Displaying 20 results from an estimated 1000 matches similar to: "[Bug 418] New: Allow to build on systems without IPV6"
2002 Jun 28
0
[Bug 316] New: ifdefs for systems without IPV6
http://bugzilla.mindrot.org/show_bug.cgi?id=316
Summary: ifdefs for systems without IPV6
Product: Portable OpenSSH
Version: -current
Platform: Other
OS/Version: FreeBSD
Status: NEW
Severity: normal
Priority: P2
Component: Build system
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy:
2002 Dec 29
0
[Bug 460] New: ut_addr_v6 not used
http://bugzilla.mindrot.org/show_bug.cgi?id=460
Summary: ut_addr_v6 not used
Product: Portable OpenSSH
Version: 3.5p1
Platform: All
URL: http://bugs.debian.org/167867
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at
2002 Nov 20
0
[PATCH] Updated patch to rsync for Stratus VOS
This is an updated version of my patches to get rsync to build
and run its tests on the Stratus VOS operating system.
I have updated this patch to apply cleanly to the current copy
of HEAD. I also ran the test suite and discovered that I needed
to tweak a few spots in the Makefile to append the executable
suffix (VOS is one of the few systems that has a required
executable suffix). There are a
2000 Jan 17
1
pre27 compilation fails on Sol7 box
Something strange happens when I compile the pre27 SSH:
ocal/ssh//include -DETCDIR=\"/usr/local/ssh//etc\" \
-DSSH_PROGRAM=\"/usr/local/ssh//bin/ssh\" \
-DSSH_ASKPASS_DEFAULT=\"/usr/local/ssh//libexec/ssh/ssh-askpass\" \
-DHAVE_CONFIG_H -c atomicio.c
In file included from includes.h:106,
from atomicio.c:26:
fake-socket.h:30: parse error before
2007 Jan 06
3
Re: [nut-commits] svn commit r708 - in trunk: . clients server
With the Ipv6 patch (r708), I get:
upsclient.c: In function `upscli_connect':
upsclient.c:469: `AI_ADDRCONFIG' undeclared (first use in this function)
upsclient.c:469: (Each undeclared identifier is reported only once
upsclient.c:469: for each function it appears in.)
Even if it doesn't break IPv4 support, it may break portability, as
IPv6 seems to require specific functions that are
2000 Mar 07
2
patch for openssh-1.2.2p1
Hi,
openssh-1.2.2p1 seems to have 2 problems on ipv6 (and
ipv4 mapped addresses).
1. "BREAKIN ATTEMPT" warnings from ipv4 node
2. X forwarding
The following patche fixes them.
Thanks.
diff -ru openssh-1.2.2p1/canohost.c openssh-1.2.2p1-20000308/canohost.c
--- openssh-1.2.2p1/canohost.c Fri Jan 14 13:45:48 2000
+++ openssh-1.2.2p1-20000308/canohost.c Wed Mar 8 00:25:18 2000
@@
2002 May 20
0
Openssh 3.2.2p1 KRB5 addition
The Kerberos V support may still fail on hosts with two or more
interfaces.
Regards
Markus
-------------- next part --------------
*** auth-krb5.c.orig Mon May 20 11:51:57 2002
--- auth-krb5.c Mon May 20 11:53:34 2002
***************
*** 38,43 ****
--- 38,44 ----
#include "servconf.h"
#include "uidswap.h"
#include "auth.h"
+ #include "canohost.h"
2004 Apr 01
1
[patch] net/rsync: problems in client name lookup code
>Submitter-Id: current-users
>Originator: Alex Vasylenko
>Organization:
>Confidential: no
>Synopsis: [patch] net/rsync: problems in client name lookup code
>Severity: non-critical
>Priority: low
>Category: ports
>Class: sw-bug
>Release: FreeBSD 4.8-RELEASE-p16 i386
>Environment:
System: FreeBSD 4.8-RELEASE-p16
>Description:
rsync does reverse name
2008 Jul 30
1
5.1p build problem on SCO OSR6
Build of 5.1p1 fails on SCO OSR6 with the error:
UX:acomp: ERROR: "addrmatch.c", line 100: undefined struct/union member: sin6_scope_id
configure checks for presence of struct sockaddr_in6 and uses the system
declaration if found (via #define HAVE_STRUCT_SOCKADDR_IN6 in config.h)
If not found, the struct is declared in openbsd-compat/fake-rfc2553.h.
OSR6 has struct sockaddr_in6 but it
2002 Oct 21
2
[Bug 418] Allow to build on systems without IPV6
http://bugzilla.mindrot.org/show_bug.cgi?id=418
dirk.meyer at dinoex.sub.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Component|Miscellaneous |Build system
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the
2008 Jul 24
2
[Bug 1491] New: no field sin6_scope_id on AIX 4.3.3
https://bugzilla.mindrot.org/show_bug.cgi?id=1491
Summary: no field sin6_scope_id on AIX 4.3.3
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.1p1
Platform: PPC
OS/Version: AIX
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: unassigned-bugs at mindrot.org
2019 Sep 15
0
[PATCH nbdkit 4/4] reflection: Enhance plugin to support client address mode.
---
.../reflection/nbdkit-reflection-plugin.pod | 23 ++++-
plugins/reflection/reflection.c | 88 +++++++++++++++++++
tests/Makefile.am | 2 +
tests/test-reflection-address.sh | 63 +++++++++++++
4 files changed, 174 insertions(+), 2 deletions(-)
diff --git a/plugins/reflection/nbdkit-reflection-plugin.pod
2016 May 31
2
[Bug 1071] New: nftables: set does not work within inet table with option flags interval
https://bugzilla.netfilter.org/show_bug.cgi?id=1071
Bug ID: 1071
Summary: nftables: set does not work within inet table with
option flags interval
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: nft
2010 Dec 07
0
[PATCH]: A daemon to support HyperV KVP functionality
From: K. Y. Srinivasan <ksrinivasan at novell.com>
Subject: An implementation of key/value pair feature (KVP) for Linux
on HyperV.
Signed-off-by: K. Y. Srinivasan <ksrinivasan at novell.com>
Index: linux.trees.git/drivers/staging/hv/tools/hv_kvp_daemon.c
===================================================================
--- /dev/null 1970-01-01 00:00:00.000000000 +0000
+++
2010 Dec 07
0
[PATCH]: A daemon to support HyperV KVP functionality
From: K. Y. Srinivasan <ksrinivasan at novell.com>
Subject: An implementation of key/value pair feature (KVP) for Linux
on HyperV.
Signed-off-by: K. Y. Srinivasan <ksrinivasan at novell.com>
Index: linux.trees.git/drivers/staging/hv/tools/hv_kvp_daemon.c
===================================================================
--- /dev/null 1970-01-01 00:00:00.000000000 +0000
+++
2010 Dec 08
0
No subject
This daemon gathers all the guest specific information needed to support =
the
HyperV KVP functionality. This daemon communicates with the kernel
component via a netlink channel.
Signed-off-by: ksrinivasan <ksrinivasan at novell.com>
---
drivers/staging/hv/tools/hv_kvp_daemon.c | 470 ++++++++++++++++++++++++++=
++++
1 files changed, 470 insertions(+), 0 deletions(-)
create mode 100644
2010 Dec 08
0
No subject
This daemon gathers all the guest specific information needed to support =
the
HyperV KVP functionality. This daemon communicates with the kernel
component via a netlink channel.
Signed-off-by: ksrinivasan <ksrinivasan at novell.com>
---
drivers/staging/hv/tools/hv_kvp_daemon.c | 470 ++++++++++++++++++++++++++=
++++
1 files changed, 470 insertions(+), 0 deletions(-)
create mode 100644
2010 Dec 17
0
[PATCH 4/4] Staging: hv: Add a user-space daemon to support key/value pair (KVP)
All guest specific data gathering is implemented in a user-mode daemon.
The kernel component of KVP passes the "key" to this daemon and
the daemon is responsible for passing back the corresponding
value. This daemon communicates with the kernel
component via a netlink channel.
Signed-off-by: K. Y. Srinivasan <ksrinivasan at novell.com>
---
drivers/staging/hv/tools/hv_kvp_daemon.c
2010 Dec 17
0
[PATCH 4/4] Staging: hv: Add a user-space daemon to support key/value pair (KVP)
All guest specific data gathering is implemented in a user-mode daemon.
The kernel component of KVP passes the "key" to this daemon and
the daemon is responsible for passing back the corresponding
value. This daemon communicates with the kernel
component via a netlink channel.
Signed-off-by: K. Y. Srinivasan <ksrinivasan at novell.com>
---
drivers/staging/hv/tools/hv_kvp_daemon.c
2002 Nov 17
0
[PATCH] Patches to rsync-2.5.5 for Stratus VOS (update)
This is a corrected version of the patch I originally submitted
on September 5th, and resubmitted on October 14th. I have
removed the changes that added $(CFLAGS) to the link-only
invocations of gcc. Otherwise, the patch is the same as before.
My thanks to Paul (prj@po.cwru.edu) for noticing my error and
kindly correcting me.
** text of original letter, with corrections **
I had to make some