summaryrefslogtreecommitdiff
path: root/sshconnect1.c
diff options
context:
space:
mode:
Diffstat (limited to 'sshconnect1.c')
-rw-r--r--sshconnect1.c16
1 files changed, 8 insertions, 8 deletions
diff --git a/sshconnect1.c b/sshconnect1.c
index 240bdffe2..a5fef1036 100644
--- a/sshconnect1.c
+++ b/sshconnect1.c
@@ -13,7 +13,7 @@
13 */ 13 */
14 14
15#include "includes.h" 15#include "includes.h"
16RCSID("$OpenBSD: sshconnect1.c,v 1.44 2001/12/27 20:39:58 markus Exp $"); 16RCSID("$OpenBSD: sshconnect1.c,v 1.45 2001/12/28 12:14:27 markus Exp $");
17 17
18#include <openssl/bn.h> 18#include <openssl/bn.h>
19#include <openssl/evp.h> 19#include <openssl/evp.h>
@@ -109,7 +109,7 @@ try_agent_authentication(void)
109 type); 109 type);
110 110
111 packet_get_bignum(challenge, &clen); 111 packet_get_bignum(challenge, &clen);
112 packet_done(); 112 packet_check_eom();
113 113
114 debug("Received RSA challenge from server."); 114 debug("Received RSA challenge from server.");
115 115
@@ -243,7 +243,7 @@ try_rsa_authentication(int idx)
243 if ((challenge = BN_new()) == NULL) 243 if ((challenge = BN_new()) == NULL)
244 fatal("try_rsa_authentication: BN_new failed"); 244 fatal("try_rsa_authentication: BN_new failed");
245 packet_get_bignum(challenge, &clen); 245 packet_get_bignum(challenge, &clen);
246 packet_done(); 246 packet_check_eom();
247 247
248 debug("Received RSA challenge from server."); 248 debug("Received RSA challenge from server.");
249 249
@@ -357,7 +357,7 @@ try_rhosts_rsa_authentication(const char *local_user, Key * host_key)
357 if ((challenge = BN_new()) == NULL) 357 if ((challenge = BN_new()) == NULL)
358 fatal("try_rhosts_rsa_authentication: BN_new failed"); 358 fatal("try_rhosts_rsa_authentication: BN_new failed");
359 packet_get_bignum(challenge, &clen); 359 packet_get_bignum(challenge, &clen);
360 packet_done(); 360 packet_check_eom();
361 361
362 debug("Received RSA challenge for host key from server."); 362 debug("Received RSA challenge for host key from server.");
363 363
@@ -464,7 +464,7 @@ try_krb4_authentication(void)
464 memcpy(auth.dat, reply, auth.length); 464 memcpy(auth.dat, reply, auth.length);
465 xfree(reply); 465 xfree(reply);
466 466
467 packet_done(); 467 packet_check_eom();
468 468
469 /* 469 /*
470 * If his response isn't properly encrypted with the session 470 * If his response isn't properly encrypted with the session
@@ -573,7 +573,7 @@ try_krb5_authentication(krb5_context *context, krb5_auth_context *auth_context)
573 573
574 /* Get server's response. */ 574 /* Get server's response. */
575 ap.data = packet_get_string((unsigned int *) &ap.length); 575 ap.data = packet_get_string((unsigned int *) &ap.length);
576 packet_done(); 576 packet_check_eom();
577 /* XXX je to dobre? */ 577 /* XXX je to dobre? */
578 578
579 problem = krb5_rd_rep(*context, *auth_context, &ap, &reply); 579 problem = krb5_rd_rep(*context, *auth_context, &ap, &reply);
@@ -838,7 +838,7 @@ try_challenge_response_authentication(void)
838 return 0; 838 return 0;
839 } 839 }
840 challenge = packet_get_string(&clen); 840 challenge = packet_get_string(&clen);
841 packet_done(); 841 packet_check_eom();
842 snprintf(prompt, sizeof prompt, "%s%s", challenge, 842 snprintf(prompt, sizeof prompt, "%s%s", challenge,
843 strchr(challenge, '\n') ? "" : "\nResponse: "); 843 strchr(challenge, '\n') ? "" : "\nResponse: ");
844 xfree(challenge); 844 xfree(challenge);
@@ -964,7 +964,7 @@ ssh_kex(char *host, struct sockaddr *hostaddr)
964 964
965 supported_ciphers = packet_get_int(); 965 supported_ciphers = packet_get_int();
966 supported_authentications = packet_get_int(); 966 supported_authentications = packet_get_int();
967 packet_done(); 967 packet_check_eom();
968 968
969 debug("Received server public key (%d bits) and host key (%d bits).", 969 debug("Received server public key (%d bits) and host key (%d bits).",
970 BN_num_bits(server_key->rsa->n), BN_num_bits(host_key->rsa->n)); 970 BN_num_bits(server_key->rsa->n), BN_num_bits(host_key->rsa->n));