Displaying 13 results from an estimated 13 matches for "sshconf_userconf".
2017 May 31
1
[PATCH 0/1] Process the IdentityFile option from the included files
Hello,
This change is to get the IdentityFile option processed
from the included configuration files.
Regards,
Oleg
Oleg Zhurakivskyy (1):
Process the IdentityFile option from the included files
readconf.c | 14 ++++++--------
1 file changed, 6 insertions(+), 8 deletions(-)
--
2.9.3
2024 May 06
1
Feature request/EOI: Match interactive config?
...st char *host_name, struct passwd *pw, int final_pass,
if (config != NULL) {
if (strcasecmp(config, "none") != 0 &&
- !read_config_file(config, pw, host, host_name, &options,
+ !read_config_file(config, pw, host, host_name,
+ command, &options,
SSHCONF_USERCONF | (final_pass ? SSHCONF_FINAL : 0),
want_final_pass))
fatal("Can't open user config file %.100s: "
@@ -576,12 +577,13 @@ process_config_files(const char *host_name, struct passwd *pw, int final_pass,
_PATH_SSH_USER_CONFFILE);
if (r > 0 && (size_t)r <...
2024 May 06
1
Feature request/EOI: Match interactive config?
... and I guess your next question will be about compilation environment, so:
```
$ gcc --version
gcc (Gentoo 13.2.1_p20240210 p14) 13.2.1 20240210
Copyright (C) 2023 Free Software Foundation, Inc.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
```
I'm running on gentoo. I tested that the
2016 Aug 29
2
[PATCH] Make "ssh" try different configuration filenames
...%.100s", config, strerror(errno));
} else {
- r = snprintf(buf, sizeof buf, "%s/%s", pw->pw_dir,
- _PATH_SSH_USER_CONFFILE);
- if (r > 0 && (size_t)r < sizeof(buf))
- (void)read_config_file(buf, pw, host, host_arg,
- &options, SSHCONF_CHECKPERM | SSHCONF_USERCONF |
- (post_canon ? SSHCONF_POSTCANON : 0));
+ version_postfix = strchr(SSH_VERSION, '_');
+ if (!version_postfix)
+ version_postfix = "";
+
+ /* Find the best fitting config file,
+ * Ie. try "_7.3", "_7", and "". */
+ len = strlen(versio...
2024 Jul 01
1
[PATCH RESEND 1/2] Permit %L and %l percent escapes in Include
...;ac, &av)) != NULL) {
if (*arg == '\0') {
@@ -2003,11 +2010,14 @@ parse_pubkey_algos:
goto out;
}
if (!path_absolute(arg) && *arg != '~') {
- xasprintf(&arg2, "%s/%s",
+ xasprintf(&arg_pre, "%s/%s",
(flags & SSHCONF_USERCONF) ?
"~/" _PATH_SSH_USER_DIR : SSHDIR, arg);
} else
- arg2 = xstrdup(arg);
+ arg_pre = xstrdup(arg);
+ arg2 = percent_expand(arg_pre,
+ "l", thishost, "L", shorthost, (char *) NULL);
+ free(arg_pre);
memset(&gl, 0, sizeof(gl));
r =...
2024 May 06
1
Feature request/EOI: Match interactive config?
...st char *host_name, struct passwd *pw, int final_pass,
if (config != NULL) {
if (strcasecmp(config, "none") != 0 &&
- !read_config_file(config, pw, host, host_name, &options,
+ !read_config_file(config, pw, host, host_name,
+ command, &options,
SSHCONF_USERCONF | (final_pass ? SSHCONF_FINAL : 0),
want_final_pass))
fatal("Can't open user config file %.100s: "
@@ -576,12 +577,13 @@ process_config_files(const char *host_name, struct passwd *pw, int final_pass,
_PATH_SSH_USER_CONFFILE);
if (r > 0 && (size_t)r <...
2024 May 04
3
Feature request/EOI: Match interactive config?
