Displaying 17 results from an estimated 17 matches for "__hpux".
2004 Sep 17
2
patch: openssh 3.9p1 on hp-ux 10.20
...;m hoping the copyright holder will permit the code
to be used freely. I've CC'ed him on this mail.
--- includes.h.orig Fri Sep 17 10:03:08 2004
+++ includes.h Fri Sep 17 09:52:03 2004
@@ -186,8 +186,20 @@
* of getspnam when _INCLUDE__STDC__ is defined, so we unset it here.
*/
#ifdef __hpux
-# ifdef _INCLUDE__STDC__
-# undef _INCLUDE__STDC__
+# include <sys/privgrp.h>
+# if defined(PRIV_PSET)
+# define _hpux_11i
+# elif defined(PRIV_SPUCTL)
+# define __hpux_11x
+# elif defined(PRIV_SERIALIZE)
+# define __hpux_10x
+# elif defined(PRIV_SETRUGID)
+# define __hpux_9x
+# endif
+...
2000 Nov 22
0
problem with installing openssh on HP/UX
...y bsd-misc.c to be:
#if !defined(HAVE_SETEUID) && defined(HAVE_SETREUID)
int seteuid(uid_t euid)
{
/* return(setreuid(-1,euid));*/
return(setresuid(-1,euid,-1));
}
#endif /* !defined(HAVE_SETEUID) && defined(HAVE_SETREUID) */
2. The file auth-passwd.c tries to include
#ifdef __hpux
# include <hpsecurity.h>
# include <prot.h>
#endif
and further down uses functions that don't exist on the system. I
prevented this by:
#undef __hpux
3. The system doesn't have the function utimes. I put the following in
bsd-misc.c:
int utimes(const char *path, const struc...
2004 Oct 25
0
OpenSSH 3.9p1 includes.h patch
Hello there,
In the openssh 3.9p1 includes.h there is a workaround for HP-UX 11.11
which broke compiling on HP-UX 10.20 since it needs _INCLUDE__STDC__
defined. Here's a patch for how I fixed it.
It would be more elegant to do a "#ifdef __hpux11", but I don't have an
HP-UX 11 box to try it out. So I'm not sure it would work. But you might
want to try since I guess it would.
Let me know if you need more details.
Tim Leamy
Computer Lab Management
University of California at Davis
tcleamy at ucdavis.edu
htt...
2005 Feb 24
0
[PATCH] Drop two useless HAVE_CYGWIN
...ty.c 24 Feb 2005 11:30:30 -0000
@@ -102,7 +102,6 @@ openpty(int *amaster, int *aslave, char
return (-1);
}
-#ifndef HAVE_CYGWIN
/*
* Try to push the appropriate streams modules, as described
* in Solaris pts(7).
@@ -112,7 +111,6 @@ openpty(int *amaster, int *aslave, char
# ifndef __hpux
ioctl(*aslave, I_PUSH, "ttcompat");
# endif /* __hpux */
-#endif /* HAVE_CYGWIN */
return (0);
Index: openbsd-compat/inet_ntop.c
===================================================================
RCS file: /cvs/openssh_cvs/openbsd-compat/inet_ntop.c,v
retrieving revision 1.9
dif...
2002 Dec 10
5
[PATCH] Password expiry with Privsep and PAM
...atic int do_pam_conversation(int num_msg, const struct pam_message **msg,
struct pam_response **resp, void *appdata_ptr);
@@ -186,12 +184,15 @@
pam_retval, PAM_STRERROR(__pamh, pam_retval));
}
+/* HP-UX doesn't like credentials to be deleted. Skip and rely on pam_end() */
+#ifndef __hpux
if (__pamh && creds_set) {
pam_retval = pam_setcred(__pamh, PAM_DELETE_CRED);
if (pam_retval != PAM_SUCCESS)
debug("Cannot delete credentials[%d]: %.200s",
pam_retval, PAM_STRERROR(__pamh, pam_retval));
}
+#endif
if (__pamh) {
pam_retval = pam_end(__p...
