Commit 6d5e0964 authored by Niels Möller's avatar Niels Möller

*** empty log message ***

Rev: ChangeLog:1.75
Rev: NEWS:1.17
Rev: configure.in:1.15
Rev: doc/TODO:1.46
Rev: src/tcpforward.c:1.10
parent 18dacb72
Wen May 12 21:35:22 1999 Niels Möller <nisse@lysator.liu.se>
* Configure tests for strerror and strsignal.
Tue May 11 20:22:05 1999 Niels Möller <nisse@lysator.liu.se>
* src/sexp_test.c (main): Create the fd objects properly (old
......
News for the lsh-0.1 release
Added compiler.scm to the dist.
Changed the session key generation to comply with the latest
draft (pointed out by Joseph Galbraith).
Added IDEA support (Bazsi).
Fixes to pty handling and flow control (mostly Bazsi).
Fixed the client side handling of userauth failures.
By default, if we are running with a pty, use the same fd for
stdout and stderr. This workaround should make lsh more
friendly to bash and other programs that expect stderr to be a
tty.
NEWS for the 1999-04-25 snapshot:
Fixed a few bugs in pty and eof handling. Should now work
......
......@@ -4,9 +4,10 @@ dnl $Id$
dnl Process this file with autoconf to produce a configure script.
AC_INIT(src/lsh_types.h)
AM_INIT_AUTOMAKE(lsh, 0.1)
dnl No real versioning yet, use dated snapshots instead.
dnl AM_INIT_AUTOMAKE(lsh, snapshot-`date +%Y-%m-%d`)
AM_INIT_AUTOMAKE(lsh, esyscmd([date +snapshot-%Y-%m-%d]))
dnl AM_INIT_AUTOMAKE(lsh, esyscmd([date +snapshot-%Y-%m-%d]))
AM_CONFIG_HEADER(config.h)
......
......@@ -244,3 +244,11 @@ such device).
Add some workaround for the poll()-bug in linux/glibc-2.07 reported by
Bazsi.
Implement some limit on the amount of data that may be buffered for
write on a connection. When the limit is exceeded, the connection
should be dropped. The problem: if a client connects and sends a lot
of packets, without ever reading anything from its socket, the server
will eventually run out of memory.
Make sure tty modes are restored on exit.
......@@ -308,9 +308,9 @@ make_forwarded_tcpip(struct lsh_string *bind_host,
*/
static int do_tcpip_forward_request(struct global_request *c,
struct ssh_connection *connection,
int want_reply UNUSED,
struct simple_buffer *args)
struct ssh_connection *connection,
int want_reply UNUSED,
struct simple_buffer *args)
{
CAST(tcpip_forward_request, self, c);
UINT8 *bind_host;
......@@ -416,4 +416,15 @@ struct global_request *make_cancel_tcpip_forward_request(void)
self->handler = do_cancel_tcpip_forward;
return self;
}
/* GABA:
(expr
(name make_forward_connect)
(params
(connect object command)
(start_io object command))
(expr
(lambda (port) (start_io (connect port)))))
*/
#endif /* 0 */
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment