Displaying 14 results from an estimated 14 matches for "have_secureware".
2003 Sep 08
2
Variable declarations in xcrypt.c
...W)
- struct passwd_adjunct *spw;
- if (issecure() && (spw = getpwanam(pw->pw_name)) != NULL)
- pw_password = spw->pwa_passwd;
+ if (issecure()) {
+ struct passwd_adjunct *spw;
+
+ if (spw = getpwanam(pw->pw_name) != NULL)
+ pw_password = spw->pwa_passwd;
+ }
# elif defined(HAVE_SECUREWARE)
- struct pr_passwd *spw = getprpwnam(pw->pw_name);
+ if (spw != NULL) {
+ struct pr_passwd *spw = getprpwnam(pw->pw_name);
- if (spw != NULL)
pw_password = spw->ufld.fd_encrypt;
+ }
# elif defined(__hpux) && !defined(HAVE_SECUREWARE)
- struct pr_passwd *spw;
- if (is...
2002 Jun 24
1
remove --with-rsh
...h_path="/usr/bin/rcmd"
RANLIB=true
no_dev_ptmx=1
AC_DEFINE(BROKEN_SYS_TERMIO_H)
@@ -264,7 +263,6 @@
LDFLAGS="$LDFLAGS -L/usr/local/lib"
LIBS="$LIBS -lprot -lx -ltinfo -lm"
no_dev_ptmx=1
- rsh_path="/usr/bin/rcmd"
AC_DEFINE(USE_PIPES)
AC_DEFINE(HAVE_SECUREWARE)
AC_DEFINE(DISABLE_SHADOW)
@@ -1790,17 +1788,6 @@
LIBS="$LIBS $KLIBS $K5LIBS"
# Looking for programs, paths and files
-AC_ARG_WITH(rsh,
- [ --with-rsh=PATH Specify path to remote shell program ],
- [
- if test "x$withval" != "$no" ; then
- rsh_path=$w...
2009 Jan 03
0
any HP-UX 10.26 out there?
...is
......
--- openssh/openbsd-compat/xcrypt.c.old 2007-03-26 08:42:45.624801002 -0700
+++ openssh/openbsd-compat/xcrypt.c 2008-12-29 17:30:51.460000000 -0800
@@ -28,7 +28,7 @@
#include <unistd.h>
#include <pwd.h>
-# ifdef HAVE_CRYPT_H
+# if defined(HAVE_CRYPT_H) && !defined(HAVE_SECUREWARE)
# include <crypt.h>
# endif
......
I looked through my collection of surveys and don't see any sent in for
HP-UX 10.26 to see if they even define HAVE_CRYPT_H
Thanks.
--
Tim Rice Multitalents (707) 887-1469
tim at multitalents.net
2003 Apr 02
0
[Bug 529] sshd doesn't work correctly after SIGHUP
...ssh-openbsd-2003032600/sshd.c openssh-3.6p1/sshd.c
--- ssh-openbsd-2003032600/sshd.c 2003-03-26 16:04:08.000000000 +1100
+++ openssh-3.6p1/sshd.c 2003-03-10 11:38:10.000000000 +1100
@@ -804,8 +821,23 @@
Key *key;
int ret, key_used = 0;
- /* Save argv. */
+#ifdef HAVE_SECUREWARE
+ (void)set_auth_parameters(ac, av);
+#endif
+ __progname = get_progname(av[0]);
+ init_rng();
+
+ /* Save argv. Duplicate so setproctitle emulation doesn't clobber it */
+ saved_argc = ac;
saved_argv = av;
+ saved_argv = xmalloc(sizeof(*saved_argv) *...
2004 Sep 17
2
patch: openssh 3.9p1 on hp-ux 10.20
OpenSSH 3.9p1 does not compile on HP-UX 10.20 due to the code which was
added in includes.h to work around HP-UX 11.11's behavior. The following
patch lets it work on HP-UX 10.20. It should also work on HP-UX 11.11,
but I can't test that (no HP-UX 11 boxes here).
It uses code from http://www.faqs.org/faqs/hp/hpux-faq/section-213.html .
The copyright at
2002 Jul 30
0
patch: disable credential forwarding after password auth.
...t;style, "auth-ssh",
- (char *)password) == 0)
- return 0;
- else
- return 1;
+ (char *)password) == 0) {
+ retval=0 ; goto out;
+ } else {
+ retval=1 ; goto out;
+ }
#endif
pw_password = pw->pw_passwd;
@@ -189,8 +203,9 @@
#endif /* defined(__hpux) && !defined(HAVE_SECUREWARE) */
/* Check for users with no password. */
- if ((password[0] == '\0') && (pw_password[0] == '\0'))
- return 1;
+ if ((password[0] == '\0') && (pw_password[0] == '\0')) {
+ retval=1 ; goto out;
+ }
if (pw_password[0] != '\0')
sal...
