Displaying 7 results from an estimated 7 matches for "ssh_listen_backlog".
2015 Aug 17
2
[PATCH] Expand tilde for UNIX domain socket forwards.
..., __func__, type, fwd->listen_path);
 
+	/* Expand home directory if necessary */
+	char *expanded_path = tilde_expand_filename(fwd->listen_path, getuid());
+
 	/* Start a Unix domain listener. */
 	omask = umask(fwd_opts->streamlocal_bind_mask);
-	sock = unix_listener(fwd->listen_path, SSH_LISTEN_BACKLOG,
+	sock = unix_listener(expanded_path, SSH_LISTEN_BACKLOG,
 	    fwd_opts->streamlocal_bind_unlink);
+	free(expanded_path);
 	umask(omask);
 	if (sock < 0)
 		return 0;
-- 
1.9.1
2023 Jun 17
2
[PATCH] ssh-agent: add systemd socket-based activation
...t_pid);
 	} else {
 		/* Try to use specified agent socket */
 		socket_dir[0] = '\0';
@@ -2161,14 +2195,16 @@ main(int ac, char **av)
 	 * Create socket early so it will exist before command gets run from
 	 * the parent.
 	 */
-	prev_mask = umask(0177);
-	sock = unix_listener(socket_name, SSH_LISTEN_BACKLOG, 0);
-	if (sock < 0) {
-		/* XXX - unix_listener() calls error() not perror() */
-		*socket_name = '\0'; /* Don't unlink any existing file */
-		cleanup_exit(1);
+	if (sock == 0) {
+		prev_mask = umask(0177);
+		sock = unix_listener(socket_name, SSH_LISTEN_BACKLOG, 0);
+		if (sock &l...
2006 Feb 24
5
[Bug 1162] Inappropriate sequence of syslog messages
http://bugzilla.mindrot.org/show_bug.cgi?id=1162
           Summary: Inappropriate sequence of syslog messages
           Product: Portable OpenSSH
           Version: 4.2p1
          Platform: Other
        OS/Version: All
            Status: NEW
          Severity: normal
          Priority: P2
         Component: sshd
        AssignedTo: bitbucket at mindrot.org
        ReportedBy:
2004 Jun 22
2
Tcp listen limit.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi folks.
Please, someone confirm if i'm right. if i'm wrong, please forgive-me.
- 
--------------------------------------------------------------------------------------------------------------
I've developed a little tool to stress test tcp connections.( Sending
syn and answer ack-syn ). that simuates a real tcp connection. (
2017 Jun 16
2
[PATCH] allow relative path in streamlocal forwarding
...n 0;
 	}
 
-	debug3("%s: type %d path %s", __func__, type, fwd->listen_path);
+	debug3("%s: type %d path %s", __func__, type, listen_path);
 
 	/* Start a Unix domain listener. */
 	omask = umask(fwd_opts->streamlocal_bind_mask);
-	sock = unix_listener(fwd->listen_path, SSH_LISTEN_BACKLOG,
+	sock = unix_listener(listen_path, SSH_LISTEN_BACKLOG,
 	    fwd_opts->streamlocal_bind_unlink);
 	umask(omask);
-	if (sock < 0)
+	if (sock < 0) {
+		free(listen_path);
 		return 0;
+	}
 
-	debug("Local forwarding listening on path %s.", fwd->listen_path);
+	debug("Loca...
2016 Jul 21
7
[Bug 2601] New: StreamLocalBindUnlink not working
...remote_fwd_listener(&fwd, NULL, &options.fwd_opts)
channels.c:
channel_setup_local_fwd_listener ->
channel_setup_fwd_listener_streamlocal
channel_setup_fwd_listener_streamlocal(int type, struct Forward *fwd,
    struct ForwardOptions *fwd_opts)
calls unix_listener(fwd->listen_path, SSH_LISTEN_BACKLOG,
        fwd_opts->streamlocal_bind_unlink)
fwd_opts->streamlocal_bind_unlink is set in servconf.c and thus a
server option.
To fix this, not only the fwd.listen_path would have to be transmitted,
but also the bind_unlink flag, which would probably need a new type of
message, like "str...
2018 Dec 10
2
[PATCH] cleanup of global variables server/client_version_string in sshconnect.c
In sshconnect.c there are two global variables for server_version_string 
client_version_string.
These are used just in a few functions and can easily be passed as 
parameters.
Also, there is a strange construct, where their memory is  allocated to 
the global pointers, then copies of these pointers are assigned to the 
kex structure. The kex_free finally frees them via cleanup of the kex