diff options
Diffstat (limited to 'auth2.c')
-rw-r--r-- | auth2.c | 14 |
1 files changed, 7 insertions, 7 deletions
@@ -23,7 +23,7 @@ | |||
23 | */ | 23 | */ |
24 | 24 | ||
25 | #include "includes.h" | 25 | #include "includes.h" |
26 | RCSID("$OpenBSD: auth2.c,v 1.78 2001/12/20 22:50:24 djm Exp $"); | 26 | RCSID("$OpenBSD: auth2.c,v 1.79 2001/12/28 12:14:27 markus Exp $"); |
27 | 27 | ||
28 | #include <openssl/evp.h> | 28 | #include <openssl/evp.h> |
29 | 29 | ||
@@ -146,7 +146,7 @@ input_service_request(int type, int plen, u_int32_t seq, void *ctxt) | |||
146 | u_int len; | 146 | u_int len; |
147 | int accept = 0; | 147 | int accept = 0; |
148 | char *service = packet_get_string(&len); | 148 | char *service = packet_get_string(&len); |
149 | packet_done(); | 149 | packet_check_eom(); |
150 | 150 | ||
151 | if (authctxt == NULL) | 151 | if (authctxt == NULL) |
152 | fatal("input_service_request: no authctxt"); | 152 | fatal("input_service_request: no authctxt"); |
@@ -328,7 +328,7 @@ userauth_none(Authctxt *authctxt) | |||
328 | Authmethod *m = authmethod_lookup("none"); | 328 | Authmethod *m = authmethod_lookup("none"); |
329 | if (m != NULL) | 329 | if (m != NULL) |
330 | m->enabled = NULL; | 330 | m->enabled = NULL; |
331 | packet_done(); | 331 | packet_check_eom(); |
332 | userauth_banner(); | 332 | userauth_banner(); |
333 | 333 | ||
334 | if (authctxt->valid == 0) | 334 | if (authctxt->valid == 0) |
@@ -358,7 +358,7 @@ userauth_passwd(Authctxt *authctxt) | |||
358 | if (change) | 358 | if (change) |
359 | log("password change not supported"); | 359 | log("password change not supported"); |
360 | password = packet_get_string(&len); | 360 | password = packet_get_string(&len); |
361 | packet_done(); | 361 | packet_check_eom(); |
362 | if (authctxt->valid && | 362 | if (authctxt->valid && |
363 | #ifdef HAVE_CYGWIN | 363 | #ifdef HAVE_CYGWIN |
364 | check_nt_auth(1, authctxt->pw) && | 364 | check_nt_auth(1, authctxt->pw) && |
@@ -384,7 +384,7 @@ userauth_kbdint(Authctxt *authctxt) | |||
384 | 384 | ||
385 | lang = packet_get_string(NULL); | 385 | lang = packet_get_string(NULL); |
386 | devs = packet_get_string(NULL); | 386 | devs = packet_get_string(NULL); |
387 | packet_done(); | 387 | packet_check_eom(); |
388 | 388 | ||
389 | debug("keyboard-interactive devs %s", devs); | 389 | debug("keyboard-interactive devs %s", devs); |
390 | 390 | ||
@@ -444,7 +444,7 @@ userauth_pubkey(Authctxt *authctxt) | |||
444 | if (key != NULL) { | 444 | if (key != NULL) { |
445 | if (have_sig) { | 445 | if (have_sig) { |
446 | sig = packet_get_string(&slen); | 446 | sig = packet_get_string(&slen); |
447 | packet_done(); | 447 | packet_check_eom(); |
448 | buffer_init(&b); | 448 | buffer_init(&b); |
449 | if (datafellows & SSH_OLD_SESSIONID) { | 449 | if (datafellows & SSH_OLD_SESSIONID) { |
450 | buffer_append(&b, session_id2, session_id2_len); | 450 | buffer_append(&b, session_id2, session_id2_len); |
@@ -477,7 +477,7 @@ userauth_pubkey(Authctxt *authctxt) | |||
477 | xfree(sig); | 477 | xfree(sig); |
478 | } else { | 478 | } else { |
479 | debug("test whether pkalg/pkblob are acceptable"); | 479 | debug("test whether pkalg/pkblob are acceptable"); |
480 | packet_done(); | 480 | packet_check_eom(); |
481 | 481 | ||
482 | /* XXX fake reply and always send PK_OK ? */ | 482 | /* XXX fake reply and always send PK_OK ? */ |
483 | /* | 483 | /* |