diff options
author | Ben Lindstrom <mouring@eviladmin.org> | 2001-06-09 01:32:29 +0000 |
---|---|---|
committer | Ben Lindstrom <mouring@eviladmin.org> | 2001-06-09 01:32:29 +0000 |
commit | df4981bc316d6f9fc9aab8c6198d2396890ba255 (patch) | |
tree | 5c63e2f36d6a941364845193cff045e28f6c29f5 /channels.c | |
parent | a238f6e8348502e9f4b32ee1800138f4421a3ce3 (diff) |
- markus@cvs.openbsd.org 2001/06/05 10:24:32
[channels.c]
don't delete the auth socket in channel_stop_listening()
auth_sock_cleanup_proc() will take care of this.
Diffstat (limited to 'channels.c')
-rw-r--r-- | channels.c | 5 |
1 files changed, 3 insertions, 2 deletions
@@ -40,7 +40,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: channels.c,v 1.123 2001/06/04 21:59:42 markus Exp $"); +RCSID("$OpenBSD: channels.c,v 1.124 2001/06/05 10:24:32 markus Exp $"); #include "ssh.h" #include "ssh1.h" @@ -352,7 +352,7 @@ channel_stop_listening() switch (c->type) { case SSH_CHANNEL_AUTH_SOCKET: close(c->sock); - unlink(c->path); + /* auth_sock_cleanup_proc deletes the socket */ channel_free(c); break; case SSH_CHANNEL_PORT_LISTENER: @@ -2861,6 +2861,7 @@ auth_input_request_forwarding(struct passwd * pw) if (nc == NULL) { error("auth_input_request_forwarding: channel_new failed"); auth_sock_cleanup_proc(pw); + fatal_remove_cleanup(auth_sock_cleanup_proc, pw); close(sock); return 0; } |