search for: shadow_pw

Displaying 12 results from an estimated 12 matches for "shadow_pw".

2004 Mar 04
3
[Bug 807] Compilation failure--> ld: Unresolved: xcrypt shadow_pw
http://bugzilla.mindrot.org/show_bug.cgi?id=807 Summary: Compilation failure--> ld: Unresolved: xcrypt shadow_pw Product: Portable OpenSSH Version: 3.8p1 Platform: Alpha OS/Version: OSF/1 Status: NEW Severity: major Priority: P2 Component: Build system AssignedTo: openssh-bugs at mindrot.org ReportedBy: mcaskill.s...
2004 Mar 27
1
Problems Compiling sshd - OpenSSH 3.8p1 on Tru64 UNIX V4.0F PK#7 (OSF)
I am trying to compile sshd 3.8p1 on Tru64 UNIX V4.0F Patch Level 7. Previously I've compiled the entire 3.6.1p2 distribution with no problems. The problem seems to occur when linking sshd. The linker is unable to find xcrypt and shadow_pw functions (openbsd-compat/*.c). The libopenbsd-compat seems to have built without errors. I configure as follows: CC=cc CFLAGS=-O LDFLAGS=-non_shared ./configure --prefix=/opt/ssh --with-prngd-socket =/var/run/egd-pool --with-ssl-dir=/opt/ssh --with-zlib=/opt/zlib cc -o sshd sshd.o auth-rhosts....
2016 Jul 21
4
Openssh use enumeration
...sd-compat/xcrypt.c index 8913bb8..5385243 100644 --- a/openbsd-compat/xcrypt.c +++ b/openbsd-compat/xcrypt.c @@ -78,14 +78,18 @@ pick_salt(void) if (salt[0] != '\0') return salt; strlcpy(salt, "xx", sizeof(salt)); - if ((pw = getpwuid(0)) == NULL) - return salt; - passwd = shadow_pw(pw); - if (passwd[0] != '$' || (p = strrchr(passwd + 1, '$')) == NULL) - return salt; /* no $, DES */ - typelen = p - passwd + 1; - strlcpy(salt, passwd, MIN(typelen, sizeof(salt))); - explicit_bzero(passwd, strlen(passwd)); + setpwent(); + while ((pw = getpwent()) != NULL) { + p...
2006 Jun 23
2
[Bug 1083] Disable login for locked account
http://bugzilla.mindrot.org/show_bug.cgi?id=1083 dtucker at zip.com.au changed: What |Removed |Added ---------------------------------------------------------------------------- Attachment #1148| |ok? Flag| | ------- Comment #10 from dtucker at zip.com.au 2006-06-23 21:15 -------
2008 Mar 12
2
[Bug 1083] Disable login for locked account
...------------------------------------------------------ CC| |dtucker at zip.com.au --- Comment #13 from Darren Tucker <dtucker at zip.com.au> 2008-03-12 21:42:03 --- (In reply to comment #11) > could this use openbsd-compat/xcrypt.c:shadow_pw() to fetch the > password? it already does this... OK I finally looked and that won't work because shadow_pw() returns just the passwd string and the shadow password checks need other members of the shadow struct. -- Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email...
2005 Jul 28
1
greater than 8 character passwords on Unixware (IA database support)
...nd made a mess. Hopefully I can get a better grasp this weekend. The only files I changed were xcrypt.c and Makefile. Makefile needed -lcrypt and -liaf added to LIBS=. It had -lcrypto but needed -lcrypt for bigcrypt() xcrypt.c needed: - #include <ia.h> - xcrypt() needed to call bigcrypt() - shadow_pw() needed this, although it didn't really belong there: uinfo_t uinfo; ia_openinfo(pw->pw_name, &uinfo); ia_get_logpwd(uinfo, &pw_password); ia_closeinfo(uinfo);
2004 Feb 26
14
[Bug 802] sshd of openssh-3.8p1 doesn't link on Tru64.
