chs
9f94a5cde3
fix handling of large pages.
2012-01-10 16:01:16 +00:00
dholland
84ed28bf40
Implement quota_put and quota_delete for the fallback direct file
...
access backend.
2012-01-09 15:45:19 +00:00
dholland
583f7defcf
Implement quota_put() and quota_delete() using code from edquota(8).
2012-01-09 15:43:19 +00:00
dholland
8d70e807c3
Implement fallback direct access to quota1-type quota files.
...
Uses (mostly) code from repquota. Add some missing pieces that
weren't in repquota.
Use the direct file access code for cursors if proplib reports the
quota version is 1.
2012-01-09 15:41:58 +00:00
dholland
857bee05cd
Implement the libquota cursor interface, using proplib code from repquota.
2012-01-09 15:40:10 +00:00
dholland
22363307c5
Implement the schema-related functions, using proplib code from
...
/usr/bin/quota.
2012-01-09 15:34:34 +00:00
dholland
fa6b6291ec
Handle default ID case in quota_get(), based on logic found in
...
/usr/bin/quota.
2012-01-09 15:32:38 +00:00
dholland
9f8b8c04bd
Redo getfsquota() and getnfsquota() using the new API.
...
Change the previous getufsquota() to __quota_getquota() and call it
from all three functions: getfsquota(), getufsquota(), and getnfsquota().
2012-01-09 15:31:11 +00:00
dholland
2957f1ccb8
Add quota_nfs.c and implement quota_get() for nfs, using
...
code from getnfsquota().
Also implement quota_getmountdevice().
2012-01-09 15:29:55 +00:00
dholland
2ff48b73e6
Rework getufsquota() in terms of the new quota API.
2012-01-09 15:28:31 +00:00
dholland
8d8965ace0
Add initial versions of quota_open(), quota_close(), quota_get(),
...
calling proplib code mostly taken from getufsquota().
Correct the proplib refcount handling in the code from getufsquota(),
where it was (as far as I can tell) wrong.
Avoid doing illegal and unsafe casts from (struct quotaval *)
to (uint64_t *).
2012-01-09 15:27:04 +00:00
christos
6a6c8f616b
PR/45805: Borodin Oleg: telnet/telnetd with -DAUTHENTICATION -DENCRYPTION
...
(rfc2941)
- minimal fixes to compile with WARNS=4
- separate kerberos (USE_KERBEROS) from encryption (MKCRYPTO)
2012-01-09 15:25:33 +00:00
dholland
e15d192c7f
Bump minor version of libquota.so.
2012-01-09 15:24:37 +00:00
dholland
bb96a16625
Add stub entry points of the entire new quota interface. These fail or
...
do nothing for the time being; however, putting them all in up front
avoids the need to do multiple bumps of the libquota.so version.
2012-01-09 15:22:38 +00:00
christos
89cf253562
- add strspct
...
- be explicit about string not being NUL terminated if bufsiz == 0
2012-01-07 18:40:55 +00:00
chs
d331b836f8
define _UC_TLSBASE and use it to pass the TLS pointer to setcontext().
...
since there is no available space in ucontext_t on vax, pass the
TLS pointer on the stack referenced by the ucontext_t instead.
suggested by joerg.
2012-01-07 16:47:42 +00:00
martin
f989e55d57
Do not force errno to EOVERFLOW when returning -1 from mktime or friends.
...
First, there are legitimate cases where we want to return -1 and errno == 0,
second, all paths go through time1() and/or time2sub() which explicitly
take care to set errno in cases of real overflows.
Should fix atf test failure on various ports in
lib/libc/time/t_mktime:timegm_epoch.
2012-01-07 15:19:35 +00:00
christos
acd0d5274c
PR/45791: Nat Sloss: getnstr erase character weirdness
...
Fix processing of backspace erase char and char left.
2012-01-06 22:20:54 +00:00
drochner
2a0c9a37dc
pull in from FreeBSD rev.1.41: Narrow the use of user credentials.
...
(call pam_get_authtok() with caller's rights rather than user's)
2012-01-06 14:04:02 +00:00
reinoud
5bd510aeaa
Revert MAP_NOSYSCALLS patch.
2012-01-05 15:19:52 +00:00
yamt
41610fe7ba
move the most of description to an appropriate section, HISTORY.
