summaryrefslogtreecommitdiff
path: root/shells
diff options
context:
space:
mode:
Diffstat (limited to 'shells')
-rw-r--r--shells/rssh/distinfo3
-rw-r--r--shells/rssh/patches/patch-rsshconf.c370
2 files changed, 372 insertions, 1 deletions
diff --git a/shells/rssh/distinfo b/shells/rssh/distinfo
index bd34e7bb83e..7e540e3ba12 100644
--- a/shells/rssh/distinfo
+++ b/shells/rssh/distinfo
@@ -1,7 +1,8 @@
-$NetBSD: distinfo,v 1.5 2010/10/16 09:57:38 adam Exp $
+$NetBSD: distinfo,v 1.6 2012/11/01 19:30:58 joerg Exp $
SHA1 (rssh-2.3.3.tar.gz) = 0a6dd80b5e6059e0db12c9f1276121dd966b610a
RMD160 (rssh-2.3.3.tar.gz) = e9f5c3a8f8cecd6b29c6b85a2672cd22481ef8b5
Size (rssh-2.3.3.tar.gz) = 119510 bytes
SHA1 (patch-aa) = 778908260daf0f73367037bd5a37a6e7c888ac78
SHA1 (patch-ab) = 19a5f7ffe3fef0c6aa17c1611c564c45a802ea96
+SHA1 (patch-rsshconf.c) = a2c2b14bf3619f77cf4e3cbfeaaa4b356d145443
diff --git a/shells/rssh/patches/patch-rsshconf.c b/shells/rssh/patches/patch-rsshconf.c
new file mode 100644
index 00000000000..aaf99efef58
--- /dev/null
+++ b/shells/rssh/patches/patch-rsshconf.c
@@ -0,0 +1,370 @@
+$NetBSD: patch-rsshconf.c,v 1.1 2012/11/01 19:30:58 joerg Exp $
+
+--- rsshconf.c.orig 2012-10-30 19:27:54.000000000 +0000
++++ rsshconf.c
+@@ -78,7 +78,7 @@ const char *keywords[] = {
+ NULL
+ };
+
+-int log=0;
++int my_log=0;
+
+ /* flag to tell config parser to stop processing config file */
+ static bool got_user_config = FALSE;
+@@ -132,11 +132,11 @@ int read_shell_config( ShellOptions_t *o
+ int status = TRUE; /* were all the cfg lines good? */
+ char line[CFG_LINE_LEN + 1]; /* buffer to hold region */
+
+- log = do_log;
++ my_log = do_log;
+ memset(line, 0, CFG_LINE_LEN + 1);
+ cfg_file = fopen(filename, "r");
+ if (!cfg_file) {
+- if (log){
++ if (my_log){
+ log_set_priority(LOG_WARNING);
+ log_msg("config file (%s) missing, using defaults",
+ filename);
+@@ -174,7 +174,7 @@ int process_config_line( ShellOptions_t
+ *newline = '\0';
+ else {
+ /* there is no newline - log the error and find the EOL */
+- if (log){
++ if (my_log){
+ log_set_priority(LOG_ERR);
+ log_msg("line %d: line too long", lineno);
+ }
+@@ -241,12 +241,12 @@ int process_config_line( ShellOptions_t
+ return TRUE;
+ default:
+ /* the keyword is unknown */
+- if (log){
++ if (my_log){
+ log_set_priority(LOG_ERR);
+ log_msg("line %d: syntax error parsing config file",
+ lineno);
+ }
+- if ( keywrd[0] && log )
++ if ( keywrd[0] && my_log )
+ log_msg("unknown keyword: %s", keywrd);
+ return FALSE;
+ }
+@@ -330,7 +330,7 @@ int get_token( const char *str, char *bu
+ /* initialize strings and pointers */
+ memset(buf, 0, buflen);
+ if ( !(copy = strdup(str)) ){
+- if (log){
++ if (my_log){
+ log_set_priority(LOG_ERR);
+ log_msg("OOM error in get_token() (fatal)");
+ }
+@@ -433,11 +433,11 @@ int process_allow_scp( ShellOptions_t *o
+ const int lineno )
+ {
+ if ( !eat_comment(line) ){
+- if (log) log_msg("line %d: syntax error parsing config file",
++ if (my_log) log_msg("line %d: syntax error parsing config file",
+ lineno);
+ return FALSE;
+ }
+- if (log){
++ if (my_log){
+ log_set_priority(LOG_INFO);
