CHAN_X11,
CHAN_AGENT,
CHAN_SOCKDATA,
- CHAN_SOCKDATA_DORMANT, /* one the remote hasn't confirmed */
/*
* CHAN_SHARING indicates a channel which is tracked here on
* behalf of a connection-sharing downstream. We do almost nothing
x11_close(c->u.x11.xconn);
break;
case CHAN_SOCKDATA:
- case CHAN_SOCKDATA_DORMANT:
pfd_close(c->u.pfd.pf);
break;
}
"error: %s", err);
break;
case CHAN_SOCKDATA:
- case CHAN_SOCKDATA_DORMANT:
pfd_close(c->u.pfd.pf);
logeventf(ssh, "Forwarded port closed due to local error: %s", err);
break;
struct ssh_channel *c;
c = ssh_channel_msg(ssh, pktin);
- if (c && c->type == CHAN_SOCKDATA_DORMANT) {
+ if (c && c->type == CHAN_SOCKDATA) {
c->remoteid = ssh_pkt_getuint32(pktin);
c->halfopen = FALSE;
- c->type = CHAN_SOCKDATA;
c->throttling_conn = 0;
pfd_confirm(c->u.pfd.pf);
}
struct ssh_channel *c;
c = ssh_channel_msg(ssh, pktin);
- if (c && c->type == CHAN_SOCKDATA_DORMANT) {
+ if (c && c->type == CHAN_SOCKDATA) {
logevent("Forwarded connection refused by server");
pfd_close(c->u.pfd.pf);
del234(ssh->channels, c);
c->v.v2.remwindow = ssh_pkt_getuint32(pktin);
c->v.v2.remmaxpkt = ssh_pkt_getuint32(pktin);
- if (c->type == CHAN_SOCKDATA_DORMANT) {
- c->type = CHAN_SOCKDATA;
+ if (c->type == CHAN_SOCKDATA) {
if (c->u.pfd.pf)
pfd_confirm(c->u.pfd.pf);
} else if (c->type == CHAN_ZOMBIE) {
return;
assert(c->halfopen); /* ssh_channel_msg will have enforced this */
- if (c->type == CHAN_SOCKDATA_DORMANT) {
+ if (c->type == CHAN_SOCKDATA) {
reason_code = ssh_pkt_getuint32(pktin);
if (reason_code >= lenof(reasons))
reason_code = 0; /* ensure reasons[reason_code] in range */
x11_close(c->u.x11.xconn);
break;
case CHAN_SOCKDATA:
- case CHAN_SOCKDATA_DORMANT:
if (c->u.pfd.pf != NULL)
pfd_close(c->u.pfd.pf);
break;
c->ssh = ssh;
ssh_channel_init(c);
c->halfopen = TRUE;
- c->type = CHAN_SOCKDATA_DORMANT;/* identify channel type */
+ c->type = CHAN_SOCKDATA;/* identify channel type */
c->u.pfd.pf = pf;
return c;
}