search for: get_progname

Displaying 13 results from an estimated 13 matches for "get_progname".

2002 Dec 31
0
openssh-3.5p1 && heimdal
...tcp-wrappers \ --with-pam \ --with-kerberos5=/usr/local/heimdal \ --with-ssl-dir=/usr \ --with-mantype=man \ --with-md5-passwords \ --with-shadow \ --with-ipv4-default But I had to remove the kerberos5 option: /usr/local/heimdal/lib/libroken.a(getprogname.o): In function `get_progname': getprogname.o(.text+0x10): multiple definition of `get_progname' /usr/bin/ld: Dwarf Error: Invalid or unhandled FORM value: 14. openbsd-compat//libopenbsd-compat.a(bsd-misc.o):/home/net/SSH/openssh-3.5p1/openbsd-compat/bsd-misc.c:30: first defined here /usr/bin/ld: Warning: size of symbol...
2003 Apr 08
0
Some problems with Heimdal and AFS
Hello, My first problem is compilation against Heimdal. It does not work because of the following: /products/source/heimdal/heimdal-0.5.1/i386_linux24/lib/roken/../../../lib/r oken/getprogname.c(.text+0xc): multiple definition of `get_progname' openbsd-compat//libopenbsd-compat.a(bsd-misc.o)(.text+0x0):/usr1/ahaupt/open ssh-3.6.1p1/openbsd-compat/bsd-misc.c: first defined here /usr/bin/ld: Warning: size of symbol `get_progname' changed from 24 to 15 in getprogname.o After applying the heimdal patch from http://meta.cesnet.cz/sof...
2003 Apr 02
0
[Bug 529] sshd doesn't work correctly after SIGHUP
...2003-03-26 16:04:08.000000000 +1100 +++ openssh-3.6p1/sshd.c 2003-03-10 11:38:10.000000000 +1100 @@ -804,8 +821,23 @@ Key *key; int ret, key_used = 0; - /* Save argv. */ +#ifdef HAVE_SECUREWARE + (void)set_auth_parameters(ac, av); +#endif + __progname = get_progname(av[0]); + init_rng(); + + /* Save argv. Duplicate so setproctitle emulation doesn't clobber it */ + saved_argc = ac; saved_argv = av; + saved_argv = xmalloc(sizeof(*saved_argv) * ac); + for (i = 0; i < ac; i++) + saved_argv[i] = xstrdup(av[...
2003 Aug 16
0
sftp-server (secure) chroot patch, comment fix
...unixerrno) { @@ -1028,15 +1082,19 @@ int in, out, max; ssize_t len, olen, set_size; +#ifdef DEBUG_SFTP-SERVER + log_init("sftp-server", SYSLOG_LEVEL_DEBUG3, SYSLOG_FACILITY_AUTH, 0); +#endif + +#ifdef CHROOT + chroot_init(); +#endif + /* XXX should use getopt */ __progname = get_progname(av[0]); handle_init(); -#ifdef DEBUG_SFTP_SERVER - log_init("sftp-server", SYSLOG_LEVEL_DEBUG1, SYSLOG_FACILITY_AUTH, 0); -#endif - in = dup(STDIN_FILENO); out = dup(STDOUT_FILENO);
2002 Nov 11
0
changes to allow chroot'ed sftp
...et_size; /* XXX should use getopt */ + if(ac == 2 && strcmp(av[1],"-c") == 0 ){ + chroot("."); + chdir("/"); /* get rid of '.' chroot hole */ + setuid(getuid()); + }; __progname = get_progname(av[0]); handle_init(); =================================================================== =================================================================== RCS file: RCS/sftp-server.8,v retrieving revision 1.1 diff -u -r1.1 sftp-server.8 --- sftp-server.8 2002/11/10 23:17:06 1...
2002 Mar 25
0
[Bug 184] New: 3.1p1 openssh fails to build a working sshd on Trusted HP-UX 10.26
...*************** *** 596,601 **** --- 600,610 ---- int startups = 0; Key *key; int ret, key_used = 0; + #ifdef TRUSTED_HPUX + //This call is needed for getprpwnam in auth2.c + //to initialize the security system for Trusted HP-UX + set_auth_parameters(ac, av); + #endif __progname = get_progname(av[0]); init_rng(); ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
2003 Aug 16
0
sftp-server (secure) chroot patch?
