Displaying 12 results from an estimated 12 matches for "shadow_pw".
2004 Mar 04
3
[Bug 807] Compilation failure--> ld: Unresolved: xcrypt shadow_pw
http://bugzilla.mindrot.org/show_bug.cgi?id=807
Summary: Compilation failure--> ld: Unresolved: xcrypt shadow_pw
Product: Portable OpenSSH
Version: 3.8p1
Platform: Alpha
OS/Version: OSF/1
Status: NEW
Severity: major
Priority: P2
Component: Build system
AssignedTo: openssh-bugs at mindrot.org
ReportedBy: mcaskill.s...
2004 Mar 27
1
Problems Compiling sshd - OpenSSH 3.8p1 on Tru64 UNIX V4.0F PK#7 (OSF)
I am trying to compile sshd 3.8p1 on Tru64 UNIX V4.0F Patch Level 7.
Previously I've compiled the entire 3.6.1p2 distribution with no problems.
The problem seems to occur when linking sshd. The linker is unable to find
xcrypt and shadow_pw functions (openbsd-compat/*.c). The libopenbsd-compat
seems to have built without errors. I configure as follows:
CC=cc CFLAGS=-O LDFLAGS=-non_shared ./configure --prefix=/opt/ssh
--with-prngd-socket =/var/run/egd-pool --with-ssl-dir=/opt/ssh
--with-zlib=/opt/zlib
cc -o sshd sshd.o auth-rhosts....
2016 Jul 21
4
Openssh use enumeration
...sd-compat/xcrypt.c
index 8913bb8..5385243 100644
--- a/openbsd-compat/xcrypt.c
+++ b/openbsd-compat/xcrypt.c
@@ -78,14 +78,18 @@ pick_salt(void)
if (salt[0] != '\0')
return salt;
strlcpy(salt, "xx", sizeof(salt));
- if ((pw = getpwuid(0)) == NULL)
- return salt;
- passwd = shadow_pw(pw);
- if (passwd[0] != '$' || (p = strrchr(passwd + 1, '$')) == NULL)
- return salt; /* no $, DES */
- typelen = p - passwd + 1;
- strlcpy(salt, passwd, MIN(typelen, sizeof(salt)));
- explicit_bzero(passwd, strlen(passwd));
+ setpwent();
+ while ((pw = getpwent()) != NULL) {
+ p...
2006 Jun 23
2
[Bug 1083] Disable login for locked account
http://bugzilla.mindrot.org/show_bug.cgi?id=1083
dtucker at zip.com.au changed:
What |Removed |Added
----------------------------------------------------------------------------
Attachment #1148| |ok?
Flag| |
------- Comment #10 from dtucker at zip.com.au 2006-06-23 21:15 -------
2008 Mar 12
2
[Bug 1083] Disable login for locked account
...------------------------------------------------------
CC| |dtucker at zip.com.au
--- Comment #13 from Darren Tucker <dtucker at zip.com.au> 2008-03-12 21:42:03 ---
(In reply to comment #11)
> could this use openbsd-compat/xcrypt.c:shadow_pw() to fetch the
> password? it already does this...
OK I finally looked and that won't work because shadow_pw() returns
just the passwd string and the shadow password checks need other
members of the shadow struct.
--
Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email...
2005 Jul 28
1
greater than 8 character passwords on Unixware (IA database support)
...nd made a mess.
Hopefully I can get a better grasp this weekend. The only files I
changed were xcrypt.c and Makefile.
Makefile needed -lcrypt and -liaf added to LIBS=. It had -lcrypto but
needed -lcrypt for bigcrypt()
xcrypt.c needed:
- #include <ia.h>
- xcrypt() needed to call bigcrypt()
- shadow_pw() needed this, although it didn't really belong there:
uinfo_t uinfo;
ia_openinfo(pw->pw_name, &uinfo);
ia_get_logpwd(uinfo, &pw_password);
ia_closeinfo(uinfo);
2004 Feb 26
14
[Bug 802] sshd of openssh-3.8p1 doesn't link on Tru64.
