Add `OSU_1.5alpha4' to BUG_CHOKES_ON_SSH1_IGNORE; this is apparently enough to
authorjacob <jacob@cda61777-01e9-0310-a592-d414129be87e>
Tue, 21 Sep 2004 21:04:28 +0000 (21:04 +0000)
committerjacob <jacob@cda61777-01e9-0310-a592-d414129be87e>
Tue, 21 Sep 2004 21:04:28 +0000 (21:04 +0000)
enable login with this version. (I'd suspected as much -- see ssh.c CVS
log 1.299 [r3359] -- and Geoffrey Hughes has now confirmed this.)

git-svn-id: svn://svn.tartarus.org/sgt/putty@4566 cda61777-01e9-0310-a592-d414129be87e

ssh.c

diff --git a/ssh.c b/ssh.c
index dfcb8a4..292fb8b 100644 (file)
--- a/ssh.c
+++ b/ssh.c
@@ -1828,7 +1828,7 @@ static void ssh_detect_bugs(Ssh ssh, char *vstring)
         (!strcmp(imp, "1.2.18") || !strcmp(imp, "1.2.19") ||
          !strcmp(imp, "1.2.20") || !strcmp(imp, "1.2.21") ||
          !strcmp(imp, "1.2.22") || !strcmp(imp, "Cisco-1.25") ||
-         !strcmp(imp, "OSU_1.4alpha3")))) {
+         !strcmp(imp, "OSU_1.4alpha3") || !strcmp(imp, "OSU_1.5alpha4")))) {
        /*
         * These versions don't support SSH1_MSG_IGNORE, so we have
         * to use a different defence against password length