003 File Manager
Current Path:
/usr/src/crypto/openssh/openbsd-compat
usr
/
src
/
crypto
/
openssh
/
openbsd-compat
/
📁
..
📄
Makefile.in
(1.77 KB)
📄
arc4random.c
(7.06 KB)
📄
base64.c
(10.25 KB)
📄
base64.h
(2.69 KB)
📄
basename.c
(1.78 KB)
📄
bcrypt_pbkdf.c
(5.38 KB)
📄
bindresvport.c
(3.24 KB)
📄
blf.h
(3.49 KB)
📄
blowfish.c
(23.11 KB)
📄
bsd-asprintf.c
(2.31 KB)
📄
bsd-closefrom.c
(2.84 KB)
📄
bsd-cygwin_util.c
(3.15 KB)
📄
bsd-cygwin_util.h
(2.34 KB)
📄
bsd-err.c
(2.15 KB)
📄
bsd-flock.c
(2.23 KB)
📄
bsd-getline.c
(2.9 KB)
📄
bsd-getpagesize.c
(463 B)
📄
bsd-getpeereid.c
(1.68 KB)
📄
bsd-malloc.c
(1.4 KB)
📄
bsd-misc.c
(5.88 KB)
📄
bsd-misc.h
(3.61 KB)
📄
bsd-nextstep.c
(2.5 KB)
📄
bsd-nextstep.h
(2.22 KB)
📄
bsd-openpty.c
(4.92 KB)
📄
bsd-poll.c
(2.91 KB)
📄
bsd-poll.h
(2.06 KB)
📄
bsd-setres_id.c
(2.34 KB)
📄
bsd-setres_id.h
(930 B)
📄
bsd-signal.c
(1.55 KB)
📄
bsd-signal.h
(1.15 KB)
📄
bsd-snprintf.c
(20.58 KB)
📄
bsd-statvfs.c
(2.09 KB)
📄
bsd-statvfs.h
(2.24 KB)
📄
bsd-waitpid.c
(1.77 KB)
📄
bsd-waitpid.h
(2.02 KB)
📄
chacha_private.h
(5.26 KB)
📄
charclass.h
(702 B)
📄
daemon.c
(2.32 KB)
📄
dirname.c
(1.87 KB)
📄
explicit_bzero.c
(1.09 KB)
📄
fake-rfc2553.c
(6.15 KB)
📄
fake-rfc2553.h
(5.2 KB)
📄
fmt_scaled.c
(7.69 KB)
📄
freezero.c
(1.01 KB)
📄
getcwd.c
(5.95 KB)
📄
getgrouplist.c
(2.7 KB)
📄
getopt.h
(2.71 KB)
📄
getopt_long.c
(14.46 KB)
📄
getrrsetbyname-ldns.c
(7.81 KB)
📄
getrrsetbyname.c
(13.56 KB)
📄
getrrsetbyname.h
(3.62 KB)
📄
glob.c
(25.53 KB)
📄
glob.h
(4.54 KB)
📄
inet_aton.c
(5.23 KB)
📄
inet_ntoa.c
(2.21 KB)
📄
inet_ntop.c
(5.42 KB)
📄
kludge-fd_set.c
(882 B)
📄
libressl-api-compat.c
(16.19 KB)
📄
md5.c
(7.83 KB)
📄
md5.h
(1.85 KB)
📄
mktemp.c
(3.14 KB)
📄
openbsd-compat.h
(8.68 KB)
📄
openssl-compat.c
(2.43 KB)
📄
openssl-compat.h
(7.22 KB)
📄
port-aix.c
(12.61 KB)
📄
port-aix.h
(4.22 KB)
📄
port-irix.c
(2.94 KB)
📄
port-irix.h
(1.65 KB)
📄
port-linux.c
(7.66 KB)
📄
port-linux.h
(1.18 KB)
📄
port-net.c
(8.33 KB)
📄
port-net.h
(1.58 KB)
📄
port-solaris.c
(9.56 KB)
📄
port-solaris.h
(1.27 KB)
📄
port-uw.c
(4.16 KB)
📄
port-uw.h
(1.37 KB)
📄
pwcache.c
(3.22 KB)
📄
readpassphrase.c
(5.79 KB)
📄
readpassphrase.h
(1.75 KB)
📄
reallocarray.c
(1.49 KB)
📄
realpath.c
(6.08 KB)
📄
recallocarray.c
(2.4 KB)
📁
regress
📄
rmd160.c
(11.72 KB)
📄
rmd160.h
(2.81 KB)
📄
rresvport.c
(2.97 KB)
📄
setenv.c
(5.76 KB)
📄
setproctitle.c
(4.55 KB)
📄
sha1.c
(5.18 KB)
📄
sha1.h
(2.23 KB)
📄
sha2.c
(24.88 KB)
📄
sha2.h
(5.66 KB)
📄
sigact.c
(3.82 KB)
📄
sigact.h
(3.66 KB)
📄
strcasestr.c
(2.35 KB)
📄
strlcat.c
(1.76 KB)
📄
strlcpy.c
(1.64 KB)
📄
strmode.c
(3.38 KB)
📄
strndup.c
(1.27 KB)
📄
strnlen.c
(1.18 KB)
📄
strptime.c
(9.28 KB)
📄
strsep.c
(2.59 KB)
📄
strtoll.c
(4.29 KB)
📄
strtonum.c
(1.85 KB)
📄
strtoul.c
(3.07 KB)
📄
strtoull.c
(3.13 KB)
📄
sys-queue.h
(21.04 KB)
📄
sys-tree.h
(24.68 KB)
📄
timingsafe_bcmp.c
(1.17 KB)
📄
vis.c
(5.97 KB)
📄
vis.h
(3.57 KB)
📄
xcrypt.c
(4.26 KB)
Editing: port-linux.c
