Displaying 15 results from an estimated 15 matches for "mysig_t".
2001 Jan 19
1
Core dumps on HP-UX
Hello,
I've been trying to get openssh working at our site recently, but have
been running into these problems. In using the "release" version
(openssh-2.3.0p1) we kept getting these broken pipe errors:
zcat: stdout: Broken pipe
Damien suggested we try out the snapshot versions, so I've been trying
out the daily versions since last week. With the snapshots, the pipe
problem
2001 Feb 18
3
OpenSSH 2.5.0p1 vs. SA_RESTART
...+ misc.c Sat Feb 17 17:59:53 2001
@@ -108,8 +108,10 @@
memset(&sa, 0, sizeof sa);
sigemptyset(&sa.sa_mask);
sa.sa_flags = 0;
+#ifdef SA_RESTART
if (sig == SIGCHLD)
sa.sa_flags |= SA_RESTART;
+#endif
sa.sa_handler = act;
if (sigaction(sig, &sa, 0) == -1)
return (mysig_t) -1;
2013 Feb 15
2
getpgrp
...====================================================
RCS file: /var/cvs/openssh/openbsd-compat/bsd-misc.h,v
retrieving revision 1.21
diff -u -p -r1.21 bsd-misc.h
--- openbsd-compat/bsd-misc.h 3 Jul 2012 22:50:10 -0000 1.21
+++ openbsd-compat/bsd-misc.h 15 Feb 2013 00:26:37 -0000
@@ -102,4 +102,8 @@ mysig_t mysignal(int sig, mysig_t act);
int isblank(int);
#endif
+#ifndef HAVE_GETPGID
+pid_t getpgid(pid_t);
+#endif
+
#endif /* _BSD_MISC_H */
--
Darren Tucker (dtucker at zip.com.au)
GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4 37C9 C982 80C7 8FF4 FA69
Good judgement comes with experience. Unf...
2001 Oct 31
2
suggested fix for the sigchld race
comments?
alternatives: sigsetjmp(ugly) and pselect(not portable, available)
drawback: additional filedescriptors.
Index: serverloop.c
===================================================================
RCS file: /home/markus/cvs/ssh/serverloop.c,v
retrieving revision 1.82
diff -u -r1.82 serverloop.c
--- serverloop.c 10 Oct 2001 22:18:47 -0000 1.82
+++ serverloop.c 11 Oct 2001 18:06:33 -0000
@@
2001 Jun 07
2
Patch to enable multiple possible sources of entropy
...eturn(1);
}
#endif /* RANDOM_POOL */
+ #ifdef USE_BUILTIN_ENTROPY
/*
* FIXME: proper entropy estimations. All current values are guesses
* FIXME: (ATL) do estimates at compile time?
***************
*** 834,840 ****
* syscalls and program output
*/
void
! seed_rng(void)
{
mysig_t old_sigchld_handler;
--- 807,813 ----
* syscalls and program output
*/
void
! prng_seed_rng(void)
{
mysig_t old_sigchld_handler;
***************
*** 860,871 ****
}
void
! init_rng(void)
{
int original_euid;
- check_openssl_version();
-
original_uid = getuid();...
2002 Feb 06
2
SFTP Status Bar..
...s != statbytes) ? " ETA" : " ");
+ }
+ atomicio(write, fileno(stdout), buf, strlen(buf));
+
+ if (totalbytes == statbytes) {
+ atomicio(write, fileno(stdout), "\n", 1);
+
+ /* Clean up for next usage */
+ xfree(start);
+ start = NULL;
+ statbytes = 0;
+ }
}
mysig_t
Only in openssh: misc.c.orig
diff -ur openssh-3.0.2p1/misc.h openssh/misc.h
--- openssh-3.0.2p1/misc.h Wed Jul 4 12:25:55 2001
+++ openssh/misc.h Wed Feb 6 13:02:33 2002
@@ -29,7 +29,11 @@
int num;
int nalloc;
};
+
void addargs(arglist *, char *, ...) __attribute__((f...
