version 1.329, 2019/11/25 00:51:37 |
version 1.330, 2019/12/21 02:19:13 |
|
|
extern char *host; |
extern char *host; |
|
|
/* |
/* |
|
* If this field is not NULL, the ForwardAgent socket is this path and different |
|
* instead of SSH_AUTH_SOCK. |
|
*/ |
|
extern char *forward_agent_sock_path; |
|
|
|
/* |
* Flag to indicate that we have received a window change signal which has |
* Flag to indicate that we have received a window change signal which has |
* not yet been processed. This will cause a message indicating the new |
* not yet been processed. This will cause a message indicating the new |
* window size to be sent to the server a little later. This is volatile |
* window size to be sent to the server a little later. This is volatile |
|
|
"malicious server."); |
"malicious server."); |
return NULL; |
return NULL; |
} |
} |
if ((r = ssh_get_authentication_socket(&sock)) != 0) { |
if (forward_agent_sock_path == NULL) { |
|
r = ssh_get_authentication_socket(&sock); |
|
} else { |
|
r = ssh_get_authentication_socket_path(forward_agent_sock_path, &sock); |
|
} |
|
if (r != 0) { |
if (r != SSH_ERR_AGENT_NOT_PRESENT) |
if (r != SSH_ERR_AGENT_NOT_PRESENT) |
debug("%s: ssh_get_authentication_socket: %s", |
debug("%s: ssh_get_authentication_socket: %s", |
__func__, ssh_err(r)); |
__func__, ssh_err(r)); |