diff options
author | Matt Johnston <matt@ucc.asn.au> | 2006-03-21 16:16:41 +0000 |
---|---|---|
committer | Matt Johnston <matt@ucc.asn.au> | 2006-03-21 16:16:41 +0000 |
commit | cdbe853595d1ba06be4127d86c60a9bc2e9e3545 (patch) | |
tree | c69a24fd85c5048ca1e0e138858ad9de04ba2373 /libtomcrypt/src/hashes/helper/hash_memory_multi.c | |
parent | 3f49fc5f2ca0ec4adb5cac081f502cbb86702efa (diff) |
A hack to make dbclient to tcp forwarding netcat style.
eg
./dbclient -i testkey -L 1234:remotehost:remoteport tunnelhost
will ssh to tunnelhost (using testkey, there's no way to ask for a password)
and then tcpfwd to remotehost:remoteport on stdin/stdout.
There's no way to give a cmdline password, so -i for a keyfile will have to do.
Yet another reason for agent forwarding.
The 1234 is a dummy var, I think it has to be a valid portnumber though.
--HG--
branch : dbclient-netcat-alike
extra : convert_revision : d1f69334581dc4c35f9ca16aa5355074c9dd315d
Diffstat (limited to 'libtomcrypt/src/hashes/helper/hash_memory_multi.c')
0 files changed, 0 insertions, 0 deletions