search for: ssh_listen_backlog

Displaying 7 results from an estimated 7 matches for "ssh_listen_backlog".

2015 Aug 17
2
[PATCH] Expand tilde for UNIX domain socket forwards.
..., __func__, type, fwd->listen_path); + /* Expand home directory if necessary */ + char *expanded_path = tilde_expand_filename(fwd->listen_path, getuid()); + /* Start a Unix domain listener. */ omask = umask(fwd_opts->streamlocal_bind_mask); - sock = unix_listener(fwd->listen_path, SSH_LISTEN_BACKLOG, + sock = unix_listener(expanded_path, SSH_LISTEN_BACKLOG, fwd_opts->streamlocal_bind_unlink); + free(expanded_path); umask(omask); if (sock < 0) return 0; -- 1.9.1
2023 Jun 17
2
[PATCH] ssh-agent: add systemd socket-based activation
...t_pid); } else { /* Try to use specified agent socket */ socket_dir[0] = '\0'; @@ -2161,14 +2195,16 @@ main(int ac, char **av) * Create socket early so it will exist before command gets run from * the parent. */ - prev_mask = umask(0177); - sock = unix_listener(socket_name, SSH_LISTEN_BACKLOG, 0); - if (sock < 0) { - /* XXX - unix_listener() calls error() not perror() */ - *socket_name = '\0'; /* Don't unlink any existing file */ - cleanup_exit(1); + if (sock == 0) { + prev_mask = umask(0177); + sock = unix_listener(socket_name, SSH_LISTEN_BACKLOG, 0); + if (sock &l...
2006 Feb 24
5
[Bug 1162] Inappropriate sequence of syslog messages
http://bugzilla.mindrot.org/show_bug.cgi?id=1162 Summary: Inappropriate sequence of syslog messages Product: Portable OpenSSH Version: 4.2p1 Platform: Other OS/Version: All Status: NEW Severity: normal Priority: P2 Component: sshd AssignedTo: bitbucket at mindrot.org ReportedBy:
2004 Jun 22
2
Tcp listen limit.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi folks. Please, someone confirm if i'm right. if i'm wrong, please forgive-me. - -------------------------------------------------------------------------------------------------------------- I've developed a little tool to stress test tcp connections.( Sending syn and answer ack-syn ). that simuates a real tcp connection. (
2017 Jun 16
2
[PATCH] allow relative path in streamlocal forwarding
...n 0; } - debug3("%s: type %d path %s", __func__, type, fwd->listen_path); + debug3("%s: type %d path %s", __func__, type, listen_path); /* Start a Unix domain listener. */ omask = umask(fwd_opts->streamlocal_bind_mask); - sock = unix_listener(fwd->listen_path, SSH_LISTEN_BACKLOG, + sock = unix_listener(listen_path, SSH_LISTEN_BACKLOG, fwd_opts->streamlocal_bind_unlink); umask(omask); - if (sock < 0) + if (sock < 0) { + free(listen_path); return 0; + } - debug("Local forwarding listening on path %s.", fwd->listen_path); + debug("Loca...
2016 Jul 21
7
[Bug 2601] New: StreamLocalBindUnlink not working
...remote_fwd_listener(&fwd, NULL, &options.fwd_opts) channels.c: channel_setup_local_fwd_listener -> channel_setup_fwd_listener_streamlocal channel_setup_fwd_listener_streamlocal(int type, struct Forward *fwd, struct ForwardOptions *fwd_opts) calls unix_listener(fwd->listen_path, SSH_LISTEN_BACKLOG, fwd_opts->streamlocal_bind_unlink) fwd_opts->streamlocal_bind_unlink is set in servconf.c and thus a server option. To fix this, not only the fwd.listen_path would have to be transmitted, but also the bind_unlink flag, which would probably need a new type of message, like "str...
2018 Dec 10
2
[PATCH] cleanup of global variables server/client_version_string in sshconnect.c
In sshconnect.c there are two global variables for server_version_string client_version_string. These are used just in a few functions and can easily be passed as parameters. Also, there is a strange construct, where their memory is allocated to the global pointers, then copies of these pointers are assigned to the kex structure. The kex_free finally frees them via cleanup of the kex