version 1.33, 1999/11/24 19:53:52 |
version 1.34, 1999/11/24 20:15:35 |
|
|
/* Close connection cleanly after attack. */ |
/* Close connection cleanly after attack. */ |
cipher_attack_detected = packet_disconnect; |
cipher_attack_detected = packet_disconnect; |
|
|
/* If requested, fork and let ssh continue in the background. */ |
|
if (fork_after_authentication_flag) { |
|
int ret = fork(); |
|
if (ret == -1) |
|
fatal("fork failed: %.100s", strerror(errno)); |
|
if (ret != 0) |
|
exit(0); |
|
setsid(); |
|
} |
|
/* Enable compression if requested. */ |
/* Enable compression if requested. */ |
if (options.compression) { |
if (options.compression) { |
debug("Requesting compression at level %d.", options.compression_level); |
debug("Requesting compression at level %d.", options.compression_level); |
|
|
options.remote_forwards[i].host, |
options.remote_forwards[i].host, |
options.remote_forwards[i].host_port); |
options.remote_forwards[i].host_port); |
} |
} |
|
|
|
/* If requested, let ssh continue in the background. */ |
|
if (fork_after_authentication_flag) |
|
if (daemon(1, 1) < 0) |
|
fatal("daemon() failed: %.200s", strerror(errno)); |
|
|
/* |
/* |
* If a command was specified on the command line, execute the |
* If a command was specified on the command line, execute the |