diff options
author | Ben Lindstrom <mouring@eviladmin.org> | 2002-06-11 16:42:49 +0000 |
---|---|---|
committer | Ben Lindstrom <mouring@eviladmin.org> | 2002-06-11 16:42:49 +0000 |
commit | ce0f6342702a660f97b57cbdeb671feb02bae382 (patch) | |
tree | f8243804c8a0c71372d6a4fe92759a034e9dce38 /session.c | |
parent | f9c4884c8effe6dd78ab3ed4e42ed69c4a8652d0 (diff) |
- mpech@cvs.openbsd.org 2002/06/11 05:46:20
[auth-krb4.c monitor.h serverloop.c session.c ssh-agent.c sshd.c]
pid_t cleanup. Markus need this now to keep hacking.
markus@, millert@ ok
Diffstat (limited to 'session.c')
-rw-r--r-- | session.c | 28 |
1 files changed, 15 insertions, 13 deletions
@@ -33,7 +33,7 @@ | |||
33 | */ | 33 | */ |
34 | 34 | ||
35 | #include "includes.h" | 35 | #include "includes.h" |
36 | RCSID("$OpenBSD: session.c,v 1.136 2002/06/10 22:28:41 markus Exp $"); | 36 | RCSID("$OpenBSD: session.c,v 1.137 2002/06/11 05:46:20 mpech Exp $"); |
37 | 37 | ||
38 | #include "ssh.h" | 38 | #include "ssh.h" |
39 | #include "ssh1.h" | 39 | #include "ssh1.h" |
@@ -162,8 +162,8 @@ auth_input_request_forwarding(struct passwd * pw) | |||
162 | auth_sock_dir = NULL; | 162 | auth_sock_dir = NULL; |
163 | return 0; | 163 | return 0; |
164 | } | 164 | } |
165 | snprintf(auth_sock_name, MAXPATHLEN, "%s/agent.%d", | 165 | snprintf(auth_sock_name, MAXPATHLEN, "%s/agent.%ld", |
166 | auth_sock_dir, (int) getpid()); | 166 | auth_sock_dir, (long) getpid()); |
167 | 167 | ||
168 | /* delete agent socket on fatal() */ | 168 | /* delete agent socket on fatal() */ |
169 | fatal_add_cleanup(auth_sock_cleanup_proc, pw); | 169 | fatal_add_cleanup(auth_sock_cleanup_proc, pw); |
@@ -435,7 +435,7 @@ do_authenticated1(Authctxt *authctxt) | |||
435 | void | 435 | void |
436 | do_exec_no_pty(Session *s, const char *command) | 436 | do_exec_no_pty(Session *s, const char *command) |
437 | { | 437 | { |
438 | int pid; | 438 | pid_t pid; |
439 | 439 | ||
440 | #ifdef USE_PIPES | 440 | #ifdef USE_PIPES |
441 | int pin[2], pout[2], perr[2]; | 441 | int pin[2], pout[2], perr[2]; |
@@ -1430,12 +1430,12 @@ session_dump(void) | |||
1430 | int i; | 1430 | int i; |
1431 | for (i = 0; i < MAX_SESSIONS; i++) { | 1431 | for (i = 0; i < MAX_SESSIONS; i++) { |
1432 | Session *s = &sessions[i]; | 1432 | Session *s = &sessions[i]; |
1433 | debug("dump: used %d session %d %p channel %d pid %d", | 1433 | debug("dump: used %d session %d %p channel %d pid %ld", |
1434 | s->used, | 1434 | s->used, |
1435 | s->self, | 1435 | s->self, |
1436 | s, | 1436 | s, |
1437 | s->chanid, | 1437 | s->chanid, |
1438 | s->pid); | 1438 | (long)s->pid); |
1439 | } | 1439 | } |
1440 | } | 1440 | } |
1441 | 1441 | ||
@@ -1493,13 +1493,13 @@ static Session * | |||
1493 | session_by_pid(pid_t pid) | 1493 | session_by_pid(pid_t pid) |
1494 | { | 1494 | { |
1495 | int i; | 1495 | int i; |
1496 | debug("session_by_pid: pid %d", pid); | 1496 | debug("session_by_pid: pid %ld", (long)pid); |
1497 | for (i = 0; i < MAX_SESSIONS; i++) { | 1497 | for (i = 0; i < MAX_SESSIONS; i++) { |
