Displaying 10 results from an estimated 10 matches for "md5_msg".
Did you mean:
max_msg
2009 Nov 23
0
[PATCH] Bluetooth support.
...f test -z "$disable_bluetooth" ; then
+ AC_CHECK_HEADERS(bluetooth/bluetooth.h,
+ [ AC_CHECK_LIB(bluetooth, ba2str,
+ [ LIBS="$LIBS -lbluetooth"
+ AC_DEFINE(HAVE_BLUETOOTH)
+ BLUETOOTH_MSG="yes"
+ ])
+ ]
+ )
+fi
+
# Check whether to enable MD5 passwords
MD5_MSG="no"
AC_ARG_WITH(md5-passwords,
@@ -4231,6 +4252,7 @@ echo " S/KEY support
echo " TCP Wrappers support: $TCPW_MSG"
echo " MD5 password support: $MD5_MSG"
echo " libedit support: $LIBEDIT_MSG&...
2001 Jan 03
1
chroot.diff
...# Check whether --with-shadow or --without-shadow was given.
if test "${with_shadow+set}" = set; then
@@ -7521,6 +7541,7 @@
echo " S/KEY support: $SKEY_MSG"
echo " TCP Wrappers support: $TCPW_MSG"
echo " MD5 password support: $MD5_MSG"
+echo " Magic token chroot support: $CHROOT_MSG"
echo " IP address in \$DISPLAY hack: $DISPLAY_HACK_MSG"
echo " Use IPv4 by default hack: $IPV4_HACK_MSG"
echo " Translate v4 in v6 hack: $IPV4_IN6_HACK_MSG"
diff -u openssh-2.3.0p1/conf...
2002 May 17
0
[Bug 246] md5_crypt conflict fails
...=246
------- Additional Comments From tim at multitalents.net 2002-05-18 03:12 -------
Perhaps you are getting confused by the "MD5 password support: no" line.
configure is reporting that in error as pointed out by
Kagan Kongar <kongar at tsrsb.org.tr>
Try removing line 2026 (MD5_MSG="no") of configure.ac and run autoconf.
If you don't have autoconf 2.52, grab the corrected configure from
http://www.multitalents.net/openssh/configure-OpenSSH_3.2.2p1.gz or
ftp://ftp.multitalents.net/pub/openssh/configure-OpenSSH_3.2.2p1.gz
------- You are receiving this mail be...
2001 Nov 04
2
OPIE patch for current CVS
...SCARD_MSG"
echo " AFS support: $AFS_MSG"
echo " S/KEY support: $SKEY_MSG"
+echo " OPIE support: $OPIE_MSG"
echo " TCP Wrappers support: $TCPW_MSG"
echo " MD5 password support: $MD5_MSG"
echo " IP address in \$DISPLAY hack: $DISPLAY_HACK_MSG"
diff -x CVS -wNur ../cvs/other/openssh_cvs/readconf.c openssh_cvs/readconf.c
--- ../cvs/other/openssh_cvs/readconf.c Wed Oct 3 19:39:39 2001
+++ openssh_cvs/readconf.c Sun Nov 4 01:44:19 2001
@@ -141,6 +141,7 @@
{ "...
2001 Mar 13
0
[PATCH] openssh 2.5.1p2 TIS authserv support
...$KRB4_MSG"
echo " AFS support: $AFS_MSG"
echo " S/KEY support: $SKEY_MSG"
+echo " TIS authsrv support: $TIS_MSG"
echo " TCP Wrappers support: $TCPW_MSG"
echo " MD5 password support: $MD5_MSG"
echo " IP address in \$DISPLAY hack: $DISPLAY_HACK_MSG"
diff -urN openssh-2.5.1p2/servconf.c openssh-2.5.1p2-tis/servconf.c
--- openssh-2.5.1p2/servconf.c Thu Feb 15 04:08:27 2001
+++ openssh-2.5.1p2-tis/servconf.c Fri Mar 9 11:12:14 2001
@@ -206,6 +209,9 @@
#ifdef AFS
sKerbe...
2001 Feb 13
1
configure.in reorder patch
...;
- int deny_severity = 0, allow_severity = 0;
- ],
- [hosts_access(0);],
- [
- AC_MSG_RESULT(yes)
- AC_DEFINE(LIBWRAP)
- TCPW_MSG="yes"
- ],
- [
- AC_MSG_ERROR([*** libwrap missing])
- ]
- )
- fi
- ]
-)
# Check whether to enable MD5 passwords
MD5_MSG="no"
2000 Aug 27
0
patch for TIS (skey/opie) *and* passwd auth via PAM
...B4_MSG"
echo " AFS support: $AFS_MSG"
echo " S/KEY support: $SKEY_MSG"
+echo " TIS via PAM support: $PAM_TIS_MSG"
echo " TCP Wrappers support: $TCPW_MSG"
echo " MD5 password support: $MD5_MSG"
echo " IP address in \$DISPLAY hack: $DISPLAY_HACK_MSG"
diff -urN -x *~ openssh-2.1.1p4/debian/rules openssh-2.1.1p4-hein/debian/rules
--- openssh-2.1.1p4/debian/rules Sun Aug 27 15:42:21 2000
+++ openssh-2.1.1p4-hein/debian/rules Sun Aug 27 17:39:02 2000
@@ -14,8 +14,8 @@
build...
2000 Dec 07
1
[PATCH] tis authserv support
...$KRB4_MSG"
echo " AFS support: $AFS_MSG"
echo " S/KEY support: $SKEY_MSG"
+echo " TIS authsrv support: $TIS_MSG"
echo " TCP Wrappers support: $TCPW_MSG"
echo " MD5 password support: $MD5_MSG"
echo " IP address in \$DISPLAY hack: $DISPLAY_HACK_MSG"
diff -urN openssh-2.3.0p1/readconf.c openssh-2.3.0p1-tis/readconf.c
--- openssh-2.3.0p1/readconf.c Sat Oct 14 07:23:12 2000
+++ openssh-2.3.0p1-tis/readconf.c Thu Dec 7 18:38:42 2000
@@ -313,7 +313,7 @@
goto parse_flag;...
2000 Aug 26
0
New chroot patch, for 2.1.1p4
...c_compile) 2>&5; }; then
rm -rf conftest*
echo "$ac_t""yes" 1>&6
else
@@ -6680,6 +6700,7 @@
echo " S/KEY support: $SKEY_MSG"
echo " TCP Wrappers support: $TCPW_MSG"
echo " MD5 password support: $MD5_MSG"
+echo " Magic token chroot support: $CHROOT_MSG"
echo " IP address in \$DISPLAY hack: $DISPLAY_HACK_MSG"
echo " Use IPv4 by default hack: $IPV4_HACK_MSG"
echo " Translate v4 in v6 hack: $IPV4_IN6_HACK_MSG"
diff -u --new-file openssh-2...
2000 Oct 04
0
2.2.0p1 chroot patch
...c_compile) 2>&5; }; then
rm -rf conftest*
echo "$ac_t""yes" 1>&6
else
@@ -6906,6 +6926,7 @@
echo " S/KEY support: $SKEY_MSG"
echo " TCP Wrappers support: $TCPW_MSG"
echo " MD5 password support: $MD5_MSG"
+echo " Magic token chroot support: $CHROOT_MSG"
echo " IP address in \$DISPLAY hack: $DISPLAY_HACK_MSG"
echo " Use IPv4 by default hack: $IPV4_HACK_MSG"
echo " Translate v4 in v6 hack: $IPV4_IN6_HACK_MSG"
diff -u --new-file openssh-2...