View | Details | Raw Unified | Return to bug 1307 | Differences between
and this patch

Collapse All | Expand All

(-)serverloop.c (+10 lines)
Lines 1095-1100 server_input_global_request(int type, u_ Link Here
1095
	want_reply = packet_get_char();
1095
	want_reply = packet_get_char();
1096
	debug("server_input_global_request: rtype %s want_reply %d", rtype, want_reply);
1096
	debug("server_input_global_request: rtype %s want_reply %d", rtype, want_reply);
1097
1097
1098
	/* XXX hack to test bug #1307.  leaks rtype  */
1099
	if (strcmp(rtype, "keepalive@openssh.com") == 0) {
1100
		debug("XXX sending UNIMPLEMENTED in response to keepalive");
1101
		packet_start(SSH2_MSG_UNIMPLEMENTED);
1102
		packet_put_int(seq);
1103
		packet_send();
1104
		packet_write_wait();
1105
		return;
1106
	}
1107
1098
	/* -R style forwarding */
1108
	/* -R style forwarding */
1099
	if (strcmp(rtype, "tcpip-forward") == 0) {
1109
	if (strcmp(rtype, "tcpip-forward") == 0) {
1100
		struct passwd *pw;
1110
		struct passwd *pw;

Return to bug 1307