Displaying 20 results from an estimated 1000 matches similar to: "replacement putenv()"
2000 Jan 27
1
Long awaited round 1 of NeXT patches.
This is about 90% of the core work. I omited a few files from the patch
set since they are basicly small blocks of #ifndef HAVE_NEXT/#endif to
get it to compile.
Daimen, feel free to let me know what you applied and what your
rejecting and why.. so I can work on cleaning things up.
Andre, Only thing of note you may want to look into is NeXT does not
use "ut_user" in it's lastlog.
2017 Jul 01
0
[PATCH] Add new hash.c32 module
diff U3 syslinux-6.04-pre1/com32/modules/Makefile b/com32/modules/Makefile
--- syslinux-6.04-pre1/com32/modules/Makefile Fri Mar 04 02:09:01 2016
+++ b/com32/modules/Makefile Fri Jun 30 20:09:01 2017
@@ -25,9 +25,9 @@
# All-architecture modules
MOD_ALL = cat.c32 cmd.c32 config.c32 cptime.c32 cpuid.c32 cpuidtest.c32 \
- debug.c32 dir.c32 dmitest.c32 hexdump.c32 host.c32 ifcpu.c32 \
-
2001 Jun 04
0
Problems with environmental variables set with Sys.putenv
Hi,
I see some weird behavior when loading a specific dataframe after changing the value of
an enviroment variable using Sys.putenv(). Alas, I can't reproduce it from an
arbitrary dataframe. Here is the session:
R : Copyright 2001, The R Development Core Team
Version 1.2.3 (2001-04-26)
R is free software and comes with ABSOLUTELY NO WARRANTY.
You are welcome to redistribute it under
2001 Nov 30
0
Problems with environmental variables set with Sys.putenv
Environment variables set with Sys.putenv() "disappear" spontaneously (and
somewhat randomly) when I load large datasets.
This was reported in R-help by Dave Kane on June 4, 2001; I have not seen any
further discussion. I'm not sure if I can report it as a "bug", since it is
not entirely reproducible. Could someone try this and see if you have trouble
too? The following
2009 Oct 25
0
[fsc]Adding a generic path_lookup function in VFS
Hi hpa,
I just added the generic path_lookup function for EXTLINUX. hpa, It changed
a lot, so I want hear something from you.
First , here is the main skeleton of the generic path_lookup function:
> if (*name == '/') {
> inode = this_fs->fs_ops->iget_root(); // The way to get the root
> inode is different from different fs
> while(*name == '/')
>
2002 Mar 08
2
Sys.putenv environment variables disappear (PR#1371)
Environment variables set with Sys.putenv() disappear (i.e. become "")
after a while, especially after heavy-duty I/O. Example:
R> x <- matrix(1., 3000, 3000)
R> save(x, file="myx.RData")
R> Sys.putenv(HOME="/tmp")
R> while (Sys.getenv("HOME") != "") {cat("ok\n"); load("myx.RData")}
The loop prints
2008 Jul 10
2
[PATCH] tripplite driver updates
The tripplite driver was developed on a machine with a reliable serial
connection, and inherited the assumption that the serial line connection
would not drop, reorder, or fail character read and writes. This patch
adds significantly improved failure mode handling and also does basic
checks of data validity.
There's also a few minor cleanups/beautification.
I've tested this code on my
2002 Jan 27
0
IdentityFile patch
By the way, I noticed in the previous IdentityFile patch I forgot to
expand tilde. I fixed this by making the change in ssh.c instead of
readconf.c, which is probably where it belongs, as far as the existing code
is concerned:
diff -ur openssh-3.0.2p1/auth.c openssh-3.0.2p1I/auth.c
--- openssh-3.0.2p1/auth.c Sun Nov 11 17:06:07 2001
+++ openssh-3.0.2p1I/auth.c Sun Jan 27 12:05:14 2002
@@ -44,7
2002 Jan 27
1
[PATCH] Add user-dependent IdentityFile to OpenSSH-3.0.2p1
Here is a patch to allow private key files to be placed system wide (for
all users) in a secure (non-NFS) mounted location on systems where home
directories are NFS mounted. This is especially important for users who use
blank passphrases rather than ssh-agent (a good example of where this is
necessary is for tunnelling lpd through ssh on systems that run lpd as user
lp).
IdentityFile now accepts
2003 Jan 18
0
[Patch] User-dependent IdentityFile
Here is the user-dependent IdentityFile patch for openssh3.5 (BSD version),
which allows private key files to be placed system wide (for all users) in
a secure (non-NFS) mounted location.
This addresses an important security hole on systems where home directories
are NFS mounted, particularly if there are users who use blank passphrases
(or when lpd is tunneled through ssh on systems running lpd
2001 Nov 20
0
Patch: 3.0.1p1: rename a conflicting variable
These patches are against 3.0.1p1. I need them because I have a local mod
which needs access to the ServerOptions struct named ``options'', hence the
rename.
--- auth-rsa.c.orig Mon Nov 19 16:54:01 2001
+++ auth-rsa.c Mon Nov 19 16:56:18 2001
@@ -180,8 +180,7 @@
* user really has the corresponding private key.
*/
while (fgets(line, sizeof(line), f)) {
- char *cp;
- char
2001 Dec 04
0
PATCH: log key fingerprint upon successful login
This patch is against 3.0.2p1. It produces output like the first line in the
example below for both v1 and v2 logins. Logging is turned on by sticking
``LogFingerprint yes'' in sshd_conf. It would be nice if something like this
would make it into OpenSSH.
Dec 4 14:21:09 lizzy.bugworks.com sshd[7774]: [ID 800047 auth.info] Found
matching RSA1 key:
2005 Jun 12
2
%h,%p,%u expansion for ControlPath
This allows me to set 'ControlPath ~/.ssh/sockets/%h.%p.%u' for example.
Have I missed a good reason why ssh_connect finds the default port
number for itself instead of just having it in options.port (like we do
for the the default in options.user)?
--- openssh-4.1p1/ssh.c~ 2005-06-12 09:47:18.000000000 +0100
+++ openssh-4.1p1/ssh.c 2005-06-12 09:40:53.000000000 +0100
@@ -604,6 +604,17
2010 Jul 07
3
Message: "err:psdrv:PSDRV_PPDGetNextTuple Line too long."
Hello!
When my application opens a URL in Firefox with more than 257 characters, the URL is truncated and the message below.
"Err: psdrv: PSDRV_PPDGetNextTuple Line too long."
I noted that this limitation may be due to the following code. See line 00363.
Code:
00354 /*********************************************************************
00355 *
00356 *
2010 Mar 21
2
Gnulib setenv on Mac OS X bug?
There seems to be a bug in Gnulib's setenv module on Mac OS X. At
configure time it says:
checking whether setenv validates arguments ... no
(The test program it is running is:
| int
| main ()
| {
|
| if (setenv ("", "", 0) != -1) return 1;
| if (errno != EINVAL) return 2;
| if (setenv ("a", "=", 1) != 0) return 3;
| if
2001 Sep 28
0
openssh-2.9.9p2 subscript violation problems with ctype macros
In several places, openssh-2.9.9p2 passes a 'char' value to a ctype
macro like 'isdigit'. This has undefined behavior on hosts with
signed characters, if the character value happens to be negative. For
example, isdigit('\200') expands to an array access that is a
subscript error on hosts with signed characters where '\200' == -128.
This leads to incorrect results,
2019 Oct 07
0
[klibc:master] fstype: Drop obsolete support for "ext4dev"
Commit-ID: 52251e210c7a21068063fe16a3874903d3f1aa14
Gitweb: http://git.kernel.org/?p=libs/klibc/klibc.git;a=commit;h=52251e210c7a21068063fe16a3874903d3f1aa14
Author: Ben Hutchings <ben at decadent.org.uk>
AuthorDate: Mon, 7 Oct 2019 20:39:46 +0100
Committer: Ben Hutchings <ben at decadent.org.uk>
CommitDate: Tue, 8 Oct 2019 00:13:20 +0100
[klibc] fstype: Drop obsolete
2002 Aug 02
3
[Bug 377] New: Reduce compiler warnings. Use unsigned args to the ctype.h is*() macros.
http://bugzilla.mindrot.org/show_bug.cgi?id=377
Summary: Reduce compiler warnings. Use unsigned args to the
ctype.h is*() macros.
Product: Portable OpenSSH
Version: -current
Platform: Sparc
OS/Version: Solaris
Status: NEW
Severity: trivial
Priority: P2
Component: Miscellaneous
2008 Oct 11
1
[PATCH] fstype: Fix ext4/ext4dev probing
Enhance fstype so it properly takes into account whether or not the
ext4 and/or ext4dev filesystems are present, and properly handles the
test_fs flag. The old code also has some really buggy checks --- for
example, where it compared the set of supported ro_compat features
against the incompat feature bitmask:
(sb->s_feature_incompat & __cpu_to_le32(EXT3_FEATURE_RO_COMPAT_SUPP)
I
2004 Aug 26
2
OpenSSH PATCH: OpenCommand and CloseCommand
Hi,
the attached patch adds support for the keywords "OpenCommand" and
"CloseCommand" to ssh_config. They are commands which are executed before
the connection is established (or ProxyCommand started) and after the
connection has been closed (or ProxyCommand ended).
this is usefull for stuff like portknocking or (that's what I wrote the
patch for) talking with trapdoor2