Differences From
Artifact [bebef73805]:
18 18 * will either conjure up a new privileged session, or
19 19 * switch to one that's already active if it exists. it
20 20 * does this by first checking for the existence of a
21 21 * shared memory segment. if it doesn't find it, it
22 22 * starts a new session; if it *does* find it, it
23 23 * retrieves the X11 window ID from that shared memory
24 24 * and sends a _NET_ACTIVE_WINDOW client message to the
25 - * root X window. the window manager interprets message,
26 - * activating the window.
25 + * root X window. the window manager interprets the
26 + * message, activating the window.
27 27 *
28 28 * the flag -k can also be passed, in which case the
29 29 * utility instructs the running process to liquidate its
30 30 * subprocesses and exit itself.
31 31 *
32 32 * if the shared memory does not exist, xpriv creates a
33 33 * new instance of urxvt. this instance is told to run
34 34 * the command “xpriv -a” instead of the user’s normal
35 35 * shell. the -a flag instructs xpriv to get the terminal
36 36 * window’s ID from the $WINDOWID environment variable
37 37 * which urxvt sets. after this, a ssh-agent process is
38 - * launched. spriv waits until it has opened a socket and
38 + * launched. xpriv waits until it has opened a socket and
39 39 * then runs ssh-add without parameters to add the user's
40 40 * default keys to the session.
41 41 *
42 42 * after a success key-add has been confirmed, xpriv
43 43 * marks the window as “vital” by setting the X property
44 44 * “_k_vital” on the window. if the login fails or does
45 45 * not complete, safekill.c will still terminate it at