Displaying 3 results from an estimated 3 matches for "rexec_argc".
Did you mean:
rexec_argv
2005 Jan 12
1
sshd runs with -R flag?
...ere is a problem with
privilege seperation - I wasn't expecting to see so many processes
running as root.
There is this code in sshd.c - But I cannot guess at its purpose:
"sshd.c" line 1195 of 2021:
...
if (rexec_flag) {
rexec_argv = xmalloc(sizeof(char *) * (rexec_argc + 2));
for (i = 0; i < rexec_argc; i++) {
debug("rexec_argv[%d]='%s'", i, saved_argv[i]);
rexec_argv[i] = saved_argv[i];
}
rexec_argv[rexec_argc] = "-R";
re...
2006 May 04
2
xmalloc(foo*bar) -> xcalloc(foo, bar) for Portable
...vs/openssh_cvs/sshd.c,v
retrieving revision 1.333
diff -u -p -r1.333 sshd.c
--- sshd.c 26 Mar 2006 03:24:50 -0000 1.333
+++ sshd.c 4 May 2006 02:01:50 -0000
@@ -921,7 +921,7 @@ main(int ac, char **av)
/* Save argv. Duplicate so setproctitle emulation doesn't clobber it */
saved_argc = ac;
rexec_argc = ac;
- saved_argv = xmalloc(sizeof(*saved_argv) * (ac + 1));
+ saved_argv = xcalloc(ac + 1, sizeof(*saved_argv));
for (i = 0; i < ac; i++)
saved_argv[i] = xstrdup(av[i]);
saved_argv[i] = NULL;
Index: openbsd-compat/bsd-cygwin_util.c
=======================================================...
2012 Jan 28
1
PATCH: Support for encrypted host keys
...er, key->dsa);
+ break;
+ default:
+ fatal("%s: unsupported key type (%s)", __func__,
+ key_type(key));
+ }
+
+ return key;
+}
diff --git a/sshd.c b/sshd.c
index c8d71f8..f458860 100644
--- a/sshd.c
+++ b/sshd.c
@@ -175,6 +175,7 @@ int rexeced_flag = 0;
int rexec_flag = 1;
int rexec_argc = 0;
char **rexec_argv;
+int num_rexec_recvd_host_keys = 0;
/*
* The sockets that the server is listening; this is used in the SIGHUP
@@ -898,6 +899,7 @@ usage(void)
static void
send_rexec_state(int fd, Buffer *conf)
{
+ int i, num_host_keys;
Buffer m;
debug3("%s: entering fd =...