summaryrefslogtreecommitdiff
path: root/auth2.c
diff options
context:
space:
mode:
Diffstat (limited to 'auth2.c')
-rw-r--r--auth2.c14
1 files changed, 7 insertions, 7 deletions
diff --git a/auth2.c b/auth2.c
index 2b23651ff..1ad905f18 100644
--- a/auth2.c
+++ b/auth2.c
@@ -23,7 +23,7 @@
23 */ 23 */
24 24
25#include "includes.h" 25#include "includes.h"
26RCSID("$OpenBSD: auth2.c,v 1.78 2001/12/20 22:50:24 djm Exp $"); 26RCSID("$OpenBSD: auth2.c,v 1.79 2001/12/28 12:14:27 markus Exp $");
27 27
28#include <openssl/evp.h> 28#include <openssl/evp.h>
29 29
@@ -146,7 +146,7 @@ input_service_request(int type, int plen, u_int32_t seq, void *ctxt)
146 u_int len; 146 u_int len;
147 int accept = 0; 147 int accept = 0;
148 char *service = packet_get_string(&len); 148 char *service = packet_get_string(&len);
149 packet_done(); 149 packet_check_eom();
150 150
151 if (authctxt == NULL) 151 if (authctxt == NULL)
152 fatal("input_service_request: no authctxt"); 152 fatal("input_service_request: no authctxt");
@@ -328,7 +328,7 @@ userauth_none(Authctxt *authctxt)
328 Authmethod *m = authmethod_lookup("none"); 328 Authmethod *m = authmethod_lookup("none");
329 if (m != NULL) 329 if (m != NULL)
330 m->enabled = NULL; 330 m->enabled = NULL;
331 packet_done(); 331 packet_check_eom();
332 userauth_banner(); 332 userauth_banner();
333 333
334 if (authctxt->valid == 0) 334 if (authctxt->valid == 0)
@@ -358,7 +358,7 @@ userauth_passwd(Authctxt *authctxt)
358 if (change) 358 if (change)
359 log("password change not supported"); 359 log("password change not supported");
360 password = packet_get_string(&len); 360 password = packet_get_string(&len);
361 packet_done(); 361 packet_check_eom();
362 if (authctxt->valid && 362 if (authctxt->valid &&
363#ifdef HAVE_CYGWIN 363#ifdef HAVE_CYGWIN
364 check_nt_auth(1, authctxt->pw) && 364 check_nt_auth(1, authctxt->pw) &&
@@ -384,7 +384,7 @@ userauth_kbdint(Authctxt *authctxt)
384 384
385 lang = packet_get_string(NULL); 385 lang = packet_get_string(NULL);
386 devs = packet_get_string(NULL); 386 devs = packet_get_string(NULL);
387 packet_done(); 387 packet_check_eom();
388 388
389 debug("keyboard-interactive devs %s", devs); 389 debug("keyboard-interactive devs %s", devs);
390 390
@@ -444,7 +444,7 @@ userauth_pubkey(Authctxt *authctxt)
444 if (key != NULL) { 444 if (key != NULL) {
445 if (have_sig) { 445 if (have_sig) {
446 sig = packet_get_string(&slen); 446 sig = packet_get_string(&slen);
447 packet_done(); 447 packet_check_eom();
448 buffer_init(&b); 448 buffer_init(&b);
449 if (datafellows & SSH_OLD_SESSIONID) { 449 if (datafellows & SSH_OLD_SESSIONID) {
450 buffer_append(&b, session_id2, session_id2_len); 450 buffer_append(&b, session_id2, session_id2_len);
@@ -477,7 +477,7 @@ userauth_pubkey(Authctxt *authctxt)
477 xfree(sig); 477 xfree(sig);
478 } else { 478 } else {
479 debug("test whether pkalg/pkblob are acceptable"); 479 debug("test whether pkalg/pkblob are acceptable");
480 packet_done(); 480 packet_check_eom();
481 481
482 /* XXX fake reply and always send PK_OK ? */ 482 /* XXX fake reply and always send PK_OK ? */
483 /* 483 /*