From f601d847e49ee6e1b76828fe9a123edb7c752970 Mon Sep 17 00:00:00 2001 From: damien Date: Mon, 15 Nov 1999 06:10:57 +0000 Subject: [PATCH 1/1] - Merged more Solaris compability from Marc G. Fournier - Wrote autoconf tests for __progname symbol --- ChangeLog | 3 +++ acconfig.h | 45 +++++++++++++++++++++++++++++++++++++++++++-- configure.in | 38 ++++++++++++++++++++++++++++++-------- log-server.c | 7 ++++++- ssh-add.c | 7 ++++++- ssh-agent.c | 9 ++++++--- ssh-keygen.c | 7 ++++++- ssh.c | 7 ++++++- sshd.c | 4 ++++ 9 files changed, 110 insertions(+), 17 deletions(-) diff --git a/ChangeLog b/ChangeLog index 6a16d278..8df74948 100644 --- a/ChangeLog +++ b/ChangeLog @@ -23,6 +23,9 @@ [sshconnect.c] disconnect if getpeername() fails - OpenBSD's changes to sshd.c broke the PAM stuff, re-merged it. - Various small cleanups to bring diff (against OpenBSD) size down. + - Merged more Solaris compability from Marc G. Fournier + + - Wrote autoconf tests for __progname symbol 19991114 - Solaris compilation fixes (still imcomplete) diff --git a/acconfig.h b/acconfig.h index 8678b7cd..2844bdca 100644 --- a/acconfig.h +++ b/acconfig.h @@ -3,7 +3,10 @@ /* SSL directory. */ #undef ssldir -/* Random number pool */ +/* Location of lastlog file */ +#undef LASTLOG_LOCATION + +/* Location of random number pool */ #undef RANDOM_POOL /* Are we using the Entropy gathering daemon */ @@ -21,9 +24,12 @@ /* Define is libutil has login() function */ #undef HAVE_LIBUTIL_LOGIN -/* Define if you *don't* want to use an external ssh-askpass */ +/* Define if you want external askpass support */ #undef USE_EXTERNAL_ASKPASS +/* Define if libc defines __progname */ +#undef HAVE___PROGNAME + @BOTTOM@ /* ******************* Shouldn't need to edit below this line ************** */ @@ -40,6 +46,9 @@ enum }; #endif +#include /* For u_intXX_t */ +#include /* For _PATH_XXX */ + #if !defined(u_int32_t) && defined(uint32_t) #define u_int32_t uint32_t #endif @@ -47,3 +56,35 @@ enum #if !defined(u_int16_t) && defined(uint16_t) #define u_int16_t uint16_t #endif + +#ifndef _PATH_LASTLOG +# ifdef LASTLOG_LOCATION +# define _PATH_LASTLOG LASTLOG_LOCATION +# endif +#endif + +#ifndef _PATH_UTMP +# ifdef UTMP_FILE +# define _PATH_UTMP UTMP_FILE +# endif +#endif + +#ifndef _PATH_WTMP +# ifdef WTMP_FILE +# define _PATH_WTMP WTMP_FILE +# endif +#endif + +#ifndef _PATH_BSHELL +# define _PATH_BSHELL "/bin/sh" +#endif + +#ifndef _PATH_STDPATH +# define _PATH_STDPATH "/usr/bin:/bin:/usr/sbin:/sbin:" +#endif + +#ifndef _PATH_MAILDIR +# ifdef MAILDIR +# define _PATH_MAILDIR MAILDIR +# endif +#endif diff --git a/configure.in b/configure.in index fd6aea36..9fe1a92f 100644 --- a/configure.in +++ b/configure.in @@ -55,14 +55,7 @@ AC_CHECK_LIB(dl, dlopen, , ) AC_CHECK_LIB(pam, pam_authenticate, , ) dnl Checks for header files. -AC_CHECK_HEADERS(pty.h endian.h paths.h lastlog.h shadow.h netgroup.h) - -dnl Check for ut_host field in utmp -AC_MSG_CHECKING([whether utmp.h has ut_host field]) -AC_EGREP_HEADER(ut_host, utmp.h, - [AC_DEFINE(HAVE_HOST_IN_UTMP) AC_MSG_RESULT(yes); ], - [AC_MSG_RESULT(no)] -) +AC_CHECK_HEADERS(pty.h endian.h paths.h lastlog.h shadow.h netgroup.h maillock.h) dnl Checks for library functions. AC_CHECK_FUNCS(openpty strlcpy mkdtemp arc4random setproctitle setlogin) @@ -144,4 +137,33 @@ if test -z "$RANDOM_POOL" -a -z "$EGD_POOL"; then AC_MSG_ERROR([No random device found, and no EGD random pool specified]) fi +dnl Check for ut_host field in utmp +AC_MSG_CHECKING([whether utmp.h has ut_host field]) +AC_EGREP_HEADER(ut_host, utmp.h, + [AC_DEFINE(HAVE_HOST_IN_UTMP) AC_MSG_RESULT(yes); ], + [AC_MSG_RESULT(no)] +) + +dnl Look for lastlog location +AC_MSG_CHECKING([location of lastlog file]) +for lastlog in /var/log/lastlog /var/adm/lastlog /etc/security/lastlog ; do + if test -f $lastlog ; then + AC_MSG_RESULT($lastlog) + AC_DEFINE_UNQUOTED(LASTLOG_LOCATION, "$lastlog") + break + fi +done + +AC_MSG_CHECKING([whether libc defines __progname]) +AC_TRY_LINK([], + [extern char *__progname;], + [ + AC_DEFINE(HAVE___PROGNAME) + AC_MSG_RESULT(yes) + ], + [ + AC_MSG_RESULT(no) + ] +) + AC_OUTPUT(Makefile) diff --git a/log-server.c b/log-server.c index 1143b348..8ed65b15 100644 --- a/log-server.c +++ b/log-server.c @@ -22,6 +22,12 @@ RCSID("$Id$"); #include "xmalloc.h" #include "ssh.h" +#ifdef HAVE___PROGNAME +extern char *__progname; +#else /* HAVE___PROGNAME */ +const char *__progname = "sshd"; +#endif /* HAVE___PROGNAME */ + static LogLevel log_level = SYSLOG_LEVEL_INFO; static int log_on_stderr = 0; static int log_facility = LOG_AUTH; @@ -104,7 +110,6 @@ do_log(LogLevel level, const char *fmt, va_list args) char fmtbuf[MSGBUFSIZE]; char *txt = NULL; int pri = LOG_INFO; - extern char *__progname; if (level > log_level) return; diff --git a/ssh-add.c b/ssh-add.c index 45009f82..30c67cd0 100644 --- a/ssh-add.c +++ b/ssh-add.c @@ -25,6 +25,12 @@ RCSID("$Id$"); int askpass(const char *filename, RSA *key, const char *saved_comment, char **comment); #endif /* USE_EXTERNAL_ASKPASS */ +#ifdef HAVE___PROGNAME +extern char *__progname; +#else /* HAVE___PROGNAME */ +const char *__progname = "ssh-add"; +#endif /* HAVE___PROGNAME */ + void delete_file(AuthenticationConnection *ac, const char *filename) { @@ -175,7 +181,6 @@ main(int argc, char **argv) /* check if RSA support exists */ if (rsa_alive() == 0) { - extern char *__progname; fprintf(stderr, "%s: no RSA support in libssl and libcrypto. See ssl(8).\n", diff --git a/ssh-agent.c b/ssh-agent.c index 7f4543e9..27e064d6 100644 --- a/ssh-agent.c +++ b/ssh-agent.c @@ -35,6 +35,12 @@ RCSID("$OpenBSD: ssh-agent.c,v 1.17 1999/11/02 19:42:36 markus Exp $"); #include #endif +#ifdef HAVE___PROGNAME +extern char *__progname; +#else /* HAVE___PROGNAME */ +const char *__progname = "ssh-agent"; +#endif /* HAVE___PROGNAME */ + typedef struct { int fd; @@ -505,8 +511,6 @@ cleanup_exit(int i) void usage() { - extern char *__progname; - fprintf(stderr, "ssh-agent version %s\n", SSH_VERSION); fprintf(stderr, "Usage: %s [-c | -s] [-k] [command {args...]]\n", __progname); @@ -524,7 +528,6 @@ main(int ac, char **av) /* check if RSA support exists */ if (rsa_alive() == 0) { - extern char *__progname; fprintf(stderr, "%s: no RSA support in libssl and libcrypto. See ssl(8).\n", __progname); diff --git a/ssh-keygen.c b/ssh-keygen.c index 96b87ced..e4e1ee53 100644 --- a/ssh-keygen.c +++ b/ssh-keygen.c @@ -20,6 +20,12 @@ RCSID("$Id$"); #include "ssh.h" #include "xmalloc.h" +#ifdef HAVE___PROGNAME +extern char *__progname; +#else /* HAVE___PROGNAME */ +const char *__progname = "ssh-keygen"; +#endif /* HAVE___PROGNAME */ + /* Generated private key. */ RSA *private_key; @@ -317,7 +323,6 @@ main(int ac, char **av) /* check if RSA support exists */ if (rsa_alive() == 0) { - extern char *__progname; fprintf(stderr, "%s: no RSA support in libssl and libcrypto. See ssl(8).\n", diff --git a/ssh.c b/ssh.c index 702e7d26..7e66b52f 100644 --- a/ssh.c +++ b/ssh.c @@ -28,6 +28,12 @@ RCSID("$Id$"); #include "readconf.h" #include "uidswap.h" +#ifdef HAVE___PROGNAME +extern char *__progname; +#else /* HAVE___PROGNAME */ +const char *__progname = "ssh"; +#endif /* HAVE___PROGNAME */ + /* Flag indicating whether debug mode is on. This can be set on the command line. */ int debug_flag = 0; @@ -399,7 +405,6 @@ main(int ac, char **av) /* check if RSA support exists */ if (rsa_alive() == 0) { - extern char *__progname; fprintf(stderr, "%s: no RSA support in libssl and libcrypto. See ssl(8).\n", diff --git a/sshd.c b/sshd.c index f8b2caa6..7a641cf4 100644 --- a/sshd.c +++ b/sshd.c @@ -32,6 +32,10 @@ RCSID("$Id$"); #include "uidswap.h" #include "compat.h" +#ifdef HAVE_MAILLOCK_H +# include +#endif + #ifdef LIBWRAP #include #include -- 2.45.2