Displaying 20 results from an estimated 800 matches similar to: "cc & no 64bit int patches"
2003 Feb 08
1
compare st_mode & 07777, or Aix dirs always differ
Under Aix directories have the mode 024xxxx instead of the customary
04xxxx. Because of this when you sync a directory to or from an Aix
system it's never up to date.
Here is a patch which fixes this. It causes rsync to look at only the
bits that chmod actually influences, 07777, when deciding whether or not
the modes differ.
I was surprised there wasn't an existing constant for 07777,
2009 Feb 12
2
[patch 1/3] add protocol extension to ATTR message
This patch adds all the missing commonly used UNIX attributes: st_dev,
st_ino, st_nlink, st_rdev, st_blocks, st_blksize, st_ctime. In
addition it extends st_atime and st_mtime to 64bits, and adds
nanosecond resolution to all three timestamps.
This is implemented as an extension to the ATTR message. This patch
alone is sufficient for SSHFS to be able to use these attributes. The
following two
2012 Dec 21
0
File Attachments for previous bug report
I have renamed all of the patch files to .txt, which should be acceptable
for the mailer daemon at mindrot, per Angel's suggestion.
I am attaching the patch files to the email, with the extra space removed
and a minor correction made.
Bill Parker (wp02855 at gmail dot com)
-------------- next part --------------
--- port-linux.c.orig 2012-12-19 17:40:53.231529475 -0800
+++ port-linux.c
2012 Dec 20
4
Deprecated calls to bzero() and index() found in OpenSSH 6.1p1
Hello All,
In reviewing source code for OpenSSH-6.1p1, I found instances
of deprecated library calls still within various source code files.
Examples of deprecated calls are: bzero() (replaced with memset()
which is ANSI compliant), index() (replaced with strchr() which
is also ANSI compliant).
In file 'auth2-jpake.c', I've replaced all the bzero() calls with
the equivalent
2001 Aug 21
0
[patch] 64 bit types in bitypes.h
[cc'ed to exports at crypto.com. This patch contains no changes to cryptographic
routines, it only changes how the package's configure script works]
[I'm not subscribed to this list, please cc me on responses. Thanks]
I noticed a minor configure problem in OpenSSH 2.9p2. Basically, configure
will check sys/types.h for various "sized" prototypes, and then it separately
2003 Aug 16
0
sftp-server (secure) chroot patch, comment fix
Accidently removed XXX comment. New patch below.
Regards
Magnus
--- openssh-3.6.1p2/sftp-server.c.org 2003-08-11 22:07:47.098650000 +0200
+++ openssh-3.6.1p2/sftp-server.c 2003-08-16 19:07:14.273582000 +0200
@@ -24,15 +24,24 @@
#include "includes.h"
RCSID("$OpenBSD: sftp-server.c,v 1.41 2003/03/26 04:02:51 deraadt Exp $");
+#define CHROOT
#include "buffer.h"
2009 Aug 27
1
[LLVMdev] A patch for refine the cmake system and also configure
>
> What do you want to improve exactly? Do you experience
> problems?
>
not only iterator.h but also DataTypes.h
I also put back iterator.h because at the trunk of llvm, iterator.h.in
and iterator.h.cmake still there:(
My improvement is now we didn't to generate DataTyes.h,
we just need to generate config.h,
And everything is configured at config.h, but not in seperate files.:)
2003 Sep 30
1
[PATCH] sftp-server (secure) chroot patch, 3.7.1p2 update
Hello all,
Here is an updated patch. I published the original patch published on
august 16.
--- openssh-3.7.1p2/sftp-server.c.org 2003-08-22 01:34:41.000000000
+0200
+++ openssh-3.7.1p2/sftp-server.c 2003-09-30 17:22:43.730402000 +0200
@@ -24,6 +24,7 @@
#include \"includes.h\"
RCSID(\"$OpenBSD: sftp-server.c,v 1.43 2003/06/25 22:39:36 miod Exp
$\");
+#define CHROOT
2003 Feb 19
0
FW: compare st_mode & 07777, or Aix dirs always differ
>jw schultz [mailto:jw@pegasys.ws] wrote:
>On Fri, Feb 07, 2003 at 11:15:57AM -0500, Roderick Schertler wrote:
>> Under Aix directories have the mode 024xxxx instead of the customary
>> 04xxxx. Because of this when you sync a directory to or from an Aix
>> system it's never up to date.
>>
>> Here is a patch which fixes this. It causes rsync to look at
2003 Aug 16
0
sftp-server (secure) chroot patch?
