Skip to content
Snippets Groups Projects
Select Git revision
  • dailybuild_linux-x64
  • dailybuild_win32
  • master default protected
  • sqlite
  • rip_abstraction
  • dailybuild_macos-armv8
  • dd_file_lister_filanem_in_desc_color
  • mode7
  • dd_msg_reader_are_you_there_warning_improvement
  • c23-playing
  • syncterm-1.3
  • syncterm-1.2
  • test-build
  • hide_remote_connection_with_telgate
  • 638-can-t-control-c-during-a-file-search
  • add_body_to_pager_email
  • mingw32-build
  • cryptlib-3.4.7
  • ree/mastermind
  • new_user_dat
  • sbbs320d
  • syncterm-1.6
  • syncterm-1.5
  • syncterm-1.4
  • sbbs320b
  • syncterm-1.3
  • syncterm-1.2
  • syncterm-1.2rc6
  • syncterm-1.2rc5
  • push
  • syncterm-1.2rc4
  • syncterm-1.2rc2
  • syncterm-1.2rc1
  • sbbs319b
  • sbbs318b
  • goodbuild_linux-x64_Sep-01-2020
  • goodbuild_win32_Sep-01-2020
  • goodbuild_linux-x64_Aug-31-2020
  • goodbuild_win32_Aug-31-2020
  • goodbuild_win32_Aug-30-2020
40 results

answer.cpp

Blame
    • Deucе's avatar
      393241ca
      Fix issue when third SSH authentication attempt succeeds · 393241ca
      Deucе authored
      Because the session is activated on the *next* time through the
      loop, if the third attempt to authenticate (including public key)
      fails, it would leave the session inactive and fail to log in with
      a confusing error about an obsolete cryptlib.
      
      On success, decrement ssh_failed to ensure another pass through
      the loop.
      
      Also, add more debug logging around the auth so you can clearly
      see each failure, and log client_socket each time so it's clearly
      grouped.
      393241ca
      History
      Fix issue when third SSH authentication attempt succeeds
      Deucе authored
      Because the session is activated on the *next* time through the
      loop, if the third attempt to authenticate (including public key)
      fails, it would leave the session inactive and fail to log in with
      a confusing error about an obsolete cryptlib.
      
      On success, decrement ssh_failed to ensure another pass through
      the loop.
      
      Also, add more debug logging around the auth so you can clearly
      see each failure, and log client_socket each time so it's clearly
      grouped.