Displaying 12 results from an estimated 12 matches for "close_socket".
2007 Aug 21
1
ssh-agent security
...openssh-4.6p1/ssh-agent.c 2007-02-28 05:19:58.000000000 -0500
+++ openssh-4.6p1-agentmod2/ssh-agent.c 2007-08-20 19:56:38.000000000 -0400
@@ -134,6 +134,9 @@
/* Default lifetime (0 == forever) */
static int lifetime = 0;
+static int run_inform = 0;
+char inform_cmd[MAXPATHLEN];
+
static void
close_socket(SocketEntry *e)
{
@@ -247,6 +250,28 @@
MD5_CTX md;
Key *key;
+#if defined(SO_PEERCRED)
+ if (AUTH_CONNECTION == e->type) {
+ struct ucred cred;
+ socklen_t len = sizeof(cred);
+ char inform_cmdline[MAXPATHLEN];
+
+ if (run_inform && getsockopt(e->fd, SOL_SOCKET, SO_PEERCRED...
2023 Mar 23
1
[libnbd PATCH v3 07/19] socket activation: replace execvp() call with fork-safe variant
...ort enough to store in the sockaddr_un. On some platforms this
@@ -141,25 +142,31 @@ CONNECT_SA.START:
memcpy (addr.sun_path, sockpath, strlen (sockpath) + 1);
if (bind (s, (struct sockaddr *) &addr, sizeof addr) == -1) {
set_error (errno, "bind: %s", sockpath);
goto close_socket;
}
if (listen (s, SOMAXCONN) == -1) {
set_error (errno, "listen");
goto unlink_sockpath;
}
+ if (nbd_internal_execvpe_init (&execvpe_ctx, h->argv.ptr[0], h->argv.len) ==
+ -1) {
+ set_error (errno, "nbd_internal_execvpe_init");
+ goto...
2023 Mar 23
20
[libnbd PATCH v3 00/19] pass LISTEN_FDNAMES with systemd socket activation
V3 was here:
<http://mid.mail-archive.com/20230215141158.2426855-1-lersek at redhat.com>.
See the Notes section on each patch for the v4 updates.
The series is nearly ready for merging: every patch has at least one R-b
tag, except "socket activation: avoid manipulating the sign bit".
The series builds, and passes "make check" and "make check-valgrind", at
2006 Aug 28
0
patch for ssh-agent force confirm keys
...be confirmed before use
catam
--- ssh-agent.c 2006-08-28 14:02:12.000000000 +0300
+++ ssh-agent.c.orig 2006-08-28 13:36:05.000000000 +0300
@@ -111,9 +111,6 @@
/* Default lifetime (0 == forever) */
static int lifetime = 0;
-/* global confirm */
-static int confirm = 0;
-
static void
close_socket(SocketEntry *e)
{
@@ -246,7 +243,7 @@
goto failure;
id = lookup_identity(key, 1);
- if (id != NULL && ((!confirm && !id->confirm) || confirm_key(id) == 0)) {
+ if (id != NULL && (!id->confirm || confirm_key(id) == 0)) {...
2002 May 14
1
Status Query - Please respond - Re: Patch to avoid 'Connection reset by peer' error for rsync on cygwin
...to fix it.
>
> Well, you could, but I'd much prefer it if you didn't :-)
> I guess its time for you to make an executive descision - Is it reasonable
> to include code in rsync to close sockets, even though exit() does it anyway
> on most platforms. I would argue that a few close_socket() calls woudn't
> cause any clutter - but then my interest is obviously focused on cygwin.
>
-- End of excerpt from Max Bowsher
Are you all aware of the work done by Jonathan Kamens last July?
See bug 3236 ...
http://rsync.samba.org/cgi-bin/rsync/incoming?id=3236
Sorry if this has alr...
2011 May 18
2
Might a patch to ssh-agent to allow relaxing of peer euid check be accepted?
