Displaying 18 results from an estimated 18 matches for "endofnumber".
2024 Jul 01
1
[PATCH RESEND 1/2] Permit %L and %l percent escapes in Include
...eadconf.c
+++ b/readconf.c
@@ -1044,7 +1044,8 @@ process_config_line_depth(Options *options, struct passwd *pw, const char *host,
const char *original_host, char *line, const char *filename,
int linenum, int *activep, int flags, int *want_final_pass, int depth)
{
- char *str, **charptr, *endofnumber, *keyword, *arg, *arg2, *p;
+ char *str, **charptr, *endofnumber, *keyword, *arg, *arg2, *arg_pre, *p;
+ char thishost[NI_MAXHOST], shorthost[NI_MAXHOST];
char **cpptr, ***cppptr, fwdarg[256];
u_int i, *uintptr, max_entries = 0;
int r, oactive, negated, opcode, *intptr, value, value2, cmdline...
2001 Sep 26
1
[PATCH] random SSH_MSG_IGNORE packets
...*arg == '\0')
+ fatal("%.200s line %d: Missing argument.", filename, linenum);
+ if (arg[0] < '0' || arg[0] > '9')
+ fatal("%.200s line %d: Bad number.", filename, linenum);
+
+ /* Octal, decimal, or hex format? */
+ value = strtol(arg, &endofnumber, 0);
+ if (arg == endofnumber)
+ fatal("%.200s line %d: Bad number.", filename, linenum);
+ if (*activep && *intptr == -1)
+ *intptr = value;
+ if (options->bogus_traffic_interval_min >= value)
+ fatal("%.200s line %d: Bad value.", filename, linenum);
+ b...
2003 Apr 04
5
Anti-idle in OpenSSH client?
Heya,
Most of the windows ssh clients (putty, securecrt) have anti-idle
features. They offer either a null packet or protocol no-op or user
defined string to be sent over every x seconds.
Is this possible or planned with the OpenSSH client? Our draconian
firewall admins have started timing out ssh sessions. Yes I'm aware I
could hack up a port forwarding dumb traffic process, but was
2023 Nov 13
2
[PATCH v2] Permit %L and %l percent escapes in Include
...eadconf.c
+++ b/readconf.c
@@ -1030,7 +1030,8 @@ process_config_line_depth(Options *options, struct passwd *pw, const char *host,
const char *original_host, char *line, const char *filename,
int linenum, int *activep, int flags, int *want_final_pass, int depth)
{
- char *str, **charptr, *endofnumber, *keyword, *arg, *arg2, *p;
+ char *str, **charptr, *endofnumber, *keyword, *arg, *arg2, *arg_pre, *p;
+ char thishost[NI_MAXHOST], shorthost[NI_MAXHOST];
char **cpptr, ***cppptr, fwdarg[256];
u_int i, *uintptr, uvalue, max_entries = 0;
int r, oactive, negated, opcode, *intptr, value, value2,...
2024 Jul 01
1
[PATCH RESEND 1/2] Permit %L and %l percent escapes in Include
...dconf.c
>@@ -1044,7 +1044,8 @@ process_config_line_depth(Options *options, struct
>passwd *pw, const char *host,
> const char *original_host, char *line, const char *filename,
> int linenum, int *activep, int flags, int *want_final_pass, int depth)
{
>- char *str, **charptr, *endofnumber, *keyword, *arg, *arg2, *p;
>+ char *str, **charptr, *endofnumber, *keyword, *arg, *arg2, *arg_pre,
*p;
>+ char thishost[NI_MAXHOST], shorthost[NI_MAXHOST];
> char **cpptr, ***cppptr, fwdarg[256];
> u_int i, *uintptr, max_entries = 0;
> int r, oactive, negated, opcode, *intptr, va...
2001 Aug 15
1
ProxyCommand broken in SNAP-20010814
For some odd reason, one line was removed from the handling of
ProxyCommand in readconf.c. As a result, ssh crashes on strlen(string)
when it parses this option.
--- readconf.c:X Mon Aug 6 23:35:52 2001
+++ readconf.c Wed Aug 15 16:11:44 2001
@@ -475,6 +475,7 @@
case oProxyCommand:
charptr = &options->proxy_command;
+ string = xstrdup("");
while ((arg =
2023 Nov 14
1
[PATCH v3 1/2] Permit %L and %l percent escapes in ssh Include
...eadconf.c
+++ b/readconf.c
@@ -1030,7 +1030,8 @@ process_config_line_depth(Options *options, struct passwd *pw, const char *host,
const char *original_host, char *line, const char *filename,
int linenum, int *activep, int flags, int *want_final_pass, int depth)
{
- char *str, **charptr, *endofnumber, *keyword, *arg, *arg2, *p;
+ char *str, **charptr, *endofnumber, *keyword, *arg, *arg2, *arg_pre, *p;
+ char thishost[NI_MAXHOST], shorthost[NI_MAXHOST];
char **cpptr, ***cppptr, fwdarg[256];
u_int i, *uintptr, uvalue, max_entries = 0;
int r, oactive, negated, opcode, *intptr, value, value2,...
2023 Dec 20
2
[PATCH RESEND 0/2] Permit %L and %l percent escapes in Include
Using these escapes, the include directive can be crafted to include
differing, host-specific configuration.
Ronan Pigott (2):
Permit %L and %l percent escapes in ssh Include
Permit %L and %l percent escapes in sshd Include
readconf.c | 16 +++++++++++++---
servconf.c | 17 ++++++++++++++---
2 files changed, 27 insertions(+), 6 deletions(-)
base-commit:
2024 Jul 01
2
[PATCH RESEND 0/2] Permit %L and %L percent escapes in Include
Using these escapes, the include directive can be crafted to include
differing, host-specific configuration.
