summaryrefslogtreecommitdiff
path: root/session.c
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2000-07-11 17:31:38 +1000
committerDamien Miller <djm@mindrot.org>2000-07-11 17:31:38 +1000
commit3702396526a2569402696ff7d7c6d0fe2e5a447b (patch)
tree3ab056c59cd0c732ec179bd91be88d4e05b087fa /session.c
parentbc33bd44a2ef165dea1d974fc2d80b822ae08c2a (diff)
- (djm) OpenBSD CVS updates:
- markus@cvs.openbsd.org 2000/06/26 03:22:29 [authfd.c] cleanup, less cut&paste - markus@cvs.openbsd.org 2000/06/26 15:59:19 [servconf.c servconf.h session.c sshd.8 sshd.c] MaxStartups: limit number of unauthenticated connections, work by theo and me - deraadt@cvs.openbsd.org 2000/07/05 14:18:07 [session.c] use no_x11_forwarding_flag correctly; provos ok - provos@cvs.openbsd.org 2000/07/05 15:35:57 [sshd.c] typo - aaron@cvs.openbsd.org 2000/07/05 22:06:58 [scp.1 ssh-agent.1 ssh-keygen.1 sshd.8] Insert more missing .El directives. Our troff really should identify these and spit out a warning. - todd@cvs.openbsd.org 2000/07/06 21:55:04 [auth-rsa.c auth2.c ssh-keygen.c] clean code is good code - deraadt@cvs.openbsd.org 2000/07/07 02:14:29 [serverloop.c] sense of port forwarding flag test was backwards - provos@cvs.openbsd.org 2000/07/08 17:17:31 [compat.c readconf.c] replace strtok with strsep; from David Young <dyoung@onthejob.net> - deraadt@cvs.openbsd.org 2000/07/08 19:21:15 [auth.h] KNF - ho@cvs.openbsd.org 2000/07/08 19:27:33 [compat.c readconf.c] Better conditions for strsep() ending. - ho@cvs.openbsd.org 2000/07/10 10:27:05 [readconf.c] Get the correct message on errors. (niels@ ok) - ho@cvs.openbsd.org 2000/07/10 10:30:25 [cipher.c kex.c servconf.c] strtok() --> strsep(). (niels@ ok)
Diffstat (limited to 'session.c')
-rw-r--r--session.c15
1 files changed, 10 insertions, 5 deletions
diff --git a/session.c b/session.c
index 7fe2b47f4..96a2d3b52 100644
--- a/session.c
+++ b/session.c
@@ -8,10 +8,7 @@
8 */ 8 */
9 9
10#include "includes.h" 10#include "includes.h"
11RCSID("$OpenBSD: session.c,v 1.20 2000/06/18 04:42:54 markus Exp $"); 11RCSID("$OpenBSD: session.c,v 1.22 2000/07/05 20:18:07 deraadt Exp $");
12#if defined(HAVE_USERSEC_H)
13#include <usersec.h>
14#endif
15 12
16#include "xmalloc.h" 13#include "xmalloc.h"
17#include "ssh.h" 14#include "ssh.h"
@@ -35,6 +32,10 @@ RCSID("$OpenBSD: session.c,v 1.20 2000/06/18 04:42:54 markus Exp $");
35#include <proj.h> 32#include <proj.h>
36#endif /* WITH_IRIX_PROJECT */ 33#endif /* WITH_IRIX_PROJECT */
37 34
35#if defined(HAVE_USERSEC_H)
36#include <usersec.h>
37#endif
38
38#ifdef HAVE_OSF_SIA 39#ifdef HAVE_OSF_SIA
39# include <sia.h> 40# include <sia.h>
40# include <siad.h> 41# include <siad.h>
@@ -90,6 +91,8 @@ static const char *__progname = "sshd";
90extern int log_stderr; 91extern int log_stderr;
91extern int debug_flag; 92extern int debug_flag;
92 93
94extern int startup_pipe;
95
93/* Local Xauthority file. */ 96/* Local Xauthority file. */
94static char *xauthfile; 97static char *xauthfile;
95 98
@@ -166,6 +169,7 @@ do_authenticated(struct passwd * pw)
166 * authentication. 169 * authentication.
167 */ 170 */
168 alarm(0); 171 alarm(0);
172 close(startup_pipe);
169 173
170 /* 174 /*
171 * Inform the channel mechanism that we are the server side and that 175 * Inform the channel mechanism that we are the server side and that
@@ -1457,7 +1461,7 @@ session_subsystem_req(Session *s)
1457int 1461int
1458session_x11_req(Session *s) 1462session_x11_req(Session *s)
1459{ 1463{
1460 if (!no_port_forwarding_flag) { 1464 if (no_x11_forwarding_flag) {
1461 debug("X11 forwarding disabled in user configuration file."); 1465 debug("X11 forwarding disabled in user configuration file.");
1462 return 0; 1466 return 0;
1463 } 1467 }
@@ -1788,6 +1792,7 @@ do_authenticated2(void)
1788 * authentication. 1792 * authentication.
1789 */ 1793 */
1790 alarm(0); 1794 alarm(0);
1795 close(startup_pipe);
1791 server_loop2(); 1796 server_loop2();
1792 if (xauthfile) 1797 if (xauthfile)
1793 xauthfile_cleanup_proc(NULL); 1798 xauthfile_cleanup_proc(NULL);