2003 Sep 02
12
[Bug 633] Password authentication fails in HP-UX trusted mode due to DISABLE_SHADOW
http://bugzilla.mindrot.org/show_bug.cgi?id=633
Summary: Password authentication fails in HP-UX trusted mode due
to DISABLE_SHADOW
Product: Portable OpenSSH
Version: -current
Platform: HPPA
OS/Version: HP-UX
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo:
2001 Apr 05
0
HP-UX 9 problems (hangs on logout; tty isn't sane)
...#39;t too bad, though the
comments are a bit excessive.
(Upshot: HP-UX 9.05 has setuid() and setresuid() but not seteuid() or
setreuid(); RLIMIT_CORE is only defined if _KERNEL is defined (it's
labeled "unsupported BSD stuff" in <sys/resource.h>); and the
"#ifdef __hpux" stuff in auth-passwd.c doesn't work on 9.05. Ugh.)
* "ssh localhost command" works just fine, as does "ssh remotehost command".
* "ssh remotehost" works just fine (the remote host is running ssh.com's
sshd2 on Linux).
* "ssh localhost" (no...
2003 May 02
6
openssh 3.6.1_p2 problem with pam (fwd)
----- Forwarded message from Andrea Barisani <lcars at infis.univ.trieste.it> -----
Date: Fri, 2 May 2003 14:01:33 +0200
From: Andrea Barisani <lcars at infis.univ.trieste.it>
To: openssh at openssh.com
Subject: openssh 3.6.1_p2 problem with pam
Hi, I've just updated to openssh 3.6.1_p2 and I notice this behaviour:
# ssh -l lcars mybox
[2 seconds delay]
lcars at mybox's
2002 Jan 02
1
SCO OpenServer password issue
...********
*** 212,218 ****
--- 212,222 ----
else
encrypted_password = crypt(password, salt);
# else
+ # ifdef HAVE_SCO_PROTECTED_PW
+ encrypted_password = bigcrypt(password, salt);
+ # else
encrypted_password = crypt(password, salt);
+ # endif /* HAVE_SCO_PROTECTED_PW */
# endif /* __hpux */
#endif /* HAVE_MD5_PASSWORDS */
--
Roger Cornelius rac at tenzing.org
2003 Sep 08
2
Variable declarations in xcrypt.c
...e) != NULL)
+ pw_password = spw->pwa_passwd;
+ }
# elif defined(HAVE_SECUREWARE)
- struct pr_passwd *spw = getprpwnam(pw->pw_name);
+ if (spw != NULL) {
+ struct pr_passwd *spw = getprpwnam(pw->pw_name);
- if (spw != NULL)
pw_password = spw->ufld.fd_encrypt;
+ }
# elif defined(__hpux) && !defined(HAVE_SECUREWARE)
- struct pr_passwd *spw;
- if (iscomsec() && (spw = getprpwnam(pw->pw_name)) != NULL)
- pw_password = spw->ufld.fd_encrypt;
+ if (iscomsec()) {
+ struct pr_passwd *spw;
+
+ if (spw = getprpwnam(pw->pw_name) != NUL...
2004 Aug 13
1
[patch] rsync large file support on AIX and HPUX
...if (fd == -1)
--- 152,160 ----
RETURN_ERROR_IF(dry_run, 0);
RETURN_ERROR_IF(read_only, EROFS);
!
! /* AIX and hpux mkstemp is broken for LARGE_FILES */
! #if defined(HAVE_SECURE_MKSTEMP) && defined(HAVE_FCHMOD) && !defined(_AIX) &&
!defined(__hpux)
{
int fd = mkstemp(template);
if (fd == -1)
--
Dr. Olaf Flebbe science + computing ag
Leiter Softwareentwicklung Hagellocher Weg 71-75
phone +49 7071 9457 254 72070 Tuebingen, Germany
fax +49 7071 9457 511 www.scie...
2002 Jul 30
0
patch: disable credential forwarding after password auth.
