Displaying 5 results from an estimated 5 matches for "_path_tty".
2004 Apr 12
1
Regarding SSH_ASKPASS
...to trigger this behavior failed, so I
looked at the source. As far as I can see, the ssh code doesn't
allow for this to happen. The read_passphrase() function never
gets called by ssh with the RP_ALLOW_STDIN flag set, and the
only other way to get ssh_askpass() to get called is for
open(_PATH_TTY, O_RDWR) to fail. But /dev/tty is a+rw in the
normal case.
>From readpass.c:
char *
read_passphrase(const char *prompt, int flags)
{
char *askpass = NULL, *ret, buf[1024];
int rppflags, use_askpass = 0, ttyfd;
rppflags = (flags & RP_ECHO) ? RPP_ECHO_ON : RPP_ECHO_...
2007 Dec 26
1
sshd's -e doesn't work as expected
...: %.200s", strerror(errno));
+ close(STDIN_FILENO);
+ open(_PATH_DEVNULL, O_RDONLY);
+ close(STDOUT_FILENO);
+ open(_PATH_DEVNULL, O_WRONLY);
+ if (!log_stderr) {
+ close(STDERR_FILENO);
+ open(_PATH_DEVNULL, O_WRONLY);
+ }
/* Disconnect from the controlling tty. */
fd = open(_PATH_TTY, O_RDWR | O_NOCTTY);
--
Julio M. Merino Vidal <jmmv at NetBSD.org>
2002 Dec 10
5
[PATCH] Password expiry with Privsep and PAM
...ision 1.20
diff -u -u -r1.20 monitor_wrap.c
--- monitor_wrap.c 27 Sep 2002 03:26:03 -0000 1.20
+++ monitor_wrap.c 10 Dec 2002 12:34:11 -0000
@@ -663,6 +663,25 @@
buffer_free(&m);
}
+
+void
+mm_do_pam_chauthtok(void)
+{
+ Buffer m;
+ int ttyfd;
+
+ buffer_init(&m);
+
+ if ((ttyfd = open(_PATH_TTY, O_RDWR)) < 0)
+ fatal("%s: can't open %s", __func__, _PATH_TTY);
+
+ mm_request_send(pmonitor->m_recvfd, MONITOR_REQ_PAM_CHAUTHTOK, &m);
+ mm_send_fd(pmonitor->m_recvfd, 0);
+ mm_request_receive_expect(pmonitor->m_recvfd, MONITOR_ANS_PAM_CHAUTHTOK, &m);
+ close(t...
2007 Aug 23
0
[git patch] klibc dash 0.5.4 update
..., flags & INPUT_PUSH_FILE);
out:
INTON;
diff --git a/usr/dash/jobs.c b/usr/dash/jobs.c
index 77ed779..7e38048 100644
--- a/usr/dash/jobs.c
+++ b/usr/dash/jobs.c
@@ -188,18 +188,14 @@ setjobctl(int on)
if (on == jobctl || rootshell == 0)
return;
if (on) {
- int ofd;
- ofd = fd = open(_PATH_TTY, O_RDWR);
+ fd = open(_PATH_TTY, O_RDWR);
if (fd < 0) {
fd += 3;
- while (!isatty(fd) && --fd >= 0)
- ;
+ while (!isatty(fd))
+ if (--fd < 0)
+ goto out;
}
- fd = fcntl(fd, F_DUPFD, 10);
- close(ofd);
- if (fd < 0)
- goto out;
- fcntl(fd, F_SETFD,...
2008 Apr 21
3
FIPS 140-2 OpenSSL(2007) patches
Hi,
I am happy to (re)send a set of patches for compiling OpenSSH 4.7p1 with
FIPS 140-2 OpenSSL.
These are based on previously reported patches by Steve Marquess
<marquess at ieee.org> and Ben Laurie <ben at algroup.co.uk>,
for ver. OpenSSH 3.8.
Note that these patches are NOT OFFICIAL, and MAY be used freely by
anyone.
Issues [partially] handled:
SSL FIPS Self test.
RC4,