+ log_msg("allowing scp to all users");
+ }
+@@ -460,11 +460,11 @@ int process_allow_sftp( ShellOptions_t *
+ int pos;
+
+ if ( !(pos = eat_comment(line)) ){
+- if (log) log_msg("line %d: syntax error parsing config file",
++ if (my_log) log_msg("line %d: syntax error parsing config file",
+ lineno);
+ return FALSE;
+ }
+- if (log){
++ if (my_log){
+ log_set_priority(LOG_INFO);
+ log_msg("allowing sftp to all users");
+ }
+@@ -488,11 +488,11 @@ int process_allow_cvs( ShellOptions_t *o
+ int pos;
+
+ if ( !(pos = eat_comment(line)) ){
+- if (log) log_msg("line %d: syntax error parsing config file",
++ if (my_log) log_msg("line %d: syntax error parsing config file",
+ lineno);
+ return FALSE;
+ }
+- if (log){
++ if (my_log){
+ log_set_priority(LOG_INFO);
+ log_msg("allowing cvs to all users");
+ }
+@@ -516,12 +516,12 @@ int process_allow_rdist( ShellOptions_t
+ int pos;
+
+ if ( !(pos = eat_comment(line)) ){
+- if (log) log_msg("line %d: syntax error parsing config file",
++ if (my_log) log_msg("line %d: syntax error parsing config file",
+ lineno);
+ return FALSE;
+ }
+ log_set_priority(LOG_INFO);
+- if (log){
++ if (my_log){
+ log_msg("allowing rdist to all users");
+ opts->shell_flags |= RSSH_ALLOW_RDIST;
+ }
+@@ -544,11 +544,11 @@ int process_allow_rsync( ShellOptions_t
+ int pos;
+
+ if ( !(pos = eat_comment(line)) ){
+- if (log) log_msg("line %d: syntax error parsing config file",
++ if (my_log) log_msg("line %d: syntax error parsing config file",
+ lineno);
+ return FALSE;
+ }
+- if (log){
++ if (my_log){
+ log_set_priority(LOG_INFO);
+ log_msg("allowing rsync to all users");
+ }
+@@ -573,7 +573,7 @@ int process_chroot_path( ShellOptions_t
+ */
+
+ if ( !(temp = (char *)malloc(CFG_LINE_LEN + 1)) ){
+- if (log) log_msg("fatal error: can't allocate space for chroot path");
++ if (my_log) log_msg("fatal error: can't allocate space for chroot path");
+ exit(1);
+ }
+ /* get_asgn_param() eats trailing comments, so we won't */
+@@ -584,7 +584,7 @@ int process_chroot_path( ShellOptions_t
+
+ /* get rid of any old value for chroot path, assign new one */
+ if ( opts->chroot_path ) free(opts->chroot_path);
+- if (log){
++ if (my_log){
+ log_set_priority(LOG_INFO);
+ log_msg("chrooting all users to %s", temp);
+ }
+@@ -605,7 +605,7 @@ int process_log_facility( ShellOptions_t
+ int pos;
+
+ if ( !(temp = (char *)malloc(CFG_LINE_LEN + 1)) ){
+- if (log){
++ if (my_log){
+ log_set_priority(LOG_ERR);
+ log_msg("fatal error: can't allocate space for log facility");
+ }
+@@ -778,17 +778,17 @@ int process_log_facility( ShellOptions_t
+
+ free(temp);
+ if ( !eat_comment(line + pos) ){
+- if (log) log_msg("line %d: syntax error parsing config file",
++ if (my_log) log_msg("line %d: syntax error parsing config file",
+ lineno);
+ return FALSE;
+ }
+ if ( facname ){
+ log_set_priority(LOG_INFO);
+- if (log) log_msg("setting log facility to %s", facname);
++ if (my_log) log_msg("setting log facility to %s", facname);
+ log_set_facility(fac);
+ return TRUE;
+ }
+- if (log){
++ if (my_log){
+ log_msg("line %d: unknown log facility specified", lineno);
