| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
| |
value < 0. errno is only updated in this case. Change all (most?)
callers of syscalls to follow this better, and let's see if this strictness
helps us in the future.
|
|
|
|
| |
(comment, log message, and rearrange lines).
|
|
|
|
|
|
| |
to keep the original authenticators and modify them only if needed.
But actually, there supposed to be no case such that the original
authenticators can be used for the client. Original diff from IIJ.
|
|
|
|
|
| |
radius module. "secret" for client was required already, but it
hadn't cause an error if it's missing. Original diff from IIJ.
|
|
|
|
| |
pending request when it stops.
|
|
|
|
|
|
|
|
| |
setting the O_NONBLOCK flag on it with fcntl(F_SETFL) afterwards,
just pass SOCK_NONBLOCK to socket() or accept4() and get it right
to begin with.
ok millert@ krw@ beck@ deraadt@ jca@
|
| |
|
|
|
|
| |
diff from Yuuichi Someya
|
|
|
|
|
|
| |
block had happened if an error of the socket is handled by send().
diff from Yuuichi Someya.
|
|
|
|
|
|
|
|
|
|
|
| |
- radiusd: "stdio inet"
- radiusd_radius: "stdio inet"
- radiusd_bsdauth:
- "stdio proc" for the non-priviledged process
- "stdio getpw rpath proc exec" for the priviledged process
- radiusctl: "stdio dns inet"
"go ahead" deraadt
|
| |
|
|
|
|
| |
variable name again.
|
| |
|
| |
|
| |
|
|
|
|
|
|
| |
without root. "radiusd_bsdauth" uses some functions which needs root.
So separate its process into a privileged process and a non-privileged
process.
|
|
server and radiusctl(8) is to control the server. radiusd(8) currently
supports bsdauth and radius (upstream radius servers) as authentication
backends.
fixes from jsg blambert
ok deraadt
|