summaryrefslogtreecommitdiff
path: root/openbsd-compat/bsd-cray.c
diff options
context:
space:
mode:
Diffstat (limited to 'openbsd-compat/bsd-cray.c')
-rw-r--r--openbsd-compat/bsd-cray.c22
1 files changed, 11 insertions, 11 deletions
diff --git a/openbsd-compat/bsd-cray.c b/openbsd-compat/bsd-cray.c
index f1bbd7dec..1528ab6e1 100644
--- a/openbsd-compat/bsd-cray.c
+++ b/openbsd-compat/bsd-cray.c
@@ -1,10 +1,10 @@
1/* 1/*
2 * $Id: bsd-cray.c,v 1.17 2007/08/15 09:17:43 dtucker Exp $ 2 * $Id: bsd-cray.c,v 1.17 2007/08/15 09:17:43 dtucker Exp $
3 * 3 *
4 * bsd-cray.c 4 * bsd-cray.c
5 * 5 *
6 * Copyright (c) 2002, Cray Inc. (Wendy Palm <wendyp@cray.com>) 6 * Copyright (c) 2002, Cray Inc. (Wendy Palm <wendyp@cray.com>)
7 * Significant portions provided by 7 * Significant portions provided by
8 * Wayne Schroeder, SDSC <schroeder@sdsc.edu> 8 * Wayne Schroeder, SDSC <schroeder@sdsc.edu>
9 * William Jones, UTexas <jones@tacc.utexas.edu> 9 * William Jones, UTexas <jones@tacc.utexas.edu>
10 * 10 *
@@ -268,7 +268,7 @@ cray_setup (uid_t uid, char *username, const char *command)
268 usent.uname = username; 268 usent.uname = username;
269 usent.host = hostname; 269 usent.host = hostname;
270 usent.ttyn = ttyn; 270 usent.ttyn = ttyn;
271 usent.caller = IA_SSHD; 271 usent.caller = IA_SSHD;
272 usent.pswdlist = &pwdacm; 272 usent.pswdlist = &pwdacm;
273 usent.ueptr = &ue; 273 usent.ueptr = &ue;
274 usent.flags = IA_INTERACTIVE | IA_FFLAG; 274 usent.flags = IA_INTERACTIVE | IA_FFLAG;
@@ -352,7 +352,7 @@ cray_setup (uid_t uid, char *username, const char *command)
352 /* 352 /*
353 * These are failed return codes from ia_user() 353 * These are failed return codes from ia_user()
354 */ 354 */
355 switch (ia_rcode) 355 switch (ia_rcode)
356 { 356 {
357 case IA_BADAUTH: 357 case IA_BADAUTH:
358 printf("Bad authorization, access denied.\n"); 358 printf("Bad authorization, access denied.\n");
@@ -407,7 +407,7 @@ cray_setup (uid_t uid, char *username, const char *command)
407 */ 407 */
408 ia_failure(&fsent, &fret); 408 ia_failure(&fsent, &fret);
409 409
410 exit(1); 410 exit(1);
411 } 411 }
412 412
413 ia_mlsrcode = IA_NORMAL; 413 ia_mlsrcode = IA_NORMAL;
@@ -441,7 +441,7 @@ cray_setup (uid_t uid, char *username, const char *command)
441 * There is no return because ia_failure exits. 441 * There is no return because ia_failure exits.
442 */ 442 */
443 ia_failure(&fsent,&fret); 443 ia_failure(&fsent,&fret);
444 exit(1); 444 exit(1);
445 } 445 }
446 446
447 /* Provide login status information */ 447 /* Provide login status information */
@@ -526,7 +526,7 @@ cray_setup (uid_t uid, char *username, const char *command)
526 break; 526 break;
527 default: 527 default:
528 valid_acct = nam2acid(acct_name); 528 valid_acct = nam2acid(acct_name);
529 if (valid_acct == -1) 529 if (valid_acct == -1)
530 printf( 530 printf(
531 "Account id not found for" 531 "Account id not found for"
532 " account name \"%s\"\n\n", 532 " account name \"%s\"\n\n",
@@ -576,9 +576,9 @@ cray_setup (uid_t uid, char *username, const char *command)
576 exit(1); 576 exit(1);
577 } 577 }
578 578
579 /* 579 /*
580 * Now set shares, quotas, limits, including CPU time for the 580 * Now set shares, quotas, limits, including CPU time for the
581 * (interactive) job and process, and set up permissions 581 * (interactive) job and process, and set up permissions
582 * (for chown etc), etc. 582 * (for chown etc), etc.
583 */ 583 */
584 if (setshares(ue.ue_uid, valid_acct, printf, 0, 0)) { 584 if (setshares(ue.ue_uid, valid_acct, printf, 0, 0)) {
@@ -656,7 +656,7 @@ drop_cray_privs()
656 usrv.sv_minlvl = sysv.sy_minlvl; 656 usrv.sv_minlvl = sysv.sy_minlvl;
657 usrv.sv_actlvl = sysv.sy_minlvl; 657 usrv.sv_actlvl = sysv.sy_minlvl;
658 usrv.sv_maxlvl = sysv.sy_maxlvl; 658 usrv.sv_maxlvl = sysv.sy_maxlvl;
659 } 659 }
660 usrv.sv_actcmp = 0; 660 usrv.sv_actcmp = 0;
661 usrv.sv_valcmp = sysv.sy_valcmp; 661 usrv.sv_valcmp = sysv.sy_valcmp;
662 662