[BACK]Return to authfd.c CVS log [TXT][DIR] Up to [local] / src / usr.bin / ssh

Diff for /src/usr.bin/ssh/authfd.c between version 1.64 and 1.64.4.1

version 1.64, 2004/08/11 21:44:31 version 1.64.4.1, 2005/09/04 18:39:59
Line 114 
Line 114 
 static int  static int
 ssh_request_reply(AuthenticationConnection *auth, Buffer *request, Buffer *reply)  ssh_request_reply(AuthenticationConnection *auth, Buffer *request, Buffer *reply)
 {  {
         int l;          u_int l, len;
         u_int len;  
         char buf[1024];          char buf[1024];
   
         /* Get the length of the message, and format it in the buffer. */          /* Get the length of the message, and format it in the buffer. */
Line 149 
Line 148 
                 l = len;                  l = len;
                 if (l > sizeof(buf))                  if (l > sizeof(buf))
                         l = sizeof(buf);                          l = sizeof(buf);
                 l = atomicio(read, auth->fd, buf, l);                  if (atomicio(read, auth->fd, buf, l) != l) {
                 if (l <= 0) {  
                         error("Error reading response from authentication socket.");                          error("Error reading response from authentication socket.");
                         return 0;                          return 0;
                 }                  }
Line 303 
Line 301 
 Key *  Key *
 ssh_get_next_identity(AuthenticationConnection *auth, char **comment, int version)  ssh_get_next_identity(AuthenticationConnection *auth, char **comment, int version)
 {  {
           int keybits;
         u_int bits;          u_int bits;
         u_char *blob;          u_char *blob;
         u_int blen;          u_int blen;
Line 323 
Line 322 
                 buffer_get_bignum(&auth->identities, key->rsa->e);                  buffer_get_bignum(&auth->identities, key->rsa->e);
                 buffer_get_bignum(&auth->identities, key->rsa->n);                  buffer_get_bignum(&auth->identities, key->rsa->n);
                 *comment = buffer_get_string(&auth->identities, NULL);                  *comment = buffer_get_string(&auth->identities, NULL);
                 if (bits != BN_num_bits(key->rsa->n))                  keybits = BN_num_bits(key->rsa->n);
                   if (keybits < 0 || bits != (u_int)keybits)
                         logit("Warning: identity keysize mismatch: actual %d, announced %u",                          logit("Warning: identity keysize mismatch: actual %d, announced %u",
                             BN_num_bits(key->rsa->n), bits);                              BN_num_bits(key->rsa->n), bits);
                 break;                  break;

Legend:
Removed from v.1.64  
changed lines
  Added in v.1.64.4.1