search for: host_arg

Displaying 15 results from an estimated 15 matches for "host_arg".

Did you mean: host_ack
2016 Aug 29
2
[PATCH] Make "ssh" try different configuration filenames
...t;_7.3", "_7", and "". --- ssh.c | 37 ++++++++++++++++++++++++++++++------- 1 file changed, 30 insertions(+), 7 deletions(-) diff --git a/ssh.c b/ssh.c index 03a23fb..25359fe 100644 --- a/ssh.c +++ b/ssh.c @@ -464,7 +464,8 @@ static void process_config_files(const char *host_arg, struct passwd *pw, int post_canon) { char buf[PATH_MAX]; - int r; + char *version_postfix; + int r, len; if (config != NULL) { if (strcasecmp(config, "none") != 0 && @@ -473,12 +474,34 @@ process_config_files(const char *host_arg, struct passwd *pw, int post_canon)...
2011 Jan 05
0
[PATCH] fix %n expansion in LocalCommand
...$tid proto $p" +done + diff --git a/ssh.c b/ssh.c index ec690ae..a11e0ae 100644 --- a/ssh.c +++ b/ssh.c @@ -221,7 +221,7 @@ int main(int ac, char **av) { int i, r, opt, exit_status, use_syslog; - char *p, *cp, *line, *argv0, buf[MAXPATHLEN]; + char *p, *cp, *line, *argv0, buf[MAXPATHLEN], *host_arg; struct stat st; struct passwd *pw; int dummy, timeout_ms; @@ -693,6 +693,8 @@ main(int ac, char **av) options.port = sp ? ntohs(sp->s_port) : SSH_DEFAULT_PORT; } + /* preserve host name given on command line for %n expansion */ + host_arg = host; if (options.hostname != NULL) {...
2012 Mar 29
1
percent_expand for QoS in ControlPath
...46 -0000 1.368 +++ ssh.c 29 Mar 2012 23:00:06 -0000 @@ -701,7 +701,7 @@ main(int ac, char **av) options.port = sp ? ntohs(sp->s_port) : SSH_DEFAULT_PORT; } - /* preserve host name given on command line for %n expansion */ + /* preserve host name given on command line for %h expansion */ host_arg = host; if (options.hostname != NULL) { host = percent_expand(options.hostname, @@ -750,6 +750,8 @@ main(int ac, char **av) options.control_path = percent_expand(cp, "h", host, "l", thishost, "n", host_arg, "r", options.user, "p&quo...
2009 Jul 08
4
Feature request: "SetupCommand" invoked before connecting
Hi, (I'm not subscribed to the list, so please CC me on reply.) I'd like to request adding a feature to OpenSSH: Task: ~~~~~ It is quite sometime useful to invoke a program prior to connecting to an ssh server. The most common use case will probably be port knocking. That is a small program sends certain packets to a server and the server reacts to this by unlocking the ssh port, which
2017 Oct 10
3
tunnel device name acquisition?
Numerous how-tos all over the Internet show how one would set up a tunnel using ssh, e.g.: ssh -f -o Tunnel=ethernet <server_ip> true I was wondering if there's a way to subsequently acquire the names of the local and remote tun/tap interfaces (e.g., using the default "-w any:any") for subsequent automatic tunnel configuration, e.g.: ip link set $TapDev up ip link set
2024 Apr 25
1
[PATCH] Enable ssh_config to set LogPath option (-E)
ssh client has the ability to set the destination of debug logs via the `-E` flag. ssh_config lacks an equivalent keyword to set the same option via configs. This patch follows the same semantics of other `*Path` type keywords and creates a new ssh_config keyword `LogPath`. [0] Bugzilla: https://bugzilla.mindrot.org/show_bug.cgi?id=3683 [1] GitHub PR:
2015 Aug 05
2
[PATCH 1/1] uid for expansion in ControlPath
...fig.5 | 4 +++- 2 files changed, 7 insertions(+), 2 deletions(-) diff --git a/ssh.c b/ssh.c index 59c1f93..c4de144 100644 --- a/ssh.c +++ b/ssh.c @@ -505,7 +505,8 @@ main(int ac, char **av) { int i, r, opt, exit_status, use_syslog, config_test = 0; char *p, *cp, *line, *argv0, buf[PATH_MAX], *host_arg, *logfile; - char thishost[NI_MAXHOST], shorthost[NI_MAXHOST], portstr[NI_MAXSERV]; + char thishost[NI_MAXHOST], shorthost[NI_MAXHOST], portstr[NI_MAXSERV], + uidstr[11]; char cname[NI_MAXHOST]; struct stat st; struct passwd *pw; @@ -1122,6 +1123,7 @@ main(int ac, char **av) strlcpy(sho...
