version 1.33, 1999/12/12 19:20:02 |
version 1.34, 1999/12/27 09:48:38 |
|
|
packet_put_int(ch->remote_id); |
packet_put_int(ch->remote_id); |
packet_send(); |
packet_send(); |
ch->type = SSH_CHANNEL_CLOSED; |
ch->type = SSH_CHANNEL_CLOSED; |
debug("Closing channel %d after input drain.", i); |
debug("Closing channel %d after input drain.", ch->self); |
break; |
break; |
} |
} |
break; |
break; |
|
|
* for connections from clients. |
* for connections from clients. |
*/ |
*/ |
if (FD_ISSET(ch->sock, readset)) { |
if (FD_ISSET(ch->sock, readset)) { |
int nchan; |
addrlen = sizeof(addr); |
len = sizeof(addr); |
newsock = accept(ch->sock, &addr, &addrlen); |
newsock = accept(ch->sock, &addr, &len); |
|
if (newsock < 0) { |
if (newsock < 0) { |
error("accept from auth socket: %.100s", strerror(errno)); |
error("accept from auth socket: %.100s", strerror(errno)); |
break; |
break; |
} |
} |
nchan = channel_allocate(SSH_CHANNEL_OPENING, newsock, |
newch = channel_allocate(SSH_CHANNEL_OPENING, newsock, |
xstrdup("accepted auth socket")); |
xstrdup("accepted auth socket")); |
packet_start(SSH_SMSG_AGENT_OPEN); |
packet_start(SSH_SMSG_AGENT_OPEN); |
packet_put_int(nchan); |
packet_put_int(newch); |
packet_send(); |
packet_send(); |
} |
} |
break; |
break; |
|
|
len = 512; |
len = 512; |
} else { |
} else { |
/* Keep the packets at reasonable size. */ |
/* Keep the packets at reasonable size. */ |
if (len > 16384) |
if (len > packet_get_maxsize()/2) |
len = 16384; |
len = packet_get_maxsize()/2; |
} |
} |
packet_start(SSH_MSG_CHANNEL_DATA); |
packet_start(SSH_MSG_CHANNEL_DATA); |
packet_put_int(ch->remote_id); |
packet_put_int(ch->remote_id); |