Displaying 13 results from an estimated 13 matches for "get_progname".
2002 Dec 31
0
openssh-3.5p1 && heimdal
...tcp-wrappers \
--with-pam \
--with-kerberos5=/usr/local/heimdal \
--with-ssl-dir=/usr \
--with-mantype=man \
--with-md5-passwords \
--with-shadow \
--with-ipv4-default
But I had to remove the kerberos5 option:
/usr/local/heimdal/lib/libroken.a(getprogname.o): In function `get_progname':
getprogname.o(.text+0x10): multiple definition of `get_progname'
/usr/bin/ld: Dwarf Error: Invalid or unhandled FORM value: 14.
openbsd-compat//libopenbsd-compat.a(bsd-misc.o):/home/net/SSH/openssh-3.5p1/openbsd-compat/bsd-misc.c:30: first defined here
/usr/bin/ld: Warning: size of symbol...
2003 Apr 08
0
Some problems with Heimdal and AFS
Hello,
My first problem is compilation against Heimdal. It does not work because
of the following:
/products/source/heimdal/heimdal-0.5.1/i386_linux24/lib/roken/../../../lib/r
oken/getprogname.c(.text+0xc):
multiple definition of `get_progname'
openbsd-compat//libopenbsd-compat.a(bsd-misc.o)(.text+0x0):/usr1/ahaupt/open
ssh-3.6.1p1/openbsd-compat/bsd-misc.c:
first defined here
/usr/bin/ld: Warning: size of symbol `get_progname' changed from 24 to 15
in getprogname.o
After applying the heimdal patch from
http://meta.cesnet.cz/sof...
2003 Apr 02
0
[Bug 529] sshd doesn't work correctly after SIGHUP
...2003-03-26 16:04:08.000000000 +1100
+++ openssh-3.6p1/sshd.c 2003-03-10 11:38:10.000000000 +1100
@@ -804,8 +821,23 @@
Key *key;
int ret, key_used = 0;
- /* Save argv. */
+#ifdef HAVE_SECUREWARE
+ (void)set_auth_parameters(ac, av);
+#endif
+ __progname = get_progname(av[0]);
+ init_rng();
+
+ /* Save argv. Duplicate so setproctitle emulation doesn't clobber it */
+ saved_argc = ac;
saved_argv = av;
+ saved_argv = xmalloc(sizeof(*saved_argv) * ac);
+ for (i = 0; i < ac; i++)
+ saved_argv[i] = xstrdup(av[...
2003 Aug 16
0
sftp-server (secure) chroot patch, comment fix
...unixerrno)
{
@@ -1028,15 +1082,19 @@
int in, out, max;
ssize_t len, olen, set_size;
+#ifdef DEBUG_SFTP-SERVER
+ log_init("sftp-server", SYSLOG_LEVEL_DEBUG3, SYSLOG_FACILITY_AUTH, 0);
+#endif
+
+#ifdef CHROOT
+ chroot_init();
+#endif
+
/* XXX should use getopt */
__progname = get_progname(av[0]);
handle_init();
-#ifdef DEBUG_SFTP_SERVER
- log_init("sftp-server", SYSLOG_LEVEL_DEBUG1, SYSLOG_FACILITY_AUTH, 0);
-#endif
-
in = dup(STDIN_FILENO);
out = dup(STDOUT_FILENO);
2002 Nov 11
0
changes to allow chroot'ed sftp
...et_size;
/* XXX should use getopt */
+ if(ac == 2 && strcmp(av[1],"-c") == 0 ){
+ chroot(".");
+ chdir("/"); /* get rid of '.' chroot hole */
+ setuid(getuid());
+ };
__progname = get_progname(av[0]);
handle_init();
===================================================================
===================================================================
RCS file: RCS/sftp-server.8,v
retrieving revision 1.1
diff -u -r1.1 sftp-server.8
--- sftp-server.8 2002/11/10 23:17:06 1...
2002 Mar 25
0
[Bug 184] New: 3.1p1 openssh fails to build a working sshd on Trusted HP-UX 10.26
...***************
*** 596,601 ****
--- 600,610 ----
int startups = 0;
Key *key;
int ret, key_used = 0;
+ #ifdef TRUSTED_HPUX
+ //This call is needed for getprpwnam in auth2.c
+ //to initialize the security system for Trusted HP-UX
+ set_auth_parameters(ac, av);
+ #endif
__progname = get_progname(av[0]);
init_rng();
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2003 Aug 16
0
sftp-server (secure) chroot patch?