2004 Jun 30
3
OpenSSL ENIGNE support for OpenSSH
Hi all,
attached is a patch that enables using hardware crypto accelerators
available through OpenSSL library for SSH operations. Especially in
ssh/sshd it can bring a significant speed improvement. OTOH if no crypto
engine is available, nothing bad happens and default software crypto
routines are used.
This patch is used in SUSE Linux OpenSSH package and proved to work (at
least it didn't
2006 Jul 17
2
SMF/process contracts in Solaris 10
I've searched the archive for this mailing list and the bug list for
OpenSSH for this, and I'm finding nothing. I'd appreciate it if
somoene could point me to an existing thread about this. (I know that
other people are aware of the problem, though, so I'm a bit surprised
to find nothing.)
We're running OpenSSH under Solaris 10 using SMF instead of a legacy
init script. SMF
2003 Dec 30
8
[Bug 651] SCO 3.2v4.2 and OpenSSH 3.7.1p1 --> connection hangs and does not close (ssh2 only)
http://bugzilla.mindrot.org/show_bug.cgi?id=651
------- Additional Comments From vikashb at comparexafrica.co.za 2003-12-30 16:39 -------
tried openssh-SNAP-20031223
does not compile:
(cd openbsd-compat && make)
gcc -g -O2 -Wall -Wpointer-arith -Wno-uninitialized -I. -I.. -I. -I./..
-I/usr/local/ssl/include -Dftruncate=chsize -I/usr/local/include
-DHAVE_CONFIG_H -c
2005 Sep 19
1
ssh hangs or gives Segmentation fault
...(SuSE Linux)"
config.h:
#define _CONFIG_H
/* #undef SETEUID_BREAKS_SETUID */
/* #undef BROKEN_SETREUID */
/* #undef BROKEN_SETREGID */
/* #undef BROKEN_SETRESUID */
/* #undef BROKEN_SETRESGID */
#define SPT_TYPE SPT_REUSEARGV
/* #undef SPT_PADCHAR */
/* #undef BROKEN_SYS_TERMIO_H */
/* #undef HAVE_SECUREWARE */
#define LOGIN_PROGRAM_FALLBACK "/bin/login"
#define _PATH_PASSWD_PROG "/usr/bin/passwd"
/* #undef HAVE_PW_CLASS_IN_PASSWD */
/* #undef HAVE_PW_EXPIRE_IN_PASSWD */
/* #undef HAVE_PW_CHANGE_IN_PASSWD */
/* #undef HAVE_ACCRIGHTS_IN_MSGHDR */
#define HAVE_CONTROL_IN_MSGHDR 1
/* #...
2003 Sep 24
12
SSHD 3.7.1p2 on HP-UX
I have used SSHD from openssh-3.7.1p1 on HP-UX 11:11. It works
correctly and the entry in the logfile is:
Sep 24 07:01:20 garm sshd[6625]: Accepted password for japs from
192.38.97.131 port 2463
Next I have upgraded to openssh-3.7.1p2 and restarted SSHD. It does not
accept the password any more and the entries in the logfile are:
Sep 24 12:21:38 garm sshd[19542]: User japs not allowed because
2003 Sep 02
12
[Bug 633] Password authentication fails in HP-UX trusted mode due to DISABLE_SHADOW
http://bugzilla.mindrot.org/show_bug.cgi?id=633
Summary: Password authentication fails in HP-UX trusted mode due
to DISABLE_SHADOW
Product: Portable OpenSSH
Version: -current
Platform: HPPA
OS/Version: HP-UX
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo:
2006 Mar 29
7
sshd config parser
Hi All.
For various reasons, we're currently looking at extending (or even
overhauling) the config parser used for sshd_config.
Right now the syntax I'm looking at is a cumulative "Match" keyword that
matches when all of the specified criteria are met. This would be
similar the the Host directive used in ssh_config, although it's still
limiting (eg you can't easily
2008 Apr 21
3
FIPS 140-2 OpenSSL(2007) patches
Hi,
I am happy to (re)send a set of patches for compiling OpenSSH 4.7p1 with
FIPS 140-2 OpenSSL.
These are based on previously reported patches by Steve Marquess
<marquess at ieee.org> and Ben Laurie <ben at algroup.co.uk>,
for ver. OpenSSH 3.8.
Note that these patches are NOT OFFICIAL, and MAY be used freely by
anyone.
Issues [partially] handled:
SSL FIPS Self test.
RC4,