Hello,
I know this chroot issue has been brought up many times before on this list. I saw that the contribibuted chroot-patch was removed from the contrib directory because it always was out of date. The main reason was of course was that sftp-server has to be run as root to be able to do the chroot() call? Most of you are against chroot (since it isnt in the src) but I believe a lot of users
2002 Apr 21
3
OpenSSH Security Advisory (adv.token)
A buffer overflow exists in OpenSSH's sshd if sshd has been compiled
with Kerberos/AFS support and KerberosTgtPassing or AFSTokenPassing
has been enabled in the sshd_config file. Ticket and token passing
is not enabled by default.
1. Systems affected:
All Versions of OpenSSH compiled with AFS/Kerberos support
and ticket/token passing enabled contain a buffer overflow.
2002 Apr 21
3
OpenSSH Security Advisory (adv.token)
A buffer overflow exists in OpenSSH's sshd if sshd has been compiled
with Kerberos/AFS support and KerberosTgtPassing or AFSTokenPassing
has been enabled in the sshd_config file. Ticket and token passing
is not enabled by default.
1. Systems affected:
All Versions of OpenSSH compiled with AFS/Kerberos support
and ticket/token passing enabled contain a buffer overflow.
2006 Mar 20
1
Rsync acl patch 1.113 compilation problems on cygwin
Hi,
Recently, there have been some fundamental achievements regarding
acl-support on the cygwin platform. I thought that it would be convenient to
offer an acl-patch enabled rsync as a part of the cwrsync package (a yet
another minimalist rsync on cygwin solution). I get some compilation errors.
What I did:
- Downloaded acl patch v1.113 from rsync site
- Run commands below In the rsync source
1999 Jul 02
1
preexec: return code not used? (PR#18576)
T.D.Lee@durham.ac.uk wrote:
>
>
> But we'd like to go one step further and have the return code from preexec
> be used to continue or abort the connection being established. The script
> above would be modified to generate this return code.
>
> Looking through the source code (smbd/service.c), it doesn't seem to check
> the return code (calling smbrun to do the
2004 Mar 05
2
Problem with --link-dest when syncing AIX to Linux
Hello,
i'm using rsync 2.6.0 for daily-syncing some remote AIX 5.2 machine to a
local linux (RH 7.3) with using the --link-dest option for saving space
on incremental backups.
Even if there are no changes on the AIX machine, all files are newly
transferred on every new sync.
My test scenario (actisi=remote aix machine, actisa=local linux machine):
=====> Initial rsync
[mma@actisa
2014 Apr 20
2
bad bignum encoding for curve25519-sha256@libssh.org
Hi,
So I screwed up when writing the support for the curve25519 KEX method
that doesn't depend on OpenSSL's BIGNUM type - a bug in my code left
leading zero bytes where they should have been skipped. The impact of
this is that OpenSSH 6.5 and 6.6 will fail during key exchange with a
peer that implements curve25519-sha256 at libssh.org properly about 0.2%
of the time (one in every 512ish
2011 Sep 29
3
grep and PCRE fun
Hello,
I think I've found a bug in the C function do_grep located in
src/main/grep.c. It seems to affect both the latest revisions of
R-2-13-branch and trunk when compiling R without optimizations and
with it's own version of pcre located in src/extra, at least on ubuntu
10.04.
According to the pcre_exec API (I presume the later versions), the
ovecsize argument must be a multiple of 3 ,
2005 Nov 04
1
[Bug 1110] memory leak in bufaux.c, function: buffer_put_bignum_ret
http://bugzilla.mindrot.org/show_bug.cgi?id=1110
Summary: memory leak in bufaux.c, function: buffer_put_bignum_ret
Product: Portable OpenSSH
Version: 4.2p1
Platform: Other
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: bitbucket at mindrot.org
2005 Nov 04
1
[Bug 1109] Memory leak in file: bufaux.c, function: buffer_get_bignum2_ret
http://bugzilla.mindrot.org/show_bug.cgi?id=1109
Summary: Memory leak in file: bufaux.c, function:
buffer_get_bignum2_ret
Product: Portable OpenSSH
Version: 4.2p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: bitbucket at
2006 Sep 12
1
openssh (OpenBSD) , bsdauth and tis authsrv
nuqneH,
I've tried using TIS authsrv authentication via bsd auth and found
it quite limited. The most important restriction it does not log
ip and fqdn of the remote peer, nor the application name, to
the authentication server. It does not matter much for TIS authsrv,
but since other applications do provide such information, our
authsrv version uses it for extra authentication restrictions.