]> asedeno.scripts.mit.edu Git - PuTTY.git/commitdiff
Add `OSU_1.5alpha4' to BUG_CHOKES_ON_SSH1_IGNORE; this is apparently enough to
authorJacob Nevins <jacobn@chiark.greenend.org.uk>
Tue, 21 Sep 2004 21:04:28 +0000 (21:04 +0000)
committerJacob Nevins <jacobn@chiark.greenend.org.uk>
Tue, 21 Sep 2004 21:04:28 +0000 (21:04 +0000)
enable login with this version. (I'd suspected as much -- see ssh.c CVS
log 1.299 [r3359] -- and Geoffrey Hughes has now confirmed this.)

[originally from svn r4566]
[r3359 == d534d4e1045b4f5685affad40435ec2d5252cdef]

ssh.c

diff --git a/ssh.c b/ssh.c
index dfcb8a46e84fb735edea61595aeb72d23d084d8c..292fb8b19144fe1f7fcea04d4e10ff3390eccd07 100644 (file)
--- a/ssh.c
+++ b/ssh.c
@@ -1828,7 +1828,7 @@ static void ssh_detect_bugs(Ssh ssh, char *vstring)
         (!strcmp(imp, "1.2.18") || !strcmp(imp, "1.2.19") ||
          !strcmp(imp, "1.2.20") || !strcmp(imp, "1.2.21") ||
          !strcmp(imp, "1.2.22") || !strcmp(imp, "Cisco-1.25") ||
-         !strcmp(imp, "OSU_1.4alpha3")))) {
+         !strcmp(imp, "OSU_1.4alpha3") || !strcmp(imp, "OSU_1.5alpha4")))) {
        /*
         * These versions don't support SSH1_MSG_IGNORE, so we have
         * to use a different defence against password length