Displaying 2 results from an estimated 2 matches for "ssh2_open_administratively_prohibited".
2000 Aug 15
0
Experimental -R support patch for openssh client
...quot;x11") == 0) {
+ c = client_forwarded_x11_request( ctype, rchan, rwindow, rmaxpack );
+ }
+ */
+
if (strcmp(ctype, "x11") == 0) {
int sock;
char *originator;
@@ -1015,7 +1025,7 @@
packet_start(SSH2_MSG_CHANNEL_OPEN_FAILURE);
packet_put_int(rchan);
packet_put_int(SSH2_OPEN_ADMINISTRATIVELY_PROHIBITED);
- packet_put_cstring("bla bla");
+ packet_put_cstring("bla bla"); /* TODO: Shouldn't we send a reason ?*/
packet_put_cstring("");
packet_send();
}
diff -u -r openssh-2.1.1p4/ssh.c openssh-2.1.1p4-jhchanges/ssh.c
--- openssh-2.1.1p4/ssh.c Sat Jul 15 07:1...
2000 Aug 23
1
Protocol 2 remote forwarding patch
...arded-tcpip") == 0) {
+ c = client_forwarded_tcpip_request( ctype, rchan, rwindow, rmaxpack );
+ }
+
if (strcmp(ctype, "x11") == 0) {
int sock;
char *originator;
@@ -1015,7 +1021,8 @@
packet_start(SSH2_MSG_CHANNEL_OPEN_FAILURE);
packet_put_int(rchan);
packet_put_int(SSH2_OPEN_ADMINISTRATIVELY_PROHIBITED);
- packet_put_cstring("bla bla");
+ packet_put_cstring("bla bla"); /* TODO: Perhaps a little better
+ explanation */
packet_put_cstring("");
packet_send();
}
@@ -1045,7 +1052,7 @@
dispatch_set(SSH_MSG_CHANNEL_DATA, &channel_input_dat...