search for: display_hack_msg

Displaying 13 results from an estimated 13 matches for "display_hack_msg".

2001 Jan 03
1
chroot.diff
...6 +7541,7 @@ echo " S/KEY support: $SKEY_MSG" echo " TCP Wrappers support: $TCPW_MSG" echo " MD5 password support: $MD5_MSG" +echo " Magic token chroot support: $CHROOT_MSG" echo " IP address in \$DISPLAY hack: $DISPLAY_HACK_MSG" echo " Use IPv4 by default hack: $IPV4_HACK_MSG" echo " Translate v4 in v6 hack: $IPV4_IN6_HACK_MSG" diff -u openssh-2.3.0p1/configure.in openssh-2.3.0p1-chroot/configure.in --- openssh-2.3.0p1/configure.in Sun Nov 5 09:08:45 2000 +++ openssh-2.3.0p1-chroot/c...
2000 Aug 07
1
--with-ipaddr-display patch
...8:15 2000 @@ -1026,7 +1026,7 @@ AC_ARG_WITH(ipaddr-display, [ --with-ipaddr-display Use ip address instead of hostname in \$DISPLAY], [ - if test "x$withval" = "xno" ; then + if test "x$withval" != "xno" ; then AC_DEFINE(IPADDR_IN_DISPLAY) DISPLAY_HACK_MSG="yes" fi -- Jarno Huuskonen - System Administrator | Jarno.Huuskonen at uku.fi University of Kuopio - Computer Center | Work: +358 17 162822 PL 1627, 70211 Kuopio, Finland | Mobile: +358 40 5388169
2009 Nov 23
0
[PATCH] Bluetooth support.
...MD5 password support: $MD5_MSG" echo " libedit support: $LIBEDIT_MSG" +echo " Bluetooth support: $BLUETOOTH_MSG" echo " Solaris process contract support: $SPC_MSG" echo " IP address in \$DISPLAY hack: $DISPLAY_HACK_MSG" echo " Translate v4 in v6 hack: $IPV4_IN6_HACK_MSG" Index: packet.c =================================================================== RCS file: /cvs/openssh/packet.c,v retrieving revision 1.169 diff -u -p -r1.169 packet.c --- packet.c 2 Oct 2009 01:49:04 -0000 1.169 +++...
2001 Nov 04
2
OPIE patch for current CVS
...$AFS_MSG" echo " S/KEY support: $SKEY_MSG" +echo " OPIE support: $OPIE_MSG" echo " TCP Wrappers support: $TCPW_MSG" echo " MD5 password support: $MD5_MSG" echo " IP address in \$DISPLAY hack: $DISPLAY_HACK_MSG" diff -x CVS -wNur ../cvs/other/openssh_cvs/readconf.c openssh_cvs/readconf.c --- ../cvs/other/openssh_cvs/readconf.c Wed Oct 3 19:39:39 2001 +++ openssh_cvs/readconf.c Sun Nov 4 01:44:19 2001 @@ -141,6 +141,7 @@ { "challengeresponseauthentication", oChallengeResponseAuthenticati...
2001 Aug 13
1
[PATCH] Maildir support
...MAILDIR_FORMAT=no + ;; + *) AC_MSG_RESULT(yes) + MAILDIR_FORMAT=yes + AC_DEFINE(MAILDIR_FORMAT) + ;; + esac ], + AC_MSG_RESULT(no) + MAILDIR_FORMAT=no +) # Where to place sshd.pid piddir=/var/run @@ -1940,6 +1957,7 @@ echo " IP address in \$DISPLAY hack: $DISPLAY_HACK_MSG" echo " Use IPv4 by default hack: $IPV4_HACK_MSG" echo " Translate v4 in v6 hack: $IPV4_IN6_HACK_MSG" +echo " Maildir style mailbox: $MAILDIR_FORMAT" if test ! -z "$bsd_auth"; then echo " BSD Auth support: yes&...
2001 Mar 13
0
[PATCH] openssh 2.5.1p2 TIS authserv support
...$AFS_MSG" echo " S/KEY support: $SKEY_MSG" +echo " TIS authsrv support: $TIS_MSG" echo " TCP Wrappers support: $TCPW_MSG" echo " MD5 password support: $MD5_MSG" echo " IP address in \$DISPLAY hack: $DISPLAY_HACK_MSG" diff -urN openssh-2.5.1p2/servconf.c openssh-2.5.1p2-tis/servconf.c --- openssh-2.5.1p2/servconf.c Thu Feb 15 04:08:27 2001 +++ openssh-2.5.1p2-tis/servconf.c Fri Mar 9 11:12:14 2001 @@ -206,6 +209,9 @@ #ifdef AFS sKerberosTgtPassing, sAFSTokenPassing, #endif +#ifdef TIS_AUTH + sAuthserv...
