search for: process_cmdline

Displaying 9 results from an estimated 9 matches for "process_cmdline".

2007 Oct 22
3
[Bug 1379] New: memory leak in process_cmdline()
https://bugzilla.mindrot.org/show_bug.cgi?id=1379 Summary: memory leak in process_cmdline() Classification: Unclassified Product: Portable OpenSSH Version: 4.7p1 Platform: All OS/Version: All Status: NEW Severity: normal Priority: P3 Component: ssh AssignedTo: bitbucket at mindrot.org Re...
2012 May 03
5
[PATCH/RFC 0/6] New mux client request to list open tcp forwardings.
These patches implement a new mux client request to list the currently opened TCP forwardings. It also removes some todos regarding keeping the list of forwardings in the options up-to-date. Bert Wesarg (6): attach the forwarding type to struct Forward merge local and remote forward lists generate unique ids for forwardings to be used for identification remove closed forwardings from
2002 Aug 02
3
[Bug 377] New: Reduce compiler warnings. Use unsigned args to the ctype.h is*() macros.
...pping) Index: clientloop.c =================================================================== RCS file: /cvs/openssh/clientloop.c,v retrieving revision 1.87 diff -u -p -r1.87 clientloop.c --- clientloop.c 4 Jul 2002 00:14:18 -0000 1.87 +++ clientloop.c 2 Aug 2002 12:13:38 -0000 @@ -485,7 +485,7 @@ process_cmdline(void) cmd = s = read_passphrase("\r\nssh> ", RP_ECHO); if (s == NULL) goto out; - while (*s && isspace(*s)) + while (*s && isspace((unsigned)*s)) s++; if (*s == 0) goto out; @@ -500,7 +500,7 @@ process_cmdline(void) goto out; } s += 2; - while (*s...
2001 Sep 20
1
Patch to allow local port forwarding from an existing connection
...c Wed Sep 19 16:51:40 2001 @@ -67,6 +67,7 @@ #include "xmalloc.h" #include "packet.h" #include "buffer.h" +#include "cli.h" #include "compat.h" #include "channels.h" #include "dispatch.h" @@ -465,6 +466,75 @@ } } +void +process_cmdline(Buffer *bin, Buffer *bout, Buffer *berr) +{ + char string[1024]; + void (*handler)(int); + char *s; + u_short fwd_port, fwd_host_port; + char buf[256]; + int local = 0; + char *msg; + int n; + + leave_raw_mode(); + handler = signal(SIGINT, SIG_IGN); + fprintf(stderr, "\r\n> "); + s = f...
2008 Nov 23
4
[Bug 1539] New: double-free when failing to parse a forwarding specification given using ~C
...s follows: % ssh somehost [...] % ~C ssh> -L *.80:localhost:80 Bad forwarding specification. *** glibc detected *** ssh: double free or corruption (fasttop): 0xb95431b0 *** This is because parse_forward frees fwd->connect_host and fwd->listen_host but doesn't set them to NULL, and so process_cmdline tries to free them again. Patch attached. -- Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching the assignee of the bug.
2008 Dec 02
5
[Bug 1543] New: ~C always opens command prompt on master session
https://bugzilla.mindrot.org/show_bug.cgi?id=1543 Summary: ~C always opens command prompt on master session Product: Portable OpenSSH Version: 5.1p1 Platform: All URL: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=50754 1 OS/Version: Linux Status: NEW Severity: normal Priority:
2008 Jun 19
5
Portforwarding using the control master.
Hi all, currently I am considering writing a patch for OpenSSH that will allow portforwarding using the control_master unix domain socket. The idea is to introduce an extra SSHMUX command, SSHMUX_COMMAND_SOCKS, which will then pass control to the normal socks functions used for dynamic forwarding. The main reason for me to write this patch are: - some more control over who gets to connect to
2010 Aug 09
8
Call for testing: OpenSSH-5.6
Hi, OpenSSH 5.6 is almost ready for release, so we would appreciate testing on as many platforms and systems as possible. This is a moderately large release, with a number of new features and bug fixes. Snapshot releases for portable OpenSSH are available from http://www.mindrot.org/openssh_snap/ The OpenBSD version is available in CVS HEAD: http://www.openbsd.org/anoncvs.html Portable OpenSSH
2010 Jan 14
1
ssh(1) multiplexing rewrite
...ROR && - c->ctl_fd != -1 && c->extended_usage == CHAN_EXTENDED_WRITE; + c->ctl_chan != -1 && c->extended_usage == CHAN_EXTENDED_WRITE; if (type == SSH2_MSG_CHANNEL_SUCCESS) { debug2("%s request accepted on channel %d", @@ -830,6 +827,7 @@ process_cmdline(void) while (isspace(*++s)) ; + /* XXX update list of forwards in options */ if (delete) { cancel_port = 0; cancel_host = hpdelim(&s); /* may be NULL */ @@ -927,7 +925,7 @@ process_escapes(Channel *c, Buffer *bin, escape_char); buffer_append(berr, string, strlen(str...