Displaying 11 results from an estimated 11 matches for "process_escapes".
2017 Mar 04
0
[PATCH] rescue: Implement escape sequences.
...break;
+
case 'i':
OPTION_i;
break;
@@ -463,6 +484,9 @@ log_message_callback (guestfs_h *g, void *opaque, uint64_t event,
static char rbuf[BUFSIZE]; /* appliance -> local tty */
static char wbuf[BUFSIZE]; /* local tty -> appliance */
+static bool process_escapes (char *buf, size_t *len);
+static void print_escape_key (void);
+
static void
do_rescue (int sock)
{
@@ -524,6 +548,13 @@ do_rescue (int sock)
}
if (n > 0)
wlen += n;
+
+ /* Process escape sequences in the tty input. If the function
+ * returns true, then we...
2002 Feb 04
1
forkoff()
Please review the function below, forkoff(), meant to be used in
clientloop.c instead of daemon() and the code in process_escapes().
The intention is to make ~D ( like ~& but also detach) possible and to
make it possible for ssh -f (or ssh -f -f - see other thread on this)
to detach, not just forkoff().
I also intend to use the same detach technique in a feature patch for
the hang-on-exit behaviour that's been hashe...
2015 Oct 12
13
[Bug 2478] New: Escape sequences (starting with ~) don't work when remote shell is BusyBox ash
https://bugzilla.mindrot.org/show_bug.cgi?id=2478
Bug ID: 2478
Summary: Escape sequences (starting with ~) don't work when
remote shell is BusyBox ash
Product: Portable OpenSSH
Version: 7.1p1
Hardware: ix86
OS: Linux
Status: NEW
Severity: minor
Priority: P5
2001 Sep 20
1
Patch to allow local port forwarding from an existing connection
...d_port, buf, fwd_host_port);
+
+ msg = "Forwarding port";
+ out:
+ signal(SIGINT, handler);
+ enter_raw_mode();
+ if (msg) {
+ snprintf(string, sizeof string, "%s\r\n", msg);
+ buffer_append(berr, string, strlen(string));
+ }
+}
+
/* process the characters one by one */
int
process_escapes(Buffer *bin, Buffer *bout, Buffer *berr, char *buf, int len)
@@ -570,6 +640,7 @@
~^Z - suspend ssh\r\n\
~# - list forwarded connections\r\n\
~& - background ssh (when waiting for connections to terminate)\r\n\
+~c - open a command line\r\n
~? - this message\r\n\
~~ - send the escape c...
2009 Jan 06
3
[Bug 1548] New: Double free in OpenSSH clientloop.c/xmalloc.c via cmdline port forwarding
...b9e248 in abort () from /lib/tls/i686/cmov/libc.so.6
#3 0xb7bda10d in ?? () from /lib/tls/i686/cmov/libc.so.6
#4 0xb7be03f4 in ?? () from /lib/tls/i686/cmov/libc.so.6
#5 0xb7be2456 in free () from /lib/tls/i686/cmov/libc.so.6
#6 0xb7fda321 in xfree (ptr=0x0) at ../xmalloc.c:81
#7 0xb7fb9bcb in process_escapes (c=0xb8235240, bin=0xb8235280,
bout=0xb8235290
, berr=0xb82352a0, buf=0xbf9efda8 "C", len=1) at ../clientloop.c:882
#8 0xb7fba94d in client_simple_escape_filter (c=0x651c, buf=0xbf9efda8
"C", len
=1) at ../clientloop.c:1281
#9 0xb7fcc965 in channel_handle_rfd (c=0xb8235240, re...
2010 Jan 14
1
ssh(1) multiplexing rewrite
...NEL_SUCCESS) {
debug2("%s request accepted on channel %d",
@@ -830,6 +827,7 @@ process_cmdline(void)
while (isspace(*++s))
;
+ /* XXX update list of forwards in options */
if (delete) {
cancel_port = 0;
cancel_host = hpdelim(&s); /* may be NULL */
@@ -927,7 +925,7 @@ process_escapes(Channel *c, Buffer *bin,
escape_char);
buffer_append(berr, string, strlen(string));
- if (c && c->ctl_fd != -1) {
+ if (c && c->ctl_chan != -1) {
chan_read_failed(c);
chan_write_failed(c);
return 0;
@@ -937,7 +935,7 @@ process_escapes(Ch...
2017 Mar 04
7
[PATCH v3] Fix virt-rescue.
Version 3:
- Tidies up the code further.
- Implements correct handling of SIGTSTP and SIGCONT.
- Adds: ^] s - sync filesystems
- Adds: ^] z - suspend virt-rescue
Rich.
2019 Mar 29
2
Call for testing: OpenSSH 8.0
...lean: want reply */
(r = sshpkt_send(ssh)) != 0)
- fatal("%s: %s", __func__, ssh_err(r));
+ fatal("%s: send packet: %s", __func__, ssh_err(r));
/* Insert an empty placeholder to maintain ordering */
client_register_global_confirm(NULL, NULL);
}
@@ -1035,7 +1035,7 @@ process_escapes(struct ssh *ssh, Channel *c,
channel_request_start(ssh, c->self, "break", 0);
if ((r = sshpkt_put_u32(ssh, 1000)) != 0 ||
(r = sshpkt_send(ssh)) != 0)
- fatal("%s: %s", __func__,
+ fatal("%s: send packet: %s", __func__,
ssh_err(r...
2020 Mar 24
4
ZSTD compression support for OpenSSH
I hacked zstd support into OpenSSH a while ago and just started to clean
it up in the recent days. The cleanup includes configuration support
among other things that I did not have.
During testing I noticed the following differences compared to zlib:
- highly interactive shell output (as in refreshed at a _very_ high
rate) may result in higher bandwidth compared to zlib. Since zstd is
quicker
2020 Sep 05
8
[PATCH 0/5] ZSTD compression support for OpenSSH
I added ZSTD support to OpenSSH roughly over a year and I've been
playing with it ever since.
The nice part is that ZSTD achieves reasonable compression (like zlib)
but consumes little CPU so it is unlikely that compression becomes the
bottle neck of a transfer. The compression overhead (CPU) is negligible
even when uncompressed data is tunneled over the SSH connection (SOCKS
proxy, port
2019 Mar 27
26
Call for testing: OpenSSH 8.0
Hi,
OpenSSH 8.0p1 is almost ready for release, so we would appreciate testing
on as many platforms and systems as possible.
Snapshot releases for portable OpenSSH are available from
http://www.mindrot.org/openssh_snap/
The OpenBSD version is available in CVS HEAD:
http://www.openbsd.org/anoncvs.html
Portable OpenSSH is also available via git using the
instructions at