search for: custom_environ

Displaying 7 results from an estimated 7 matches for "custom_environ".

2002 Jan 24
1
PATCH: krb4/krb5/... names/patterns in auth_keys entries
...named_keys.1(w)/auth-options.h Thu, 24 Jan 2002 10:52:24 -0500 @@ -16,6 +16,8 @@ #ifndef AUTH_OPTIONS_H #define AUTH_OPTIONS_H +#include "key.h" + /* Linked list of custom environment strings */ struct envstring { struct envstring *next; @@ -31,6 +33,8 @@ extern struct envstring *custom_environment; int auth_parse_options(struct passwd *, char *, char *, u_long); +void auth_set_key_env(Key *k); void auth_clear_options(void); + #endif Index: 3_0_2p1.1/auth-options.c --- 3_0_2p1.1/auth-options.c Wed, 21 Nov 2001 10:38:46 -0500 +++ 3_0_2p1_w_named_keys.1(w)/auth-options.c Thu, 24 Jan...
2006 Feb 20
7
Native erb lacks -%>, where is Rails'' erb?
Native ERB in ruby, and eruby, seem to lack the -%> feature for suppressing trailing newlines. Thus erb -n script gives errors. Where is Rails ERB so I can invoke it directly? Thank you Hugh
2001 Oct 04
1
patch - forceshell
...Mar 18 16:13:47 2001 +++ openssh-2.9p2_forceshell/auth-options.c Wed Oct 3 09:57:24 2001 @@ -29,6 +29,8 @@ /* "command=" option. */ char *forced_command = NULL; +/* "shell=" option. */ +char *forced_shell = NULL; /* "environment=" options. */ struct envstring *custom_environment = NULL; @@ -98,6 +100,35 @@ packet_send_debug("Pty allocation disabled."); no_pty_flag = 1; opts += strlen(cp); + goto next_option; + } + cp = "shell=\""; + if (strncasecmp(opts, cp, strlen(cp)) == 0) { + opts += strlen(cp); + forced_shell = xmalloc...
2001 Aug 15
0
[ossh patch] principal name/patterns in authorized_keys2
...en += k->name_len + 1; + s = xmalloc(len); + snprintf(s, len, "SSH_AUTH_EXT_NAME=%.*s", k->name_len, k->name); + debug3("auth_set_key_env: Adding to the environment: %.*s", len, s); + new_env = xmalloc(sizeof(struct envstring)); + new_env->s = s; + new_env->next = custom_environment; + custom_environment = new_env; + + if (k->name_type == NULL) + return; + + len = strlen("SSH_AUTH_EXT_NAME_TYPE="); + len += strlen(k->name_type) + 1; + s = xmalloc(len); + snprintf(s, len, "SSH_AUTH_EXT_NAME_TYPE=%s", k->name_type); + + new_env = xmalloc(sizeof(...
2000 Feb 01
3
logging RSA key IDs
Hi. To compartmentalize things a bit (e.g., to help limit the damage should one of my machines be hacked and my private RSA keys stolen) I use different RSA key pairs on my different client machines. So it occurs to me that it would be nice if ssh could log which key was used when logging in to a particular account that has more than one entry in .ssh/authorized_keys. Right now it simply says
2000 May 24
0
'command' option in authorized_keys
...ssion.c Wed May 24 12:56:12 2000 @@ -96,6 +96,7 @@ /* RSA authentication "command=" option. */ char *forced_command = NULL; +char *original_command = NULL; /* original command from protocol. */ /* LEE */ /* RSA authentication "environment=" options. */ struct envstring *custom_environment = NULL; @@ -343,6 +344,7 @@ packet_integrity_check(plen, 0, type); } if (forced_command != NULL) { + original_command = command; command = forced_command; debug("Forced command '%.500s'", forced_command); } @@ -911,6 +913,8 @@ child_set_env(&am...
2011 Oct 08
3
[PATCH] add log= directive to authorized_hosts
Attached is a patch which adds a log= directive to authorized_keys. The text in the log="text" directive is appended to the log line, so you can easily tell which key is matched. For instance the line: log="hello world!",no-agent-forwarding,command="/bin/true",no-pty, no-user-rc,no-X11-forwarding,permitopen="127.0.0.1:7" ssh-rsa AAAAB3Nza....xcgaK9xXoU=