Displaying 20 results from an estimated 143 matches for "linenums".
Did you mean:
linenum
2000 Feb 04
0
Patch that allows equal sign in options
Hi,
Here is a patch for release 1.2.2 that allows the use of '=' instead
of whitespace when specifying options. For options on the commandline,
it can be useful to be able to avoid whitespace in some situations.
best regards and thanks for the patch regarding segfaulting with PAM,
Stefan
-------------------------------------------------------------------
Email: Stefan.Heinrichs at
2001 Nov 12
4
Please test -current
Could people please test -current? We will be making a release fairly
soon.
-d
--
| By convention there is color, \\ Damien Miller <djm at mindrot.org>
| By convention sweetness, By convention bitterness, \\ www.mindrot.org
| But in reality there are atoms and space - Democritus (c. 400 BCE)
2007 Nov 07
0
2 commits - libswfdec/swfdec_resource.c libswfdec/swfdec_text_field_movie.c
libswfdec/swfdec_resource.c | 1 +
libswfdec/swfdec_text_field_movie.c | 26 ++++++++++++++++----------
2 files changed, 17 insertions(+), 10 deletions(-)
New commits:
commit 4ff1496e5f2b1a38e4cf51232ebae71172bba13a
Author: Pekka Lampila <pekka.lampila at iki.fi>
Date: Thu Nov 8 00:27:06 2007 +0200
Fix compiler warning in swfdec_resource_loader_target_error
diff --git
2001 Nov 20
3
problem with AFS token forwarding
Hello,
I came across an interoperability problem in OpenSSH 3.0p1 and 3.0.1p1
concerning the AFS token forwarding. That means that the new versions are
not able to exchange AFS tokens (and Kerberos TGTs) with older OpenSSH
releases (including 2.9p2) and with the old SSH 1.2.2x. In my opinion this
problem already existed in Openssh 2.9.9p1, but I have never used this
version (I only looked at the
2024 May 06
1
Feature request/EOI: Match interactive config?
... and I guess your next question will be about compilation environment, so:
```
$ gcc --version
gcc (Gentoo 13.2.1_p20240210 p14) 13.2.1 20240210
Copyright (C) 2023 Free Software Foundation, Inc.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
```
I'm running on gentoo. I tested that the
2002 Feb 08
1
Expansion of hostname
# This issue is also related to
# Subject: Re: [openssh-dev]: disable ProxyCommand from being used?
On reading ~/.ssh/config file, host name which is specified by command
line and check with 'Host' line, is constant for the whole of reading.
If this host name is expanded by 'HostName' option value, it's worth for
making config file simple and usefull 'Host' can be
2024 May 06
1
Feature request/EOI: Match interactive config?
On Sat, 4 May 2024, openssh at tr.id.au wrote:
> Hey there,
>
> I often want different behavior in my ssh client depending on
> whether I'm logging into an interactive session or running
> a remote non-interactive command. We can see at, say,
> https://unix.stackexchange.com/a/499562/305714 that this isn't a
> unique wish, and existing solutions are kind of baroque.
2024 May 06
3
Feature request/EOI: Match interactive config?
On Mon, 6 May 2024, openssh at tr.id.au wrote:
> ... and I guess your next question will be about compilation environment, so:
>
> ```
> $ gcc --version
> gcc (Gentoo 13.2.1_p20240210 p14) 13.2.1 20240210
> Copyright (C) 2023 Free Software Foundation, Inc.
> This is free software; see the source for copying conditions. There is NO
> warranty; not even for MERCHANTABILITY
2001 Sep 26
1
[PATCH] random SSH_MSG_IGNORE packets
Hi!
The following patch adds ability to configure the ssh client to
send SSH[2]_MSG_IGNORE packets of random length at random times
whithin a user-specified interval. The function is configured by
setting the config-file options BogusTrafficIntervalMax and
BogusTrafficIntervalMin, which defines the interval in seconds in
which the packets are randomly sent. It is disabled by default. It
suffices
2024 May 04
3
Feature request/EOI: Match interactive config?
Hey there,
I often want different behavior in my ssh client depending on whether I'm logging into an interactive session or running a remote non-interactive command. We can see at, say, https://unix.stackexchange.com/a/499562/305714 that this isn't a unique wish, and existing solutions are kind of baroque. Typical reasons to do this are to immediately go into a screen or tmux session; for
2005 Feb 22
0
TR: 3.8.1p1 option "permitopennet" added
Patch is below :
diff -nru openssh-3.8.1p1/auth-options.c openssh-3.8.1p1-devs//auth-options.c
--- openssh-3.8.1p1/auth-options.c Tue Jun 3 02:25:48 2003
+++ openssh-3.8.1p1-devs//auth-options.c Mon Feb 21 16:56:49 2005
@@ -265,6 +265,81 @@
xfree(patterns);
goto next_option;
}
+
+/* e.g: permitopenned="158.156.0.0/255.255.255.0:25[-1024]"
+ * note that part between [] is
2001 Nov 20
0
Patch: 3.0.1p1: rename a conflicting variable
These patches are against 3.0.1p1. I need them because I have a local mod
which needs access to the ServerOptions struct named ``options'', hence the
rename.
--- auth-rsa.c.orig Mon Nov 19 16:54:01 2001
+++ auth-rsa.c Mon Nov 19 16:56:18 2001
@@ -180,8 +180,7 @@
* user really has the corresponding private key.
*/
while (fgets(line, sizeof(line), f)) {
- char *cp;
- char
2013 Oct 07
4
Feature request: FQDN Host match
Hello!
I'm hoping that Gmail won't HTML format this mail so that I'll get flamed :)
Anyway, my question relates to ssh_config. The problem I find is that
the Host pattern is only applied to the argument given on the command
line, as outlined in the man page:
"The host is the hostname argument given on the command line (i.e. the
name is not converted to a canonicalized host name
2003 Apr 04
5
Anti-idle in OpenSSH client?
Heya,
Most of the windows ssh clients (putty, securecrt) have anti-idle
features. They offer either a null packet or protocol no-op or user
defined string to be sent over every x seconds.
Is this possible or planned with the OpenSSH client? Our draconian
firewall admins have started timing out ssh sessions. Yes I'm aware I
could hack up a port forwarding dumb traffic process, but was
2012 Oct 19
0
[LLVMdev] Section specialization & COFF.
On Fri, Oct 19, 2012 at 2:55 AM, r4start <r4start at gmail.com> wrote:
> Hi all.
>
> While compiling next code
> @A = weak unnamed_addr constant { i32, i32, i32 } { i32 0, i32 0, i32 0 },
> section ".data"
> was discovered that llc ignores weak linkage if we emit it in COFF object.
> Attached patch solves this problem, please review.
>
> I found some
2012 Oct 19
2
[LLVMdev] Section specialization & COFF.
Hi all.
While compiling next code
@A = weak unnamed_addr constant { i32, i32, i32 } { i32 0, i32 0, i32 0
}, section ".data"
was discovered that llc ignores weak linkage if we emit it in COFF object.
Attached patch solves this problem, please review.
I found some similar tests in test/Objects/Inputs. Should I do something
like trivial.ll checking or there is a better way
to check
2007 Oct 17
0
libswfdec/swfdec_text_field.c libswfdec/swfdec_text_field.h libswfdec/swfdec_text_field_movie.c
libswfdec/swfdec_text_field.c | 288 ----------------------------------
libswfdec/swfdec_text_field.h | 14 -
libswfdec/swfdec_text_field_movie.c | 297 +++++++++++++++++++++++++++++++++++-
3 files changed, 291 insertions(+), 308 deletions(-)
New commits:
commit 2e79c953066b7f6857e88e7efaaed4d8846e9609
Author: Pekka Lampila <pekka.lampila at iki.fi>
Date: Wed Oct 17
2001 Dec 04
0
PATCH: log key fingerprint upon successful login
This patch is against 3.0.2p1. It produces output like the first line in the
example below for both v1 and v2 logins. Logging is turned on by sticking
``LogFingerprint yes'' in sshd_conf. It would be nice if something like this
would make it into OpenSSH.
Dec 4 14:21:09 lizzy.bugworks.com sshd[7774]: [ID 800047 auth.info] Found
matching RSA1 key:
2006 Mar 29
7
sshd config parser
Hi All.
For various reasons, we're currently looking at extending (or even
overhauling) the config parser used for sshd_config.
Right now the syntax I'm looking at is a cumulative "Match" keyword that
matches when all of the specified criteria are met. This would be
similar the the Host directive used in ssh_config, although it's still
limiting (eg you can't easily
2001 Oct 26
2
Patch to add "warn" value to ForwardX11 and ForwardAgent
Because ForwardX11 and ForwardAgent are so useful but introduce risk when
used to a not well-secured server, I added a "warn" value to the ForwardX11
and ForwardAgent options which causes the ssh client to print a big warning
whenever the forwarding is actually used. I plan to make "ForwardX11=warn"
the default in my ssh_config distribution.
I'm not proposing that this