diff options
Diffstat (limited to 'session.c')
-rw-r--r-- | session.c | 8 |
1 files changed, 4 insertions, 4 deletions
@@ -33,7 +33,7 @@ | |||
33 | */ | 33 | */ |
34 | 34 | ||
35 | #include "includes.h" | 35 | #include "includes.h" |
36 | RCSID("$OpenBSD: session.c,v 1.114 2001/12/20 16:37:29 markus Exp $"); | 36 | RCSID("$OpenBSD: session.c,v 1.115 2001/12/27 20:39:58 markus Exp $"); |
37 | 37 | ||
38 | #include "ssh.h" | 38 | #include "ssh.h" |
39 | #include "ssh1.h" | 39 | #include "ssh1.h" |
@@ -254,8 +254,8 @@ do_authenticated1(Authctxt *authctxt) | |||
254 | /* Process the packet. */ | 254 | /* Process the packet. */ |
255 | switch (type) { | 255 | switch (type) { |
256 | case SSH_CMSG_REQUEST_COMPRESSION: | 256 | case SSH_CMSG_REQUEST_COMPRESSION: |
257 | packet_integrity_check(plen, 4, type); | ||
258 | compression_level = packet_get_int(); | 257 | compression_level = packet_get_int(); |
258 | packet_done(); | ||
259 | if (compression_level < 1 || compression_level > 9) { | 259 | if (compression_level < 1 || compression_level > 9) { |
260 | packet_send_debug("Received illegal compression level %d.", | 260 | packet_send_debug("Received illegal compression level %d.", |
261 | compression_level); | 261 | compression_level); |
@@ -330,7 +330,7 @@ do_authenticated1(Authctxt *authctxt) | |||
330 | verbose("Kerberos TGT passing disabled."); | 330 | verbose("Kerberos TGT passing disabled."); |
331 | } else { | 331 | } else { |
332 | char *kdata = packet_get_string(&dlen); | 332 | char *kdata = packet_get_string(&dlen); |
333 | packet_integrity_check(plen, 4 + dlen, type); | 333 | packet_done(); |
334 | 334 | ||
335 | /* XXX - 0x41, see creds_to_radix version */ | 335 | /* XXX - 0x41, see creds_to_radix version */ |
336 | if (kdata[0] != 0x41) { | 336 | if (kdata[0] != 0x41) { |
@@ -364,7 +364,7 @@ do_authenticated1(Authctxt *authctxt) | |||
364 | } else { | 364 | } else { |
365 | /* Accept AFS token. */ | 365 | /* Accept AFS token. */ |
366 | char *token = packet_get_string(&dlen); | 366 | char *token = packet_get_string(&dlen); |
367 | packet_integrity_check(plen, 4 + dlen, type); | 367 | packet_done(); |
368 | 368 | ||
369 | if (auth_afs_token(s->authctxt, token)) | 369 | if (auth_afs_token(s->authctxt, token)) |
370 | success = 1; | 370 | success = 1; |