亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲(chóng)蟲(chóng)下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲(chóng)蟲(chóng)下載站

?? ssh.c

?? C++編寫(xiě)
?? C
?? 第 1 頁(yè) / 共 3 頁(yè)
字號(hào):
		case 'm':			if (mac_valid(optarg))				options.macs = xstrdup(optarg);			else {				fprintf(stderr, "Unknown mac type '%s'\n",				    optarg);				exit(1);			}			break;		case 'p':			options.port = a2port(optarg);			if (options.port == 0) {				fprintf(stderr, "Bad port '%s'\n", optarg);				exit(1);			}			break;		case 'l':			options.user = optarg;			break;		case 'L':		case 'R':			if (sscanf(optarg, "%5[0-9]:%255[^:]:%5[0-9]",			    sfwd_port, buf, sfwd_host_port) != 3 &&			    sscanf(optarg, "%5[0-9]/%255[^/]/%5[0-9]",			    sfwd_port, buf, sfwd_host_port) != 3) {				fprintf(stderr,				    "Bad forwarding specification '%s'\n",				    optarg);				usage();				/* NOTREACHED */			}			if ((fwd_port = a2port(sfwd_port)) == 0 ||			    (fwd_host_port = a2port(sfwd_host_port)) == 0) {				fprintf(stderr,				    "Bad forwarding port(s) '%s'\n", optarg);				exit(1);			}			if (opt == 'L')				add_local_forward(&options, fwd_port, buf,				    fwd_host_port);			else if (opt == 'R')				add_remote_forward(&options, fwd_port, buf,				    fwd_host_port);			break;		case 'D':			fwd_port = a2port(optarg);			if (fwd_port == 0) {				fprintf(stderr, "Bad dynamic port '%s'\n",				    optarg);				exit(1);			}			add_local_forward(&options, fwd_port, "socks4", 0);			break;		case 'C':			options.compression = 1;			break;		case 'N':			no_shell_flag = 1;			no_tty_flag = 1;			break;		case 'T':			no_tty_flag = 1;			break;		case 'o':			dummy = 1;			if (process_config_line(&options, host ? host : "",			    optarg, "command-line", 0, &dummy) != 0)				exit(1);			break;		case 's':			subsystem_flag = 1;			break;		case 'b':			options.bind_address = optarg;			break;		case 'F':			config = optarg;			break;		default:			usage();		}	}	ac -= optind;	av += optind;	if (ac > 0 && !host && **av != '-') {		if (strrchr(*av, '@')) {			p = xstrdup(*av);			cp = strrchr(p, '@');			if (cp == NULL || cp == p)				usage();			options.user = p;			*cp = '\0';			host = ++cp;		} else			host = *av;		if (ac > 1) {			optind = optreset = 1;			goto again;		}		ac--, av++;	}	/* Check that we got a host name. */	if (!host)		usage();	SSLeay_add_all_algorithms();	ERR_load_crypto_strings();	channel_set_af(IPv4or6);	/* Initialize the command to execute on remote host. */	buffer_init(&command);	/*	 * Save the command to execute on the remote host in a buffer. There	 * is no limit on the length of the command, except by the maximum	 * packet size.  Also sets the tty flag if there is no command.	 */	if (!ac) {		/* No command specified - execute shell on a tty. */		tty_flag = 1;		if (subsystem_flag) {			fprintf(stderr,			    "You must specify a subsystem to invoke.\n");			usage();		}	} else {		/* A command has been specified.  Store it into the buffer. */		for (i = 0; i < ac; i++) {			if (i)				buffer_append(&command, " ", 1);			buffer_append(&command, av[i], strlen(av[i]));		}	}	/* Cannot fork to background if no command. */	if (fork_after_authentication_flag && buffer_len(&command) == 0 && !no_shell_flag)		fatal("Cannot fork into background without a command to execute.");	/* Allocate a tty by default if no command specified. */	if (buffer_len(&command) == 0)		tty_flag = 1;	/* Force no tty */	if (no_tty_flag)		tty_flag = 0;	/* Do not allocate a tty if stdin is not a tty. */	if (!isatty(fileno(stdin)) && !force_tty_flag) {		if (tty_flag)			log("Pseudo-terminal will not be allocated because stdin is not a terminal.");		tty_flag = 0;	}	/*	 * Initialize "log" output.  Since we are the client all output	 * actually goes to stderr.	 */	log_init(av[0], options.log_level == -1 ? SYSLOG_LEVEL_INFO : options.log_level,	    SYSLOG_FACILITY_USER, 1);	/*	 * Read per-user configuration file.  Ignore the system wide config	 * file if the user specifies a config file on the command line.	 */	if (config != NULL) {		if (!read_config_file(config, host, &options))			fatal("Can't open user config file %.100s: "			    "%.100s", config, strerror(errno));	} else  {		snprintf(buf, sizeof buf, "%.100s/%.100s", pw->pw_dir,		    _PATH_SSH_USER_CONFFILE);		(void)read_config_file(buf, host, &options);		/* Read systemwide configuration file after use config. */		(void)read_config_file(_PATH_HOST_CONFIG_FILE, host, &options);	}	/* Fill configuration defaults. */	fill_default_options(&options);	/* reinit */	log_init(av[0], options.log_level, SYSLOG_FACILITY_USER, 1);	if (options.user == NULL)		options.user = xstrdup(pw->pw_name);	if (options.hostname != NULL)		host = options.hostname;	if (options.proxy_command != NULL &&	    strcmp(options.proxy_command, "none") == 0)		options.proxy_command = NULL;	/* Disable rhosts authentication if not running as root. */	if (original_effective_uid != 0 || !options.use_privileged_port) {		debug("Rhosts Authentication disabled, "		    "originating port will not be trusted.");		options.rhosts_authentication = 0;	}	/* Open a connection to the remote host. */	if (ssh_connect(host, &hostaddr, options.port, IPv4or6,	    options.connection_attempts,	    original_effective_uid == 0 && options.use_privileged_port,	    options.proxy_command) != 0)		exit(1);	/*	 * If we successfully made the connection, load the host private key	 * in case we will need it later for combined rsa-rhosts	 * authentication. This must be done before releasing extra	 * privileges, because the file is only readable by root.	 * If we cannot access the private keys, load the public keys	 * instead and try to execute the ssh-keysign helper instead.	 */	sensitive_data.nkeys = 0;	sensitive_data.keys = NULL;	sensitive_data.external_keysign = 0;	if (options.rhosts_rsa_authentication ||	    options.hostbased_authentication) {		sensitive_data.nkeys = 3;		sensitive_data.keys = xmalloc(sensitive_data.nkeys *		    sizeof(Key));		PRIV_START;		sensitive_data.keys[0] = key_load_private_type(KEY_RSA1,		    _PATH_HOST_KEY_FILE, "", NULL);		sensitive_data.keys[1] = key_load_private_type(KEY_DSA,		    _PATH_HOST_DSA_KEY_FILE, "", NULL);		sensitive_data.keys[2] = key_load_private_type(KEY_RSA,		    _PATH_HOST_RSA_KEY_FILE, "", NULL);		PRIV_END;		if (options.hostbased_authentication == 1 &&		    sensitive_data.keys[0] == NULL &&		    sensitive_data.keys[1] == NULL &&		    sensitive_data.keys[2] == NULL) {			sensitive_data.keys[1] = key_load_public(			    _PATH_HOST_DSA_KEY_FILE, NULL);			sensitive_data.keys[2] = key_load_public(			    _PATH_HOST_RSA_KEY_FILE, NULL);			sensitive_data.external_keysign = 1;		}	}	/*	 * Get rid of any extra privileges that we may have.  We will no	 * longer need them.  Also, extra privileges could make it very hard	 * to read identity files and other non-world-readable files from the	 * user's home directory if it happens to be on a NFS volume where	 * root is mapped to nobody.	 */	seteuid(original_real_uid);	setuid(original_real_uid);	/*	 * Now that we are back to our own permissions, create ~/.ssh	 * directory if it doesn\'t already exist.	 */	snprintf(buf, sizeof buf, "%.100s%s%.100s", pw->pw_dir, strcmp(pw->pw_dir, "/") ? "/" : "", _PATH_SSH_USER_DIR);	if (stat(buf, &st) < 0)		if (mkdir(buf, 0700) < 0)			error("Could not create directory '%.200s'.", buf);	/* load options.identity_files */	load_public_identity_files();	/* Expand ~ in known host file names. */	/* XXX mem-leaks: */	options.system_hostfile =	    tilde_expand_filename(options.system_hostfile, original_real_uid);	options.user_hostfile =	    tilde_expand_filename(options.user_hostfile, original_real_uid);	options.system_hostfile2 =	    tilde_expand_filename(options.system_hostfile2, original_real_uid);	options.user_hostfile2 =	    tilde_expand_filename(options.user_hostfile2, original_real_uid);	signal(SIGPIPE, SIG_IGN); /* ignore SIGPIPE early */	/* Log into the remote system.  This never returns if the login fails. */	ssh_login(&sensitive_data, host, (struct sockaddr *)&hostaddr, pw);	/* We no longer need the private host keys.  