search for: u_short

Displaying 20 results from an estimated 106 matches for "u_short".

2004 Aug 05
1
LocalForward and RemoteForward bind patch
...16:02:09.000000000 -0800 +++ openssh-3.8p1-localbind/channels.c 2004-08-05 12:55:16.101830360 -0700 @@ -86,6 +86,7 @@ * network (which might be behind a firewall). */ typedef struct { + char *listen_host; /* Address to listen on */ char *host_to_connect; /* Connect to 'host'. */ u_short port_to_connect; /* Connect to 'port'. */ u_short listen_port; /* Remote side should listen port number. */ @@ -2146,8 +2147,7 @@ char ntop[NI_MAXHOST], strport[NI_MAXSERV]; success = 0; - host = (type == SSH_CHANNEL_RPORT_LISTENER) ? - listen_addr : host_to_connect; + host = h...
1997 Nov 14
0
Linux IP fragment overlap bug (fwd)
...GIC 0x3 /* Magic Fragment Constant (tm). Should be 2 or 3 */ #define COUNT 0x1 /* Linux dies with 1, NT is more stalwart and can * withstand maybe 5 or 10 sometimes... Experiment. */ void usage(u_char *); u_long name_resolve(u_char *); u_short in_cksum(u_short *, int); void send_frags(int, u_long, u_long, u_short, u_short); int main(int argc, char **argv) { int one = 1, count = 0, i, rip_sock; u_long src_ip = 0, dst_ip = 0; u_short src_prt = 0, dst_prt = 0; struct in_addr addr; fprintf(stderr, "teardrop rout...
2002 Jan 05
2
new feature w/ patch
...openssh-3.0.2p1/channels.c openssh-3.0.2p1-NewFeature/channels.c --- openssh-3.0.2p1/channels.c Thu Oct 11 20:35:05 2001 +++ openssh-3.0.2p1-NewFeature/channels.c Sat Jan 5 15:36:10 2002 @@ -2057,11 +2057,11 @@ * channel to host:port from remote side. */ int -channel_request_local_forwarding(u_short listen_port, const char *host_to_connect, - u_short port_to_connect, int gateway_ports) +channel_request_local_forwarding(const char *listen_host, u_short listen_port, + const char *host_to_connect, u_short port_to_connect, int gateway_ports) { return channel_request_forwarding( - NULL...
2005 Feb 22
0
TR: 3.8.1p1 option "permitopennet" added
....g: permitopenned="158.156.0.0/255.255.255.0:25[-1024]" + * note that part between [] is optionnal for 1 port specification + */ + cp = "permitopennet=\""; + if (strncasecmp(opts, cp, strlen(cp)) == 0) { + char netblock[256], netmask[256], + sporta[6], sportb[6]; + u_short porta, portb; + + char *patterns = xmalloc(strlen(opts) + 1); + netblock[0] = netmask[0] = sporta[0] = sportb[0] = 0; + porta = portb = 0; + + opts += strlen(cp); + i = 0; + while (*opts) { + if (*opts == '"') + break; + if (*opts == '\\' && opts[1...
2002 Apr 21
3
OpenSSH Security Advisory (adv.token)
...f -u -r1.24 bufaux.c --- bufaux.c 26 Mar 2002 15:23:40 -0000 1.24 +++ bufaux.c 19 Apr 2002 12:55:29 -0000 @@ -137,10 +137,18 @@ BN_bin2bn(bin, len, value); xfree(bin); } - /* - * Returns an integer from the buffer (4 bytes, msb first). + * Returns integers from the buffer (msb first). */ + +u_short +buffer_get_short(Buffer *buffer) +{ + u_char buf[2]; + buffer_get(buffer, (char *) buf, 2); + return GET_16BIT(buf); +} + u_int buffer_get_int(Buffer *buffer) { @@ -158,8 +166,16 @@ } /* - * Stores an integer in the buffer in 4 bytes, msb first. + * Stores integers in the buffer, msb first....
2002 Apr 21
3
OpenSSH Security Advisory (adv.token)
...f -u -r1.24 bufaux.c --- bufaux.c 26 Mar 2002 15:23:40 -0000 1.24 +++ bufaux.c 19 Apr 2002 12:55:29 -0000 @@ -137,10 +137,18 @@ BN_bin2bn(bin, len, value); xfree(bin); } - /* - * Returns an integer from the buffer (4 bytes, msb first). + * Returns integers from the buffer (msb first). */ + +u_short +buffer_get_short(Buffer *buffer) +{ + u_char buf[2]; + buffer_get(buffer, (char *) buf, 2); + return GET_16BIT(buf); +} + u_int buffer_get_int(Buffer *buffer) { @@ -158,8 +166,16 @@ } /* - * Stores an integer in the buffer in 4 bytes, msb first. + * Stores integers in the buffer, msb first....