Ronan Pigott (2):
Permit %L and %l percent escapes in Include
Permit %L and %l percent escapes in server Include
readconf.c | 16 +++++++++++++---
servconf.c | 21 ++++++++++++++++-----
2 files changed, 29 insertions(+), 8 deletions(-)
base-commit:
2006 Feb 10
0
OpenSSH ControlAllowUsers, et al Patch
...ashKnownHosts },
{ NULL, oBadOption }
};
@@ -790,6 +796,17 @@
}
break;
+ case oControlBindMask:
+ arg = strdelim(&s);
+ if (!arg || *arg == '\0')
+ fatal("%.200s line %d: Missing ControlBindMask argument.",
+ filename, linenum);
+ value = strtol(arg, &endofnumber, 0);
+ if (*endofnumber != '\0' || value < 0 || value > 0777)
+ fatal("%.200s line %d: Bad mask.", filename, linenum);
+ options->control_bind_mask = value;
+ break;
+
case oControlPath:
charptr = &options->control_path;
goto parse_string;
@@ -818,6 +8...
2004 Aug 05
1
LocalForward and RemoteForward bind patch
...+];
+ fwd->listen_host = listen_host == NULL ? NULL : xstrdup(listen_host);
fwd->port = port;
fwd->host = xstrdup(host);
fwd->host_port = host_port;
@@ -281,11 +283,12 @@
char *line, const char *filename, int linenum,
int *activep)
{
- char buf[256], *s, **charptr, *endofnumber, *keyword, *arg;
+ char buf[256], buf2[256], *s, **charptr, *endofnumber, *keyword, *arg;
int opcode, *intptr, value;
size_t len;
u_short fwd_port, fwd_host_port;
char sfwd_host_port[6];
+ char sfwd_port[6];
/* Strip trailing whitespace */
for(len = strlen(line) - 1; len > 0; len--...
2010 Aug 09
8
Call for testing: OpenSSH-5.6
Hi,
OpenSSH 5.6 is almost ready for release, so we would appreciate testing
on as many platforms and systems as possible. This is a moderately large
release, with a number of new features and bug fixes.
Snapshot releases for portable OpenSSH are available from
http://www.mindrot.org/openssh_snap/
The OpenBSD version is available in CVS HEAD:
http://www.openbsd.org/anoncvs.html
Portable OpenSSH
2007 Apr 10
6
[PATCH 0/6] openssh V_4_6: minor fixes/cleanups
This patch series consists of minor fixes and cleanups I made during
update to openssh V_4_6 branch.
openssh/auth-pam.c | 9 ++++-----
openssh/auth2.c | 2 --
openssh/readconf.c | 7 ++++---
openssh/servconf.c | 14 ++++++++------
openssh/sftp-server.c | 9 ++++++---
openssh/sshd.c | 2 +-
6 files changed, 23 insertions(+), 20 deletions(-)
--
ldv
2009 Feb 17
2
Idea: reverse socks proxy
Hi,
Just a usecase that I'm sure has been covered before but just in case
its not an openssh solution would be very helpful.
I was trying to install software on a server that was firewalled so no
outbound http connections would work. I was also tunnelling via
another server. Outbound ssh connections also were a convenient option.
What would have been nice would be a remote version of
2024 May 06
1
Feature request/EOI: Match interactive config?
...t char *filename,
- int linenum, int *activep, int flags, int *want_final_pass, int depth)
+ const char *original_host, struct sshbuf *remote_command, char *line,
+ const char *filename, int linenum, int *activep, int flags,
+ int *want_final_pass, int depth)
{
char *str, **charptr, *endofnumber, *keyword, *arg, *arg2, *p;
char **cpptr, ***cppptr, fwdarg[256];
@@ -1779,7 +1806,7 @@ parse_pubkey_algos:
goto out;
}
value = match_cfg_line(options, &str, pw, host, original_host,
- flags & SSHCONF_FINAL, want_final_pass,
+ remote_command, flags & SSHCONF_FINAL,...
2024 May 06
1
Feature request/EOI: Match interactive config?
... and I guess your next question will be about compilation environment, so:
```
$ gcc --version
gcc (Gentoo 13.2.1_p20240210 p14) 13.2.1 20240210
Copyright (C) 2023 Free Software Foundation, Inc.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
```
I'm running on gentoo. I tested that the
2024 May 06
1
Feature request/EOI: Match interactive config?
...t char *filename,
- int linenum, int *activep, int flags, int *want_final_pass, int depth)
+ const char *original_host, struct sshbuf *remote_command, char *line,
+ const char *filename, int linenum, int *activep, int flags,
+ int *want_final_pass, int depth)
{
char *str, **charptr, *endofnumber, *keyword, *arg, *arg2, *p;
char **cpptr, ***cppptr, fwdarg[256];
@@ -1779,7 +1806,7 @@ parse_pubkey_algos:
goto out;
}
value = match_cfg_line(options, &str, pw, host, original_host,
- flags & SSHCONF_FINAL, want_final_pass,
+ remote_command, flags & SSHCONF_FINAL,...
2024 May 04
3
Feature request/EOI: Match interactive config?
Hey there,
I often want different behavior in my ssh client depending on whether I'm logging into an interactive session or running a remote non-interactive command. We can see at, say, https://unix.stackexchange.com/a/499562/305714 that this isn't a unique wish, and existing solutions are kind of baroque. Typical reasons to do this are to immediately go into a screen or tmux session; for