Displaying 16 results from an estimated 16 matches for "siasuccess".
Did you mean:
sci_success
2000 Oct 15
1
Patch for Digital Unix SIA authentication
...gt;
+#include <siad.h>
+
+extern int saved_argc;
+extern char **saved_argv;
+
+int
+auth_sia_password (user, pass)
+ char *user;
+ char *pass;
+{
+ SIAENTITY *ent = NULL;
+ int ret;
+
+ if (sia_ses_init (&ent, saved_argc, saved_argv,
+ get_canonical_hostname(), user, NULL, 0, NULL) != SIASUCCESS)
+ return 0;
+ if ((ret = sia_ses_authent (NULL, pass, ent)) != SIASUCCESS) {
+ if (ret & SIASTOP)
+ sia_ses_release (&ent);
+ return 0;
+ }
+ if (sia_ses_estab (NULL, ent) != SIASUCCESS)
+ return 0;
+ sia_ses_release (&ent);
+ return 1;
+}
+
+#endif /* HAVE_OSF_SIA */
diff -urN o...
2001 Dec 19
0
Patch for DU SIA auth
...assword(char *user, char *pass)
{
int ret;
const char *host;
host = get_canonical_hostname(options.reverse_mapping_check);
***************
*** 34,51 ****
if (!user || !pass)
return(0);
! if (sia_ses_init(&ent, saved_argc, saved_argv, host, user, NULL, 0,
NULL) != SIASUCCESS)
return(0);
! if ((ret = sia_ses_authent(NULL, pass, ent)) != SIASUCCESS) {
error("couldn't authenticate %s from %s", user, host);
if (ret & SIASTOP)
! sia_ses_release(&ent);
return(0);
}
- sia_ses_release(&ent);
return(1);
}
--- 34,50...
2002 Sep 04
2
uid transition and post-auth privsep (WAS Re: possible fundamental problem with tru64 patch) (fwd)
...options.verify_reverse_mapping);
>
> - if (!user || !pass || pass[0] == '\0')
> + if (!authctxt->user || !pass || pass[0] == '\0')
> return(0);
>
> - if (sia_ses_init(&ent, saved_argc, saved_argv, host, user, NULL, 0,
> - NULL) != SIASUCCESS)
> + if (sia_ses_init(&ent, saved_argc, saved_argv, host, authctxt->user,
> + NULL, 0, NULL) != SIASUCCESS)
> return(0);
>
> if ((ret = sia_ses_authent(NULL, pass, ent)) != SIASUCCESS) {
> - error("Couldn't authenticate %s from %s", use...
2003 Feb 27
0
Update for Tru64 Unix
...char *user = authctxt->user;
host = get_canonical_hostname(options.verify_reverse_mapping);
- if (pass[0] == '\0')
+ if (!authctxt->user || !pass || pass[0] == '\0')
return(0);
- if (sia_ses_init(&ent, saved_argc, saved_argv, host, user, NULL, 0,
- NULL) != SIASUCCESS)
+ if (sia_ses_init(&ent, saved_argc, saved_argv, host, authctxt->user,
+ NULL, 0, NULL) != SIASUCCESS)
return(0);
if ((ret = sia_ses_authent(NULL, pass, ent)) != SIASUCCESS) {
- error("Couldn't authenticate %s from %s", user, host);
+ error("Couldn't auth...
2001 Feb 12
2
OSF_SIA bug in 2.3.0p1
...to be an
obvious bug triggered if you try to connect as a non-existant user.
>From auth1.c line 459
#elif defined(HAVE_OSF_SIA)
(sia_validate_user(NULL, saved_argc, saved_argv,
get_canonical_hostname(), pw->pw_name, NULL, 0,
NULL, "") == SIASUCCESS)) {
#else /* !HAVE_OSF_SIA && !USE_PAM */
At this stage pw could be NULL so obviously pw->pw_name isn't a valid
thing to do. Should this just be 'user'? I'm not even 100% sure of the
validity of passing NULL as collect function (acceptable in 4.0g manpage,
not mentio...