...(pw->pw_name, authctxt->style, "auth-ssh",
- (char *)password) == 0)
- return 0;
- else
- return 1;
+ (char *)password) == 0) {
+ retval=0 ; goto out;
+ } else {
+ retval=1 ; goto out;
+ }
#endif
pw_password = pw->pw_passwd;
@@ -189,8 +203,9 @@
#endif /* defined(__hpux) && !defined(HAVE_SECUREWARE) */
/* Check for users with no password. */
- if ((password[0] == '\0') && (pw_password[0] == '\0'))
- return 1;
+ if ((password[0] == '\0') && (pw_password[0] == '\0')) {
+ retval=1 ; goto out;
+ }
if (p...
2005 May 06
7
[Bug 1032] PrintLastLog is not working with UseLogin yes
http://bugzilla.mindrot.org/show_bug.cgi?id=1032
Summary: PrintLastLog is not working with UseLogin yes
Product: Portable OpenSSH
Version: 4.0p1
Platform: All
OS/Version: HP-UX
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-bugs at mindrot.org
ReportedBy:
2002 Oct 21
0
[Bug 419] New: HP-UX PAM problems with 3.5p1
...etion on HP-UX...
Cheers!
Michael
diff -u -r openssh-3.5p1/auth-pam.c openssh-3.5p1a/auth-pam.c
--- openssh-3.5p1/auth-pam.c Sun Jul 28 22:24:08 2002
+++ openssh-3.5p1a/auth-pam.c Wed Oct 16 15:00:01 2002
@@ -186,12 +186,14 @@
pam_retval, PAM_STRERROR(__pamh, pam_retval));
}
+#ifndef __hpux
if (__pamh && creds_set) {
pam_retval = pam_setcred(__pamh, PAM_DELETE_CRED);
if (pam_retval != PAM_SUCCESS)
debug("Cannot delete credentials[%d]: %.200s",
pam_retval, PAM_STRERROR(__pamh, pam_retval));
}
+#endif
if (__pamh) {
pam_retval = pam_end(__p...
2003 Jul 03
0
AIX cleanups: includes and arguments
...onf.h"
#include "auth.h"
+#include "canohost.h"
#if !defined(HAVE_OSF_SIA)
/* Don't need any of these headers for the SIA cases */
# ifdef HAVE_CRYPT_H
# include <crypt.h>
# endif
-# ifdef WITH_AIXAUTHENTICATE
-# include <login.h>
-# endif
# ifdef __hpux
# include <hpsecurity.h>
# include <prot.h>
@@ -150,7 +148,7 @@
}
# endif
# ifdef WITH_AIXAUTHENTICATE
- authsuccess = (authenticate(pw->pw_name,password,&reenter,&authmsg) == 0);
+ authsuccess = (authenticate((char *)pw->pw_name,password,&reenter,&authmsg)...
2002 Dec 21
6
[PATCH] PAM chauthtok + Privsep
...atic int do_pam_conversation(int num_msg, const struct pam_message **msg,
struct pam_response **resp, void *appdata_ptr);
@@ -186,12 +184,15 @@
pam_retval, PAM_STRERROR(__pamh, pam_retval));
}
+/* HP-UX doesn't like credentials to be deleted. Skip and rely on pam_end() */
+#ifndef __hpux
if (__pamh && creds_set) {
pam_retval = pam_setcred(__pamh, PAM_DELETE_CRED);
if (pam_retval != PAM_SUCCESS)
debug("Cannot delete credentials[%d]: %.200s",
pam_retval, PAM_STRERROR(__pamh, pam_retval));
}
+#endif
if (__pamh) {
pam_retval = pam_end(__p...
2003 Sep 24
12
SSHD 3.7.1p2 on HP-UX
I have used SSHD from openssh-3.7.1p1 on HP-UX 11:11. It works
correctly and the entry in the logfile is:
Sep 24 07:01:20 garm sshd[6625]: Accepted password for japs from
192.38.97.131 port 2463
Next I have upgraded to openssh-3.7.1p2 and restarted SSHD. It does not
accept the password any more and the entries in the logfile are:
Sep 24 12:21:38 garm sshd[19542]: User japs not allowed because