Clear them now. */	if (sensitive_data.nkeys != 0) {		for (i = 0; i < sensitive_data.nkeys; i++) {			if (sensitive_data.keys[i] != NULL) {				/* Destroys contents safely */				debug3("clear hostkey %d", i);				key_free(sensitive_data.keys[i]);				sensitive_data.keys[i] = NULL;			}		}		xfree(sensitive_data.keys);	}	for (i = 0; i < options.num_identity_files; i++) {		if (options.identity_files[i]) {			xfree(options.identity_files[i]);			options.identity_files[i] = NULL;		}		if (options.identity_keys[i]) {			key_free(options.identity_keys[i]);			options.identity_keys[i] = NULL;		}	}	exit_status = compat20 ? ssh_session2() : ssh_session();	packet_close();	/*	 * Send SIGHUP to proxy command if used. We don't wait() in 	 * case it hangs and instead rely on init to reap the child	 */	if (proxy_command_pid > 1)		kill(proxy_command_pid, SIGHUP);	return exit_status;}static voidx11_get_proto(char **_proto, char **_data){	char line[512];	static char proto[512], data[512];	FILE *f;	int got_data = 0, i;	char *display;	struct stat st;	*_proto = proto;	*_data = data;	proto[0] = data[0] = '\0';	if (!options.xauth_location ||	    (stat(options.xauth_location, &st) == -1)) {		debug("No xauth program.");	} else {		if ((display = getenv("DISPLAY")) == NULL) {			debug("x11_get_proto: DISPLAY not set");			return;		}		/* Try to get Xauthority information for the display. */		if (strncmp(display, "localhost:", 10) == 0)			/*			 * Handle FamilyLocal case where $DISPLAY does			 * not match an authorization entry.  For this we			 * just try "xauth list unix:displaynum.screennum".			 * XXX: "localhost" match to determine FamilyLocal			 *      is not perfect.			 */			snprintf(line, sizeof line, "%s list unix:%s 2>"			    _PATH_DEVNULL, options.xauth_location, display+10);		else			snprintf(line, sizeof line, "%s list %.200s 2>"			    _PATH_DEVNULL, options.xauth_location, display);		debug2("x11_get_proto: %s", line);		f = popen(line, "r");		if (f && fgets(line, sizeof(line), f) &&		    sscanf(line, "%*s %511s %511s", proto, data) == 2)			got_data = 1;		if (f)			pclose(f);	}	/*	 * If we didn't get authentication data, just make up some	 * data.  The forwarding code will check the validity of the	 * response anyway, and substitute this data.  The X11	 * server, however, will ignore this fake data and use	 * whatever authentication mechanisms it was using otherwise	 * for the local connection.	 */	if (!got_data) {		u_int32_t rand = 0;		log("Warning: No xauth data; using fake authentication data for X11 forwarding.");		strlcpy(proto, "MIT-MAGIC-COOKIE-1", sizeof proto);		for (i = 0; i < 16; i++) {			if (i % 4 == 0)				rand = arc4random();			snprintf(data + 2 * i, sizeof data - 2 * i, "%02x", rand & 0xff);			rand >>= 8;		}	}}static voidssh_init_forwarding(void){	int success = 0;	int i;