2014 Feb 03
1
ssh config Host case insensitive
Hi, There seems to be an issue where a case sensitive Host entry is no longer working after update to openssh 6.5 example entry: (was working before update) Host MyHost Hostname 192.168.0.1 Port 1234 User root IdentityFile ~/.ssh/id_rsa When issuing "ssh MyHost" the outcome is now: ssh: Could not resolve hostname myhost: Name or service not known When the above entry is changed
2016 Jan 21
1
[PATCH] tools/virtio: add ringtest utilities
...t: %d)]" + " [--batch b]" + " [--outstanding o]" + " [--sleep]" + " [--relax]" + " [--exit]" + "\n", + ring_size, + runcycles); +} + +int main(int argc, char **argv) +{ + int ret; + pthread_t host, guest; + void *tret; + char *host_arg = NULL; + char *guest_arg = NULL; + char *endptr; + long int c; + + kickfd = eventfd(0, 0); + assert(kickfd >= 0); + callfd = eventfd(0, 0); + assert(callfd >= 0); + + for (;;) { + int o = getopt_long(argc, argv, optstring, longopts, NULL); + switch (o) { + case -1: + goto done; + case...
2016 Jan 21
1
[PATCH] tools/virtio: add ringtest utilities
...t: %d)]" + " [--batch b]" + " [--outstanding o]" + " [--sleep]" + " [--relax]" + " [--exit]" + "\n", + ring_size, + runcycles); +} + +int main(int argc, char **argv) +{ + int ret; + pthread_t host, guest; + void *tret; + char *host_arg = NULL; + char *guest_arg = NULL; + char *endptr; + long int c; + + kickfd = eventfd(0, 0); + assert(kickfd >= 0); + callfd = eventfd(0, 0); + assert(callfd >= 0); + + for (;;) { + int o = getopt_long(argc, argv, optstring, longopts, NULL); + switch (o) { + case -1: + goto done; + case...
2013 Oct 07
4
Feature request: FQDN Host match
Hello! I'm hoping that Gmail won't HTML format this mail so that I'll get flamed :) Anyway, my question relates to ssh_config. The problem I find is that the Host pattern is only applied to the argument given on the command line, as outlined in the man page: "The host is the hostname argument given on the command line (i.e. the name is not converted to a canonicalized host name
2018 Nov 19
2
[PATCH] openssl-compat: Test for OpenSSL_add_all_algorithms before using.
OpenSSL 1.1.0 has deprecated this function. --- configure.ac | 1 + openbsd-compat/openssl-compat.c | 2 ++ openbsd-compat/openssl-compat.h | 4 ++++ 3 files changed, 7 insertions(+) diff --git a/configure.ac b/configure.ac index 3f7fe2cd..db2aade8 100644 --- a/configure.ac +++ b/configure.ac @@ -2710,6 +2710,7 @@ if test "x$openssl" = "xyes" ; then ])
2021 Aug 26
16
[Bug 3343] New: Display host provided as argument with "ssh -G"
https://bugzilla.mindrot.org/show_bug.cgi?id=3343 Bug ID: 3343 Summary: Display host provided as argument with "ssh -G" Product: Portable OpenSSH Version: 8.7p1 Hardware: Other OS: All Status: NEW Severity: enhancement Priority: P5 Component: ssh Assignee:
2019 Apr 04
1
Proof of concept for GPU forwarding for Linux guest on Linux host.
Hi, This is a proof of concept of GPU forwarding for Linux guest on Linux host. I'd like to get comments and suggestions from community before I put more time on it. To summarize what it is: 1. It's a solution to bring GPU acceleration for Linux vm guest on Linux host. It could works with different GPU although the current proof of concept only works with Intel GPU. 2. The basic idea
2011 Jan 07
1
[RFC/PATCH] ssh: config directive to modify the local environment
This provides a mechanism to attach arbitrary configure options into the ssh_config file and use them from the LocalCommand and ProxyCommand. Examples: # set FOO to foo LocalEnvMod FOO = foo # append bar to FOO with default separator "," LocalEnvMod FOO += bar # unset FOO LocalEnvMod FOO = # append foo to BAR with separator ":", if BAR is empty