/* * Copyright (c) 2005 Daniel Walsh <dwalsh@redhat.com> * Copyright (c) 2006 Damien Miller <djm@openbsd.org> * * Permission to use, copy, modify, and distribute this software for any * purpose with or without fee is hereby granted, provided that the above * copyright notice and this permission notice appear in all copies. * * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ /* * Linux-specific portability code - just SELinux support at present */ #include "includes.h" #if defined(WITH_SELINUX) || defined(LINUX_OOM_ADJUST) #include <errno.h> #include <stdarg.h> #include <string.h> #include <stdio.h> #include <stdlib.h> #include "log.h" #include "xmalloc.h" #include "port-linux.h" #ifdef WITH_SELINUX #include <selinux/selinux.h> #include <selinux/get_context_list.h> #ifndef SSH_SELINUX_UNCONFINED_TYPE # define SSH_SELINUX_UNCONFINED_TYPE ":unconfined_t:" #endif /* Wrapper around is_selinux_enabled() to log its return value once only */ int ssh_selinux_enabled(void) { static int enabled = -1; if (enabled == -1) { enabled = (is_selinux_enabled() == 1); debug("SELinux support %s", enabled ? "enabled" : "disabled"); } return (enabled); } /* Return the default security context for the given username */ static security_context_t ssh_selinux_getctxbyname(char *pwname) { security_context_t sc = NULL; char *sename = NULL, *lvl = NULL; int r; #ifdef HAVE_GETSEUSERBYNAME if (getseuserbyname(pwname, &sename, &lvl) != 0) return NULL; #else sename = pwname; lvl = NULL; #endif #ifdef HAVE_GET_DEFAULT_CONTEXT_WITH_LEVEL r = get_default_context_with_level(sename, lvl, NULL, &sc); #else r = get_default_context(sename, NULL, &sc); #endif if (r != 0) { switch (security_getenforce()) { case -1: fatal("%s: ssh_selinux_getctxbyname: " "security_getenforce() failed", __func__); case 0: error("%s: Failed to get default SELinux security " "context for %s", __func__, pwname); sc = NULL; break; default: fatal("%s: Failed to get default SELinux security " "context for %s (in enforcing mode)", __func__, pwname); } } #ifdef HAVE_GETSEUSERBYNAME free(sename); free(lvl); #endif return sc; } /* Set the execution context to the default for the specified user */ void ssh_selinux_setup_exec_context(char *pwname) { security_context_t user_ctx = NULL; if (!ssh_selinux_enabled()) return; debug3("%s: setting execution context", __func__); user_ctx = ssh_selinux_getctxbyname(pwname); if (setexeccon(user_ctx) != 0) { switch (security_getenforce()) { case -1: fatal("%s: security_getenforce() failed", __func__); case 0: error("%s: Failed to set SELinux execution " "context for %s", __func__, pwname); break; default: fatal("%s: Failed to set SELinux execution context " "for %s (in enforcing mode)", __func__, pwname); } } if (user_ctx != NULL) freecon(user_ctx); debug3("%s: done", __func__); } /* Set the TTY context for the specified user */ void ssh_selinux_setup_pty(char *pwname, const char *tty) { security_context_t new_tty_ctx = NULL; security_context_t user_ctx = NULL; security_context_t old_tty_ctx = NULL; security_class_t chrclass; if (!ssh_selinux_enabled()) return; debug3("%s: setting TTY context on %s", __func__, tty); user_ctx = ssh_selinux_getctxbyname(pwname); /* XXX: should these calls fatal() upon failure in enforcing mode? */ if (getfilecon(tty, &old_tty_ctx) == -1) { error("%s: getfilecon: %s", __func__, strerror(errno)); goto out; } if ((chrclass = string_to_security_class("chr_file")) == 0) { error("%s: couldn't get security class for chr_file", __func__); goto out; } if (security_compute_relabel(user_ctx, old_tty_ctx, chrclass, &new_tty_ctx) != 0) { error("%s: security_compute_relabel: %s", __func__, strerror(errno)); goto out; } if (setfilecon(tty, new_tty_ctx) != 