Displaying 6 results from an estimated 6 matches for "get_authname".
2000 May 15
1
AIX authenticate patches
...msg);
+ }
return 0;
+ }
#endif /* WITH_AIXAUTHENTICATE */
/* We found no reason not to let this user try to log on... */
--- auth1.c.orig Wed May 10 15:53:51 2000
+++ auth1.c Thu May 11 15:13:37 2000
@@ -66,9 +66,7 @@
get_remote_port());
#ifdef WITH_AIXAUTHENTICATE
- if (strncmp(get_authname(type),"password",
- strlen(get_authname(type))) == 0)
- loginfailed(pw->pw_name,get_canonical_hostname(),"ssh");
+ loginfailed(user,get_canonical_hostname(),"ssh");
#endif /* WITH_AIXAUTHENTICATE */
/* Indicate that authentication is needed. */
@@ -408,8...
2001 May 23
1
[PATCH]: Drop the use of `check_nt_auth'.
...;pw_uid)) {
- packet_disconnect("Authentication rejected for uid %d.",
- (int)pw->pw_uid);
- authenticated = 0;
- }
-#else
+#ifndef HAVE_CYGWIN
/* Special handling for root */
if (authenticated && authctxt->pw->pw_uid == 0 &&
!auth_root_allowed(get_authname(type)))
Index: auth2.c
===================================================================
RCS file: /cvs/openssh_cvs/auth2.c,v
retrieving revision 1.59
diff -u -p -r1.59 auth2.c
--- auth2.c 2001/04/25 12:44:15 1.59
+++ auth2.c 2001/05/23 09:40:49
@@ -354,10 +354,6 @@ userauth_none(Authctxt *authct...
2000 Feb 01
3
logging RSA key IDs
Hi. To compartmentalize things a bit (e.g., to help limit the damage
should one of my machines be hacked and my private RSA keys stolen) I
use different RSA key pairs on my different client machines.
So it occurs to me that it would be nice if ssh could log which key
was used when logging in to a particular account that has more than
one entry in .ssh/authorized_keys. Right now it simply says
2016 Feb 14
5
[Bug 2541] New: Add explicit_bzero() before free() in OpenSSH-7.1p2 for auth1.c/auth2.c/auth2-hostbased.c
...GE);
packet_put_cstring(challenge);
+ explicit_bzero(challenge, sizeof(*challenge));
free(challenge);
packet_send();
packet_write_wait();
@@ -356,6 +357,7 @@
/* Log before sending the reply */
auth_log(authctxt, authenticated, 0,
get_authname(type), NULL);
+ explicit_bzero(client_user, sizeof(*client_user));
free(client_user);
client_user = NULL;
=======================================================================
In the case of variable 'client_user', calling free() and settin...
2001 Nov 20
3
problem with AFS token forwarding
Hello,
I came across an interoperability problem in OpenSSH 3.0p1 and 3.0.1p1
concerning the AFS token forwarding. That means that the new versions are
not able to exchange AFS tokens (and Kerberos TGTs) with older OpenSSH
releases (including 2.9p2) and with the old SSH 1.2.2x. In my opinion this
problem already existed in Openssh 2.9.9p1, but I have never used this
version (I only looked at the
2000 Jan 19
3
AIX openssh patches
...! if (client_user != NULL) {
xfree(client_user);
+ client_user = NULL;
+ }
+ #endif
if (attempt > AUTH_FAIL_MAX)
packet_disconnect(AUTH_FAIL_MSG, pw->pw_name);
/* Send a message indicating that the authentication attempt failed. */
+ #ifdef _AIX
+ if (strncmp(get_authname(type),"password",
+ strlen(get_authname(type))) == 0)
+ loginfailed(pw->pw_name,get_canonical_hostname(),"ssh");
+ #endif
+
packet_start(SSH_SMSG_FAILURE);
packet_send();
packet_write_wait();
}
+
+
+
}
/*
***************
*** 1603,...