aboutsummaryrefslogtreecommitdiff
path: root/libssh/auth1.c
diff options
context:
space:
mode:
authorAris Adamantiadis <aris@0xbadc0de.be>2010-01-24 22:08:20 +0100
committerAris Adamantiadis <aris@0xbadc0de.be>2010-01-24 22:08:20 +0100
commit8a1d832f80caf73208a4c844108c794d4f85f92d (patch)
treedaabd981a4f275d2ef1ec31b0980c176268c5fa1 /libssh/auth1.c
parent758df265822928744ab20cec8e4929236b6b41e9 (diff)
downloadlibssh-8a1d832f80caf73208a4c844108c794d4f85f92d.tar.gz
libssh-8a1d832f80caf73208a4c844108c794d4f85f92d.tar.xz
libssh-8a1d832f80caf73208a4c844108c794d4f85f92d.zip
Removed last calls to packet_read
Diffstat (limited to 'libssh/auth1.c')
-rw-r--r--libssh/auth1.c35
1 files changed, 19 insertions, 16 deletions
diff --git a/libssh/auth1.c b/libssh/auth1.c
index f764fde2..6189f3ec 100644
--- a/libssh/auth1.c
+++ b/libssh/auth1.c
@@ -36,27 +36,30 @@
#ifdef WITH_SSH1
static int wait_auth1_status(ssh_session session) {
/* wait for a packet */
- if (packet_read(session) != SSH_OK) {
- return SSH_AUTH_ERROR;
- }
-
- if(packet_translate(session) != SSH_OK) {
- return SSH_AUTH_ERROR;
- }
-
- switch(session->in_packet.type) {
- case SSH_SMSG_SUCCESS:
+ while(session->auth_state == SSH_AUTH_STATE_NONE)
+ ssh_handle_packets(session,-1);
+ switch(session->auth_state) {
+ case SSH_AUTH_STATE_SUCCESS:
return SSH_AUTH_SUCCESS;
- case SSH_SMSG_FAILURE:
+ case SSH_AUTH_STATE_FAILED:
return SSH_AUTH_DENIED;
+ default:
+ return SSH_AUTH_ERROR;
}
-
- ssh_set_error(session, SSH_FATAL, "Was waiting for a SUCCESS or "
- "FAILURE, got %d", session->in_packet.type);
-
return SSH_AUTH_ERROR;
}
+void ssh_auth1_handler(ssh_session session, uint8_t type){
+ if(session->session_state != SSH_SESSION_STATE_AUTHENTICATING){
+ ssh_set_error(session,SSH_FATAL,"SSH_SMSG_SUCCESS or FAILED received in wrong state");
+ return;
+ }
+ if(type==SSH_SMSG_SUCCESS)
+ session->auth_state=SSH_AUTH_STATE_SUCCESS;
+ if(type==SSH_SMSG_FAILURE)
+ session->auth_state=SSH_AUTH_STATE_FAILED;
+}
+
static int send_username(ssh_session session, const char *username) {
ssh_string user = NULL;
/* returns SSH_AUTH_SUCCESS or SSH_AUTH_DENIED */
@@ -173,7 +176,7 @@ int ssh_userauth1_password(ssh_session session, const char *username,
string_burn(pwd);
string_free(pwd);
-
+ session->auth_state=SSH_AUTH_STATE_NONE;
if (packet_send(session) != SSH_OK) {
return SSH_AUTH_ERROR;
}