Lines Matching defs:env
961 char **env;
985 env = *envp;
987 for (i = 0; env[i]; i++)
988 if (strncmp(env[i], name, namelen) == 0 && env[i][namelen] == '=')
990 if (env[i]) {
992 free(env[i]);
998 fatal("child_set_env: too many env vars");
1000 env = (*envp) = xrealloc(env, envsize, sizeof(char *));
1004 env[i + 1] = NULL;
1008 env[i] = xmalloc(strlen(name) + 1 + strlen(value) + 1);
1009 snprintf(env[i], strlen(name) + 1 + strlen(value) + 1, "%s=%s", name, value);
1019 read_environment_file(char ***env, u_int *envsize,
1053 child_set_env(env, envsize, cp, value);
1063 child_get_env(char **env, const char *name)
1069 for (i=0; env[i] != NULL; i++)
1070 if (strncmp(name, env[i], len) == 0 && env[i][len] == '=')
1071 return(env[i] + len + 1);
1080 read_etc_default_login(char ***env, u_int *envsize, uid_t uid)
1101 child_set_env(env, envsize, "PATH", var);
1114 copy_environment(char **source, char ***env, u_int *envsize)
1131 child_set_env(env, envsize, var_name, var_val);
1142 char **env, *laddr;
1150 env = xcalloc(envsize, sizeof(char *));
1151 env[0] = NULL;
1162 copy_environment(p, &env, &envsize);
1171 ssh_gssapi_do_child(&env, &envsize);
1177 child_set_env(&env, &envsize, s->env[i].name,
1178 s->env[i].val);
1180 child_set_env(&env, &envsize, "USER", pw->pw_name);
1181 child_set_env(&env, &envsize, "LOGNAME", pw->pw_name);
1183 child_set_env(&env, &envsize, "LOGIN", pw->pw_name);
1185 child_set_env(&env, &envsize, "HOME", pw->pw_dir);
1188 child_set_env(&env, &envsize, "PATH", _PATH_STDPATH);
1190 child_set_env(&env, &envsize, "PATH", getenv("PATH"));
1200 read_etc_default_login(&env, &envsize, pw->pw_uid);
1201 path = child_get_env(env, "PATH");
1204 child_set_env(&env, &envsize, "PATH",
1214 child_set_env(&env, &envsize, "MAIL", buf);
1218 child_set_env(&env, &envsize, "SHELL", shell);
1221 child_set_env(&env, &envsize, "TZ", getenv("TZ"));
1233 child_set_env(&env, &envsize, str, str + i + 1);
1244 child_set_env(&env, &envsize, "SSH_CLIENT", buf);
1250 child_set_env(&env, &envsize, "SSH_CONNECTION", buf);
1253 child_set_env(&env, &envsize, "SSH_TTY", s->tty);
1255 child_set_env(&env, &envsize, "TERM", s->term);
1257 child_set_env(&env, &envsize, "DISPLAY", s->display);
1259 child_set_env(&env, &envsize, "SSH_ORIGINAL_COMMAND",
1264 child_set_env(&env, &envsize, "TMPDIR", cray_tmpdir);
1276 child_set_env(&env, &envsize, "KRB5CCNAME", cp);
1284 child_set_env(&env, &envsize, "AUTHSTATE", cp);
1285 read_environment_file(&env, &envsize, "/etc/environment");
1290 child_set_env(&env, &envsize, "KRB5CCNAME",
1302 copy_environment(p, &env, &envsize);
1306 copy_environment(p, &env, &envsize);
1312 child_set_env(&env, &envsize, SSH_AUTHSOCKET_ENV_NAME,
1319 read_environment_file(&env, &envsize, buf);
1324 for (i = 0; env[i]; i++)
1325 fprintf(stderr, " %.200s\n", env[i]);
1327 return env;
1675 char **env;
1742 env = do_setup_env(s, shell);
1765 environ = env;
1873 execve(shell, argv, env);
1887 execve(shell, argv, env);
2243 debug2("Ignoring env request %s: too many env vars", name);
2249 debug2("Setting env %d: %s=%s", s->num_env, name, val);
2250 s->env = xrealloc(s->env, s->num_env + 1,
2251 sizeof(*s->env));
2252 s->env[s->num_env].name = name;
2253 s->env[s->num_env].val = val;
2258 debug2("Ignoring env request %s: disallowed name", name);
2313 } else if (strcmp(rtype, "env") == 0) {
2522 if (s->env != NULL) {
2524 free(s->env[i].name);
2525 free(s->env[i].val);
2527 free(s->env);