Bugzilla – Attachment 3625 Details for
Bug 3499
Escape char command line -R does not handle dynamic (SOCKS) forward spec
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
[patch]
Check ~C -R for dynamic port forward
openssh-escape-R-dynamic.patch (text/plain), 707 bytes, created by
Darren Tucker
on 2022-11-08 13:02:30 AEDT
(
hide
)
Description:
Check ~C -R for dynamic port forward
Filename:
MIME Type:
Creator:
Darren Tucker
Created:
2022-11-08 13:02:30 AEDT
Size:
707 bytes
patch
obsolete
>diff --git a/clientloop.c b/clientloop.c >index 0050f3eb..87dc6e16 100644 >--- a/clientloop.c >+++ b/clientloop.c >@@ -846,8 +846,15 @@ process_cmdline(struct ssh *ssh) > } > logit("Canceled forwarding."); > } else { >- if (!parse_forward(&fwd, s, dynamic, remote)) { >- logit("Bad forwarding specification."); >+ /* -R specs can be both dynamic or not, so check both. */ >+ if (remote) { >+ if (!parse_forward(&fwd, s, 0, remote) && >+ !parse_forward(&fwd, s, 1, remote)) { >+ logit("Bad remote forwarding specification."); >+ goto out; >+ } >+ } else if (!parse_forward(&fwd, s, dynamic, remote)) { >+ logit("Bad local forwarding specification."); > goto out; > } > if (local || dynamic) {
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Diff
View Attachment As Raw
Flags:
djm
:
ok+
Actions:
View
|
Diff
Attachments on
bug 3499
: 3625