search for: monitor_init

Displaying 6 results from an estimated 6 matches for "monitor_init".

Did you mean: monitor_bit
2014 Apr 12
4
[Bug 2225] New: sshd core dumps when used in high scaled environments.
..../../../../src/crypto/openssh/sshd.c:2415 #1 0x080ae7bf in fatal (fmt=0x80b8ea6 "%s: socketpair: %s") at ../../../../../../src/crypto/openssh/fatal.c:42 #2 0x08065779 in monitor_openfds (mon=0x80eb5c0, do_logfds=1) at ../../../../../../src/crypto/openssh/monitor.c:1877 #3 0x080658ee in monitor_init () at ../../../../../../src/crypto/openssh/monitor.c:1903 #4 0x080507fd in privsep_preauth (authctxt=0x0) at ../../../../../../src/crypto/openssh/sshd.c:669 #5 0x08051f72 in main (ac=903248, av=0xc811cc00) at ../../../../../../src/crypto/openssh/sshd.c:2014 Here the pmonitor is NULL inside &quo...
2013 Oct 31
9
[Bug 2167] New: Connection remains when fork() fails.
https://bugzilla.mindrot.org/show_bug.cgi?id=2167 Bug ID: 2167 Summary: Connection remains when fork() fails. Product: Portable OpenSSH Version: 5.3p1 Hardware: Other OS: Linux Status: NEW Severity: enhancement Priority: P5 Component: sshd Assignee: unassigned-bugs at
2011 Jun 02
2
preauth privsep logging via monitor
...ilegeSeparation=yes not supported", - __func__); -#endif - FD_CLOSEONEXEC(pair[0]); - FD_CLOSEONEXEC(pair[1]); + fatal("%s: UsePrivilegeSeparation=yes not supported", __func__); +#endif /* HAVE_SOCKETPAIR */ } #define MM_MEMSIZE 65536 @@ -1870,14 +1972,10 @@ struct monitor * monitor_init(void) { struct monitor *mon; - int pair[2]; mon = xcalloc(1, sizeof(*mon)); - monitor_socketpair(pair); - - mon->m_recvfd = pair[0]; - mon->m_sendfd = pair[1]; + monitor_openfds(mon, 1); /* Used to share zlib space across processes */ if (options.compression) { @@ -1894,12 +199...
2008 Apr 21
3
FIPS 140-2 OpenSSL(2007) patches
Hi, I am happy to (re)send a set of patches for compiling OpenSSH 4.7p1 with FIPS 140-2 OpenSSL. These are based on previously reported patches by Steve Marquess <marquess at ieee.org> and Ben Laurie <ben at algroup.co.uk>, for ver. OpenSSH 3.8. Note that these patches are NOT OFFICIAL, and MAY be used freely by anyone. Issues [partially] handled: SSL FIPS Self test. RC4,
2011 Jun 22
3
sandbox pre-auth privsep child
...ming.h" +#include "sandbox.h" #include "version.h" #ifdef LIBWRAP @@ -624,18 +625,23 @@ privsep_preauth(Authctxt *authctxt) { int status; pid_t pid; + struct ssh_sandbox *box = NULL; /* Set up unprivileged child process to deal with network data */ pmonitor = monitor_init(); /* Store a pointer to the kex for later rekeying */ pmonitor->m_pkex = &xxx_kex; + if (use_privsep == PRIVSEP_SANDBOX) + box = ssh_sandbox_init(); pid = fork(); if (pid == -1) { fatal("fork of unprivileged child failed"); } else if (pid != 0) { debug2("Ne...
2003 Oct 08
4
OS/390 openssh
...(&m, &child_state.ilen); + child_state.output = buffer_get_binary(&m, &child_state.olen); buffer_free(&m); } @@ -1699,6 +1699,10 @@ } #define MM_MEMSIZE 65536 +#if #system(bs2000) +#undef MM_MEMSIZE +#define MM_MEMSIZE 16384 /* 16 kB */ +#endif struct monitor * monitor_init(void) diff -bur openssh-3.7.1p2.orig/monitor_wrap.c openssh-3.7.1p2/monitor_wrap.c --- openssh-3.7.1p2.orig/monitor_wrap.c Tue Sep 2 14:51:17 2003 +++ openssh-3.7.1p2/monitor_wrap.c Tue Oct 7 08:22:01 2003 @@ -165,13 +165,13 @@ buffer_init(&m); buffer_put_int(&m, kex->host_key_in...