mirror of
https://github.com/PowerShell/openssh-portable.git
synced 2025-09-22 01:18:25 +02:00
- djm@cvs.openbsd.org 2010/11/21 01:01:13
[clientloop.c misc.c misc.h ssh-agent.1 ssh-agent.c] honour $TMPDIR for client xauth and ssh-agent temporary directories; feedback and ok markus@
This commit is contained in:
parent
188ea814b1
commit
2cd629349d
@ -3,6 +3,10 @@
|
|||||||
- deraadt@cvs.openbsd.org 2010/11/20 05:12:38
|
- deraadt@cvs.openbsd.org 2010/11/20 05:12:38
|
||||||
[auth2-pubkey.c]
|
[auth2-pubkey.c]
|
||||||
clean up cases of ;;
|
clean up cases of ;;
|
||||||
|
- djm@cvs.openbsd.org 2010/11/21 01:01:13
|
||||||
|
[clientloop.c misc.c misc.h ssh-agent.1 ssh-agent.c]
|
||||||
|
honour $TMPDIR for client xauth and ssh-agent temporary directories;
|
||||||
|
feedback and ok markus@
|
||||||
|
|
||||||
20101124
|
20101124
|
||||||
- (dtucker) [platform.c session.c] Move the getluid call out of session.c and
|
- (dtucker) [platform.c session.c] Move the getluid call out of session.c and
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
/* $OpenBSD: clientloop.c,v 1.224 2010/11/13 23:27:50 djm Exp $ */
|
/* $OpenBSD: clientloop.c,v 1.225 2010/11/21 01:01:13 djm Exp $ */
|
||||||
/*
|
/*
|
||||||
* Author: Tatu Ylonen <ylo@cs.hut.fi>
|
* Author: Tatu Ylonen <ylo@cs.hut.fi>
|
||||||
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
||||||
@ -325,7 +325,7 @@ client_x11_get_proto(const char *display, const char *xauth_path,
|
|||||||
if (trusted == 0) {
|
if (trusted == 0) {
|
||||||
xauthdir = xmalloc(MAXPATHLEN);
|
xauthdir = xmalloc(MAXPATHLEN);
|
||||||
xauthfile = xmalloc(MAXPATHLEN);
|
xauthfile = xmalloc(MAXPATHLEN);
|
||||||
strlcpy(xauthdir, "/tmp/ssh-XXXXXXXXXX", MAXPATHLEN);
|
mktemp_proto(xauthdir, MAXPATHLEN);
|
||||||
if (mkdtemp(xauthdir) != NULL) {
|
if (mkdtemp(xauthdir) != NULL) {
|
||||||
do_unlink = 1;
|
do_unlink = 1;
|
||||||
snprintf(xauthfile, MAXPATHLEN, "%s/xauthfile",
|
snprintf(xauthfile, MAXPATHLEN, "%s/xauthfile",
|
||||||
|
19
misc.c
19
misc.c
@ -1,4 +1,4 @@
|
|||||||
/* $OpenBSD: misc.c,v 1.83 2010/11/13 23:27:50 djm Exp $ */
|
/* $OpenBSD: misc.c,v 1.84 2010/11/21 01:01:13 djm Exp $ */
|
||||||
/*
|
/*
|
||||||
* Copyright (c) 2000 Markus Friedl. All rights reserved.
|
* Copyright (c) 2000 Markus Friedl. All rights reserved.
|
||||||
* Copyright (c) 2005,2006 Damien Miller. All rights reserved.
|
* Copyright (c) 2005,2006 Damien Miller. All rights reserved.
