Displaying 7 results from an estimated 7 matches for "custom_environment".
2002 Jan 24
1
PATCH: krb4/krb5/... names/patterns in auth_keys entries
...named_keys.1(w)/auth-options.h Thu, 24 Jan 2002 10:52:24 -0500
@@ -16,6 +16,8 @@
#ifndef AUTH_OPTIONS_H
#define AUTH_OPTIONS_H
+#include "key.h"
+
/* Linked list of custom environment strings */
struct envstring {
struct envstring *next;
@@ -31,6 +33,8 @@
extern struct envstring *custom_environment;
int auth_parse_options(struct passwd *, char *, char *, u_long);
+void auth_set_key_env(Key *k);
void auth_clear_options(void);
+
#endif
Index: 3_0_2p1.1/auth-options.c
--- 3_0_2p1.1/auth-options.c Wed, 21 Nov 2001 10:38:46 -0500
+++ 3_0_2p1_w_named_keys.1(w)/auth-options.c Thu, 24 Jan 2002...
2006 Feb 20
7
Native erb lacks -%>, where is Rails'' erb?
Native ERB in ruby, and eruby, seem to lack the -%> feature for
suppressing trailing newlines. Thus
erb -n script
gives errors. Where is Rails ERB so I can invoke it directly?
Thank you
Hugh
2001 Oct 04
1
patch - forceshell
...Mar 18 16:13:47 2001
+++ openssh-2.9p2_forceshell/auth-options.c Wed Oct 3 09:57:24 2001
@@ -29,6 +29,8 @@
/* "command=" option. */
char *forced_command = NULL;
+/* "shell=" option. */
+char *forced_shell = NULL;
/* "environment=" options. */
struct envstring *custom_environment = NULL;
@@ -98,6 +100,35 @@
packet_send_debug("Pty allocation disabled.");
no_pty_flag = 1;
opts += strlen(cp);
+ goto next_option;
+ }
+ cp = "shell=\"";
+ if (strncasecmp(opts, cp, strlen(cp)) == 0) {
+ opts += strlen(cp);
+ forced_shell = xmalloc(str...
2001 Aug 15
0
[ossh patch] principal name/patterns in authorized_keys2
...en += k->name_len + 1;
+ s = xmalloc(len);
+ snprintf(s, len, "SSH_AUTH_EXT_NAME=%.*s", k->name_len, k->name);
+ debug3("auth_set_key_env: Adding to the environment: %.*s", len, s);
+ new_env = xmalloc(sizeof(struct envstring));
+ new_env->s = s;
+ new_env->next = custom_environment;
+ custom_environment = new_env;
+
+ if (k->name_type == NULL)
+ return;
+
+ len = strlen("SSH_AUTH_EXT_NAME_TYPE=");
+ len += strlen(k->name_type) + 1;
+ s = xmalloc(len);
+ snprintf(s, len, "SSH_AUTH_EXT_NAME_TYPE=%s", k->name_type);
+
+ new_env = xmalloc(sizeof(stru...
2000 Feb 01
3
logging RSA key IDs
Hi. To compartmentalize things a bit (e.g., to help limit the damage
should one of my machines be hacked and my private RSA keys stolen) I
use different RSA key pairs on my different client machines.
So it occurs to me that it would be nice if ssh could log which key
was used when logging in to a particular account that has more than
one entry in .ssh/authorized_keys. Right now it simply says
2000 May 24
0
'command' option in authorized_keys
...ssion.c Wed May 24 12:56:12 2000
@@ -96,6 +96,7 @@
/* RSA authentication "command=" option. */
char *forced_command = NULL;
+char *original_command = NULL; /* original command from protocol. */ /* LEE */
/* RSA authentication "environment=" options. */
struct envstring *custom_environment = NULL;
@@ -343,6 +344,7 @@
packet_integrity_check(plen, 0, type);
}
if (forced_command != NULL) {
+ original_command = command;
command = forced_command;
debug("Forced command '%.500s'", forced_command);
}
@@ -911,6 +913,8 @@
child_set_env(&en...
2011 Oct 08
3
[PATCH] add log= directive to authorized_hosts
Attached is a patch which adds a log= directive to authorized_keys. The text
in the log="text" directive is appended to the log line, so you can easily
tell which key is matched.
For instance the line:
log="hello world!",no-agent-forwarding,command="/bin/true",no-pty,
no-user-rc,no-X11-forwarding,permitopen="127.0.0.1:7"
ssh-rsa AAAAB3Nza....xcgaK9xXoU=