search for: pidstrbuf

Displaying 11 results from an estimated 11 matches for "pidstrbuf".

2001 May 03
1
[PATCH]: Workaround a security leak on Windows
...1.54 diff -u -p -r1.54 ssh-agent.c --- ssh-agent.c 2001/04/04 01:53:21 1.54 +++ ssh-agent.c 2001/05/03 12:19:50 @@ -714,6 +714,9 @@ main(int ac, char **av) #ifdef HAVE_SETRLIMIT struct rlimit rlim; #endif +#ifdef HAVE_CYGWIN + int prev_mask; +#endif pid_t pid; char *shell, *format, *pidstr, pidstrbuf[1 + 3 * sizeof pid]; extern int optind; @@ -805,10 +808,19 @@ main(int ac, char **av) memset(&sunaddr, 0, sizeof(sunaddr)); sunaddr.sun_family = AF_UNIX; strlcpy(sunaddr.sun_path, socket_name, sizeof(sunaddr.sun_path)); +#ifdef HAVE_CYGWIN + prev_mask = umask(0177); +#endif if (bind(s...
2002 Jun 27
1
OpenSSH 3.3p1 on SunOS 4.1.4
...if (!P) return (-1); ! memcpy(P, environ, cnt * sizeof(char *)); environ = P; } environ[cnt + 1] = NULL; *** ssh-agent.c.orig Fri Jun 21 02:41:52 2002 --- ssh-agent.c Wed Jun 26 18:18:48 2002 *************** *** 939,944 **** --- 939,945 ---- char *shell, *format, *pidstr, pidstrbuf[1 + 3 * sizeof pid]; char *agentsocket = NULL; extern int optind; + extern char *optarg; fd_set *readsetp = NULL, *writesetp = NULL; SSLeay_add_all_algorithms();
2000 Feb 14
0
[openssh-1.2.2] some porting notes for SunOS 4.1.4
...endif /* IPTOS_THROUGHPUT */ } } ======================================================================== --- ssh-agent.c.orig-1.2.2 Mon Jan 3 07:41:05 2000 +++ ssh-agent.c Sun Feb 13 15:35:23 2000 @@ -507,6 +507,7 @@ struct sockaddr_un sunaddr; pid_t pid; char *shell, *format, *pidstr, pidstrbuf[1 + 3 * sizeof pid]; + extern int optind; /* check if RSA support exists */ if (rsa_alive() == 0) { ======================================================================== --- scp.c.orig-1.2.2 Thu Jan 13 23:45:51 2000 +++ scp.c Sun Feb 13 15:58:20 2000 @@ -1229,7 +1229,10 @@ struct sigact...
2003 Sep 10
3
[PATCH] No extern declarations of optarg & co if getopt.h is available
...-r1.122 ssh-agent.c --- ssh-agent.c 21 Aug 2003 23:34:41 -0000 1.122 +++ ssh-agent.c 10 Sep 2003 18:59:01 -0000 @@ -1013,8 +1013,10 @@ main(int ac, char **av) #ifdef HAVE_CYGWIN int prev_mask; #endif +#ifndef HAVE_GETOPT_H extern int optind; extern char *optarg; +#endif pid_t pid; char pidstrbuf[1 + 3 * sizeof pid]; Index: ssh-keygen.c =================================================================== RCS file: /cvs/openssh_cvs/ssh-keygen.c,v retrieving revision 1.111 diff -p -u -r1.111 ssh-keygen.c --- ssh-keygen.c 8 Sep 2003 23:11:33 -0000 1.111 +++ ssh-keygen.c 10 Sep 2003 18:59:01 -...
