Displaying 20 results from an estimated 35 matches for "spw".
Did you mean:
spt
2000 Sep 20
1
password aging and account lock checks
I'm looking at the password aging and account lock checks in
auth.c:allowed_user(), and specifically their behaviour on
HP-UX.
First, should this code be ifdef'd away if we're using PAM?
Next:
/* Check account expiry */
if ((spw->sp_expire > 0) && (days > spw->sp_expire))
return 0;
If I lock an account by entering too many incorrect passwords,
sp_expire does not change (it stays at -1). From the comment in the
man page, I would expect it to be set to 0, but even then the code
above would not catch...
2000 Jul 02
1
A error in auth.c of openssh-2.1.1p2 port on systems with a mixture of shadowed and non-shadowed passwords and Japanese Translations.
...es and
getpwnam(3) for non-shadowed users' entries.
Otherwise, the function "allowed_user" in auth.c of openssh-2.1.1p2
has the following lines:
59 #if defined(HAVE_SHADOW_H) && !defined(DISABLE_SHADOW) && \
60 defined(HAS_SHADOW_EXPIRE)
61 struct spwd *spw;
62
63 /* Shouldn't be called if pw is NULL, but better safe than sorry
*/
64 if (!pw)
65 return 0;
66
67 spw = getspnam(pw->pw_name);
68 if (spw == NULL)
69 return 0;
.
So, getspnam will returns NULL for our...
2003 Sep 08
2
Variable declarations in xcrypt.c
...sr/local/src/security/openssh/cvs/openssh_cvs/openbsd-compat/xcrypt.c,v
retrieving revision 1.4
diff -u -p -r1.4 xcrypt.c
--- openbsd-compat/xcrypt.c 6 Sep 2003 23:43:42 -0000 1.4
+++ openbsd-compat/xcrypt.c 8 Sep 2003 06:52:26 -0000
@@ -96,18 +96,25 @@ shadow_pw(struct passwd *pw)
pw_password = spw->sp_pwdp;
# endif
# if defined(HAVE_GETPWANAM) && !defined(DISABLE_SHADOW)
- struct passwd_adjunct *spw;
- if (issecure() && (spw = getpwanam(pw->pw_name)) != NULL)
- pw_password = spw->pwa_passwd;
+ if (issecure()) {
+ struct passwd_adjunct *spw;
+
+ if (spw = getpwan...
2002 Apr 26
1
expire checks
...================
RCS file: /var/cvs/openssh/auth.c,v
retrieving revision 1.51
diff -u -r1.51 auth.c
--- auth.c 22 Mar 2002 03:08:31 -0000 1.51
+++ auth.c 24 Apr 2002 19:51:00 -0000
@@ -80,18 +80,35 @@
if (!pw || !pw->pw_name)
return 0;
+#define DAY (24L * 60 * 60) /* 1 day in seconds */
spw = getspnam(pw->pw_name);
if (spw != NULL) {
- int days = time(NULL) / 86400;
+ time_t today = time(NULL) / DAY;
+ debug3("allowed_user: today %d sp_expire %d sp_lstchg %d"
+ " sp_max %d", (int)today, (int)spw->sp_expire,
+ (int)spw->sp_lstchg, (int)spw-&g...
2003 Jan 07
2
Test for locked account in auth.c (bug #442).
...n,
I noticed you merged a couple of ifdefs in the fix for bug #442. The
cvs comment says "Fix Bug #442 for PAM case". The code is now roughly:
#if !defined(USE_PAM) && defined(HAVE_SHADOW_H) && \
!defined(DISABLE_SHADOW) && defined(HAS_SHADOW_EXPIRE)
spw = getspnam(pw->pw_name);
passwd = spw->sp_pwdp;
#else
passwd = pw->pw_passwd;
#endif
[test for locked passwd entry]
If the platform is using PAM, /etc/passwd is checked regardless of
whether or not it actually has /etc/shadow.
If the platform has /etc/shadow but doesn&...
2001 Jun 18
2
Patch for changing expired passwords
...#include "buffer.h"
#include "bufaux.h"
+ /* set when password has expired */
+ int forced_passwd_change = 0;
+
/* import */
extern ServerOptions options;
***************
*** 81,93 ****
int days = time(NULL) / 86400;
/* Check account expiry */
! if ((spw->sp_expire >= 0) && (days > spw->sp_expire))
return 0;
/* Check password expiry */
if ((spw->sp_lstchg >= 0) && (spw->sp_max >= 0) &&
! (days > (spw->sp_lstchg + spw->sp_max)))
! return 0;
}
#else
/* Shouldn...
