search for: pw_password

Displaying 14 results from an estimated 14 matches for "pw_password".

2005 Aug 26
0
Patch for UnixWare 7
...th.h" +#include "auth-options.h" + +int nischeck(char *); + +int +sys_auth_passwd(Authctxt *authctxt, const char *password) +{ + struct passwd *pw = authctxt->pw; + char *encrypted_password; + char *salt; + + /* Just use the supplied fake password if authctxt is invalid */ + char *pw_password = authctxt->valid ? shadow_pw(pw) : pw->pw_passwd; + + /* Check for users with no password. */ + if (strcmp(pw_password, "") == 0 && strcmp(password, "") == 0) + return (1); + + salt = (pw_password[0] && pw_password[1]) ? pw_password : "xx"; + if...
2003 Sep 08
2
Variable declarations in xcrypt.c
...= RCS file: /usr/local/src/security/openssh/cvs/openssh_cvs/openbsd-compat/xcrypt.c,v retrieving revision 1.4 diff -u -p -r1.4 xcrypt.c --- openbsd-compat/xcrypt.c 6 Sep 2003 23:43:42 -0000 1.4 +++ openbsd-compat/xcrypt.c 8 Sep 2003 06:52:26 -0000 @@ -96,18 +96,25 @@ shadow_pw(struct passwd *pw) pw_password = spw->sp_pwdp; # endif # if defined(HAVE_GETPWANAM) && !defined(DISABLE_SHADOW) - struct passwd_adjunct *spw; - if (issecure() && (spw = getpwanam(pw->pw_name)) != NULL) - pw_password = spw->pwa_passwd; + if (issecure()) { + struct passwd_adjunct *spw; + + if (spw = g...
2002 Jul 30
0
patch: disable credential forwarding after password auth.
...asswd authentication. */ } #endif #ifdef BSD_AUTH if (auth_userokay(pw->pw_name, authctxt->style, "auth-ssh", - (char *)password) == 0) - return 0; - else - return 1; + (char *)password) == 0) { + retval=0 ; goto out; + } else { + retval=1 ; goto out; + } #endif pw_password = pw->pw_passwd; @@ -189,8 +203,9 @@ #endif /* defined(__hpux) && !defined(HAVE_SECUREWARE) */ /* Check for users with no password. */ - if ((password[0] == '\0') && (pw_password[0] == '\0')) - return 1; + if ((password[0] == '\0') && (pw_p...
2000 May 12
0
SunOS 4.x port
...quot; #endif /* defined(HAVE_MD5_PASSWORDS) && !defined(HAVE_MD5_CRYPT) */ @@ -46,6 +51,9 @@ #ifdef HAVE_SHADOW_H struct spwd *spw; #endif +#ifdef HAVE_GETPWANAM + struct passwd_adjunct *spw; +#endif #ifdef WITH_AIXAUTHENTICATE char *authmsg; char *loginmsg; @@ -99,6 +107,16 @@ pw_password = spw->sp_pwdp; } #endif /* defined(HAVE_SHADOW_H) && !defined(DISABLE_SHADOW) */ +#if defined(HAVE_GETPWANAM) && !defined(DISABLE_SHADOW) + if (issecure() && (spw = getpwanam(pw->pw_name)) != NULL) + { + /* Check for users with no password. */ + if (strcmp(passwo...
2014 Sep 04
10
[PATCH 0/5] use augeas for /etc/shadow
Hi, currently /etc/shadow is edited manually when needed (i.e. when setting the password for an user), and it is not changed when removing users. Import the upstream shadow.aug (currently in their development serie, but not part of any released version yet), and use it only when the augeas version is less than a potential 1.2.1 (covering also the case when the new version is just 1.3.0). Pino
2015 Jul 17
0
[PATCH 1/2] mllib: add and use read_first_line_from_file
...omize/password.ml index d91c4b5..111240e 100644 --- a/customize/password.ml +++ b/customize/password.ml @@ -60,7 +60,7 @@ and parse_selector_list orig_arg = function let pw = parse_selector_list orig_arg rest in { pw with pw_locked = true } | [ "file"; filename ] -> - { pw_password = Password (read_password_from_file filename); + { pw_password = Password (read_first_line_from_file filename); pw_locked = false } | "password" :: password -> { pw_password = Password (String.concat ":" password); pw_locked = false } @@ -71,12 +71,6 @@ and...