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美精品久久天天躁| 亚洲欧美日韩国产一区二区三区 | 久久久久久99精品| 91麻豆精品在线观看| 国产伦精品一区二区三区免费迷| 亚洲国产精品一区二区久久| 中文字幕一区二区三| 精品福利av导航| 在线看日韩精品电影| 99视频热这里只有精品免费| 奇米精品一区二区三区四区| 亚洲午夜久久久| 国产精品不卡在线观看| 久久亚洲综合色| 欧美一级片在线看| 91麻豆精品国产91久久久久久| 色婷婷亚洲一区二区三区| 国产一区在线视频| 久久国产福利国产秒拍| 亚洲综合色丁香婷婷六月图片| 亚洲婷婷在线视频| 国产精品无遮挡| 日韩精品一区二区三区在线观看| 欧美一区二区视频在线观看2022| 国产精品亚洲成人| 蜜臀精品久久久久久蜜臀| 自拍视频在线观看一区二区| 中文字幕亚洲一区二区av在线| 国产蜜臀av在线一区二区三区| 欧美成人乱码一区二区三区| 欧美一级日韩免费不卡| 精品av久久707| 欧美tickling网站挠脚心| 精品国产亚洲在线| 欧美军同video69gay| 欧美性xxxxxx少妇| 91视频一区二区三区| 国产·精品毛片| 91麻豆高清视频| 欧美网站大全在线观看| 懂色av噜噜一区二区三区av| 99久久99久久免费精品蜜臀| 91老师国产黑色丝袜在线| 欧美视频中文字幕| 3d成人动漫网站| 欧美成人精品高清在线播放| 国产欧美精品日韩区二区麻豆天美| 中文字幕国产一区二区| 一二三四社区欧美黄| 午夜精品免费在线观看| 久草精品在线观看| 丁香啪啪综合成人亚洲小说 | 欧美色综合网站| 日韩一区二区电影在线| 久久久久久久电影| 亚洲欧美一区二区不卡| 日本怡春院一区二区| 国产制服丝袜一区| 色综合久久中文字幕| 在线这里只有精品| 精品久久久久久亚洲综合网| 中文字幕精品一区二区精品绿巨人| 亚洲综合自拍偷拍| 夜夜嗨av一区二区三区网页| 久久国产婷婷国产香蕉| jvid福利写真一区二区三区| 欧美亚洲一区二区在线观看| 欧美放荡的少妇| 欧美色图免费看| 国产午夜久久久久| 亚洲成人动漫一区| 国产盗摄精品一区二区三区在线| 91亚洲精品久久久蜜桃| 精品成人在线观看| 亚洲精品亚洲人成人网在线播放| 久久精品国产77777蜜臀| 99久久亚洲一区二区三区青草| 在线不卡的av| 国产精品久线在线观看| 蜜臀av一区二区| 91亚洲精品乱码久久久久久蜜桃| 欧美一区二区视频在线观看2020| 亚洲视频一区二区在线观看| 久久精品久久精品| 欧美日韩亚洲丝袜制服| 国产偷国产偷精品高清尤物| 五月婷婷激情综合| 成人app软件下载大全免费| 91精品国产综合久久福利| 日本一二三四高清不卡| 美女网站一区二区| 91成人网在线| 中文字幕中文字幕一区| 国产乱国产乱300精品| 欧美亚洲国产一区二区三区| 国产精品伦一区二区三级视频| 日韩国产欧美三级| 91污在线观看| 日韩久久精品一区| 亚洲精品第1页| 国产成人午夜精品5599| 欧美v日韩v国产v| 污片在线观看一区二区| 欧美主播一区二区三区| 亚洲欧美一区二区三区久本道91 | 99久久精品免费看国产| 久久精品亚洲一区二区三区浴池| 视频一区中文字幕国产| 欧美羞羞免费网站| 国产精品家庭影院| 极品少妇一区二区| 欧美成人一区二区三区在线观看| 天天色图综合网| 欧美日韩视频在线一区二区| 亚洲自拍偷拍综合| 色婷婷国产精品综合在线观看| 国产精品久久久久久久久免费相片 | 六月丁香婷婷久久| 欧美精选在线播放| 亚洲电影在线播放| 欧美在线不卡视频| 一区二区三区高清不卡| 97se亚洲国产综合自在线观| 国产精品久久三| 成人av在线影院| 中文字幕不卡在线播放| 岛国一区二区三区| 中文字幕一区av| 色综合一个色综合| 一区二区三区在线观看国产| 色偷偷一区二区三区| 伊人性伊人情综合网| 欧美亚洲丝袜传媒另类| 午夜私人影院久久久久| 欧美巨大另类极品videosbest| 日韩黄色一级片| 日韩小视频在线观看专区| 久久爱另类一区二区小说| 国产亚洲综合av| 成人网在线免费视频| 国产精品久久久久久久久久免费看| 成人禁用看黄a在线| 亚洲精品视频一区二区| 欧美精品一二三区| 狠狠色丁香婷婷综合| 国产丝袜在线精品| 91啪在线观看| 亚洲bt欧美bt精品777| 精品日韩在线观看| 国产成人丝袜美腿| 亚洲精品久久久久久国产精华液| 精品1区2区3区| 久久99精品久久久久久动态图 | 亚洲mv在线观看| 国产精品亚洲人在线观看| 国产精品午夜在线| 色94色欧美sute亚洲13| 午夜电影久久久| 久久午夜免费电影| 成人av综合一区| 一区二区三区毛片| eeuss国产一区二区三区| 一区二区三区在线影院| 91精品国产高清一区二区三区| 国产美女主播视频一区| 国产欧美日本一区视频| fc2成人免费人成在线观看播放| 亚洲视频一区二区在线观看| 欧美自拍偷拍午夜视频| 石原莉奈在线亚洲三区| 欧美精品tushy高清| 国产精品一区二区视频| 一级日本不卡的影视| 精品奇米国产一区二区三区| 99精品在线免费| 麻豆精品一区二区三区| 亚洲天堂成人在线观看| 欧美日韩精品一区视频| 国产中文字幕精品| 国产精品久久久久久久久图文区| 91精品国产综合久久久久久漫画| 国产91清纯白嫩初高中在线观看| 一区二区三区**美女毛片| 26uuu国产电影一区二区| 色噜噜夜夜夜综合网| 国产一区视频网站| 亚洲国产三级在线| 中文字幕中文字幕一区二区| 欧美日韩高清一区二区三区| 国产不卡在线一区| 日本怡春院一区二区| 亚洲精品亚洲人成人网在线播放| 欧美精品一区二| 欧美精品少妇一区二区三区| 久久国产精品区| 丝袜a∨在线一区二区三区不卡| 亚洲欧美偷拍另类a∨色屁股| 2021中文字幕一区亚洲| 欧美巨大另类极品videosbest | 亚洲综合色在线|