From owner-freebsd-hackers Thu Feb 2 10:12:36 1995 Return-Path: hackers-owner Received: (from root@localhost) by freefall.cdrom.com (8.6.9/8.6.6) id KAA12309 for hackers-outgoing; Thu, 2 Feb 1995 10:12:36 -0800 Received: from wcarchive.cdrom.com (wcarchive.cdrom.com [192.216.191.11]) by freefall.cdrom.com (8.6.9/8.6.6) with ESMTP id KAA12302 for ; Thu, 2 Feb 1995 10:12:35 -0800 Received: from cs.weber.edu (cs.weber.edu [137.190.16.16]) by wcarchive.cdrom.com (8.6.8/8.6.6) with SMTP id KAA07425 for ; Thu, 2 Feb 1995 10:12:29 -0800 Received: by cs.weber.edu (4.1/SMI-4.1.1) id AA13816; Thu, 2 Feb 95 11:06:31 MST From: terry@cs.weber.edu (Terry Lambert) Message-Id: <9502021806.AA13816@cs.weber.edu> Subject: Re: chat(8) improvements for SL/IP dialout. To: peter@bonkers.taronga.com (Peter da Silva) Date: Thu, 2 Feb 95 11:06:31 MST Cc: ponds!rivers@dg-rtp.dg.com, freebsd-hackers@wcarchive.cdrom.com, longyear@netcom.com In-Reply-To: <199502021112.FAA11158@bonkers.taronga.com> from "Peter da Silva" at Feb 2, 95 05:12:29 am X-Mailer: ELM [version 2.4dev PL52] Sender: hackers-owner@FreeBSD.org Precedence: bulk > > Looks nifty. One point: > > > t.c_lflag = 0; > > + if(command) { > > + /* If we're going to execute a command, don't hang-up */ > > + /* the device when we're done. */ > > + t.c_cflag &= ~HUPCL; > > + } > > t.c_cc[VERASE] = t.c_cc[VKILL] = 0; > > Why not? Oh, for SLIP or PPP where the command just establishes a connection > that's useful, but for a situation where you're running some conventional > command (like, say, a dialback security mechanism) you want to retain HUPCL. Or you could do what everyone has done since time immemorial and open with a sleep the device so that the chat closer is not the final closer. Then the problem that the patch supposedly fixes will never occur. Terry Lambert terry@cs.weber.edu --- Any opinions in this posting are my own and not those of my present or previous employers.