- apply real fix for window size problem (#286181) from upstream - apply fix for the spurious failed bind from upstream - apply open handle leak in sftp fix from upstream
26 lines
1.0 KiB
Diff
26 lines
1.0 KiB
Diff
Index: clientloop.c
|
|
===================================================================
|
|
RCS file: /usr/local/src/security/openssh/cvs/openssh/clientloop.c,v
|
|
retrieving revision 1.170
|
|
diff -u -p -r1.170 clientloop.c
|
|
--- clientloop.c 28 Dec 2007 15:45:07 -0000 1.170
|
|
+++ clientloop.c 28 Dec 2007 18:14:10 -0000
|
|
@@ -1745,7 +1745,7 @@ client_request_forwarded_tcpip(const cha
|
|
}
|
|
c = channel_new("forwarded-tcpip",
|
|
SSH_CHANNEL_CONNECTING, sock, sock, -1,
|
|
- CHAN_TCP_WINDOW_DEFAULT, CHAN_TCP_WINDOW_DEFAULT, 0,
|
|
+ CHAN_TCP_WINDOW_DEFAULT, CHAN_TCP_PACKET_DEFAULT, 0,
|
|
originator_address, 1);
|
|
xfree(originator_address);
|
|
xfree(listen_address);
|
|
@@ -1803,7 +1803,7 @@ client_request_agent(const char *request
|
|
return NULL;
|
|
c = channel_new("authentication agent connection",
|
|
SSH_CHANNEL_OPEN, sock, sock, -1,
|
|
- CHAN_X11_WINDOW_DEFAULT, CHAN_TCP_WINDOW_DEFAULT, 0,
|
|
+ CHAN_X11_WINDOW_DEFAULT, CHAN_TCP_PACKET_DEFAULT, 0,
|
|
"authentication agent connection", 1);
|
|
c->force_drain = 1;
|
|
return c;
|