Displaying 11 results from an estimated 11 matches for "expand_filename".
2002 Jan 27
0
IdentityFile patch
...-239,62 +238,6 @@
return 0;
}
-
-/*
- * Given a template and a passwd structure, build a filename
- * by substituting % tokenised options. Currently, %% becomes '%',
- * %h becomes the home directory and %u the username.
- *
- * This returns a buffer allocated by xmalloc.
- */
-char *
-expand_filename(const char *filename, struct passwd *pw)
-{
- Buffer buffer;
- char *file;
- const char *cp;
-
- /*
- * Build the filename string in the buffer by making the appropriate
- * substitutions to the given file name.
- */
- buffer_init(&buffer);
- for (cp = filename; *cp; cp++) {
- if (cp[0] ==...
2003 Jan 18
0
[Patch] User-dependent IdentityFile
...-214,62 +213,6 @@
return 0;
}
-
-/*
- * Given a template and a passwd structure, build a filename
- * by substituting % tokenised options. Currently, %% becomes '%',
- * %h becomes the home directory and %u the username.
- *
- * This returns a buffer allocated by xmalloc.
- */
-char *
-expand_filename(const char *filename, struct passwd *pw)
-{
- Buffer buffer;
- char *file;
- const char *cp;
-
- /*
- * Build the filename string in the buffer by making the appropriate
- * substitutions to the given file name.
- */
- buffer_init(&buffer);
- for (cp = filename; *cp; cp++) {
- if (cp[0] ==...
2002 Jan 27
1
[PATCH] Add user-dependent IdentityFile to OpenSSH-3.0.2p1
...-239,62 +238,6 @@
return 0;
}
-
-/*
- * Given a template and a passwd structure, build a filename
- * by substituting % tokenised options. Currently, %% becomes '%',
- * %h becomes the home directory and %u the username.
- *
- * This returns a buffer allocated by xmalloc.
- */
-char *
-expand_filename(const char *filename, struct passwd *pw)
-{
- Buffer buffer;
- char *file;
- const char *cp;
-
- /*
- * Build the filename string in the buffer by making the appropriate
- * substitutions to the given file name.
- */
- buffer_init(&buffer);
- for (cp = filename; *cp; cp++) {
- if (cp[0] ==...
2002 Jan 23
0
[PATCH] Add multiple AuthorizedKeyFiles options
...===
RCS file: /cvs/openssh/auth.c,v
retrieving revision 1.41
diff -u -r1.41 auth.c
--- auth.c 21 Dec 2001 03:45:47 -0000 1.41
+++ auth.c 23 Jan 2002 11:11:28 -0000
@@ -296,15 +296,11 @@
}
char *
-authorized_keys_file(struct passwd *pw)
+authorized_keys_file(struct passwd *pw, int n)
{
- return expand_filename(options.authorized_keys_file, pw);
-}
-
-char *
-authorized_keys_file2(struct passwd *pw)
-{
- return expand_filename(options.authorized_keys_file2, pw);
+ if (n >= options.num_authorized_keys_files)
+ return NULL;
+ return expand_filename(options.authorized_keys_files[n], pw);
}
/* return...
2002 Jul 04
4
Chroot patch (v3.4p1)
The following is a patch I've been working on to support a "ChrootUser"
option in the sshd_config file.
I was looking for a way to offer sftp access and at the same time restict
interactive shell access. This patch is a necessary first step (IMO).
It applies clean with 'patch -l'.
Also attached is a shell script that helps to build a chrooted home dir on
a RedHat 7.2
2002 Feb 01
0
[Bug 95] New: Allow '%' expansion to work in ssh and ssh-add
...OpenSSH
Version: 3.0.2p1
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: ssh
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy: jprondak at visualmedia.com
By moving expand_filename() from auth.c into tildexpand.c, '%' substitution can be used but any programs that use tilde_expand_filename() as opposed
to just sshd.
The reason for this was to allow for IdentityFile inclusion like as follows:
[..ssh_config..]
IdentityFile /var/spool/ssh/%u/idenity
IdentityFile ~/....
2002 Feb 01
1
[Bug 95] Allow '%' expansion to work in ssh and ssh-add
http://bugzilla.mindrot.org/show_bug.cgi?id=95
------- Additional Comments From jprondak at visualmedia.com 2002-02-02 09:25 -------
Created an attachment (id=18)
patch to tildexpand.c and auth.c to allow '%' substitution everywhere
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2003 May 06
1
compilation problems AIX 5.2
...passing arg 2 of `loginsuccess'
discards qualifiers from pointer
target type
auth.c: In function `auth_log':
auth.c:403: warning: passing arg 2 of `loginfailed'
discards qualifiers from pointer target type
auth.c:403: too few arguments to function
`loginfailed'
auth.c: In function `expand_filename':
auth.c:481: warning: implicit declaration of function
`snprintf'
auth.c: In function `getpwnamallow':
auth.c:630: warning: passing arg 1 of `loginfailed'
discards qualifiers from pointer target type
auth.c:630: warning: passing arg 2 of `loginfailed'
discards qualifiers from p...
2002 Mar 16
4
[Bug 165] Problem with SSH1 Keys on RedHat7.2
http://bugzilla.mindrot.org/show_bug.cgi?id=165
------- Additional Comments From markus at openbsd.org 2002-03-17 04:31 -------
never seen this. what does sshd -ddd say?
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2001 Nov 06
13
OpenSSH 3.0
OpenSSH 3.0 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
This release contains many portability bug-fixes (listed in the
ChangeLog) as well as several new features (listed below).
We would like to thank the
2019 Mar 11
5
CPAN not working, or is it?
...als.t ............. ok
t/70_critic.t ................. skipped: Test::Perl::Critic only run when
AUTHOR_TEST set
t/71_minimumversion.t ......... skipped: running MinimumVersion test only run
when AUTHOR_TEST set
t/97-compile.t ................ ok
t/97-cpanpm_output_hook.t ..... ok
t/97-expand_filenames.t ....... ok
t/97-install_hack.t ........... ok
t/97-mock.t ................... ok
t/97-process_options.t ........ ok
t/97-process_setup_options.t .. ok
t/97-return_values.t .......... ok
t/97-run.t .................... # will run '/usr/bin/perl -Mblib
blib/script/cpan -y...