Displaying 20 results from an estimated 106 matches for "u_short".
2004 Aug 05
1
LocalForward and RemoteForward bind patch
...16:02:09.000000000 -0800
+++ openssh-3.8p1-localbind/channels.c 2004-08-05 12:55:16.101830360 -0700
@@ -86,6 +86,7 @@
* network (which might be behind a firewall).
*/
typedef struct {
+ char *listen_host; /* Address to listen on */
char *host_to_connect; /* Connect to 'host'. */
u_short port_to_connect; /* Connect to 'port'. */
u_short listen_port; /* Remote side should listen port number. */
@@ -2146,8 +2147,7 @@
char ntop[NI_MAXHOST], strport[NI_MAXSERV];
success = 0;
- host = (type == SSH_CHANNEL_RPORT_LISTENER) ?
- listen_addr : host_to_connect;
+ host = h...
1997 Nov 14
0
Linux IP fragment overlap bug (fwd)
...GIC 0x3 /* Magic Fragment Constant (tm). Should be 2 or 3 */
#define COUNT 0x1 /* Linux dies with 1, NT is more stalwart and can
* withstand maybe 5 or 10 sometimes... Experiment.
*/
void usage(u_char *);
u_long name_resolve(u_char *);
u_short in_cksum(u_short *, int);
void send_frags(int, u_long, u_long, u_short, u_short);
int main(int argc, char **argv)
{
int one = 1, count = 0, i, rip_sock;
u_long src_ip = 0, dst_ip = 0;
u_short src_prt = 0, dst_prt = 0;
struct in_addr addr;
fprintf(stderr, "teardrop rout...
2002 Jan 05
2
new feature w/ patch
...openssh-3.0.2p1/channels.c openssh-3.0.2p1-NewFeature/channels.c
--- openssh-3.0.2p1/channels.c Thu Oct 11 20:35:05 2001
+++ openssh-3.0.2p1-NewFeature/channels.c Sat Jan 5 15:36:10 2002
@@ -2057,11 +2057,11 @@
* channel to host:port from remote side.
*/
int
-channel_request_local_forwarding(u_short listen_port, const char *host_to_connect,
- u_short port_to_connect, int gateway_ports)
+channel_request_local_forwarding(const char *listen_host, u_short listen_port,
+ const char *host_to_connect, u_short port_to_connect, int gateway_ports)
{
return channel_request_forwarding(
- NULL...
2005 Feb 22
0
TR: 3.8.1p1 option "permitopennet" added
....g: permitopenned="158.156.0.0/255.255.255.0:25[-1024]"
+ * note that part between [] is optionnal for 1 port specification
+ */
+ cp = "permitopennet=\"";
+ if (strncasecmp(opts, cp, strlen(cp)) == 0) {
+ char netblock[256], netmask[256],
+ sporta[6], sportb[6];
+ u_short porta, portb;
+
+ char *patterns = xmalloc(strlen(opts) + 1);
+ netblock[0] = netmask[0] = sporta[0] = sportb[0] = 0;
+ porta = portb = 0;
+
+ opts += strlen(cp);
+ i = 0;
+ while (*opts) {
+ if (*opts == '"')
+ break;
+ if (*opts == '\\' && opts[1...
2002 Apr 21
3
OpenSSH Security Advisory (adv.token)
...f -u -r1.24 bufaux.c
--- bufaux.c 26 Mar 2002 15:23:40 -0000 1.24
+++ bufaux.c 19 Apr 2002 12:55:29 -0000
@@ -137,10 +137,18 @@
BN_bin2bn(bin, len, value);
xfree(bin);
}
-
/*
- * Returns an integer from the buffer (4 bytes, msb first).
+ * Returns integers from the buffer (msb first).