...,17 @@
int in, out, max;
ssize_t len, olen, set_size;
- /* XXX should use getopt */
+#ifdef DEBUG_SFTP-SERVER
+ log_init("sftp-server", SYSLOG_LEVEL_DEBUG3, SYSLOG_FACILITY_AUTH, 0);
+#endif
+
+#ifdef CHROOT
+ chroot_init();
+#endif
__progname = get_progname(av[0]);
handle_init();
-#ifdef DEBUG_SFTP_SERVER
- log_init("sftp-server", SYSLOG_LEVEL_DEBUG1, SYSLOG_FACILITY_AUTH, 0);
-#endif
-
in = dup(STDIN_FILENO);
out = dup(STDOUT_FILENO);
2002 Jun 07
2
SIGCHLD may be inherited blocked
..._prod.2(w)/sshd.c Fri, 07 Jun 2002 15:53:22 -0400
@@ -556,6 +556,11 @@
int startups = 0;
Key *key;
int ret, key_used = 0;
+ sigset_t curr_mask;
+
+ sigprocmask(0, NULL, &curr_mask);
+ sigdelset(¤t_mask, SIGCHLD);
+ sigprocmask(SIG_SETMASK, &curr_mask, NULL);
__progname = get_progname(av[0]);
init_rng();
-------------- next part --------------
Visit our website at http://www.ubswarburg.com
This message contains confidential information and is intended only
for the individual named. If you are not the named addressee you
should not disseminate, distribute or copy this e-ma...
2001 Jun 20
1
SFTP Logging Redux.
...g_len = GET_32BIT(cp);
if (msg_len > 256 * 1024) {
error("bad message ");
+ log("(%d/%d/%s) SFTP session closing (%s).", ppid, cuid, CUNAME, "Bad Message");
exit(11);
}
if (buffer_len(&iqueue) < msg_len + 4)
@@ -1036,10 +1075,27 @@
__progname = get_progname(av[0]);
handle_init();
+ /* Initialize the username of the user running the process. */
+ cuid = getuid();
+ if ((upw = getpwuid(cuid)) == NULL) {
+ cuname = NULL;
+ } else {
+ cuname = upw->pw_name;
+ }
+
+ /* Initialize the parent process ID. */
+ ppid = getppid();
+
+ /* Initialize the...
2002 Dec 18
2
patch for openssh3.5p1 - adds logging option
...led by the admin */
diff -urN openssh-3.5p1-orig/ssh-rand-helper.c openssh-3.5p1/ssh-rand-helper.c
--- openssh-3.5p1-orig/ssh-rand-helper.c 2002-12-18 10:10:13.000000000 -0500
+++ openssh-3.5p1/ssh-rand-helper.c 2002-12-18 10:44:28.000000000 -0500
@@ -768,7 +768,7 @@
LogLevel ll;
__progname = get_progname(argv[0]);
- log_init(argv[0], SYSLOG_LEVEL_INFO, SYSLOG_FACILITY_USER, 1);
+ log_init(argv[0], SYSLOG_LEVEL_INFO, SYSLOG_FACILITY_USER, 1, NULL);
ll = SYSLOG_LEVEL_INFO;
debug_level = output_hex = 0;
@@ -803,7 +803,7 @@
}
}
- log_init(argv[0], ll, SYSLOG_FACILITY_USER, 1);
+ log_init(a...
2002 Jul 13
0
[PATCH]: scp program improved
...ate_limit = 0;
#define CMDNEEDS 64
char cmd[CMDNEEDS]; /* must hold "rcp -r -p -d\0" */
@@ -223,7 +246,10 @@
char *targ;
extern char *optarg;
extern int optind;
-
+ int factor, i; /* For rate limit */
+ const char factors[] = "kMMGGG";
+ char *c;
+
__progname = get_progname(argv[0]);
args.list = NULL;
@@ -233,7 +259,7 @@
addargs(&args, "-oClearAllForwardings yes");
fflag = tflag = 0;
- while ((ch = getopt(argc, argv, "dfprtvBCc:i:P:q1246S:o:F:")) != -1)
+ while ((ch = getopt(argc, argv, "adfprtvBCc:i:P:q1246S:o:F:R:")) != -1)...
2002 Mar 15
4
PATCH: sftp-server logging.
...quot;bad message ");
+ #ifdef SFTP_LOGGING
+ log("(%d/%d/%s) SFTP session closing (%s).", ppid, cuid, CUNAME, "Bad Message");
+ #endif
exit(11);
}
if (buffer_len(&iqueue) < msg_len + 4)
***************
*** 1050,1055 ****
--- 1236,1260 ----
__progname = get_progname(av[0]);
handle_init();
+ #ifdef SFTP_LOGGING
+ /* Initialize the username of the user running the process. */
+ cuid = getuid();
+ if ((upw = getpwuid(cuid)) == NULL) {
+ cuname = NULL;
+ } else {
+ cuname = xstrdup(upw->pw_name);
+ }
+
+ /* Initialize the parent process ID. */...
2003 Aug 10
9
updated gssapi diff
this is the proposed gssapi diff against OpenSSH-current (non-portable).
note: if this goes in, the old krb5 auth (ssh.com compatible) will be
removed.
please comment.
jakob
Index: auth.h
===================================================================
RCS file: /home/hack/jakob/mycvs/sshgss/auth.h,v
retrieving revision 1.1.1.2
retrieving revision 1.3
diff -u -r1.1.1.2 -r1.3
--- auth.h