|
Lines 1095-1100
server_input_global_request(int type, u_
Link Here
|
| 1095 |
want_reply = packet_get_char(); |
1095 |
want_reply = packet_get_char(); |
| 1096 |
debug("server_input_global_request: rtype %s want_reply %d", rtype, want_reply); |
1096 |
debug("server_input_global_request: rtype %s want_reply %d", rtype, want_reply); |
| 1097 |
|
1097 |
|
|
|
1098 |
/* XXX hack to test bug #1307. leaks rtype */ |
| 1099 |
if (strcmp(rtype, "keepalive@openssh.com") == 0) { |
| 1100 |
debug("XXX sending UNIMPLEMENTED in response to keepalive"); |
| 1101 |
packet_start(SSH2_MSG_UNIMPLEMENTED); |
| 1102 |
packet_put_int(seq); |
| 1103 |
packet_send(); |
| 1104 |
packet_write_wait(); |
| 1105 |
return; |
| 1106 |
} |
| 1107 |
|
| 1098 |
/* -R style forwarding */ |
1108 |
/* -R style forwarding */ |
| 1099 |
if (strcmp(rtype, "tcpip-forward") == 0) { |
1109 |
if (strcmp(rtype, "tcpip-forward") == 0) { |
| 1100 |
struct passwd *pw; |
1110 |
struct passwd *pw; |