diff options
author | Colin Watson <cjwatson@debian.org> | 2010-08-23 23:52:36 +0100 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2010-08-23 23:52:36 +0100 |
commit | 78799892cb1858927be02be9737c594052e3f910 (patch) | |
tree | ac3dc2e848ab9dc62fe4252e01e52c3d456f628f /sftp-client.c | |
parent | 3875951bb76a9ec62634ae4026c9cc885d933477 (diff) | |
parent | 31e30b835fd9695d3b6647cab4867001b092e28f (diff) |
* New upstream release (http://www.openssh.com/txt/release-5.6):
- Added a ControlPersist option to ssh_config(5) that automatically
starts a background ssh(1) multiplex master when connecting. This
connection can stay alive indefinitely, or can be set to automatically
close after a user-specified duration of inactivity (closes: #335697,
#350898, #454787, #500573, #550262).
- Support AuthorizedKeysFile, AuthorizedPrincipalsFile,
HostbasedUsesNameFromPacketOnly, and PermitTunnel in sshd_config(5)
Match blocks (closes: #549858).
- sftp(1): fix ls in working directories that contain globbing
characters in their pathnames (LP: #530714).
Diffstat (limited to 'sftp-client.c')
-rw-r--r-- | sftp-client.c | 7 |
1 files changed, 4 insertions, 3 deletions
diff --git a/sftp-client.c b/sftp-client.c index 6124c0f40..9dab47780 100644 --- a/sftp-client.c +++ b/sftp-client.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: sftp-client.c,v 1.90 2009/10/11 10:41:26 dtucker Exp $ */ | 1 | /* $OpenBSD: sftp-client.c,v 1.92 2010/07/19 03:16:33 djm Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2001-2004 Damien Miller <djm@openbsd.org> | 3 | * Copyright (c) 2001-2004 Damien Miller <djm@openbsd.org> |
4 | * | 4 | * |
@@ -713,7 +713,8 @@ do_realpath(struct sftp_conn *conn, char *path) | |||
713 | u_int status = buffer_get_int(&msg); | 713 | u_int status = buffer_get_int(&msg); |
714 | 714 | ||
715 | error("Couldn't canonicalise: %s", fx2txt(status)); | 715 | error("Couldn't canonicalise: %s", fx2txt(status)); |
716 | return(NULL); | 716 | buffer_free(&msg); |
717 | return NULL; | ||
717 | } else if (type != SSH2_FXP_NAME) | 718 | } else if (type != SSH2_FXP_NAME) |
718 | fatal("Expected SSH2_FXP_NAME(%u) packet, got %u", | 719 | fatal("Expected SSH2_FXP_NAME(%u) packet, got %u", |
719 | SSH2_FXP_NAME, type); | 720 | SSH2_FXP_NAME, type); |
@@ -1522,7 +1523,7 @@ upload_dir_internal(struct sftp_conn *conn, char *src, char *dst, | |||
1522 | continue; | 1523 | continue; |
1523 | 1524 | ||
1524 | if (upload_dir_internal(conn, new_src, new_dst, | 1525 | if (upload_dir_internal(conn, new_src, new_dst, |
1525 | pflag, depth + 1, printflag) == -1) | 1526 | pflag, printflag, depth + 1) == -1) |
1526 | ret = -1; | 1527 | ret = -1; |
1527 | } else if (S_ISREG(sb.st_mode)) { | 1528 | } else if (S_ISREG(sb.st_mode)) { |
1528 | if (do_upload(conn, new_src, new_dst, pflag) == -1) { | 1529 | if (do_upload(conn, new_src, new_dst, pflag) == -1) { |