Displaying 11 results from an estimated 11 matches for "pidstrbuf".
2001 May 03
1
[PATCH]: Workaround a security leak on Windows
...1.54
diff -u -p -r1.54 ssh-agent.c
--- ssh-agent.c 2001/04/04 01:53:21 1.54
+++ ssh-agent.c 2001/05/03 12:19:50
@@ -714,6 +714,9 @@ main(int ac, char **av)
#ifdef HAVE_SETRLIMIT
struct rlimit rlim;
#endif
+#ifdef HAVE_CYGWIN
+ int prev_mask;
+#endif
pid_t pid;
char *shell, *format, *pidstr, pidstrbuf[1 + 3 * sizeof pid];
extern int optind;
@@ -805,10 +808,19 @@ main(int ac, char **av)
memset(&sunaddr, 0, sizeof(sunaddr));
sunaddr.sun_family = AF_UNIX;
strlcpy(sunaddr.sun_path, socket_name, sizeof(sunaddr.sun_path));
+#ifdef HAVE_CYGWIN
+ prev_mask = umask(0177);
+#endif
if (bind(s...
2002 Jun 27
1
OpenSSH 3.3p1 on SunOS 4.1.4
...if (!P)
return (-1);
! memcpy(P, environ, cnt * sizeof(char *));
environ = P;
}
environ[cnt + 1] = NULL;
*** ssh-agent.c.orig Fri Jun 21 02:41:52 2002
--- ssh-agent.c Wed Jun 26 18:18:48 2002
***************
*** 939,944 ****
--- 939,945 ----
char *shell, *format, *pidstr, pidstrbuf[1 + 3 * sizeof pid];
char *agentsocket = NULL;
extern int optind;
+ extern char *optarg;
fd_set *readsetp = NULL, *writesetp = NULL;
SSLeay_add_all_algorithms();
2000 Feb 14
0
[openssh-1.2.2] some porting notes for SunOS 4.1.4
...endif /* IPTOS_THROUGHPUT */
}
}
========================================================================
--- ssh-agent.c.orig-1.2.2 Mon Jan 3 07:41:05 2000
+++ ssh-agent.c Sun Feb 13 15:35:23 2000
@@ -507,6 +507,7 @@
struct sockaddr_un sunaddr;
pid_t pid;
char *shell, *format, *pidstr, pidstrbuf[1 + 3 * sizeof pid];
+ extern int optind;
/* check if RSA support exists */
if (rsa_alive() == 0) {
========================================================================
--- scp.c.orig-1.2.2 Thu Jan 13 23:45:51 2000
+++ scp.c Sun Feb 13 15:58:20 2000
@@ -1229,7 +1229,10 @@
struct sigact...
2003 Sep 10
3
[PATCH] No extern declarations of optarg & co if getopt.h is available
...-r1.122 ssh-agent.c
--- ssh-agent.c 21 Aug 2003 23:34:41 -0000 1.122
+++ ssh-agent.c 10 Sep 2003 18:59:01 -0000
@@ -1013,8 +1013,10 @@ main(int ac, char **av)
#ifdef HAVE_CYGWIN
int prev_mask;
#endif
+#ifndef HAVE_GETOPT_H
extern int optind;
extern char *optarg;
+#endif
pid_t pid;
char pidstrbuf[1 + 3 * sizeof pid];
Index: ssh-keygen.c
===================================================================
RCS file: /cvs/openssh_cvs/ssh-keygen.c,v
retrieving revision 1.111
diff -p -u -r1.111 ssh-keygen.c
--- ssh-keygen.c 8 Sep 2003 23:11:33 -0000 1.111
+++ ssh-keygen.c 10 Sep 2003 18:59:01 -...
2000 May 12
0
SunOS 4.x port
...sa.sa_flags = SA_RESTART;
+#endif
sigaction(SIGALRM, &sa, NULL);
alarmtimer(1);
} else if (flag == 1) {
--- ssh-agent.c.DIST Mon May 1 04:59:51 2000
+++ ssh-agent.c Fri May 5 12:22:05 2000
@@ -507,6 +507,7 @@
struct sockaddr_un sunaddr;
pid_t pid;
char *shell, *format, *pidstr, pidstrbuf[1 + 3 * sizeof pid];
+ extern int optind;
/* check if RSA support exists */
if (rsa_alive() == 0) {
2007 Feb 23
1
ssh-agent does not immediately clean timeouted keys from memory
during my seminar of advanced exploitation techniques (SEAT, [1]) i
developed some methods to crack into system via DMA (e.g. via firewire).
