Displaying 16 results from an estimated 16 matches for "ssh_get_progname".
2003 Sep 10
3
[PATCH] No extern declarations of optarg & co if getopt.h is available
...118 scp.c
--- scp.c 21 Aug 2003 23:34:41 -0000 1.118
+++ scp.c 10 Sep 2003 18:59:00 -0000
@@ -219,8 +219,10 @@ main(int argc, char **argv)
int ch, fflag, tflag, status;
double speed;
char *targ, *endp;
+#ifndef HAVE_GETOPT_H
extern char *optarg;
extern int optind;
+#endif
__progname = ssh_get_progname(argv[0]);
Index: sftp.c
===================================================================
RCS file: /cvs/openssh_cvs/sftp.c,v
retrieving revision 1.38
diff -p -u -r1.38 sftp.c
--- sftp.c 21 Aug 2003 23:34:41 -0000 1.38
+++ sftp.c 10 Sep 2003 18:59:00 -0000
@@ -129,8 +129,10 @@ main(int argc, ch...
2015 Feb 24
4
Current 6.8 git build issues on HP-UX
...dex 65e8003..40efc87 100644
--- a/openbsd-compat/bsd-misc.c
+++ b/openbsd-compat/bsd-misc.c
@@ -31,8 +31,6 @@
#include <time.h>
#include <unistd.h>
-#include "xmalloc.h"
-
#ifndef HAVE___PROGNAME
char *__progname;
#endif
@@ -43,13 +41,12 @@ char *__progname;
*/
char *ssh_get_progname(char *argv0)
{
+ char *p, *q;
#ifdef HAVE___PROGNAME
extern char *__progname;
- return xstrdup(__progname);
+ p = progname;
#else
- char *p;
-
if (argv0 == NULL)
return ("unknown"); /* XXX */
p = strrchr(argv0, '/');
@@ -57,9 +54,12 @@ char *ssh_get_progname(char *ar...
2015 Feb 24
2
Current 6.8 git build issues on HP-UX
...+++ b/openbsd-compat/bsd-misc.c
> @@ -31,8 +31,6 @@
> #include <time.h>
> #include <unistd.h>
>
> -#include "xmalloc.h"
> -
> #ifndef HAVE___PROGNAME
> char *__progname;
> #endif
> @@ -43,13 +41,12 @@ char *__progname;
> */
> char *ssh_get_progname(char *argv0)
> {
> + char *p, *q;
> #ifdef HAVE___PROGNAME
> extern char *__progname;
>
> - return xstrdup(__progname);
> + p = __progname;
> #else
> - char *p;
> -
> if (argv0 == NULL)
> return ("unknown"); /* XXX */
> p = strrchr(argv...
2018 Nov 19
2
[PATCH] openssl-compat: Test for OpenSSL_add_all_algorithms before using.
OpenSSL 1.1.0 has deprecated this function.
---
configure.ac | 1 +
openbsd-compat/openssl-compat.c | 2 ++
openbsd-compat/openssl-compat.h | 4 ++++
3 files changed, 7 insertions(+)
diff --git a/configure.ac b/configure.ac
index 3f7fe2cd..db2aade8 100644
--- a/configure.ac
+++ b/configure.ac
@@ -2710,6 +2710,7 @@ if test "x$openssl" = "xyes" ; then
])
2011 Feb 07
1
[PATCH] ssh: set proctitle for mux master
...ertions(+), 3 deletions(-)
diff --git a/ssh.c b/ssh.c
index d32ef78..8ebcc88 100644
--- a/ssh.c
+++ b/ssh.c
@@ -230,12 +230,25 @@ main(int ac, char **av)
struct servent *sp;
Forward fwd;
- /* Ensure that fds 0, 1 and 2 are open or directed to /dev/null */
- sanitise_stdfd();
-
__progname = ssh_get_progname(av[0]);
init_rng();
+#ifndef HAVE_SETPROCTITLE
+ /* Prepare for later setproctitle emulation */
+ {
+ /* Save argv. Duplicate so setproctitle emulation doesn't clobber it */
+ char **saved_argv = xcalloc(ac + 1, sizeof(*saved_argv));
+ for (i = 0; i < ac; i++)
+ saved_argv[i] = xstr...
