Synchronet now requires the libarchive development package (e.g. libarchive-dev on Debian-based Linux distros, libarchive.org for more info) to build successfully.

Commits (2)
diff -ur ../tmp2/cryptlib.h ./cryptlib.h
--- ../tmp2/cryptlib.h 2019-02-22 03:16:30.000000000 -0500
+++ ./cryptlib.h 2019-06-03 15:26:26.741166000 -0400
--- ../tmp2/cryptlib.h 2021-03-13 02:55:28.589948000 -0500
+++ ./cryptlib.h 2021-03-13 02:56:03.550287000 -0500
@@ -1222,6 +1222,11 @@
CRYPT_SESSINFO_SSL_EAPKEY, /* SSL/TLS EAP key */
CRYPT_SESSINFO_TSP_MSGIMPRINT, /* TSP message imprint */
......@@ -14,8 +14,8 @@ diff -ur ../tmp2/cryptlib.h ./cryptlib.h
CRYPT_SESSINFO_LAST, CRYPT_USERINFO_FIRST = 7000,
diff -ur ../tmp2/kernel/attr_acl.c ./kernel/attr_acl.c
--- ../tmp2/kernel/attr_acl.c 2019-02-05 18:16:32.000000000 -0500
+++ ./kernel/attr_acl.c 2019-06-03 15:26:26.745123000 -0400
--- ../tmp2/kernel/attr_acl.c 2021-03-13 02:55:42.258577000 -0500
+++ ./kernel/attr_acl.c 2021-03-13 02:56:03.603279000 -0500
@@ -3768,6 +3768,25 @@
MKPERM_TSP( xWD_xWD ),
ROUTE( OBJECT_TYPE_SESSION ), &objectCtxHash ),
......@@ -43,9 +43,18 @@ diff -ur ../tmp2/kernel/attr_acl.c ./kernel/attr_acl.c
};
#endif /* USE_SESSIONS */
diff -ur ../tmp2/session/sess_attr.c ./session/sess_attr.c
--- ../tmp2/session/sess_attr.c 2019-02-05 18:18:28.000000000 -0500
+++ ./session/sess_attr.c 2019-06-03 15:26:26.746525000 -0400
@@ -639,6 +639,7 @@
--- ../tmp2/session/sess_attr.c 2021-03-13 02:55:28.307665000 -0500
+++ ./session/sess_attr.c 2021-03-13 02:56:30.118602000 -0500
@@ -565,6 +565,8 @@
SESSION_FLAG_ISOPEN ) ? TRUE : FALSE;
return( CRYPT_OK );
+ case CRYPT_SESSINFO_SSH_HEIGHT:
+ case CRYPT_SESSINFO_SSH_WIDTH:
case CRYPT_SESSINFO_SERVER_PORT:
case CRYPT_SESSINFO_CLIENT_PORT:
{
@@ -639,6 +641,7 @@
return( CRYPT_ERROR_NOTFOUND );
}
......@@ -53,7 +62,7 @@ diff -ur ../tmp2/session/sess_attr.c ./session/sess_attr.c
case CRYPT_SESSINFO_USERNAME:
case CRYPT_SESSINFO_PASSWORD:
/* If the session was resumed from cached information then the
@@ -797,6 +798,13 @@
@@ -797,6 +800,13 @@
return( status );
}
......@@ -77,7 +86,7 @@ diff -ur ../tmp2/session/sess_attr.c ./session/sess_attr.c
case CRYPT_SESSINFO_SERVER_FINGERPRINT_SHA1:
/* Remember the value */
return( addSessionInfoS( sessionInfoPtr, attribute, data,
@@ -1016,6 +1027,7 @@
@@ -1016,6 +1029,7 @@
sessionInfoPtr->writeTimeout = CRYPT_ERROR;
return( CRYPT_OK );
......@@ -86,8 +95,8 @@ diff -ur ../tmp2/session/sess_attr.c ./session/sess_attr.c
case CRYPT_SESSINFO_PASSWORD:
case CRYPT_SESSINFO_SERVER_NAME:
diff -ur ../tmp2/session/ssh2_msgc.c ./session/ssh2_msgc.c
--- ../tmp2/session/ssh2_msgc.c 2018-12-21 03:52:10.000000000 -0500
+++ ./session/ssh2_msgc.c 2019-06-03 15:26:26.747402000 -0400
--- ../tmp2/session/ssh2_msgc.c 2021-03-13 02:55:27.112993000 -0500
+++ ./session/ssh2_msgc.c 2021-03-13 02:56:03.671662000 -0500
@@ -448,6 +448,12 @@
CHANNEL_WRITE );
int packetOffset, status;
......
......@@ -1054,7 +1054,7 @@ static void transfer_complete(BOOL success)
lprintf(LOG_NOTICE,"Hit any key or wait %u seconds to continue...", timeout);
while(timeout > 0) {
if (kbhit()) {
if(getch()==0 && getch()<<8 == CIO_KEY_QUIT)
if(getch()==(CIO_KEY_QUIT & 0xff) && (getch()<<8) == (CIO_KEY_QUIT & 0xff00))
check_exit(FALSE);
break;
}
......