summaryrefslogtreecommitdiff
path: root/readconf.h
diff options
context:
space:
mode:
authordjm <djm>2004-04-20 10:11:57 +0000
committerdjm <djm>2004-04-20 10:11:57 +0000
commit8e6fd52ce623c53298928669caa6d8b4149906c5 (patch)
treea8d0fc9f21958023f933e61cee4cc39f9c6fdd25 /readconf.h
parent6706e4957b14120e88b022ef81a900f11a3d0808 (diff)
downloadopenssh-8e6fd52ce623c53298928669caa6d8b4149906c5.tar.gz
- djm@cvs.openbsd.org 2004/04/18 23:10:26
[readconf.c readconf.h ssh-keysign.c ssh.c] perform strict ownership and modes checks for ~/.ssh/config files, as these can be used to execute arbitrary programs; ok markus@ NB. ssh will now exit when it detects a config with poor permissions
Diffstat (limited to 'readconf.h')
-rw-r--r--readconf.h4
1 files changed, 2 insertions, 2 deletions
diff --git a/readconf.h b/readconf.h
index 93d833ce..9d70fee6 100644
--- a/readconf.h
+++ b/readconf.h
@@ -1,4 +1,4 @@
-/* $OpenBSD: readconf.h,v 1.60 2004/03/05 10:53:58 markus Exp $ */
+/* $OpenBSD: readconf.h,v 1.61 2004/04/18 23:10:26 djm Exp $ */
/*
* Author: Tatu Ylonen <ylo@cs.hut.fi>
@@ -108,7 +108,7 @@ typedef struct {
void initialize_options(Options *);
void fill_default_options(Options *);
-int read_config_file(const char *, const char *, Options *);
+int read_config_file(const char *, const char *, Options *, int);
int
process_config_line(Options *, const char *, char *, const char *, int, int *);