summaryrefslogtreecommitdiff
path: root/session.c
diff options
context:
space:
mode:
Diffstat (limited to 'session.c')
-rw-r--r--session.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/session.c b/session.c
index 8fe2cbf8f..612841049 100644
--- a/session.c
+++ b/session.c
@@ -33,7 +33,7 @@
33 */ 33 */
34 34
35#include "includes.h" 35#include "includes.h"
36RCSID("$OpenBSD: session.c,v 1.114 2001/12/20 16:37:29 markus Exp $"); 36RCSID("$OpenBSD: session.c,v 1.115 2001/12/27 20:39:58 markus Exp $");
37 37
38#include "ssh.h" 38#include "ssh.h"
39#include "ssh1.h" 39#include "ssh1.h"
@@ -254,8 +254,8 @@ do_authenticated1(Authctxt *authctxt)
254 /* Process the packet. */ 254 /* Process the packet. */
255 switch (type) { 255 switch (type) {
256 case SSH_CMSG_REQUEST_COMPRESSION: 256 case SSH_CMSG_REQUEST_COMPRESSION:
257 packet_integrity_check(plen, 4, type);
258 compression_level = packet_get_int(); 257 compression_level = packet_get_int();
258 packet_done();
259 if (compression_level < 1 || compression_level > 9) { 259 if (compression_level < 1 || compression_level > 9) {
260 packet_send_debug("Received illegal compression level %d.", 260 packet_send_debug("Received illegal compression level %d.",
261 compression_level); 261 compression_level);
@@ -330,7 +330,7 @@ do_authenticated1(Authctxt *authctxt)
330 verbose("Kerberos TGT passing disabled."); 330 verbose("Kerberos TGT passing disabled.");
331 } else { 331 } else {
332 char *kdata = packet_get_string(&dlen); 332 char *kdata = packet_get_string(&dlen);
333 packet_integrity_check(plen, 4 + dlen, type); 333 packet_done();
334 334
335 /* XXX - 0x41, see creds_to_radix version */ 335 /* XXX - 0x41, see creds_to_radix version */
336 if (kdata[0] != 0x41) { 336 if (kdata[0] != 0x41) {
@@ -364,7 +364,7 @@ do_authenticated1(Authctxt *authctxt)
364 } else { 364 } else {
365 /* Accept AFS token. */ 365 /* Accept AFS token. */
366 char *token = packet_get_string(&dlen); 366 char *token = packet_get_string(&dlen);
367 packet_integrity_check(plen, 4 + dlen, type); 367 packet_done();
368 368
369 if (auth_afs_token(s->authctxt, token)) 369 if (auth_afs_token(s->authctxt, token))
370 success = 1; 370 success = 1;