2002 Oct 13
1
[PATCH] AIX password expiration
...(; *p; p++) {
+ if (*p == '\n')
+ *p = ' ';
+ }
+ /* Remove trailing newline */
+ *--p = '\0';
+}
+
+int
+is_aix_password_change_required(void)
+{
+ return aix_password_change_required;
+}
+
+void
+do_aix_change_password(struct passwd *pw)
+{
+ pid_t pid;
+ int status;
+ mysig_t old_signal;
+
+ old_signal = mysignal(SIGCHLD, SIG_DFL);
+
+ if ((pid = fork()) == -1)
+ fatal("Couldn't fork: %s", strerror(errno));
+
+ if (pid == 0) {
+ setuid(pw->pw_uid);
+ execl("/usr/bin/passwd","passwd",pw->pw_name,
+ (char *)NULL);
+ }
+
+ if (w...
2001 Sep 04
0
AIX Warning for expired password
...amp; *aixloginmsg)
printf("%s\n", aixloginmsg);
+#endif /* WITH_AIXAUTHENTICATE */
+
+#ifdef WITH_AIXAUTHENTICATE
+
+ retval = passwdexpired(pw->pw_name,&msg);
+
+ if (msg && *msg)
+ printf("%s\n",msg);
+
+ if (retval == 1) {
+
+ pid_t pid;
+ int status;
+ mysig_t old_signal;
+
+ old_signal = mysignal(SIGCHLD, SIG_DFL);
+
+ if ((pid = fork()) == -1)
+ fatal("Couldn't fork: %s", strerror(errno));
+
+ if (pid == 0) {
+ setuid(pw->pw_uid);
+ execl("/usr/bin/passwd","passwd",pw->pw_name,
+ (char *)NULL);
+ }
+...
2001 Feb 12
2
patches for UnixWare v2.x pty (misc.c,configure.in)
...eb 12 11:11:15 2001
+++ misc.c Sun Feb 11 22:33:22 2001
@@ -107,7 +107,7 @@
if (osa.sa_handler != act) {
memset(&sa, 0, sizeof sa);
sigemptyset(&sa.sa_mask);
- sa.sa_flags = 0;
+ sa.sa_flags = SA_RESTART;
sa.sa_handler = act;
if (sigaction(sig, &sa, 0) == -1)
return (mysig_t) -1;
-------------- next part --------------
--- configure.in.1.235 Mon Feb 12 11:09:14 2001
+++ configure.in Mon Feb 12 09:13:34 2001
@@ -196,6 +196,15 @@
mansubdir=cat
LIBS="$LIBS -lgen -lnsl -lucb"
;;
+*-*-sysv4.2uw2*)
+ CPPFLAGS="$CPPFLAGS -I/usr/local/include"
+ LDFLA...
2001 Feb 16
7
OpenSSH 2.5.0p1
Known issues:
1) Linux 'sleep 20' -- Unfixable before 2.5.0 (known work around)
2) HP/UX signal issue -- Patched and HP/UX 11 works in v2
3) SCO 2/ Native Compiler -- Unfixable before 2.5.0 (known work around)
4) NeXTStep -- Resynced, MAX_GROUPS vs NGROUPS unresolved (not major)
5) DG/UX regcomp/regexec -- Fixed.
6) Cray signal issues -- ???
7) Solaris '$PATH' issue -- ??
2002 Dec 21
6
[PATCH] PAM chauthtok + Privsep
...Q_PTY, 1);
monitor_permit(mon_dispatch, MONITOR_REQ_PTYCLEANUP, 1);
+ monitor_permit(mon_dispatch, MONITOR_REQ_PAM_CHAUTHTOK, 1);
}
for (;;)
@@ -746,6 +754,56 @@
xfree(user);
return (0);
+}
+
+int
+mm_answer_pam_chauthtok(int socket, Buffer *m)
+{
+ pid_t pid;
+ int ttyfd, status;
+ mysig_t old_signal;
+
+ old_signal = mysignal(SIGCHLD, SIG_DFL);
+
+ ttyfd = mm_receive_fd(socket);
+ debug3("%s: ttyfd=%d, ttyname=%s", __func__, ttyfd, ttyname(ttyfd));
+
+ if ((pid = fork()) == 0) {
+ /* acquire controlling tty */
+ pty_make_controlling_tty(ttyfd, ttyname(ttyfd));
+
+ /* se...
