@@ -110,11 +110,9 @@ static int ssh_userauth_get_response(ssh_session session) {
110
110
rc = ssh_handle_packets_termination (session , SSH_TIMEOUT_USER ,
111
111
ssh_auth_response_termination , session );
112
112
if (rc == SSH_ERROR ) {
113
- leave_function ();
114
113
return SSH_AUTH_ERROR ;
115
114
}
116
115
if (!ssh_auth_response_termination (session )){
117
- leave_function ();
118
116
return SSH_AUTH_AGAIN ;
119
117
}
120
118
@@ -159,7 +157,7 @@ SSH_PACKET_CALLBACK(ssh_packet_userauth_banner){
159
157
ssh_string banner ;
160
158
(void )type ;
161
159
(void )user ;
162
- enter_function ();
160
+
163
161
banner = buffer_get_ssh_string (packet );
164
162
if (banner == NULL ) {
165
163
SSH_LOG (SSH_LOG_WARN ,
@@ -171,7 +169,7 @@ SSH_PACKET_CALLBACK(ssh_packet_userauth_banner){
171
169
ssh_string_free (session -> banner );
172
170
session -> banner = banner ;
173
171
}
174
- leave_function ();
172
+
175
173
return SSH_PACKET_USED ;
176
174
}
177
175
@@ -188,7 +186,6 @@ SSH_PACKET_CALLBACK(ssh_packet_userauth_failure){
188
186
uint8_t partial = 0 ;
189
187
(void ) type ;
190
188
(void ) user ;
191
- enter_function ();
192
189
193
190
auth = buffer_get_ssh_string (packet );
194
191
if (auth == NULL || buffer_get_u8 (packet , & partial ) != 1 ) {
@@ -239,7 +236,7 @@ SSH_PACKET_CALLBACK(ssh_packet_userauth_failure){
239
236
end :
240
237
ssh_string_free (auth );
241
238
SAFE_FREE (auth_methods );
242
- leave_function ();
239
+
243
240
return SSH_PACKET_USED ;
244
241
}
245
242
@@ -251,7 +248,6 @@ SSH_PACKET_CALLBACK(ssh_packet_userauth_failure){
251
248
* It is also used to communicate the new to the upper levels.
252
249
*/
253
250
SSH_PACKET_CALLBACK (ssh_packet_userauth_success ){
254
- enter_function ();
255
251
(void )packet ;
256
252
(void )type ;
257
253
(void )user ;
@@ -271,7 +267,7 @@ SSH_PACKET_CALLBACK(ssh_packet_userauth_success){
271
267
SSH_LOG (SSH_LOG_DEBUG , "Enabling delayed compression IN" );
272
268
session -> current_crypto -> do_compress_in = 1 ;
273
269
}
274
- leave_function ();
270
+
275
271
return SSH_PACKET_USED ;
276
272
}
277
273
@@ -285,7 +281,6 @@ SSH_PACKET_CALLBACK(ssh_packet_userauth_success){
285
281
*/
286
282
SSH_PACKET_CALLBACK (ssh_packet_userauth_pk_ok ){
287
283
int rc ;
288
- enter_function ();
289
284
290
285
SSH_LOG (SSH_LOG_TRACE , "Received SSH_USERAUTH_PK_OK/INFO_REQUEST/GSSAPI_RESPONSE" );
291
286
@@ -303,7 +298,7 @@ SSH_PACKET_CALLBACK(ssh_packet_userauth_pk_ok){
303
298
SSH_LOG (SSH_LOG_TRACE , "Assuming SSH_USERAUTH_PK_OK" );
304
299
rc = SSH_PACKET_USED ;
305
300
}
306
- leave_function ();
301
+
307
302
return rc ;
308
303
}
309
304
@@ -1740,7 +1735,6 @@ SSH_PACKET_CALLBACK(ssh_packet_userauth_info_request) {
1740
1735
uint32_t i ;
1741
1736
(void )user ;
1742
1737
(void )type ;
1743
- enter_function ();
1744
1738
1745
1739
name = buffer_get_ssh_string (packet );
1746
1740
instruction = buffer_get_ssh_string (packet );
@@ -1754,7 +1748,7 @@ SSH_PACKET_CALLBACK(ssh_packet_userauth_info_request) {
