summaryrefslogtreecommitdiff
path: root/sshconnect2.c
diff options
context:
space:
mode:
authormarkus@openbsd.org <markus@openbsd.org>2017-05-31 07:00:13 +0000
committerDamien Miller <djm@mindrot.org>2017-06-01 14:53:33 +1000
commit92e9fe633130376a95dd533df6e5e6a578c1e6b8 (patch)
treec6f037e447c3c6fe4d79a71fb5a14f712f739617 /sshconnect2.c
parent17ad5b346043c5bbc5befa864d0dbeb76be39390 (diff)
upstream commit
remove now obsolete ctx from ssh_dispatch_run; ok djm@ Upstream-ID: 9870aabf7f4d71660c31fda91b942b19a8e68d29
Diffstat (limited to 'sshconnect2.c')
-rw-r--r--sshconnect2.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/sshconnect2.c b/sshconnect2.c
index ac3dce54c..9b0f845ce 100644
--- a/sshconnect2.c
+++ b/sshconnect2.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: sshconnect2.c,v 1.262 2017/05/31 05:08:46 djm Exp $ */ 1/* $OpenBSD: sshconnect2.c,v 1.263 2017/05/31 07:00:13 markus Exp $ */
2/* 2/*
3 * Copyright (c) 2000 Markus Friedl. All rights reserved. 3 * Copyright (c) 2000 Markus Friedl. All rights reserved.
4 * Copyright (c) 2008 Damien Miller. All rights reserved. 4 * Copyright (c) 2008 Damien Miller. All rights reserved.
@@ -217,7 +217,7 @@ ssh_kex2(char *host, struct sockaddr *hostaddr, u_short port)
217 kex->server_version_string=server_version_string; 217 kex->server_version_string=server_version_string;
218 kex->verify_host_key=&verify_host_key_callback; 218 kex->verify_host_key=&verify_host_key_callback;
219 219
220 dispatch_run(DISPATCH_BLOCK, &kex->done, active_state); 220 ssh_dispatch_run_fatal(active_state, DISPATCH_BLOCK, &kex->done);
221 221
222 /* remove ext-info from the KEX proposals for rekeying */ 222 /* remove ext-info from the KEX proposals for rekeying */
223 myproposal[PROPOSAL_KEX_ALGS] = 223 myproposal[PROPOSAL_KEX_ALGS] =
@@ -401,7 +401,7 @@ ssh_userauth2(const char *local_user, const char *server_user, char *host,
401 ssh_dispatch_init(ssh, &input_userauth_error); 401 ssh_dispatch_init(ssh, &input_userauth_error);
402 ssh_dispatch_set(ssh, SSH2_MSG_EXT_INFO, &input_userauth_ext_info); 402 ssh_dispatch_set(ssh, SSH2_MSG_EXT_INFO, &input_userauth_ext_info);
403 ssh_dispatch_set(ssh, SSH2_MSG_SERVICE_ACCEPT, &input_userauth_service_accept); 403 ssh_dispatch_set(ssh, SSH2_MSG_SERVICE_ACCEPT, &input_userauth_service_accept);
404 ssh_dispatch_run(ssh, DISPATCH_BLOCK, &authctxt.success, ssh); /* loop until success */ 404 ssh_dispatch_run_fatal(ssh, DISPATCH_BLOCK, &authctxt.success); /* loop until success */
405 ssh->authctxt = NULL; 405 ssh->authctxt = NULL;
406 406
407 pubkey_cleanup(&authctxt); 407 pubkey_cleanup(&authctxt);