2000 May 12
0
SunOS 4.x port
...sa.sa_flags = SA_RESTART; +#endif sigaction(SIGALRM, &sa, NULL); alarmtimer(1); } else if (flag == 1) { --- ssh-agent.c.DIST Mon May 1 04:59:51 2000 +++ ssh-agent.c Fri May 5 12:22:05 2000 @@ -507,6 +507,7 @@ struct sockaddr_un sunaddr; pid_t pid; char *shell, *format, *pidstr, pidstrbuf[1 + 3 * sizeof pid]; + extern int optind; /* check if RSA support exists */ if (rsa_alive() == 0) {
2007 Feb 23
1
ssh-agent does not immediately clean timeouted keys from memory
during my seminar of advanced exploitation techniques (SEAT, [1]) i developed some methods to crack into system via DMA (e.g. via firewire). as part of this i developed a program that steals loaded ssh private keys from ssh-agents. i was astonished to find that the keys are not immediately removed from the agent when a timeout occurs, but only the next time the agent is queried via its socket. i
2001 Apr 04
1
compiler warnings about format strings
...printf(format, SSH_AGENTPID_ENV_NAME); - printf("echo Agent pid %d killed;\n", pid); + printf("echo Agent pid %ld killed;\n", (long)pid); exit(0); } parent_pid = getpid(); @@ -849,7 +849,7 @@ SSH_AUTHSOCKET_ENV_NAME); printf(format, SSH_AGENTPID_ENV_NAME, pidstrbuf, SSH_AGENTPID_ENV_NAME); - printf("echo Agent pid %d;\n", pid); + printf("echo Agent pid %ld;\n", (long)pid); exit(0); } if (setenv(SSH_AUTHSOCKET_ENV_NAME, socket_name, 1) == -1 || Index: sshconnect.c @@ -748,7 +748,7 @@ /* Get local user name. Use it a...
2004 Oct 03
3
[PATCH] PreferAskpass in ssh_config
...#ifdef SMARTCARD #include "scard.h" @@ -111,6 +113,11 @@ /* Default lifetime (0 == forever) */ static int lifetime = 0; +Options options; + +uid_t original_real_uid; + + static void close_socket(SocketEntry *e) { @@ -1015,6 +1022,8 @@ extern char *optarg; pid_t pid; char pidstrbuf[1 + 3 * sizeof pid]; + char buf[256]; + struct passwd *pw; /* drop */ setegid(getgid()); @@ -1030,6 +1039,19 @@ __progname = ssh_get_progname(av[0]); init_rng(); seed_rng(); + + initialize_options(&options); + pw = getpwuid(original_real_uid = getuid()); + if (!pw) { + logit("...
2001 Sep 28
1
openssh-2.9.9p2 assumes pid_t, uid_t, etc. are not 'long'
...SH_AUTHSOCKET_ENV_NAME); - printf("echo Agent pid %d;\n", parent_pid); + printf("echo Agent pid %ld;\n", (long)parent_pid); goto skip; } pid = fork(); @@ -982,7 +982,7 @@ main(int ac, char **av) SSH_AUTHSOCKET_ENV_NAME); printf(format, SSH_AGENTPID_ENV_NAME, pidstrbuf, SSH_AGENTPID_ENV_NAME); - printf("echo Agent pid %d;\n", pid); + printf("echo Agent pid %ld;\n", (long)pid); exit(0); } if (setenv(SSH_AUTHSOCKET_ENV_NAME, socket_name, 1) == -1 || =================================================================== RCS fil...
2012 Mar 11
2
[patch] Threading support in ssh-agent
...to given name.\n"); fprintf(stderr, " -t life Default identity lifetime (seconds).\n"); +#ifdef HAVE_LIBPTHREAD + fprintf(stderr, " -p numthr Number of authenticate threads. 0 - do not use separate threads.\n"); +#endif exit(1); } @@ -1142,6 +1443,9 @@ char pidstrbuf[1 + 3 * sizeof pid]; struct timeval *tvp = NULL; size_t len; +#ifdef HAVE_LIBPTHREAD + int numthreads = -1; +#endif /* Ensure that fds 0, 1 and 2 are open or directed to /dev/null */ sanitise_stdfd(); @@ -1160,7 +1464,7 @@ __progname = ssh_get_progname(av[0]); seed_rng(); - while ((...
2008 Apr 21
3
FIPS 140-2 OpenSSL(2007) patches
Hi, I am happy to (re)send a set of patches for compiling OpenSSH 4.7p1 with FIPS 140-2 OpenSSL. These are based on previously reported patches by Steve Marquess <marquess at ieee.org> and Ben Laurie <ben at algroup.co.uk>, for ver. OpenSSH 3.8. Note that these patches are NOT OFFICIAL, and MAY be used freely by anyone. Issues [partially] handled: SSL FIPS Self test. RC4,