Displaying 8 results from an estimated 8 matches for "irix_setusercontext".
2002 Feb 15
1
IRIX cleanup.
...PROJECT) || defined(WITH_IRIX_JOBS) || defined(WITH_IRIX_ARRAY)
+
+#ifdef WITH_IRIX_PROJECT
+#include <proj.h>
+#endif /* WITH_IRIX_PROJECT */
+#ifdef WITH_IRIX_JOBS
+#include <sys/resource.h>
+#endif
+#ifdef WITH_IRIX_AUDIT
+#include <sat.h>
+#endif /* WITH_IRIX_AUDIT */
+
+void
+irix_setusercontext(struct passwd *pw)
+{
+#ifdef WITH_IRIX_PROJECT
+ prid_t projid;
+#endif /* WITH_IRIX_PROJECT */
+#ifdef WITH_IRIX_JOBS
+ jid_t jid = 0;
+#else
+# ifdef WITH_IRIX_ARRAY
+ int jid = 0;
+# endif /* WITH_IRIX_ARRAY */
+#endif /* WITH_IRIX_JOBS */
+
+#ifdef WITH_IRIX_JOBS
+...
2002 Apr 26
0
[Bug 228] New: pam_krb5 on Solaris creates credentials with wrong owner
...ed call to after the UID setting.
*** session.c-ORG Mon Feb 25 16:48:03 2002
--- session.c Mon Apr 22 03:48:01 2002
***************
*** 1135,1140 ****
--- 1135,1145 ----
exit(1);
}
endgrent();
+ # if defined(WITH_IRIX_PROJECT) || defined(WITH_IRIX_JOBS) || defined(WITH_IRIX_ARRAY)
+ irix_setusercontext(pw);
+ # endif /* defined(WITH_IRIX_PROJECT) || defined(WITH_IRIX_JOBS) || defined(WITH_IRIX_ARRAY) */
+ /* Permanently switch to the desired uid. */
+ permanently_set_uid(pw);
# ifdef USE_PAM
/*
* PAM credentials may take the form of supplementary groups.
***************
*** 1143,...
2002 Dec 21
6
[PATCH] PAM chauthtok + Privsep
...setcred(0);
+
+ /*
+ * We need to open the session here because PAM on HP-UX does not
+ * work after the call to permanently_set_uid.
+ */
+ do_pam_session(pw->pw_name,NULL);
# endif /* USE_PAM */
# if defined(WITH_IRIX_PROJECT) || defined(WITH_IRIX_JOBS) || defined(WITH_IRIX_ARRAY)
irix_setusercontext(pw);
2002 Jun 25
1
PrivSep and AIX 4.3.2
With 3.3p1 built on AIX 4.3.2:
$ ssh [blah]
Couldn't set usrinfo: Not owner
debug1: Calling cleanup 0x20019080(0x200219a0)
debug3: mm_request_send entering: type 27
debug1: Calling cleanup 0x20018dd4(0x0)
Connection to songohan closed by remote host.
Connection to songohan closed.
Output from sshd -d -d -d:
...
debug3: tty_parse_modes: 92 0
debug3: tty_parse_modes: 93 0
2005 May 12
0
[PATCH] Trusted IRIX Support
...ifdef WITH_IRIX_AUDIT
# include <sat.h>
#endif /* WITH_IRIX_AUDIT */
+ #ifdef WITH_IRIX_CAP
+ # include <sys/capability.h>
+ #endif /* WITH_IRIX_CAP */
+ #ifdef WITH_IRIX_MAC
+ # include <sys/mac.h>
+ # include <sys/mac_label.h>
+ #endif /* WITH_IRIX_MAC */
void
irix_setusercontext(struct passwd *pw)
***************
*** 84,86 ****
--- 92,144 ----
#endif /* defined(WITH_IRIX_PROJECT) || defined(WITH_IRIX_JOBS) ||
defined(WITH_IRIX_ARRAY) */
+
+ #ifdef WITH_IRIX_CAP
+ void
+ irix_set_cap(const char * cap_string)
+ {
+ cap_t running_cap;
+ if(cap_string ==...
2002 Oct 21
0
[Bug 419] New: HP-UX PAM problems with 3.5p1
...tcred(0);
+
+ /*
+ * We need to open the session here because PAM on HP-UX does not
+ * work after the call to permanently_set_uid.
+ */
+ do_pam_session(pw->pw_name,NULL);
+
# endif /* USE_PAM */
# if defined(WITH_IRIX_PROJECT) || defined(WITH_IRIX_JOBS) ||
defined(WITH_IRIX_ARRAY)
irix_setusercontext(pw);
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2002 Jul 16
2
HP-UX PAM with Trusted System patch
...tcred(0);
+
+ /*
+ * We need to open the session here because PAM on HP-UX does not
+ * work after the call to permanently_set_uid.
+ */
+ do_pam_session(pw->pw_name,NULL);
+
# endif /* USE_PAM */
# if defined(WITH_IRIX_PROJECT) || defined(WITH_IRIX_JOBS) || defined(WITH_IRIX_ARRAY)
irix_setusercontext(pw);
Only in openssh-3.4p1-dw: session.c.orig
2002 Dec 10
5
[PATCH] Password expiry with Privsep and PAM
...setcred(0);
+
+ /*
+ * We need to open the session here because PAM on HP-UX does not
+ * work after the call to permanently_set_uid.
+ */
+ do_pam_session(pw->pw_name,NULL);
# endif /* USE_PAM */
# if defined(WITH_IRIX_PROJECT) || defined(WITH_IRIX_JOBS) || defined(WITH_IRIX_ARRAY)
irix_setusercontext(pw);
Index: openbsd-compat/readpassphrase.c
===================================================================
RCS file: /cvs/openssh/openbsd-compat/readpassphrase.c,v
retrieving revision 1.9
diff -u -u -r1.9 readpassphrase.c
--- openbsd-compat/readpassphrase.c 11 Sep 2002 00:29:13 -0000 1.9
+++ o...