Age | Commit message (Collapse) | Author |
|
|
|
cleanup along the way.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
is used instead; kwesterback@home.com
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
to simulate a crypt, like login does.
Use SEEK_* not L_* and kill some 0L's used in lseek while we're there.
|
|
|
|
convert to sigaction(); deraadt.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
close for looping mode. kill an fd leak.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- Allow comma delimited list of hostnames, create a socket for each
- Allow a hostname which resolves to multiple addrs, create a socket for each
- Make sure kill -HUP handles specific instance services correctly.
|
|
|
|
|
|
netbsd mods).
|
|
|
|
|
|
|
|
|
|
|
|
bounce attempts, just slaughter them
|
|
|
|
|
|
|