search for: unset_nonblock

Displaying 10 results from an estimated 10 matches for "unset_nonblock".

Did you mean: set_nonblock
2001 Jun 15
2
openssh 2.9p1: data loss when stdout sent to a pipe
We recently tried upgrading openssh from 2.5.2p2 to 2.9p1 and discovered that it no longer worked to feed the output from a remote command into a pipe, unless the output was short and the pipe was very fast at processing its input. Example 1: ssh remote_machine some_command | less (where "some_command" generates a lot of output) now fails after the first screenful, with a
2017 Jan 12
3
proposed change to ssh_connect_direct()
On Sat, Jan 7, 2017 at 2:30 PM, Peter Moody <mindrot at hda3.com> wrote: > so I spent a bit of time looking at this and it seems like the only > way to go, at least if I want to keep it in ssh_connect_direct(), is > to use pthreads. further, it seems like getting that accepted is > something of a long shot: Sorry, pthreads is a non-starter. I would have thought that using
2010 Nov 19
3
File Offsets for SCP (patch)
...(fd_offset > stb.st_size) { + run_err("Offset greater than file size"); + goto next; + } + if (fd_inset > stb.st_size) { + run_err("Inset greater than file size"); + goto next; + } + lseek (fd, fd_offset, SEEK_SET); + stb.st_size -= (fd_offset + fd_inset); unset_nonblock(fd); switch (stb.st_mode & S_IFMT) { case S_IFREG:
2018 Feb 23
6
RFC 8305 Happy Eyeballs in OpenSSH
...s_subtract_diff(tv, &timeout_ms); + return timeout_ms <= 0; +} - /* No timeout: just do a blocking connect() */ - if (*timeoutp <= 0) - return connect(sockfd, serv_addr, addrlen); - - set_nonblock(sockfd); - if (connect(sockfd, serv_addr, addrlen) == 0) { - /* Succeeded already? */ - unset_nonblock(sockfd); +/* + * Return 0 if the addrinfo was not tried. Return -1 if using it + * failed. Return 1 if it was used. + */ +static int +ssh_connect_happy_eyeballs_initiate(const char *host, struct addrinfo *ai, + int *timeout_ms, int needpriv, + struct timeval *initiate, + int *n...
2013 Jun 24
4
[Bug 2122] New: ssh: Could not resolve hostname nohost: Success
..."Success" doesn't make sense given that it's in fact a system error. It's an issue of ssh_gai_strerror() which can't handle a situation when getaddrinfo() returns EAI_SYSTEM but errno is not set/is set to 0. A potential fix: --- a/misc.c +++ b/misc.c @@ -127,7 +127,7 @@ unset_nonblock(int fd) const char * ssh_gai_strerror(int gaierr) { - if (gaierr == EAI_SYSTEM) + if (gaierr == EAI_SYSTEM && errno != 0) return strerror(errno); return gai_strerror(gaierr); } -- You are receiving this mail because: You are watching the assignee of...
2008 Jun 19
5
Portforwarding using the control master.
Hi all, currently I am considering writing a patch for OpenSSH that will allow portforwarding using the control_master unix domain socket. The idea is to introduce an extra SSHMUX command, SSHMUX_COMMAND_SOCKS, which will then pass control to the normal socks functions used for dynamic forwarding. The main reason for me to write this patch are: - some more control over who gets to connect to
2005 Nov 16
3
OpenSSH on NCR MPRAS
Hi folks, I have successfully compiled and run OpenSSH 4.1p1 on NCR MPRAS: $ uname -a UNIX_SV support1 4.0 3.0 3446 Pentium Pro(TM)-EISA/PCI $ However, I have found one pretty critical problem, arising from the way that MPRAS handles changes to the IP stack. Background: To update any of the IP or TCP configuration options, system administrators should use the program "tcpconfig".
2006 Feb 10
0
OpenSSH ControlAllowUsers, et al Patch
...d mismatch: peer euid %u != uid %u", - (u_int) euid, (u_int) getuid()); + case -1: /* SYSERR! */ + error("error granting access"); close(client_fd); return; + default: /* OOPS! */ + error("unknown error granting access"); + close(client_fd); + return; } unset_nonblock(client_fd); Index: readconf.c =================================================================== --- readconf.c (revision 15802) +++ readconf.c (revision 15803) @@ -106,8 +106,9 @@ oEnableSSHKeysign, oRekeyLimit, oVerifyHostKeyDNS, oConnectTimeout, oAddressFamily, oGssAuthentication, oGssDeleg...
2004 Aug 05
1
LocalForward and RemoteForward bind patch
...sc.h openssh-3.8p1-localbind/misc.h --- openssh-3.8p1/misc.h 2003-08-24 18:16:21.000000000 -0700 +++ openssh-3.8p1-localbind/misc.h 2004-08-05 11:02:08.916639344 -0700 @@ -14,6 +14,7 @@ char *chop(char *); char *strdelim(char **); +int strcount( char *, char ); void set_nonblock(int); void unset_nonblock(int); void set_nodelay(int); diff -u -r openssh-3.8p1/readconf.c openssh-3.8p1-localbind/readconf.c --- openssh-3.8p1/readconf.c 2004-08-05 08:59:24.775159000 -0700 +++ openssh-3.8p1-localbind/readconf.c 2004-08-05 12:53:24.203841440 -0700 @@ -203,8 +203,8 @@ */ void -add_local_forward(Optio...
2010 Jan 14
1
ssh(1) multiplexing rewrite
...t) getuid()); - close(client_fd); + ret = snprintf(name, sizeof(name), "%.*s", (int)(cp - env), env); + if (ret <= 0 || (size_t)ret >= sizeof(name)) { + error("env_permitted: name '%.100s...' too long", env); return 0; } - /* XXX handle asynchronously */ - unset_nonblock(client_fd); + for (i = 0; i < options.num_send_env; i++) + if (match_pattern(name, options.send_env[i])) + return 1; - /* Read command */ - buffer_init(&m); - if (ssh_msg_recv(client_fd, &m) == -1) { - error("%s: client msg_recv failed", __func__); - close(client_fd); -...