search for: pw_class

Displaying 20 results from an estimated 23 matches for "pw_class".

2000 Oct 07
0
OpenSSH changes for BSD/OS
...user); if (!pw || !allowed_user(pw)) do_fake_authloop1(user); *************** *** 482,487 **** --- 500,508 ---- pwcopy.pw_gid = pw->pw_gid; pwcopy.pw_dir = xstrdup(pw->pw_dir); pwcopy.pw_shell = xstrdup(pw->pw_shell); + #if defined(BSD) && BSD >= 199506 + pwcopy.pw_class = xstrdup(pw->pw_class); + #endif pw = &pwcopy; #ifdef USE_PAM *************** *** 508,514 **** (sia_validate_user(NULL, saved_argc, saved_argv, get_canonical_hostname(), pw->pw_name, NULL, 0, NULL, "") == SIASUCCESS)) { ! #else /* !HAVE_OSF_SIA &a...
2001 Feb 28
2
[PATCH]: auth.c (pwcopy): Copy pw_gecos field when build for Cygwin
...tch: Index: auth.c =================================================================== RCS file: /cvs/openssh_cvs/auth.c,v retrieving revision 1.23 diff -u -p -r1.23 auth.c --- auth.c 2001/02/15 03:08:27 1.23 +++ auth.c 2001/02/28 15:47:23 @@ -182,6 +182,9 @@ pwcopy(struct passwd *pw) #ifdef HAVE_PW_CLASS_IN_PASSWD copy->pw_class = xstrdup(pw->pw_class); #endif +#ifdef HAVE_CYGWIN + copy->pw_gecos = xstrdup(pw->pw_gecos); +#endif copy->pw_dir = xstrdup(pw->pw_dir); copy->pw_shell = xstrdup(pw->pw_shell); return copy; Thanks in advance, Corinna -- Corinna Vinschen...
2001 Jun 21
1
pw_expire/pw_change in current portable openssh CVS bombs
...t;pw_name = xstrdup(pw->pw_name); copy->pw_passwd = xstrdup(pw->pw_passwd); copy->pw_gecos = xstrdup(pw->pw_gecos); - copy->pw_uid = pw->pw_uid; - copy->pw_gid = pw->pw_gid; - copy->pw_expire = pw->pw_expire; - copy->pw_change = pw->pw_change; #ifdef HAVE_PW_CLASS_IN_PASSWD copy->pw_class = xstrdup(pw->pw_class); #endif
2001 Jun 22
1
PATCH: pidfile/sigterm race
If one is using the pidfile as an indicator of sshd's status, it is possible to kill sshd before the sigterm handler gets installed, since the pidfile is written out before the signal handlers are setup. The solution is to simply write the pidfile after the signal handlers are setup. Here's the patch. Rob --- sshd.c.orig Fri Jun 22 11:16:41 2001 +++ sshd.c Fri Jun 22 11:18:32 2001 @@
2003 Dec 14
1
fakepw auth.c question
...{ static struct passwd fake; memset(&fake, 0, sizeof(fake)); fake.pw_name = "NOUSER"; fake.pw_passwd = "$2a$06$r3.juUaHZDlIbQaO2dS9FuYxL1W9M81R1Tc92PoSNmzvpEqLkLGrK"; fake.pw_gecos = "NOUSER"; fake.pw_uid = -1; fake.pw_gid = -1; fake.pw_class = ""; fake.pw_dir = "/nonexist"; fake.pw_shell = "/nonexist"; return (&fake); } Default branch: MAIN _________________________________________________________________ Revision [1]1.51 / ([2]download) - [3]annotate - [4][select for diffs]...
2002 Mar 20
1
privsep
i think our strategy for privsep is to just keep portable sync'd closely with openbsd's tree, even though things will be broken wrt privsep for many platforms. then we just get primary one's working and work out issues as we go along. i'll start to work on sun and hp-ux again tomorrow.
2002 Jun 25
0
[Bug 298] New: sshd fails to set user context, preventing all logins, also setgroups is failing
...do_setusercontext (pw=0x813c000) at session.c:1164 1164 if (setusercontext(lc, pw, pw->pw_uid, (gdb) print lc $1 = (login_cap_t *) 0x0 (gdb) print *pw $2 = {pw_name = 0x8141000 "sshd", pw_passwd = 0x8141005 "", pw_uid = 10658, pw_gid = 1010, pw_change = 0, pw_class = 0x8141007 "", pw_gecos = 0x8141008 "SSH,,,", pw_dir = 0x814100f "/var/empty", pw_shell = 0x814101a "nologin", pw_expire = 0} Setting "Compression no" has no effect Setting "UsePrivilegeSeparation no" has no effect Tried several vers...