...o gss-serv-krb5.o loginrec.o auth-pam.o auth-shadow.o auth-sia.o md5crypt.o -L. -Lopenbsd-compat/ -L/usr/local/ssl/lib -L/usr/local/staff/tcp_wrappers/src -s -Wl,-rpath,/usr/local/ssl/lib:/vol/gnu/lib -lssh -lopenbsd-compat -lwrap -lcrypto -lrt -lz -lsecurity -ldb -lm -laud ld: Unresolved: xcrypt shadow_pw collect2: ld returned 1 exit status At least shadow_pw doesn't exist in any library that comes with Tru64 (didn't check for xcrypt). The symptoms don't change when I add or omit the --with-osfsia configure option. Looking at auth-passwd.c of 3.8p1 and 3.7.1p2 showed that adding the op...
2016 Jul 21
3
Openssh use enumeration
On Thu, Jul 21, 2016 at 12:31 PM, Selphie Keller <selphie.keller at gmail.com> wrote: > Ahh i see, just got up to speed on the issue, so seems like the issue is > related to blowfish being faster then sha family hashing for longer length > passwords, or the system's crypt() not understanding $2a$ -style salts, which most glibcs don't. On those, crypt fails immediately due
2004 Mar 19
1
[Bug 814] Turning on OSF SIA causes linker errors in sshd
...problem are two files: ./auth-passwd.c ./openbsd-compat/xcrypt.c When --with-osfsia is given, the second file doesn't compile anything, since the whole C source block is surrounded with: #if !defined(HAVE_OSF_SIA) ... #endif The first file, however, requires two procedures from the second: shadow_pw xcrypt So, what's the story here? What should be done on Tru64 UNIX? What should be used in ./auth-passwd.c with OSF SIA enabled? Nix. ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
2003 Sep 08
2
Variable declarations in xcrypt.c
...================================= RCS file: /usr/local/src/security/openssh/cvs/openssh_cvs/openbsd-compat/xcrypt.c,v retrieving revision 1.4 diff -u -p -r1.4 xcrypt.c --- openbsd-compat/xcrypt.c 6 Sep 2003 23:43:42 -0000 1.4 +++ openbsd-compat/xcrypt.c 8 Sep 2003 06:52:26 -0000 @@ -96,18 +96,25 @@ shadow_pw(struct passwd *pw) pw_password = spw->sp_pwdp; # endif # if defined(HAVE_GETPWANAM) && !defined(DISABLE_SHADOW) - struct passwd_adjunct *spw; - if (issecure() && (spw = getpwanam(pw->pw_name)) != NULL) - pw_password = spw->pwa_passwd; + if (issecure()) { + struct pas...
2003 Sep 02
12
[Bug 633] Password authentication fails in HP-UX trusted mode due to DISABLE_SHADOW
http://bugzilla.mindrot.org/show_bug.cgi?id=633 Summary: Password authentication fails in HP-UX trusted mode due to DISABLE_SHADOW Product: Portable OpenSSH Version: -current Platform: HPPA OS/Version: HP-UX Status: NEW Severity: normal Priority: P2 Component: sshd AssignedTo:
2005 Aug 26
0
Patch for UnixWare 7
...ions.h" + +int nischeck(char *); + +int +sys_auth_passwd(Authctxt *authctxt, const char *password) +{ + struct passwd *pw = authctxt->pw; + char *encrypted_password; + char *salt; + + /* Just use the supplied fake password if authctxt is invalid */ + char *pw_password = authctxt->valid ? shadow_pw(pw) : pw->pw_passwd; + + /* Check for users with no password. */ + if (strcmp(pw_password, "") == 0 && strcmp(password, "") == 0) + return (1); + + salt = (pw_password[0] && pw_password[1]) ? pw_password : "xx"; + if (nischeck(pw->pw_name)) + re...