0) error("%s: setfilecon: %s", __func__, strerror(errno)); out: if (new_tty_ctx != NULL) freecon(new_tty_ctx); if (old_tty_ctx != NULL) freecon(old_tty_ctx); if (user_ctx != NULL) freecon(user_ctx); debug3("%s: done", __func__); } void ssh_selinux_change_context(const char *newname) { int len, newlen; char *oldctx, *newctx, *cx; void (*switchlog) (const char *fmt,...) = logit; if (!ssh_selinux_enabled()) return; if (getcon((security_context_t *)&oldctx) < 0) { logit("%s: getcon failed with %s", __func__, strerror(errno)); return; } if ((cx = index(oldctx, ':')) == NULL || (cx = index(cx + 1, ':')) == NULL) { logit ("%s: unparseable context %s", __func__, oldctx); return; } /* * Check whether we are attempting to switch away from an unconfined * security context. */ if (strncmp(cx, SSH_SELINUX_UNCONFINED_TYPE, sizeof(SSH_SELINUX_UNCONFINED_TYPE) - 1) == 0) switchlog = debug3; newlen = strlen(oldctx) + strlen(newname) + 1; newctx = xmalloc(newlen); len = cx - oldctx + 1; memcpy(newctx, oldctx, len); strlcpy(newctx + len, newname, newlen - len); if ((cx = index(cx + 1, ':'))) strlcat(newctx, cx, newlen); debug3("%s: setting context from '%s' to '%s'", __func__, oldctx, newctx); if (setcon(newctx) < 0) switchlog("%s: setcon %s from %s failed with %s", __func__, newctx, oldctx, strerror(errno)); free(oldctx); free(newctx); } void ssh_selinux_setfscreatecon(const char *path) { security_context_t context; if (!ssh_selinux_enabled()) return; if (path == NULL) { setfscreatecon(NULL); return; } if (matchpathcon(path, 0700, &context) == 0) setfscreatecon(context); } #endif /* WITH_SELINUX */ #ifdef LINUX_OOM_ADJUST /* * The magic "don't kill me" values, old and new, as documented in eg: * http://lxr.linux.no/#linux+v2.6.32/Documentation/filesystems/proc.txt * http://lxr.linux.no/#linux+v2.6.36/Documentation/filesystems/proc.txt */ static int oom_adj_save = INT_MIN; static char *oom_adj_path = NULL; struct { char *path; int value; } oom_adjust[] = { {"/proc/self/oom_score_adj", -1000}, /* kernels >= 2.6.36 */ {"/proc/self/oom_adj", -17}, /* kernels <= 2.6.35 */ {NULL, 0}, }; /* * Tell the kernel's out-of-memory killer to avoid sshd. * Returns the previous oom_adj value or zero. */ void oom_adjust_setup(void) { int i, value; FILE *fp; debug3("%s", __func__); for (i = 0; oom_adjust[i].path != NULL; i++) { oom_adj_path = oom_adjust[i].path; value = oom_adjust[i].value; if ((fp = fopen(oom_adj_path, "r+")) != NULL) { if (fscanf(fp, "%d", &oom_adj_save) != 1) verbose("error reading %s: %s", oom_adj_path, strerror(errno)); else { rewind(fp); if (fprintf(fp, "%d\n", value) <= 0) verbose("error writing %s: %s", oom_adj_path, strerror(errno)); else debug("Set %s from %d to %d", oom_adj_path, oom_adj_save, value); } fclose(fp); return; } } oom_adj_path = NULL; } /* Restore the saved OOM adjustment */ void oom_adjust_restore(void) { FILE *fp; debug3("%s", __func__); if (oom_adj_save == INT_MIN || oom_adj_path == NULL || (fp = fopen(oom_adj_path, "w")) == NULL) return; if (fprintf(fp, "%d\n", oom_adj_save) <= 0) verbose("error writing %s: %s", oom_adj_path, strerror(errno)); else debug("Set %s to %d", oom_adj_path, oom_adj_save); fclose(fp); return; } #endif /* LINUX_OOM_ADJUST */ #endif /* WITH_SELINUX || LINUX_OOM_ADJUST */
Upload File
Create Folder