1498 | Session *s = &sessions[i]; | 1498 | Session *s = &sessions[i]; |
1499 | if (s->used && s->pid == pid) | 1499 | if (s->used && s->pid == pid) |
1500 | return s; | 1500 | return s; |
1501 | } | 1501 | } |
1502 | error("session_by_pid: unknown pid %d", pid); | 1502 | error("session_by_pid: unknown pid %ld", (long)pid); |
1503 | session_dump(); | 1503 | session_dump(); |
1504 | return NULL; | 1504 | return NULL; |
1505 | } | 1505 | } |
@@ -1789,8 +1789,8 @@ session_exit_message(Session *s, int status) | |||
1789 | if ((c = channel_lookup(s->chanid)) == NULL) | 1789 | if ((c = channel_lookup(s->chanid)) == NULL) |
1790 | fatal("session_exit_message: session %d: no channel %d", | 1790 | fatal("session_exit_message: session %d: no channel %d", |
1791 | s->self, s->chanid); | 1791 | s->self, s->chanid); |
1792 | debug("session_exit_message: session %d channel %d pid %d", | 1792 | debug("session_exit_message: session %d channel %d pid %ld", |
1793 | s->self, s->chanid, s->pid); | 1793 | s->self, s->chanid, (long)s->pid); |
1794 | 1794 | ||
1795 | if (WIFEXITED(status)) { | 1795 | if (WIFEXITED(status)) { |
1796 | channel_request_start(s->chanid, "exit-status", 0); | 1796 | channel_request_start(s->chanid, "exit-status", 0); |
@@ -1829,7 +1829,7 @@ session_exit_message(Session *s, int status) | |||
1829 | void | 1829 | void |
1830 | session_close(Session *s) | 1830 | session_close(Session *s) |
1831 | { | 1831 | { |
1832 | debug("session_close: session %d pid %d", s->self, s->pid); | 1832 | debug("session_close: session %d pid %ld", s->self, (long)s->pid); |
1833 | if (s->ttyfd != -1) { | 1833 | if (s->ttyfd != -1) { |
1834 | fatal_remove_cleanup(session_pty_cleanup, (void *)s); | 1834 | fatal_remove_cleanup(session_pty_cleanup, (void *)s); |
1835 | session_pty_cleanup(s); | 1835 | session_pty_cleanup(s); |
@@ -1853,7 +1853,8 @@ session_close_by_pid(pid_t pid, int status) | |||
1853 | { | 1853 | { |
1854 | Session *s = session_by_pid(pid); | 1854 | Session *s = session_by_pid(pid); |
1855 | if (s == NULL) { | 1855 | if (s == NULL) { |
1856 | debug("session_close_by_pid: no session for pid %d", pid); | 1856 | debug("session_close_by_pid: no session for pid %ld", |
1857 | (long)pid); | ||
1857 | return; | 1858 | return; |
1858 | } | 1859 | } |
1859 | if (s->chanid != -1) | 1860 | if (s->chanid != -1) |
@@ -1873,7 +1874,8 @@ session_close_by_channel(int id, void *arg) | |||
1873 | debug("session_close_by_channel: no session for id %d", id); | 1874 | debug("session_close_by_channel: no session for id %d", id); |
1874 | return; | 1875 | return; |
1875 | } | 1876 | } |
1876 | debug("session_close_by_channel: channel %d child %d", id, s->pid); | 1877 | debug("session_close_by_channel: channel %d child %ld", |
1878 | id, (long)s->pid); | ||
1877 | if (s->pid != 0) { | 1879 | if (s->pid != 0) { |
1878 | debug("session_close_by_channel: channel %d: has child", id); | 1880 | debug("session_close_by_channel: channel %d: has child", id); |
1879 | /* | 1881 | /* |