Displaying 7 results from an estimated 7 matches for "cray_access_deni".
Did you mean:
cray_access_denied
2003 Apr 27
3
[PATCH re-send]: Clean up logging of failed logins
sorry, Darren. Long over due comments.
[..]
>+/* Record a failed login attempt. */
>+void
>+record_failed_login(const char *user, const char *host, const char *ttyname)
>+{
>+#ifdef WITH_AIXAUTHENTICATE
>+ loginfailed(user, host, ttyname);
>+#endif
>+#ifdef _UNICOS
>+ cray_login_failure((char *)user, IA_UDBERR);
>+#endif /* _UNICOS */
>+}
I like the
2002 Apr 22
0
[Bug 99] auth2.c modifications for correct UNICOS behavior
...nclude "monitor_wrap.h"
+#ifdef _CRAY
+#include <ia.h>
+#endif /* _CRAY */
+
/* import */
extern ServerOptions options;
extern u_char *session_id2;
@@ -247,6 +251,13 @@
authenticated = 0;
#endif /* USE_PAM */
+#ifdef _CRAY
+ if (authenticated && cray_access_denied(authctxt->user)) {
+ authenticated = 0;
+ fatal("Access denied for user %s.",authctxt->user);
+ }
+#endif /* _CRAY */
+
/* Log before sending the reply */
auth_log(authctxt, authenticated, method, " ssh2");
@@ -271,6 +2...
2002 Apr 22
0
[Bug 98] auth1.c modifications for correct UNICOS behavior
...lid user %s",
authctxt->user);
+
+#ifdef _CRAY
+ if (type == SSH_CMSG_AUTH_PASSWORD && !authenticated) {
+ cray_login_failure(authctxt->user, IA_UDBERR);
+ }
+ if (authenticated && cray_access_denied(authctxt->user)) {
+ authenticated = 0;
+ fatal("Access denied for user %s.",authctxt->user);
+ }
+#endif /* _CRAY */
#ifdef HAVE_CYGWIN
if (authenticated &&
------- You are receiving this mai...
2003 Feb 28
0
[PATCH] Clean up failed login logging.
...--- auth1.c 24 Feb 2003 00:59:27 -0000 1.79
+++ auth1.c 25 Feb 2003 09:45:10 -0000
@@ -311,8 +311,6 @@
authctxt->user);
#ifdef _UNICOS
- if (type == SSH_CMSG_AUTH_PASSWORD && !authenticated)
- cray_login_failure(authctxt->user, IA_UDBERR);
if (authenticated && cray_access_denied(authctxt->user)) {
authenticated = 0;
fatal("Access denied for user %s.",authctxt->user);
Index: auth2.c
===================================================================
RCS file: /usr/local/src/security/openssh/cvs/openssh_cvs/auth2.c,v
retrieving revision 1.112
diff -...
2003 Apr 03
0
[PATCH re-send]: Clean up logging of failed logins.
...--- auth1.c 24 Feb 2003 00:59:27 -0000 1.79
+++ auth1.c 25 Feb 2003 09:45:10 -0000
@@ -311,8 +311,6 @@
authctxt->user);
#ifdef _UNICOS
- if (type == SSH_CMSG_AUTH_PASSWORD && !authenticated)
- cray_login_failure(authctxt->user, IA_UDBERR);
if (authenticated && cray_access_denied(authctxt->user)) {
authenticated = 0;
fatal("Access denied for user %s.",authctxt->user);
Index: auth2.c
===================================================================
RCS file: /usr/local/src/security/openssh/cvs/openssh_cvs/auth2.c,v
retrieving revision 1.112
diff -...
2003 Jan 27
1
[PATCH] Creation of record_failed_login() in sshlogin.c
...--- auth1.c 23 Jan 2003 06:41:20 -0000 1.78
+++ auth1.c 27 Jan 2003 10:51:39 -0000
@@ -311,8 +311,6 @@
authctxt->user);
#ifdef _UNICOS
- if (type == SSH_CMSG_AUTH_PASSWORD && !authenticated)
- cray_login_failure(authctxt->user, IA_UDBERR);
if (authenticated && cray_access_denied(authctxt->user)) {
authenticated = 0;
fatal("Access denied for user %s.",authctxt->user);
Index: auth2.c
===================================================================
RCS file: /usr/local/src/security/openssh/cvs/openssh_cvs/auth2.c,v
retrieving revision 1.111
diff -...
2002 Sep 23
19
Call for testing for 3.5 OpenSSH
OpenBSD tree is heading into a lock and this includes OpenSSH. So we are
winding up for a 3.5 release. If we can get people to test the current
snapshots and report any problems that would improve the odds that your
platform won't be broke for 3.5.
Issues I know off of right now.
1. I can't test NeXT. So I TRULY need someone in that community to test
for me. Last I heard there was