version 1.61, 2000/08/20 18:42:40 |
version 1.62, 2000/08/28 19:51:00 |
|
|
int window, packetmax, id; |
int window, packetmax, id; |
int in, out, err; |
int in, out, err; |
|
|
/* If requested, let ssh continue in the background. */ |
if (stdin_null_flag) { |
if (fork_after_authentication_flag) |
in = open("/dev/null", O_RDONLY); |
if (daemon(1, 1) < 0) |
} else { |
fatal("daemon() failed: %.200s", strerror(errno)); |
in = dup(STDIN_FILENO); |
|
} |
in = dup(STDIN_FILENO); |
|
out = dup(STDOUT_FILENO); |
out = dup(STDOUT_FILENO); |
err = dup(STDERR_FILENO); |
err = dup(STDERR_FILENO); |
|
|
if (in < 0 || out < 0 || err < 0) |
if (in < 0 || out < 0 || err < 0) |
fatal("dump in/out/err failed"); |
fatal("dup() in/out/err failed"); |
|
|
/* should be pre-session */ |
/* should be pre-session */ |
init_local_fwd(); |
init_local_fwd(); |
|
|
|
/* If requested, let ssh continue in the background. */ |
|
if (fork_after_authentication_flag) |
|
if (daemon(1, 1) < 0) |
|
fatal("daemon() failed: %.200s", strerror(errno)); |
|
|
window = 32*1024; |
window = 32*1024; |
if (tty_flag) { |
if (tty_flag) { |
packetmax = window/8; |
packetmax = window/8; |