search for: mysig_t

Displaying 15 results from an estimated 15 matches for "mysig_t".

2001 Jan 19
1
Core dumps on HP-UX
Hello, I've been trying to get openssh working at our site recently, but have been running into these problems. In using the "release" version (openssh-2.3.0p1) we kept getting these broken pipe errors: zcat: stdout: Broken pipe Damien suggested we try out the snapshot versions, so I've been trying out the daily versions since last week. With the snapshots, the pipe problem
2001 Feb 18
3
OpenSSH 2.5.0p1 vs. SA_RESTART
...+ misc.c Sat Feb 17 17:59:53 2001 @@ -108,8 +108,10 @@ memset(&sa, 0, sizeof sa); sigemptyset(&sa.sa_mask); sa.sa_flags = 0; +#ifdef SA_RESTART if (sig == SIGCHLD) sa.sa_flags |= SA_RESTART; +#endif sa.sa_handler = act; if (sigaction(sig, &sa, 0) == -1) return (mysig_t) -1;
2013 Feb 15
2
getpgrp
...==================================================== RCS file: /var/cvs/openssh/openbsd-compat/bsd-misc.h,v retrieving revision 1.21 diff -u -p -r1.21 bsd-misc.h --- openbsd-compat/bsd-misc.h 3 Jul 2012 22:50:10 -0000 1.21 +++ openbsd-compat/bsd-misc.h 15 Feb 2013 00:26:37 -0000 @@ -102,4 +102,8 @@ mysig_t mysignal(int sig, mysig_t act); int isblank(int); #endif +#ifndef HAVE_GETPGID +pid_t getpgid(pid_t); +#endif + #endif /* _BSD_MISC_H */ -- Darren Tucker (dtucker at zip.com.au) GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4 37C9 C982 80C7 8FF4 FA69 Good judgement comes with experience. Unf...
2001 Oct 31
2
suggested fix for the sigchld race
comments? alternatives: sigsetjmp(ugly) and pselect(not portable, available) drawback: additional filedescriptors. Index: serverloop.c =================================================================== RCS file: /home/markus/cvs/ssh/serverloop.c,v retrieving revision 1.82 diff -u -r1.82 serverloop.c --- serverloop.c 10 Oct 2001 22:18:47 -0000 1.82 +++ serverloop.c 11 Oct 2001 18:06:33 -0000 @@
2001 Jun 07
2
Patch to enable multiple possible sources of entropy
...eturn(1); } #endif /* RANDOM_POOL */ + #ifdef USE_BUILTIN_ENTROPY /* * FIXME: proper entropy estimations. All current values are guesses * FIXME: (ATL) do estimates at compile time? *************** *** 834,840 **** * syscalls and program output */ void ! seed_rng(void) { mysig_t old_sigchld_handler; --- 807,813 ---- * syscalls and program output */ void ! prng_seed_rng(void) { mysig_t old_sigchld_handler; *************** *** 860,871 **** } void ! init_rng(void) { int original_euid; - check_openssl_version(); - original_uid = getuid();...
2002 Feb 06
2
SFTP Status Bar..
...s != statbytes) ? " ETA" : " "); + } + atomicio(write, fileno(stdout), buf, strlen(buf)); + + if (totalbytes == statbytes) { + atomicio(write, fileno(stdout), "\n", 1); + + /* Clean up for next usage */ + xfree(start); + start = NULL; + statbytes = 0; + } } mysig_t Only in openssh: misc.c.orig diff -ur openssh-3.0.2p1/misc.h openssh/misc.h --- openssh-3.0.2p1/misc.h Wed Jul 4 12:25:55 2001 +++ openssh/misc.h Wed Feb 6 13:02:33 2002 @@ -29,7 +29,11 @@ int num; int nalloc; }; + void addargs(arglist *, char *, ...) __attribute__((f...
2002 Oct 13
1
[PATCH] AIX password expiration
...(; *p; p++) { + if (*p == '\n') + *p = ' '; + } + /* Remove trailing newline */ + *--p = '\0'; +} + +int +is_aix_password_change_required(void) +{ + return aix_password_change_required; +} + +void +do_aix_change_password(struct passwd *pw) +{ + pid_t pid; + int status; + mysig_t old_signal; + + old_signal = mysignal(SIGCHLD, SIG_DFL); + + if ((pid = fork()) == -1) + fatal("Couldn't fork: %s", strerror(errno)); + + if (pid == 0) { + setuid(pw->pw_uid); + execl("/usr/bin/passwd","passwd",pw->pw_name, + (char *)NULL); + } + + if (w...
2001 Sep 04
0
AIX Warning for expired password
...amp; *aixloginmsg) printf("%s\n", aixloginmsg); +#endif /* WITH_AIXAUTHENTICATE */ + +#ifdef WITH_AIXAUTHENTICATE + + retval = passwdexpired(pw->pw_name,&msg); + + if (msg && *msg) + printf("%s\n",msg); + + if (retval == 1) { + + pid_t pid; + int status; + mysig_t old_signal; + + old_signal = mysignal(SIGCHLD, SIG_DFL); + + if ((pid = fork()) == -1) + fatal("Couldn't fork: %s", strerror(errno)); + + if (pid == 0) { + setuid(pw->pw_uid); + execl("/usr/bin/passwd","passwd",pw->pw_name, + (char *)NULL); + } +...
