search for: md5_msg

Displaying 10 results from an estimated 10 matches for "md5_msg".

Did you mean: max_msg
2009 Nov 23
0
[PATCH] Bluetooth support.
...f test -z "$disable_bluetooth" ; then + AC_CHECK_HEADERS(bluetooth/bluetooth.h, + [ AC_CHECK_LIB(bluetooth, ba2str, + [ LIBS="$LIBS -lbluetooth" + AC_DEFINE(HAVE_BLUETOOTH) + BLUETOOTH_MSG="yes" + ]) + ] + ) +fi + # Check whether to enable MD5 passwords MD5_MSG="no" AC_ARG_WITH(md5-passwords, @@ -4231,6 +4252,7 @@ echo " S/KEY support echo " TCP Wrappers support: $TCPW_MSG" echo " MD5 password support: $MD5_MSG" echo " libedit support: $LIBEDIT_MSG&...
2001 Jan 03
1
chroot.diff
...# Check whether --with-shadow or --without-shadow was given. if test "${with_shadow+set}" = set; then @@ -7521,6 +7541,7 @@ echo " S/KEY support: $SKEY_MSG" echo " TCP Wrappers support: $TCPW_MSG" echo " MD5 password support: $MD5_MSG" +echo " Magic token chroot support: $CHROOT_MSG" echo " IP address in \$DISPLAY hack: $DISPLAY_HACK_MSG" echo " Use IPv4 by default hack: $IPV4_HACK_MSG" echo " Translate v4 in v6 hack: $IPV4_IN6_HACK_MSG" diff -u openssh-2.3.0p1/conf...
2002 May 17
0
[Bug 246] md5_crypt conflict fails
...=246 ------- Additional Comments From tim at multitalents.net 2002-05-18 03:12 ------- Perhaps you are getting confused by the "MD5 password support: no" line. configure is reporting that in error as pointed out by Kagan Kongar <kongar at tsrsb.org.tr> Try removing line 2026 (MD5_MSG="no") of configure.ac and run autoconf. If you don't have autoconf 2.52, grab the corrected configure from http://www.multitalents.net/openssh/configure-OpenSSH_3.2.2p1.gz or ftp://ftp.multitalents.net/pub/openssh/configure-OpenSSH_3.2.2p1.gz ------- You are receiving this mail be...
2001 Nov 04
2
OPIE patch for current CVS
...SCARD_MSG" echo " AFS support: $AFS_MSG" echo " S/KEY support: $SKEY_MSG" +echo " OPIE support: $OPIE_MSG" echo " TCP Wrappers support: $TCPW_MSG" echo " MD5 password support: $MD5_MSG" echo " IP address in \$DISPLAY hack: $DISPLAY_HACK_MSG" diff -x CVS -wNur ../cvs/other/openssh_cvs/readconf.c openssh_cvs/readconf.c --- ../cvs/other/openssh_cvs/readconf.c Wed Oct 3 19:39:39 2001 +++ openssh_cvs/readconf.c Sun Nov 4 01:44:19 2001 @@ -141,6 +141,7 @@ { "...
2001 Mar 13
0
[PATCH] openssh 2.5.1p2 TIS authserv support
...$KRB4_MSG" echo " AFS support: $AFS_MSG" echo " S/KEY support: $SKEY_MSG" +echo " TIS authsrv support: $TIS_MSG" echo " TCP Wrappers support: $TCPW_MSG" echo " MD5 password support: $MD5_MSG" echo " IP address in \$DISPLAY hack: $DISPLAY_HACK_MSG" diff -urN openssh-2.5.1p2/servconf.c openssh-2.5.1p2-tis/servconf.c --- openssh-2.5.1p2/servconf.c Thu Feb 15 04:08:27 2001 +++ openssh-2.5.1p2-tis/servconf.c Fri Mar 9 11:12:14 2001 @@ -206,6 +209,9 @@ #ifdef AFS sKerbe...
2001 Feb 13
1
configure.in reorder patch
...; - int deny_severity = 0, allow_severity = 0; - ], - [hosts_access(0);], - [ - AC_MSG_RESULT(yes) - AC_DEFINE(LIBWRAP) - TCPW_MSG="yes" - ], - [ - AC_MSG_ERROR([*** libwrap missing]) - ] - ) - fi - ] -) # Check whether to enable MD5 passwords MD5_MSG="no"
2000 Aug 27
0
patch for TIS (skey/opie) *and* passwd auth via PAM
...B4_MSG" echo " AFS support: $AFS_MSG" echo " S/KEY support: $SKEY_MSG" +echo " TIS via PAM support: $PAM_TIS_MSG" echo " TCP Wrappers support: $TCPW_MSG" echo " MD5 password support: $MD5_MSG" echo " IP address in \$DISPLAY hack: $DISPLAY_HACK_MSG" diff -urN -x *~ openssh-2.1.1p4/debian/rules openssh-2.1.1p4-hein/debian/rules --- openssh-2.1.1p4/debian/rules Sun Aug 27 15:42:21 2000 +++ openssh-2.1.1p4-hein/debian/rules Sun Aug 27 17:39:02 2000 @@ -14,8 +14,8 @@ build...
2000 Dec 07
1
[PATCH] tis authserv support
...$KRB4_MSG" echo " AFS support: $AFS_MSG" echo " S/KEY support: $SKEY_MSG" +echo " TIS authsrv support: $TIS_MSG" echo " TCP Wrappers support: $TCPW_MSG" echo " MD5 password support: $MD5_MSG" echo " IP address in \$DISPLAY hack: $DISPLAY_HACK_MSG" diff -urN openssh-2.3.0p1/readconf.c openssh-2.3.0p1-tis/readconf.c --- openssh-2.3.0p1/readconf.c Sat Oct 14 07:23:12 2000 +++ openssh-2.3.0p1-tis/readconf.c Thu Dec 7 18:38:42 2000 @@ -313,7 +313,7 @@ goto parse_flag;...
2000 Aug 26
0
New chroot patch, for 2.1.1p4
...c_compile) 2>&5; }; then rm -rf conftest* echo "$ac_t""yes" 1>&6 else @@ -6680,6 +6700,7 @@ echo " S/KEY support: $SKEY_MSG" echo " TCP Wrappers support: $TCPW_MSG" echo " MD5 password support: $MD5_MSG" +echo " Magic token chroot support: $CHROOT_MSG" echo " IP address in \$DISPLAY hack: $DISPLAY_HACK_MSG" echo " Use IPv4 by default hack: $IPV4_HACK_MSG" echo " Translate v4 in v6 hack: $IPV4_IN6_HACK_MSG" diff -u --new-file openssh-2...
2000 Oct 04
0
2.2.0p1 chroot patch
...c_compile) 2>&5; }; then rm -rf conftest* echo "$ac_t""yes" 1>&6 else @@ -6906,6 +6926,7 @@ echo " S/KEY support: $SKEY_MSG" echo " TCP Wrappers support: $TCPW_MSG" echo " MD5 password support: $MD5_MSG" +echo " Magic token chroot support: $CHROOT_MSG" echo " IP address in \$DISPLAY hack: $DISPLAY_HACK_MSG" echo " Use IPv4 by default hack: $IPV4_HACK_MSG" echo " Translate v4 in v6 hack: $IPV4_IN6_HACK_MSG" diff -u --new-file openssh-2...