Displaying 9 results from an estimated 9 matches for "process_cmdline".
2007 Oct 22
3
[Bug 1379] New: memory leak in process_cmdline()
https://bugzilla.mindrot.org/show_bug.cgi?id=1379
Summary: memory leak in process_cmdline()
Classification: Unclassified
Product: Portable OpenSSH
Version: 4.7p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P3
Component: ssh
AssignedTo: bitbucket at mindrot.org
Re...
2012 May 03
5
[PATCH/RFC 0/6] New mux client request to list open tcp forwardings.
These patches implement a new mux client request to list the currently opened
TCP forwardings. It also removes some todos regarding keeping the list
of forwardings in the options up-to-date.
Bert Wesarg (6):
attach the forwarding type to struct Forward
merge local and remote forward lists
generate unique ids for forwardings to be used for identification
remove closed forwardings from
2002 Aug 02
3
[Bug 377] New: Reduce compiler warnings. Use unsigned args to the ctype.h is*() macros.
...pping)
Index: clientloop.c
===================================================================
RCS file: /cvs/openssh/clientloop.c,v
retrieving revision 1.87
diff -u -p -r1.87 clientloop.c
--- clientloop.c 4 Jul 2002 00:14:18 -0000 1.87
+++ clientloop.c 2 Aug 2002 12:13:38 -0000
@@ -485,7 +485,7 @@ process_cmdline(void)
cmd = s = read_passphrase("\r\nssh> ", RP_ECHO);
if (s == NULL)
goto out;
-
while (*s && isspace(*s))
+
while (*s && isspace((unsigned)*s))
s++;
if (*s == 0)
goto out;
@@ -500,7 +500,7 @@ process_cmdline(void)
goto out;
}
s += 2;
-
while (*s...
2001 Sep 20
1
Patch to allow local port forwarding from an existing connection
...c Wed Sep 19 16:51:40 2001
@@ -67,6 +67,7 @@
#include "xmalloc.h"
#include "packet.h"
#include "buffer.h"
+#include "cli.h"
#include "compat.h"
#include "channels.h"
#include "dispatch.h"
@@ -465,6 +466,75 @@
}
}
+void
+process_cmdline(Buffer *bin, Buffer *bout, Buffer *berr)
+{
+ char string[1024];
+ void (*handler)(int);
+ char *s;
+ u_short fwd_port, fwd_host_port;
+ char buf[256];
+ int local = 0;
+ char *msg;
+ int n;
+
+ leave_raw_mode();
+ handler = signal(SIGINT, SIG_IGN);
+ fprintf(stderr, "\r\n> ");
+ s = f...
2008 Nov 23
4
[Bug 1539] New: double-free when failing to parse a forwarding specification given using ~C
...s follows:
% ssh somehost
[...]
% ~C
ssh> -L *.80:localhost:80
Bad forwarding specification.
*** glibc detected *** ssh: double free or corruption (fasttop):
0xb95431b0 ***
This is because parse_forward frees fwd->connect_host and
fwd->listen_host but doesn't set them to NULL, and so process_cmdline
tries to free them again. Patch attached.
--
Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching the assignee of the bug.
2008 Dec 02
5
[Bug 1543] New: ~C always opens command prompt on master session
https://bugzilla.mindrot.org/show_bug.cgi?id=1543
Summary: ~C always opens command prompt on master session
Product: Portable OpenSSH
Version: 5.1p1
Platform: All
URL: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=50754
1
OS/Version: Linux
Status: NEW
Severity: normal
Priority:
2008 Jun 19
5
Portforwarding using the control master.
Hi all,
currently I am considering writing a patch for OpenSSH that will allow
portforwarding using the control_master unix domain socket. The idea is
to introduce an extra SSHMUX command, SSHMUX_COMMAND_SOCKS, which will
then pass control to the normal socks functions used for dynamic
forwarding.
The main reason for me to write this patch are:
- some more control over who gets to connect to
2010 Aug 09
8
Call for testing: OpenSSH-5.6
Hi,
OpenSSH 5.6 is almost ready for release, so we would appreciate testing
on as many platforms and systems as possible. This is a moderately large
release, with a number of new features and bug fixes.
Snapshot releases for portable OpenSSH are available from
http://www.mindrot.org/openssh_snap/
The OpenBSD version is available in CVS HEAD:
http://www.openbsd.org/anoncvs.html
Portable OpenSSH
2010 Jan 14
1
ssh(1) multiplexing rewrite
...ROR &&
- c->ctl_fd != -1 && c->extended_usage == CHAN_EXTENDED_WRITE;
+ c->ctl_chan != -1 && c->extended_usage == CHAN_EXTENDED_WRITE;
if (type == SSH2_MSG_CHANNEL_SUCCESS) {
debug2("%s request accepted on channel %d",
@@ -830,6 +827,7 @@ process_cmdline(void)
while (isspace(*++s))
;
+ /* XXX update list of forwards in options */
if (delete) {
cancel_port = 0;
cancel_host = hpdelim(&s); /* may be NULL */
@@ -927,7 +925,7 @@ process_escapes(Channel *c, Buffer *bin,
escape_char);
buffer_append(berr, string, strlen(str...