2003 Jul 09
0
[PATCH] Add expired password handling for AIX.
...1.158 diff -u -r1.158 acconfig.h --- acconfig.h 8 Jul 2003 10:52:13 -0000 1.158 +++ acconfig.h 8 Jul 2003 13:19:33 -0000 @@ -53,6 +53,9 @@ /* from environment and PATH */ #undef LOGIN_PROGRAM_FALLBACK +/* Path to passwd program */ +#undef PASSWD_PROGRAM_PATH + /* Define if your password has a pw_class field */ #undef HAVE_PW_CLASS_IN_PASSWD Index: auth-passwd.c =================================================================== RCS file: /usr/local/src/security/openssh/cvs/openssh_cvs/auth-passwd.c,v retrieving revision 1.56 diff -u -r1.56 auth-passwd.c --- auth-passwd.c 8 Jul 2003 12:59:59 -...
2003 Jul 30
1
[PATCH] Password expiry merge (AIX parts)
....159 diff -u -r1.159 acconfig.h --- acconfig.h 14 Jul 2003 06:21:44 -0000 1.159 +++ acconfig.h 16 Jul 2003 04:42:22 -0000 @@ -53,6 +53,9 @@ /* from environment and PATH */ #undef LOGIN_PROGRAM_FALLBACK +/* Path to passwd program */ +#undef PASSWD_PROGRAM_PATH + /* Define if your password has a pw_class field */ #undef HAVE_PW_CLASS_IN_PASSWD Index: auth-passwd.c =================================================================== RCS file: /usr/local/src/security/openssh/cvs/openssh_cvs/auth-passwd.c,v retrieving revision 1.57 diff -u -r1.57 auth-passwd.c --- auth-passwd.c 24 Jul 2003 06:52:13...
2000 Feb 27
0
[PATCH] Fix login.conf, expiration, BSD compatibility in OpenSSH
...OGIN_CAP */ /* Set login name in the kernel. */ if (setlogin(pw->pw_name) < 0) error("setlogin failed: %s", strerror(errno)); @@ -2405,12 +2490,42 @@ switch, so we let login(1) to this for us. */ if (!options.use_login) { #ifdef LOGIN_CAP - if (setclasscontext(pw->pw_class, LOGIN_SETPRIORITY | - LOGIN_SETRESOURCES | LOGIN_SETUMASK) == -1) { - perror("setclasscontext"); - exit(1); - } -#endif /* LOGIN_CAP */ + char **tmpenv; + + /* Initialize temp environment */ + envsize = 64; + env = xmalloc(envsize * sizeof(char *)); + env[0] = NULL; + + c...
2002 Nov 20
0
[PATCH #9] Password expiration via /bin/passwd.
....145 diff -u -r1.145 acconfig.h --- acconfig.h 26 Sep 2002 00:38:48 -0000 1.145 +++ acconfig.h 20 Nov 2002 13:12:12 -0000 @@ -25,6 +25,9 @@ /* from environment and PATH */ #undef LOGIN_PROGRAM_FALLBACK +/* Path to passwd program */ +#undef PASSWD_PROGRAM_PATH + /* Define if your password has a pw_class field */ #undef HAVE_PW_CLASS_IN_PASSWD Index: auth-pam.c =================================================================== RCS file: /cvs/openssh/auth-pam.c,v retrieving revision 1.54 diff -u -r1.54 auth-pam.c --- auth-pam.c 28 Jul 2002 20:24:08 -0000 1.54 +++ auth-pam.c 20 Nov 2002 13:12:12...
2001 Oct 26
2
problems building on solaris 2.6
...t_time field in utmp.h... yes checking for ut_time field in utmpx.h... yes checking for ut_tv field in utmpx.h... yes checking for struct stat.st_blksize... yes checking for ss_family field in struct sockaddr_storage... no checking for __ss_family field in struct sockaddr_storage... no checking for pw_class field in struct passwd... no checking for pw_expire field in struct passwd... no checking for pw_change field in struct passwd... no checking if libc defines __progname... no checking whether getopt has optreset support... no checking if libc defines sys_errlist... yes checking if libc defines sys_...
