Displaying 20 results from an estimated 6000 matches similar to: "[Bug 1355] New: pointer arithmetic/gcc strict-aliasing warnings"
2000 Jul 05
1
OpenSSH-2.1.1p2: Is this misuse of strtok?
Is this a misuse of strtok() in OpenSSH-2.1.1p2?
readconf.c:process_config_line() calls strtok() to
parse config lines. When it finds oProtocol it calls
compat.c:proto_spec() which in turns uses strtok().
However on return of proto_spec(), process_config_line() calls
strtok() once more to (quoting from the source code)
/* Check that there is no garbage at end of line. */
But surely strtok()
2007 Dec 15
1
[LLVMdev] strict aliasing in SPU land
/Volumes/mrs5/net/llvm/llvm/llvm/lib/Target/CellSPU/
SPUISelDAGToDAG.cpp: In function
'bool<unnamed>::isFPS16Immediate(llvm::ConstantFPSDNode*, short int&)':
/Volumes/mrs5/net/llvm/llvm/llvm/lib/Target/CellSPU/
SPUISelDAGToDAG.cpp:141: warning: dereferencing type-punned pointer
will break strict-aliasing rules
In file included from
2014 Feb 10
0
[PATCH] Basic SCTP support for OpenSSH client and server
This patch allows the OpenSSH client to make connections over SCTP,
and allows the OpenSSH server to listen for connections over SCTP.
SCTP is a robust transport-layer protocol which supports, amongst other things,
the changing of endpoint IPs without breaking the connection.
To connect via SCTP, pass -H or set "ConnectViaSCTP yes".
To listen via SCTP as well as TCP, set
2000 Aug 25
1
[patch] configurable ssh_prng_cmds
The following patch against openssh-SNAP-20000823 allows to override the
compile-time "ssh_prng_cmds" file at run time by adding new options to the
server and client configurations. (We move binaries around a bit, and this was
the only absolute path that couldn't be fixed at run-time).
Regards
Jan
diff -ur openssh-SNAP-20000823.orig/entropy.c openssh-SNAP-20000823.new/entropy.c
2002 Jan 26
7
[PATCH] Added NoDelay config option and nodelay subsystem option
Hello again!
Since there was some resistance against adding TCP_NODELAY uncontionally,
I've made another patch. The new patch contains the following:
* Added a NoDelay yes/no (default no) config option to ssh and sshd
* Added -oNoDelay=yes to the ssh command line for sftp.
* Changed the sshd subsystem config option syntax from
Subsystem name path
to
Subsystem name options path
2014 Jun 06
1
Patch: Ciphers, MACs and KexAlgorithms on Match
Hi all,
this is a patch to make Ciphers, MACs and KexAlgorithms available in
Match blocks. Now I can reach a -current machine with some Android
terminal app without changing the default ciphers for all clients:
Match Address 192.168.1.2
Ciphers aes128-cbc
MACs hmac-sha1
KexAlgorithms diffie-hellman-group-exchange-sha1
Index: servconf.c
2024 May 06
1
Feature request/EOI: Match interactive config?
Hey Damien,
> Would something like this help?
>
> Match sessiontype shell
> User foo
> Match remotecommand "none"
> User foo2
> Match sessiontype exec remotecommand "/rsync"
> User bar
> Match sessiontype subsystem remotecommand "sftp"
> User baz
>
>
> diff --git a/readconf.c b/readconf.c
> <snip>
Thanks for looking
2007 Dec 15
2
[LLVMdev] strict aliasing warning in x86 land
/Volumes/mrs5/net/llvm/llvm/llvm/lib/Target/X86/X86ISelLowering.cpp:
In member function 'llvm::SDOperand
llvm::X86TargetLowering::LowerTRAMPOLINE(llvm::SDOperand,
llvm::SelectionDAG&)':
/Volumes/mrs5/net/llvm/llvm/llvm/lib/Target/X86/X86ISelLowering.cpp:
5305: warning: dereferencing type-punned pointer will break strict-
aliasing rules
:-(
2017 Jun 16
2
[PATCH] allow relative path in streamlocal forwarding
When forwarding a Unix-domain socket, the remote socket path must be
absolute (otherwise the forwarding fails later). However, guessing
absolute path on the remote end is sometimes not straightforward,
because the file system location may vary for many reasons, including
the system installation, the choices of NFS mount points, or the
remote user ID.
To allow ssh clients to request remote socket
2007 Apr 10
6
[PATCH 0/6] openssh V_4_6: minor fixes/cleanups
This patch series consists of minor fixes and cleanups I made during
update to openssh V_4_6 branch.
openssh/auth-pam.c | 9 ++++-----
openssh/auth2.c | 2 --
openssh/readconf.c | 7 ++++---
openssh/servconf.c | 14 ++++++++------
openssh/sftp-server.c | 9 ++++++---
openssh/sshd.c | 2 +-
6 files changed, 23 insertions(+), 20 deletions(-)
--
ldv
2011 Dec 03
1
[LLVMdev] New strict-aliasing warning?
When compiling trunk using gcc 4.1.2 on linux/ppc64, I now see a warning
that I don't remember seeing previously:
llvm[2]: Compiling InlineSpiller.cpp for Release+Asserts build
/src/llvm-trunk-dev/include/llvm/ADT/PointerIntPair.h: In member
function ‘const PointerTy* llvm::PointerIntPair<PointerTy, IntBits,
IntType, PtrTraits>::getAddrOfPointer() const [with PointerTy = void*,
unsigned
2015 Mar 29
2
Invalid memory access / read stack overflow when reading config with zero bytes
On Mon, 30 Mar 2015, Damien Miller wrote:
> On Mon, 30 Mar 2015, Hanno B?ck wrote:
>
> > On Mon, 30 Mar 2015 09:19:02 +1100 (AEDT)
> > Damien Miller <djm at mindrot.org> wrote:
> >
> > > What version of OpenSSH is this?
> >
> > 6.8 portable on Linux.
>
> That's strange - the line numbers in the valgrind stack trace don't
>
2007 Dec 15
0
[LLVMdev] strict aliasing warning in x86 land
On Saturday 15 December 2007 08:36:02 Mike Stump wrote:
> /Volumes/mrs5/net/llvm/llvm/llvm/lib/Target/X86/X86ISelLowering.cpp:
> In member function 'llvm::SDOperand
> llvm::X86TargetLowering::LowerTRAMPOLINE(llvm::SDOperand,
> llvm::SelectionDAG&)':
> /Volumes/mrs5/net/llvm/llvm/llvm/lib/Target/X86/X86ISelLowering.cpp:
> 5305: warning: dereferencing type-punned
2002 Feb 08
1
Expansion of hostname
# This issue is also related to
# Subject: Re: [openssh-dev]: disable ProxyCommand from being used?
On reading ~/.ssh/config file, host name which is specified by command
line and check with 'Host' line, is constant for the whole of reading.
If this host name is expanded by 'HostName' option value, it's worth for
making config file simple and usefull 'Host' can be
2024 May 06
1
Feature request/EOI: Match interactive config?
On Sat, 4 May 2024, openssh at tr.id.au wrote:
> Hey there,
>
> I often want different behavior in my ssh client depending on
> whether I'm logging into an interactive session or running
> a remote non-interactive command. We can see at, say,
> https://unix.stackexchange.com/a/499562/305714 that this isn't a
> unique wish, and existing solutions are kind of baroque.
2018 Dec 12
2
[PATCH] drop old netinet/in_systm.h include
This header provides only three typedefs: n_long, n_short, and n_time.
OpenSSH doesn't use it at all, and the headers it includes don't. So
punt this ancient include since it offers nothing useful.
---
defines.h | 1 -
includes.h | 1 -
misc.c | 1 -
readconf.c | 1 -
servconf.c | 1 -
5 files changed, 5 deletions(-)
diff --git a/defines.h b/defines.h
index
2001 Jul 21
2
ChallengeResponseAuthentication - typos and inconsistancies?
Hi,
It seems from the source code that there are a couple of quirks
with this option:
firstly, in the code it's mis-spelt as
"challenge_reponse_authentication"
and secondly, the default for the client (in readconf.c) seems to be
off, whereas for the server (servconf.c) seems to be on:
readconf.c: if (options->challenge_reponse_authentication == -1)
readconf.c:
2024 May 06
1
Feature request/EOI: Match interactive config?
On Mon, 6 May 2024, openssh at tr.id.au wrote:
> ... and I guess your next question will be about compilation environment, so:
>
> ```
> $ gcc --version
> gcc (Gentoo 13.2.1_p20240210 p14) 13.2.1 20240210
> Copyright (C) 2023 Free Software Foundation, Inc.
> This is free software; see the source for copying conditions. There is NO
> warranty; not even for MERCHANTABILITY
2003 Jun 16
2
[Bug 596] "ProxyCommand none" doesn't work
http://bugzilla.mindrot.org/show_bug.cgi?id=596
Summary: "ProxyCommand none" doesn't work
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: openssh-bugs at mindrot.org
ReportedBy:
2014 Sep 08
1
possible deadcodes in sources
Hello,
we've run a coverity scan on the openssh sources and it found several
issues. Although the scan was run on patched rhel sources, some results are applicable to vanilla sources
too.
* servconf.c:1458:dead_error_line ? Execution cannot reach this statement "*intptr = *intptr + 1;"
--- a/servconf.c
+++ b/servconf.c
@@ -1451,12 +1451,8 @@