From: Jacob Nevins Date: Tue, 21 Sep 2004 21:04:28 +0000 (+0000) Subject: Add `OSU_1.5alpha4' to BUG_CHOKES_ON_SSH1_IGNORE; this is apparently enough to X-Git-Tag: r8855-g4f798d~1084 X-Git-Url: https://asedeno.scripts.mit.edu/gitweb/?a=commitdiff_plain;h=98329d723a537079f243926316da973564538edf;p=PuTTY_svn.git Add `OSU_1.5alpha4' to BUG_CHOKES_ON_SSH1_IGNORE; this is apparently enough to enable login with this version. (I'd suspected as much -- see ssh.c CVS log 1.299 [r3359] -- and Geoffrey Hughes has now confirmed this.) git-svn-id: http://svn.tartarus.org/sgt/putty@4566 cda61777-01e9-0310-a592-d414129be87e --- diff --git a/ssh.c b/ssh.c index dfcb8a46..292fb8b1 100644 --- a/ssh.c +++ b/ssh.c @@ -1828,7 +1828,7 @@ static void ssh_detect_bugs(Ssh ssh, char *vstring) (!strcmp(imp, "1.2.18") || !strcmp(imp, "1.2.19") || !strcmp(imp, "1.2.20") || !strcmp(imp, "1.2.21") || !strcmp(imp, "1.2.22") || !strcmp(imp, "Cisco-1.25") || - !strcmp(imp, "OSU_1.4alpha3")))) { + !strcmp(imp, "OSU_1.4alpha3") || !strcmp(imp, "OSU_1.5alpha4")))) { /* * These versions don't support SSH1_MSG_IGNORE, so we have * to use a different defence against password length