2015 Feb 24
6
Current 6.8 git build issues on HP-UX
HP-UX 11.23/11.31 build failures
OS Build_Target CC
OpenSSL BUILD TEST
============== =========================== ================
============= ====== =================
HP-UX 11.23 ia64-hp-hpux11.23 C/aC++ C.11.23.12
0.9.8zb *F1
HP-UX 11.23 ia64-hp-hpux11.23 gcc 4.3.1
0.9.8zb *F2
HP-UX 11.31 ia64-hp-hpux11.31
2004 Jun 30
3
OpenSSL ENIGNE support for OpenSSH
Hi all,
attached is a patch that enables using hardware crypto accelerators
available through OpenSSL library for SSH operations. Especially in
ssh/sshd it can bring a significant speed improvement. OTOH if no crypto
engine is available, nothing bad happens and default software crypto
routines are used.
This patch is used in SUSE Linux OpenSSH package and proved to work (at
least it didn't
2004 Oct 03
3
[PATCH] PreferAskpass in ssh_config
...ases */
static char *pass = NULL;
+
+Options options;
+
+uid_t original_real_uid;
+
static void
clear_pass(void)
{
@@ -311,12 +317,30 @@
AuthenticationConnection *ac = NULL;
char *sc_reader_id = NULL;
int i, ch, deleting = 0, ret = 0;
+ char buf[256];
+ struct passwd *pw;
__progname = ssh_get_progname(argv[0]);
init_rng();
seed_rng();
SSLeay_add_all_algorithms();
+
+ /* Read options */
+ initialize_options(&options);
+
+ pw = getpwuid(original_real_uid = getuid());
+ if (!pw) {
+ logit("You don't exist, go away!");
+ exit(1);
+ }
+
+ snprintf(buf, sizeof buf, "%...
2007 Jun 18
0
[PATCH] sftp-server argument error handling
...ul message to stderr and exits. The
following patch tidies this up by only printing the more useful error to
stderr and not blundering on afterwards.
--- sftp-server.c.orig Mon Jun 18 16:37:46 2007
+++ sftp-server.c Mon Jun 18 16:39:14 2007
@@ -1220,7 +1220,8 @@
sanitise_stdfd();
__progname = ssh_get_progname(argv[0]);
- log_init(__progname, log_level, log_facility, log_stderr);
+ /* Send any argument errors to stderr */
+ log_init(__progname, log_level, log_facility, 1);
while (!skipargs && (ch = getopt(argc, argv, "C:f:l:che")) != -1) {
switch (ch) {
@@ -1237,12 +1238,12 @@...
2003 Sep 30
1
[PATCH] sftp-server (secure) chroot patch, 3.7.1p2 update
...nixerrno)
{
@@ -1028,15 +1081,19 @@
int in, out, max;
ssize_t len, olen, set_size;
+#ifdef DEBUG_SFTP_SERVER
+ log_init(\"sftp-server\", SYSLOG_LEVEL_DEBUG1, SYSLOG_FACILITY_AUTH,
0);
+#endif
+
+#ifdef CHROOT
+ chroot_init();
+#endif
+
/* XXX should use getopt */
__progname = ssh_get_progname(av[0]);
handle_init();
-#ifdef DEBUG_SFTP_SERVER
- log_init(\"sftp-server\", SYSLOG_LEVEL_DEBUG1, SYSLOG_FACILITY_AUTH,
0);
-#endif
-
in = dup(STDIN_FILENO);
out = dup(STDOUT_FILENO);
To apply this patch on OpenSSH 3.7.1p2:
- patch -p0 < sftp-server.patch
- edit Makefile and...