2001 Apr 13
0
Fixed patch for Digital Unix SIA
...sia.c openssh/auth-sia.c
--- openssh_cvs/auth-sia.c Tue Feb 13 08:25:23 2001
+++ openssh/auth-sia.c Fri Apr 13 11:00:07 2001
@@ -61,35 +61,46 @@
host = get_canonical_hostname (options.reverse_mapping_check);
if (sia_ses_init(&ent, saved_argc, saved_argv, host, user, tty, 0,
- NULL) != SIASUCCESS)
- fatal("sia_ses_init failed");
+ NULL) != SIASUCCESS) {
+ error("sia_ses_init failed");
+ exit(1);
+ }
if ((pw = getpwnam(user)) == NULL) {
sia_ses_release(&ent);
- fatal("getpwnam(%s) failed: %s", user, strerror(errno));
+ error("getpwnam(%s...
2000 Oct 07
0
OpenSSH changes for BSD/OS
...f HAVE_BSD_AUTH
+ # include <login_cap.h>
+ # include <bsd_auth.h>
+ static char *bsduser=NULL; /* XXX -- ugly, but we need the original */
+ #endif
+
/* import */
extern ServerOptions options;
extern char *forced_command;
***************
*** 315,321 ****
NULL, password) == SIASUCCESS) {
authenticated = 1;
}
! #else /* !USE_PAM && !HAVE_OSF_SIA */
/* Try authentication with the password. */
authenticated = auth_password(pw, password);
#endif /* USE_PAM */
--- 321,330 ----
NULL, password) == SIASUCCESS) {
authenticated = 1;
}
! #eli...
2002 Jun 29
0
Privsep for osf/1 .. still need a bit of help
...d
-session_setup_sia(char *user, char *tty)
+setup_sia(char *user, char *tty)
{
struct passwd *pw;
SIAENTITY *ent = NULL;
@@ -86,9 +86,8 @@
host = get_canonical_hostname (options.verify_reverse_mapping);
if (sia_ses_init(&ent, saved_argc, saved_argv, host, user, tty, 0,
- NULL) != SIASUCCESS) {
+ NULL) != SIASUCCESS)
fatal("sia_ses_init failed");
- }
if ((pw = getpwnam(user)) == NULL) {
sia_ses_release(&ent);
@@ -100,25 +99,22 @@
}
ent->authtype = SIA_A_NONE;
- if (sia_ses_estab(sia_collect_trm, ent) != SIASUCCESS) {
+ if (sia_ses_estab(sia_collect_tr...
2002 Jun 28
0
Newer OSF patch.
...d
-session_setup_sia(char *user, char *tty)
+setup_sia(char *user, char *tty)
{
struct passwd *pw;
SIAENTITY *ent = NULL;
@@ -86,9 +86,8 @@
host = get_canonical_hostname (options.verify_reverse_mapping);
if (sia_ses_init(&ent, saved_argc, saved_argv, host, user, tty, 0,
- NULL) != SIASUCCESS) {
+ NULL) != SIASUCCESS)
fatal("sia_ses_init failed");
- }
if ((pw = getpwnam(user)) == NULL) {
sia_ses_release(&ent);
@@ -100,25 +99,22 @@
}
ent->authtype = SIA_A_NONE;
- if (sia_ses_estab(sia_collect_trm, ent) != SIASUCCESS) {
+ if (sia_ses_estab(sia_collect_tr...
2002 Aug 01
0
Tru64 and OSF/1 Privsep patch
...d
-session_setup_sia(char *user, char *tty)
+setup_sia(char *user, char *tty)
{
struct passwd *pw;
SIAENTITY *ent = NULL;
@@ -86,9 +88,8 @@
host = get_canonical_hostname (options.verify_reverse_mapping);
if (sia_ses_init(&ent, saved_argc, saved_argv, host, user, tty, 0,
- NULL) != SIASUCCESS) {
+ NULL) != SIASUCCESS)
fatal("sia_ses_init failed");
- }
if ((pw = getpwnam(user)) == NULL) {
sia_ses_release(&ent);
@@ -100,25 +101,24 @@
}
ent->authtype = SIA_A_NONE;
- if (sia_ses_estab(sia_collect_trm, ent) != SIASUCCESS) {
+ if (sia_ses_estab(sia_collect_t...
