- markus@cvs.openbsd.org 2008/12/02 19:08:59
[serverloop.c] backout 1.149, since it's not necessary and openssh clients send broken CHANNEL_FAILURE/SUCCESS messages since about 2004; ok djm@
This commit is contained in:
parent
8533c7801d
commit
5a33ec68bc
|
@ -9,6 +9,10 @@
|
||||||
SSH2_MSG_CHANNEL_SUCCESS/SSH2_MSG_CHANNEL_FAILURE messages,
|
SSH2_MSG_CHANNEL_SUCCESS/SSH2_MSG_CHANNEL_FAILURE messages,
|
||||||
otherwise we trigger 'Non-public channel' error messages on sshd
|
otherwise we trigger 'Non-public channel' error messages on sshd
|
||||||
systems with clientkeepalive enabled; noticed by sturm; ok djm;
|
systems with clientkeepalive enabled; noticed by sturm; ok djm;
|
||||||
|
- markus@cvs.openbsd.org 2008/12/02 19:08:59
|
||||||
|
[serverloop.c]
|
||||||
|
backout 1.149, since it's not necessary and openssh clients send
|
||||||
|
broken CHANNEL_FAILURE/SUCCESS messages since about 2004; ok djm@
|
||||||
|
|
||||||
20081201
|
20081201
|
||||||
- (dtucker) [contrib/cygwin/{Makefile,ssh-host-config}] Add new doc files
|
- (dtucker) [contrib/cygwin/{Makefile,ssh-host-config}] Add new doc files
|
||||||
|
@ -4957,5 +4961,5 @@
|
||||||
OpenServer 6 and add osr5bigcrypt support so when someone migrates
|
OpenServer 6 and add osr5bigcrypt support so when someone migrates
|
||||||
passwords between UnixWare and OpenServer they will still work. OK dtucker@
|
passwords between UnixWare and OpenServer they will still work. OK dtucker@
|
||||||
|
|
||||||
$Id: ChangeLog,v 1.5149 2008/12/07 22:54:40 djm Exp $
|
$Id: ChangeLog,v 1.5150 2008/12/07 22:55:02 djm Exp $
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
/* $OpenBSD: serverloop.c,v 1.153 2008/06/30 12:15:39 djm Exp $ */
|
/* $OpenBSD: serverloop.c,v 1.154 2008/12/02 19:08:59 markus Exp $ */
|
||||||
/*
|
/*
|
||||||
* Author: Tatu Ylonen <ylo@cs.hut.fi>
|
* Author: Tatu Ylonen <ylo@cs.hut.fi>
|
||||||
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
||||||
|
@ -1202,9 +1202,9 @@ server_init_dispatch_20(void)
|
||||||
dispatch_set(SSH2_MSG_CHANNEL_REQUEST, &server_input_channel_req);
|
dispatch_set(SSH2_MSG_CHANNEL_REQUEST, &server_input_channel_req);
|
||||||
dispatch_set(SSH2_MSG_CHANNEL_WINDOW_ADJUST, &channel_input_window_adjust);
|
dispatch_set(SSH2_MSG_CHANNEL_WINDOW_ADJUST, &channel_input_window_adjust);
|
||||||
dispatch_set(SSH2_MSG_GLOBAL_REQUEST, &server_input_global_request);
|
dispatch_set(SSH2_MSG_GLOBAL_REQUEST, &server_input_global_request);
|
||||||
dispatch_set(SSH2_MSG_CHANNEL_SUCCESS, &channel_input_status_confirm);
|
|
||||||
dispatch_set(SSH2_MSG_CHANNEL_FAILURE, &channel_input_status_confirm);
|
|
||||||
/* client_alive */
|
/* client_alive */
|
||||||
|
dispatch_set(SSH2_MSG_CHANNEL_SUCCESS, &server_input_keep_alive);
|
||||||
|
dispatch_set(SSH2_MSG_CHANNEL_FAILURE, &server_input_keep_alive);
|
||||||
dispatch_set(SSH2_MSG_REQUEST_SUCCESS, &server_input_keep_alive);
|
dispatch_set(SSH2_MSG_REQUEST_SUCCESS, &server_input_keep_alive);
|
||||||
dispatch_set(SSH2_MSG_REQUEST_FAILURE, &server_input_keep_alive);
|
dispatch_set(SSH2_MSG_REQUEST_FAILURE, &server_input_keep_alive);
|
||||||
/* rekeying */
|
/* rekeying */
|
||||||
|
|
Loading…
Reference in New Issue