search for: fetch_pam_environment

Displaying 7 results from an estimated 7 matches for "fetch_pam_environment".

2000 Feb 26
1
OpenSSH on HP-UX 11 with TCB
...R_IN_UTMPX) if (addr) { /* Added a brace here - Ged */ switch (addr->sa_family) { Solution for Makefile: Changed Makefile.in and added $(CFLAGS) to the compile lines for all the executables. Solution for sshd: HP-UX does not have a pam_getenvlist call. Changed the fetch_pam_environment function to return NULL if _HPUX_SOURCE was defined. /* Return list of PAM environment strings */ char **fetch_pam_environment(void) { #ifndef _HPUX_SOURCE /* HP-UX has not implemented this */ return(pam_getenvlist((pam_handle_t *)pamh)); #else return(NULL); #endif } Solution for lon...
2001 Dec 18
1
[PATCH]: Fix environment variable size restriction in Cygwin version
Hi, the following patch changes the Cygwin specific function copy_environment() to not restricting the strlen of a single environment variable to 512 byte. The PAM specific function do_pam_environment() (also in session.c) has the same problem but I don't know if that's important for PAM since only PAM specific environment variables are copied in that function. The below patch fixes
2000 Sep 13
2
auth-pam.c support for pam_chauthtok()
...+ pam_retval = pam_set_item(pamh, PAM_TTY, "ssh"); if (pam_retval != PAM_SUCCESS) { fatal("PAM set tty failed: %.200s", - PAM_STRERROR((pam_handle_t *)pamh, pam_retval)); + PAM_STRERROR(pamh, pam_retval)); } #endif /* PAM_TTY_KLUDGE */ @@ -268,7 +320,7 @@ char **fetch_pam_environment(void) { #ifdef HAVE_PAM_GETENVLIST - return(pam_getenvlist((pam_handle_t *)pamh)); + return(pam_getenvlist(pamh)); #else /* HAVE_PAM_GETENVLIST */ return(NULL); #endif /* HAVE_PAM_GETENVLIST */ =================================================================== RCS file: RCS/auth-pam.h,v retr...
2001 Oct 09
1
TISviaPAM patch
Here is a patch that does TIS auth via PAM. It's controlled by a switch in the sshd_config. You'd use it by having a PAM module that sets PAM_PROMPT_ECHO_ON. eg, you could use it with pam_skey or pam_smxs. The patch is against the 2.9.9p2 distribution. I'm not on the list, a reply if this patch is accepted would be great. (But not required, I know some folks have a distaste for
2002 Feb 15
0
[Bug 118] New: Implement TIS (protocol 1) via PAM
...:12:24 2001 +++ openssh-3.0.2p1/auth-pam.h Fri Feb 15 02:15:02 2002 @@ -7,7 +7,7 @@ void start_pam(const char *user); void finish_pam(void); -int auth_pam_password(struct passwd *pw, const char *password); +int auth_pam_password(struct passwd *pw, const char *password, int prompt_type); char **fetch_pam_environment(void); int do_pam_authenticate(int flags); int do_pam_account(char *username, char *remote_user); diff -uNr openssh-3.0.2p1.orig/auth1.c openssh-3.0.2p1/auth1.c --- openssh-3.0.2p1.orig/auth1.c Tue Nov 13 04:46:19 2001 +++ openssh-3.0.2p1/auth1.c Fri Feb 15 02:15:02 2002 @@ -85,7 +85,7 @@ (...
2000 Aug 27
0
patch for TIS (skey/opie) *and* passwd auth via PAM
...38 2000 +++ openssh-2.1.1p4-hein/auth-pam.h Sun Aug 27 17:27:46 2000 @@ -5,7 +5,7 @@ void start_pam(struct passwd *pw); void finish_pam(void); -int auth_pam_password(struct passwd *pw, const char *password); +int auth_pam_password(struct passwd *pw, const char *password, int auth_type); char **fetch_pam_environment(void); int do_pam_account(char *username, char *remote_user); void do_pam_session(char *username, const char *ttyname); diff -urN -x *~ openssh-2.1.1p4/auth1.c openssh-2.1.1p4-hein/auth1.c --- openssh-2.1.1p4/auth1.c Sat Jul 8 02:44:14 2000 +++ openssh-2.1.1p4-hein/auth1.c Sun Aug 27 17:27:53 20...
2003 Oct 29
4
Fix for USE_POSIX_THREADS in auth-pam.c
As many of you know, OpenSSH 3.7.X, unlike previous versions, makes PAM authentication take place in a separate process or thread (launched from sshpam_init_ctx() in auth-pam.c). By default (if you don't define USE_POSIX_THREADS) the code "fork"s a separate process. Or if you define USE_POSIX_THREADS it will create a new thread (a second one, in addition to the primary thread). The