2003 Sep 24
1
Patches for compatibility with Heimdal's libsia_krb5 SIA module
...if (!authctxt->user || pass == NULL || pass[0] == '\0')
return (0);
+ if (ent) {
+ debug("Releasing old SIAENTITY!");
+ sia_ses_release(&ent);
+ ent = NULL;
+ }
+
if (sia_ses_init(&ent, saved_argc, saved_argv, host, authctxt->user,
NULL, 0, NULL) != SIASUCCESS)
return (0);
@@ -64,31 +72,36 @@
if ((ret = sia_ses_authent(NULL, pass, ent)) != SIASUCCESS) {
error("Couldn't authenticate %s from %s",
authctxt->user, host);
- if (ret & SIASTOP)
+ if (ret & SIASTOP) {
sia_ses_release(&ent);
+ ent = NULL;
+ }...
2001 Feb 16
1
OpenSSH 2.3.0p1 port to BSDI BSD/OS
...on.h"
+#ifdef HAVE_BSD_AUTH_H
+# include <login_cap.h>
+# include <bsd_auth.h>
+static char *bsduser=NULL; /* XXX -- ugly, but we need the original */
+#endif
+
/* import */
extern ServerOptions options;
extern char *forced_command;
@@ -258,7 +264,10 @@
NULL, password) == SIASUCCESS) {
authenticated = 1;
}
-#else /* !USE_PAM && !HAVE_OSF_SIA */
+#elif defined(HAVE_BSD_AUTH_H)
+ authenticated = auth_userokay(bsduser, NULL,
+ "auth-ssh", password);
+#else /* !USE_PAM && !HAVE_OSF_SIA && !HAVE_BSD_AUTH_H */
/* Try authentica...
2002 Aug 11
4
OSF/1 or Tru64 patch for Privsep
...d
-session_setup_sia(char *user, char *tty)
+setup_sia(char *user, char *tty)
{
struct passwd *pw;
SIAENTITY *ent = NULL;
@@ -86,9 +88,8 @@
host = get_canonical_hostname (options.verify_reverse_mapping);
if (sia_ses_init(&ent, saved_argc, saved_argv, host, user, tty, 0,
- NULL) != SIASUCCESS) {
+ NULL) != SIASUCCESS)
fatal("sia_ses_init failed");
- }
if ((pw = getpwnam(user)) == NULL) {
sia_ses_release(&ent);
@@ -100,25 +101,24 @@
}
ent->authtype = SIA_A_NONE;
- if (sia_ses_estab(sia_collect_trm, ent) != SIASUCCESS) {
+ if (sia_ses_estab(sia_collect_t...
2001 Mar 21
1
Tru64 UNIX SIA in 2.5.2p1 is hosed (still)
...string doesn't signify no tty, and hence will cause a failure. The
"no tty" case should have tty passed as NULL.
One possible fix for this is to change the call to sia_ses_init from:
if (sia_ses_init(&ent, saved_argc, saved_argv, host, user, tty, 0,
NULL) != SIASUCCESS)
to:
if (sia_ses_init(&ent, saved_argc, saved_argv, host, user,
tty[0] ? tty : NULL, 0, NULL) != SIASUCCESS)
However, I'm not convinced that tty won't be some random value here if
session structure has been used before, since s->tty isn't zeroed in
session_n...
2006 Sep 14
3
[PATCH] PermitRootLogin woes
...p; options.permit_root_login != PERMIT_YES)
+ return (0);
if (!authctxt->user || pass == NULL || pass[0] == '\0')
return (0);
+ host = get_canonical_hostname(options.use_dns);
if (sia_ses_init(&ent, saved_argc, saved_argv, host, authctxt->user,
NULL, 0, NULL) != SIASUCCESS)
return (0);
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev at mindrot.org
http://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
2000 Jul 05
0
openssh compile error on TRU64 4.0D
...n)
....
auth1.c:509: warning: passing arg 4 of `sia_validate_user' discards
qualifiers from pointer target type
*** Exit 1
where line 509 ===>
(sia_validate_user(NULL, saved_argc, saved_argv,
get_canonical_hostname(), pw->pw_name, NULL, 0, NULL,
"") == SIASUCCESS))
I read the archive mails and adjusted the auth1.c source file according to
the latest info (by John Speno on 7/3) but without success (so there seems
to be a difference between TRU64 5.0A and 4.0D) or did i overlook something
obvious?
Any help would be appreciated
Kind regards
Henk Baars