Commit 05943851 authored by Niels Möller's avatar Niels Möller

*** empty log message ***

Rev: NEWS:1.44
Rev: src/client.c:1.89
Rev: src/connection.h:1.44
Rev: src/connection_commands.c:1.23
Rev: src/tcpforward.c:1.41
Rev: src/tcpforward_commands.c:1.22
parent 43f8c83d
News for the 0.9.1 release
Support for remote commands directly on the lsh command line.
New options -S and -E. More features in the proxy.
News for the 0.2.9 release
Fixed bugs in the length checking of incoming packets.
......
......@@ -356,8 +356,8 @@ do_receive(struct ssh_channel *c,
/* We may send more data */
static void
do_send(struct ssh_channel *s,
struct ssh_connection *c UNUSED)
do_send_adjust(struct ssh_channel *s,
UINT32 i UNUSED)
{
CAST(client_session, self, s);
......@@ -399,12 +399,12 @@ do_client_io(struct command *s UNUSED,
HANDLER_CONTEXT);
/* Set up the fd we read from. */
channel->send = do_send;
channel->send_adjust = do_send_adjust;
session->in->read = make_channel_read_data(channel);
/* FIXME: Perhaps there is some way to arrange that channel.c calls
* the CHANNEL_SEND method instead? */
* the CHANNEL_SEND_ADJUST method instead? */
if (session->super.send_window_size)
session->in->want_read = 1;
......
......@@ -57,6 +57,7 @@
#define PEER_SERVICE_ACCEPT_KLUDGE 0x00000002
#define PEER_USERAUTH_REQUEST_KLUDGE 0x00000004
#define PEER_SEND_NO_DEBUG 0x00000008
#define PEER_X11_OPEN_KLUDGE 0x00000010
/* GABA:
(class
......@@ -77,6 +78,8 @@
; Features or bugs peculiar to the peer
(peer_flags simple UINT32)
; the chained connection in the proxy
(chain object ssh_connection)
; Cleanup
......
......@@ -183,7 +183,8 @@ do_line(struct line_handler **h,
{
connection->peer_flags
|= (PEER_SSH_DSS_KLUDGE | PEER_SERVICE_ACCEPT_KLUDGE
| PEER_USERAUTH_REQUEST_KLUDGE | PEER_SEND_NO_DEBUG);
| PEER_USERAUTH_REQUEST_KLUDGE | PEER_SEND_NO_DEBUG
| PEER_X11_OPEN_KLUDGE);
}
else if ( (swver_len >= 5) && !memcmp(swver, "2.1.0", 5) )
{
......
......@@ -133,8 +133,8 @@ do_tcpip_receive(struct ssh_channel *c,
}
static void
do_tcpip_send(struct ssh_channel *s,
struct ssh_connection *c UNUSED)
do_tcpip_send_adjust(struct ssh_channel *s,
UINT32 i UNUSED)
{
CAST(tcpip_channel, self, s);
......@@ -192,7 +192,7 @@ void tcpip_channel_start_io(struct ssh_channel *c)
CAST(tcpip_channel, channel, c);
channel->super.receive = do_tcpip_receive;
channel->super.send = do_tcpip_send;
channel->super.send_adjust = do_tcpip_send_adjust;
channel->super.eof = do_tcpip_eof;
/* Install callbacks on the local socket */
......@@ -287,6 +287,7 @@ static void
do_channel_open_direct_tcpip(struct channel_open *s,
struct ssh_connection *connection,
UINT32 channel_type UNUSED,
UINT32 max_packet UNUSED,
struct simple_buffer *args,
struct command_continuation *c,
struct exception_handler *e)
......@@ -567,6 +568,7 @@ static void
do_channel_open_forwarded_tcpip(struct channel_open *s UNUSED,
struct ssh_connection *connection,
UINT32 channel_type UNUSED,
UINT32 max_packet UNUSED,
struct simple_buffer *args,
struct command_continuation *c,
struct exception_handler *e)
......
......@@ -74,7 +74,7 @@ static struct catch_report_collect catch_channel_open
* the party receiving a open-tcp request, when a channel to the
* target has been opened. */
#define TCPIP_WINDOW_SIZE (SSH_MAX_PACKET << 3)
#define TCPIP_WINDOW_SIZE 10000
/* NOTE: This command does not do any remembering. */
static void
......
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment