search for: __hpux

Displaying 17 results from an estimated 17 matches for "__hpux".

2004 Sep 17
2
patch: openssh 3.9p1 on hp-ux 10.20
...;m hoping the copyright holder will permit the code to be used freely. I've CC'ed him on this mail. --- includes.h.orig Fri Sep 17 10:03:08 2004 +++ includes.h Fri Sep 17 09:52:03 2004 @@ -186,8 +186,20 @@ * of getspnam when _INCLUDE__STDC__ is defined, so we unset it here. */ #ifdef __hpux -# ifdef _INCLUDE__STDC__ -# undef _INCLUDE__STDC__ +# include <sys/privgrp.h> +# if defined(PRIV_PSET) +# define _hpux_11i +# elif defined(PRIV_SPUCTL) +# define __hpux_11x +# elif defined(PRIV_SERIALIZE) +# define __hpux_10x +# elif defined(PRIV_SETRUGID) +# define __hpux_9x +# endif +...
2000 Nov 22
0
problem with installing openssh on HP/UX
...y bsd-misc.c to be: #if !defined(HAVE_SETEUID) && defined(HAVE_SETREUID) int seteuid(uid_t euid) { /* return(setreuid(-1,euid));*/ return(setresuid(-1,euid,-1)); } #endif /* !defined(HAVE_SETEUID) && defined(HAVE_SETREUID) */ 2. The file auth-passwd.c tries to include #ifdef __hpux # include <hpsecurity.h> # include <prot.h> #endif and further down uses functions that don't exist on the system. I prevented this by: #undef __hpux 3. The system doesn't have the function utimes. I put the following in bsd-misc.c: int utimes(const char *path, const struc...
2004 Oct 25
0
OpenSSH 3.9p1 includes.h patch
Hello there, In the openssh 3.9p1 includes.h there is a workaround for HP-UX 11.11 which broke compiling on HP-UX 10.20 since it needs _INCLUDE__STDC__ defined. Here's a patch for how I fixed it. It would be more elegant to do a "#ifdef __hpux11", but I don't have an HP-UX 11 box to try it out. So I'm not sure it would work. But you might want to try since I guess it would. Let me know if you need more details. Tim Leamy Computer Lab Management University of California at Davis tcleamy at ucdavis.edu htt...
2005 Feb 24
0
[PATCH] Drop two useless HAVE_CYGWIN
...ty.c 24 Feb 2005 11:30:30 -0000 @@ -102,7 +102,6 @@ openpty(int *amaster, int *aslave, char return (-1); } -#ifndef HAVE_CYGWIN /* * Try to push the appropriate streams modules, as described * in Solaris pts(7). @@ -112,7 +111,6 @@ openpty(int *amaster, int *aslave, char # ifndef __hpux ioctl(*aslave, I_PUSH, "ttcompat"); # endif /* __hpux */ -#endif /* HAVE_CYGWIN */ return (0); Index: openbsd-compat/inet_ntop.c =================================================================== RCS file: /cvs/openssh_cvs/openbsd-compat/inet_ntop.c,v retrieving revision 1.9 dif...
2002 Dec 10
5
[PATCH] Password expiry with Privsep and PAM
...atic int do_pam_conversation(int num_msg, const struct pam_message **msg, struct pam_response **resp, void *appdata_ptr); @@ -186,12 +184,15 @@ pam_retval, PAM_STRERROR(__pamh, pam_retval)); } +/* HP-UX doesn't like credentials to be deleted. Skip and rely on pam_end() */ +#ifndef __hpux if (__pamh && creds_set) { pam_retval = pam_setcred(__pamh, PAM_DELETE_CRED); if (pam_retval != PAM_SUCCESS) debug("Cannot delete credentials[%d]: %.200s", pam_retval, PAM_STRERROR(__pamh, pam_retval)); } +#endif if (__pamh) { pam_retval = pam_end(__p...
