# HG changeset patch
# User Matt Johnston <matt@ucc.asn.au>
# Date 1519654359 -28800
# Node ID bb55dffab5ba55a8a0f172b8533f7b21c68a9dc3
# Parent  03a42f41cf2c1a7dc44ea915132541d41896f3c6
don't log server listen ports

diff -r 03a42f41cf2c -r bb55dffab5ba svr-tcpfwd.c
--- a/svr-tcpfwd.c	Mon Feb 26 22:08:53 2018 +0800
+++ b/svr-tcpfwd.c	Mon Feb 26 22:12:39 2018 +0800
@@ -94,7 +94,7 @@
 			buf_putbyte(ses.writepayload, SSH_MSG_REQUEST_SUCCESS);
 			buf_putint(ses.writepayload, allocated_listen_port);
 			encrypt_packet();
-			wantreply = 0; //so out does not do so
+			wantreply = 0; /* avoid out: below sending another reply */
 		}
 	} else if (strcmp("cancel-tcpip-forward", reqname) == 0) {
 		ret = svr_cancelremotetcp();
@@ -212,9 +212,6 @@
 	if (DROPBEAR_SUCCESS == ret) {
 		tcpinfo->listenport = get_sock_port(ses.listeners[0]->socks[0]);
 		*allocated_listen_port = tcpinfo->listenport;
-		dropbear_log(LOG_INFO, "tcpip-forward %s:%d '%s'", 
-			((NULL == tcpinfo->listenaddr)?"localhost":tcpinfo->listenaddr), 
-			tcpinfo->listenport, ses.authstate.pw_name);
 	}
 
 out: