Lines Matching refs:host

93 	char *host_to_connect;		/* Connect to 'host'. */
98 /* List of all permitted host/port pairs to connect. */
101 /* Number of permitted host/port pairs in the array. */
897 char *p, *host;
943 host = inet_ntoa(s4_req.dest_addr);
944 strlcpy(c->path, host, sizeof(c->path));
947 debug("channel %d: dynamic request: socks4 host %s port %u command %u",
948 c->self, host, c->host_port, s4_req.command);
1058 buffer_consume(&c->input, 1); /* host string length */
1068 debug2("channel %d: dynamic request: socks5 host %s port %u command %u",
1215 /* target host, port */
1223 /* originator host and port */
2120 char *host, *originator_string;
2124 host = packet_get_string(NULL);
2133 sock = channel_connect_to(host, host_port);
2145 xfree(host);
2164 const char *host, *addr;
2167 host = (type == SSH_CHANNEL_RPORT_LISTENER) ?
2171 if (host == NULL) {
2172 error("No forward host name.");
2175 if (strlen(host) > SSH_CHANNEL_PATH_LEN - 1) {
2176 error("Forward host name too long.");
2242 /* Create a port to listen for the host. */
2280 strlcpy(c->path, host, sizeof(c->path));
2293 channel_cancel_rport_listener(const char *host, u_short port)
2302 strncmp(c->path, host, sizeof(c->path)) == 0 &&
2333 * Initiate forwarding of connections to port "port" on remote host through
2334 * the secure channel to host:port from local side.
2343 /* Record locally that connection to this host/port is permitted. */
2412 * Request cancellation of remote forwarding of connection host:port from
2416 channel_request_rforward_cancel(const char *host, u_short port)
2435 packet_put_cstring(host == NULL ? "" : host);
2480 * Permits opening to any host/port if permitted_opens[] is empty. This is
2492 channel_add_permitted_opens(char *host, int port)
2496 debug("allow port forwarding to host %s port %d", host, port);
2498 permitted_opens[num_permitted_opens].host_to_connect = xstrdup(host);
2516 /* return socket to remote host, port */
2518 connect_to(const char *host, u_short port)
2529 if ((gaierr = getaddrinfo(host, strport, &hints, &aitop)) != 0) {
2530 error("connect_to %.100s: unknown host (%s)", host,
2561 error("connect_to %.100s port %d: failed.", host, port);
2586 channel_connect_to(const char *host, u_short port)
2594 strcmp(permitted_opens[i].host_to_connect, host) == 0)
2599 log("Received request to connect to host %.100s port %d, "
2600 "but the request was denied.", host, port);
2603 return connect_to(host, port);
2801 /* buf now contains the host name. But first we parse the display number. */
2808 /* Look up the host address */
2814 error("%.100s: unknown host. (%s)", buf, gai_strerror(gaierr));
2879 /* Send refusal to the remote host. */
2883 /* Send a confirmation to the remote host. */
3028 /* Send a confirmation to the remote host. */