Date: Tue, 05 Feb 2002 22:19:38 +0000 From: Mark Murray <mark@grondar.za> To: "Andrey A. Chernov" <ache@nagual.pp.ru> Cc: des@FreeBSD.org, cvs-committers@FreeBSD.org, cvs-all@FreeBSD.org Subject: Re: cvs commit: src/lib/libpam/modules/pam_unix pam_unix.c Message-ID: <200202052219.g15MJhs32408@greenpeace.grondar.org> In-Reply-To: <20020205214703.GA8579@nagual.pp.ru> ; from "Andrey A. Chernov" <ache@nagual.pp.ru> "Wed, 06 Feb 2002 00:47:03 %2B0300." References: <20020205214703.GA8579@nagual.pp.ru>
next in thread | previous in thread | raw e-mail | index | archive | help
> On Tue, Feb 05, 2002 at 23:59:08 +0300, Andrey A. Chernov wrote:
>
> > It is OK at this point, but broken _after_ PAM called.
> > Lets imagine srandom(33) produce this hypotetical sequence for random()
> > calls:
>
> To see the bug, run following test application with "call_pam" set to 1
> and 0
The bug is doing userland stuff before the authentication IMO.
> #include <stdlib.h>
>
> int call_pam = 0;
>
> main()
> {
> srandom(33);
> random();
> random();
> if (call_pam) libpam_steals_N_randoms();
> printf("%d\n", random());
> }
Should look like
#include <stdlib.h>
int call_pam = 0;
main()
{
if (call_pam) libpam_steals_N_randoms();
srandom(33);
random();
random();
printf("%d\n", random());
}
M
--
o Mark Murray
\_ FreeBSD Services Limited
O.\_ Warning: this .sig is umop ap!sdn
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe cvs-all" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200202052219.g15MJhs32408>
