search for: read_keyfile_lin

Displaying 9 results from an estimated 9 matches for "read_keyfile_lin".

Did you mean: read_keyfile_line
2006 Nov 02
0
ssh strlen fixes
...rect? -Ray- Index: misc.c =================================================================== RCS file: /home/ray/openbsd/src/usr.bin/ssh/misc.c,v retrieving revision 1.64 diff -u -p -r1.64 misc.c --- misc.c 3 Aug 2006 03:34:42 -0000 1.64 +++ misc.c 2 Nov 2006 20:05:41 -0000 @@ -604,11 +604,15 @@ read_keyfile_line(FILE *f, const char *f { while (fgets(buf, bufsz, f) != NULL) { (*lineno)++; - if (buf[strlen(buf) - 1] == '\n' || feof(f)) { + if (buf[0] != '\0' && buf[strlen(buf) - 1] == '\n' || feof(f)) { return 0; } else { - debug("%s: %s line %lu exceeds...
2017 Oct 10
3
tunnel device name acquisition?
Numerous how-tos all over the Internet show how one would set up a tunnel using ssh, e.g.: ssh -f -o Tunnel=ethernet <server_ip> true I was wondering if there's a way to subsequently acquire the names of the local and remote tun/tap interfaces (e.g., using the default "-w any:any") for subsequent automatic tunnel configuration, e.g.: ip link set $TapDev up ip link set
2006 Aug 25
2
RFC: non-root ssh tun access
...-1, sock; diff -Nurd openssh-4.3p2.orig/misc.h openssh-4.3p2/misc.h --- openssh-4.3p2.orig/misc.h 2006-01-31 05:49:28.000000000 -0500 +++ openssh-4.3p2/misc.h 2006-08-25 09:01:57.000000000 -0400 @@ -55,7 +55,11 @@ int ask_permission(const char *, ...) __attribute__((format(printf, 1, 2))); int read_keyfile_line(FILE *, const char *, char *, size_t, u_long *); -int tun_open(int, int); +#if defined(SSH_TUN_LINUX) +int tun_open(int, int, uid_t); +#else +int tun_open(int, int); +#endif /* Common definitions for ssh tunnel device forwarding */ #define SSH_TUNMODE_NO 0x00 diff -Nurd openssh-4.3p2.o...
2010 Aug 23
0
Announce: OpenSSH 5.6 released
...(bz#1564) * sftp(1): fix a memory leak in do_realpath() error path (bz#1771) * ssk-keygen(1): Standardise error messages when attempting to open private key files to include "progname: filename: error reason" (bz#1783) * Replace verbose and overflow-prone Linebuf code with read_keyfile_line() (bz#1565) * Include the user name on "subsystem request for ..." log messages * ssh(1) and sshd(8): remove hardcoded limit of 100 permitopen clauses and port forwards per direction (bz#1327) * sshd(8): ignore stderr output from subsystems to avoid hangs if a subsystem or sh...
2007 Sep 07
0
Public key reading abstraction (to allow future work)
...ile 'misc.h' --- misc.h 2007-07-30 09:54:36 +0000 +++ misc.h 2007-08-02 12:12:51 +0000 @@ -85,6 +85,7 @@ char *read_passphrase(const char *, int); int ask_permission(const char *, ...) __attribute__((format(printf, 1, 2))); +FILE *open_keyfile(const char *, struct passwd *, int); int read_keyfile_line(FILE *, const char *, char *, size_t, u_long *); #endif /* _MISC_H */
2009 Mar 04
14
[Bug 1565] New: ssh-keyscan doesn't like comment-lines
https://bugzilla.mindrot.org/show_bug.cgi?id=1565 Summary: ssh-keyscan doesn't like comment-lines Product: Portable OpenSSH Version: 5.1p1 Platform: All OS/Version: Linux Status: NEW Keywords: low-hanging-fruit Severity: minor Priority: P2 Component: Miscellaneous AssignedTo:
2010 Aug 09
8
Call for testing: OpenSSH-5.6
...(bz#1564) * sftp(1): fix memory leak in do_realpath() error path (bz#1771) * ssk-keygen(1): Standardise error messages when attempting to open private key files to include "progname: filename: error reason" (bz#1783) * Replace verbose and overflow-prone Linebuf code with read_keyfile_line() (bz#1565) * Include the user name on "subsystem request for ..." log messages * ssh(1) and sshd(8): remove hardcoded limit of 100 permitopen clauses and port forwards per direction (bz#1327) * sshd(8): ignore stderr output from subsystems to avoid hangs if a subsystem or sh...
2012 Dec 27
3
[PATCH] hostfile: list known names (if any) for new hostkeys
...entries for host \"%.100s\" from file \"%s\"", - __func__, host, path); + debug3("%s: loading entries for host \"%.100s\"%s from file \"%s\"", + __func__, lookup_host, (lookup_key ? " and key" : ""), path); while (read_keyfile_line(f, path, line, sizeof(line), &linenum) == 0) { cp = line; @@ -269,11 +266,11 @@ load_hostkeys(struct hostkeys *hostkeys, const char *host, const char *path) for (cp2 = cp; *cp2 && *cp2 != ' ' && *cp2 != '\t'; cp2++) ; - /* Check if the host name m...
2010 Aug 23
3
Announce: OpenSSH 5.6 released
...(bz#1564) * sftp(1): fix a memory leak in do_realpath() error path (bz#1771) * ssk-keygen(1): Standardise error messages when attempting to open private key files to include "progname: filename: error reason" (bz#1783) * Replace verbose and overflow-prone Linebuf code with read_keyfile_line() (bz#1565) * Include the user name on "subsystem request for ..." log messages * ssh(1) and sshd(8): remove hardcoded limit of 100 permitopen clauses and port forwards per direction (bz#1327) * sshd(8): ignore stderr output from subsystems to avoid hangs if a subsystem or sh...