search for: log_stderr

Displaying 14 results from an estimated 14 matches for "log_stderr".

2002 Dec 18
2
patch for openssh3.5p1 - adds logging option
...-orig/session.c 2002-12-18 10:10:13.000000000 -0500 +++ openssh-3.5p1/session.c 2002-12-18 10:42:37.000000000 -0500 @@ -466,7 +466,7 @@ fatal_remove_all_cleanups(); /* Child. Reinitialize the log since the pid has changed. */ - log_init(__progname, options.log_level, options.log_facility, log_stderr); + log_init(__progname, options.log_level, options.log_facility, log_stderr,NULL); /* * Create a new session and process group since the 4.4BSD @@ -590,7 +590,7 @@ fatal_remove_all_cleanups(); /* Child. Reinitialize the log because the pid has changed. */ - log_init(__progname,...
2002 Oct 15
0
[Bug 414] New: sshd initially ignores -e (log_stderr) if -i (inetd_flag) is given
http://bugzilla.mindrot.org/show_bug.cgi?id=414 Summary: sshd initially ignores -e (log_stderr) if -i (inetd_flag) is given Product: Portable OpenSSH Version: -current Platform: All URL: http://marc.theaimsgroup.com/?l=openssh-unix- dev&m=102469253706346&w=2 OS/Version: Linux St...
2002 Nov 05
2
[Bug 414] sshd initially ignores -e (log_stderr) if -i (inetd_flag) is given
http://bugzilla.mindrot.org/show_bug.cgi?id=414 ------- Additional Comments From markus at openbsd.org 2002-11-06 07:01 ------- Created an attachment (id=164) --> (http://bugzilla.mindrot.org/attachment.cgi?id=164&action=view) proposed patch what about this? (more in line with the rest of the code). ------- You are receiving this mail because: ------- You are the assignee for the
2002 Jun 21
0
sshd initially ignores -e (log_stderr) if -i (inetd_flag) is given
A non-text attachment was scrubbed... Name: sshd-stderr.patch Type: text/x-patch Size: 424 bytes Desc: make sshd honor -e even with -i Url : http://lists.mindrot.org/pipermail/openssh-unix-dev/attachments/20020621/b29eef76/attachment.bin
2001 Jan 04
2
Patch to allow openssh-2.2.0-p1 to be started from /etc/inittab
...!= 1); /* Read server configuration options from the configuration file. */ read_server_config(&options, config_file_name); *************** *** 633,639 **** } /* Initialize the log (it is reinitialized below in case we forked). */ ! if (debug_flag && !inetd_flag) log_stderr = 1; log_init(av0, options.log_level, options.log_facility, log_stderr); --- 633,639 ---- } /* Initialize the log (it is reinitialized below in case we forked). */ ! if (debug_flag && !inetd_flag && getppid() != 1) log_stderr = 1; log_init(av0, options.log_lev...
2002 Mar 26
1
Two patches for OpenSSH 3.1p1
...e_server_options(&options); /* Parse command-line arguments. */ ! while ((opt = getopt(ac, av, "f:p:b:k:h:g:V:u:o:dDeiIqtQ46")) != -1) { switch (opt) { case '4': IPv4or6 = AF_INET; *************** *** 636,641 **** --- 640,648 ---- case 'e': log_stderr = 1; break; + case 'I': + init_flag = 1; + break; case 'i': inetd_flag = 1; break; *************** *** 706,719 **** /* * Force logging to stderr until we have loaded the private host ! * key (unless started from inetd) */ log_init...
