Index: openssh/auth-pam.c
===================================================================
---- openssh.orig/auth-pam.c 2011-09-21 18:41:08.000000000 -0400
-+++ openssh/auth-pam.c 2011-09-21 18:45:34.000000000 -0400
+--- openssh.orig/auth-pam.c 2013-06-01 14:38:04.000000000 -0400
++++ openssh/auth-pam.c 2013-06-01 14:38:06.000000000 -0400
@@ -30,7 +30,7 @@
*/
/*
Index: openssh/auth-pam.h
===================================================================
---- openssh.orig/auth-pam.h 2011-09-21 18:41:08.000000000 -0400
-+++ openssh/auth-pam.h 2011-09-21 18:45:34.000000000 -0400
+--- openssh.orig/auth-pam.h 2013-06-01 14:38:04.000000000 -0400
++++ openssh/auth-pam.h 2013-06-01 14:38:06.000000000 -0400
@@ -46,5 +46,6 @@
void sshpam_cleanup(void);
int sshpam_auth_passwd(Authctxt *, const char *);
#endif /* USE_PAM */
Index: openssh/auth2-gss.c
===================================================================
---- openssh.orig/auth2-gss.c 2011-09-21 18:41:21.000000000 -0400
-+++ openssh/auth2-gss.c 2011-09-21 18:45:34.000000000 -0400
+--- openssh.orig/auth2-gss.c 2013-06-01 14:38:04.000000000 -0400
++++ openssh/auth2-gss.c 2013-06-01 14:38:06.000000000 -0400
@@ -47,6 +47,7 @@
extern ServerOptions options;
userauth_gsskeyex,
Index: openssh/auth2.c
===================================================================
---- openssh.orig/auth2.c 2011-09-21 18:45:33.000000000 -0400
-+++ openssh/auth2.c 2011-09-21 18:45:34.000000000 -0400
+--- openssh.orig/auth2.c 2013-06-01 14:38:04.000000000 -0400
++++ openssh/auth2.c 2013-06-01 14:38:06.000000000 -0400
@@ -223,10 +223,30 @@
if (authctxt == NULL)
fatal("input_userauth_request: no authctxt");
}
Index: openssh/gss-serv.c
===================================================================
---- openssh.orig/gss-serv.c 2011-09-21 18:43:55.000000000 -0400
-+++ openssh/gss-serv.c 2011-09-21 18:45:34.000000000 -0400
-@@ -495,6 +495,25 @@
+--- openssh.orig/gss-serv.c 2013-06-01 14:38:04.000000000 -0400
++++ openssh/gss-serv.c 2013-06-01 15:45:48.000000000 -0400
+@@ -80,7 +80,7 @@
+ gss_buffer_desc lbuffer;
+ OM_uint32 major, minor;
+ *localname = NULL;
+- major = gss_localname(&minor, client->cred_name, NULL, &lbuffer);
++ major = gss_localname(&minor, client->ctx_name, NULL, &lbuffer);
+ if (GSS_ERROR(major))
+ return 0;
+ if (lbuffer.value == NULL)
+@@ -521,6 +521,20 @@
return (0);
}
+ssh_gssapi_localname(char **user)
+{
+ *user = NULL;
-+ if (gssapi_client.displayname.length==0 ||
-+ gssapi_client.displayname.value==NULL) {
-+ debug("No suitable client data");
-+ return(0);;
-+ }
+ if (gssapi_client.mech && gssapi_client.mech->localname) {
+ return((*gssapi_client.mech->localname)(&gssapi_client,user));
+ } else {
*
Index: openssh/monitor.c
===================================================================
---- openssh.orig/monitor.c 2011-09-21 18:45:33.000000000 -0400
-+++ openssh/monitor.c 2011-09-21 18:45:34.000000000 -0400
+--- openssh.orig/monitor.c 2013-06-01 14:38:04.000000000 -0400
++++ openssh/monitor.c 2013-06-01 14:38:08.000000000 -0400
@@ -182,6 +182,8 @@
int mm_answer_gss_userok(int, Buffer *);
int mm_answer_gss_checkmic(int, Buffer *);
{
Index: openssh/monitor.h
===================================================================
---- openssh.orig/monitor.h 2011-09-21 18:45:33.000000000 -0400
-+++ openssh/monitor.h 2011-09-21 18:45:34.000000000 -0400
+--- openssh.orig/monitor.h 2013-06-01 14:38:04.000000000 -0400
++++ openssh/monitor.h 2013-06-01 14:38:08.000000000 -0400
@@ -52,6 +52,8 @@
MONITOR_REQ_GSSSETUP, MONITOR_ANS_GSSSETUP,
MONITOR_REQ_GSSSTEP, MONITOR_ANS_GSSSTEP,
MONITOR_REQ_GSSUPCREDS, MONITOR_ANS_GSSUPCREDS,
Index: openssh/monitor_wrap.c
===================================================================
---- openssh.orig/monitor_wrap.c 2011-09-21 18:45:33.000000000 -0400
-+++ openssh/monitor_wrap.c 2011-09-21 18:45:34.000000000 -0400
+--- openssh.orig/monitor_wrap.c 2013-06-01 14:38:04.000000000 -0400
++++ openssh/monitor_wrap.c 2013-06-01 14:38:08.000000000 -0400
@@ -1306,6 +1306,54 @@
return (authenticated);
}
{
Index: openssh/monitor_wrap.h
===================================================================
---- openssh.orig/monitor_wrap.h 2011-09-21 18:45:33.000000000 -0400
-+++ openssh/monitor_wrap.h 2011-09-21 18:45:34.000000000 -0400
+--- openssh.orig/monitor_wrap.h 2013-06-01 14:38:04.000000000 -0400
++++ openssh/monitor_wrap.h 2013-06-01 14:38:08.000000000 -0400
@@ -62,6 +62,8 @@
int mm_ssh_gssapi_userok(char *user, struct passwd *);
OM_uint32 mm_ssh_gssapi_checkmic(Gssctxt *, gss_buffer_t, gss_buffer_t);
Index: openssh/misc.c
===================================================================
---- openssh.orig/misc.c 2011-09-21 18:45:34.000000000 -0400
-+++ openssh/misc.c 2011-09-21 18:45:34.000000000 -0400
+--- openssh.orig/misc.c 2013-06-01 14:38:04.000000000 -0400
++++ openssh/misc.c 2013-06-01 14:38:08.000000000 -0400
@@ -224,6 +224,20 @@
return copy;
}
* Port must be >=0 and <=65535.
Index: openssh/misc.h
===================================================================
---- openssh.orig/misc.h 2011-09-21 18:45:34.000000000 -0400
-+++ openssh/misc.h 2011-09-21 18:45:34.000000000 -0400
+--- openssh.orig/misc.h 2013-06-01 14:38:04.000000000 -0400
++++ openssh/misc.h 2013-06-01 14:38:08.000000000 -0400
@@ -38,6 +38,7 @@
void sock_set_v6only(int);