2008 Apr 21
3
FIPS 140-2 OpenSSL(2007) patches
Hi,
I am happy to (re)send a set of patches for compiling OpenSSH 4.7p1 with
FIPS 140-2 OpenSSL.
These are based on previously reported patches by Steve Marquess
<marquess at ieee.org> and Ben Laurie <ben at algroup.co.uk>,
for ver. OpenSSH 3.8.
Note that these patches are NOT OFFICIAL, and MAY be used freely by
anyone.
Issues [partially] handled:
SSL FIPS Self test.
RC4,
2004 Nov 22
1
patch to fix non-echo tty on scp SIGINT
...rror("tcsetattr");
+
_exit(1);
}
@@ -218,6 +225,11 @@
extern char *optarg;
extern int optind;
+ if (tcgetattr(fileno(stdin), &_saved_tio) == -1) {
+ perror("tcgetattr");
+ return 0;
+ }
+
__progname = ssh_get_progname(argv[0]);
args.list = NULL;
2011 Mar 28
15
[Bug 1883] New: use setproctitle for persistent mux master
https://bugzilla.mindrot.org/show_bug.cgi?id=1883
Summary: use setproctitle for persistent mux master
Product: Portable OpenSSH
Version: 5.8p1
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: ssh
AssignedTo: unassigned-bugs at mindrot.org
ReportedBy:
2023 Jun 23
15
[Bug 3584] New: Segfault when built with optimisations on macOS 13 (x86_64) with Xcode 14.3
...D_ACCESS (code=1, address=0x0)
frame #0: 0x000000010000300e ssh-keygen`main(argc=0,
argv=0x0000000000000000) at ssh-keygen.c:3355:32 [opt]
3352 /* Ensure that fds 0, 1 and 2 are open or directed to
/dev/null */
3353 sanitise_stdfd();
3354
-> 3355 __progname = ssh_get_progname(argv[0]);
3356
3357 seed_rng();
3358
Target 0: (ssh-keygen) stopped.
warning: ssh-keygen was compiled with optimization - stepping may
behave oddly; variables may not be available.
(lldb) bt
* thread #1, queue = 'com.apple.main-thread', stop reason =
EXC_BAD_ACCESS (code=1,...
2007 Nov 11
1
ftp-server patch - restrict user to directory
...cility]\n", __progname);
exit(1);
}
@@ -1215,6 +1395,7 @@
ssize_t len, olen, set_size;
SyslogFacility log_facility = SYSLOG_FACILITY_AUTH;
char *cp, buf[4*4096];
+ int config_file_mandatory = 0;
extern char *optarg;
extern char *__progname;
@@ -1225,7 +1406,7 @@
__progname = ssh_get_progname(argv[0]);
log_init(__progname, log_level, log_facility, log_stderr);
- while (!skipargs && (ch = getopt(argc, argv, "C:f:l:che")) != -1) {
+ while (!skipargs && (ch = getopt(argc, argv, "C:f:F:l:che")) != -1) {
switch (ch) {
case 'c':
/*
@@...
2012 Mar 11
2
[patch] Threading support in ssh-agent
...xit(1);
}
@@ -1142,6 +1443,9 @@
char pidstrbuf[1 + 3 * sizeof pid];
struct timeval *tvp = NULL;
size_t len;
+#ifdef HAVE_LIBPTHREAD
+ int numthreads = -1;
+#endif
/* Ensure that fds 0, 1 and 2 are open or directed to /dev/null */
sanitise_stdfd();
@@ -1160,7 +1464,7 @@
__progname = ssh_get_progname(av[0]);
seed_rng();
- while ((ch = getopt(ac, av, "cdksa:t:")) != -1) {
+ while ((ch = getopt(ac, av, "cdksa:t:p:")) != -1) {
switch (ch) {
case 'c':
if (s_flag)
@@ -1189,6 +1493,22 @@
usage();
}
break;
+ case 'p':
+#ifdef HAVE_LIBPTHR...