[channels.c channels.h clientloop.c clientloop.h mux.c ssh.c]
hook up a channel confirm callback to warn the user then requested X11
forwarding was refused by the server; ok markus@
+ - djm@cvs.openbsd.org 2011/06/23 09:34:13
+ [sshd.c ssh-sandbox.h sandbox.h sandbox-rlimit.c sandbox-systrace.c]
+ [sandbox-null.c]
+ rename sandbox.h => ssh-sandbox.h to make things easier for portable
- (djm) [sandbox-null.c] Dummy sandbox for platforms that don't support
setrlimit(2)
+/* $OpenBSD$ */
/*
* Copyright (c) 2011 Damien Miller <djm@mindrot.org>
*
#include <unistd.h>
#include "log.h"
-#include "sandbox.h"
+#include "ssh-sandbox.h"
#include "xmalloc.h"
/* dummy sandbox */
+/* $OpenBSD: sandbox-rlimit.c,v 1.3 2011/06/23 09:34:13 djm Exp $ */
/*
* Copyright (c) 2011 Damien Miller <djm@mindrot.org>
*
#include <unistd.h>
#include "log.h"
-#include "sandbox.h"
+#include "ssh-sandbox.h"
#include "xmalloc.h"
/* Minimal sandbox that sets zero nfiles, nprocs and filesize rlimits */
+/* $OpenBSD: sandbox-systrace.c,v 1.3 2011/06/23 09:34:13 djm Exp $ */
/*
* Copyright (c) 2011 Damien Miller <djm@mindrot.org>
*
#include "atomicio.h"
#include "log.h"
-#include "sandbox.h"
+#include "ssh-sandbox.h"
#include "xmalloc.h"
static const int preauth_policy[] = {
-/* $OpenBSD: sandbox.h,v 1.2 2011/06/22 22:14:05 djm Exp $ */
+/* $OpenBSD: ssh-sandbox.h,v 1.1 2011/06/23 09:34:13 djm Exp $ */
/*
* Copyright (c) 2011 Damien Miller <djm@mindrot.org>
*
-/* $OpenBSD: sshd.c,v 1.384 2011/06/22 21:57:01 djm Exp $ */
+/* $OpenBSD: sshd.c,v 1.385 2011/06/23 09:34:13 djm Exp $ */
/*
* Author: Tatu Ylonen <ylo@cs.hut.fi>
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
#endif
#include "monitor_wrap.h"
#include "roaming.h"
-#include "sandbox.h"
+#include "ssh-sandbox.h"
#include "version.h"
#ifdef LIBWRAP