X-Git-Url: http://andersk.mit.edu/gitweb/openssh.git/blobdiff_plain/ceec33f38d61e7d1019f896379a36bc0103ba1cf..18fc231cd2e005ccb43cef12d2f3863ed665337e:/clientloop.c diff --git a/clientloop.c b/clientloop.c index 04f2d11b..6d58a5af 100644 --- a/clientloop.c +++ b/clientloop.c @@ -59,7 +59,19 @@ */ #include "includes.h" -RCSID("$OpenBSD: clientloop.c,v 1.147 2005/12/07 03:52:22 djm Exp $"); + +#include +#ifdef HAVE_SYS_STAT_H +# include +#endif +#include + +#include +#ifdef HAVE_PATHS_H +#include +#endif +#include +#include #include "ssh.h" #include "ssh1.h" @@ -1386,7 +1398,7 @@ client_loop(int have_pty, int escape_char_arg, int ssh2_chan_id) session_ident = ssh2_chan_id; if (escape_char != SSH_ESCAPECHAR_NONE) channel_register_filter(session_ident, - simple_escape_filter); + simple_escape_filter, NULL); if (session_ident != -1) channel_register_cleanup(session_ident, client_channel_closed, 0); @@ -1688,7 +1700,7 @@ client_request_x11(const char *request_type, int rchan) if (!options.forward_x11) { error("Warning: ssh server tried X11 forwarding."); - error("Warning: this is probably a break in attempt by a malicious server."); + error("Warning: this is probably a break-in attempt by a malicious server."); return NULL; } originator = packet_get_string(NULL); @@ -1721,7 +1733,7 @@ client_request_agent(const char *request_type, int rchan) if (!options.forward_agent) { error("Warning: ssh server tried agent forwarding."); - error("Warning: this is probably a break in attempt by a malicious server."); + error("Warning: this is probably a break-in attempt by a malicious server."); return NULL; } sock = ssh_get_authentication_socket();