2009 Feb 17
2
Idea: reverse socks proxy
Hi, Just a usecase that I'm sure has been covered before but just in case its not an openssh solution would be very helpful. I was trying to install software on a server that was firewalled so no outbound http connections would work. I was also tunnelling via another server. Outbound ssh connections also were a convenient option. What would have been nice would be a remote version of
2002 Nov 17
0
[PATCH] Patches to rsync-2.5.5 for Stratus VOS (update)
...urp --new-file oldrsync/lib/getaddrinfo.c newrsync/lib/getaddrinfo.c --- oldrsync/lib/getaddrinfo.c Tue Aug 27 11:05:47 2002 +++ newrsync/lib/getaddrinfo.c Tue Aug 27 15:46:48 2002 @@ -73,9 +73,9 @@ static const char in6_loopback[] = { }; struct sockinet { - u_char si_len; - u_char si_family; - u_short si_port; + uchar_t si_len; + uchar_t si_family; + ushort_t si_port; }; static struct afd { @@ -223,7 +223,7 @@ getaddrinfo(hostname, servname, hints, r char pton[PTON_MAX]; struct addrinfo ai; struct addrinfo *pai; - u_short port; + ushort_t port; #ifdef FAITH static int firsttime =...
2002 Sep 06
0
[PATCH] Patches to rsync-2.5.5 for Stratus VOS
...urp --new-file oldrsync/lib/getaddrinfo.c newrsync/lib/getaddrinfo.c --- oldrsync/lib/getaddrinfo.c Tue Aug 27 11:05:47 2002 +++ newrsync/lib/getaddrinfo.c Tue Aug 27 15:46:48 2002 @@ -73,9 +73,9 @@ static const char in6_loopback[] = { }; struct sockinet { - u_char si_len; - u_char si_family; - u_short si_port; + uchar_t si_len; + uchar_t si_family; + ushort_t si_port; }; static struct afd { @@ -223,7 +223,7 @@ getaddrinfo(hostname, servname, hints, r char pton[PTON_MAX]; struct addrinfo ai; struct addrinfo *pai; - u_short port; + ushort_t port; #ifdef FAITH static int firsttime =...
2001 Feb 10
3
Protocol 2 remote forwarding patch
...ntinue; @@ -1414,6 +1514,7 @@ case SSH_CHANNEL_FREE: case SSH_CHANNEL_X11_LISTENER: case SSH_CHANNEL_PORT_LISTENER: + case SSH2_CHANNEL_PORT_LISTENER: case SSH_CHANNEL_CLOSED: case SSH_CHANNEL_AUTH_SOCKET: continue; @@ -1449,7 +1550,8 @@ void channel_request_local_forwarding(u_short port, const char *host, - u_short host_port, int gateway_ports) + u_short host_port, int gateway_ports, + int ssh2_remote_fwd) { int success, ch, sock, on = 1; struct addrinfo hints, *ai, *aitop; @@ -1512,7 +1614,8 @@ } /* Allocate a channel number for the socket. */ ch =...
2002 Oct 14
0
[PATCH] Patches to rsync-2.5.5 for Stratus VOS (resend)
...urp --new-file oldrsync/lib/getaddrinfo.c newrsync/lib/getaddrinfo.c --- oldrsync/lib/getaddrinfo.c Tue Aug 27 11:05:47 2002 +++ newrsync/lib/getaddrinfo.c Tue Aug 27 15:46:48 2002 @@ -73,9 +73,9 @@ static const char in6_loopback[] = { }; struct sockinet { - u_char si_len; - u_char si_family; - u_short si_port; + uchar_t si_len; + uchar_t si_family; + ushort_t si_port; }; static struct afd { @@ -223,7 +223,7 @@ getaddrinfo(hostname, servname, hints, r char pton[PTON_MAX]; struct addrinfo ai; struct addrinfo *pai; - u_short port; + ushort_t port; #ifdef FAITH static int firsttime =...
2000 Nov 14
1
[PATCH] Added option 'RetryDelay'
...lure. If the connection is successful, this calls - * packet_set_connection for the connection. + * packet_set_connection for the connection. Retry_delay specifies the seconds + * to wait between connection attempts. */ int ssh_connect(const char *host, struct sockaddr_storage * hostaddr, - u_short port, int connection_attempts, + u_short port, int connection_attempts, int retry_delay, int anonymous, uid_t original_real_uid, const char *proxy_command); diff -u --recursive openssh-2.3.0p1/sshconnect.c openssh-2.3.0p1-new/sshconnect.c --- openssh-2.3.0p1/sshconnect.c Sat Sep 23 0...
2000 Aug 23
1
Protocol 2 remote forwarding patch
...fwd is true then protocol 2 server called this + * and we need to use channel type SSH2_CHANNEL_PORT_LISTENER (when someone + * connects to the listening socket we know to send "forwarded-tcpip" message + * instead of "direct-tcpip"). + */ void channel_request_local_forwarding(u_short port, const char *host, - u_short host_port, int gateway_ports) + u_short host_port, int gateway_ports, int ssh2_remote_fwd) { int success, ch, sock, on = 1; struct addrinfo hints, *ai, *aitop; @@ -1482,7 +1620,8 @@ } /* Allocate a channel number for the socket. */ ch = channe...
