=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/usr.bin/ssh/Attic/auth1.c,v retrieving revision 1.59.4.1 retrieving revision 1.60 diff -u -r1.59.4.1 -r1.60 --- src/usr.bin/ssh/Attic/auth1.c 2005/09/04 18:39:56 1.59.4.1 +++ src/usr.bin/ssh/Attic/auth1.c 2005/05/20 12:57:01 1.60 @@ -10,7 +10,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: auth1.c,v 1.59.4.1 2005/09/04 18:39:56 brad Exp $"); +RCSID("$OpenBSD: auth1.c,v 1.60 2005/05/20 12:57:01 djm Exp $"); #include "xmalloc.h" #include "rsa.h" @@ -136,7 +136,7 @@ static int auth1_process_rhosts_rsa(Authctxt *authctxt, char *info, size_t infolen) { - int keybits, authenticated = 0; + int authenticated = 0; u_int bits; char *client_user; Key *client_host_key; @@ -155,8 +155,7 @@ packet_get_bignum(client_host_key->rsa->e); packet_get_bignum(client_host_key->rsa->n); - keybits = BN_num_bits(client_host_key->rsa->n); - if (keybits < 0 || bits != (u_int)keybits) { + if (bits != BN_num_bits(client_host_key->rsa->n)) { verbose("Warning: keysize mismatch for client_host_key: " "actual %d, announced %d", BN_num_bits(client_host_key->rsa->n), bits); @@ -169,7 +168,7 @@ snprintf(info, infolen, " ruser %.100s", client_user); xfree(client_user); - + return (authenticated); } @@ -177,7 +176,7 @@ auth1_process_tis_challenge(Authctxt *authctxt, char *info, size_t infolen) { char *challenge; - + if ((challenge = get_challenge(authctxt)) == NULL) return (0);