diff options
author | Ben Lindstrom <mouring@eviladmin.org> | 2001-01-22 05:34:40 +0000 |
---|---|---|
committer | Ben Lindstrom <mouring@eviladmin.org> | 2001-01-22 05:34:40 +0000 |
commit | 226cfa03781466907dd252916aeade6879e376b8 (patch) | |
tree | 3251d15053db065d74994b95e17fd65874fcaa9b /session.c | |
parent | 401d58f3612fa030f309d01df9815a2fc1d3c6de (diff) |
Hopefully things did not get mixed around too much. It compiles under
Linux and works. So that is at least a good sign. =)
20010122
- (bal) OpenBSD Resync
- markus@cvs.openbsd.org 2001/01/19 12:45:26 GMT 2001 by markus
[servconf.c ssh.h sshd.c]
only auth-chall.c needs #ifdef SKEY
- markus@cvs.openbsd.org 2001/01/19 15:55:10 GMT 2001 by markus
[auth-krb4.c auth-options.c auth-rh-rsa.c auth-rhosts.c auth-rsa.c
auth1.c auth2.c channels.c clientloop.c dh.c dispatch.c nchan.c
packet.c pathname.h readconf.c scp.c servconf.c serverloop.c
session.c ssh-add.c ssh-keygen.c ssh-keyscan.c ssh.c ssh.h
ssh1.h sshconnect1.c sshd.c ttymodes.c]
move ssh1 definitions to ssh1.h, pathnames to pathnames.h
- markus@cvs.openbsd.org 2001/01/19 16:48:14
[sshd.8]
fix typo; from stevesk@
- markus@cvs.openbsd.org 2001/01/19 16:50:58
[ssh-dss.c]
clear and free digest, make consistent with other code (use dlen); from
stevesk@
- markus@cvs.openbsd.org 2001/01/20 15:55:20 GMT 2001 by markus
[auth-options.c auth-options.h auth-rsa.c auth2.c]
pass the filename to auth_parse_options()
- markus@cvs.openbsd.org 2001/01/20 17:59:40 GMT 2001
[readconf.c]
fix SIGSEGV from -o ""; problem noted by jehsom@togetherweb.com
- stevesk@cvs.openbsd.org 2001/01/20 18:20:29
[sshconnect2.c]
dh_new_group() does not return NULL. ok markus@
- markus@cvs.openbsd.org 2001/01/20 21:33:42
[ssh-add.c]
do not loop forever if askpass does not exist; from
andrew@pimlott.ne.mediaone.net
- djm@cvs.openbsd.org 2001/01/20 23:00:56
[servconf.c]
Check for NULL return from strdelim; ok markus
- djm@cvs.openbsd.org 2001/01/20 23:02:07
[readconf.c]
KNF; ok markus
- jakob@cvs.openbsd.org 2001/01/21 9:00:33
[ssh-keygen.1]
remove -R flag; ok markus@
- markus@cvs.openbsd.org 2001/01/21 19:05:40
[atomicio.c automicio.h auth-chall.c auth-krb4.c auth-options.c
auth-options.h auth-passwd.c auth-rh-rsa.c auth-rhosts.c auth-rsa.c
auth.c auth.h auth1.c auth2-chall.c auth2.c authfd.c authfile.c
bufaux.c bufaux.h buffer.c canahost.c canahost.h channels.c
cipher.c cli.c clientloop.c clientloop.h compat.c compress.c
deattack.c dh.c dispatch.c groupaccess.c hmac.c hostfile.c kex.c
key.c key.h log-client.c log-server.c log.c log.h login.c login.h
match.c misc.c misc.h nchan.c packet.c pty.c radix.h readconf.c
readpass.c readpass.h rsa.c scp.c servconf.c serverloop.c serverloop.h
session.c sftp-server.c ssh-add.c ssh-agent.c ssh-dss.c ssh-keygen.c
ssh-keyscan.c ssh-rsa.c ssh.c ssh.h sshconnect.c sshconnect.h
sshconnect1.c sshconnect2.c sshd.c tildexpand.c tildexpand.h
ttysmodes.c uidswap.c xmalloc.c]
split ssh.h and try to cleanup the #include mess. remove unnecessary
#includes. rename util.[ch] -> misc.[ch]
- (bal) renamed 'PIDDIR' to '_PATH_SSH_PIDDIR' to match OpenBSD tree
- (bal) Moved #ifdef KRB4 in auth-krb4.c above the #include to resolve
conflict when compiling for non-kerb install
- (bal) removed the #ifdef SKEY in auth1.c to match Markus' changes
on 1/19.
