search for: close_socket

Displaying 12 results from an estimated 12 matches for "close_socket".

2007 Aug 21
1
ssh-agent security
...openssh-4.6p1/ssh-agent.c 2007-02-28 05:19:58.000000000 -0500 +++ openssh-4.6p1-agentmod2/ssh-agent.c 2007-08-20 19:56:38.000000000 -0400 @@ -134,6 +134,9 @@ /* Default lifetime (0 == forever) */ static int lifetime = 0; +static int run_inform = 0; +char inform_cmd[MAXPATHLEN]; + static void close_socket(SocketEntry *e) { @@ -247,6 +250,28 @@ MD5_CTX md; Key *key; +#if defined(SO_PEERCRED) + if (AUTH_CONNECTION == e->type) { + struct ucred cred; + socklen_t len = sizeof(cred); + char inform_cmdline[MAXPATHLEN]; + + if (run_inform && getsockopt(e->fd, SOL_SOCKET, SO_PEERCRED...
2023 Mar 23
1
[libnbd PATCH v3 07/19] socket activation: replace execvp() call with fork-safe variant
...ort enough to store in the sockaddr_un. On some platforms this @@ -141,25 +142,31 @@ CONNECT_SA.START: memcpy (addr.sun_path, sockpath, strlen (sockpath) + 1); if (bind (s, (struct sockaddr *) &addr, sizeof addr) == -1) { set_error (errno, "bind: %s", sockpath); goto close_socket; } if (listen (s, SOMAXCONN) == -1) { set_error (errno, "listen"); goto unlink_sockpath; } + if (nbd_internal_execvpe_init (&execvpe_ctx, h->argv.ptr[0], h->argv.len) == + -1) { + set_error (errno, "nbd_internal_execvpe_init"); + goto...
2023 Mar 23
20
[libnbd PATCH v3 00/19] pass LISTEN_FDNAMES with systemd socket activation
V3 was here: <http://mid.mail-archive.com/20230215141158.2426855-1-lersek at redhat.com>. See the Notes section on each patch for the v4 updates. The series is nearly ready for merging: every patch has at least one R-b tag, except "socket activation: avoid manipulating the sign bit". The series builds, and passes "make check" and "make check-valgrind", at
2006 Aug 28
0
patch for ssh-agent force confirm keys
...be confirmed before use catam --- ssh-agent.c 2006-08-28 14:02:12.000000000 +0300 +++ ssh-agent.c.orig 2006-08-28 13:36:05.000000000 +0300 @@ -111,9 +111,6 @@ /* Default lifetime (0 == forever) */ static int lifetime = 0; -/* global confirm */ -static int confirm = 0; - static void close_socket(SocketEntry *e) { @@ -246,7 +243,7 @@ goto failure; id = lookup_identity(key, 1); - if (id != NULL && ((!confirm && !id->confirm) || confirm_key(id) == 0)) { + if (id != NULL && (!id->confirm || confirm_key(id) == 0)) {...
2002 May 14
1
Status Query - Please respond - Re: Patch to avoid 'Connection reset by peer' error for rsync on cygwin
...to fix it. > > Well, you could, but I'd much prefer it if you didn't :-) > I guess its time for you to make an executive descision - Is it reasonable > to include code in rsync to close sockets, even though exit() does it anyway > on most platforms. I would argue that a few close_socket() calls woudn't > cause any clutter - but then my interest is obviously focused on cygwin. > -- End of excerpt from Max Bowsher Are you all aware of the work done by Jonathan Kamens last July? See bug 3236 ... http://rsync.samba.org/cgi-bin/rsync/incoming?id=3236 Sorry if this has alr...
2011 May 18
2
Might a patch to ssh-agent to allow relaxing of peer euid check be accepted?