2000 Sep 02
1
A bug in openssh-2.2.0-p1
...tem is a Linux-2.4.0-test7 with glibc-2.1.3. No PAM
is installed/used. It uses MD5 passwords and shadow with account expiration feature.
In handling of the latter, a probable bug was found. In auth.c, allowed_user(), there is a
code at the line 73, saying
...
/* Check password expiry */
if ((spw->sp_lstchg > 0) && (spw->sp_inact > 0) &&
(days > (spw->sp_lstchg + spw->sp_inact)))
return 0;
}
...
In my opinion, this is wrong. sp_inact tells how long the account may remain inactive until it is
locked, measured from the last login time. It is set to...
2002 Nov 20
0
[PATCH #9] Password expiration via /bin/passwd.
...@@
const char *hostname = NULL, *ipaddr = NULL;
char *shell;
int i;
-#ifdef WITH_AIXAUTHENTICATE
- char *loginmsg;
-#endif /* WITH_AIXAUTHENTICATE */
#if !defined(USE_PAM) && defined(HAVE_SHADOW_H) && \
!defined(DISABLE_SHADOW) && defined(HAS_SHADOW_EXPIRE)
struct spwd *spw;
+#endif
/* Shouldn't be called if pw is NULL, but better safe than sorry... */
if (!pw || !pw->pw_name)
return 0;
+ buffer_init(&expire_message);
+#if !defined(USE_PAM) && defined(HAVE_SHADOW_H) && \
+ !defined(DISABLE_SHADOW) && defined(HAS_SHAD...
2007 Jul 19
0
Sigmaplot 9
...mpt reply
</i>><i> Here is what appeared on the terminal :
</i>><i>
</i>><i> <a href="http://www.winehq.org/mailman/listinfo/wine-users">seal20 at PORTSEAL</a>:~$ wine .wine/drive_c/Program\
</i>><i> Files/SigmaPlot/SPW9/Spw.exe fixme:ole:CoRegisterMessageFilter stub
</i>><i> fixme:ole:CoRegisterMessageFilter stub
</i>><i> fixme:ole:CoRegisterMessageFilter stub
</i>><i> fixme:ole:CoGetTreatAsClass
</i>><i> ({6e73ca4a-ce63-11cf-b59c-0000929132ce},0x7fb9f6d...
2003 Sep 24
12
SSHD 3.7.1p2 on HP-UX
I have used SSHD from openssh-3.7.1p1 on HP-UX 11:11. It works
correctly and the entry in the logfile is:
Sep 24 07:01:20 garm sshd[6625]: Accepted password for japs from
192.38.97.131 port 2463
Next I have upgraded to openssh-3.7.1p2 and restarted SSHD. It does not
accept the password any more and the entries in the logfile are:
Sep 24 12:21:38 garm sshd[19542]: User japs not allowed because
2003 Oct 02
1
Permission denied (publickey,password,keyboard-interactive)
Hello,
I have recently downloaded and compiled openssh-3.7.1p2 on both HP-UX
10.20 and HP-UX 11.00. The compile went fine. Logging in on the system
used for the build works fine. However, logging in on a different
system (where the newly compiled openssh is installed) results in the
following error:
Permission denied (publickey,password,keyboard-interactive).
I have tried several things I
2003 Oct 03
1
OpenSSH 3.7.1p2 with OpenSSL 0.9.7c installation on HP-UX 11.0 enquiry?
Dear All,
I can install OpenSSH 3.7.1p2 with OpenSSL 0.9.7c on HP-UX 11.0 without
problem.
However, I find that all valid accounts are treated as "locked" (even
specify "AllowUsers USER1" in sshd_config) and can't make SSH connection to
the server.
Here is the message shown in syslog.log.
Oct 3 16:49:17 SERVER_NAME sshd[12994]: User USER1 not allowed because
account is
2000 May 12
0
SunOS 4.x port
...t;
+# include <sys/audit.h>
+# include <pwdadj.h>
+#endif
#if defined(HAVE_MD5_PASSWORDS) && !defined(HAVE_MD5_CRYPT)
# include "md5crypt.h"
#endif /* defined(HAVE_MD5_PASSWORDS) && !defined(HAVE_MD5_CRYPT) */
@@ -46,6 +51,9 @@
#ifdef HAVE_SHADOW_H
struct spwd *spw;
#endif
+#ifdef HAVE_GETPWANAM
+ struct passwd_adjunct *spw;
+#endif
#ifdef WITH_AIXAUTHENTICATE
char *authmsg;
char *loginmsg;
@@ -99,6 +107,16 @@
pw_password = spw->sp_pwdp;
}
#endif /* defined(HAVE_SHADOW_H) && !defined(DISABLE_SHADOW) */
+#if defined(HAVE_GETPWANAM)...
