diff options
-rw-r--r-- | ChangeLog | 5 | ||||
-rw-r--r-- | session.c | 9 |
2 files changed, 8 insertions, 6 deletions
@@ -53,6 +53,9 @@ | |||
53 | [channels.c] | 53 | [channels.c] |
54 | don't delete the auth socket in channel_stop_listening() | 54 | don't delete the auth socket in channel_stop_listening() |
55 | auth_sock_cleanup_proc() will take care of this. | 55 | auth_sock_cleanup_proc() will take care of this. |
56 | - markus@cvs.openbsd.org 2001/06/05 16:46:19 | ||
57 | [session.c] | ||
58 | let session_close() delete the pty. deny x11fwd if xauthfile is set. | ||
56 | 59 | ||
57 | 20010606 | 60 | 20010606 |
58 | - OpenBSD CVS Sync | 61 | - OpenBSD CVS Sync |
@@ -5564,4 +5567,4 @@ | |||
5564 | - Wrote replacements for strlcpy and mkdtemp | 5567 | - Wrote replacements for strlcpy and mkdtemp |
5565 | - Released 1.0pre1 | 5568 | - Released 1.0pre1 |
5566 | 5569 | ||
5567 | $Id: ChangeLog,v 1.1262 2001/06/09 01:32:29 mouring Exp $ | 5570 | $Id: ChangeLog,v 1.1263 2001/06/09 01:34:15 mouring Exp $ |
@@ -33,7 +33,7 @@ | |||
33 | */ | 33 | */ |
34 | 34 | ||
35 | #include "includes.h" | 35 | #include "includes.h" |
36 | RCSID("$OpenBSD: session.c,v 1.81 2001/06/04 23:16:16 markus Exp $"); | 36 | RCSID("$OpenBSD: session.c,v 1.82 2001/06/05 16:46:19 markus Exp $"); |
37 | 37 | ||
38 | #include "ssh.h" | 38 | #include "ssh.h" |
39 | #include "ssh1.h" | 39 | #include "ssh1.h" |
@@ -124,6 +124,7 @@ void session_set_fds(Session *s, int fdin, int fdout, int fderr); | |||
124 | void session_pty_cleanup(Session *s); | 124 | void session_pty_cleanup(Session *s); |
125 | void session_proctitle(Session *s); | 125 | void session_proctitle(Session *s); |
126 | int session_setup_x11fwd(Session *s); | 126 | int session_setup_x11fwd(Session *s); |
127 | void session_close(Session *s); | ||
127 | void do_exec_pty(Session *s, const char *command); | 128 | void do_exec_pty(Session *s, const char *command); |
128 | void do_exec_no_pty(Session *s, const char *command); | 129 | void do_exec_no_pty(Session *s, const char *command); |
129 | void do_login(Session *s, const char *command); | 130 | void do_login(Session *s, const char *command); |
@@ -413,9 +414,9 @@ do_authenticated1(Authctxt *authctxt) | |||
413 | do_exec_pty(s, command); | 414 | do_exec_pty(s, command); |
414 | else | 415 | else |
415 | do_exec_no_pty(s, command); | 416 | do_exec_no_pty(s, command); |
416 | |||
417 | if (command != NULL) | 417 | if (command != NULL) |
418 | xfree(command); | 418 | xfree(command); |
419 | session_close(s); | ||
419 | return; | 420 | return; |
420 | 421 | ||
421 | default: | 422 | default: |
@@ -658,7 +659,6 @@ do_exec_pty(Session *s, const char *command) | |||
658 | } else { | 659 | } else { |
659 | server_loop(pid, ptyfd, fdout, -1); | 660 | server_loop(pid, ptyfd, fdout, -1); |
660 | /* server_loop _has_ closed ptyfd and fdout. */ | 661 | /* server_loop _has_ closed ptyfd and fdout. */ |
661 | session_pty_cleanup(s); | ||
662 | } | 662 | } |
663 | } | 663 | } |
664 | 664 | ||
@@ -2047,7 +2047,7 @@ session_setup_x11fwd(Session *s) | |||
2047 | packet_send_debug("No xauth program; cannot forward with spoofing."); | 2047 | packet_send_debug("No xauth program; cannot forward with spoofing."); |
2048 | return 0; | 2048 | return 0; |
2049 | } | 2049 | } |
2050 | if (s->display != NULL) { | 2050 | if (s->display != NULL || xauthfile != NULL) { |
2051 | debug("X11 display already set."); | 2051 | debug("X11 display already set."); |
2052 | return 0; | 2052 | return 0; |
2053 | } | 2053 | } |
@@ -2079,6 +2079,5 @@ session_setup_x11fwd(Session *s) | |||
2079 | void | 2079 | void |
2080 | do_authenticated2(Authctxt *authctxt) | 2080 | do_authenticated2(Authctxt *authctxt) |
2081 | { | 2081 | { |
2082 | |||
2083 | server_loop2(); | 2082 | server_loop2(); |
2084 | } | 2083 | } |