summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2003-09-02 23:12:06 +1000
committerDamien Miller <djm@mindrot.org>2003-09-02 23:12:06 +1000
commitf4b6f10deda4413528ddb5ffbb69c5da84ae58b9 (patch)
treee38a7d136c6f303ff1f4cfbb8d094cb8a9799ada
parent0b56b45d6f54215718d0547581247fdc879c527b (diff)
- (djm) Don't initialise pam_conv structures inline. Avoids HP/UX compiler
error. Part of Bug #423, patch from michael_steffens AT hp.com
-rw-r--r--ChangeLog4
-rw-r--r--auth-pam.c12
2 files changed, 12 insertions, 4 deletions
diff --git a/ChangeLog b/ChangeLog
index 4e2bdda64..c80b816f0 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -47,6 +47,8 @@
47 - markus@cvs.openbsd.org 2003/09/01 20:44:54 47 - markus@cvs.openbsd.org 2003/09/01 20:44:54
48 [auth2-gss.c] 48 [auth2-gss.c]
49 fix leak 49 fix leak
50 - (djm) Don't initialise pam_conv structures inline. Avoids HP/UX compiler
51 error. Part of Bug #423, patch from michael_steffens AT hp.com
50 52
5120030829 5320030829
52 - (bal) openbsd-compat/ clean up. Considate headers, add in Id on our 54 - (bal) openbsd-compat/ clean up. Considate headers, add in Id on our
@@ -962,4 +964,4 @@
962 - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo. 964 - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo.
963 Report from murple@murple.net, diagnosis from dtucker@zip.com.au 965 Report from murple@murple.net, diagnosis from dtucker@zip.com.au
964 966
965$Id: ChangeLog,v 1.2934 2003/09/02 13:09:41 djm Exp $ 967$Id: ChangeLog,v 1.2935 2003/09/02 13:12:06 djm Exp $
diff --git a/auth-pam.c b/auth-pam.c
index 08b88f0dd..3f3fbf28c 100644
--- a/auth-pam.c
+++ b/auth-pam.c
@@ -31,7 +31,7 @@
31 31
32/* Based on $FreeBSD: src/crypto/openssh/auth2-pam-freebsd.c,v 1.11 2003/03/31 13:48:18 des Exp $ */ 32/* Based on $FreeBSD: src/crypto/openssh/auth2-pam-freebsd.c,v 1.11 2003/03/31 13:48:18 des Exp $ */
33#include "includes.h" 33#include "includes.h"
34RCSID("$Id: auth-pam.c,v 1.68 2003/08/26 01:58:16 dtucker Exp $"); 34RCSID("$Id: auth-pam.c,v 1.69 2003/09/02 13:12:06 djm Exp $");
35 35
36#ifdef USE_PAM 36#ifdef USE_PAM
37#include <security/pam_appl.h> 37#include <security/pam_appl.h>
@@ -199,7 +199,7 @@ sshpam_thread(void *ctxtp)
199{ 199{
200 struct pam_ctxt *ctxt = ctxtp; 200 struct pam_ctxt *ctxt = ctxtp;
201 Buffer buffer; 201 Buffer buffer;
202 struct pam_conv sshpam_conv = { sshpam_thread_conv, ctxt }; 202 struct pam_conv sshpam_conv;
203#ifndef USE_POSIX_THREADS 203#ifndef USE_POSIX_THREADS
204 const char *pam_user; 204 const char *pam_user;
205 205
@@ -207,6 +207,9 @@ sshpam_thread(void *ctxtp)
207 setproctitle("%s [pam]", pam_user); 207 setproctitle("%s [pam]", pam_user);
208#endif 208#endif
209 209
210 sshpam_conv.conv = sshpam_thread_conv;
211 sshpam_conv.appdata_ptr = ctxt;
212
210 buffer_init(&buffer); 213 buffer_init(&buffer);
211 sshpam_err = pam_set_item(sshpam_handle, PAM_CONV, 214 sshpam_err = pam_set_item(sshpam_handle, PAM_CONV,
212 (const void *)&sshpam_conv); 215 (const void *)&sshpam_conv);
@@ -634,7 +637,10 @@ pam_chauthtok_conv(int n, const struct pam_message **msg,
634void 637void
635do_pam_chauthtok(void) 638do_pam_chauthtok(void)
636{ 639{
637 struct pam_conv pam_conv = { pam_chauthtok_conv, NULL }; 640 struct pam_conv pam_conv;
641
642 pam_conv.conv = pam_chauthtok_conv;
643 pam_conv.appdata_ptr = NULL;
638 644
639 if (use_privsep) 645 if (use_privsep)
640 fatal("Password expired (unable to change with privsep)"); 646 fatal("Password expired (unable to change with privsep)");