Displaying 7 results from an estimated 7 matches for "sia_validate_user".
2000 Oct 07
0
OpenSSH changes for BSD/OS
....pw_gid = pw->pw_gid;
pwcopy.pw_dir = xstrdup(pw->pw_dir);
pwcopy.pw_shell = xstrdup(pw->pw_shell);
+ #if defined(BSD) && BSD >= 199506
+ pwcopy.pw_class = xstrdup(pw->pw_class);
+ #endif
pw = &pwcopy;
#ifdef USE_PAM
***************
*** 508,514 ****
(sia_validate_user(NULL, saved_argc, saved_argv,
get_canonical_hostname(), pw->pw_name, NULL, 0, NULL,
"") == SIASUCCESS)) {
! #else /* !HAVE_OSF_SIA && !USE_PAM */
auth_password(pw, "")) {
#endif /* USE_PAM */
/* Authentication with empty password succeeded...
2001 Feb 12
2
OSF_SIA bug in 2.3.0p1
Is anyone maintaining the OSF_SIA support in openssh? This seems to be an
obvious bug triggered if you try to connect as a non-existant user.
>From auth1.c line 459
#elif defined(HAVE_OSF_SIA)
(sia_validate_user(NULL, saved_argc, saved_argv,
get_canonical_hostname(), pw->pw_name, NULL, 0,
NULL, "") == SIASUCCESS)) {
#else /* !HAVE_OSF_SIA && !USE_PAM */
At this stage pw could be NULL so obviously pw->pw_name isn't a valid
thing to do. Should thi...
2000 Oct 15
1
Patch for Digital Unix SIA authentication
...-#ifdef HAVE_OSF_SIA
-extern int saved_argc;
-extern char **saved_argv;
-#endif /* HAVE_OSF_SIA */
/*
* convert ssh auth msg type into description
@@ -310,11 +301,7 @@
authenticated = auth_pam_password(pw, password);
#elif defined(HAVE_OSF_SIA)
/* Do SIA auth with password */
- if (sia_validate_user(NULL, saved_argc, saved_argv,
- get_canonical_hostname(), pw->pw_name, NULL, 0,
- NULL, password) == SIASUCCESS) {
- authenticated = 1;
- }
+ authenticated = auth_sia_password(pw->pw_name, password);
#else /* !USE_PAM && !HAVE_OSF_SIA */
/* Try authentication with...
2001 Feb 16
1
OpenSSH 2.3.0p1 port to BSDI BSD/OS
...the user name we need to strip */
+ {
+ char *p;
+ bsduser = xstrdup(user);
+ if ((p = strchr(user, ':')) != NULL)
+ *p = '\0';
+ }
+#endif
pw = getpwnam(user);
if (pw && allowed_user(pw)) {
/* Take a copy of the returned structure. */
@@ -460,7 +482,9 @@
(sia_validate_user(NULL, saved_argc, saved_argv,
get_canonical_hostname(), pw->pw_name, NULL, 0,
NULL, "") == SIASUCCESS)) {
-#else /* !HAVE_OSF_SIA && !USE_PAM */
+#elif defined(HAVE_BSD_AUTH_H)
+ auth_userokay(bsduser, NULL, "auth-ssh", "" )) {
+#else /* !HAV...
2000 Jul 05
0
openssh compile error on TRU64 4.0D
L.S
We have a problem compiling the latest ssh (openssh2.1.1p2) on TRU64 Unix
4.0D
we got the following error message
...
auth1.c:507: `saved_argv' undeclared (first use in this function)
....
auth1.c:509: warning: passing arg 4 of `sia_validate_user' discards
qualifiers from pointer target type
*** Exit 1
where line 509 ===>
(sia_validate_user(NULL, saved_argc, saved_argv,
get_canonical_hostname(), pw->pw_name, NULL, 0, NULL,
"") == SIASUCCESS))
I read the archive mails and adjusted the auth1.c s...
2001 Mar 01
1
Bug report against openssh-2.3.0p1
...h1.c.patched Thu Mar 1 17:33:18 2001
***************
*** 455,461 ****
(!options.kerberos_authentication || options.kerberos_or_local_passwd) &&
#endif /* KRB4 */
#ifdef USE_PAM
! auth_pam_password(pw, "")) {
#elif defined(HAVE_OSF_SIA)
(sia_validate_user(NULL, saved_argc, saved_argv,
get_canonical_hostname(), pw->pw_name, NULL, 0,
--- 455,461 ----
(!options.kerberos_authentication || options.kerberos_or_local_passwd) &&
#endif /* KRB4 */
#ifdef USE_PAM
! auth_pam_password(pw, "") &&...
2000 Aug 27
0
patch for TIS (skey/opie) *and* passwd auth via PAM
..., type);
return buf;
@@ -307,7 +316,7 @@
#ifdef USE_PAM
/* Do PAM auth with password */
- authenticated = auth_pam_password(pw, password);
+ authenticated = auth_pam_password(pw, password, SSH_CMSG_AUTH_PASSWORD);
#elif defined(HAVE_OSF_SIA)
/* Do SIA auth with password */
if (sia_validate_user(NULL, saved_argc, saved_argv,
@@ -355,6 +364,26 @@
xfree(response);
}
break;
+#elif defined(PAM_TIS)
+ case SSH_CMSG_AUTH_TIS:
+ debug("rcvd SSH_CMSG_AUTH_TIS");
+ if (!options.tis_authentication) {
+ verbose("TIS authentication disabled.");
+ break;
+...