2009 Feb 08
2
keytab-lilo included with SYSLINUX is not up to date
...to those who would like to use keytab-lilo in order to generate a file compatible with the KBDMAP directive : - use an up to date version of keytab-lilo (by downloading last version of LILO for example). - patch keytab-lilo (see below). You'll have to search for these three lines... if (/^u_short\s+(\S+)_map\[\S+\]\s+=\s+{\s*$/) { die "active at beginning of map" if defined $current; $current = $pfx.":".$1; ... and replace them with these : if (/^(static\s+)?u_short\s+(\S+)_map\[\S*\]\s+=\s+{\s*$/) { die "active at beginning of map" if defined $...
2018 Dec 10
2
[PATCH] cleanup of global variables server/client_version_string in sshconnect.c
...free(server_version_string); free(local_user); + free(host); } void diff --git a/sshconnect.h b/sshconnect.h index 890d857..d6de9fe 100644 --- a/sshconnect.h +++ b/sshconnect.h @@ -40,7 +40,7 @@ void ssh_kill_proxy_command(void); void ssh_login(Sensitive *, const char *, struct sockaddr *, u_short, struct passwd *, int); -void ssh_exchange_identification(int); +void ssh_exchange_identification(int, char **, char **); int verify_host_key(char *, struct sockaddr *, struct sshkey *); @@ -48,7 +48,7 @@ void get_hostfile_hostname_ipaddr(char *, struct sockaddr *, u_short, cha...
2002 Aug 13
1
[PATCH] global port forwarding restriction
...CASIONALLY 7 LATER. RAIN AT TIMES. MODERATE OR GOOD. --- auth-options.c 26 Jul 2002 11:02:28 -0000 1.3 +++ auth-options.c 13 Aug 2002 19:16:27 -0000 @@ -221,8 +221,6 @@ } cp = "permitopen=\""; if (strncasecmp(opts, cp, strlen(cp)) == 0) { - char host[256], sport[6]; - u_short port; char *patterns = xmalloc(strlen(opts) + 1); opts += strlen(cp); @@ -247,8 +245,7 @@ } patterns[i] = 0; opts++; - if (sscanf(patterns, "%255[^:]:%5[0-9]", host, sport) != 2 && - sscanf(patterns, "%255[^/]/%5[0-9]", host, sport) != 2) {...
2002 May 22
0
[PATCH] connect() timeout
...occur */ + return -1; + break; + } + + return -1; + +} + /* * Opens a TCP/IP connection to the remote server on the given host. * The address of the remote host will be returned in hostaddr. @@ -241,7 +298,7 @@ */ int ssh_connect(const char *host, struct sockaddr_storage * hostaddr, - u_short port, int family, int connection_attempts, + u_short port, int family, int connection_attempts, int connection_timeout, int anonymous, struct passwd *pw, const char *proxy_command) { int gaierr; @@ -323,7 +380,8 @@ * the remote uid as root. */ temporarily_use_uid(pw); - i...
2003 Feb 03
8
[Bug 413] Port forwarding: [localhost:]localport:remotehost:remoteport
http://bugzilla.mindrot.org/show_bug.cgi?id=413 markus at openbsd.org changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |ASSIGNED ------- Additional Comments From markus at openbsd.org 2003-02-03 19:50 ------- i'll look into this. ------- You are
2015 Dec 27
2
[PATCH] keytab-lilo: update to support kbd 2.0.3 format
Since kbd 2.0.3 (commit 6ff47cf2) the format generated by 'loadkeys -m' has changed slightly, using "unsigned short" instead of "u_short" Signed-off-by: Olivier Brunel <jjk at jjacky.com> --- utils/keytab-lilo | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/utils/keytab-lilo b/utils/keytab-lilo index 9e34160..337a869 100755 --- a/utils/keytab-lilo +++ b/utils/keytab-lilo @@ -48,9 +48,9 @@ sub loa...
2003 Jan 29
0
[PATCH] features for restricted shell environments
...+ if (!auth_restricted(RESTRICT_ENV, pw) && strncasecmp(opts, cp, strlen(cp)) == 0) { char *s; struct envstring *new_envstring; @@ -217,8 +219,6 @@ } cp = "permitopen=\""; if (strncasecmp(opts, cp, strlen(cp)) == 0) { - char host[256], sport[6]; - u_short port; char *patterns = xmalloc(strlen(opts) + 1); opts += strlen(cp); @@ -243,8 +243,7 @@ } patterns[i] = 0; opts++; - if (sscanf(patterns, "%255[^:]:%5[0-9]", host, sport) != 2 && - sscanf(patterns, "%255[^/]/%5[0-9]", host, sport) != 2) {...