metasploit-framework/lib/net
Daniel Miller 1aa83b830f Let Resolver#send_tcp take a block
This solves the looping problem. Since the TCP connection wouldn't
necessarily close, we couldn't count on a 0-length recv, and the
connection was timing out. Changed it so send_tcp can take a block, in
which we do parsing. AXFR responses are sandwiched between SOA answers,
so when the second one is reached, the transfer is done.

This is also cleaner for existing code that uses send_tcp, since if no
block is passed, it just returns the first response and tears down the
connection, just like it used to.
2012-08-20 20:51:18 -05:00
..
dns Let Resolver#send_tcp take a block 2012-08-20 20:51:18 -05:00
ssh Add Opt::Proxies and opthash[:proxies] to ssh mods 2012-08-12 16:23:22 -04:00
dns.rb Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
ssh.rb This commit allows ssh_login to use socks proxies. Net::SSH::Transport::Session could take a :proxy option, 2012-08-12 16:01:52 -04:00
ssh.rb.ut.rb Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00