Displaying 9 results from an estimated 9 matches for "read_keyfile_line".
2006 Nov 02
0
ssh strlen fixes
...rect?
-Ray-
Index: misc.c
===================================================================
RCS file: /home/ray/openbsd/src/usr.bin/ssh/misc.c,v
retrieving revision 1.64
diff -u -p -r1.64 misc.c
--- misc.c 3 Aug 2006 03:34:42 -0000 1.64
+++ misc.c 2 Nov 2006 20:05:41 -0000
@@ -604,11 +604,15 @@ read_keyfile_line(FILE *f, const char *f
{
while (fgets(buf, bufsz, f) != NULL) {
(*lineno)++;
- if (buf[strlen(buf) - 1] == '\n' || feof(f)) {
+ if (buf[0] != '\0' && buf[strlen(buf) - 1] == '\n' || feof(f)) {
return 0;
} else {
- debug("%s: %s line %lu exceeds...
2017 Oct 10
3
tunnel device name acquisition?
Numerous how-tos all over the Internet show how one would set up
a tunnel using ssh, e.g.:
ssh -f -o Tunnel=ethernet <server_ip> true
I was wondering if there's a way to subsequently acquire the names
of the local and remote tun/tap interfaces (e.g., using the default
"-w any:any") for subsequent automatic tunnel configuration, e.g.:
ip link set $TapDev up
ip link set
2006 Aug 25
2
RFC: non-root ssh tun access
...-1, sock;
diff -Nurd openssh-4.3p2.orig/misc.h openssh-4.3p2/misc.h
--- openssh-4.3p2.orig/misc.h 2006-01-31 05:49:28.000000000 -0500
+++ openssh-4.3p2/misc.h 2006-08-25 09:01:57.000000000 -0400
@@ -55,7 +55,11 @@
int ask_permission(const char *, ...) __attribute__((format(printf, 1, 2)));
int read_keyfile_line(FILE *, const char *, char *, size_t, u_long *);
-int tun_open(int, int);
+#if defined(SSH_TUN_LINUX)
+int tun_open(int, int, uid_t);
+#else
+int tun_open(int, int);
+#endif
/* Common definitions for ssh tunnel device forwarding */
#define SSH_TUNMODE_NO 0x00
diff -Nurd openssh-4.3p2.or...
2010 Aug 23
0
Announce: OpenSSH 5.6 released
...(bz#1564)
* sftp(1): fix a memory leak in do_realpath() error path (bz#1771)
* ssk-keygen(1): Standardise error messages when attempting to open
private key files to include "progname: filename: error reason"
(bz#1783)
* Replace verbose and overflow-prone Linebuf code with
read_keyfile_line() (bz#1565)
* Include the user name on "subsystem request for ..." log messages
* ssh(1) and sshd(8): remove hardcoded limit of 100 permitopen clauses
and port forwards per direction (bz#1327)
* sshd(8): ignore stderr output from subsystems to avoid hangs if a
subsystem or she...
2007 Sep 07
0
Public key reading abstraction (to allow future work)
...ile 'misc.h'
--- misc.h 2007-07-30 09:54:36 +0000
+++ misc.h 2007-08-02 12:12:51 +0000
@@ -85,6 +85,7 @@
char *read_passphrase(const char *, int);
int ask_permission(const char *, ...) __attribute__((format(printf, 1, 2)));
+FILE *open_keyfile(const char *, struct passwd *, int);
int read_keyfile_line(FILE *, const char *, char *, size_t, u_long *);
#endif /* _MISC_H */
2009 Mar 04
14
[Bug 1565] New: ssh-keyscan doesn't like comment-lines
https://bugzilla.mindrot.org/show_bug.cgi?id=1565
Summary: ssh-keyscan doesn't like comment-lines
Product: Portable OpenSSH
Version: 5.1p1
Platform: All
OS/Version: Linux
Status: NEW
Keywords: low-hanging-fruit
Severity: minor
Priority: P2
Component: Miscellaneous
AssignedTo:
2010 Aug 09
8
Call for testing: OpenSSH-5.6
...(bz#1564)
* sftp(1): fix memory leak in do_realpath() error path (bz#1771)
* ssk-keygen(1): Standardise error messages when attempting to open
private key files to include "progname: filename: error reason"
(bz#1783)
* Replace verbose and overflow-prone Linebuf code with
read_keyfile_line() (bz#1565)
* Include the user name on "subsystem request for ..." log messages
* ssh(1) and sshd(8): remove hardcoded limit of 100 permitopen clauses
and port forwards per direction (bz#1327)
* sshd(8): ignore stderr output from subsystems to avoid hangs if a
subsystem or she...
2012 Dec 27
3
[PATCH] hostfile: list known names (if any) for new hostkeys
...entries for host \"%.100s\" from file \"%s\"",
- __func__, host, path);
+ debug3("%s: loading entries for host \"%.100s\"%s from file \"%s\"",
+ __func__, lookup_host, (lookup_key ? " and key" : ""), path);
while (read_keyfile_line(f, path, line, sizeof(line), &linenum) == 0) {
cp = line;
@@ -269,11 +266,11 @@ load_hostkeys(struct hostkeys *hostkeys, const char *host, const char *path)
for (cp2 = cp; *cp2 && *cp2 != ' ' && *cp2 != '\t'; cp2++)
;
- /* Check if the host name ma...
2010 Aug 23
3
Announce: OpenSSH 5.6 released
...(bz#1564)
* sftp(1): fix a memory leak in do_realpath() error path (bz#1771)
* ssk-keygen(1): Standardise error messages when attempting to open
private key files to include "progname: filename: error reason"
(bz#1783)
* Replace verbose and overflow-prone Linebuf code with
read_keyfile_line() (bz#1565)
* Include the user name on "subsystem request for ..." log messages
* ssh(1) and sshd(8): remove hardcoded limit of 100 permitopen clauses
and port forwards per direction (bz#1327)
* sshd(8): ignore stderr output from subsystems to avoid hangs if a
subsystem or she...