summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/channels.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* move #include <unistd.h> out of includes.hstevesk2006-07-171-1/+2
|
* move #include <netdb.h> out of includes.h; ok djm@stevesk2006-07-121-1/+2
|
* move #include <errno.h> out of includes.h; ok markus@stevesk2006-07-111-1/+2
|
* add ExitOnForwardFailure: terminate the connection if ssh(1)markus2006-07-111-7/+10
| | | | | cannot set up all requested dynamic, local, and remote port forwardings. ok djm, dtucker, stevesk, jmc
* fix misparsing of SOCKS 5 packets that could result in a crash;djm2006-07-101-3/+6
| | | | reported by mk@ ok markus@
* move #include <arpa/inet.h> out of includes.h; old ok djm@stevesk2006-07-031-1/+5
|
* Fix condition where we could exit with a fatal error when an inputdjm2006-04-161-5/+3
| | | | | | | | | buffer became too large and the remote end had advertised a big window. The problem was a mismatch in the backoff math between the channels code and the buffer code, so make a buffer_check_alloc() function that the channels code can use to propsectivly check whether an incremental allocation will succeed. bz #1131, debugged with the assistance of cove AT wildpackets.com; ok dtucker@ deraadt@
* ARGSUSED for dispatch table-driven functionsdjm2006-03-301-1/+12
|
* do not accept unreasonable X ports numbers; ok djmderaadt2006-03-281-8/+8
|
* delete cast not requiredderaadt2006-03-251-2/+2
|
* remove (char *) casts to a function that accepts void * for the argderaadt2006-03-251-5/+5
|
* use strtonum() instead of atoi() [limit X screens to 400, sorry]deraadt2006-03-251-2/+2
|
* Put $OpenBSD$ tags back (as comments) to replace the RCSID()s thatdjm2006-03-251-0/+1
| | | | Theo nuked - our scripts to sync -portable need them in the files
* change OpenSSH's xrealloc() function from being xrealloc(p, new_size) todjm2006-03-251-6/+11
| | | | | | | | xrealloc(p, new_nmemb, new_itemsize). realloc is particularly prone to integer overflows because it is almost always allocating "n * size" bytes, so this is a far safer API; ok deraadt@
* introduce xcalloc() and xasprintf() failure-checked allocations functionsdjm2006-03-251-4/+3
| | | | | | | | | | and use them throughout openssh xcalloc is particularly important because malloc(nmemb * size) is a dangerous idiom (subject to integer overflow) and it is time for it to die feedback and ok deraadt@
* spacingderaadt2006-03-201-14/+8
|
* x11_fake_data is only ever used as u_char *deraadt2006-03-201-1/+1
|
* annoying spacing fixes getting in the way of real diffsderaadt2006-03-201-1/+1
|
* sprinkle u_int throughout pty subsystem, ok markusderaadt2006-03-201-4/+4
|
* spacingderaadt2006-03-191-26/+25
|
* RCSID() can diederaadt2006-03-191-1/+0
|
* move #include <sys/un.h> out of includes.h; ok djm@stevesk2006-02-201-1/+3
|
* move #include <sys/ioctl.h> out of includes.h; ok markus@stevesk2006-02-101-1/+3
|
* move #include <termios.h> out of includes.h; ok markus@stevesk2006-02-071-1/+3
|
* mark channel as write failed or dead instead of read failed on errorreyk2006-01-301-2/+6
| | | | | | of the channel output filter. ok markus@
* add channel output filter interface.reyk2005-12-301-13/+24
| | | | ok djm@, suggested by markus@
* use 'break-in' for consistency; ok deraadt@ ok and input jmc@stevesk2005-12-281-2/+2
|
* make sure protocol messages for internal channels are ignored.markus2005-12-121-9/+36
| | | | allow adjust messages for non-open channels; with and ok djm@
* Add support for tun(4) forwarding over OpenSSH, based on an idea andreyk2005-12-061-2/+40
| | | | | | | | | | | | initial channel code bits by markus@. This is a simple and easy way to use OpenSSH for ad hoc virtual private network connections, e.g. administrative tunnels or secure wireless access. It's based on a new ssh channel and works similar to the existing TCP forwarding support, except that it depends on the tun(4) network interface on both ends of the connection for layer 2 or layer 3 tunneling. This diff also adds support for LocalCommand in the ssh(1) client. ok djm@, markus@, jmc@ (manpages), tested and discussed with others
* free()->xfree(); ok djm@stevesk2005-10-141-2/+2
|
* bz #1076 set SO_REUSEADDR on X11 forwarding listner sockets, preventingdjm2005-10-111-9/+18
| | | | | bind() failure when a previous connection's listeners are in TIME_WAIT, reported by plattner AT inf.ethz.ch; ok dtucker@
* fix regression I introduced in 4.2: X11 forwardings initiated afterdjm2005-10-101-3/+6
| | | | | a session has exited (e.g. "(sleep 5; xterm) &") would not start. bz #1086 reported by t8m AT centrum.cz; ok markus@ dtucker@
* enforce chanid != NULL; ok djmmarkus2005-09-071-7/+7
|
* knf says that a 2nd level indent is four (not three or five) spacesdjm2005-07-171-5/+5
|
* Fix a number of X11 forwarding channel leaks:djm2005-07-171-2/+8
| | | | | | | | 1. Refuse multiple X11 forwarding requests on the same session 2. Clean up all listeners after a single_connection X11 forward, not just the one that made the single connection 3. Destroy X11 listeners when the session owning them goes away testing and ok dtucker@
* spacingdjm2005-07-161-2/+2
|
* don't forget to set x11_saved_displaymarkus2005-07-041-2/+4
|
* implement support for X11 and agent forwarding over multiplex slavedjm2005-07-041-27/+34
| | | | | | | | connections. Because of protocol limitations, the slave connections inherit the master's DISPLAY and SSH_AUTH_SOCK rather than distinctly forwarding their own. ok dtucker@ "put it in" deraadt@
* don't free() if getaddrinfo() fails; report mpech@markus2005-07-011-7/+5
|
* make this -Wsign-compare clean; ok avsm@ markus@djm2005-06-171-4/+5
|
* don't exit if getpeername fails for forwarded ports; bugzilla #1054; ok djmmarkus2005-06-161-3/+3
|
* move x11_get_proto from ssh.c to clientloop.c, to make muliplexed xfwd easierdjm2005-06-161-5/+5
| | | | later; ok deraadt@
* limit input buffer size for channels; bugzilla #896; with and ok dtucker@markus2005-03-141-3/+8
|
* spacingderaadt2005-03-101-9/+9
|
* bz#413: allow optional specification of bind address for port forwardings.djm2005-03-011-15/+67
| | | | | | | | Patch originally by Dan Astorian, but worked on by several people Adds GatewayPorts=clientspecified option on server to allow remote forwards to bind to client-specified ports. ok markus@
* fix some window size change bugs for multiplexed connections: windows sizesdjm2004-10-291-2/+2
| | | | | | were not being updated if they had changed after ~^Z suspends and SIGWINCH was not being processed unless the first connection had requested a tty; ok markus
* typo, spotted by Martin.Kraemer AT Fujitsu-Siemens.com; ok markusdjm2004-08-231-2/+2
|
* some signed/unsigned int comparison cleanups; markus@ okavsm2004-08-111-23/+24
|
* spacesderaadt2004-07-111-6/+5
|
* make ssh -Wshadow clean, no functional changesavsm2004-06-211-5/+5
| | | | markus@ ok