+ log_set_facility(LOG_USER);
+ }
+@@ -804,7 +804,7 @@ int process_umask( ShellOptions_t *opts,
+ int mask; /* umask */
+
+ if ( !(temp = (char *)malloc(CFG_LINE_LEN + 1)) ){
+- if (log){
++ if (my_log){
+ log_set_priority(LOG_ERR);
+ log_msg("fatal error: can't allocate space in process_umask()");
+ }
+@@ -818,7 +818,7 @@ int process_umask( ShellOptions_t *opts,
+
+ /* convert the umask to a number */
+ if ( !validate_umask(temp, &mask) ){
+- if (log){
++ if (my_log){
+ log_set_priority(LOG_WARNING);
+ log_msg("line %d: invalid umask specified, using default 077",
+ lineno);
+@@ -827,7 +827,7 @@ int process_umask( ShellOptions_t *opts,
+ free(temp);
+ return FALSE;
+ }
+- if (log){
++ if (my_log){
+ log_set_priority(LOG_INFO);
+ log_msg("setting umask to %#o", mask);
+ }
+@@ -857,7 +857,7 @@ int process_user( ShellOptions_t *opts,
+
+ /* make space for user options */
+ if ( !(temp = (char *)malloc(CFG_LINE_LEN + 1)) ){
+- if (log) log_msg("fatal error: can't allocate space for user options");
++ if (my_log) log_msg("fatal error: can't allocate space for user options");
+ exit(1);
+ }
+
+@@ -871,7 +871,7 @@ int process_user( ShellOptions_t *opts,
+
+ /* now process individual config bits of temp */
+ if ( !(pos = get_token(temp, user, CFG_LINE_LEN + 1, TRUE, TRUE )) ){
+- if (log){
++ if (my_log){
+ log_set_priority(LOG_ERR);
+ log_msg("syntax error parsing config file, line %d",
+ lineno);
+@@ -888,12 +888,12 @@ int process_user( ShellOptions_t *opts,
+ * user lines we don't care about...
+ */
+ if ( (strcmp(user, username)) ) return TRUE;
+- if (log){
++ if (my_log){
+ log_set_priority(LOG_INFO);
+ log_msg("line %d: configuring user %s", lineno, user);
+ }
+ if ( !(len = eat_colon(temp + pos)) ){
+- if (log) log_msg("syntax error parsing config file: line %d ",
++ if (my_log) log_msg("syntax error parsing config file: line %d ",
+ lineno);
+ return FALSE;
+ }
+@@ -902,7 +902,7 @@ int process_user( ShellOptions_t *opts,
+ /* do the umask, but validate it last, since it's non-fatal */
+ if ( !(len = get_token(temp + pos, mask, CFG_LINE_LEN + 1,
+ TRUE, FALSE)) ){
+- if (log){
++ if (my_log){
+ log_set_priority(LOG_ERR);
+ log_msg("syntax error parsing user umask, line %d", lineno);
+ }
+@@ -912,14 +912,14 @@ int process_user( ShellOptions_t *opts,
+
+ /* do the access bits */
+ if ( !(len = eat_colon(temp + pos)) ){
+- if (log) log_msg("syntax error parsing config file: line %d ",
++ if (my_log) log_msg("syntax error parsing config file: line %d ",
+ lineno);
+ return FALSE;
+ }
+ pos += len;
+ if ( !(len = get_token(temp + pos, axs, CFG_LINE_LEN + 1,
+ TRUE, FALSE)) ){
+- if (log){
++ if (my_log){
+ log_set_priority(LOG_ERR);
+ log_msg("syntax error parsing user access, line %d", lineno);
+ }
+@@ -927,7 +927,7 @@ int process_user( ShellOptions_t *opts,
+ }
+ if ( !validate_access(axs, &allow_sftp, &allow_scp, &allow_cvs,
+ &allow_rdist, &allow_rsync) ){
+- if (log){
++ if (my_log){
+ log_set_priority(LOG_ERR);
+ log_msg("syntax error parsing access bits, line %d", lineno);
+ }
+@@ -939,7 +939,7 @@ int process_user( ShellOptions_t *opts,
