summaryrefslogtreecommitdiff
path: root/ssh.c
diff options
context:
space:
mode:
Diffstat (limited to 'ssh.c')
-rw-r--r--ssh.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/ssh.c b/ssh.c
index f442c43af..4b82d1e7e 100644
--- a/ssh.c
+++ b/ssh.c
@@ -40,7 +40,7 @@
40 */ 40 */
41 41
42#include "includes.h" 42#include "includes.h"
43RCSID("$OpenBSD: ssh.c,v 1.171 2002/05/16 22:09:59 stevesk Exp $"); 43RCSID("$OpenBSD: ssh.c,v 1.172 2002/05/22 23:18:25 deraadt Exp $");
44 44
45#include <openssl/evp.h> 45#include <openssl/evp.h>
46#include <openssl/err.h> 46#include <openssl/err.h>
@@ -107,7 +107,7 @@ int stdin_null_flag = 0;
107 107
108/* 108/*
109 * Flag indicating that ssh should fork after authentication. This is useful 109 * Flag indicating that ssh should fork after authentication. This is useful
110 * so that the pasphrase can be entered manually, and then ssh goes to the 110 * so that the passphrase can be entered manually, and then ssh goes to the
111 * background. 111 * background.
112 */ 112 */
113int fork_after_authentication_flag = 0; 113int fork_after_authentication_flag = 0;
@@ -1124,7 +1124,7 @@ ssh_session2_setup(int id, void *arg)
1124 debug("Sending subsystem: %.*s", len, (u_char *)buffer_ptr(&command)); 1124 debug("Sending subsystem: %.*s", len, (u_char *)buffer_ptr(&command));
1125 channel_request_start(id, "subsystem", /*want reply*/ 1); 1125 channel_request_start(id, "subsystem", /*want reply*/ 1);
1126 /* register callback for reply */ 1126 /* register callback for reply */
1127 /* XXX we asume that client_loop has already been called */ 1127 /* XXX we assume that client_loop has already been called */
1128 dispatch_set(SSH2_MSG_CHANNEL_FAILURE, &client_subsystem_reply); 1128 dispatch_set(SSH2_MSG_CHANNEL_FAILURE, &client_subsystem_reply);
1129 dispatch_set(SSH2_MSG_CHANNEL_SUCCESS, &client_subsystem_reply); 1129 dispatch_set(SSH2_MSG_CHANNEL_SUCCESS, &client_subsystem_reply);
1130 } else { 1130 } else {