2012-01-05 07:05:59 +00:00
drochner
8fd6dadaf8
include <netipsec/ipsec.h> rather than <netinet6/ipsec.h> from userland
...
where possible, for consistency and compatibility to FreeBSD
(exception: KAME specific statistics gathering in netstat(1) and systat(1))
2012-01-04 16:09:40 +00:00
drochner
3712f81ced
-consistently use "char *" for the compiled policy buffer in the
...
ipsec_*_policy() functions, as it was documented and used by clients
-remove "ipsec_policy_t" which was undocumented and only present
in the KAME version of the ipsec.h header
-misc cleanup of historical artefacts, and to remove unnecessary
differences between KAME ans FAST_IPSEC
2012-01-04 15:55:35 +00:00
wiz
88918228b2
Fix a sentence, following a hint by Abhinav Upadhyay.
2012-01-04 10:53:39 +00:00
christos
1b695acdbf
avoid using %m in format.
2012-01-03 19:02:54 +00:00
dholland
b972515e63
Remove unnecessary cast to caddr_t.
2012-01-02 21:29:55 +00:00
dholland
677bc7fd8c
stdlib.h, not malloc.h
2012-01-02 21:29:29 +00:00
wiz
b3da5e68a9
Remove trailing whitespace.
2012-01-02 18:06:37 +00:00
dholland
27eed90c42
Clarify the behavior of exit(x) for out-of-range x. PR 45769
2012-01-02 15:55:29 +00:00
christos
952b88962c
a typo and missing markup
2012-01-01 23:42:03 +00:00
christos
35a585027b
Improve returns description from Solar Designer.
2012-01-01 23:18:51 +00:00
riz
1874c03a4b
Redo previous; remove all the casts I added, and use PRI* macros instead.
...
(by popular demand - makes sense, too)
2011-12-29 04:25:49 +00:00
riz
8340adc56e
Cast time_t to intmax_t for printf purposes, and format with %j. Fixes
...
build on amd64 and probably i386 as well.
2011-12-29 01:40:32 +00:00
wiz
4c98bf7fdf
Remove trailing whitespace. Avoid xr to itself.
2011-12-28 22:41:34 +00:00
christos
fd093070ff
reflect current reality about return values.
2011-12-28 22:15:23 +00:00
manu
4fba06add5
Add a FUSE trace facility, with statistics collection. This should help
...
tracking bugs and performance issues
2011-12-28 17:33:52 +00:00
christos
0c2a9fc481
- reverse the order of printf formatting to make it easier for compilers to
...
check printf arguments
- add compiler checking for printf formats and fix broken ones.
From joerg@
2011-12-28 14:52:56 +00:00
christos
e7926f1e9e
make __crypt static
2011-12-28 03:13:09 +00:00
christos
3b47f52ce7
clamp length to 72 (73) characters.
2011-12-28 03:12:38 +00:00
christos
dbd463652a
wrap crypt() to a function that returns *0 and *1 on error.
2011-12-27 23:34:13 +00:00
christos
0d2c1e1b4f
- go back to returning NULL, we are going to wrap crypt instead.
...
- limit length of key to 253 to prevent truncation.
2011-12-27 23:33:41 +00:00
christos
671f563b75
we want to check against "*0" not "*\0"
2011-12-27 22:01:26 +00:00
christos
91160c96e4
Instead of returning ":" on error, return "*0" or "*1" which will always result
...
in logged password entries, even if the calling program decides to blindly
use them. Discussed in: http://www.openwall.com/lists/oss-security/2011/11/15/3
2011-12-27 19:36:10 +00:00
christos
97c77932e4
undo the pam bump.
2011-12-27 16:53:24 +00:00
christos
b0ca4d4eba
perform the check for all salts > 2.
2011-12-27 01:20:45 +00:00
christos
aeeea54d2f
Provide a safer salting method that does not turn invalid salts to '.'.
...
Be more sensitive to bad salts and counts. From:
http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/glibc/crypt_freesec.c
From Solar Designer
2011-12-26 22:58:45 +00:00
christos
c9260d16b9
Return ":1" on error instead of ":", so that sloppy password creation programs
...
don't end up confusing libc or the other way around. From Solar Designer
2011-12-26 21:51:53 +00:00
njoly
f5d424631e
Remove obsolete puffs_suspend(3) xref.
2011-12-26 17:59:07 +00:00
christos
ad9882f615
avoid accessing array over its bound, from Solar Designer
2011-12-26 16:03:42 +00:00
christos
f5389e0d8c
Move to the new version.
2011-12-25 23:18:25 +00:00