diff options
author | Damien Miller <djm@mindrot.org> | 2000-05-09 11:02:59 +1000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2000-05-09 11:02:59 +1000 |
commit | 30c3d429306bb4afe71c18db92816b981f7b6d9d (patch) | |
tree | a65f45e0073cb55ad42957a36b4636ff21405108 /channels.c | |
parent | 61e50f10c276009bf9472fdd797bf6be60fc2a83 (diff) |
- OpenBSD CVS update
- markus@cvs.openbsd.org
[cipher.h myproposal.h readconf.c readconf.h servconf.c ssh.1 ssh.c]
[ssh.h sshconnect1.c sshconnect2.c sshd.8]
- complain about invalid ciphers in SSH1 (e.g. arcfour is SSH2 only)
- hugh@cvs.openbsd.org
[ssh.1]
- zap typo
[ssh-keygen.1]
- One last nit fix. (markus approved)
[sshd.8]
- some markus certified spelling adjustments
- markus@cvs.openbsd.org
[auth2.c channels.c clientloop.c compat compat.h dsa.c kex.c]
[sshconnect2.c ]
- bug compat w/ ssh-2.0.13 x11, split out bugs
[nchan.c]
- no drain if ibuf_empty, fixes x11fwd problems; tests by fries@
[ssh-keygen.c]
- handle escapes in real and original key format, ok millert@
[version.h]
- OpenSSH-2.1
Diffstat (limited to 'channels.c')
-rw-r--r-- | channels.c | 13 |
1 files changed, 10 insertions, 3 deletions
diff --git a/channels.c b/channels.c index f833e1bb9..a18c7e300 100644 --- a/channels.c +++ b/channels.c | |||
@@ -17,7 +17,7 @@ | |||
17 | */ | 17 | */ |
18 | 18 | ||
19 | #include "includes.h" | 19 | #include "includes.h" |
20 | RCSID("$Id: channels.c,v 1.29 2000/05/07 02:03:15 damien Exp $"); | 20 | RCSID("$Id: channels.c,v 1.30 2000/05/09 01:02:59 damien Exp $"); |
21 | 21 | ||
22 | #include "ssh.h" | 22 | #include "ssh.h" |
23 | #include "packet.h" | 23 | #include "packet.h" |
@@ -505,7 +505,10 @@ channel_pre_x11_open(Channel *c, fd_set * readset, fd_set * writeset) | |||
505 | int ret = x11_open_helper(c); | 505 | int ret = x11_open_helper(c); |
506 | if (ret == 1) { | 506 | if (ret == 1) { |
507 | c->type = SSH_CHANNEL_OPEN; | 507 | c->type = SSH_CHANNEL_OPEN; |
508 | channel_pre_open_15(c, readset, writeset); | 508 | if (compat20) |
509 | channel_pre_open_20(c, readset, writeset); | ||
510 | else | ||
511 | channel_pre_open_15(c, readset, writeset); | ||
509 | } else if (ret == -1) { | 512 | } else if (ret == -1) { |
510 | debug("X11 rejected %d i%d/o%d", c->self, c->istate, c->ostate); | 513 | debug("X11 rejected %d i%d/o%d", c->self, c->istate, c->ostate); |
511 | chan_read_failed(c); /** force close? */ | 514 | chan_read_failed(c); /** force close? */ |
@@ -549,7 +552,11 @@ channel_post_x11_listener(Channel *c, fd_set * readset, fd_set * writeset) | |||
549 | packet_put_int(c->local_maxpacket); | 552 | packet_put_int(c->local_maxpacket); |
550 | /* originator host and port */ | 553 | /* originator host and port */ |
551 | packet_put_cstring(remote_hostname); | 554 | packet_put_cstring(remote_hostname); |
552 | packet_put_int(remote_port); | 555 | if (datafellows & SSH_BUG_X11FWD) { |
556 | debug("ssh2 x11 bug compat mode"); | ||
557 | } else { | ||
558 | packet_put_int(remote_port); | ||
559 | } | ||
553 | packet_send(); | 560 | packet_send(); |
554 | } else { | 561 | } else { |
555 | packet_start(SSH_SMSG_X11_OPEN); | 562 | packet_start(SSH_SMSG_X11_OPEN); |