version 1.142, 2001/12/05 03:56:39 |
version 1.143, 2001/12/05 10:06:12 |
|
|
} |
} |
return -1; |
return -1; |
} |
} |
if(c->input_filter != NULL) { |
if (c->input_filter != NULL) { |
if (c->input_filter(c, buf, len) == -1) { |
if (c->input_filter(c, buf, len) == -1) { |
debug("channel %d: filter stops", c->self); |
debug("channel %d: filter stops", c->self); |
chan_read_failed(c); |
chan_read_failed(c); |
|
|
data = packet_get_string(&data_len); |
data = packet_get_string(&data_len); |
packet_done(); |
packet_done(); |
|
|
if (compat20){ |
if (compat20) { |
if (data_len > c->local_maxpacket) { |
if (data_len > c->local_maxpacket) { |
log("channel %d: rcvd big packet %d, maxpack %d", |
log("channel %d: rcvd big packet %d, maxpack %d", |
c->self, data_len, c->local_maxpacket); |
c->self, data_len, c->local_maxpacket); |
|
|
static char * |
static char * |
reason2txt(int reason) |
reason2txt(int reason) |
{ |
{ |
switch(reason) { |
switch (reason) { |
case SSH2_OPEN_ADMINISTRATIVELY_PROHIBITED: |
case SSH2_OPEN_ADMINISTRATIVELY_PROHIBITED: |
return "administratively prohibited"; |
return "administratively prohibited"; |
case SSH2_OPEN_CONNECT_FAILED: |
case SSH2_OPEN_CONNECT_FAILED: |
|
|
deny_input_open(int type, int plen, void *ctxt) |
deny_input_open(int type, int plen, void *ctxt) |
{ |
{ |
int rchan = packet_get_int(); |
int rchan = packet_get_int(); |
switch(type){ |
switch (type) { |
case SSH_SMSG_AGENT_OPEN: |
case SSH_SMSG_AGENT_OPEN: |
error("Warning: ssh server tried agent forwarding."); |
error("Warning: ssh server tried agent forwarding."); |
break; |
break; |