2001 Feb 12
2
patches for UnixWare v2.x pty (misc.c,configure.in)
...eb 12 11:11:15 2001 +++ misc.c Sun Feb 11 22:33:22 2001 @@ -107,7 +107,7 @@ if (osa.sa_handler != act) { memset(&sa, 0, sizeof sa); sigemptyset(&sa.sa_mask); - sa.sa_flags = 0; + sa.sa_flags = SA_RESTART; sa.sa_handler = act; if (sigaction(sig, &sa, 0) == -1) return (mysig_t) -1; -------------- next part -------------- --- configure.in.1.235 Mon Feb 12 11:09:14 2001 +++ configure.in Mon Feb 12 09:13:34 2001 @@ -196,6 +196,15 @@ mansubdir=cat LIBS="$LIBS -lgen -lnsl -lucb" ;; +*-*-sysv4.2uw2*) + CPPFLAGS="$CPPFLAGS -I/usr/local/include" + LDFLA...
2001 Feb 16
7
OpenSSH 2.5.0p1
Known issues: 1) Linux 'sleep 20' -- Unfixable before 2.5.0 (known work around) 2) HP/UX signal issue -- Patched and HP/UX 11 works in v2 3) SCO 2/ Native Compiler -- Unfixable before 2.5.0 (known work around) 4) NeXTStep -- Resynced, MAX_GROUPS vs NGROUPS unresolved (not major) 5) DG/UX regcomp/regexec -- Fixed. 6) Cray signal issues -- ??? 7) Solaris '$PATH' issue -- ??
2002 Dec 21
6
[PATCH] PAM chauthtok + Privsep
...Q_PTY, 1); monitor_permit(mon_dispatch, MONITOR_REQ_PTYCLEANUP, 1); + monitor_permit(mon_dispatch, MONITOR_REQ_PAM_CHAUTHTOK, 1); } for (;;) @@ -746,6 +754,56 @@ xfree(user); return (0); +} + +int +mm_answer_pam_chauthtok(int socket, Buffer *m) +{ + pid_t pid; + int ttyfd, status; + mysig_t old_signal; + + old_signal = mysignal(SIGCHLD, SIG_DFL); + + ttyfd = mm_receive_fd(socket); + debug3("%s: ttyfd=%d, ttyname=%s", __func__, ttyfd, ttyname(ttyfd)); + + if ((pid = fork()) == 0) { + /* acquire controlling tty */ + pty_make_controlling_tty(ttyfd, ttyname(ttyfd)); + + /* se...
2003 Jul 09
0
[PATCH] Add expired password handling for AIX.
...(encrypted_password, pw_password) == 0); #endif /* !HAVE_OSF_SIA */ +} + +/* + * Perform generic password change via tty. Like do_pam_chauthtok(), + * it throws a fatal error if the password can't be changed. + */ +int +do_tty_change_password(struct passwd *pw) +{ + pid_t pid; + int status; + mysig_t old_signal; + + old_signal = mysignal(SIGCHLD, SIG_DFL); + + if ((pid = fork()) == -1) + fatal("Couldn't fork: %s", strerror(errno)); + + if (pid == 0) { + permanently_set_uid(pw); + if (geteuid() == 0) + execl(PASSWD_PROGRAM_PATH, PASSWD_PROGRAM_PATH, + pw->pw_name, (c...
2003 Jul 30
1
[PATCH] Password expiry merge (AIX parts)
...rue if @@ -168,4 +172,81 @@ } # endif #endif /* !HAVE_OSF_SIA */ +} + +/* + * Perform generic password change via tty. Like do_pam_chauthtok(), + * it throws a fatal error if the password can't be changed. + */ +int +do_tty_change_password(struct passwd *pw) +{ + pid_t pid; + int status; + mysig_t old_signal; + + old_signal = mysignal(SIGCHLD, SIG_DFL); + + if ((pid = fork()) == -1) + fatal("Couldn't fork: %s", strerror(errno)); + + if (pid == 0) { + permanently_set_uid(pw); + if (geteuid() == 0) + execl(PASSWD_PROGRAM_PATH, PASSWD_PROGRAM_PATH, + pw->pw_name, (c...
2002 Nov 20
0
[PATCH #9] Password expiration via /bin/passwd.
..., pw_password) == 0); #endif /* !USE_PAM && !HAVE_OSF_SIA */ +} + +/* + * Perform generic password change via tty + * Like do_pam_chauthtok(), it throws a fatal error if the password can't be changed. + */ +void +do_tty_change_password(struct passwd *pw) +{ + pid_t pid; + int status; + mysig_t old_signal; + + old_signal = mysignal(SIGCHLD, SIG_DFL); + + if ((pid = fork()) == -1) + fatal("Couldn't fork: %s", strerror(errno)); + + if (pid == 0) { + setuid(pw->pw_uid); + if (geteuid() == 0) + execl(PASSWD_PROGRAM_PATH, "passwd", pw->pw_name, + (char...
2002 Dec 10
5
[PATCH] Password expiry with Privsep and PAM
...Q_PTY, 1); monitor_permit(mon_dispatch, MONITOR_REQ_PTYCLEANUP, 1); + monitor_permit(mon_dispatch, MONITOR_REQ_PAM_CHAUTHTOK, 1); } for (;;) @@ -746,6 +754,49 @@ xfree(user); return (0); +} + +int +mm_answer_pam_chauthtok(int socket, Buffer *m) +{ + pid_t pid; + int ttyfd, status; + mysig_t old_signal; + + old_signal = mysignal(SIGCHLD, SIG_DFL); + + ttyfd = mm_receive_fd(socket); + debug("%s: ttyfd=%d, ttyname=%s", __func__, ttyfd, ttyname(ttyfd)); + + if ((pid = fork()) == 0) { + close(socket); + if (dup2(ttyfd, 0) < 0) + error("dup2 stdin: %s", strerror(e...