summaryrefslogtreecommitdiff
path: root/usr.bin/ssh/clientloop.c
diff options
context:
space:
mode:
authorDamien Miller <djm@cvs.openbsd.org>2023-01-06 02:38:24 +0000
committerDamien Miller <djm@cvs.openbsd.org>2023-01-06 02:38:24 +0000
commit5b30e893eddb4fac25b25d4b633742983fd4261f (patch)
tree692da068e040050e78de75d2fbb82ba2805392c0 /usr.bin/ssh/clientloop.c
parent62280a35b87e477b2e8d153dad5c2865249c8f0f (diff)
replace manual poll/ppoll timeout math with ptimeout API
feedback markus / ok markus dtucker
Diffstat (limited to 'usr.bin/ssh/clientloop.c')
-rw-r--r--usr.bin/ssh/clientloop.c38
1 files changed, 12 insertions, 26 deletions
diff --git a/usr.bin/ssh/clientloop.c b/usr.bin/ssh/clientloop.c
index 5b1d5d894af..19a5d4b192d 100644
--- a/usr.bin/ssh/clientloop.c
+++ b/usr.bin/ssh/clientloop.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: clientloop.c,v 1.385 2022/11/29 22:41:14 dtucker Exp $ */
+/* $OpenBSD: clientloop.c,v 1.386 2023/01/06 02:38:23 djm Exp $ */
/*
* Author: Tatu Ylonen <ylo@cs.hut.fi>
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -509,16 +509,15 @@ client_wait_until_can_do_something(struct ssh *ssh, struct pollfd **pfdp,
u_int *npfd_allocp, u_int *npfd_activep, int rekeying,
int *conn_in_readyp, int *conn_out_readyp)
{
- int timeout_secs, pollwait;
- time_t minwait_secs = 0, now = monotime();
+ struct timespec timeout;
int ret;
u_int p;
*conn_in_readyp = *conn_out_readyp = 0;
/* Prepare channel poll. First two pollfd entries are reserved */
- channel_prepare_poll(ssh, pfdp, npfd_allocp, npfd_activep, 2,
- &minwait_secs);
+ ptimeout_init(&timeout);
+ channel_prepare_poll(ssh, pfdp, npfd_allocp, npfd_activep, 2, &timeout);
if (*npfd_activep < 2)
fatal_f("bad npfd %u", *npfd_activep); /* shouldn't happen */
@@ -542,30 +541,17 @@ client_wait_until_can_do_something(struct ssh *ssh, struct pollfd **pfdp,
* some polled descriptor can be read, written, or has some other
* event pending, or a timeout expires.
*/
-
- timeout_secs = INT_MAX; /* we use INT_MAX to mean no timeout */
+ set_control_persist_exit_time(ssh);
+ if (control_persist_exit_time > 0)
+ ptimeout_deadline_monotime(&timeout, control_persist_exit_time);
if (options.server_alive_interval > 0)
- timeout_secs = MAXIMUM(server_alive_time - now, 0);
- if (options.rekey_interval > 0 && !rekeying)
- timeout_secs = MINIMUM(timeout_secs,
+ ptimeout_deadline_monotime(&timeout, server_alive_time);
+ if (options.rekey_interval > 0 && !rekeying) {
+ ptimeout_deadline_sec(&timeout,
ssh_packet_get_rekey_timeout(ssh));
- set_control_persist_exit_time(ssh);
- if (control_persist_exit_time > 0) {
- timeout_secs = MINIMUM(timeout_secs,
- control_persist_exit_time - now);
- if (timeout_secs < 0)
- timeout_secs = 0;
- }
- if (minwait_secs != 0)
- timeout_secs = MINIMUM(timeout_secs, (int)minwait_secs);
- if (timeout_secs == INT_MAX)
- pollwait = -1;
- else if (timeout_secs >= INT_MAX / 1000)
- pollwait = INT_MAX;
- else
- pollwait = timeout_secs * 1000;
+ }
- ret = poll(*pfdp, *npfd_activep, pollwait);
+ ret = poll(*pfdp, *npfd_activep, ptimeout_get_ms(&timeout));
if (ret == -1) {
/*