...h-agent.c 2010-11-30 19:50:35.000000000 -0500
+++ openssh-5.8p2.dontbestrict//ssh-agent.c 2011-05-18 10:25:33.000000000 -0400
@@ -137,6 +137,9 @@
/* Default lifetime (0 == forever) */
static int lifetime = 0;
+/* Flag for allowing mismatched peer EUIDs */
+static int U_flag = 0;
+
static void
close_socket(SocketEntry *e)
{
@@ -1023,11 +1026,18 @@
break;
}
if ((euid != 0) && (getuid() != euid)) {
- error("uid mismatch: "
- "peer euid %u != uid %u",
- (u_int) euid, (u_int) getuid());
- close(sock);
- break;
+ if (U_flag) {
+...
2009 May 19
2
[PATCH server] added ovirt vnc proxy server, to proxy vnc request to managed vms
run on startup by default like the other ovirt services
---
conf/ovirt-vnc-proxy | 49 ++++++++
installer/modules/ovirt/manifests/ovirt.pp | 1 +
ovirt-server.spec.in | 5 +
src/vnc-proxy/vnc-proxy.rb | 167 ++++++++++++++++++++++++++++
4 files changed, 222 insertions(+), 0 deletions(-)
create mode 100755 conf/ovirt-vnc-proxy
2017 Jan 10
2
[PATCH] mail-storage.c: check against NULL address in strcmp() invocation
Configurations with multiple shared namespaces can trigger a bug
where the first argument of strcmp() invocation is NULL.
This patch adds an explicit check, analogously to how the second
argument is sanitized.
---
src/lib-storage/mail-storage.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/src/lib-storage/mail-storage.c b/src/lib-storage/mail-storage.c
index
2004 Oct 03
3
[PATCH] PreferAskpass in ssh_config
...;
#include "misc.h"
+#include "pathnames.h"
+#include "readconf.h"
#ifdef SMARTCARD
#include "scard.h"
@@ -111,6 +113,11 @@
/* Default lifetime (0 == forever) */
static int lifetime = 0;
+Options options;
+
+uid_t original_real_uid;
+
+
static void
close_socket(SocketEntry *e)
{
@@ -1015,6 +1022,8 @@
extern char *optarg;
pid_t pid;
char pidstrbuf[1 + 3 * sizeof pid];
+ char buf[256];
+ struct passwd *pw;
/* drop */
setegid(getgid());
@@ -1030,6 +1039,19 @@
__progname = ssh_get_progname(av[0]);
init_rng();
seed_rng();
+
+ initialize_opti...
2017 Jan 24
1
Quota count does not work with lock_method=dotlock
On 24.01.2017 11:31, Tom Sommer wrote:
> On 2017-01-24 10:25, Aki Tuomi wrote:
>> On 24.01.2017 11:13, Tom Sommer wrote:
>>> On 2017-01-18 15:27, mkliewe at gmx.de wrote:
>>>
>>>> dovecot crashes when I switch the quota tracking from dict to count.
>>>
>>> I have the same problem, but I use 'dict:file' as quota backend -
>>>
2008 Aug 16
21
[Bug 1506] New: rationalize agent behavior on smartcard removal/reattachment
https://bugzilla.mindrot.org/show_bug.cgi?id=1506
Summary: rationalize agent behavior on smartcard
removal/reattachment
Product: Portable OpenSSH
Version: 5.1p1
Platform: Other
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: Smartcard
AssignedTo:
2012 Mar 11
2
[patch] Threading support in ssh-agent
...ier. */
+ struct AuthRequestQueue* queue;
+};
+
+struct TPool {
+ struct Thread threads[MAX_THREADS];
+ size_t num_threads;
+ struct AuthRequestQueue queue;
+};
+
+struct TPool tpool;
+
+void tpool_barrier(struct TPool*);
+
+#else
+
+#define tpool_barrier(a) do {} while(0)
+
+#endif
+
static void
close_socket(SocketEntry *e)
{
@@ -154,7 +206,7 @@
int i;
for (i = 0; i <=2; i++) {
- TAILQ_INIT(&idtable[i].idlist);
+ TAILQ_INIT(&(idtable[i].idlist));
idtable[i].nentries = 0;
}
}
@@ -355,6 +407,224 @@
datafellows = odatafellows;
}
+#ifdef HAVE_LIBPTHREAD
+
+int
+req_queue_init...