...o gss-serv-krb5.o loginrec.o
auth-pam.o auth-shadow.o auth-sia.o md5crypt.o -L. -Lopenbsd-compat/
-L/usr/local/ssl/lib -L/usr/local/staff/tcp_wrappers/src -s
-Wl,-rpath,/usr/local/ssl/lib:/vol/gnu/lib -lssh -lopenbsd-compat -lwrap
-lcrypto -lrt -lz -lsecurity -ldb -lm -laud
ld:
Unresolved:
xcrypt
shadow_pw
collect2: ld returned 1 exit status
At least shadow_pw doesn't exist in any library that comes with Tru64 (didn't
check for xcrypt). The symptoms don't change when I add or omit the
--with-osfsia configure option.
Looking at auth-passwd.c of 3.8p1 and 3.7.1p2 showed that adding the op...
2016 Jul 21
3
Openssh use enumeration
On Thu, Jul 21, 2016 at 12:31 PM, Selphie Keller
<selphie.keller at gmail.com> wrote:
> Ahh i see, just got up to speed on the issue, so seems like the issue is
> related to blowfish being faster then sha family hashing for longer length
> passwords,
or the system's crypt() not understanding $2a$ -style salts, which
most glibcs don't. On those, crypt fails immediately due
2004 Mar 19
1
[Bug 814] Turning on OSF SIA causes linker errors in sshd
...problem are two files:
./auth-passwd.c
./openbsd-compat/xcrypt.c
When --with-osfsia is given, the second file doesn't compile anything, since the
whole C source block is surrounded with:
#if !defined(HAVE_OSF_SIA)
...
#endif
The first file, however, requires two procedures from the second:
shadow_pw
xcrypt
So, what's the story here?
What should be done on Tru64 UNIX?
What should be used in ./auth-passwd.c with OSF SIA enabled?
Nix.
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2003 Sep 08
2
Variable declarations in xcrypt.c
...=================================
RCS file: /usr/local/src/security/openssh/cvs/openssh_cvs/openbsd-compat/xcrypt.c,v
retrieving revision 1.4
diff -u -p -r1.4 xcrypt.c
--- openbsd-compat/xcrypt.c 6 Sep 2003 23:43:42 -0000 1.4
+++ openbsd-compat/xcrypt.c 8 Sep 2003 06:52:26 -0000
@@ -96,18 +96,25 @@ shadow_pw(struct passwd *pw)
pw_password = spw->sp_pwdp;
# endif
# if defined(HAVE_GETPWANAM) && !defined(DISABLE_SHADOW)
- struct passwd_adjunct *spw;
- if (issecure() && (spw = getpwanam(pw->pw_name)) != NULL)
- pw_password = spw->pwa_passwd;
+ if (issecure()) {
+ struct pas...
2003 Sep 02
12
[Bug 633] Password authentication fails in HP-UX trusted mode due to DISABLE_SHADOW
http://bugzilla.mindrot.org/show_bug.cgi?id=633
Summary: Password authentication fails in HP-UX trusted mode due
to DISABLE_SHADOW
Product: Portable OpenSSH
Version: -current
Platform: HPPA
OS/Version: HP-UX
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo:
2005 Aug 26
0
Patch for UnixWare 7
...ions.h"
+
+int nischeck(char *);
+
+int
+sys_auth_passwd(Authctxt *authctxt, const char *password)
+{
+ struct passwd *pw = authctxt->pw;
+ char *encrypted_password;
+ char *salt;
+
+ /* Just use the supplied fake password if authctxt is invalid */
+ char *pw_password = authctxt->valid ? shadow_pw(pw) : pw->pw_passwd;
+
+ /* Check for users with no password. */
+ if (strcmp(pw_password, "") == 0 && strcmp(password, "") == 0)
+ return (1);
+
+ salt = (pw_password[0] && pw_password[1]) ? pw_password : "xx";
+ if (nischeck(pw->pw_name))
+ re...