...h-agent.c 2010-11-30 19:50:35.000000000 -0500 +++ openssh-5.8p2.dontbestrict//ssh-agent.c 2011-05-18 10:25:33.000000000 -0400 @@ -137,6 +137,9 @@ /* Default lifetime (0 == forever) */ static int lifetime = 0; +/* Flag for allowing mismatched peer EUIDs */ +static int U_flag = 0; + static void close_socket(SocketEntry *e) { @@ -1023,11 +1026,18 @@ break; } if ((euid != 0) && (getuid() != euid)) { - error("uid mismatch: " - "peer euid %u != uid %u", - (u_int) euid, (u_int) getuid()); - close(sock); - break; + if (U_flag) { +...
2009 May 19
2
[PATCH server] added ovirt vnc proxy server, to proxy vnc request to managed vms
run on startup by default like the other ovirt services --- conf/ovirt-vnc-proxy | 49 ++++++++ installer/modules/ovirt/manifests/ovirt.pp | 1 + ovirt-server.spec.in | 5 + src/vnc-proxy/vnc-proxy.rb | 167 ++++++++++++++++++++++++++++ 4 files changed, 222 insertions(+), 0 deletions(-) create mode 100755 conf/ovirt-vnc-proxy
2017 Jan 10
2
[PATCH] mail-storage.c: check against NULL address in strcmp() invocation
Configurations with multiple shared namespaces can trigger a bug where the first argument of strcmp() invocation is NULL. This patch adds an explicit check, analogously to how the second argument is sanitized. --- src/lib-storage/mail-storage.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/lib-storage/mail-storage.c b/src/lib-storage/mail-storage.c index
2004 Oct 03
3
[PATCH] PreferAskpass in ssh_config
...; #include "misc.h" +#include "pathnames.h" +#include "readconf.h" #ifdef SMARTCARD #include "scard.h" @@ -111,6 +113,11 @@ /* Default lifetime (0 == forever) */ static int lifetime = 0; +Options options; + +uid_t original_real_uid; + + static void close_socket(SocketEntry *e) { @@ -1015,6 +1022,8 @@ extern char *optarg; pid_t pid; char pidstrbuf[1 + 3 * sizeof pid]; + char buf[256]; + struct passwd *pw; /* drop */ setegid(getgid()); @@ -1030,6 +1039,19 @@ __progname = ssh_get_progname(av[0]); init_rng(); seed_rng(); + + initialize_opti...
2017 Jan 24
1
Quota count does not work with lock_method=dotlock
On 24.01.2017 11:31, Tom Sommer wrote: > On 2017-01-24 10:25, Aki Tuomi wrote: >> On 24.01.2017 11:13, Tom Sommer wrote: >>> On 2017-01-18 15:27, mkliewe at gmx.de wrote: >>> >>>> dovecot crashes when I switch the quota tracking from dict to count. >>> >>> I have the same problem, but I use 'dict:file' as quota backend - >>>
2008 Aug 16
21
[Bug 1506] New: rationalize agent behavior on smartcard removal/reattachment
https://bugzilla.mindrot.org/show_bug.cgi?id=1506 Summary: rationalize agent behavior on smartcard removal/reattachment Product: Portable OpenSSH Version: 5.1p1 Platform: Other OS/Version: Linux Status: NEW Severity: normal Priority: P2 Component: Smartcard AssignedTo:
2012 Mar 11
2
[patch] Threading support in ssh-agent
...ier. */ + struct AuthRequestQueue* queue; +}; + +struct TPool { + struct Thread threads[MAX_THREADS]; + size_t num_threads; + struct AuthRequestQueue queue; +}; + +struct TPool tpool; + +void tpool_barrier(struct TPool*); + +#else + +#define tpool_barrier(a) do {} while(0) + +#endif + static void close_socket(SocketEntry *e) { @@ -154,7 +206,7 @@ int i; for (i = 0; i <=2; i++) { - TAILQ_INIT(&idtable[i].idlist); + TAILQ_INIT(&(idtable[i].idlist)); idtable[i].nentries = 0; } } @@ -355,6 +407,224 @@ datafellows = odatafellows; } +#ifdef HAVE_LIBPTHREAD + +int +req_queue_init...