=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/usr.bin/ssh/Attic/sshconnect1.c,v retrieving revision 1.44 retrieving revision 1.45 diff -u -r1.44 -r1.45 --- src/usr.bin/ssh/Attic/sshconnect1.c 2001/12/27 20:39:58 1.44 +++ src/usr.bin/ssh/Attic/sshconnect1.c 2001/12/28 12:14:27 1.45 @@ -13,7 +13,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: sshconnect1.c,v 1.44 2001/12/27 20:39:58 markus Exp $"); +RCSID("$OpenBSD: sshconnect1.c,v 1.45 2001/12/28 12:14:27 markus Exp $"); #include #include @@ -109,7 +109,7 @@ type); packet_get_bignum(challenge, &clen); - packet_done(); + packet_check_eom(); debug("Received RSA challenge from server."); @@ -243,7 +243,7 @@ if ((challenge = BN_new()) == NULL) fatal("try_rsa_authentication: BN_new failed"); packet_get_bignum(challenge, &clen); - packet_done(); + packet_check_eom(); debug("Received RSA challenge from server."); @@ -357,7 +357,7 @@ if ((challenge = BN_new()) == NULL) fatal("try_rhosts_rsa_authentication: BN_new failed"); packet_get_bignum(challenge, &clen); - packet_done(); + packet_check_eom(); debug("Received RSA challenge for host key from server."); @@ -464,7 +464,7 @@ memcpy(auth.dat, reply, auth.length); xfree(reply); - packet_done(); + packet_check_eom(); /* * If his response isn't properly encrypted with the session @@ -573,7 +573,7 @@ /* Get server's response. */ ap.data = packet_get_string((unsigned int *) &ap.length); - packet_done(); + packet_check_eom(); /* XXX je to dobre? */ problem = krb5_rd_rep(*context, *auth_context, &ap, &reply); @@ -838,7 +838,7 @@ return 0; } challenge = packet_get_string(&clen); - packet_done(); + packet_check_eom(); snprintf(prompt, sizeof prompt, "%s%s", challenge, strchr(challenge, '\n') ? "" : "\nResponse: "); xfree(challenge); @@ -964,7 +964,7 @@ supported_ciphers = packet_get_int(); supported_authentications = packet_get_int(); - packet_done(); + packet_check_eom(); debug("Received server public key (%d bits) and host key (%d bits).", BN_num_bits(server_key->rsa->n), BN_num_bits(host_key->rsa->n));