=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/usr.bin/ssh/Attic/kexdhc.c,v retrieving revision 1.3.2.1 retrieving revision 1.3.2.2 diff -u -r1.3.2.1 -r1.3.2.2 --- src/usr.bin/ssh/Attic/kexdhc.c 2006/09/30 04:06:50 1.3.2.1 +++ src/usr.bin/ssh/Attic/kexdhc.c 2006/11/08 00:17:14 1.3.2.2 @@ -1,4 +1,4 @@ -/* $OpenBSD: kexdhc.c,v 1.3.2.1 2006/09/30 04:06:50 brad Exp $ */ +/* $OpenBSD: kexdhc.c,v 1.3.2.2 2006/11/08 00:17:14 brad Exp $ */ /* * Copyright (c) 2001 Markus Friedl. All rights reserved. * @@ -47,7 +47,8 @@ Key *server_host_key; u_char *server_host_key_blob = NULL, *signature = NULL; u_char *kbuf, *hash; - u_int klen, kout, slen, sbloblen, hashlen; + u_int klen, slen, sbloblen, hashlen; + int kout; /* generate and send 'e', client DH public key */ switch (kex->kex_type) { @@ -109,13 +110,15 @@ klen = DH_size(dh); kbuf = xmalloc(klen); - kout = DH_compute_key(kbuf, dh_server_pub, dh); + if ((kout = DH_compute_key(kbuf, dh_server_pub, dh)) < 0) + fatal("DH_compute_key: failed"); #ifdef DEBUG_KEXDH dump_digest("shared secret", kbuf, kout); #endif if ((shared_secret = BN_new()) == NULL) fatal("kexdh_client: BN_new failed"); - BN_bin2bn(kbuf, kout, shared_secret); + if (BN_bin2bn(kbuf, kout, shared_secret) == NULL) + fatal("kexdh_client: BN_bin2bn failed"); memset(kbuf, 0, klen); xfree(kbuf);