1754
1748
ssh_string_free (name );
1755
1749
ssh_string_free (instruction );
1756
1750
ssh_set_error (session , SSH_FATAL , "Invalid USERAUTH_INFO_REQUEST msg" );
1757
- leave_function ();
1751
+
1758
1752
return SSH_PACKET_USED ;
1759
1753
}
1760
1754
@@ -1765,7 +1759,6 @@ SSH_PACKET_CALLBACK(ssh_packet_userauth_info_request) {
1765
1759
ssh_string_free (name );
1766
1760
ssh_string_free (instruction );
1767
1761
1768
- leave_function ();
1769
1762
return SSH_PACKET_USED ;
1770
1763
}
1771
1764
} else {
@@ -1778,7 +1771,7 @@ SSH_PACKET_CALLBACK(ssh_packet_userauth_info_request) {
1778
1771
ssh_set_error_oom (session );
1779
1772
ssh_kbdint_free (session -> kbdint );
1780
1773
ssh_string_free (instruction );
1781
- leave_function ();
1774
+
1782
1775
return SSH_PACKET_USED ;
1783
1776
}
1784
1777
@@ -1788,7 +1781,7 @@ SSH_PACKET_CALLBACK(ssh_packet_userauth_info_request) {
1788
1781
ssh_set_error_oom (session );
1789
1782
ssh_kbdint_free (session -> kbdint );
1790
1783
session -> kbdint = NULL ;
1791
- leave_function ();
1784
+
1792
1785
return SSH_PACKET_USED ;
1793
1786
}
1794
1787
@@ -1801,7 +1794,7 @@ SSH_PACKET_CALLBACK(ssh_packet_userauth_info_request) {
1801
1794
nprompts , nprompts );
1802
1795
ssh_kbdint_free (session -> kbdint );
1803
1796
session -> kbdint = NULL ;
1804
- leave_function ();
1797
+
1805
1798
return SSH_PACKET_USED ;
1806
1799
}
1807
1800
@@ -1813,7 +1806,7 @@ SSH_PACKET_CALLBACK(ssh_packet_userauth_info_request) {
1813
1806
ssh_set_error_oom (session );
1814
1807
ssh_kbdint_free (session -> kbdint );
1815
1808
session -> kbdint = NULL ;
1816
- leave_function ();
1809
+
1817
1810
return SSH_PACKET_USED ;
1818
1811
}
1819
1812
memset (session -> kbdint -> prompts , 0 , nprompts * sizeof (char * ));
@@ -1824,7 +1817,7 @@ SSH_PACKET_CALLBACK(ssh_packet_userauth_info_request) {
1824
1817
ssh_set_error_oom (session );
1825
1818
ssh_kbdint_free (session -> kbdint );
1826
1819
session -> kbdint = NULL ;
1827
- leave_function ();
1820
+
1828
1821
return SSH_PACKET_USED ;
1829
1822
}
1830
1823
memset (session -> kbdint -> echo , 0 , nprompts );
@@ -1836,7 +1829,7 @@ SSH_PACKET_CALLBACK(ssh_packet_userauth_info_request) {
1836
1829
ssh_set_error (session , SSH_FATAL , "Short INFO_REQUEST packet" );
1837
1830
ssh_kbdint_free (session -> kbdint );
1838
1831
session -> kbdint = NULL ;
1839
- leave_function ();
1832
+
1840
1833
return SSH_PACKET_USED ;
1841
1834
}
1842
1835
session -> kbdint -> prompts [i ] = ssh_string_to_char (tmp );
@@ -1846,12 +1839,12 @@ SSH_PACKET_CALLBACK(ssh_packet_userauth_info_request) {
1846
1839
session -> kbdint -> nprompts = i ;
1847
1840
ssh_kbdint_free (session -> kbdint );
1848
1841
session -> kbdint = NULL ;
1849
- leave_function ();
1842
+
1850
1843
return SSH_PACKET_USED ;
1851
1844
}
1852
1845
}
1853
1846
session -> auth_state = SSH_AUTH_STATE_INFO ;
1854
- leave_function ();
1847
+
1855
1848
return SSH_PACKET_USED ;
1856
1849
}
1857
1850
0 commit comments