2017 Feb 20
3
[Bug 2681] New: postauth processes to log via monitor
https://bugzilla.mindrot.org/show_bug.cgi?id=2681 Bug ID: 2681 Summary: postauth processes to log via monitor Product: Portable OpenSSH Version: 7.4p1 Hardware: Other OS: Linux Status: NEW Severity: enhancement Priority: P5 Component: sshd Assignee: unassigned-bugs at
2007 Dec 26
1
sshd's -e doesn't work as expected
...flag || inetd_flag || no_daemon_flag)) { int fd; - if (daemon(0, 0) < 0) + if (daemon(0, 1) < 0) fatal("daemon() failed: %.200s", strerror(errno)); + close(STDIN_FILENO); + open(_PATH_DEVNULL, O_RDONLY); + close(STDOUT_FILENO); + open(_PATH_DEVNULL, O_WRONLY); + if (!log_stderr) { + close(STDERR_FILENO); + open(_PATH_DEVNULL, O_WRONLY); + } /* Disconnect from the controlling tty. */ fd = open(_PATH_TTY, O_RDWR | O_NOCTTY); -- Julio M. Merino Vidal <jmmv at NetBSD.org>
1999 Nov 20
1
openssh and DOS
...- the accepted socket. Reinitialize logging (since our - pid has changed). We break out of the loop to handle - the connection. */ - close(listen_sock); - sock_in = newsock; - sock_out = newsock; - log_init(av0, options.log_level, options.log_facility, log_stderr); - break; + /* Make sure we don't have too many connections. */ + if (options.max_connections > 0 + && current_connections >= options.max_connections) + error ("Maximum number of connections (%d) reached", + options.max_connections); +...
2007 Jun 18
0
[PATCH] sftp-server argument error handling
...printing the more useful error to stderr and not blundering on afterwards. --- sftp-server.c.orig Mon Jun 18 16:37:46 2007 +++ sftp-server.c Mon Jun 18 16:39:14 2007 @@ -1220,7 +1220,8 @@ sanitise_stdfd(); __progname = ssh_get_progname(argv[0]); - log_init(__progname, log_level, log_facility, log_stderr); + /* Send any argument errors to stderr */ + log_init(__progname, log_level, log_facility, 1); while (!skipargs && (ch = getopt(argc, argv, "C:f:l:che")) != -1) { switch (ch) { @@ -1237,12 +1238,12 @@ case 'l': log_level = log_level_number(optarg); if (l...
2008 Sep 11
3
ZFS Crypto [Prelim] Codereview
...e to be good enough for caller */ 124 if (nread == 0 && errno == EAGAIN) 125 break; 126 127 /* anything else is an error */ 128 ret = errno; 129 cryptoerror(LOG_STDERR, 130 gettext("error reading file %s: %s"), filename, 131 strerror(ret)); 132 goto error; 133 } DEA-3 read() can return 0 when there''s no data available at the moment. ret will be...
2007 Nov 11
1
ftp-server patch - restrict user to directory
..._t len, olen, set_size; SyslogFacility log_facility = SYSLOG_FACILITY_AUTH; char *cp, buf[4*4096]; + int config_file_mandatory = 0; extern char *optarg; extern char *__progname; @@ -1225,7 +1406,7 @@ __progname = ssh_get_progname(argv[0]); log_init(__progname, log_level, log_facility, log_stderr); - while (!skipargs && (ch = getopt(argc, argv, "C:f:l:che")) != -1) { + while (!skipargs && (ch = getopt(argc, argv, "C:f:F:l:che")) != -1) { switch (ch) { case 'c': /* @@ -1247,12 +1428,18 @@ if (log_level == SYSLOG_FACILITY_NOT_SET)...
2006 Oct 09
1
About sftp-server root path
Hi, I saw in archive that some people made a patch to sftp-server, and that patch sets a root path. I'd like to know if there's an ideia to apply that patch in main tree of openssh? With the use of SSHFS [wich uses sftp-server], it would be interesting to have someting like that, because as we have netboot workstations, the access to devices [such as, floppy, cdrom and usb data] are
2015 Jul 06
3
[PATCH v2 1/1] paint visual host key with unicode box-drawing characters
...level, const char *fmt, va_list args) tmp_handler(level, fmtbuf, log_handler_ctx); log_handler = tmp_handler; } else if (log_on_stderr) { - snprintf(msgbuf, sizeof msgbuf, "%s\r\n", fmtbuf); + /* we want unicode multi byte characters, so do not use fmtbuf here */ (void)write(log_stderr_fd, msgbuf, strlen(msgbuf)); } else { #if defined(HAVE_OPENLOG_R) && defined(SYSLOG_DATA_INIT) diff --git a/sshkey.c b/sshkey.c index cfe5980..326bc29 100644 --- a/sshkey.c +++ b/sshkey.c @@ -44,6 +44,9 @@ #include <stdio.h> #include <string.h> #include <resolv.h> +#...