search for: pidstr

Displaying 6 results from an estimated 6 matches for "pidstr".

Did you mean: idstr
2001 May 03
1
[PATCH]: Workaround a security leak on Windows
...evision 1.54 diff -u -p -r1.54 ssh-agent.c --- ssh-agent.c 2001/04/04 01:53:21 1.54 +++ ssh-agent.c 2001/05/03 12:19:50 @@ -714,6 +714,9 @@ main(int ac, char **av) #ifdef HAVE_SETRLIMIT struct rlimit rlim; #endif +#ifdef HAVE_CYGWIN + int prev_mask; +#endif pid_t pid; char *shell, *format, *pidstr, pidstrbuf[1 + 3 * sizeof pid]; extern int optind; @@ -805,10 +808,19 @@ main(int ac, char **av) memset(&sunaddr, 0, sizeof(sunaddr)); sunaddr.sun_family = AF_UNIX; strlcpy(sunaddr.sun_path, socket_name, sizeof(sunaddr.sun_path)); +#ifdef HAVE_CYGWIN + prev_mask = umask(0177); +#endif...
2002 Jun 27
1
OpenSSH 3.3p1 on SunOS 4.1.4
...))); if (!P) return (-1); ! memcpy(P, environ, cnt * sizeof(char *)); environ = P; } environ[cnt + 1] = NULL; *** ssh-agent.c.orig Fri Jun 21 02:41:52 2002 --- ssh-agent.c Wed Jun 26 18:18:48 2002 *************** *** 939,944 **** --- 939,945 ---- char *shell, *format, *pidstr, pidstrbuf[1 + 3 * sizeof pid]; char *agentsocket = NULL; extern int optind; + extern char *optarg; fd_set *readsetp = NULL, *writesetp = NULL; SSLeay_add_all_algorithms();
2000 Feb 14
0
[openssh-1.2.2] some porting notes for SunOS 4.1.4
...no)); +#endif /* IPTOS_THROUGHPUT */ } } ======================================================================== --- ssh-agent.c.orig-1.2.2 Mon Jan 3 07:41:05 2000 +++ ssh-agent.c Sun Feb 13 15:35:23 2000 @@ -507,6 +507,7 @@ struct sockaddr_un sunaddr; pid_t pid; char *shell, *format, *pidstr, pidstrbuf[1 + 3 * sizeof pid]; + extern int optind; /* check if RSA support exists */ if (rsa_alive() == 0) { ======================================================================== --- scp.c.orig-1.2.2 Thu Jan 13 23:45:51 2000 +++ scp.c Sun Feb 13 15:58:20 2000 @@ -1229,7 +1229,10 @@ st...
2000 May 12
0
SunOS 4.x port
...START sa.sa_flags = SA_RESTART; +#endif sigaction(SIGALRM, &sa, NULL); alarmtimer(1); } else if (flag == 1) { --- ssh-agent.c.DIST Mon May 1 04:59:51 2000 +++ ssh-agent.c Fri May 5 12:22:05 2000 @@ -507,6 +507,7 @@ struct sockaddr_un sunaddr; pid_t pid; char *shell, *format, *pidstr, pidstrbuf[1 + 3 * sizeof pid]; + extern int optind; /* check if RSA support exists */ if (rsa_alive() == 0) {
2007 Feb 23
1
ssh-agent does not immediately clean timeouted keys from memory
during my seminar of advanced exploitation techniques (SEAT, [1]) i developed some methods to crack into system via DMA (e.g. via firewire). as part of this i developed a program that steals loaded ssh private keys from ssh-agents. i was astonished to find that the keys are not immediately removed from the agent when a timeout occurs, but only the next time the agent is queried via its socket. i
2023 Jun 17
2
[PATCH] ssh-agent: add systemd socket-based activation
...debug_f("cleanup"); if (socket_name[0]) unlink(socket_name); @@ -2000,7 +2012,7 @@ int main(int ac, char **av) { int c_flag = 0, d_flag = 0, D_flag = 0, k_flag = 0, s_flag = 0; - int sock, ch, result, saved_errno; + int sock = 0, ch, result, saved_errno; char *shell, *format, *pidstr, *agentsocket = NULL; #ifdef HAVE_SETRLIMIT struct rlimit rlim; @@ -2015,6 +2027,9 @@ main(int ac, char **av) struct pollfd *pfd = NULL; size_t npfd = 0; u_int maxfds; +#ifdef WITH_SYSTEMD + int nfds = 0; +#endif /* Ensure that fds 0, 1 and 2 are open or directed to /dev/null */ sani...