Hey there,
I often want different behavior in my ssh client depending on whether I'm logging into an interactive session or running a remote non-interactive command. We can see at, say, https://unix.stackexchange.com/a/499562/305714 that this isn't a unique wish, and existing solutions are kind of baroque. Typical reasons to do this are to immediately go into a screen or tmux session; for
2023 Nov 13
2
[PATCH v2] Permit %L and %l percent escapes in Include
...;ac, &av)) != NULL) {
if (*arg == '\0') {
@@ -1971,11 +1978,14 @@ parse_pubkey_algos:
goto out;
}
if (!path_absolute(arg) && *arg != '~') {
- xasprintf(&arg2, "%s/%s",
+ xasprintf(&arg_pre, "%s/%s",
(flags & SSHCONF_USERCONF) ?
"~/" _PATH_SSH_USER_DIR : SSHDIR, arg);
} else
- arg2 = xstrdup(arg);
+ arg_pre = xstrdup(arg);
+ arg2 = percent_expand(arg_pre,
+ "l", thishost, "L", shorthost, (char *) NULL);
+ free(arg_pre);
memset(&gl, 0, sizeof(gl));
r =...
2024 Jul 01
1
[PATCH RESEND 1/2] Permit %L and %l percent escapes in Include
...if (*arg == '\0') {
>@@ -2003,11 +2010,14 @@ parse_pubkey_algos:
> goto out;
> }
> if (!path_absolute(arg) && *arg != '~') {
>- xasprintf(&arg2, "%s/%s",
>+ xasprintf(&arg_pre, "%s/%s",
> (flags & SSHCONF_USERCONF) ?
> "~/" _PATH_SSH_USER_DIR : SSHDIR, arg);
> } else
>- arg2 = xstrdup(arg);
>+ arg_pre = xstrdup(arg);
>+ arg2 = percent_expand(arg_pre,
>+ "l", thishost, "L", shorthost, (char
*) NULL);
>+ free(arg_pre);
> memset(&...
2023 Nov 14
1
[PATCH v3 1/2] Permit %L and %l percent escapes in ssh Include
...;ac, &av)) != NULL) {
if (*arg == '\0') {
@@ -1971,11 +1978,14 @@ parse_pubkey_algos:
goto out;
}
if (!path_absolute(arg) && *arg != '~') {
- xasprintf(&arg2, "%s/%s",
+ xasprintf(&arg_pre, "%s/%s",
(flags & SSHCONF_USERCONF) ?
"~/" _PATH_SSH_USER_DIR : SSHDIR, arg);
} else
- arg2 = xstrdup(arg);
+ arg_pre = xstrdup(arg);
+ arg2 = percent_expand(arg_pre,
+ "l", thishost, "L", shorthost, (char *) NULL);
+ free(arg_pre);
memset(&gl, 0, sizeof(gl));
r =...
2023 Dec 20
2
[PATCH RESEND 0/2] Permit %L and %l percent escapes in Include
Using these escapes, the include directive can be crafted to include
differing, host-specific configuration.
Ronan Pigott (2):
Permit %L and %l percent escapes in ssh Include
Permit %L and %l percent escapes in sshd Include
readconf.c | 16 +++++++++++++---
servconf.c | 17 ++++++++++++++---
2 files changed, 27 insertions(+), 6 deletions(-)
base-commit:
2024 Jul 01
2
[PATCH RESEND 0/2] Permit %L and %L percent escapes in Include
Using these escapes, the include directive can be crafted to include
differing, host-specific configuration.
Ronan Pigott (2):
Permit %L and %l percent escapes in Include
Permit %L and %l percent escapes in server Include
readconf.c | 16 +++++++++++++---
servconf.c | 21 ++++++++++++++++-----
2 files changed, 29 insertions(+), 8 deletions(-)
base-commit:
2015 Jul 29
2
[PATCH] ssh: Add option to present certificates on command line
...ptr = &options->num_certificate_files;
+ if (*intptr >= SSH_MAX_CERTIFICATE_FILES)
+ fatal("%.200s line %d: Too many identity files specified (max %d).",
+ filename, linenum, SSH_MAX_CERTIFICATE_FILES);
+ add_certificate_file(options, NULL,
+ arg, flags & SSHCONF_USERCONF);
+ }
+ break;
+
case oXAuthLocation:
charptr=&options->xauth_location;
goto parse_string;
@@ -1625,6 +1672,7 @@ initialize_options(Options * options)
options->hostkeyalgorithms = NULL;
options->protocol = SSH_PROTO_UNKNOWN;
options->num_identity_files = 0;
+ options...