Displaying 6 results from an estimated 6 matches for "pidstr".
Did you mean:
idstr
2001 May 03
1
[PATCH]: Workaround a security leak on Windows
...evision 1.54
diff -u -p -r1.54 ssh-agent.c
--- ssh-agent.c 2001/04/04 01:53:21 1.54
+++ ssh-agent.c 2001/05/03 12:19:50
@@ -714,6 +714,9 @@ main(int ac, char **av)
#ifdef HAVE_SETRLIMIT
struct rlimit rlim;
#endif
+#ifdef HAVE_CYGWIN
+ int prev_mask;
+#endif
pid_t pid;
char *shell, *format, *pidstr, pidstrbuf[1 + 3 * sizeof pid];
extern int optind;
@@ -805,10 +808,19 @@ main(int ac, char **av)
memset(&sunaddr, 0, sizeof(sunaddr));
sunaddr.sun_family = AF_UNIX;
strlcpy(sunaddr.sun_path, socket_name, sizeof(sunaddr.sun_path));
+#ifdef HAVE_CYGWIN
+ prev_mask = umask(0177);
+#endif...
2002 Jun 27
1
OpenSSH 3.3p1 on SunOS 4.1.4
...)));
if (!P)
return (-1);
! memcpy(P, environ, cnt * sizeof(char *));
environ = P;
}
environ[cnt + 1] = NULL;
*** ssh-agent.c.orig Fri Jun 21 02:41:52 2002
--- ssh-agent.c Wed Jun 26 18:18:48 2002
***************
*** 939,944 ****
--- 939,945 ----
char *shell, *format, *pidstr, pidstrbuf[1 + 3 * sizeof pid];
char *agentsocket = NULL;
extern int optind;
+ extern char *optarg;
fd_set *readsetp = NULL, *writesetp = NULL;
SSLeay_add_all_algorithms();
2000 Feb 14
0
[openssh-1.2.2] some porting notes for SunOS 4.1.4
...no));
+#endif /* IPTOS_THROUGHPUT */
}
}
========================================================================
--- ssh-agent.c.orig-1.2.2 Mon Jan 3 07:41:05 2000
+++ ssh-agent.c Sun Feb 13 15:35:23 2000
@@ -507,6 +507,7 @@
struct sockaddr_un sunaddr;
pid_t pid;
char *shell, *format, *pidstr, pidstrbuf[1 + 3 * sizeof pid];
+ extern int optind;
/* check if RSA support exists */
if (rsa_alive() == 0) {
========================================================================
--- scp.c.orig-1.2.2 Thu Jan 13 23:45:51 2000
+++ scp.c Sun Feb 13 15:58:20 2000
@@ -1229,7 +1229,10 @@
st...
2000 May 12
0
SunOS 4.x port
...START
sa.sa_flags = SA_RESTART;
+#endif
sigaction(SIGALRM, &sa, NULL);
alarmtimer(1);
} else if (flag == 1) {
--- ssh-agent.c.DIST Mon May 1 04:59:51 2000
+++ ssh-agent.c Fri May 5 12:22:05 2000
@@ -507,6 +507,7 @@
struct sockaddr_un sunaddr;
pid_t pid;
char *shell, *format, *pidstr, pidstrbuf[1 + 3 * sizeof pid];
+ extern int optind;
/* check if RSA support exists */
if (rsa_alive() == 0) {
2007 Feb 23
1
ssh-agent does not immediately clean timeouted keys from memory
during my seminar of advanced exploitation techniques (SEAT, [1]) i
developed some methods to crack into system via DMA (e.g. via firewire).
as part of this i developed a program that steals loaded ssh private
keys from ssh-agents. i was astonished to find that the keys are not
immediately removed from the agent when a timeout occurs, but only the
next time the agent is queried via its socket. i
2023 Jun 17
2
[PATCH] ssh-agent: add systemd socket-based activation
...debug_f("cleanup");
if (socket_name[0])
unlink(socket_name);
@@ -2000,7 +2012,7 @@ int
main(int ac, char **av)
{
int c_flag = 0, d_flag = 0, D_flag = 0, k_flag = 0, s_flag = 0;
- int sock, ch, result, saved_errno;
+ int sock = 0, ch, result, saved_errno;
char *shell, *format, *pidstr, *agentsocket = NULL;
#ifdef HAVE_SETRLIMIT
struct rlimit rlim;
@@ -2015,6 +2027,9 @@ main(int ac, char **av)
struct pollfd *pfd = NULL;
size_t npfd = 0;
u_int maxfds;
+#ifdef WITH_SYSTEMD
+ int nfds = 0;
+#endif
/* Ensure that fds 0, 1 and 2 are open or directed to /dev/null */
sani...