mirror of
				https://github.com/PowerShell/openssh-portable.git
				synced 2025-10-30 19:14:27 +01:00 
			
		
		
		
	upstream: Use time_t for x11_refuse_time timeout. We need
SSH_TIME_T_MAX for this, so move from misc.c to misc.h so it's available. Fixes a Coverity warning for 64bit time_t safety, ok djm@ OpenBSD-Commit-ID: c69c4c3152cdaab953706db4ccf4d5fd682f7d8d
This commit is contained in:
		
							parent
							
								
									32755a98c2
								
							
						
					
					
						commit
						e37261dff3
					
				
							
								
								
									
										10
									
								
								clientloop.c
									
									
									
									
									
								
							
							
						
						
									
										10
									
								
								clientloop.c
									
									
									
									
									
								
							| @ -1,4 +1,4 @@ | |||||||
| /* $OpenBSD: clientloop.c,v 1.387 2023/01/06 02:39:59 djm Exp $ */ | /* $OpenBSD: clientloop.c,v 1.388 2023/03/03 02:37:58 dtucker Exp $ */ | ||||||
| /*
 | /*
 | ||||||
|  * Author: Tatu Ylonen <ylo@cs.hut.fi> |  * Author: Tatu Ylonen <ylo@cs.hut.fi> | ||||||
|  * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |  * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | ||||||
| @ -158,7 +158,7 @@ static int connection_in;	/* Connection to server (input). */ | |||||||
| static int connection_out;	/* Connection to server (output). */ | static int connection_out;	/* Connection to server (output). */ | ||||||
| static int need_rekeying;	/* Set to non-zero if rekeying is requested. */ | static int need_rekeying;	/* Set to non-zero if rekeying is requested. */ | ||||||
| static int session_closed;	/* In SSH2: login session closed. */ | static int session_closed;	/* In SSH2: login session closed. */ | ||||||
| static u_int x11_refuse_time;	/* If >0, refuse x11 opens after this time. */ | static time_t x11_refuse_time;	/* If >0, refuse x11 opens after this time. */ | ||||||
| static time_t server_alive_time;	/* Time to do server_alive_check */ | static time_t server_alive_time;	/* Time to do server_alive_check */ | ||||||
| static int hostkeys_update_complete; | static int hostkeys_update_complete; | ||||||
| static int session_setup_complete; | static int session_setup_complete; | ||||||
| @ -376,8 +376,8 @@ client_x11_get_proto(struct ssh *ssh, const char *display, | |||||||
| 
 | 
 | ||||||
| 			if (timeout != 0 && x11_refuse_time == 0) { | 			if (timeout != 0 && x11_refuse_time == 0) { | ||||||
| 				now = monotime() + 1; | 				now = monotime() + 1; | ||||||
| 				if (UINT_MAX - timeout < now) | 				if (SSH_TIME_T_MAX - timeout < now) | ||||||
| 					x11_refuse_time = UINT_MAX; | 					x11_refuse_time = SSH_TIME_T_MAX; | ||||||
| 				else | 				else | ||||||
| 					x11_refuse_time = now + timeout; | 					x11_refuse_time = now + timeout; | ||||||
| 				channel_set_x11_refuse_time(ssh, | 				channel_set_x11_refuse_time(ssh, | ||||||
| @ -1617,7 +1617,7 @@ client_request_x11(struct ssh *ssh, const char *request_type, int rchan) | |||||||
| 		    "malicious server."); | 		    "malicious server."); | ||||||
| 		return NULL; | 		return NULL; | ||||||
| 	} | 	} | ||||||
| 	if (x11_refuse_time != 0 && (u_int)monotime() >= x11_refuse_time) { | 	if (x11_refuse_time != 0 && monotime() >= x11_refuse_time) { | ||||||
| 		verbose("Rejected X11 connection after ForwardX11Timeout " | 		verbose("Rejected X11 connection after ForwardX11Timeout " | ||||||
| 		    "expired"); | 		    "expired"); | ||||||
| 		return NULL; | 		return NULL; | ||||||
|  | |||||||
							
								
								
									
										5
									
								
								misc.c
									
									
									
									
									
								
							
							
						
						
									
										5
									
								
								misc.c
									
									
									
									
									
								
							| @ -1,4 +1,4 @@ | |||||||
| /* $OpenBSD: misc.c,v 1.180 2023/01/06 02:37:04 djm Exp $ */ | /* $OpenBSD: misc.c,v 1.181 2023/03/03 02:37:58 dtucker Exp $ */ | ||||||
| /*
 | /*
 | ||||||
|  * Copyright (c) 2000 Markus Friedl.  All rights reserved. |  * Copyright (c) 2000 Markus Friedl.  All rights reserved. | ||||||
|  * Copyright (c) 2005-2020 Damien Miller.  All rights reserved. |  * Copyright (c) 2005-2020 Damien Miller.  All rights reserved. | ||||||
| @ -2452,9 +2452,6 @@ parse_absolute_time(const char *s, uint64_t *tp) | |||||||
| 	return 0; | 	return 0; | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| /* On OpenBSD time_t is int64_t which is long long. */ |  | ||||||
| /* #define SSH_TIME_T_MAX LLONG_MAX */ |  | ||||||
| 
 |  | ||||||
| void | void | ||||||
| format_absolute_time(uint64_t t, char *buf, size_t len) | format_absolute_time(uint64_t t, char *buf, size_t len) | ||||||
| { | { | ||||||
|  | |||||||
							
								
								
									
										5
									
								
								misc.h
									
									
									
									
									
								
							
							
						
						
									
										5
									
								
								misc.h
									
									
									
									
									
								
							| @ -1,4 +1,4 @@ | |||||||
| /* $OpenBSD: misc.h,v 1.101 2023/01/06 02:37:04 djm Exp $ */ | /* $OpenBSD: misc.h,v 1.102 2023/03/03 02:37:58 dtucker Exp $ */ | ||||||
| 
 | 
 | ||||||
| /*
 | /*
 | ||||||
|  * Author: Tatu Ylonen <ylo@cs.hut.fi> |  * Author: Tatu Ylonen <ylo@cs.hut.fi> | ||||||
| @ -240,4 +240,7 @@ void	notify_complete(struct notifier_ctx *, const char *, ...) | |||||||
| typedef void (*sshsig_t)(int); | typedef void (*sshsig_t)(int); | ||||||
| sshsig_t ssh_signal(int, sshsig_t); | sshsig_t ssh_signal(int, sshsig_t); | ||||||
| 
 | 
 | ||||||
|  | /* On OpenBSD time_t is int64_t which is long long. */ | ||||||
|  | /* #define SSH_TIME_T_MAX LLONG_MAX */ | ||||||
|  | 
 | ||||||
| #endif /* _MISC_H */ | #endif /* _MISC_H */ | ||||||
|  | |||||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user