+ if ( !(len = eat_colon(temp + pos)) ) goto cleanup;
+ pos += len;
+ if ( !(path = (char *)malloc(CFG_LINE_LEN + 1)) ){
+- if (log) log_msg("fatal error: can't allocate space for chroot path");
++ if (my_log) log_msg("fatal error: can't allocate space for chroot path");
+ exit(1);
+ }
+ if ( !(len = get_token(temp + pos, path, CFG_LINE_LEN + 1,
+@@ -953,7 +953,7 @@ cleanup:
+ /* make sure nothing is left */
+ while ( *(temp + pos) != '\0' && isspace(*(temp + pos)) ) pos++;
+ if ( *(temp + pos) != '\0' ){
+- if (log){
++ if (my_log){
+ log_set_priority(LOG_ERR);
+ log_msg("syntax error parsing user config: line %d", lineno);
+ }
+@@ -962,14 +962,14 @@ cleanup:
+
+ /* now finally validate the umask */
+ if ( !validate_umask(mask, &tmpmask) ){
+- if (log){
++ if (my_log){
+ log_set_priority(LOG_WARNING);
+ log_msg("line %d: invalid umask specified, using default",
+ lineno);
+ }
+ tmpmask = 077;
+ }
+- if (log){
++ if (my_log){
+ log_set_priority(LOG_INFO);
+ log_msg("setting %s's umask to %#o", user, tmpmask);
+ }
+@@ -981,27 +981,27 @@ cleanup:
+ opts->shell_flags = 0;
+ /* now set the user-specific flags */
+ if ( allow_scp ){
+- if (log) log_msg("allowing scp to user %s", user);
++ if (my_log) log_msg("allowing scp to user %s", user);
+ opts->shell_flags |= RSSH_ALLOW_SCP;
+ }
+ if ( allow_sftp ){
+- if (log) log_msg("allowing sftp to user %s", user);
++ if (my_log) log_msg("allowing sftp to user %s", user);
+ opts->shell_flags |= RSSH_ALLOW_SFTP;
+ }
+ if ( allow_cvs ){
+- if (log) log_msg("allowing cvs to user %s", user);
++ if (my_log) log_msg("allowing cvs to user %s", user);
+ opts->shell_flags |= RSSH_ALLOW_CVS;
+ }
+ if ( allow_rdist ){
+- if (log) log_msg("allowing rdist to user %s", user);
++ if (my_log) log_msg("allowing rdist to user %s", user);
+ opts->shell_flags |= RSSH_ALLOW_RDIST;
+ }
+ if ( allow_rsync ){
+- if (log) log_msg("allowing rsync to user %s", user);
++ if (my_log) log_msg("allowing rsync to user %s", user);
+ opts->shell_flags |= RSSH_ALLOW_RSYNC;
+ }
+ if ( path ){
+- if (log) log_msg("chrooting %s to %s", user, path);
++ if (my_log) log_msg("chrooting %s to %s", user, path);
+ opts->shell_flags |= RSSH_USE_CHROOT;
+ }
+ opts->chroot_path = path;
+@@ -1020,7 +1020,7 @@ int get_asgn_param( const char *line,
+
+ /* make sure '=' is next token, otherwise syntax error */
+ if ( (pos = eat_assignment(line)) <= 0 ){
+- if (log){
++ if (my_log){
+ log_set_priority(LOG_ERR);
+ log_msg("error parsing config file at line %d: "
+ "assignment expected", lineno);
+@@ -1029,7 +1029,7 @@ int get_asgn_param( const char *line,
+ }
+ /* get the string parameter of the assignment */
+ if ( !(len = get_token((line + pos), buf, buflen, FALSE, FALSE)) ){
+- if (log){
++ if (my_log){
+ log_set_priority(LOG_ERR);
+ log_msg("syntax error parsing config file, line %d",
+ lineno);
+@@ -1039,7 +1039,7 @@ int get_asgn_param( const char *line,
+ pos += len;
+ /* check for ending comment */
+ if ( !eat_comment(line + pos) ){
+- if (log){
++ if (my_log){
+ log_set_priority(LOG_ERR);
+ log_msg("syntax error parsing config file at line %d",
+ lineno);