summaryrefslogtreecommitdiffstats
path: root/0015-libssh2-1.4.3-debug-msgs.patch
blob: 034f33786217ce0864ce4e0992719bc7a2ac0eaa (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
From c1bbc2d6b0708dcb1fd014554585296b0ba25a43 Mon Sep 17 00:00:00 2001
From: Kamil Dudka <kdudka@redhat.com>
Date: Mon, 9 Oct 2017 17:35:51 +0200
Subject: [PATCH] session: avoid printing misleading debug messages

... while throwing LIBSSH2_ERROR_EAGAIN out of session_startup()

If the session runs in blocking mode, LIBSSH2_ERROR_EAGAIN never reaches
the libssh2 API boundary and, in non-blocking mode, these messages are
suppressed by the condition in _libssh2_error_flags() anyway.

Closes #211

Upstream-commit: 712c6cbdd2f1b509f586aea5889a5c1deb7c9bda
Signed-off-by: Kamil Dudka <kdudka@redhat.com>
---
 src/session.c | 16 ++++++++++++----
 1 file changed, 12 insertions(+), 4 deletions(-)

diff --git a/src/session.c b/src/session.c
index 9838d2b..62ef70d 100644
--- a/src/session.c
+++ b/src/session.c
@@ -703,7 +703,9 @@ session_startup(LIBSSH2_SESSION *session, libssh2_socket_t sock)
 
     if (session->startup_state == libssh2_NB_state_created) {
         rc = banner_send(session);
-        if (rc) {
+        if (rc == LIBSSH2_ERROR_EAGAIN)
+            return rc;
+        else if (rc) {
             return _libssh2_error(session, rc,
                                   "Failed sending banner");
         }
@@ -714,7 +716,9 @@ session_startup(LIBSSH2_SESSION *session, libssh2_socket_t sock)
     if (session->startup_state == libssh2_NB_state_sent) {
         do {
             rc = banner_receive(session);
-            if (rc)
+            if (rc == LIBSSH2_ERROR_EAGAIN)
+                return rc;
+            else if (rc)
                 return _libssh2_error(session, rc,
                                       "Failed getting banner");
         } while(strncmp("SSH-", (char *)session->remote.banner, 4));
@@ -724,7 +728,9 @@ session_startup(LIBSSH2_SESSION *session, libssh2_socket_t sock)
 
     if (session->startup_state == libssh2_NB_state_sent1) {
         rc = _libssh2_kex_exchange(session, 0, &session->startup_key_state);
-        if (rc)
+        if (rc == LIBSSH2_ERROR_EAGAIN)
+            return rc;
+        else if (rc)
             return _libssh2_error(session, rc,
                                   "Unable to exchange encryption keys");
 
@@ -749,7 +755,9 @@ session_startup(LIBSSH2_SESSION *session, libssh2_socket_t sock)
         rc = _libssh2_transport_send(session, session->startup_service,
                                      sizeof("ssh-userauth") + 5 - 1,
                                      NULL, 0);
-        if (rc) {
+        if (rc == LIBSSH2_ERROR_EAGAIN)
+            return rc;
+        else if (rc) {
             return _libssh2_error(session, rc,
                                   "Unable to ask for ssh-userauth service");
         }
-- 
2.13.6