 00:01:30 -0700 |
|---|---|---|
| committer | Jose Alonso Cardenas Marquez <acm@FreeBSD.org> | 2025-10-08 00:01:30 -0700 |
| commit | 8492b7e93ef85f07fe7292f45e4b89b3df6d83bd (patch) | |
| tree | 424537493e49e8cfa7b42243b42c495270ee2950 /security/gvm-libs/files/patch-util_passwordbasedauthentication.c | |
| parent | 17348f626b61c48fdcf436b55c58c3b0a472a04c (diff) | |
security/gvm: Update to 26.3.0
databases/pg-gvm: Update to 22.6.11
security/gsa: Update to 26.0.0 (Only amd64 and aarch64)
security/gsad: Update to 24.5.4
security/openvas: Update to 23.28.0 [1]
security/gvmd: Update to 26.0.0
security/gvm-libs: 22.29.2
security/py-greenbone-feed-sync: Update to 25.1.3
security/py-gvm-tools: Update to 25.4.0
security/py-python-gvm: Update to 26.6.0
PR: 289958
Reported by: Trond Endrestøl <Trond.Endrestol at ximalas.info> [1]
Diffstat (limited to 'security/gvm-libs/files/patch-util_passwordbasedauthentication.c')
| -rw-r--r-- | security/gvm-libs/files/patch-util_passwordbasedauthentication.c | 21 |
1 files changed, 12 insertions, 9 deletions
diff --git a/security/gvm-libs/files/patch-util_passwordbasedauthentication.c b/security/gvm-libs/files/patch-util_passwordbasedauthentication.c index 6838446064ad..55e4d62a57a8 100644 --- a/security/gvm-libs/files/patch-util_passwordbasedauthentication.c +++ b/security/gvm-libs/files/patch-util_passwordbasedauthentication.c @@ -1,6 +1,6 @@ ---- util/passwordbasedauthentication.c 2021-08-03 06:50:41.000000000 -0500 -+++ util/passwordbasedauthentication.c 2021-09-04 20:54:26.630524000 -0500 -@@ -26,7 +26,13 @@ +--- util/passwordbasedauthentication.c 2025-10-01 02:22:47.000000000 -0700 ++++ util/passwordbasedauthentication.c 2025-10-07 22:23:18.428502000 -0700 +@@ -14,7 +14,13 @@ // UFC_crypt defines crypt_r when only when __USE_GNU is set // this shouldn't affect other implementations #define __USE_GNU @@ -14,16 +14,19 @@ // INVALID_HASH is used on verify when the given hash is a NULL pointer. // This is done to not directly jump to exit with a INVALID_HASH result // but rather keep calculating to make it a little bit harder to guess -@@ -173,6 +179,7 @@ +@@ -208,6 +214,7 @@ return strlen (setting) > 1 && setting[0] == '$'; } +#if HAS_CRYPT_R - char * - pba_hash (struct PBASettings *setting, const char *password) - { -@@ -276,3 +283,4 @@ - free (tmp); + /** + * @brief Create a password hash. + * +@@ -262,6 +269,7 @@ + free (settings); return result; } +#endif /* #if HAS_CRYPT_R */ + + /** + * @brief Verify a password hash. |
