version 1.309, 2017/12/18 23:16:23 |
version 1.310, 2018/01/23 05:27:21 |
|
|
return NULL; |
return NULL; |
} |
} |
originator = packet_get_string(NULL); |
originator = packet_get_string(NULL); |
if (datafellows & SSH_BUG_X11FWD) { |
originator_port = packet_get_int(); |
debug2("buggy server: x11 request w/o originator_port"); |
|
originator_port = 0; |
|
} else { |
|
originator_port = packet_get_int(); |
|
} |
|
packet_check_eom(); |
packet_check_eom(); |
/* XXX check permission */ |
/* XXX check permission */ |
debug("client_request_x11: request from %s %d", originator, |
debug("client_request_x11: request from %s %d", originator, |
|
|
packet_start(SSH2_MSG_CHANNEL_OPEN_FAILURE); |
packet_start(SSH2_MSG_CHANNEL_OPEN_FAILURE); |
packet_put_int(rchan); |
packet_put_int(rchan); |
packet_put_int(SSH2_OPEN_ADMINISTRATIVELY_PROHIBITED); |
packet_put_int(SSH2_OPEN_ADMINISTRATIVELY_PROHIBITED); |
if (!(datafellows & SSH_BUG_OPENFAILURE)) { |
packet_put_cstring("open failed"); |
packet_put_cstring("open failed"); |
packet_put_cstring(""); |
packet_put_cstring(""); |
|
} |
|
packet_send(); |
packet_send(); |
} |
} |
free(ctype); |
free(ctype); |