- i = strlen(cfg.termtype);
- s_wrpkt_start(10, i+5*4+1);
- pktout.body[0] = (i >> 24) & 0xFF;
- pktout.body[1] = (i >> 16) & 0xFF;
- pktout.body[2] = (i >> 8) & 0xFF;
- pktout.body[3] = i & 0xFF;
- memcpy(pktout.body+4, cfg.termtype, i);
- i += 4;
- pktout.body[i++] = (rows >> 24) & 0xFF;
- pktout.body[i++] = (rows >> 16) & 0xFF;
- pktout.body[i++] = (rows >> 8) & 0xFF;
- pktout.body[i++] = rows & 0xFF;
- pktout.body[i++] = (cols >> 24) & 0xFF;
- pktout.body[i++] = (cols >> 16) & 0xFF;
- pktout.body[i++] = (cols >> 8) & 0xFF;
- pktout.body[i++] = cols & 0xFF;
- memset(pktout.body+i, 0, 9); /* 0 pixwidth, 0 pixheight, 0.b endofopt */
- s_wrpkt();
- ssh_state = SSH_STATE_INTERMED;
- do { crReturnV; } while (!ispkt);
- if (pktin.type != 14 && pktin.type != 15) {
- fatalbox("Protocol confusion");
- } else if (pktin.type == 15) {
- c_write("Server refused to allocate pty\r\n", 32);
+ if (!cfg.nopty) {
+ i = strlen(cfg.termtype);
+ s_wrpkt_start(10, i+5*4+1);
+ pktout.body[0] = (i >> 24) & 0xFF;
+ pktout.body[1] = (i >> 16) & 0xFF;
+ pktout.body[2] = (i >> 8) & 0xFF;
+ pktout.body[3] = i & 0xFF;
+ memcpy(pktout.body+4, cfg.termtype, i);
+ i += 4;
+ pktout.body[i++] = (rows >> 24) & 0xFF;
+ pktout.body[i++] = (rows >> 16) & 0xFF;
+ pktout.body[i++] = (rows >> 8) & 0xFF;
+ pktout.body[i++] = rows & 0xFF;
+ pktout.body[i++] = (cols >> 24) & 0xFF;
+ pktout.body[i++] = (cols >> 16) & 0xFF;
+ pktout.body[i++] = (cols >> 8) & 0xFF;
+ pktout.body[i++] = cols & 0xFF;
+ memset(pktout.body+i, 0, 9); /* 0 pixwidth, 0 pixheight, 0.b endofopt */
+ s_wrpkt();
+ ssh_state = SSH_STATE_INTERMED;
+ do { crReturnV; } while (!ispkt);
+ if (pktin.type != 14 && pktin.type != 15) {
+ fatalbox("Protocol confusion");
+ } else if (pktin.type == 15) {
+ c_write("Server refused to allocate pty\r\n", 32);
+ }