2016-03-17 13:10:03 +00:00
|
|
|
From fb9754bb10105b6c23d355fd448f55ab94c704b8 Mon Sep 17 00:00:00 2001
|
|
|
|
From: Martin Sehnoutka <msehnout@redhat.com>
|
|
|
|
Date: Thu, 17 Mar 2016 11:44:45 +0100
|
|
|
|
Subject: [PATCH 05/26] Applied vsftpd-2.1.0-pam_hostname.patch
|
|
|
|
|
|
|
|
---
|
|
|
|
sysdeputil.c | 19 ++++++++++++++++---
|
|
|
|
1 file changed, 16 insertions(+), 3 deletions(-)
|
|
|
|
|
|
|
|
diff --git a/sysdeputil.c b/sysdeputil.c
|
|
|
|
index 06f01f4..b2782da 100644
|
|
|
|
--- a/sysdeputil.c
|
|
|
|
+++ b/sysdeputil.c
|
2009-01-16 17:23:12 +00:00
|
|
|
@@ -16,6 +16,10 @@
|
|
|
|
#include "tunables.h"
|
|
|
|
#include "builddefs.h"
|
|
|
|
|
|
|
|
+/* For gethostbyaddr, inet_addr */
|
|
|
|
+#include <netdb.h>
|
|
|
|
+#include <arpa/inet.h>
|
|
|
|
+
|
|
|
|
/* For Linux, this adds nothing :-) */
|
|
|
|
#include "port/porting_junk.h"
|
|
|
|
|
2016-03-17 13:10:03 +00:00
|
|
|
@@ -323,6 +327,10 @@ vsf_sysdep_check_auth(struct mystr* p_user_str,
|
2009-01-16 17:23:12 +00:00
|
|
|
const struct mystr* p_remote_host)
|
|
|
|
{
|
2012-09-17 10:43:45 +00:00
|
|
|
int retval = -1;
|
2009-01-16 17:23:12 +00:00
|
|
|
+#ifdef PAM_RHOST
|
|
|
|
+ struct sockaddr_in sin;
|
|
|
|
+ struct hostent *host;
|
|
|
|
+#endif
|
2009-08-24 15:01:45 +00:00
|
|
|
pam_item_t item;
|
2009-08-04 06:23:01 +00:00
|
|
|
const char* pam_user_name = 0;
|
2009-01-16 17:23:12 +00:00
|
|
|
struct pam_conv the_conv =
|
2016-03-17 13:10:03 +00:00
|
|
|
@@ -346,7 +354,12 @@ vsf_sysdep_check_auth(struct mystr* p_user_str,
|
2009-01-16 17:23:12 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#ifdef PAM_RHOST
|
|
|
|
- retval = pam_set_item(s_pamh, PAM_RHOST, str_getbuf(p_remote_host));
|
|
|
|
+ sin.sin_addr.s_addr = inet_addr(str_getbuf(p_remote_host));
|
|
|
|
+ host = gethostbyaddr((char*)&sin.sin_addr.s_addr,sizeof(struct in_addr),AF_INET);
|
|
|
|
+ if (host != (struct hostent*)0)
|
|
|
|
+ retval = pam_set_item(s_pamh, PAM_RHOST, host->h_name);
|
|
|
|
+ else
|
|
|
|
+ retval = pam_set_item(s_pamh, PAM_RHOST, str_getbuf(p_remote_host));
|
|
|
|
if (retval != PAM_SUCCESS)
|
|
|
|
{
|
|
|
|
(void) pam_end(s_pamh, retval);
|
2016-03-17 13:10:03 +00:00
|
|
|
@@ -559,7 +572,7 @@ vsf_sysdep_has_capabilities(void)
|
2009-01-16 17:23:12 +00:00
|
|
|
}
|
|
|
|
return s_runtime_has_caps;
|
|
|
|
}
|
|
|
|
-
|
|
|
|
+
|
|
|
|
#ifndef VSF_SYSDEP_HAVE_LIBCAP
|
|
|
|
static int
|
|
|
|
do_checkcap(void)
|
2016-03-17 13:10:03 +00:00
|
|
|
@@ -1081,7 +1094,7 @@ vsf_sysutil_recv_fd(const int sock_fd)
|
2009-01-16 17:23:12 +00:00
|
|
|
msg.msg_flags = 0;
|
|
|
|
/* In case something goes wrong, set the fd to -1 before the syscall */
|
|
|
|
p_fd = (int*)CMSG_DATA(CMSG_FIRSTHDR(&msg));
|
|
|
|
- *p_fd = -1;
|
|
|
|
+ *p_fd = -1;
|
|
|
|
retval = recvmsg(sock_fd, &msg, 0);
|
|
|
|
if (retval != 1)
|
|
|
|
{
|
2016-03-17 13:10:03 +00:00
|
|
|
--
|
|
|
|
2.5.0
|
|
|
|
|