*/
#include "includes.h"
-RCSID("$OpenBSD: sshd.c,v 1.267 2003/05/29 16:58:45 deraadt Exp $");
+RCSID("$OpenBSD: sshd.c,v 1.268 2003/06/04 10:23:48 djm Exp $");
#include <openssl/dh.h>
#include <openssl/bn.h>
do_setusercontext(pw);
#else
gidset[0] = pw->pw_gid;
- if (setegid(pw->pw_gid) < 0)
- fatal("setegid failed for %u", (u_int)pw->pw_gid);
- if (setgid(pw->pw_gid) < 0)
- fatal("setgid failed for %u", (u_int)pw->pw_gid);
if (setgroups(1, gidset) < 0)
fatal("setgroups: %.100s", strerror(errno));
permanently_set_uid(pw);
if ((options.protocol & SSH_PROTO_1) &&
key_used == 0) {
/* Schedule server key regeneration alarm. */
- signal(SIGALRM, key_regeneration_alarm);
+ mysignal(SIGALRM, key_regeneration_alarm);
alarm(options.key_regeneration_time);
key_used = 1;
}
* mode; it is just annoying to have the server exit just when you
* are about to discover the bug.
*/
- signal(SIGALRM, grace_alarm_handler);
+ mysignal(SIGALRM, grace_alarm_handler);
if (!debug_flag)
alarm(options.login_grace_time);