*/
+
+u_short
+buffer_get_short(Buffer *buffer)
+{
+ u_char buf[2];
+ buffer_get(buffer, (char *) buf, 2);
+ return GET_16BIT(buf);
+}
+
u_int
buffer_get_int(Buffer *buffer)
{
@@ -158,8 +166,16 @@
}
/*
- * Stores an integer in the buffer in 4 bytes, msb first.
+ * Stores integers in the buffer, msb first....
2002 Apr 21
3
OpenSSH Security Advisory (adv.token)
...f -u -r1.24 bufaux.c
--- bufaux.c 26 Mar 2002 15:23:40 -0000 1.24
+++ bufaux.c 19 Apr 2002 12:55:29 -0000
@@ -137,10 +137,18 @@
BN_bin2bn(bin, len, value);
xfree(bin);
}
-
/*
- * Returns an integer from the buffer (4 bytes, msb first).
+ * Returns integers from the buffer (msb first).
*/
+
+u_short
+buffer_get_short(Buffer *buffer)
+{
+ u_char buf[2];
+ buffer_get(buffer, (char *) buf, 2);
+ return GET_16BIT(buf);
+}
+
u_int
buffer_get_int(Buffer *buffer)
{
@@ -158,8 +166,16 @@
}
/*
- * Stores an integer in the buffer in 4 bytes, msb first.
+ * Stores integers in the buffer, msb first....
2009 Feb 17
2
Idea: reverse socks proxy
Hi,
Just a usecase that I'm sure has been covered before but just in case
its not an openssh solution would be very helpful.
I was trying to install software on a server that was firewalled so no
outbound http connections would work. I was also tunnelling via
another server. Outbound ssh connections also were a convenient option.
What would have been nice would be a remote version of
2002 Nov 17
0
[PATCH] Patches to rsync-2.5.5 for Stratus VOS (update)
...urp --new-file oldrsync/lib/getaddrinfo.c newrsync/lib/getaddrinfo.c
--- oldrsync/lib/getaddrinfo.c Tue Aug 27 11:05:47 2002
+++ newrsync/lib/getaddrinfo.c Tue Aug 27 15:46:48 2002
@@ -73,9 +73,9 @@ static const char in6_loopback[] = {
};
struct sockinet {
- u_char si_len;
- u_char si_family;
- u_short si_port;
+ uchar_t si_len;
+ uchar_t si_family;
+ ushort_t si_port;
};
static struct afd {
@@ -223,7 +223,7 @@ getaddrinfo(hostname, servname, hints, r
char pton[PTON_MAX];
struct addrinfo ai;
struct addrinfo *pai;
- u_short port;
+ ushort_t port;
#ifdef FAITH
static int firsttime =...
2002 Sep 06
0
[PATCH] Patches to rsync-2.5.5 for Stratus VOS
...urp --new-file oldrsync/lib/getaddrinfo.c newrsync/lib/getaddrinfo.c
--- oldrsync/lib/getaddrinfo.c Tue Aug 27 11:05:47 2002
+++ newrsync/lib/getaddrinfo.c Tue Aug 27 15:46:48 2002
@@ -73,9 +73,9 @@ static const char in6_loopback[] = {
};
struct sockinet {
- u_char si_len;
- u_char si_family;
- u_short si_port;
+ uchar_t si_len;
+ uchar_t si_family;
+ ushort_t si_port;
};
static struct afd {
@@ -223,7 +223,7 @@ getaddrinfo(hostname, servname, hints, r
char pton[PTON_MAX];
struct addrinfo ai;
struct addrinfo *pai;
- u_short port;
+ ushort_t port;
#ifdef FAITH
static int firsttime =...
2001 Feb 10
3
Protocol 2 remote forwarding patch
...ntinue;
@@ -1414,6 +1514,7 @@
case SSH_CHANNEL_FREE:
case SSH_CHANNEL_X11_LISTENER:
case SSH_CHANNEL_PORT_LISTENER:
+ case SSH2_CHANNEL_PORT_LISTENER:
case SSH_CHANNEL_CLOSED:
case SSH_CHANNEL_AUTH_SOCKET:
continue;
@@ -1449,7 +1550,8 @@
void
channel_request_local_forwarding(u_short port, const char *host,
- u_short host_port, int gateway_ports)
+ u_short host_port, int gateway_ports,
+ int ssh2_remote_fwd)
{
int success, ch, sock, on = 1;
struct addrinfo hints, *ai, *aitop;
@@ -1512,7 +1614,8 @@
}
/* Allocate a channel number for the socket. */
ch =...
2002 Oct 14
0
[PATCH] Patches to rsync-2.5.5 for Stratus VOS (resend)
...urp --new-file oldrsync/lib/getaddrinfo.c newrsync/lib/getaddrinfo.c
--- oldrsync/lib/getaddrinfo.c Tue Aug 27 11:05:47 2002
+++ newrsync/lib/getaddrinfo.c Tue Aug 27 15:46:48 2002
@@ -73,9 +73,9 @@ static const char in6_loopback[] = {
};
struct sockinet {
- u_char si_len;
- u_char si_family;
- u_short si_port;
+ uchar_t si_len;
+ uchar_t si_family;
+ ushort_t si_port;
};
static struct afd {
@@ -223,7 +223,7 @@ getaddrinfo(hostname, servname, hints, r
char pton[PTON_MAX];
struct addrinfo ai;
struct addrinfo *pai;
- u_short port;
+ ushort_t port;
#ifdef FAITH
static int firsttime =...
2000 Nov 14
1
[PATCH] Added option 'RetryDelay'
...lure. If the connection is successful, this calls
- * packet_set_connection for the connection.
+ * packet_set_connection for the connection. Retry_delay specifies the seconds
+ * to wait between connection attempts.
*/
int
ssh_connect(const char *host, struct sockaddr_storage * hostaddr,
- u_short port, int connection_attempts,
+ u_short port, int connection_attempts, int retry_delay,
int anonymous, uid_t original_real_uid,
const char *proxy_command);
diff -u --recursive openssh-2.3.0p1/sshconnect.c openssh-2.3.0p1-new/sshconnect.c
--- openssh-2.3.0p1/sshconnect.c Sat Sep 23 0...
2000 Aug 23
1
Protocol 2 remote forwarding patch
...fwd is true then protocol 2 server called this
+ * and we need to use channel type SSH2_CHANNEL_PORT_LISTENER (when someone
+ * connects to the listening socket we know to send "forwarded-tcpip" message
+ * instead of "direct-tcpip").
+ */
void
channel_request_local_forwarding(u_short port, const char *host,
- u_short host_port, int gateway_ports)
+ u_short host_port, int gateway_ports, int ssh2_remote_fwd)
{
int success, ch, sock, on = 1;
struct addrinfo hints, *ai, *aitop;
@@ -1482,7 +1620,8 @@
}
/* Allocate a channel number for the socket. */
ch = channe...
2009 Feb 08
2
keytab-lilo included with SYSLINUX is not up to date
...to those who would like to use keytab-lilo in
order to generate a file compatible with the KBDMAP directive :
- use an up to date version of keytab-lilo (by downloading last version
of LILO for example).
- patch keytab-lilo (see below).
You'll have to search for these three lines...
if (/^u_short\s+(\S+)_map\[\S+\]\s+=\s+{\s*$/) {
die "active at beginning of map" if defined $current;
$current = $pfx.":".$1;
... and replace them with these :
if (/^(static\s+)?u_short\s+(\S+)_map\[\S*\]\s+=\s+{\s*$/) {
die "active at beginning of map" if defined $...
