diff options
author | Damien Miller <djm@mindrot.org> | 2001-12-21 15:00:19 +1100 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2001-12-21 15:00:19 +1100 |
commit | 278f907a2d6d00d6f52a11bf9577648aadbf0994 (patch) | |
tree | 50f885a7fd73b813754e3b675e810dc01ba78b78 /clientloop.c | |
parent | e737856350287104a12f5a97c81fad1f7bcd7096 (diff) |
- djm@cvs.openbsd.org 2001/12/20 22:50:24
[auth2.c auth2-chall.c channels.c channels.h clientloop.c dispatch.c]
[dispatch.h kex.c kex.h packet.c packet.h serverloop.c ssh.c]
[sshconnect2.c]
Conformance fix: we should send failing packet sequence number when
responding with a SSH_MSG_UNIMPLEMENTED message. Spotted by
yakk@yakk.dot.net; ok markus@
Diffstat (limited to 'clientloop.c')
-rw-r--r-- | clientloop.c | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/clientloop.c b/clientloop.c index 84484604d..9e4f247c6 100644 --- a/clientloop.c +++ b/clientloop.c | |||
@@ -59,7 +59,7 @@ | |||
59 | */ | 59 | */ |
60 | 60 | ||
61 | #include "includes.h" | 61 | #include "includes.h" |
62 | RCSID("$OpenBSD: clientloop.c,v 1.90 2001/12/19 07:18:56 deraadt Exp $"); | 62 | RCSID("$OpenBSD: clientloop.c,v 1.91 2001/12/20 22:50:24 djm Exp $"); |
63 | 63 | ||
64 | #include "ssh.h" | 64 | #include "ssh.h" |
65 | #include "ssh1.h" | 65 | #include "ssh1.h" |
@@ -1008,7 +1008,7 @@ client_loop(int have_pty, int escape_char_arg, int ssh2_chan_id) | |||
1008 | /*********/ | 1008 | /*********/ |
1009 | 1009 | ||
1010 | static void | 1010 | static void |
1011 | client_input_stdout_data(int type, int plen, void *ctxt) | 1011 | client_input_stdout_data(int type, int plen, u_int32_t seq, void *ctxt) |
1012 | { | 1012 | { |
1013 | u_int data_len; | 1013 | u_int data_len; |
1014 | char *data = packet_get_string(&data_len); | 1014 | char *data = packet_get_string(&data_len); |
@@ -1018,7 +1018,7 @@ client_input_stdout_data(int type, int plen, void *ctxt) | |||
1018 | xfree(data); | 1018 | xfree(data); |
1019 | } | 1019 | } |
1020 | static void | 1020 | static void |
1021 | client_input_stderr_data(int type, int plen, void *ctxt) | 1021 | client_input_stderr_data(int type, int plen, u_int32_t seq, void *ctxt) |
1022 | { | 1022 | { |
1023 | u_int data_len; | 1023 | u_int data_len; |
1024 | char *data = packet_get_string(&data_len); | 1024 | char *data = packet_get_string(&data_len); |
@@ -1028,7 +1028,7 @@ client_input_stderr_data(int type, int plen, void *ctxt) | |||
1028 | xfree(data); | 1028 | xfree(data); |
1029 | } | 1029 | } |
1030 | static void | 1030 | static void |
1031 | client_input_exit_status(int type, int plen, void *ctxt) | 1031 | client_input_exit_status(int type, int plen, u_int32_t seq, void *ctxt) |
1032 | { | 1032 | { |
1033 | packet_integrity_check(plen, 4, type); | 1033 | packet_integrity_check(plen, 4, type); |
1034 | exit_status = packet_get_int(); | 1034 | exit_status = packet_get_int(); |
@@ -1149,7 +1149,7 @@ client_request_agent(const char *request_type, int rchan) | |||
1149 | 1149 | ||
1150 | /* XXXX move to generic input handler */ | 1150 | /* XXXX move to generic input handler */ |
1151 | static void | 1151 | static void |
1152 | client_input_channel_open(int type, int plen, void *ctxt) | 1152 | client_input_channel_open(int type, int plen, u_int32_t seq, void *ctxt) |
1153 | { | 1153 | { |
1154 | Channel *c = NULL; | 1154 | Channel *c = NULL; |
1155 | char *ctype; | 1155 | char *ctype; |
@@ -1201,7 +1201,7 @@ client_input_channel_open(int type, int plen, void *ctxt) | |||
1201 | xfree(ctype); | 1201 | xfree(ctype); |
1202 | } | 1202 | } |
1203 | static void | 1203 | static void |
1204 | client_input_channel_req(int type, int plen, void *ctxt) | 1204 | client_input_channel_req(int type, int plen, u_int32_t seq, void *ctxt) |
1205 | { | 1205 | { |
1206 | Channel *c = NULL; | 1206 | Channel *c = NULL; |
1207 | int id, reply, success = 0; | 1207 | int id, reply, success = 0; |