Displaying 20 results from an estimated 26 matches for "fill_default_opt".
2004 Oct 03
3
[PATCH] PreferAskpass in ssh_config
...t exist, go away!");
+ exit(1);
+ }
+
+ snprintf(buf, sizeof buf, "%.100s/%.100s", pw->pw_dir,
+ _PATH_SSH_USER_CONFFILE);
+ (void)read_config_file(buf, "", &options, 1);
+ (void)read_config_file(_PATH_HOST_CONFIG_FILE, "",
+ &options, 0);
+ fill_default_options(&options);
/* At first, get a connection to the authentication agent. */
ac = ssh_get_authentication_connection();
Index: ssh-agent.c
===================================================================
RCS file: /cvs/openssh/ssh-agent.c,v
retrieving revision 1.134
diff -u -r1.134 ssh-...
2001 Apr 12
1
ssh's readconf.c debug() goes to /dev/null
...f, sizeof buf, "%.100s/%.100s", pw->pw_dir, _PATH_SSH_USER_CONFFILE);
read_config_file(buf, host, &options);
/* Read systemwide configuration file. */
read_config_file(_PATH_HOST_CONFIG_FILE, host, &options);
/* Fill configuration defaults. */
fill_default_options(&options);
/* reinit */
log_init(av[0], options.log_level, SYSLOG_FACILITY_USER, 1);
---
The first time
Because of this, if you use 'ssh -v -v -v somewhere', you won't get
messages like:
---
debug1: Reading configuration data /home/pekkas/.ssh/config <==
debug1: R...
2004 Aug 25
2
Default path to identity file
Hi,
The name of the identity file defaults to what fill_default_options() in
readconf.c does:
SSH_PROTO_1:
"~/%.100s", _PATH_SSH_CLIENT_IDENTITY
SSH_PROTO_2:
"~/%.100s", _PATH_SSH_CLIENT_ID_RSA
"~/%.100s", _PATH_SSH_CLIENT_ID_DSA
Identity files are always expanded by tilde_expand_filename() which gets
the name of the home d...
2014 Jan 19
1
For the default of CanonicalizeFallbackLocal
...tname is enabled and the target hostname cannot be
found in any of the domains specified by CanonicalDomains.
but, I think in the "yes".
In the source code...
1476 initialize_options(Options * options)
1477 {
1561 options->canonicalize_fallback_local = -1;
1563 }
1571 fill_default_options(Options * options)
1572 {
1720 if (options->canonicalize_fallback_local == -1)
1721 options->canonicalize_fallback_local = 1;
1738 }
try,
"myserver" can name resolution but, "myserver.localdomain.local" can not.
<.ssh/config>
CanonicalizeHostname yes...
2009 Jul 08
4
Feature request: "SetupCommand" invoked before connecting
Hi,
(I'm not subscribed to the list, so please CC me on reply.)
I'd like to request adding a feature to OpenSSH:
Task:
~~~~~
It is quite sometime useful to invoke a program prior to connecting to
an ssh server. The most common use case will probably be port knocking.
That is a small program sends certain packets to a server and the server
reacts to this by unlocking the ssh port, which
2024 May 06
1
Feature request/EOI: Match interactive config?
... and I guess your next question will be about compilation environment, so:
```
$ gcc --version
gcc (Gentoo 13.2.1_p20240210 p14) 13.2.1 20240210
Copyright (C) 2023 Free Software Foundation, Inc.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
```
I'm running on gentoo. I tested that the
2001 Oct 24
4
snapshot problems on Mac OS X
Here are some problems with the latest snapshot on Mac
OS X:
I am by no means an autoconf expert, but here is what
happens after a "autoreconf":
autoconf: Undefined macros:
configure.in:1291:AC_CHECK_MEMBERS([struct
stat.st_blksize])
configure.in:2168:AC_CONFIG_FILES([Makefile
openbsd-compat/Makefile scard/Makefile ssh_prng_cmds])
configure.in:26:AC_SYS_LARGEFILE
2016 Jan 14
0
Announce: Portable OpenSSH 7.1p2 released
...options->tun_remote = -1;
options->local_command = NULL;
options->permit_local_command = -1;
- options->use_roaming = -1;
+ options->use_roaming = 0;
options->visual_host_key = -1;
options->ip_qos_interactive = -1;
options->ip_qos_bulk = -1;
@@ -1819,8 +1819,7 @@ fill_default_options(Options * options)
options->tun_remote = SSH_TUNID_ANY;
if (options->permit_local_command == -1)
options->permit_local_command = 0;
- if (options->use_roaming == -1)
- options->use_roaming = 1;
+ options->use_roaming = 0;
if (options->visual_host_key == -1)
op...
2001 Nov 25
2
displaying identity key comment string in passphrase prompt
...============== readconf.c
- in global section, add to the end of "typedef enum":
- in global section, "static struct { ... keywords[] = ",
add near the end of the keywords[] array:
- in initialize_options(), initialize the display_comment_str
option to -1.
- in fill_default_options(), if the display_comment_str option
hasn't been set (-1) then set it to 0 ("no").
- in process_config_line() just before the 'default' case,
add a case to process the oDisplayCommentStr option.
diff:
118c118,119
< oClearAllForwardings, oNoHostAuthentic...
2024 May 06
1
Feature request/EOI: Match interactive config?
...e SSH_KEYSTROKE_CHAFF_MIN_MS 1024
#define SSH_KEYSTROKE_CHAFF_RNG_MS 2048
+struct sshbuf;
+
const char *kex_default_pk_alg(void);
char *ssh_connection_hash(const char *thishost, const char *host,
const char *portstr, const char *user, const char *jump_host);
@@ -239,9 +241,9 @@ int fill_default_options(Options *);
void fill_default_options_for_canonicalization(Options *);
void free_options(Options *o);
int process_config_line(Options *, struct passwd *, const char *,
- const char *, char *, const char *, int, int *, int);
+ const char *, struct sshbuf *, char *, const char *, int,...
