search for: get_current_tim

Displaying 9 results from an estimated 9 matches for "get_current_tim".

Did you mean: get_current_time
2009 Apr 07
4
/lib daemon folder: how do i add a module into the daemon?
...ile.dirname(__FILE__) + "/../../lib/basic_functions.rb"(this didn''t work) #require ''../basic_functions.rb'' (this didn''t work) $running = true Signal.trap("TERM") do $running = false end while($running) do # Replace this with your code get_current_time ActiveRecord::Base.logger.info "This daemons is still running at # {@current_time}.\n" sleep 5 end contents of basic_functions module BasicFunctions def get_current_time #@current_time = Time.now.beginning_of_month + 27.days #@current_time = Time.now.beginning_of_month + 13...
2001 May 18
0
PATCH: implement delay (sleep) after last tunnelled connection exits
...if (id != session_ident) error("client_channel_closed: id %d != session_ident %d", id, session_ident); - session_closed = 1; + session_status = (options.sleep >= 0) ? SessionWait : SessionClose; if (in_raw_mode()) leave_raw_mode(); } @@ -776,6 +798,7 @@ start_time = get_current_time(); /* Initialize variables. */ + if(!have_pty) session_status=SessionWait; escape_pending = 0; last_was_cr = 1; exit_status = -1; @@ -840,7 +863,8 @@ /* Process buffered packets sent by the server. */ client_process_buffered_input_packets(); - if (compat20 && session_clo...
2002 Jan 27
0
[PATCH] Add an exit delay to Openssh-3.0.2p1 for use in tunneling
...rror("client_channel_closed: id %d != session_ident %d", id, session_ident); channel_cancel_cleanup(id); - session_closed = 1; + session_status = (options.sleep >= 0) ? SessionWait : SessionClose; if (in_raw_mode()) leave_raw_mode(); } @@ -785,6 +801,7 @@ start_time = get_current_time(); /* Initialize variables. */ + if(!have_pty) session_status=SessionWait; escape_pending = 0; last_was_cr = 1; exit_status = -1; @@ -848,7 +865,8 @@ /* Process buffered packets sent by the server. */ client_process_buffered_input_packets(); - if (compat20 && session_clo...
2001 Sep 28
1
[PATCH] fix for Linux hang on exit bug in 2.9.9p2
...if (id != session_ident) error("client_channel_closed: id %d != session_ident %d", id, session_ident); - session_closed = 1; + session_status = (options.sleep >= 0) ? SessionWait : SessionClose; if (in_raw_mode()) leave_raw_mode(); } @@ -778,6 +799,7 @@ start_time = get_current_time(); /* Initialize variables. */ + if(!have_pty) session_status=SessionWait; escape_pending = 0; last_was_cr = 1; exit_status = -1; @@ -842,7 +864,8 @@ /* Process buffered packets sent by the server. */ client_process_buffered_input_packets(); - if (compat20 && session_clo...
2001 Feb 01
0
warnings on aix325
...icit declaration of function `setsockopt' sshconnect.c: In function `ssh_login': sshconnect.c:683: warning: unsigned int format, uid_t arg (arg 2) readconf.c: In function `parse_token': readconf.c:220: warning: implicit declaration of function `strcasecmp' clientloop.c: In function `get_current_time': clientloop.c:232: warning: implicit declaration of function `gettimeofday' clientloop.c: In function `client_check_window_change': clientloop.c:337: warning: implicit declaration of function `ioctl' clientloop.c: In function `client_wait_until_can_do_something': clientloop.c:...
2001 Sep 05
2
sshd hangs on logout -- is this a bug?
In the changelog, there is an entry: 20001129 - (djm) Back out all the serverloop.c hacks. sshd will now hang again if there are background children with open fds. Does this mean that this is regarded as expected (and correct) behavior, that should not change in the future, or does it mean that this behavior is a known problem that someone will eventually fix? --Adam -- Adam McKenna
2001 Nov 14
6
[PATCH]: Patch to fix hang on exit bug under Linux and add optional exit delay
...rror("client_channel_closed: id %d != session_ident %d", id, session_ident); channel_cancel_cleanup(id); - session_closed = 1; + session_status = (options.sleep >= 0) ? SessionWait : SessionClose; if (in_raw_mode()) leave_raw_mode(); } @@ -782,6 +802,7 @@ start_time = get_current_time(); /* Initialize variables. */ + if(!have_pty) session_status=SessionWait; escape_pending = 0; last_was_cr = 1; exit_status = -1; @@ -846,7 +867,8 @@ /* Process buffered packets sent by the server. */ client_process_buffered_input_packets(); - if (compat20 && session_clo...
2001 Oct 16
1
Defeating Timing Attacks Patch for OpenSSH 2.9.9p2 and 2.9p2
...nter for number of fake packets that have been sent. + * Add time_out flag for marking when timeout has occured. + */ + int bogus_send_count = 0; + int time_out = 0; + /* End SD Mod */ + debug("Entering interactive session."); start_time = get_current_time(); @@ -861,9 +940,16 @@ * Make packets from buffered channel data, and * enqueue them for sending to the server. */ - if (packet_not_very_much_data_to_write()) - channel_o...
2001 Oct 06
1
Defeating Timing Attacks
Hello, In response to the timing analysis attacks presented by Dawn Song et. al. in her paper http://paris.cs.berkeley.edu/~dawnsong/ssh-timing.html we at Silicon Defense developed a patch for openssh to avoid such measures. Timing Analysis Evasion changes were developed by C. Jason Coit and Roel Jonkman of Silicon Defense. These changes cause SSH to send packets unless request not to,