summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/clientloop.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* introduce xcalloc() and xasprintf() failure-checked allocations functionsdjm2006-03-251-3/+2
| | | | | | | | | | and use them throughout openssh xcalloc is particularly important because malloc(nmemb * size) is a dangerous idiom (subject to integer overflow) and it is time for it to die feedback and ok deraadt@
* sprinkle u_int throughout pty subsystem, ok markusderaadt2006-03-201-8/+8
|
* ARGSUSED for signal handlersderaadt2006-03-191-2/+2
|
* RCSID() can diederaadt2006-03-191-1/+0
|
* move #include <ctype.h> out of includes.h; ok djm@stevesk2006-02-221-1/+2
|
* move #include <sys/stat.h> out of includes.h; ok markus@stevesk2006-02-201-1/+3
|
* move #include <signal.h> out of includes.h; ok markus@stevesk2006-02-201-1/+2
|
* move #include <sys/ioctl.h> out of includes.h; ok markus@stevesk2006-02-101-1/+3
|
* move #include <paths.h> out of includes.h; ok markus@stevesk2006-02-081-1/+2
|
* move #include <termios.h> out of includes.h; ok markus@stevesk2006-02-071-1/+3
|
* add channel output filter interface.reyk2005-12-301-2/+2
| | | | ok djm@, suggested by markus@
* use 'break-in' for consistency; ok deraadt@ ok and input jmc@stevesk2005-12-281-3/+3
|
* reyk forgot to compile with -Werror (missing header)djm2005-12-071-1/+2
|
* Add support for tun(4) forwarding over OpenSSH, based on an idea andreyk2005-12-061-1/+10
| | | | | | | | | | | | initial channel code bits by markus@. This is a simple and easy way to use OpenSSH for ad hoc virtual private network connections, e.g. administrative tunnels or secure wireless access. It's based on a new ssh channel and works similar to the existing TCP forwarding support, except that it depends on the tun(4) network interface on both ends of the connection for layer 2 or layer 3 tunneling. This diff also adds support for LocalCommand in the ssh(1) client. ok djm@, markus@, jmc@ (manpages), tested and discussed with others
* no need to escape single quotes in comments, no binary changedjm2005-10-301-2/+2
|
* free()->xfree(); ok djm@stevesk2005-10-141-4/+4
|
* fix regression I introduced in 4.2: X11 forwardings initiated afterdjm2005-10-101-2/+2
| | | | | a session has exited (e.g. "(sleep 5; xterm) &") would not start. bz #1086 reported by t8m AT centrum.cz; ok markus@ dtucker@
* typo; from mark at mcs.vuw.ac.nz, bug #1082markus2005-09-091-2/+2
|
* spacingdjm2005-07-161-2/+2
|
* implement support for X11 and agent forwarding over multiplex slavedjm2005-07-041-6/+29
| | | | | | | | connections. Because of protocol limitations, the slave connections inherit the master's DISPLAY and SSH_AUTH_SOCK rather than distinctly forwarding their own. ok dtucker@ "put it in" deraadt@
* make this -Wsign-compare clean; ok avsm@ markus@djm2005-06-171-4/+7
|
* move x11_get_proto from ssh.c to clientloop.c, to make muliplexed xfwd easierdjm2005-06-161-1/+104
| | | | later; ok deraadt@
* add ControlMaster=auto/autoask options to support opportunistic multiplexing;djm2005-06-081-3/+5
| | | | tested avsm@ and jakob@, ok markus@
* spacingderaadt2005-03-101-2/+2
|
* bz#413: allow optional specification of bind address for port forwardings.djm2005-03-011-24/+25
| | | | | | | | Patch originally by Dan Astorian, but worked on by several people Adds GatewayPorts=clientspecified option on server to allow remote forwards to bind to client-specified ports. ok markus@
* add basic control of a running multiplex master connection; including thedjm2004-11-071-15/+71
| | | | ability to check its status and request it to exit; ok markus@
* factor out common permission-asking code to separate function; ok markus@djm2004-10-291-19/+4
|
* fix some window size change bugs for multiplexed connections: windows sizesdjm2004-10-291-17/+10
| | | | | | were not being updated if they had changed after ~^Z suspends and SIGWINCH was not being processed unless the first connection had requested a tty; ok markus
* cleanup multiplex control socket on SIGHUP too, spotted by sturm@djm2004-09-071-1/+3
| | | | ok markus@ deraadt@
* some signed/unsigned int comparison cleanups; markus@ okavsm2004-08-111-3/+4
|
* spacesderaadt2004-07-111-9/+9
|
* clientloop.cdjm2004-06-181-4/+5
|
* Add option for confirmation (ControlMaster=ask) via ssh-askpass before openingdjm2004-06-171-4/+34
| | | | shared connections; ok markus@
* support environment passing over shared connections; ok markus@djm2004-06-171-11/+27
|
* missed one unset_nonblock; spotted by Tim Ricedjm2004-06-151-2/+2
|
* set_nonblock() instead of fnctl(...,O_NONBLOCK); "looks sane" deraadt@djm2004-06-141-2/+2
|
* implement session multiplexing in the client (the server has supported thisdjm2004-06-131-23/+304
| | | | since 2.0); ok markus@
* use '-h' for help in ~C commandline instead of '-?'; inspired by jmc@djm2004-05-221-2/+2
|
* bz #756: add support for the cancel-tcpip-forward request for the server anddjm2004-05-211-25/+59
| | | | | the client (through the ~C commandline). reported by z3p AT twistedmatrix.com; ok markus@
* Trivial type fix 0 -> '\0'; ok markus@dtucker2004-05-201-2/+2
|
* kill a tiny header; ok deraadt@djm2004-05-081-2/+1
|
* make two tiny header files go away; djm okderaadt2004-05-081-2/+2
|
* application layer keep alive (ServerAliveInterval ServerAliveCountMax)markus2003-12-161-8/+37
| | | | | for ssh(1), similar to the sshd(8) option; ok beck@; with help from jmc and dtucker@
* Clear exit code when ssh -N is terminated with a SIGTERM. ok markus@dtucker2003-12-091-1/+14
|
* move client only agent code to clientloop.cmarkus2003-09-231-2/+42
|
* replace fatal_cleanup() and linked list of fatal callbacks with staticmarkus2003-09-231-8/+3
| | | | | | cleanup_exit() function. re-refine cleanup_exit() where appropriate, allocate sshd's authctxt eary to allow simpler cleanup in sshd. tested by many, ok deraadt@
* remove fatal callbacks from client code; ok deraadtmarkus2003-09-191-9/+17
|
* deal with typing of write vs read in atomicioderaadt2003-06-281-3/+3
|
* allow to send a BREAK to the remote system; ok variousmarkus2003-05-141-2/+16
|
* make channel_new() strdup the 'remote_name' (not the caller); ok theomarkus2003-05-111-5/+4
|