Displaying 6 results from an estimated 6 matches for "monitor_init".
Did you mean:
monitor_bit
2014 Apr 12
4
[Bug 2225] New: sshd core dumps when used in high scaled environments.
..../../../../src/crypto/openssh/sshd.c:2415
#1 0x080ae7bf in fatal (fmt=0x80b8ea6 "%s: socketpair: %s") at
../../../../../../src/crypto/openssh/fatal.c:42
#2 0x08065779 in monitor_openfds (mon=0x80eb5c0, do_logfds=1) at
../../../../../../src/crypto/openssh/monitor.c:1877
#3 0x080658ee in monitor_init () at
../../../../../../src/crypto/openssh/monitor.c:1903
#4 0x080507fd in privsep_preauth (authctxt=0x0) at
../../../../../../src/crypto/openssh/sshd.c:669
#5 0x08051f72 in main (ac=903248, av=0xc811cc00) at
../../../../../../src/crypto/openssh/sshd.c:2014
Here the pmonitor is NULL inside &quo...
2013 Oct 31
9
[Bug 2167] New: Connection remains when fork() fails.
https://bugzilla.mindrot.org/show_bug.cgi?id=2167
Bug ID: 2167
Summary: Connection remains when fork() fails.
Product: Portable OpenSSH
Version: 5.3p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
Assignee: unassigned-bugs at
2011 Jun 02
2
preauth privsep logging via monitor
...ilegeSeparation=yes not supported",
- __func__);
-#endif
- FD_CLOSEONEXEC(pair[0]);
- FD_CLOSEONEXEC(pair[1]);
+ fatal("%s: UsePrivilegeSeparation=yes not supported", __func__);
+#endif /* HAVE_SOCKETPAIR */
}
#define MM_MEMSIZE 65536
@@ -1870,14 +1972,10 @@ struct monitor *
monitor_init(void)
{
struct monitor *mon;
- int pair[2];
mon = xcalloc(1, sizeof(*mon));
- monitor_socketpair(pair);
-
- mon->m_recvfd = pair[0];
- mon->m_sendfd = pair[1];
+ monitor_openfds(mon, 1);
/* Used to share zlib space across processes */
if (options.compression) {
@@ -1894,12 +199...
2008 Apr 21
3
FIPS 140-2 OpenSSL(2007) patches
Hi,
I am happy to (re)send a set of patches for compiling OpenSSH 4.7p1 with
FIPS 140-2 OpenSSL.
These are based on previously reported patches by Steve Marquess
<marquess at ieee.org> and Ben Laurie <ben at algroup.co.uk>,
for ver. OpenSSH 3.8.
Note that these patches are NOT OFFICIAL, and MAY be used freely by
anyone.
Issues [partially] handled:
SSL FIPS Self test.
RC4,
2011 Jun 22
3
sandbox pre-auth privsep child
...ming.h"
+#include "sandbox.h"
#include "version.h"
#ifdef LIBWRAP
@@ -624,18 +625,23 @@ privsep_preauth(Authctxt *authctxt)
{
int status;
pid_t pid;
+ struct ssh_sandbox *box = NULL;
/* Set up unprivileged child process to deal with network data */
pmonitor = monitor_init();
/* Store a pointer to the kex for later rekeying */
pmonitor->m_pkex = &xxx_kex;
+ if (use_privsep == PRIVSEP_SANDBOX)
+ box = ssh_sandbox_init();
pid = fork();
if (pid == -1) {
fatal("fork of unprivileged child failed");
} else if (pid != 0) {
debug2("Ne...
2003 Oct 08
4
OS/390 openssh
...(&m, &child_state.ilen);
+ child_state.output = buffer_get_binary(&m, &child_state.olen);
buffer_free(&m);
}
@@ -1699,6 +1699,10 @@
}
#define MM_MEMSIZE 65536
+#if #system(bs2000)
+#undef MM_MEMSIZE
+#define MM_MEMSIZE 16384 /* 16 kB */
+#endif
struct monitor *
monitor_init(void)
diff -bur openssh-3.7.1p2.orig/monitor_wrap.c openssh-3.7.1p2/monitor_wrap.c
--- openssh-3.7.1p2.orig/monitor_wrap.c Tue Sep 2 14:51:17 2003
+++ openssh-3.7.1p2/monitor_wrap.c Tue Oct 7 08:22:01 2003
@@ -165,13 +165,13 @@
buffer_init(&m);
buffer_put_int(&m, kex->host_key_in...