diff options
Diffstat (limited to 'sshconnect1.c')
-rw-r--r-- | sshconnect1.c | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/sshconnect1.c b/sshconnect1.c index 240bdffe2..a5fef1036 100644 --- a/sshconnect1.c +++ b/sshconnect1.c | |||
@@ -13,7 +13,7 @@ | |||
13 | */ | 13 | */ |
14 | 14 | ||
15 | #include "includes.h" | 15 | #include "includes.h" |
16 | RCSID("$OpenBSD: sshconnect1.c,v 1.44 2001/12/27 20:39:58 markus Exp $"); | 16 | RCSID("$OpenBSD: sshconnect1.c,v 1.45 2001/12/28 12:14:27 markus Exp $"); |
17 | 17 | ||
18 | #include <openssl/bn.h> | 18 | #include <openssl/bn.h> |
19 | #include <openssl/evp.h> | 19 | #include <openssl/evp.h> |
@@ -109,7 +109,7 @@ try_agent_authentication(void) | |||
109 | type); | 109 | type); |
110 | 110 | ||
111 | packet_get_bignum(challenge, &clen); | 111 | packet_get_bignum(challenge, &clen); |
112 | packet_done(); | 112 | packet_check_eom(); |
113 | 113 | ||
114 | debug("Received RSA challenge from server."); | 114 | debug("Received RSA challenge from server."); |
115 | 115 | ||
@@ -243,7 +243,7 @@ try_rsa_authentication(int idx) | |||
243 | if ((challenge = BN_new()) == NULL) | 243 | if ((challenge = BN_new()) == NULL) |
244 | fatal("try_rsa_authentication: BN_new failed"); | 244 | fatal("try_rsa_authentication: BN_new failed"); |
245 | packet_get_bignum(challenge, &clen); | 245 | packet_get_bignum(challenge, &clen); |
246 | packet_done(); | 246 | packet_check_eom(); |
247 | 247 | ||
248 | debug("Received RSA challenge from server."); | 248 | debug("Received RSA challenge from server."); |
249 | 249 | ||
@@ -357,7 +357,7 @@ try_rhosts_rsa_authentication(const char *local_user, Key * host_key) | |||
357 | if ((challenge = BN_new()) == NULL) | 357 | if ((challenge = BN_new()) == NULL) |
358 | fatal("try_rhosts_rsa_authentication: BN_new failed"); | 358 | fatal("try_rhosts_rsa_authentication: BN_new failed"); |
359 | packet_get_bignum(challenge, &clen); | 359 | packet_get_bignum(challenge, &clen); |
360 | packet_done(); | 360 | packet_check_eom(); |
361 | 361 | ||
362 | debug("Received RSA challenge for host key from server."); | 362 | debug("Received RSA challenge for host key from server."); |
363 | 363 | ||
@@ -464,7 +464,7 @@ try_krb4_authentication(void) | |||
464 | memcpy(auth.dat, reply, auth.length); | 464 | memcpy(auth.dat, reply, auth.length); |
465 | xfree(reply); | 465 | xfree(reply); |
466 | 466 | ||
467 | packet_done(); | 467 | packet_check_eom(); |
468 | 468 | ||
469 | /* | 469 | /* |
470 | * If his response isn't properly encrypted with the session | 470 | * If his response isn't properly encrypted with the session |
@@ -573,7 +573,7 @@ try_krb5_authentication(krb5_context *context, krb5_auth_context *auth_context) | |||
573 | 573 | ||
574 | /* Get server's response. */ | 574 | /* Get server's response. */ |
575 | ap.data = packet_get_string((unsigned int *) &ap.length); | 575 | ap.data = packet_get_string((unsigned int *) &ap.length); |
576 | packet_done(); | 576 | packet_check_eom(); |
577 | /* XXX je to dobre? */ | 577 | /* XXX je to dobre? */ |
578 | 578 | ||
579 | problem = krb5_rd_rep(*context, *auth_context, &ap, &reply); | 579 | problem = krb5_rd_rep(*context, *auth_context, &ap, &reply); |
@@ -838,7 +838,7 @@ try_challenge_response_authentication(void) | |||
838 | return 0; | 838 | return 0; |
839 | } | 839 | } |
840 | challenge = packet_get_string(&clen); | 840 | challenge = packet_get_string(&clen); |
841 | packet_done(); | 841 | packet_check_eom(); |
842 | snprintf(prompt, sizeof prompt, "%s%s", challenge, | 842 | snprintf(prompt, sizeof prompt, "%s%s", challenge, |
843 | strchr(challenge, '\n') ? "" : "\nResponse: "); | 843 | strchr(challenge, '\n') ? "" : "\nResponse: "); |
844 | xfree(challenge); | 844 | xfree(challenge); |
@@ -964,7 +964,7 @@ ssh_kex(char *host, struct sockaddr *hostaddr) | |||
964 | 964 | ||
965 | supported_ciphers = packet_get_int(); | 965 | supported_ciphers = packet_get_int(); |
966 | supported_authentications = packet_get_int(); | 966 | supported_authentications = packet_get_int(); |
967 | packet_done(); | 967 | packet_check_eom(); |
968 | 968 | ||
969 | debug("Received server public key (%d bits) and host key (%d bits).", | 969 | debug("Received server public key (%d bits) and host key (%d bits).", |
970 | BN_num_bits(server_key->rsa->n), BN_num_bits(host_key->rsa->n)); | 970 | BN_num_bits(server_key->rsa->n), BN_num_bits(host_key->rsa->n)); |