diff options
author | Darren Tucker <dtucker@zip.com.au> | 2007-08-13 23:11:56 +1000 |
---|---|---|
committer | Darren Tucker <dtucker@zip.com.au> | 2007-08-13 23:11:56 +1000 |
commit | 2d9636471bb75c10342dbabcc2f6a0b2e60cca01 (patch) | |
tree | 4f67c93518adef9aaf947eb97720b4ef03032118 | |
parent | 8acb3b665bf7f27207ce9694826029165f8c0cd6 (diff) |
- (dtucker) [session.c] Bug #1339: ensure that pam_setcred() is always
called with PAM_ESTABLISH_CRED at least once, which resolves a problem
with pam_dhkeys. Patch from David Leonard, ok djm@
-rw-r--r-- | ChangeLog | 7 | ||||
-rw-r--r-- | session.c | 4 |
2 files changed, 8 insertions, 3 deletions
@@ -1,3 +1,8 @@ | |||
1 | 20070813 | ||
2 | - (dtucker) [session.c] Bug #1339: ensure that pam_setcred() is always | ||
3 | called with PAM_ESTABLISH_CRED at least once, which resolves a problem | ||
4 | with pam_dhkeys. Patch from David Leonard, ok djm@ | ||
5 | |||
1 | 20070810 | 6 | 20070810 |
2 | - (dtucker) [auth-pam.c] Use sigdie here too. ok djm@ | 7 | - (dtucker) [auth-pam.c] Use sigdie here too. ok djm@ |
3 | - (dtucker) [configure.ac] Bug #1343: Set DISABLE_FD_PASSING for QNX6. From | 8 | - (dtucker) [configure.ac] Bug #1343: Set DISABLE_FD_PASSING for QNX6. From |
@@ -3147,4 +3152,4 @@ | |||
3147 | OpenServer 6 and add osr5bigcrypt support so when someone migrates | 3152 | OpenServer 6 and add osr5bigcrypt support so when someone migrates |
3148 | passwords between UnixWare and OpenServer they will still work. OK dtucker@ | 3153 | passwords between UnixWare and OpenServer they will still work. OK dtucker@ |
3149 | 3154 | ||
3150 | $Id: ChangeLog,v 1.4724 2007/08/10 04:36:12 dtucker Exp $ | 3155 | $Id: ChangeLog,v 1.4725 2007/08/13 13:11:56 dtucker Exp $ |
@@ -1310,7 +1310,7 @@ do_setusercontext(struct passwd *pw) | |||
1310 | # ifdef USE_PAM | 1310 | # ifdef USE_PAM |
1311 | if (options.use_pam) { | 1311 | if (options.use_pam) { |
1312 | do_pam_session(); | 1312 | do_pam_session(); |
1313 | do_pam_setcred(0); | 1313 | do_pam_setcred(use_privsep); |
1314 | } | 1314 | } |
1315 | # endif /* USE_PAM */ | 1315 | # endif /* USE_PAM */ |
1316 | if (setusercontext(lc, pw, pw->pw_uid, | 1316 | if (setusercontext(lc, pw, pw->pw_uid, |
@@ -1352,7 +1352,7 @@ do_setusercontext(struct passwd *pw) | |||
1352 | */ | 1352 | */ |
1353 | if (options.use_pam) { | 1353 | if (options.use_pam) { |
1354 | do_pam_session(); | 1354 | do_pam_session(); |
1355 | do_pam_setcred(0); | 1355 | do_pam_setcred(use_privsep); |
1356 | } | 1356 | } |
1357 | # endif /* USE_PAM */ | 1357 | # endif /* USE_PAM */ |
1358 | # if defined(WITH_IRIX_PROJECT) || defined(WITH_IRIX_JOBS) || defined(WITH_IRIX_ARRAY) | 1358 | # if defined(WITH_IRIX_PROJECT) || defined(WITH_IRIX_JOBS) || defined(WITH_IRIX_ARRAY) |