View | Details | Raw Unified | Return to bug 1818 | Differences between
and this patch

Collapse All | Expand All

(-)a/clientloop.c (-1 / +1 lines)
Lines 2054-2060 client_input_channel_req(int type, u_int32_t seq, void *ctxt) Link Here
2054
		}
2054
		}
2055
		packet_check_eom();
2055
		packet_check_eom();
2056
	}
2056
	}
2057
	if (reply && c != NULL) {
2057
	if (reply && c != NULL && !(c->flags & CHAN_CLOSE_SENT)) {
2058
		packet_start(success ?
2058
		packet_start(success ?
2059
		    SSH2_MSG_CHANNEL_SUCCESS : SSH2_MSG_CHANNEL_FAILURE);
2059
		    SSH2_MSG_CHANNEL_SUCCESS : SSH2_MSG_CHANNEL_FAILURE);
2060
		packet_put_int(c->remote_id);
2060
		packet_put_int(c->remote_id);
(-)a/serverloop.c (-1 / +1 lines)
Lines 1204-1210 server_input_channel_req(int type, u_int32_t seq, void *ctxt) Link Here
1204
	} else if ((c->type == SSH_CHANNEL_LARVAL ||
1204
	} else if ((c->type == SSH_CHANNEL_LARVAL ||
1205
	    c->type == SSH_CHANNEL_OPEN) && strcmp(c->ctype, "session") == 0)
1205
	    c->type == SSH_CHANNEL_OPEN) && strcmp(c->ctype, "session") == 0)
1206
		success = session_input_channel_req(c, rtype);
1206
		success = session_input_channel_req(c, rtype);
1207
	if (reply) {
1207
	if (reply && !(c->flags & CHAN_CLOSE_SENT)) {
1208
		packet_start(success ?
1208
		packet_start(success ?
1209
		    SSH2_MSG_CHANNEL_SUCCESS : SSH2_MSG_CHANNEL_FAILURE);
1209
		    SSH2_MSG_CHANNEL_SUCCESS : SSH2_MSG_CHANNEL_FAILURE);
1210
		packet_put_int(c->remote_id);
1210
		packet_put_int(c->remote_id);

Return to bug 1818