2003 Jul 09
0
[PATCH] Add expired password handling for AIX.
...(encrypted_password, pw_password) == 0);
#endif /* !HAVE_OSF_SIA */
+}
+
+/*
+ * Perform generic password change via tty. Like do_pam_chauthtok(),
+ * it throws a fatal error if the password can't be changed.
+ */
+int
+do_tty_change_password(struct passwd *pw)
+{
+ pid_t pid;
+ int status;
+ mysig_t old_signal;
+
+ old_signal = mysignal(SIGCHLD, SIG_DFL);
+
+ if ((pid = fork()) == -1)
+ fatal("Couldn't fork: %s", strerror(errno));
+
+ if (pid == 0) {
+ permanently_set_uid(pw);
+ if (geteuid() == 0)
+ execl(PASSWD_PROGRAM_PATH, PASSWD_PROGRAM_PATH,
+ pw->pw_name, (c...
2003 Jul 30
1
[PATCH] Password expiry merge (AIX parts)
...rue if
@@ -168,4 +172,81 @@
}
# endif
#endif /* !HAVE_OSF_SIA */
+}
+
+/*
+ * Perform generic password change via tty. Like do_pam_chauthtok(),
+ * it throws a fatal error if the password can't be changed.
+ */
+int
+do_tty_change_password(struct passwd *pw)
+{
+ pid_t pid;
+ int status;
+ mysig_t old_signal;
+
+ old_signal = mysignal(SIGCHLD, SIG_DFL);
+
+ if ((pid = fork()) == -1)
+ fatal("Couldn't fork: %s", strerror(errno));
+
+ if (pid == 0) {
+ permanently_set_uid(pw);
+ if (geteuid() == 0)
+ execl(PASSWD_PROGRAM_PATH, PASSWD_PROGRAM_PATH,
+ pw->pw_name, (c...
2002 Nov 20
0
[PATCH #9] Password expiration via /bin/passwd.
..., pw_password) == 0);
#endif /* !USE_PAM && !HAVE_OSF_SIA */
+}
+
+/*
+ * Perform generic password change via tty
+ * Like do_pam_chauthtok(), it throws a fatal error if the password can't be changed.
+ */
+void
+do_tty_change_password(struct passwd *pw)
+{
+ pid_t pid;
+ int status;
+ mysig_t old_signal;
+
+ old_signal = mysignal(SIGCHLD, SIG_DFL);
+
+ if ((pid = fork()) == -1)
+ fatal("Couldn't fork: %s", strerror(errno));
+
+ if (pid == 0) {
+ setuid(pw->pw_uid);
+ if (geteuid() == 0)
+ execl(PASSWD_PROGRAM_PATH, "passwd", pw->pw_name,
+ (char...
2002 Dec 10
5
[PATCH] Password expiry with Privsep and PAM
...Q_PTY, 1);
monitor_permit(mon_dispatch, MONITOR_REQ_PTYCLEANUP, 1);
+ monitor_permit(mon_dispatch, MONITOR_REQ_PAM_CHAUTHTOK, 1);
}
for (;;)
@@ -746,6 +754,49 @@
xfree(user);
return (0);
+}
+
+int
+mm_answer_pam_chauthtok(int socket, Buffer *m)
+{
+ pid_t pid;
+ int ttyfd, status;
+ mysig_t old_signal;
+
+ old_signal = mysignal(SIGCHLD, SIG_DFL);
+
+ ttyfd = mm_receive_fd(socket);
+ debug("%s: ttyfd=%d, ttyname=%s", __func__, ttyfd, ttyname(ttyfd));
+
+ if ((pid = fork()) == 0) {
+ close(socket);
+ if (dup2(ttyfd, 0) < 0)
+ error("dup2 stdin: %s", strerror(e...