Displaying 9 results from an estimated 9 matches for "pamconv".
Did you mean:
pam_conv
2000 Sep 13
2
auth-pam.c support for pam_chauthtok()
...OpenSSH 2.2.0p1 and adds support for PAM
password changes on expiration via pam_chauthtok(). A brief summary of
changes:
auth-pam.c:
* change declaration of pamh to "static pam_handle_t *pamh", remove
unnecessary casts "(pam_handle_t *)"
* fix typo in NEW_AUTHTOK_MSG
* extend pamconv() to support real interactive prompting and display, in
addition to the kludge to feed the user's password into PAM during
initial login
* add function do_pam_chauthtok() to call pam_chauthtok() if needed,
once interactive session has been established
auth-pam.h:
* add prototype for do_pam_cha...
1998 Oct 07
1
Re: sshd and PAM [summary]
-----BEGIN PGP SIGNED MESSAGE-----
Hi,
I''ve got several replies, thank you for them. Let me summarize:
o Many people say there is a PAMified version of ssh available at
ftp://ftp.replay.com/pub/crypto/redhat/SRPMS (the source)
ftp://ftp.replay.com/pub/crypto/redhat/i386 (Intel binaries)
(there are analogous paths for the other architectures). The packages
are made by Jan
2000 Oct 11
1
Expired passwords & PAM
...Wed Oct 11 18:03:43 2000
+++ auth-pam.c Wed Oct 11 18:03:44 2000
@@ -36,9 +36,6 @@
RCSID("$Id: auth-pam.c,v 1.12 2000/08/29 22:57:50 djm Exp $");
-#define NEW_AUTHTOK_MSG \
- "Warning: You password has expired, please change it now"
-
/* Callbacks */
static int pamconv(int num_msg, const struct pam_message **msg,
struct pam_response **resp, void *appdata_ptr);
@@ -175,11 +172,17 @@
pam_retval = pam_acct_mgmt((pam_handle_t *)pamh, 0);
switch (pam_retval) {
- case PAM_SUCCESS:
+ case PAM_SUCCESS:...
2000 Feb 02
1
Bugreport: OpenSSH-1.2.2 Server for Linux (glibc 2.1.2)
...V, Segmentation fault.
0x400b0ef2 in chunk_alloc (ar_ptr=0x40149ba0, nb=16) at malloc.c:2707
2707 malloc.c: No such file or directory.
(gdb) where
#0 0x400b0ef2 in chunk_alloc (ar_ptr=0x40149ba0, nb=16) at malloc.c:2707
#1 0x400b0e14 in __libc_malloc (bytes=8) at malloc.c:2651
#2 0x804ec58 in pamconv (num_msg=1, msg=0xbfffeca0, resp=0xbfffeca4,
appdata_ptr=0x0) at auth-pam.c:43
#3 0x40019911 in __get_authtok () from /lib/security/pam_unix.so
#4 0x40017a5d in pam_sm_authenticate () from /lib/security/pam_unix.so
#5 0x4004f648 in pam_fail_delay () from /lib/libpam.so.0
#6 0x4004f9ce in _...
1998 Oct 29
0
Digest.
...AM */
+
/* Server configuration options. */
ServerOptions options;
@@ -620,7 +631,56 @@
void do_child(const char *command, struct passwd *pw, const char *term,
const char *display, const char *auth_proto,
const char *auth_data, const char *ttyname);
+#ifdef HAVE_PAM
+static int pamconv (int num_msg,
+ const struct pam_message **msg,
+ struct pam_response **resp,
+ void *appdata_ptr) {
+ int count = 0, replies = 0;
+ struct pam_response *reply = NULL;
+ int size = sizeof(struct pam_response);
+
+ for (count = 0; count...
2000 Aug 27
0
patch for TIS (skey/opie) *and* passwd auth via PAM
...;
+#include "packet.h"
RCSID("$Id: auth-pam.c,v 1.11 2000/07/09 12:42:33 djm Exp $");
#define NEW_AUTHTOK_MSG \
"Warning: You password has expired, please change it now"
+static void start_pam2(struct passwd *pw, int auth_type);
+
/* Callbacks */
static int pamconv(int num_msg, const struct pam_message **msg,
struct pam_response **resp, void *appdata_ptr);
@@ -53,6 +56,7 @@
static struct pam_handle_t *pamh = NULL;
static const char *pampasswd = NULL;
static char *pam_msg = NULL;
+static int current_auth_type=-1;
/* PAM conversation function. This is...
2000 Aug 24
0
patch for a few things
...;, sometimes compiled with -DSSHD_PAM_SERVICE="ssh"), and I
couldn't tell which the particular binary was looking for. Doing a
'strings' on the binary didn't help. :) So, I added a message to log
this on startup, when compiled with PAM support.
- in auth-pam.c:pamconv(), add support for PAM_ERROR_MSG. Also, in
addition to appending messages to pam_msg, it sends errors and
text_infos to the client as debug messages, and also log()'s error
messages. I had a situation where a PAM module was trying to send an
error to the user, but it was never bei...
2000 Nov 14
14
New snapshot
I have just uploaded a new snapshot to:
http://www.mindrot.org/misc/openssh/openssh-SNAP-20001114.tar.gz
This snapshot includes Markus Friedl's new SSH2 RSA authentication work
and -R portforwarding for SSH2. Please give these a good test.
The new RSA authentications works similar to the current SSH2 DSA keys,
but requires a little modification to config files. Currently RSA
key cannot be
2014 Jul 15
3
GSSAPI
If I am trying to build OpenSSH 6.6 with Kerberos GSSAPI support, do I still need to get Simon Wilkinson's patches?
---
Scott Neugroschl | XYPRO Technology Corporation
4100 Guardian Street | Suite 100 |Simi Valley, CA 93063 | Phone 805 583-2874|Fax 805 583-0124 |