=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/usr.bin/ssh/auth2.c,v retrieving revision 1.78 retrieving revision 1.79 diff -u -r1.78 -r1.79 --- src/usr.bin/ssh/auth2.c 2001/12/20 22:50:24 1.78 +++ src/usr.bin/ssh/auth2.c 2001/12/28 12:14:27 1.79 @@ -23,7 +23,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: auth2.c,v 1.78 2001/12/20 22:50:24 djm Exp $"); +RCSID("$OpenBSD: auth2.c,v 1.79 2001/12/28 12:14:27 markus Exp $"); #include @@ -144,7 +144,7 @@ u_int len; int accept = 0; char *service = packet_get_string(&len); - packet_done(); + packet_check_eom(); if (authctxt == NULL) fatal("input_service_request: no authctxt"); @@ -308,7 +308,7 @@ Authmethod *m = authmethod_lookup("none"); if (m != NULL) m->enabled = NULL; - packet_done(); + packet_check_eom(); userauth_banner(); return authctxt->valid ? auth_password(authctxt, "") : 0; } @@ -324,7 +324,7 @@ if (change) log("password change not supported"); password = packet_get_string(&len); - packet_done(); + packet_check_eom(); if (authctxt->valid && auth_password(authctxt, password) == 1) authenticated = 1; @@ -341,7 +341,7 @@ lang = packet_get_string(NULL); devs = packet_get_string(NULL); - packet_done(); + packet_check_eom(); debug("keyboard-interactive devs %s", devs); @@ -393,7 +393,7 @@ if (key != NULL) { if (have_sig) { sig = packet_get_string(&slen); - packet_done(); + packet_check_eom(); buffer_init(&b); if (datafellows & SSH_OLD_SESSIONID) { buffer_append(&b, session_id2, session_id2_len); @@ -426,7 +426,7 @@ xfree(sig); } else { debug("test whether pkalg/pkblob are acceptable"); - packet_done(); + packet_check_eom(); /* XXX fake reply and always send PK_OK ? */ /*