2003 Sep 02
12
[Bug 633] Password authentication fails in HP-UX trusted mode due to DISABLE_SHADOW
http://bugzilla.mindrot.org/show_bug.cgi?id=633 Summary: Password authentication fails in HP-UX trusted mode due to DISABLE_SHADOW Product: Portable OpenSSH Version: -current Platform: HPPA OS/Version: HP-UX Status: NEW Severity: normal Priority: P2 Component: sshd AssignedTo:
2001 Apr 05
0
HP-UX 9 problems (hangs on logout; tty isn't sane)
...#39;t too bad, though the comments are a bit excessive. (Upshot: HP-UX 9.05 has setuid() and setresuid() but not seteuid() or setreuid(); RLIMIT_CORE is only defined if _KERNEL is defined (it's labeled "unsupported BSD stuff" in <sys/resource.h>); and the "#ifdef __hpux" stuff in auth-passwd.c doesn't work on 9.05. Ugh.) * "ssh localhost command" works just fine, as does "ssh remotehost command". * "ssh remotehost" works just fine (the remote host is running ssh.com's sshd2 on Linux). * "ssh localhost" (no...
2003 May 02
6
openssh 3.6.1_p2 problem with pam (fwd)
----- Forwarded message from Andrea Barisani <lcars at infis.univ.trieste.it> ----- Date: Fri, 2 May 2003 14:01:33 +0200 From: Andrea Barisani <lcars at infis.univ.trieste.it> To: openssh at openssh.com Subject: openssh 3.6.1_p2 problem with pam Hi, I've just updated to openssh 3.6.1_p2 and I notice this behaviour: # ssh -l lcars mybox [2 seconds delay] lcars at mybox's
2002 Jan 02
1
SCO OpenServer password issue
...******** *** 212,218 **** --- 212,222 ---- else encrypted_password = crypt(password, salt); # else + # ifdef HAVE_SCO_PROTECTED_PW + encrypted_password = bigcrypt(password, salt); + # else encrypted_password = crypt(password, salt); + # endif /* HAVE_SCO_PROTECTED_PW */ # endif /* __hpux */ #endif /* HAVE_MD5_PASSWORDS */ -- Roger Cornelius rac at tenzing.org
2003 Sep 08
2
Variable declarations in xcrypt.c
...e) != NULL) + pw_password = spw->pwa_passwd; + } # elif defined(HAVE_SECUREWARE) - struct pr_passwd *spw = getprpwnam(pw->pw_name); + if (spw != NULL) { + struct pr_passwd *spw = getprpwnam(pw->pw_name); - if (spw != NULL) pw_password = spw->ufld.fd_encrypt; + } # elif defined(__hpux) && !defined(HAVE_SECUREWARE) - struct pr_passwd *spw; - if (iscomsec() && (spw = getprpwnam(pw->pw_name)) != NULL) - pw_password = spw->ufld.fd_encrypt; + if (iscomsec()) { + struct pr_passwd *spw; + + if (spw = getprpwnam(pw->pw_name) != NUL...
2004 Aug 13
1
[patch] rsync large file support on AIX and HPUX
...if (fd == -1) --- 152,160 ---- RETURN_ERROR_IF(dry_run, 0); RETURN_ERROR_IF(read_only, EROFS); ! ! /* AIX and hpux mkstemp is broken for LARGE_FILES */ ! #if defined(HAVE_SECURE_MKSTEMP) && defined(HAVE_FCHMOD) && !defined(_AIX) && !defined(__hpux) { int fd = mkstemp(template); if (fd == -1) -- Dr. Olaf Flebbe science + computing ag Leiter Softwareentwicklung Hagellocher Weg 71-75 phone +49 7071 9457 254 72070 Tuebingen, Germany fax +49 7071 9457 511 www.scie...
2002 Jul 30
0
patch: disable credential forwarding after password auth.