|
||||||
@ -916,6 +916,23 @@ bandwidth_limit(struct bwlimit *bw, size_t read_len)
|
|||||||
gettimeofday(&bw->bwstart, NULL);
|
gettimeofday(&bw->bwstart, NULL);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/* Make a template filename for mk[sd]temp() */
|
||||||
|
void
|
||||||
|
mktemp_proto(char *s, size_t len)
|
||||||
|
{
|
||||||
|
const char *tmpdir;
|
||||||
|
int r;
|
||||||
|
|
||||||
|
if ((tmpdir = getenv("TMPDIR")) != NULL) {
|
||||||
|
r = snprintf(s, len, "%s/ssh-XXXXXXXXXXXX", tmpdir);
|
||||||
|
if (r > 0 && (size_t)r < len)
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
r = snprintf(s, len, "/tmp/ssh-XXXXXXXXXXXX");
|
||||||
|
if (r < 0 || (size_t)r >= len)
|
||||||
|
fatal("%s: template string too short", __func__);
|
||||||
|
}
|
||||||
|
|
||||||
static const struct {
|
static const struct {
|
||||||
const char *name;
|
const char *name;
|
||||||
int value;
|
int value;
|
||||||
|
3
misc.h
3
misc.h
@ -1,4 +1,4 @@
|
|||||||
/* $OpenBSD: misc.h,v 1.46 2010/11/13 23:27:50 djm Exp $ */
|
/* $OpenBSD: misc.h,v 1.47 2010/11/21 01:01:13 djm Exp $ */
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Author: Tatu Ylonen <ylo@cs.hut.fi>
|
* Author: Tatu Ylonen <ylo@cs.hut.fi>
|
||||||
@ -89,6 +89,7 @@ void bandwidth_limit_init(struct bwlimit *, u_int64_t, size_t);
|
|||||||
void bandwidth_limit(struct bwlimit *, size_t);
|
void bandwidth_limit(struct bwlimit *, size_t);
|
||||||
|
|
||||||
int parse_ipqos(const char *);
|
int parse_ipqos(const char *);
|
||||||
|
void mktemp_proto(char *, size_t);
|
||||||
|
|
||||||
/* readpass.c */
|
/* readpass.c */
|
||||||
|
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
.\" $OpenBSD: ssh-agent.1,v 1.52 2010/08/31 17:40:54 jmc Exp $
|
.\" $OpenBSD: ssh-agent.1,v 1.53 2010/11/21 01:01:13 djm Exp $
|
||||||
.\"
|
.\"
|
||||||
.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
|
.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
|
||||||
.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
||||||
@ -34,7 +34,7 @@
|
|||||||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
.\"
|
.\"
|
||||||
.Dd $Mdocdate: August 31 2010 $
|
.Dd $Mdocdate: November 21 2010 $
|
||||||
.Dt SSH-AGENT 1
|
.Dt SSH-AGENT 1
|
||||||
.Os
|
.Os
|
||||||
.Sh NAME
|
.Sh NAME
|
||||||
@ -72,7 +72,7 @@ Bind the agent to the
|
|||||||
socket
|
socket
|
||||||
.Ar bind_address .
|
.Ar bind_address .
|
||||||
The default is
|
The default is
|
||||||
.Pa /tmp/ssh-XXXXXXXXXX/agent.\*(Ltppid\*(Gt .
|
.Pa $TMPDIR/ssh-XXXXXXXXXX/agent.\*(Ltppid\*(Gt .
|
||||||
.It Fl c
|
.It Fl c
|
||||||
Generate C-shell commands on
|
Generate C-shell commands on
|
||||||
.Dv stdout .
|
.Dv stdout .
|
||||||
@ -192,7 +192,7 @@ Contains the protocol version 2 DSA authentication identity of the user.
|
|||||||
Contains the protocol version 2 ECDSA authentication identity of the user.
|
Contains the protocol version 2 ECDSA authentication identity of the user.
|
||||||
.It Pa ~/.ssh/id_rsa
|
.It Pa ~/.ssh/id_rsa
|
||||||
Contains the protocol version 2 RSA authentication identity of the user.
|
Contains the protocol version 2 RSA authentication identity of the user.
|
||||||
.It Pa /tmp/ssh-XXXXXXXXXX/agent.\*(Ltppid\*(Gt
|
.It Pa $TMPDIR/ssh-XXXXXXXXXX/agent.\*(Ltppid\*(Gt
|
||||||
.Ux Ns -domain
|
.Ux Ns -domain
|
||||||
sockets used to contain the connection to the authentication agent.
|
sockets used to contain the connection to the authentication agent.
|
||||||
These sockets should only be readable by the owner.
|
These sockets should only be readable by the owner.
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
/* $OpenBSD: ssh-agent.c,v 1.170 2010/08/31 12:33:38 djm Exp $ */
|
/* $OpenBSD: ssh-agent.c,v 1.171 2010/11/21 01:01:13 djm Exp $ */
|
||||||
/*
|
/*
|
||||||
* Author: Tatu Ylonen <ylo@cs.hut.fi>
|
* Author: Tatu Ylonen <ylo@cs.hut.fi>
|
||||||
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
||||||
@ -1232,7 +1232,7 @@ main(int ac, char **av)
|
|||||||
|
|
||||||
if (agentsocket == NULL) {
|
if (agentsocket == NULL) {
|
||||||
/* Create private directory for agent socket */
|
/* Create private directory for agent socket */
|
||||||
strlcpy(socket_dir, "/tmp/ssh-XXXXXXXXXX", sizeof socket_dir);
|
mktemp_proto(socket_dir, sizeof(socket_dir));
|
||||||
if (mkdtemp(socket_dir) == NULL) {
|
if (mkdtemp(socket_dir) == NULL) {
|
||||||
perror("mkdtemp: private socket dir");
|
perror("mkdtemp: private socket dir");
|
||||||
exit(1);
|
exit(1);
|
||||||
|
Loading…
x
Reference in New Issue
Block a user