2001 May 15
0
openssh 2.9p1 on Solaris 2.6 with AFS
...n utmpx.h... yes checking for ut_tv field in utmpx.h... yes checking for st_blksize in struct stat... yes checking for sun_len field in struct sockaddr_un... no checking for ss_family field in struct sockaddr_storage... no checking for __ss_family field in struct sockaddr_storage... no checking for pw_class field in struct passwd... no checking if libc defines __progname... no checking if libc defines sys_errlist... yes checking if libc defines sys_nerr... yes checking for krb.h... yes checking for main in -lkrb... yes checking for des_cbc_encrypt in -ldes... theyes checking for dn_expand in -lresolv...
2001 Jul 16
0
No subject
...ily = 1; -------------------------^ configure: failed program was: #line 6421 "configure" #include "confdefs.h" #include <sys/types.h> #include <sys/socket.h> int main() { struct sockaddr_storage s; s.__ss_family = 1; ; return 0; } configure:6454: checking for pw_class field in struct passwd configure:6469: cc -c -g -I/usr/local/ssl/include conftest.c 1>&5 cc: Error: configure, line 6465: In this statement, "pw_class" is not a member of "p". (needmember) struct passwd p; p.pw_class = 0; ------------------^ configure: failed program w...
2000 Oct 04
0
2.2.0p1 chroot patch
...5; (eval $ac_compile) 2>&5; }; then +if { (eval echo configure:4539: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then rm -rf conftest* ac_cv_have___ss_family_in_struct_ss="yes" else @@ -4556,13 +4558,13 @@ fi echo $ac_n "checking for pw_class field in struct passwd""... $ac_c" 1>&6 -echo "configure:4560: checking for pw_class field in struct passwd" >&5 +echo "configure:4562: checking for pw_class field in struct passwd" >&5 if eval "test \"`echo '$''{'ac...
2001 Apr 10
2
Compiling openssh 2.5.p1 on unixware 7.0.1
...utmpx.h... (cached) yes checking for st_blksize in struct stat... (cached) yes checking for sun_len field in struct sockaddr_un... (cached) no checking for ss_family field in struct sockaddr_storage... (cached) no checking for __ss_family field in struct sockaddr_storage... (cached) no checking for pw_class field in struct passwd... (cached) no checking if libc defines __progname... (cached) no checking if libc defines sys_errlist... (cached) yes checking if libc defines sys_nerr... (cached) yes checking for rsh... (cached) /usr/bin/rsh checking for xauth... (cached) /usr/X/bin/xauth checking for /dev...
2001 Jul 11
0
Solaris 2.6: Undefined symbol seed_rng
...n utmpx.h... yes checking for ut_tv field in utmpx.h... yes checking for st_blksize in struct stat... yes checking for sun_len field in struct sockaddr_un... no checking for ss_family field in struct sockaddr_storage... no checking for __ss_family field in struct sockaddr_storage... no checking for pw_class field in struct passwd... no checking if libc defines __progname... yes checking if libc defines sys_errlist... yes checking if libc defines sys_nerr... yes checking for rsh... /usr/ucb/rsh checking for xauth... /usr/openwin/bin/xauth checking for /dev/ptmx... yes checking for /dev/ptc... no checki...
2006 Feb 06
1
Compile warning report of openssh 4.3p1 on Intel Macs
...time field in utmpx.h... no checking for ut_tv field in utmpx.h... no checking for struct stat.st_blksize... yes checking for struct __res_state.retrans... yes checking for ss_family field in struct sockaddr_storage... yes checking for __ss_family field in struct sockaddr_storage... no checking for pw_class field in struct passwd... yes checking for pw_expire field in struct passwd... yes checking for pw_change field in struct passwd... yes checking for msg_accrights field in struct msghdr... no checking for msg_control field in struct msghdr... yes checking if libc defines __progname... yes checking...
2006 Sep 12
1
openssh (OpenBSD) , bsdauth and tis authsrv
nuqneH, I've tried using TIS authsrv authentication via bsd auth and found it quite limited. The most important restriction it does not log ip and fqdn of the remote peer, nor the application name, to the authentication server. It does not matter much for TIS authsrv, but since other applications do provide such information, our authsrv version uses it for extra authentication restrictions.
2006 Apr 23
0
Configuration Warnings OpenSSH 4.3p2
..._time field in utmpx.h... no checking for ut_tv field in utmpx.h... no checking for struct stat.st_blksize... yes checking for struct __res_state.retrans... no checking for ss_family field in struct sockaddr_storage... yes checking for __ss_family field in struct sockaddr_storage... no checking for pw_class field in struct passwd... yes checking for pw_expire field in struct passwd... yes checking for pw_change field in struct passwd... yes checking for msg_accrights field in struct msghdr... no checking for msg_control field in struct msghdr... yes checking if libc defines __progname... yes checking...