Displaying 10 results from an estimated 10 matches for "unset_nonblock".
Did you mean:
set_nonblock
2001 Jun 15
2
openssh 2.9p1: data loss when stdout sent to a pipe
We recently tried upgrading openssh from 2.5.2p2 to 2.9p1
and discovered that it no longer worked to feed the output from a remote
command into a pipe, unless the output was short and the pipe was very
fast at processing its input.
Example 1: ssh remote_machine some_command | less
(where "some_command" generates a lot of output) now fails after
the first screenful, with a
2017 Jan 12
3
proposed change to ssh_connect_direct()
On Sat, Jan 7, 2017 at 2:30 PM, Peter Moody <mindrot at hda3.com> wrote:
> so I spent a bit of time looking at this and it seems like the only
> way to go, at least if I want to keep it in ssh_connect_direct(), is
> to use pthreads. further, it seems like getting that accepted is
> something of a long shot:
Sorry, pthreads is a non-starter.
I would have thought that using
2010 Nov 19
3
File Offsets for SCP (patch)
...(fd_offset > stb.st_size) {
+ run_err("Offset greater than file size");
+ goto next;
+ }
+ if (fd_inset > stb.st_size) {
+ run_err("Inset greater than file size");
+ goto next;
+ }
+ lseek (fd, fd_offset, SEEK_SET);
+ stb.st_size -= (fd_offset + fd_inset);
unset_nonblock(fd);
switch (stb.st_mode & S_IFMT) {
case S_IFREG:
2018 Feb 23
6
RFC 8305 Happy Eyeballs in OpenSSH
...s_subtract_diff(tv, &timeout_ms);
+ return timeout_ms <= 0;
+}
- /* No timeout: just do a blocking connect() */
- if (*timeoutp <= 0)
- return connect(sockfd, serv_addr, addrlen);
-
- set_nonblock(sockfd);
- if (connect(sockfd, serv_addr, addrlen) == 0) {
- /* Succeeded already? */
- unset_nonblock(sockfd);
+/*
+ * Return 0 if the addrinfo was not tried. Return -1 if using it
+ * failed. Return 1 if it was used.
+ */
+static int
+ssh_connect_happy_eyeballs_initiate(const char *host, struct addrinfo *ai,
+ int *timeout_ms, int needpriv,
+ struct timeval *initiate,
+ int *n...
2013 Jun 24
4
[Bug 2122] New: ssh: Could not resolve hostname nohost: Success
..."Success" doesn't make sense given that it's in fact a
system error. It's an issue of ssh_gai_strerror() which can't handle a
situation when getaddrinfo() returns EAI_SYSTEM but errno is not set/is
set to 0.
A potential fix:
--- a/misc.c
+++ b/misc.c
@@ -127,7 +127,7 @@ unset_nonblock(int fd)
const char *
ssh_gai_strerror(int gaierr)
{
- if (gaierr == EAI_SYSTEM)
+ if (gaierr == EAI_SYSTEM && errno != 0)
return strerror(errno);
return gai_strerror(gaierr);
}
--
You are receiving this mail because:
You are watching the assignee of...
2008 Jun 19
5
Portforwarding using the control master.
Hi all,
currently I am considering writing a patch for OpenSSH that will allow
portforwarding using the control_master unix domain socket. The idea is
to introduce an extra SSHMUX command, SSHMUX_COMMAND_SOCKS, which will
then pass control to the normal socks functions used for dynamic
forwarding.
The main reason for me to write this patch are:
- some more control over who gets to connect to
2005 Nov 16
3
OpenSSH on NCR MPRAS
Hi folks,
I have successfully compiled and run OpenSSH 4.1p1 on NCR MPRAS:
$ uname -a
UNIX_SV support1 4.0 3.0 3446 Pentium Pro(TM)-EISA/PCI
$
However, I have found one pretty critical problem, arising from the way
that MPRAS handles changes to the IP stack.
Background:
To update any of the IP or TCP configuration options, system
administrators should use the program "tcpconfig".
2006 Feb 10
0
OpenSSH ControlAllowUsers, et al Patch
...d mismatch: peer euid %u != uid %u",
- (u_int) euid, (u_int) getuid());
+ case -1: /* SYSERR! */
+ error("error granting access");
close(client_fd);
return;
+ default: /* OOPS! */
+ error("unknown error granting access");
+ close(client_fd);
+ return;
}
unset_nonblock(client_fd);
Index: readconf.c
===================================================================
--- readconf.c (revision 15802)
+++ readconf.c (revision 15803)
@@ -106,8 +106,9 @@
oEnableSSHKeysign, oRekeyLimit, oVerifyHostKeyDNS, oConnectTimeout,
oAddressFamily, oGssAuthentication, oGssDeleg...
2004 Aug 05
1
LocalForward and RemoteForward bind patch
...sc.h openssh-3.8p1-localbind/misc.h
--- openssh-3.8p1/misc.h 2003-08-24 18:16:21.000000000 -0700
+++ openssh-3.8p1-localbind/misc.h 2004-08-05 11:02:08.916639344 -0700
@@ -14,6 +14,7 @@
char *chop(char *);
char *strdelim(char **);
+int strcount( char *, char );
void set_nonblock(int);
void unset_nonblock(int);
void set_nodelay(int);
diff -u -r openssh-3.8p1/readconf.c openssh-3.8p1-localbind/readconf.c
--- openssh-3.8p1/readconf.c 2004-08-05 08:59:24.775159000 -0700
+++ openssh-3.8p1-localbind/readconf.c 2004-08-05 12:53:24.203841440 -0700
@@ -203,8 +203,8 @@
*/
void
-add_local_forward(Optio...
2010 Jan 14
1
ssh(1) multiplexing rewrite
...t) getuid());
- close(client_fd);
+ ret = snprintf(name, sizeof(name), "%.*s", (int)(cp - env), env);
+ if (ret <= 0 || (size_t)ret >= sizeof(name)) {
+ error("env_permitted: name '%.100s...' too long", env);
return 0;
}
- /* XXX handle asynchronously */
- unset_nonblock(client_fd);
+ for (i = 0; i < options.num_send_env; i++)
+ if (match_pattern(name, options.send_env[i]))
+ return 1;
- /* Read command */
- buffer_init(&m);
- if (ssh_msg_recv(client_fd, &m) == -1) {
- error("%s: client msg_recv failed", __func__);
- close(client_fd);
-...