search for: connect_host

Displaying 14 results from an estimated 14 matches for "connect_host".

2012 May 03
5
[PATCH/RFC 0/6] New mux client request to list open tcp forwardings.
These patches implement a new mux client request to list the currently opened TCP forwardings. It also removes some todos regarding keeping the list of forwardings in the options up-to-date. Bert Wesarg (6): attach the forwarding type to struct Forward merge local and remote forward lists generate unique ids for forwardings to be used for identification remove closed forwardings from
2007 Oct 22
15
[Bug 1380] New: incorrect check for strlen(fwd->connect_host) in parse_forward()
https://bugzilla.mindrot.org/show_bug.cgi?id=1380 Summary: incorrect check for strlen(fwd->connect_host) in parse_forward() Classification: Unclassified Product: Portable OpenSSH Version: 4.7p1 Platform: All OS/Version: All Status: NEW Severity: normal Priority: P3 Component: ssh AssignedT...
2002 Jul 17
2
[Patch] SSH through HTTP proxy using CONNECT
...ssh/sshconnect.c src/sshconnect.c --- /usr/src/crypto/openssh/sshconnect.c Thu Sep 27 18:33:35 2001 +++ src/sshconnect.c Wed Jul 17 16:14:44 2002 @@ -198,7 +198,9 @@ int gaierr; int on = 1; int sock = -1, attempt; + int connect_port; char ntop[NI_MAXHOST], strport[NI_MAXSERV]; + const char *connect_host; struct addrinfo hints, *ai, *aitop; struct linger linger; struct servent *sp; @@ -218,14 +220,21 @@ if (proxy_command != NULL) return ssh_proxy_connect(host, port, pw, proxy_command); - /* No proxy command. */ + /* If an HTTP proxy is given, connect to it first. */ + if (options.proxy...
2010 Jan 14
1
ssh(1) multiplexing rewrite
...ER_NO: + switch (ftype) { + case MUX_FWD_LOCAL: + xasprintf(&ret, "local forward %.200s:%d -> %.200s:%d", + (fwd->listen_host == NULL) ? + (options.gateway_ports ? "*" : "LOCALHOST") : + fwd->listen_host, fwd->listen_port, + fwd->connect_host, fwd->connect_port); + break; + case MUX_FWD_DYNAMIC: + xasprintf(&ret, "dynamic forward %.200s:%d -> *", + (fwd->listen_host == NULL) ? + (options.gateway_ports ? "*" : "LOCALHOST") : + fwd->listen_host, fwd->listen_port); + break...
2007 Oct 22
3
[Bug 1379] New: memory leak in process_cmdline()
...Priority: P3 Component: ssh AssignedTo: bitbucket at mindrot.org ReportedBy: Jan.Pechanec at Sun.COM Created an attachment (id=1366) --> (http://bugzilla.mindrot.org/attachment.cgi?id=1366) fix for the bug if anything goes wrong and Fwd was filled then listen_host/connect_host are not freed. patch attached. -- Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching the assignee of the bug.
2015 May 30
2
FWD: enable forwarding to remote named sockets in ssh
...======== RCS file: /cvs/src/usr.bin/ssh/channels.c,v retrieving revision 1.336 diff -u -p -r1.336 channels.c --- channels.c 15 Jul 2014 15:54:14 -0000 1.336 +++ channels.c 8 Aug 2014 20:31:29 -0000 @@ -2771,13 +2770,18 @@ channel_setup_fwd_listener_tcpip(int typ fwd->listen_host : fwd->connect_host; is_client = (type == SSH_CHANNEL_PORT_LISTENER); - if (host == NULL) { - error("No forward host name."); - return 0; - } - if (strlen(host) >= NI_MAXHOST) { - error("Forward host name too long."); - return 0; + if (type == SSH_CHANNEL_PORT_LISTENER && + f...
2011 Dec 30
7
[Bug 1967] New: Potential memory leak
https://bugzilla.mindrot.org/show_bug.cgi?id=1967 Bug #: 1967 Summary: Potential memory leak Classification: Unclassified Product: Portable OpenSSH Version: 5.9p1 Platform: All OS/Version: All Status: NEW Severity: normal Priority: P2 Component: ssh AssignedTo: unassigned-bugs at
2008 Nov 23
4
[Bug 1539] New: double-free when failing to parse a forwarding specification given using ~C
...ls Arthur de Jong reported that ssh can be made to crash with a double-free as follows: % ssh somehost [...] % ~C ssh> -L *.80:localhost:80 Bad forwarding specification. *** glibc detected *** ssh: double free or corruption (fasttop): 0xb95431b0 *** This is because parse_forward frees fwd->connect_host and fwd->listen_host but doesn't set them to NULL, and so process_cmdline tries to free them again. Patch attached. -- Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching the assignee of the bug.
2017 Jun 16
2
[PATCH] allow relative path in streamlocal forwarding
...t before bind */ + char *streamlocal_bind_root_directory; }; /* misc.c */ diff --git a/readconf.c b/readconf.c index b11c628..13ab320 100644 --- a/readconf.c +++ b/readconf.c @@ -2234,6 +2234,22 @@ parse_forward(struct Forward *fwd, const char *fwdspec, int dynamicfwd, int remo if (fwd->connect_host != NULL && strlen(fwd->connect_host) >= NI_MAXHOST) goto fail_free; + /* The path starting with "./" means that it will be resolved + * on the server side */ + if (!dynamicfwd) { + if (!remotefwd && fwd->connect_path != NULL && + strncmp(fw...
2019 Jun 07
1
Problem with opusfile & ndk
Hi Xiph.org Team. We are using opusfile library <https://github.com/xiph/opusfile> for streaming *.opus* audio in our projects. But now we have a problem with building opusfile library for android with *ndk-build*. In particular, with arm64-v8a platform: Google removed <sys/timeb.h> from android. And now building opusfile with nkd-build crashes with error "fatal error:
2011 Jan 07
1
[RFC/PATCH] ssh: config directive to modify the local environment
...len == 0) + return 0; + + mod->name = xstrdup(cp); + mod->value = xstrdup(eq); + + xfree(p); + + return 1; +} diff --git a/readconf.h b/readconf.h index ee160df..166631f 100644 --- a/readconf.h +++ b/readconf.h @@ -25,6 +25,13 @@ typedef struct { int connect_port; /* Port to connect on connect_host. */ int allocated_port; /* Dynamically allocated listen port */ } Forward; +/* Data structure for representing a local env modification. */ + +typedef struct { + char *name; /* The name of the variable. */ + int operation; /* The operation (\0 for set, other chars for append with thi...
2012 Dec 21
0
File Attachments for previous bug report
...TAILQ_REMOVE(&global_confirms, gc, entry); - bzero(gc, sizeof(*gc)); + memset(gc, 0, sizeof(*gc)); xfree(gc); } @@ -867,7 +867,7 @@ int cancel_port, ok; Forward fwd; - bzero(&fwd, sizeof(fwd)); + memset(&fwd, 0, sizeof(fwd)); fwd.listen_host = fwd.connect_host = NULL; leave_raw_mode(options.request_tty == REQUEST_TTY_FORCE); -------------- next part -------------- --- hostfile.c.orig 2012-12-19 17:19:15.393667218 -0800 +++ hostfile.c 2012-12-19 17:19:50.752556571 -0800 @@ -330,7 +330,7 @@ xfree(hostkeys->entries[i].host); xfree(hostkeys->...
2002 May 11
4
socks5 support
> Winton-- > > Excellent! Absolutely wonderful. > > I'm wondering which apps/encapsulators support 4A? This gets me > around > the DNS leakage problem quite nicely. > > Incidentally, we do need SOCKS5 support -- if for no other > reason, the > fact that there's *operating system* level support in OSX for SOCKS5 > redirection. So
2012 Dec 20
4
Deprecated calls to bzero() and index() found in OpenSSH 6.1p1
...bzero(gc, sizeof(*gc)); + memset(gc, 0, sizeof(*gc)); xfree(gc); } @@ -867,7 +867,7 @@ int cancel_port, ok; Forward fwd; - bzero(&fwd, sizeof(fwd)); + memset(&fwd, 0, sizeof(fwd)); fwd.listen_host = fwd.connect_host = NULL; leave_raw_mode(options.request_tty == REQUEST_TTY_FORCE); In file 'hostfile.c', I've replaced the bzero() call with the equivalent memset() call. The patch file is below in (diff -u) format: --- hostfile.c.orig 2012-12-19 17:19:15.393667218 -0800 +++ hostfile.c 2...