Displaying 20 results from an estimated 9000 matches similar to: "[Bug 2410] New: auth-chall.c - "<stdarg.h>" #included twice"
2012 Jan 19
3
RFC PATCH: bring OpenBSD stdarg in line with FreeBSD one
Having an absolute path in a #include confuses distcc''s pump mode.
Since AFAICS OpenBSD''s stdarg handling uses the builtins, I think we
should just treat it like we do NetBSD.
I don''t have an OpenBSD box to test on, though. :( Any OpenBSD
enthusiasts care to comment?
Tim.
diff --git a/xen/include/xen/stdarg.h b/xen/include/xen/stdarg.h
index 57e2c0e..cb870ac 100644
2008 Mar 09
1
kernel.h error stdarg.h
Hello,
if compiling the driver for my ralink wlan card or compiling the driver
for my 5-1 card reader, I get the following error message.
./include/linux/kernel.h:10:20: error: stdarg.h: No such file or
directory
Is there something broken on my system?
# rpm -qa | grep kernel
kernel-devel-2.6.18-53.1.14.el5
kernel-headers-2.6.18-53.1.14.el5
kernel-2.6.18-53.1.14.el5
# uname -a
Linux hobbingen
2010 Nov 05
1
Missing stdarg.h include
Hi,
building current git fails with
gcc -std=gnu99 -std=gnu99 -I.. -I/usr/lib/ocaml -I../ocaml -I../src -I../src -g -O2 -fPIC -Wall -c guestfs_c_actions.c
In file included from ../src/guestfs.h:84,
from guestfs_c_actions.c:35:
../src/guestfs-actions.h:28: error: expected declaration specifiers or '...' before 'va_list'
This is fixed by an
#include
2013 Jun 06
1
[supermin PATCH] Add stdarg.h to fix issues with va_start.
---
Prevents errors like these:
http://sources.gentoo.org/cgi-bin/viewvc.cgi/gentoo-x86/sys-apps/shadow/files/shadow-4.1.5-stdarg.patch?view=diff&r1=text&tr1=1.1&r2=text&tr2=1.1&diff_format=s
helper/utils.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/helper/utils.c b/helper/utils.c
index 67d8ad2..c211a03 100644
--- a/helper/utils.c
+++ b/helper/utils.c
@@ -16,10
2007 Sep 10
1
4.7p1 password auth broken on SCO OSR6
openssh 4.7p1
SCO OSR6
Password authentication is non-functional. This seems dependent on
USE_LIBIAF which further depends on HAVE_LIBIAF (in defines.h), but
there is no longer any code in configure to define the latter. Building
with HAVE_LIBIAF defined enables password authentication, but only for
non-long (<9 char) passwords, even though UNIXWARE_LONG_PASSWORDS seems
to be defined. I
2015 May 21
7
[Bug 2402] New: Missing include in kex.h results in compilation error due to unknown type
https://bugzilla.mindrot.org/show_bug.cgi?id=2402
Bug ID: 2402
Summary: Missing include in kex.h results in compilation error
due to unknown type
Product: Portable OpenSSH
Version: 6.8p1
Hardware: Sparc
OS: Solaris
Status: NEW
Severity: normal
Priority: P5
Component:
2015 Dec 08
3
compiler-rt fails to find <stdarg.h> on FreeBSD
I'm unsure why this is failing this week, but when I build for FreeBSD
HEAD, I now get a failure to find <stdarg.h>. Very strange. Maybe its
missing a -I /usr/include somewhere?
[1950/2811] Building CXX object
projects/compiler-rt/lib/tsan/CMakeFiles/clang_rt.tsan-x86_64.dir/rtl/tsan_interceptors.cc.o
FAILED: /usr/bin/CC -D__STDC_CONSTANT_MACROS -D__STDC_FORMAT_MACROS
2008 Jul 30
1
5.1p build problem on SCO OSR6
Build of 5.1p1 fails on SCO OSR6 with the error:
UX:acomp: ERROR: "addrmatch.c", line 100: undefined struct/union member: sin6_scope_id
configure checks for presence of struct sockaddr_in6 and uses the system
declaration if found (via #define HAVE_STRUCT_SOCKADDR_IN6 in config.h)
If not found, the struct is declared in openbsd-compat/fake-rfc2553.h.
OSR6 has struct sockaddr_in6 but it
2005 Aug 29
1
greater than 8 character passwords on SCO OSR6
I read the exchange regarding > 8 char passwords on Unixware from the
end of June.
Is anything being done to add support for >8 character passwords on SCO
OSR6 (in udk mode)? I have it working by calling osr5bigcrypt(), instead
of bigcrypt(), in openbsd-compat/xcrypt.c and linking with -lcrypt.
libcrypt has bigcrypt(), but for whatever reason, openssh built with it
fails to authenticate
2010 Mar 05
1
About the interaction A:B
Suppose, 'fr' is data.frame with columns 'Y', 'A' and 'B'. 'A' has levels 'Aa'
'Ab' and 'Ac', and 'B' has levels 'Ba', 'Bb', 'Bc' and 'Bd'. 'Y'
columns are numbers.
