aboutsummaryrefslogtreecommitdiff
path: root/tests/client
diff options
context:
space:
mode:
authorAndreas Schneider <asn@cryptomilk.org>2013-12-15 20:29:30 +0100
committerAndreas Schneider <asn@cryptomilk.org>2013-12-15 20:29:30 +0100
commit9829aa223663d13b840a3c22ac41df80ec49b0c7 (patch)
tree10cad95cefed8d2a0caa8680004ebe017f88d573 /tests/client
parentf8debe9a1968916127070f1803c26a643d45227c (diff)
downloadlibssh-9829aa223663d13b840a3c22ac41df80ec49b0c7.tar.gz
libssh-9829aa223663d13b840a3c22ac41df80ec49b0c7.tar.xz
libssh-9829aa223663d13b840a3c22ac41df80ec49b0c7.zip
tests: Use new auth API in the torture_session test.
Diffstat (limited to 'tests/client')
-rw-r--r--tests/client/torture_session.c5
1 files changed, 3 insertions, 2 deletions
diff --git a/tests/client/torture_session.c b/tests/client/torture_session.c
index f2e062b4..ef9ef653 100644
--- a/tests/client/torture_session.c
+++ b/tests/client/torture_session.c
@@ -68,9 +68,10 @@ static void torture_channel_read_error(void **state) {
if (rc == SSH_ERROR) {
assert_true(ssh_get_error_code(session) == SSH_REQUEST_DENIED);
}
- assert_true(ssh_auth_list(session) & SSH_AUTH_METHOD_PUBLICKEY);
+ rc = ssh_userauth_list(session, NULL);
+ assert_true(rc & SSH_AUTH_METHOD_PUBLICKEY);
- rc = ssh_userauth_autopubkey(session, NULL);
+ rc = ssh_userauth_publickey_auto(session, NULL, NULL);
assert_true(rc == SSH_AUTH_SUCCESS);
channel = ssh_channel_new(session);