Diffstat (limited to 'session.c')
-rw-r--r-- | session.c | 31 |
1 files changed, 18 insertions, 13 deletions
@@ -33,24 +33,29 @@ | |||
33 | */ | 33 | */ |
34 | 34 | ||
35 | #include "includes.h" | 35 | #include "includes.h" |
36 | RCSID("$OpenBSD: session.c,v 1.49 2001/01/18 17:00:00 markus Exp $"); | 36 | RCSID("$OpenBSD: session.c,v 1.51 2001/01/21 19:05:56 markus Exp $"); |
37 | 37 | ||
38 | #include "xmalloc.h" | ||
39 | #include "ssh.h" | 38 | #include "ssh.h" |
39 | #include "ssh1.h" | ||
40 | #include "ssh2.h" | ||
41 | #include "xmalloc.h" | ||
40 | #include "pty.h" | 42 | #include "pty.h" |
41 | #include "packet.h" | 43 | #include "packet.h" |
42 | #include "buffer.h" | 44 | #include "buffer.h" |
43 | #include "mpaux.h" | 45 | #include "mpaux.h" |
44 | #include "servconf.h" | ||
45 | #include "uidswap.h" | 46 | #include "uidswap.h" |
46 | #include "compat.h" | 47 | #include "compat.h" |
47 | #include "channels.h" | 48 | #include "channels.h" |
48 | #include "nchan.h" | 49 | #include "nchan.h" |
49 | |||
50 | #include "bufaux.h" | 50 | #include "bufaux.h" |
51 | #include "ssh2.h" | ||
52 | #include "auth.h" | 51 | #include "auth.h" |
53 | #include "auth-options.h" | 52 | #include "auth-options.h" |
53 | #include "pathnames.h" | ||
54 | #include "log.h" | ||
55 | #include "servconf.h" | ||
56 | #include "login.h" | ||
57 | #include "serverloop.h" | ||
58 | #include "canohost.h" | ||
54 | 59 | ||
55 | #ifdef WITH_IRIX_PROJECT | 60 | #ifdef WITH_IRIX_PROJECT |
56 | #include <proj.h> | 61 | #include <proj.h> |
@@ -1333,28 +1338,28 @@ do_child(const char *command, struct passwd * pw, const char *term, | |||
1333 | * in this order). | 1338 | * in this order). |
1334 | */ | 1339 | */ |
1335 | if (!options.use_login) { | 1340 | if (!options.use_login) { |
1336 | if (stat(SSH_USER_RC, &st) >= 0) { | 1341 | if (stat(_PATH_SSH_USER_RC, &st) >= 0) { |
1337 | if (debug_flag) | 1342 | if (debug_flag) |
1338 | fprintf(stderr, "Running %s %s\n", _PATH_BSHELL, SSH_USER_RC); | 1343 | fprintf(stderr, "Running %s %s\n", _PATH_BSHELL, _PATH_SSH_USER_RC); |
1339 | 1344 | ||
1340 | f = popen(_PATH_BSHELL " " SSH_USER_RC, "w"); | 1345 | f = popen(_PATH_BSHELL " " _PATH_SSH_USER_RC, "w"); |
1341 | if (f) { | 1346 | if (f) { |
1342 | if (auth_proto != NULL && auth_data != NULL) | 1347 | if (auth_proto != NULL && auth_data != NULL) |
1343 | fprintf(f, "%s %s\n", auth_proto, auth_data); | 1348 | fprintf(f, "%s %s\n", auth_proto, auth_data); |
1344 | pclose(f); | 1349 | pclose(f); |
1345 | } else | 1350 | } else |
1346 | fprintf(stderr, "Could not run %s\n", SSH_USER_RC); | 1351 | fprintf(stderr, "Could not run %s\n", _PATH_SSH_USER_RC); |
1347 | } else if (stat(SSH_SYSTEM_RC, &st) >= 0) { | 1352 | } else if (stat(_PATH_SSH_SYSTEM_RC, &st) >= 0) { |
1348 | if (debug_flag) | 1353 | if (debug_flag) |
1349 | fprintf(stderr, "Running %s %s\n", _PATH_BSHELL, SSH_SYSTEM_RC); | 1354 | fprintf(stderr, "Running %s %s\n", _PATH_BSHELL, _PATH_SSH_SYSTEM_RC); |
1350 | 1355 | ||
1351 | f = popen(_PATH_BSHELL " " SSH_SYSTEM_RC, "w"); | 1356 | f = popen(_PATH_BSHELL " " _PATH_SSH_SYSTEM_RC, "w"); |
1352 | if (f) { | 1357 | if (f) { |
1353 | if (auth_proto != NULL && auth_data != NULL) | 1358 | if (auth_proto != NULL && auth_data != NULL) |
1354 | fprintf(f, "%s %s\n", auth_proto, auth_data); | 1359 | fprintf(f, "%s %s\n", auth_proto, auth_data); |
1355 | pclose(f); | 1360 | pclose(f); |
1356 | } else | 1361 | } else |
1357 | fprintf(stderr, "Could not run %s\n", SSH_SYSTEM_RC); | 1362 | fprintf(stderr, "Could not run %s\n", _PATH_SSH_SYSTEM_RC); |
1358 | } else if (options.xauth_location != NULL) { | 1363 | } else if (options.xauth_location != NULL) { |
1359 | /* Add authority data to .Xauthority if appropriate. */ | 1364 | /* Add authority data to .Xauthority if appropriate. */ |
1360 | if (auth_proto != NULL && auth_data != NULL) { | 1365 | if (auth_proto != NULL && auth_data != NULL) { |