Displaying 12 results from an estimated 12 matches for "_cray".
Did you mean:
cray
2002 Feb 04
0
[Bug 101] New: session.c modifications for correct UNICOS behavior
...ority: P2
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy: wendyp at cray.com
--- session.c.orig Mon Feb 4 12:32:52 2002
+++ session.c Mon Feb 4 13:03:18 2002
@@ -67,6 +67,10 @@
#include <sat.h>
#endif /* WITH_IRIX_AUDIT */
+#ifdef _CRAY
+#include <tmpdir.h>
+#endif
+
#if defined(HAVE_USERSEC_H)
#include <usersec.h>
#endif
@@ -494,11 +498,16 @@
if (dup2(err[0], 2) < 0) /* stderr */
perror("dup2 stderr");
#endif /* USE_PIPES */
-
+#ifdef _CRAY
+...
2002 Apr 22
0
[Bug 101] session.c modifications for correct UNICOS behavior
...------- Additional Comments From wendyp at cray.com 2002-04-23 08:43 -------
updated patches for 22 april snapshot:
--- session.c.orig Mon Apr 22 14:36:13 2002
+++ session.c Mon Apr 22 16:31:15 2002
@@ -64,6 +64,10 @@
#define is_winnt (GetVersion() < 0x80000000)
#endif
+#ifdef _CRAY
+#include <tmpdir.h>
+#endif /* _CRAY */
+
/* func */
Session *session_new(void);
@@ -425,11 +429,17 @@
if (dup2(err[0], 2) < 0) /* stderr */
perror("dup2 stderr");
#endif /* USE_PIPES */
+#ifdef _CRAY
+ cray_init_...
2002 Sep 23
19
Call for testing for 3.5 OpenSSH
OpenBSD tree is heading into a lock and this includes OpenSSH. So we are
winding up for a 3.5 release. If we can get people to test the current
snapshots and report any problems that would improve the odds that your
platform won't be broke for 3.5.
Issues I know off of right now.
1. I can't test NeXT. So I TRULY need someone in that community to test
for me. Last I heard there was
2002 Apr 22
0
[Bug 99] auth2.c modifications for correct UNICOS behavior
...------- Additional Comments From wendyp at cray.com 2002-04-23 08:31 -------
updated for 22 april snapshot:
--- auth2.c.orig Mon Apr 22 14:29:54 2002
+++ auth2.c Mon Apr 22 14:31:19 2002
@@ -52,6 +52,10 @@
#include "match.h"
#include "monitor_wrap.h"
+#ifdef _CRAY
+#include <ia.h>
+#endif /* _CRAY */
+
/* import */
extern ServerOptions options;
extern u_char *session_id2;
@@ -247,6 +251,13 @@
authenticated = 0;
#endif /* USE_PAM */
+#ifdef _CRAY
+ if (authenticated && cray_access_denied(authctxt->user)) {
+...
2002 Apr 22
0
[Bug 98] auth1.c modifications for correct UNICOS behavior
...wendyp at cray.com 2002-04-23 08:41 -------
updated patch for 22 april snapshot:
--- auth1.c.orig Mon Apr 22 14:28:12 2002
+++ auth1.c Mon Apr 22 14:29:48 2002
@@ -26,6 +26,9 @@
#include "session.h"
#include "uidswap.h"
#include "monitor_wrap.h"
+#ifdef _CRAY
+#include <ia.h>
+#endif /* _CRAY */
/* import */
extern ServerOptions options;
@@ -291,6 +294,16 @@
if (!authctxt->valid && authenticated)
fatal("INTERNAL ERROR: authenticated invalid user %s",
authc...
2002 Apr 05
1
[Bug 100] serverloop.c modifications for correct UNICOS behavior
http://bugzilla.mindrot.org/show_bug.cgi?id=100
------- Additional Comments From mouring at eviladmin.org 2002-04-06 06:52 -------
The following code was committed to OpenSSH to catch some SysV issue. Does
this keep UNICOS happy?
while ((wait_pid = waitpid(-1, &wait_status, 0)) < 0)
if (errno != EINTR)
packet_disconnect("wait:
2002 Mar 26
1
Two patches for OpenSSH 3.1p1
...y (unless started from inetd)
*/
log_init(__progname,
options.log_level == SYSLOG_LEVEL_NOT_SET ?
SYSLOG_LEVEL_INFO : options.log_level,
options.log_facility == SYSLOG_FACILITY_NOT_SET ?
SYSLOG_FACILITY_AUTH : options.log_facility,
! !inetd_flag);
#ifdef _CRAY
/* Cray can define user privs drop all prives now!
--- 713,726 ----
/*
* Force logging to stderr until we have loaded the private host
! * key (unless started from inetd or init)
*/
log_init(__progname,
options.log_level == SYSLOG_LEVEL_NOT_SET ?
SYSLOG_LEVEL_INF...
2001 Jul 22
2
Patches for Cray T3Es running Unicossmk and SV1s running Unicos
This patch is against Cray patch against openssh-SNAP-20010710. Here
a few notes about them:
1) rijndael does not work on cray due to the fact it is rooted in 32 bits.
I looking for a fix, it may come form Wendy Palam. For now the cray
default to the following cihpers for ssh version 2 ssh are:
3des-cbc,blowfish-cbc,cast128-cbc,arcfour
2) Crays don't have setitimer so I
2002 Apr 05
2
[Bug 96] bsd-cray.h modifications to allow correct UNICOS execution
http://bugzilla.mindrot.org/show_bug.cgi?id=96
------- Additional Comments From stevesk at pobox.com 2002-04-05 19:23 -------
the cray support is incomplete now, is that correct?
if so, what is needed to complete it?
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2001 Nov 27
2
3.0.1p1 losing tty modes?
...but it's only a hack to me until I know
why vhangup() is needed:
--- sshpty.c.orig Tue Nov 27 02:32:50 2001
+++ sshpty.c Tue Nov 27 02:33:45 2001
@@ -252,6 +252,7 @@
int fd;
#ifdef USE_VHANGUP
void *old;
+ struct termios tio;
#endif /* USE_VHANGUP */
#ifdef _CRAY
@@ -310,6 +311,7 @@
#endif /* HAVE_NEWS4 */
#ifdef USE_VHANGUP
old = mysignal(SIGHUP, SIG_IGN);
+ tcgetattr(*ttyfd,&tio);
vhangup();
mysignal(SIGHUP, old);
#endif /* USE_VHANGUP */
@@ -320,6 +322,7 @@
#ifdef USE_VHANGUP
close(*ttyfd);...
2001 Feb 27
1
Bad packet length in 2.5.1 with rijndael (fwd)
I think we are not detecting and setting endianness properly for
rijndael.c.
Can someone on a big endian machine do a "ssh -2 -oCiphers=rijndael128-cbc
littleendianmachine" and vice versa?
-d
--
| Damien Miller <djm at mindrot.org> \ ``E-mail attachments are the poor man's
| http://www.mindrot.org / distributed filesystem'' - Dan Geer
----------
2001 Jul 26
7
Updated Cray patch against openssh SNAP-20010725
This patch fixes my botched attempted to patch deattack.c.
I created a bsd-cray.h file and cleaned up a few error cases
in bsd-cray.c. Fixed cray_setup call to pass uid and login name
in session.c and moved its call so that its called with root privs.
Its been tested on a irix, sun, aix, unicos(SV1) and unicosmk(T3E)
systems.
If you are building this on a T3E you may have to edit the Makefile