as part of this i developed a program that steals loaded ssh private
keys from ssh-agents. i was astonished to find that the keys are not
immediately removed from the agent when a timeout occurs, but only the
next time the agent is queried via its socket. i
2001 Apr 04
1
compiler warnings about format strings
...printf(format, SSH_AGENTPID_ENV_NAME);
- printf("echo Agent pid %d killed;\n", pid);
+ printf("echo Agent pid %ld killed;\n", (long)pid);
exit(0);
}
parent_pid = getpid();
@@ -849,7 +849,7 @@
SSH_AUTHSOCKET_ENV_NAME);
printf(format, SSH_AGENTPID_ENV_NAME, pidstrbuf,
SSH_AGENTPID_ENV_NAME);
- printf("echo Agent pid %d;\n", pid);
+ printf("echo Agent pid %ld;\n", (long)pid);
exit(0);
}
if (setenv(SSH_AUTHSOCKET_ENV_NAME, socket_name, 1) == -1 ||
Index: sshconnect.c
@@ -748,7 +748,7 @@
/* Get local user name. Use it a...
2004 Oct 03
3
[PATCH] PreferAskpass in ssh_config
...#ifdef SMARTCARD
#include "scard.h"
@@ -111,6 +113,11 @@
/* Default lifetime (0 == forever) */
static int lifetime = 0;
+Options options;
+
+uid_t original_real_uid;
+
+
static void
close_socket(SocketEntry *e)
{
@@ -1015,6 +1022,8 @@
extern char *optarg;
pid_t pid;
char pidstrbuf[1 + 3 * sizeof pid];
+ char buf[256];
+ struct passwd *pw;
/* drop */
setegid(getgid());
@@ -1030,6 +1039,19 @@
__progname = ssh_get_progname(av[0]);
init_rng();
seed_rng();
+
+ initialize_options(&options);
+ pw = getpwuid(original_real_uid = getuid());
+ if (!pw) {
+ logit("...
2001 Sep 28
1
openssh-2.9.9p2 assumes pid_t, uid_t, etc. are not 'long'
...SH_AUTHSOCKET_ENV_NAME);
- printf("echo Agent pid %d;\n", parent_pid);
+ printf("echo Agent pid %ld;\n", (long)parent_pid);
goto skip;
}
pid = fork();
@@ -982,7 +982,7 @@ main(int ac, char **av)
SSH_AUTHSOCKET_ENV_NAME);
printf(format, SSH_AGENTPID_ENV_NAME, pidstrbuf,
SSH_AGENTPID_ENV_NAME);
- printf("echo Agent pid %d;\n", pid);
+ printf("echo Agent pid %ld;\n", (long)pid);
exit(0);
}
if (setenv(SSH_AUTHSOCKET_ENV_NAME, socket_name, 1) == -1 ||
===================================================================
RCS fil...
2012 Mar 11
2
[patch] Threading support in ssh-agent
...to given name.\n");
fprintf(stderr, " -t life Default identity lifetime (seconds).\n");
+#ifdef HAVE_LIBPTHREAD
+ fprintf(stderr, " -p numthr Number of authenticate threads. 0 - do not use separate threads.\n");
+#endif
exit(1);
}
@@ -1142,6 +1443,9 @@
char pidstrbuf[1 + 3 * sizeof pid];
struct timeval *tvp = NULL;
size_t len;
+#ifdef HAVE_LIBPTHREAD
+ int numthreads = -1;
+#endif
/* Ensure that fds 0, 1 and 2 are open or directed to /dev/null */
sanitise_stdfd();
@@ -1160,7 +1464,7 @@
__progname = ssh_get_progname(av[0]);
seed_rng();
- while ((...
2008 Apr 21
3
FIPS 140-2 OpenSSL(2007) patches
Hi,
I am happy to (re)send a set of patches for compiling OpenSSH 4.7p1 with
FIPS 140-2 OpenSSL.
These are based on previously reported patches by Steve Marquess
<marquess at ieee.org> and Ben Laurie <ben at algroup.co.uk>,
for ver. OpenSSH 3.8.
Note that these patches are NOT OFFICIAL, and MAY be used freely by
anyone.
Issues [partially] handled:
SSL FIPS Self test.
RC4,