...,17 @@ int in, out, max; ssize_t len, olen, set_size; - /* XXX should use getopt */ +#ifdef DEBUG_SFTP-SERVER + log_init("sftp-server", SYSLOG_LEVEL_DEBUG3, SYSLOG_FACILITY_AUTH, 0); +#endif + +#ifdef CHROOT + chroot_init(); +#endif __progname = get_progname(av[0]); handle_init(); -#ifdef DEBUG_SFTP_SERVER - log_init("sftp-server", SYSLOG_LEVEL_DEBUG1, SYSLOG_FACILITY_AUTH, 0); -#endif - in = dup(STDIN_FILENO); out = dup(STDOUT_FILENO);
2002 Jun 07
2
SIGCHLD may be inherited blocked
..._prod.2(w)/sshd.c Fri, 07 Jun 2002 15:53:22 -0400 @@ -556,6 +556,11 @@ int startups = 0; Key *key; int ret, key_used = 0; + sigset_t curr_mask; + + sigprocmask(0, NULL, &curr_mask); + sigdelset(&current_mask, SIGCHLD); + sigprocmask(SIG_SETMASK, &curr_mask, NULL); __progname = get_progname(av[0]); init_rng(); -------------- next part -------------- Visit our website at http://www.ubswarburg.com This message contains confidential information and is intended only for the individual named. If you are not the named addressee you should not disseminate, distribute or copy this e-ma...
2001 Jun 20
1
SFTP Logging Redux.
...g_len = GET_32BIT(cp); if (msg_len > 256 * 1024) { error("bad message "); + log("(%d/%d/%s) SFTP session closing (%s).", ppid, cuid, CUNAME, "Bad Message"); exit(11); } if (buffer_len(&iqueue) < msg_len + 4) @@ -1036,10 +1075,27 @@ __progname = get_progname(av[0]); handle_init(); + /* Initialize the username of the user running the process. */ + cuid = getuid(); + if ((upw = getpwuid(cuid)) == NULL) { + cuname = NULL; + } else { + cuname = upw->pw_name; + } + + /* Initialize the parent process ID. */ + ppid = getppid(); + + /* Initialize the...
2002 Dec 18
2
patch for openssh3.5p1 - adds logging option
...led by the admin */ diff -urN openssh-3.5p1-orig/ssh-rand-helper.c openssh-3.5p1/ssh-rand-helper.c --- openssh-3.5p1-orig/ssh-rand-helper.c 2002-12-18 10:10:13.000000000 -0500 +++ openssh-3.5p1/ssh-rand-helper.c 2002-12-18 10:44:28.000000000 -0500 @@ -768,7 +768,7 @@ LogLevel ll; __progname = get_progname(argv[0]); - log_init(argv[0], SYSLOG_LEVEL_INFO, SYSLOG_FACILITY_USER, 1); + log_init(argv[0], SYSLOG_LEVEL_INFO, SYSLOG_FACILITY_USER, 1, NULL); ll = SYSLOG_LEVEL_INFO; debug_level = output_hex = 0; @@ -803,7 +803,7 @@ } } - log_init(argv[0], ll, SYSLOG_FACILITY_USER, 1); + log_init(a...
2002 Jul 13
0
[PATCH]: scp program improved
...ate_limit = 0; #define CMDNEEDS 64 char cmd[CMDNEEDS]; /* must hold "rcp -r -p -d\0" */ @@ -223,7 +246,10 @@ char *targ; extern char *optarg; extern int optind; - + int factor, i; /* For rate limit */ + const char factors[] = "kMMGGG"; + char *c; + __progname = get_progname(argv[0]); args.list = NULL; @@ -233,7 +259,7 @@ addargs(&args, "-oClearAllForwardings yes"); fflag = tflag = 0; - while ((ch = getopt(argc, argv, "dfprtvBCc:i:P:q1246S:o:F:")) != -1) + while ((ch = getopt(argc, argv, "adfprtvBCc:i:P:q1246S:o:F:R:")) != -1)...
2002 Mar 15
4
PATCH: sftp-server logging.
...quot;bad message "); + #ifdef SFTP_LOGGING + log("(%d/%d/%s) SFTP session closing (%s).", ppid, cuid, CUNAME, "Bad Message"); + #endif exit(11); } if (buffer_len(&iqueue) < msg_len + 4) *************** *** 1050,1055 **** --- 1236,1260 ---- __progname = get_progname(av[0]); handle_init(); + #ifdef SFTP_LOGGING + /* Initialize the username of the user running the process. */ + cuid = getuid(); + if ((upw = getpwuid(cuid)) == NULL) { + cuname = NULL; + } else { + cuname = xstrdup(upw->pw_name); + } + + /* Initialize the parent process ID. */...
2003 Aug 10
9
updated gssapi diff
this is the proposed gssapi diff against OpenSSH-current (non-portable). note: if this goes in, the old krb5 auth (ssh.com compatible) will be removed. please comment. jakob Index: auth.h =================================================================== RCS file: /home/hack/jakob/mycvs/sshgss/auth.h,v retrieving revision 1.1.1.2 retrieving revision 1.3 diff -u -r1.1.1.2 -r1.3 --- auth.h