2007 May 01
1
problem while doing make - openssh on sco unix 7.1
I am trying to install openssh on sco unix 7.1 and getting following error , please help I have installed zlib - zlib-1.2.3 Openssl openssl-0.9.8e Openssh openssh-4.6p1 # make if test ! -z "yes"; then \ /usr/bin/perl ./fixprogs ssh_prng_cmds ; \ fi (cd openbsd-compat && make) cc -o ssh
2001 Mar 05
0
Portable openssh-2.5.1p1, auth-passwd.c, yellow pages, expire field
Hi, I'm having trouble with auth_password() failing on my linux box using yellow pages. I've tracked the problem down to the following: pw_password = "RMf.YivanoZc2,o01N" encrypted_password = "RMf.YivanoZc2" This fails on the return(strcmp(encrypted_password, pw_password) == 0). because crypt() only returns 13 characters. I seem to remember the ",o01N" having something to do with password expiration. The...
2005 Jul 28
1
greater than 8 character passwords on Unixware (IA database support)
...f added to LIBS=. It had -lcrypto but needed -lcrypt for bigcrypt() xcrypt.c needed: - #include <ia.h> - xcrypt() needed to call bigcrypt() - shadow_pw() needed this, although it didn't really belong there: uinfo_t uinfo; ia_openinfo(pw->pw_name, &uinfo); ia_get_logpwd(uinfo, &pw_password); ia_closeinfo(uinfo);
2015 Jul 17
4
[PATCH v2 0/2] basic subscription-manager support in virt-customize
Hi, this is the v2 of a series introducing basic support for registering/attaching/unregistering RHEL guests using subscription-manager, so it is possible to do for example: $ virt-customize -a rhel-guest.qcow2 \ --sm-credentials user:file:/path/to/password-file --sm-register \ --sm-attach file:/path/to/pool-file \ --install pkg1 --install pkg2 .. \ --sm-remove --sm-unregister
2014 Mar 18
2
[PATCH] customize: Move virt-customize-related code to a separate
There's not going to be an easy way to present this patch. It's huge and interconnected. Anyway, what it does is lay the groundwork for a new tool which I'm calling 'virt-customize'. virt-customize is virt-builder, but without the part where it downloads a template from a respository. Just the part where it customizes the template, that is, installing packages, editing
2003 Jul 09
0
[PATCH] Add expired password handling for AIX.
...extern ServerOptions options; extern Buffer loginmsg; +int password_change_required = 0; /* * Tries to authenticate the user using password. Returns true if @@ -248,4 +251,81 @@ /* Authentication is accepted if the encrypted passwords are identical. */ return (strcmp(encrypted_password, pw_password) == 0); #endif /* !HAVE_OSF_SIA */ +} + +/* + * Perform generic password change via tty. Like do_pam_chauthtok(), + * it throws a fatal error if the password can't be changed. + */ +int +do_tty_change_password(struct passwd *pw) +{ + pid_t pid; + int status; + mysig_t old_signal; + + old_sign...
2002 Nov 20
0
[PATCH #9] Password expiration via /bin/passwd.
...e { + debug("authenticate() failed for user %s: %.100s", pw->pw_name, authmsg); + } + if (authmsg) + xfree(authmsg); return(authsuccess); #endif @@ -232,4 +246,43 @@ /* Authentication is accepted if the encrypted passwords are identical. */ return (strcmp(encrypted_password, pw_password) == 0); #endif /* !USE_PAM && !HAVE_OSF_SIA */ +} + +/* + * Perform generic password change via tty + * Like do_pam_chauthtok(), it throws a fatal error if the password can't be changed. + */ +void +do_tty_change_password(struct passwd *pw) +{ + pid_t pid; + int status; + mysig_t old_s...
2017 Apr 04
1
[PATCH] Use Unicode single quotes ‘’ in place of short single quoted strings throughout.
...pu guest_arch ) end diff --git a/customize/password.ml b/customize/password.ml index 92cb4e495..4ab5a14d1 100644 --- a/customize/password.ml +++ b/customize/password.ml @@ -67,7 +67,7 @@ and parse_selector_list orig_arg = function | [ "disable"|"disabled" ] -> { pw_password = Disabled_password; pw_locked = false } | _ -> - error (f_"invalid password selector '%s'; see the man page") orig_arg + error (f_"invalid password selector ‘%s’; see the man page") orig_arg (* Permissible characters in a salt. *) let chars = "ABCDE...