I tried the following three sets of commands. I understand that A*B is
equivalent to A+B+A:B. However, A:B in A+B+A:B is
2001 Feb 21
0
Private key files closed twice --
=====
I believe that each private key file read is closed twice as
load_private_key(filename, ...)
fd = open(filename, ...)
...
load_private_key_rsa1(fd, ...)
...
load_private_key_ssh2(fd, ...)
...
close(fd);
Unfortunately, "load_private_key_rsa1" and "load_private_key_ssh2" also
close the file. It would simplest to remove the `close()'s in the rsa2
and ssh2
2015 Mar 02
127
[Bug 2360] New: Bugs intended to be fixed in 6.9
https://bugzilla.mindrot.org/show_bug.cgi?id=2360
Bug ID: 2360
Summary: Bugs intended to be fixed in 6.9
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: Linux
Status: NEW
Keywords: meta
Severity: enhancement
Priority: P5
Component: Miscellaneous
2002 Jun 26
0
OpenSSH Security Advisory (adv.iss)
1. Versions affected:
All versions of OpenSSH's sshd between 2.9.9 and 3.3
contain an input validation error that can result in
an integer overflow and privilege escalation.
OpenSSH 3.4 and later are not affected.
OpenSSH 3.2 and later prevent privilege escalation
if UsePrivilegeSeparation is enabled in sshd_config.
OpenSSH 3.3 enables
2002 Jun 26
0
Revised OpenSSH Security Advisory (adv.iss)
This is the 2nd revision of the Advisory.
1. Versions affected:
Serveral versions of OpenSSH's sshd between 2.3.1 and 3.3
contain an input validation error that can result in an
integer overflow and privilege escalation.
All versions between 2.3.1 and 3.3 contain a bug in the
PAMAuthenticationViaKbdInt code.
All versions between 2.9.9 and 3.3
2002 Jun 26
1
Revised OpenSSH Security Advisory (adv.iss)
This is the 2nd revision of the Advisory.
1. Versions affected:
Serveral versions of OpenSSH's sshd between 2.3.1 and 3.3
contain an input validation error that can result in an
integer overflow and privilege escalation.
All versions between 2.3.1 and 3.3 contain a bug in the
PAMAuthenticationViaKbdInt code.
All versions between 2.9.9 and 3.3
2002 Jun 26
2
OpenSSH Security Advisory (adv.iss)
1. Versions affected:
All versions of OpenSSH's sshd between 2.9.9 and 3.3
contain an input validation error that can result in
an integer overflow and privilege escalation.
OpenSSH 3.4 and later are not affected.
OpenSSH 3.2 and later prevent privilege escalation
if UsePrivilegeSeparation is enabled in sshd_config.
OpenSSH 3.3 enables
2015 Mar 24
12
[Bug 2370] New: make fails with "rmd160.c", line 35.10: 1506-296 (S) #include file <endian.h> not found. when using --without-openssl on AIX
https://bugzilla.mindrot.org/show_bug.cgi?id=2370
Bug ID: 2370
Summary: make fails with "rmd160.c", line 35.10: 1506-296 (S)
#include file <endian.h> not found. when using
--without-openssl on AIX
Product: Portable OpenSSH
Version: 6.9p1
Hardware: Other
OS: AIX
2001 Mar 13
0
[PATCH] openssh 2.5.1p2 TIS authserv support
Hi,
We have updated our TIS authserv support patch for OpenSSH 2.5.1p2. You'll
find it attached to my message.
--
Bazsi
PGP info: KeyID 9AF8D0A9 Fingerprint CD27 CFB0 802C 0944 9CFD 804E C82C 8EB1
-------------- next part --------------
diff -urN openssh-2.5.1p2/Makefile.in openssh-2.5.1p2-tis/Makefile.in
--- openssh-2.5.1p2/Makefile.in Sun Feb 18 20:13:33 2001
+++
2001 Nov 04
2
OPIE patch for current CVS
I redid my previous OPIE patch for the current ssh tree. It seems
to work fine here, and I'ld love to see it merged before the 3.0
release.
Wichert.
diff -x CVS -wNur ../cvs/other/openssh_cvs/Makefile.in openssh_cvs/Makefile.in
--- ../cvs/other/openssh_cvs/Makefile.in Mon Oct 22 02:53:59 2001
+++ openssh_cvs/Makefile.in Sun Nov 4 01:18:19 2001
@@ -50,7 +50,7 @@
SSHOBJS= ssh.o
2003 Oct 21
0
Challenge response auth & more devices
Hello all,
during tests of my SecurID patch I found a small mistake (maybe)
in initialization of kbd-int devices.
When kbdintctxt->device->init_ctx(authctxt) returns NULL
whole challenge response authentication is stopped
regardless availability of next devices.
Small patch solving this situation is attached.
____________________________________________________________
Vyzkou?ejte pohodl?