...(pw->pw_name, authctxt->style, "auth-ssh", - (char *)password) == 0) - return 0; - else - return 1; + (char *)password) == 0) { + retval=0 ; goto out; + } else { + retval=1 ; goto out; + } #endif pw_password = pw->pw_passwd; @@ -189,8 +203,9 @@ #endif /* defined(__hpux) && !defined(HAVE_SECUREWARE) */ /* Check for users with no password. */ - if ((password[0] == '\0') && (pw_password[0] == '\0')) - return 1; + if ((password[0] == '\0') && (pw_password[0] == '\0')) { + retval=1 ; goto out; + } if (p...
2005 May 06
7
[Bug 1032] PrintLastLog is not working with UseLogin yes
http://bugzilla.mindrot.org/show_bug.cgi?id=1032 Summary: PrintLastLog is not working with UseLogin yes Product: Portable OpenSSH Version: 4.0p1 Platform: All OS/Version: HP-UX Status: NEW Severity: normal Priority: P2 Component: sshd AssignedTo: openssh-bugs at mindrot.org ReportedBy:
2002 Oct 21
0
[Bug 419] New: HP-UX PAM problems with 3.5p1
...etion on HP-UX... Cheers! Michael diff -u -r openssh-3.5p1/auth-pam.c openssh-3.5p1a/auth-pam.c --- openssh-3.5p1/auth-pam.c Sun Jul 28 22:24:08 2002 +++ openssh-3.5p1a/auth-pam.c Wed Oct 16 15:00:01 2002 @@ -186,12 +186,14 @@ pam_retval, PAM_STRERROR(__pamh, pam_retval)); } +#ifndef __hpux if (__pamh && creds_set) { pam_retval = pam_setcred(__pamh, PAM_DELETE_CRED); if (pam_retval != PAM_SUCCESS) debug("Cannot delete credentials[%d]: %.200s", pam_retval, PAM_STRERROR(__pamh, pam_retval)); } +#endif if (__pamh) { pam_retval = pam_end(__p...
2003 Jul 03
0
AIX cleanups: includes and arguments
...onf.h" #include "auth.h" +#include "canohost.h" #if !defined(HAVE_OSF_SIA) /* Don't need any of these headers for the SIA cases */ # ifdef HAVE_CRYPT_H # include <crypt.h> # endif -# ifdef WITH_AIXAUTHENTICATE -# include <login.h> -# endif # ifdef __hpux # include <hpsecurity.h> # include <prot.h> @@ -150,7 +148,7 @@ } # endif # ifdef WITH_AIXAUTHENTICATE - authsuccess = (authenticate(pw->pw_name,password,&reenter,&authmsg) == 0); + authsuccess = (authenticate((char *)pw->pw_name,password,&reenter,&authmsg)...
2002 Dec 21
6
[PATCH] PAM chauthtok + Privsep
...atic int do_pam_conversation(int num_msg, const struct pam_message **msg, struct pam_response **resp, void *appdata_ptr); @@ -186,12 +184,15 @@ pam_retval, PAM_STRERROR(__pamh, pam_retval)); } +/* HP-UX doesn't like credentials to be deleted. Skip and rely on pam_end() */ +#ifndef __hpux if (__pamh && creds_set) { pam_retval = pam_setcred(__pamh, PAM_DELETE_CRED); if (pam_retval != PAM_SUCCESS) debug("Cannot delete credentials[%d]: %.200s", pam_retval, PAM_STRERROR(__pamh, pam_retval)); } +#endif if (__pamh) { pam_retval = pam_end(__p...
2003 Sep 24
12
SSHD 3.7.1p2 on HP-UX
I have used SSHD from openssh-3.7.1p1 on HP-UX 11:11. It works correctly and the entry in the logfile is: Sep 24 07:01:20 garm sshd[6625]: Accepted password for japs from 192.38.97.131 port 2463 Next I have upgraded to openssh-3.7.1p2 and restarted SSHD. It does not accept the password any more and the entries in the logfile are: Sep 24 12:21:38 garm sshd[19542]: User japs not allowed because