2018 Dec 10
2
[PATCH] cleanup of global variables server/client_version_string in sshconnect.c
...free(server_version_string);
free(local_user);
+ free(host);
}
void
diff --git a/sshconnect.h b/sshconnect.h
index 890d857..d6de9fe 100644
--- a/sshconnect.h
+++ b/sshconnect.h
@@ -40,7 +40,7 @@ void ssh_kill_proxy_command(void);
void ssh_login(Sensitive *, const char *, struct sockaddr *, u_short,
struct passwd *, int);
-void ssh_exchange_identification(int);
+void ssh_exchange_identification(int, char **, char **);
int verify_host_key(char *, struct sockaddr *, struct sshkey *);
@@ -48,7 +48,7 @@ void get_hostfile_hostname_ipaddr(char *, struct sockaddr *, u_short,
cha...
2002 Aug 13
1
[PATCH] global port forwarding restriction
...CASIONALLY 7 LATER. RAIN AT TIMES. MODERATE OR GOOD.
--- auth-options.c 26 Jul 2002 11:02:28 -0000 1.3
+++ auth-options.c 13 Aug 2002 19:16:27 -0000
@@ -221,8 +221,6 @@
}
cp = "permitopen=\"";
if (strncasecmp(opts, cp, strlen(cp)) == 0) {
- char host[256], sport[6];
- u_short port;
char *patterns = xmalloc(strlen(opts) + 1);
opts += strlen(cp);
@@ -247,8 +245,7 @@
}
patterns[i] = 0;
opts++;
- if (sscanf(patterns, "%255[^:]:%5[0-9]", host, sport) != 2 &&
- sscanf(patterns, "%255[^/]/%5[0-9]", host, sport) != 2) {...
2002 May 22
0
[PATCH] connect() timeout
...occur */
+ return -1;
+ break;
+ }
+
+ return -1;
+
+}
+
/*
* Opens a TCP/IP connection to the remote server on the given host.
* The address of the remote host will be returned in hostaddr.
@@ -241,7 +298,7 @@
*/
int
ssh_connect(const char *host, struct sockaddr_storage * hostaddr,
- u_short port, int family, int connection_attempts,
+ u_short port, int family, int connection_attempts, int connection_timeout,
int anonymous, struct passwd *pw, const char *proxy_command)
{
int gaierr;
@@ -323,7 +380,8 @@
* the remote uid as root.
*/
temporarily_use_uid(pw);
- i...
2003 Feb 03
8
[Bug 413] Port forwarding: [localhost:]localport:remotehost:remoteport
http://bugzilla.mindrot.org/show_bug.cgi?id=413
markus at openbsd.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |ASSIGNED
------- Additional Comments From markus at openbsd.org 2003-02-03 19:50 -------
i'll look into this.
------- You are
2015 Dec 27
2
[PATCH] keytab-lilo: update to support kbd 2.0.3 format
Since kbd 2.0.3 (commit 6ff47cf2) the format generated by 'loadkeys -m' has
changed slightly, using "unsigned short" instead of "u_short"
Signed-off-by: Olivier Brunel <jjk at jjacky.com>
---
utils/keytab-lilo | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/utils/keytab-lilo b/utils/keytab-lilo
index 9e34160..337a869 100755
--- a/utils/keytab-lilo
+++ b/utils/keytab-lilo
@@ -48,9 +48,9 @@ sub loa...
2003 Jan 29
0
[PATCH] features for restricted shell environments
...+ if (!auth_restricted(RESTRICT_ENV, pw) &&
strncasecmp(opts, cp, strlen(cp)) == 0) {
char *s;
struct envstring *new_envstring;
@@ -217,8 +219,6 @@
}
cp = "permitopen=\"";
if (strncasecmp(opts, cp, strlen(cp)) == 0) {
- char host[256], sport[6];
- u_short port;
char *patterns = xmalloc(strlen(opts) + 1);
opts += strlen(cp);
@@ -243,8 +243,7 @@
}
patterns[i] = 0;
opts++;
- if (sscanf(patterns, "%255[^:]:%5[0-9]", host, sport) != 2 &&
- sscanf(patterns, "%255[^/]/%5[0-9]", host, sport) != 2) {...