2005 Aug 26
0
Patch for UnixWare 7
...with or without
* modification, are permitted provided that the following conditions
--- openssh/auth.c.old 2005-06-17 08:29:12.595619001 -0700
+++ openssh/auth.c 2005-08-25 21:15:06.270527016 -0700
@@ -97,7 +97,11 @@
/* grab passwd field for locked account check */
#ifdef USE_SHADOW
if (spw != NULL)
+#ifdef HAVE_LIBIAF
+ passwd = get_iaf_password(pw);
+#else
passwd = spw->sp_pwdp;
+#endif /* HAVE_LIBIAF */
#else
passwd = pw->pw_passwd;
#endif
--- openssh/configure.ac.old 2005-08-23 17:11:26.000000000 -0700
+++ openssh/configure.ac 2005-08-24 16:51:30.297680013 -0700
@@ -...
2001 Oct 12
17
Please test snapshots for 3.0 release
Could everyone please test the latest snapshots as we will be making a
new release soon.
If you have any patches you would like us to consider, please resend
them to the list ASAP.
-d
--
| Damien Miller <djm at mindrot.org> \ ``E-mail attachments are the poor man's
| http://www.mindrot.org / distributed filesystem'' - Dan Geer
2003 Aug 26
1
Locked account checks and PAM
...char *hostname = NULL, *ipaddr = NULL, *passwd = NULL;
char *shell;
int i;
#if defined(HAVE_SHADOW_H) && !defined(DISABLE_SHADOW)
@@ -85,8 +85,7 @@ allowed_user(struct passwd * pw)
return 0;
#if defined(HAVE_SHADOW_H) && !defined(DISABLE_SHADOW)
- if (!options.use_pam)
- spw = getspnam(pw->pw_name);
+ spw = getspnam(pw->pw_name);
#ifdef HAS_SHADOW_EXPIRE
#define DAY (24L * 60 * 60) /* 1 day in seconds */
if (!options.use_pam && spw != NULL) {
2012 Nov 01
15
[RFC PATCH v2 0/3] mm/fs: Implement faster stable page writes on filesystems
Hi all,
This patchset makes some key modifications to the original ''stable page writes''
patchset. First, it provides users (devices and filesystems) of a
backing_dev_info the ability to declare whether or not it is necessary to
ensure that page contents cannot change during writeout, whereas the current
code assumes that this is true. Second, it relaxes the
1999 Jan 27
0
Encrypted passwords really necessary for PDC ?
...$osmbpasswd="$smbpasswd.old";
open(PW,"<$passwd");
while(<PW>) {
chop;
push @pw, $_;
}
close PW;
rename $smbpasswd, $osmbpasswd;
open(PW,"<$osmbpasswd");
while(<PW>) {
chop;
($uname,$uid,$pw1,$pw2,$flags,$lct,$fname)=split(':');
$spw{$uname}=$_;
}
close PW;
open(PW,">$smbpasswd");
foreach $account (@pw) {
($uname,$pw,$uid,$gid,$fname,$dir,$shell)=split(':',$account);
$pw1="XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX";
$pw2="XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX";
if(substr($uname,-1) eq "\...
2001 Nov 06
13
OpenSSH 3.0
OpenSSH 3.0 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
This release contains many portability bug-fixes (listed in the
ChangeLog) as well as several new features (listed below).
We would like to thank the
2007 Mar 19
1
sigmalot 9.0
...: the windows
is entitled "Graphics Page Library" and the message is "an error
occured during OLE operation. sp~pagwf.dllgpu_doc.cpp(671) 8e000010"
Then I click OK and got a new window "Microsoft Visual C++ Runtime
Library" message "Runtime Error! Program: .....Spw.exe this
application has requested runtime to terminate in an unusual way.
Please...."
In summary the application doesn't start.
i don't understand where the error comes from and so it is difficult to
fix it.
Did somebody run sigmaplot 9.0 under wine?? I saw some message
concernin...