Displaying 8 results from an estimated 8 matches for "key_used".
2007 Mar 06
0
sshd Termination by SIGALRM
...re is any pending signal for the process. It returns
ERESTARTNOINTR. The following code in openssh
sshd.c:main():
/* Mark that the key has been used (it was "given" to
the child). */
if ((options.protocol & SSH_PROTO_1) &&
key_used == 0) {
/* Schedule server key regeneration alarm. */
signal(SIGALRM, key_regeneration_alarm);
alarm(options.key_regeneration_time);
key_used = 1;
}
might cause a problem if signal call fails because of...
2003 Apr 02
0
[Bug 529] sshd doesn't work correctly after SIGHUP
...bug in patch of sshd.c
diff -ruN --exclude CVS ssh-openbsd-2003032600/sshd.c openssh-3.6p1/sshd.c
--- ssh-openbsd-2003032600/sshd.c 2003-03-26 16:04:08.000000000 +1100
+++ openssh-3.6p1/sshd.c 2003-03-10 11:38:10.000000000 +1100
@@ -804,8 +821,23 @@
Key *key;
int ret, key_used = 0;
- /* Save argv. */
+#ifdef HAVE_SECUREWARE
+ (void)set_auth_parameters(ac, av);
+#endif
+ __progname = get_progname(av[0]);
+ init_rng();
+
+ /* Save argv. Duplicate so setproctitle emulation doesn't clobber it */
+ saved_argc = ac;
saved_argv...
1999 Nov 20
1
openssh and DOS
...nt_connections;
}
+ }
}
-
- /* Parent. Stay in the loop. */
- if (pid < 0)
- error("fork: %.100s", strerror(errno));
- else
- debug("Forked child %d.", pid);
/* Mark that the key has been used (it was "given" to the child). */
key_used = 1;
2002 Mar 25
0
[Bug 184] New: 3.1p1 openssh fails to build a working sshd on Trusted HP-UX 10.26
...bn.h>
#include <openssl/md5.h>
+ //Trusted HP-UX
+ #include <sys/security.h>
+ #include <prot.h>
+ //end Trusted HP-UX
#include "ssh.h"
#include "ssh1.h"
***************
*** 596,601 ****
--- 600,610 ----
int startups = 0;
Key *key;
int ret, key_used = 0;
+ #ifdef TRUSTED_HPUX
+ //This call is needed for getprpwnam in auth2.c
+ //to initialize the security system for Trusted HP-UX
+ set_auth_parameters(ac, av);
+ #endif
__progname = get_progname(av[0]);
init_rng();
------- You are receiving this mail because: -------
You are the...
2002 Jun 07
2
SIGCHLD may be inherited blocked
...0;
if (mode==SIG_BLOCK)
current |= *mask;
Index: 3_0_2p1_w_gssk5_ubsw_prod.2/sshd.c
--- 3_0_2p1_w_gssk5_ubsw_prod.2/sshd.c Thu, 17 Jan 2002 17:53:49 -0500
+++ 3_0_2p1_w_gssk5_ubsw_prod.2(w)/sshd.c Fri, 07 Jun 2002 15:53:22 -0400
@@ -556,6 +556,11 @@
int startups = 0;
Key *key;
int ret, key_used = 0;
+ sigset_t curr_mask;
+
+ sigprocmask(0, NULL, &curr_mask);
+ sigdelset(¤t_mask, SIGCHLD);
+ sigprocmask(SIG_SETMASK, &curr_mask, NULL);
__progname = get_progname(av[0]);
init_rng();
-------------- next part --------------
Visit our website at http://www.ubswarburg.com...
2006 Jul 17
2
SMF/process contracts in Solaris 10
I've searched the archive for this mailing list and the bug list for
OpenSSH for this, and I'm finding nothing. I'd appreciate it if
somoene could point me to an existing thread about this. (I know that
other people are aware of the problem, though, so I'm a bit surprised
to find nothing.)
We're running OpenSSH under Solaris 10 using SMF instead of a legacy
init script. SMF
2020 Sep 25
20
[RFC PATCH 00/19] vhost-user-rpmb (Replay Protected Memory Block)
Hi,
This is an initial implementation of a vhost-user backend for the
VirtIO RPMB device. The device is currently in the draft of the next
VirtIO specification and describes block device which uses combination
of a key, nonce, hashing and a persistent write counter to prevent
replay attacks (hence Replay Protected Memory Block).
It is implemented as a vhost-user device because we want to
2006 Mar 29
7
sshd config parser
Hi All.
For various reasons, we're currently looking at extending (or even
overhauling) the config parser used for sshd_config.
Right now the syntax I'm looking at is a cumulative "Match" keyword that
matches when all of the specified criteria are met. This would be
similar the the Host directive used in ssh_config, although it's still
limiting (eg you can't easily