2000 Aug 27
0
patch for TIS (skey/opie) *and* passwd auth via PAM
...S_MSG" echo " S/KEY support: $SKEY_MSG" +echo " TIS via PAM support: $PAM_TIS_MSG" echo " TCP Wrappers support: $TCPW_MSG" echo " MD5 password support: $MD5_MSG" echo " IP address in \$DISPLAY hack: $DISPLAY_HACK_MSG" diff -urN -x *~ openssh-2.1.1p4/debian/rules openssh-2.1.1p4-hein/debian/rules --- openssh-2.1.1p4/debian/rules Sun Aug 27 15:42:21 2000 +++ openssh-2.1.1p4-hein/debian/rules Sun Aug 27 17:39:02 2000 @@ -14,8 +14,8 @@ build: build-stamp build-stamp: dh_testdir - ./configure --prefix='...
2000 Dec 07
1
[PATCH] tis authserv support
...$AFS_MSG" echo " S/KEY support: $SKEY_MSG" +echo " TIS authsrv support: $TIS_MSG" echo " TCP Wrappers support: $TCPW_MSG" echo " MD5 password support: $MD5_MSG" echo " IP address in \$DISPLAY hack: $DISPLAY_HACK_MSG" diff -urN openssh-2.3.0p1/readconf.c openssh-2.3.0p1-tis/readconf.c --- openssh-2.3.0p1/readconf.c Sat Oct 14 07:23:12 2000 +++ openssh-2.3.0p1-tis/readconf.c Thu Dec 7 18:38:42 2000 @@ -313,7 +313,7 @@ goto parse_flag; case oTISAuthentication: - /* fallthrough, there is no differenc...
2000 Aug 24
0
patch for a few things
...else + PROGRESS_METER="yes" + AC_MSG_RESULT(yes) + fi + ] + ) + # Whether to mess with the default path SERVER_PATH_MSG="(default)" AC_ARG_WITH(default-path, *************** *** 1434,1439 **** --- 1451,1457 ---- echo " IP address in \$DISPLAY hack: $DISPLAY_HACK_MSG" echo " Use IPv4 by default hack: $IPV4_HACK_MSG" echo " Translate v4 in v6 hack: $IPV4_IN6_HACK_MSG" + echo " scp progress meter by default: $PROGRESS_METER" echo "" *** ./acconfig.h.orig Tue Aug 22 20:46:23 2000 --- ./acconfig.h...
2000 Aug 26
0
New chroot patch, for 2.1.1p4
...6 +6700,7 @@ echo " S/KEY support: $SKEY_MSG" echo " TCP Wrappers support: $TCPW_MSG" echo " MD5 password support: $MD5_MSG" +echo " Magic token chroot support: $CHROOT_MSG" echo " IP address in \$DISPLAY hack: $DISPLAY_HACK_MSG" echo " Use IPv4 by default hack: $IPV4_HACK_MSG" echo " Translate v4 in v6 hack: $IPV4_IN6_HACK_MSG" diff -u --new-file openssh-2.1.1p4/configure.in openssh-2.1.1p4-chroot/configure.in --- openssh-2.1.1p4/configure.in Sat Jul 15 05:59:14 2000 +++ openssh-2.1.1...
2000 Aug 23
1
Protocol 2 remote forwarding patch
...port forwarding in server [no]], + [ AC_DEFINE(DISABLE_FORWARDING) ] +) + dnl allow user to disable some login recording features AC_ARG_ENABLE(lastlog, [ --disable-lastlog disable use of lastlog even if detected [no]], @@ -1370,7 +1376,6 @@ echo " IP address in \$DISPLAY hack: $DISPLAY_HACK_MSG" echo " Use IPv4 by default hack: $IPV4_HACK_MSG" echo " Translate v4 in v6 hack: $IPV4_IN6_HACK_MSG" - echo "" echo "Compiler flags: ${CFLAGS}" diff -u -r openssh-2.1.1p4/config.h.in openssh-2.1.1p4-jhchanges/config.h.in --- openssh-2.1...
2000 Oct 04
0
2.2.0p1 chroot patch
...6 +6926,7 @@ echo " S/KEY support: $SKEY_MSG" echo " TCP Wrappers support: $TCPW_MSG" echo " MD5 password support: $MD5_MSG" +echo " Magic token chroot support: $CHROOT_MSG" echo " IP address in \$DISPLAY hack: $DISPLAY_HACK_MSG" echo " Use IPv4 by default hack: $IPV4_HACK_MSG" echo " Translate v4 in v6 hack: $IPV4_IN6_HACK_MSG" diff -u --new-file openssh-2.2.0p1/configure.in openssh-2.2.0p1-chroot/configure.in --- openssh-2.2.0p1/configure.in Wed Aug 30 23:20:05 2000 +++ openssh-2.2.0...
2015 May 29
16
Call for testing: OpenSSH 6.9
Hi, OpenSSH 6.9 is almost ready for release, so we would appreciate testing on as many platforms and systems as possible. This release contains some substantial new features and a number of bugfixes. Snapshot releases for portable OpenSSH are available from http://www.mindrot.org/openssh_snap/ The OpenBSD version is available in CVS HEAD: http://www.openbsd.org/anoncvs.html Portable OpenSSH is