Date: Tue, 05 Feb 2002 22:19:38 +0000 From: Mark Murray <mark@grondar.za> To: "Andrey A. Chernov" <ache@nagual.pp.ru> Cc: des@FreeBSD.org, cvs-committers@FreeBSD.org, cvs-all@FreeBSD.org Subject: Re: cvs commit: src/lib/libpam/modules/pam_unix pam_unix.c Message-ID: <200202052219.g15MJhs32408@greenpeace.grondar.org> In-Reply-To: <20020205214703.GA8579@nagual.pp.ru> ; from "Andrey A. Chernov" <ache@nagual.pp.ru> "Wed, 06 Feb 2002 00:47:03 %2B0300." References: <20020205214703.GA8579@nagual.pp.ru>
next in thread | previous in thread | raw e-mail | index | archive | help
> On Tue, Feb 05, 2002 at 23:59:08 +0300, Andrey A. Chernov wrote: > > > It is OK at this point, but broken _after_ PAM called. > > Lets imagine srandom(33) produce this hypotetical sequence for random() > > calls: > > To see the bug, run following test application with "call_pam" set to 1 > and 0 The bug is doing userland stuff before the authentication IMO. > #include <stdlib.h> > > int call_pam = 0; > > main() > { > srandom(33); > random(); > random(); > if (call_pam) libpam_steals_N_randoms(); > printf("%d\n", random()); > } Should look like #include <stdlib.h> int call_pam = 0; main() { if (call_pam) libpam_steals_N_randoms(); srandom(33); random(); random(); printf("%d\n", random()); } M -- o Mark Murray \_ FreeBSD Services Limited O.\_ Warning: this .sig is umop ap!sdn To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe cvs-all" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200202052219.g15MJhs32408>