2024 May 06
3
Feature request/EOI: Match interactive config?
...e SSH_KEYSTROKE_CHAFF_MIN_MS 1024
#define SSH_KEYSTROKE_CHAFF_RNG_MS 2048
+struct sshbuf;
+
const char *kex_default_pk_alg(void);
char *ssh_connection_hash(const char *thishost, const char *host,
const char *portstr, const char *user, const char *jump_host);
@@ -239,9 +241,9 @@ int fill_default_options(Options *);
void fill_default_options_for_canonicalization(Options *);
void free_options(Options *o);
int process_config_line(Options *, struct passwd *, const char *,
- const char *, char *, const char *, int, int *, int);
+ const char *, struct sshbuf *, char *, const char *, int,...
2024 May 04
3
Feature request/EOI: Match interactive config?
Hey there,
I often want different behavior in my ssh client depending on whether I'm logging into an interactive session or running a remote non-interactive command. We can see at, say, https://unix.stackexchange.com/a/499562/305714 that this isn't a unique wish, and existing solutions are kind of baroque. Typical reasons to do this are to immediately go into a screen or tmux session; for
2012 May 03
5
[PATCH/RFC 0/6] New mux client request to list open tcp forwardings.
These patches implement a new mux client request to list the currently opened
TCP forwardings. It also removes some todos regarding keeping the list
of forwardings in the options up-to-date.
Bert Wesarg (6):
attach the forwarding type to struct Forward
merge local and remote forward lists
generate unique ids for forwardings to be used for identification
remove closed forwardings from
2002 Jun 28
3
AIX usrinfo() cleanup.
Can we do this? Or should we drop the whole char *tty; ? There will
be no way of setting the TTY= correctly while using privsep (Mainly for
multiple streams over single session).
The only thing we really could do is do:
In do_setusercontext()
if (use_privsep)
aix_usrinfo(pw, NULL);
and back in the old spot put:
if (!use_privsep)
aix_usrinfo(pw, s->ttyfd == -1 ? NULL : s->tty);
2013 Jun 20
1
ProxyCommand that returns a socket
Hello,
My usage of ProxyCommand just calls the nc utility with various
parameters. That in turn after the initial setup just copies copies
the data from the network socket to stdin/stdout. This useless coping
can be avoided if ssh has an option to receive the socket from the
proxy command. I suppose it can improve network error reporting as ssh
would talk directly to the network socket rather
2002 Jan 11
1
X11 forwarding, -f, error handling
I'd like a feature whereby ssh puts itself in the background after the
first successful X11 (or other port) forwarding.
The reason for this is simple: error handling.
If the application fails to open the X display and exits, then the
client can still exit with the application's exit code. But if the
application opens the X display successfully, then it can just display
any errors by
2002 Dec 18
2
patch for openssh3.5p1 - adds logging option
...7 +569,7 @@
* actually goes to stderr.
*/
log_init(av[0], options.log_level == -1 ? SYSLOG_LEVEL_INFO : options.log_level,
- SYSLOG_FACILITY_USER, 1);
+ SYSLOG_FACILITY_USER, 1, NULL);
/*
* Read per-user configuration file. Ignore the system wide config
@@ -592,7 +592,7 @@
fill_default_options(&options);
/* reinit */
- log_init(av[0], options.log_level, SYSLOG_FACILITY_USER, 1);
+ log_init(av[0], options.log_level, SYSLOG_FACILITY_USER, 1, NULL);
seed_rng();
diff -urN openssh-3.5p1-orig/sshd.c openssh-3.5p1/sshd.c
--- openssh-3.5p1-orig/sshd.c 2002-12-18 10:10:13.000000...
2010 Jan 12
2
[patch] Automatically add keys to agent
...7 @@ initialize_options(Options * options)
options->local_command = NULL;
options->permit_local_command = -1;
options->use_roaming = -1;
+ options->add_key = -1;
options->visual_host_key = -1;
options->zero_knowledge_password_authentication = -1;
}
@@ -1202,6 +1208,8 @@ fill_default_options(Options * options)
options->permit_local_command = 0;
if (options->use_roaming == -1)
options->use_roaming = 1;
+ if (options->add_key == -1)
+ options->add_key = 0;
if (options->visual_host_key == -1)
options->visual_host_key = 0;
if (options->zero_knowl...
2003 Mar 04
0
hashing known_hosts
...);
@@ -793,6 +805,9 @@ initialize_options(Options * options)
options->bind_address = NULL;
options->smartcard_device = NULL;
options->no_host_authentication_for_localhost = - 1;
+#ifdef HASH_KNOWN_HOSTS
+ options->hash_known_hosts = -1;
+#endif
}
/*
@@ -907,6 +922,10 @@ fill_default_options(Options * options)
clear_forwardings(options);
if (options->no_host_authentication_for_localhost == - 1)
options->no_host_authentication_for_localhost = 0;
+#ifdef HASH_KNOWN_HOSTS
+ if (options->hash_known_hosts == -1)
+ options->hash_known_hosts = 0;...
2020 Feb 06
3
Call for testing: OpenSSH 8.2
On 2020-02-05 at 20:39 -0500, Phil Pennock wrote:
> On 2020-02-06 at 10:29 +1100, Damien Miller wrote:
> > OpenSSH 8.2p1 is almost ready for release, so we would appreciate testing
> > on as many platforms and systems as possible. This is a feature release.
>
> > * The RFC8332 RSA SHA-2 signature algorithms rsa-sha2-256/512. These
> This actually affects me: