diff options
author | Ben Lindstrom <mouring@eviladmin.org> | 2000-11-21 21:24:55 +0000 |
---|---|---|
committer | Ben Lindstrom <mouring@eviladmin.org> | 2000-11-21 21:24:55 +0000 |
commit | 14920293713ff4a5bbe45b495694bfd925d73894 (patch) | |
tree | d0f63720bdcbc574dc3c018beeb28e6da4b5e1fb /auth-options.c | |
parent | 4a1d91646d4248c111f573e496cc0d10ba62e274 (diff) |
20001123
- (bal) Merge OpenBSD changes:
- markus@cvs.openbsd.org 2000/11/15 22:31:36
[auth-options.c]
case insensitive key options; from stevesk@sweeden.hp.com
- markus@cvs.openbsd.org 2000/11/16 17:55:43
[dh.c]
do not use perror() in sshd, after child is forked()
- markus@cvs.openbsd.org 2000/11/14 23:42:40
[auth-rsa.c]
parse option only if key matches; fix some confusing seen by the client
- markus@cvs.openbsd.org 2000/11/14 23:44:19
[session.c]
check no_agent_forward_flag for ssh-2, too
- markus@cvs.openbsd.org 2000/11/15
[ssh-agent.1]
reorder SYNOPSIS; typo, use .It
- markus@cvs.openbsd.org 2000/11/14 23:48:55
[ssh-agent.c]
do not reorder keys if a key is removed
- markus@cvs.openbsd.org 2000/11/15 19:58:08
[ssh.c]
just ignore non existing user keys
- millert@cvs.openbsd.org 200/11/15 20:24:43
[ssh-keygen.c]
Add missing \n at end of error message.
Diffstat (limited to 'auth-options.c')
-rw-r--r-- | auth-options.c | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/auth-options.c b/auth-options.c index c9c149d69..181bf7321 100644 --- a/auth-options.c +++ b/auth-options.c | |||
@@ -14,7 +14,7 @@ | |||
14 | */ | 14 | */ |
15 | 15 | ||
16 | #include "includes.h" | 16 | #include "includes.h" |
17 | RCSID("$OpenBSD: auth-options.c,v 1.5 2000/10/09 21:32:34 markus Exp $"); | 17 | RCSID("$OpenBSD: auth-options.c,v 1.6 2000/11/15 22:31:36 markus Exp $"); |
18 | 18 | ||
19 | #include "ssh.h" | 19 | #include "ssh.h" |
20 | #include "packet.h" | 20 | #include "packet.h" |
@@ -65,35 +65,35 @@ auth_parse_options(struct passwd *pw, char *options, unsigned long linenum) | |||
65 | 65 | ||
66 | while (*options && *options != ' ' && *options != '\t') { | 66 | while (*options && *options != ' ' && *options != '\t') { |
67 | cp = "no-port-forwarding"; | 67 | cp = "no-port-forwarding"; |
68 | if (strncmp(options, cp, strlen(cp)) == 0) { | 68 | if (strncasecmp(options, cp, strlen(cp)) == 0) { |
69 | packet_send_debug("Port forwarding disabled."); | 69 | packet_send_debug("Port forwarding disabled."); |
70 | no_port_forwarding_flag = 1; | 70 | no_port_forwarding_flag = 1; |
71 | options += strlen(cp); | 71 | options += strlen(cp); |
72 | goto next_option; | 72 | goto next_option; |
73 | } | 73 | } |
74 | cp = "no-agent-forwarding"; | 74 | cp = "no-agent-forwarding"; |
75 | if (strncmp(options, cp, strlen(cp)) == 0) { | 75 | if (strncasecmp(options, cp, strlen(cp)) == 0) { |
76 | packet_send_debug("Agent forwarding disabled."); | 76 | packet_send_debug("Agent forwarding disabled."); |
77 | no_agent_forwarding_flag = 1; | 77 | no_agent_forwarding_flag = 1; |
78 | options += strlen(cp); | 78 | options += strlen(cp); |
79 | goto next_option; | 79 | goto next_option; |
80 | } | 80 | } |
81 | cp = "no-X11-forwarding"; | 81 | cp = "no-X11-forwarding"; |
82 | if (strncmp(options, cp, strlen(cp)) == 0) { | 82 | if (strncasecmp(options, cp, strlen(cp)) == 0) { |
83 | packet_send_debug("X11 forwarding disabled."); | 83 | packet_send_debug("X11 forwarding disabled."); |
84 | no_x11_forwarding_flag = 1; | 84 | no_x11_forwarding_flag = 1; |
85 | options += strlen(cp); | 85 | options += strlen(cp); |
86 | goto next_option; | 86 | goto next_option; |
87 | } | 87 | } |
88 | cp = "no-pty"; | 88 | cp = "no-pty"; |
89 | if (strncmp(options, cp, strlen(cp)) == 0) { | 89 | if (strncasecmp(options, cp, strlen(cp)) == 0) { |
90 | packet_send_debug("Pty allocation disabled."); | 90 | packet_send_debug("Pty allocation disabled."); |
91 | no_pty_flag = 1; | 91 | no_pty_flag = 1; |
92 | options += strlen(cp); | 92 | options += strlen(cp); |
93 | goto next_option; | 93 | goto next_option; |
94 | } | 94 | } |
95 | cp = "command=\""; | 95 | cp = "command=\""; |
96 | if (strncmp(options, cp, strlen(cp)) == 0) { | 96 | if (strncasecmp(options, cp, strlen(cp)) == 0) { |
97 | int i; | 97 | int i; |
98 | options += strlen(cp); | 98 | options += strlen(cp); |
99 | forced_command = xmalloc(strlen(options) + 1); | 99 | forced_command = xmalloc(strlen(options) + 1); |
@@ -121,7 +121,7 @@ auth_parse_options(struct passwd *pw, char *options, unsigned long linenum) | |||
121 | goto next_option; | 121 | goto next_option; |
122 | } | 122 | } |
123 | cp = "environment=\""; | 123 | cp = "environment=\""; |
124 | if (strncmp(options, cp, strlen(cp)) == 0) { | 124 | if (strncasecmp(options, cp, strlen(cp)) == 0) { |
125 | int i; | 125 | int i; |
126 | char *s; | 126 | char *s; |
127 | struct envstring *new_envstring; | 127 | struct envstring *new_envstring; |
@@ -156,7 +156,7 @@ auth_parse_options(struct passwd *pw, char *options, unsigned long linenum) | |||
156 | goto next_option; | 156 | goto next_option; |
157 | } | 157 | } |
158 | cp = "from=\""; | 158 | cp = "from=\""; |
159 | if (strncmp(options, cp, strlen(cp)) == 0) { | 159 | if (strncasecmp(options, cp, strlen(cp)) == 0) { |
160 | int mname, mip; | 160 | int mname, mip; |
161 | char *patterns = xmalloc(strlen(options) + 1); | 161 | char *patterns = xmalloc(strlen(options) + 1); |
162 | int i; | 162 | int i; |