=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/usr.bin/ssh/authfile.c,v retrieving revision 1.54.2.2 retrieving revision 1.55 diff -u -r1.54.2.2 -r1.55 --- src/usr.bin/ssh/authfile.c 2004/08/19 22:37:30 1.54.2.2 +++ src/usr.bin/ssh/authfile.c 2003/09/18 07:56:05 1.55 @@ -36,7 +36,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: authfile.c,v 1.54.2.2 2004/08/19 22:37:30 brad Exp $"); +RCSID("$OpenBSD: authfile.c,v 1.55 2003/09/18 07:56:05 markus Exp $"); #include #include @@ -72,7 +72,7 @@ int fd, i, cipher_num; CipherContext ciphercontext; Cipher *cipher; - u_int32_t rnd; + u_int32_t rand; /* * If the passphrase is empty, use SSH_CIPHER_NONE to ease converting @@ -87,9 +87,9 @@ buffer_init(&buffer); /* Put checkbytes for checking passphrase validity. */ - rnd = arc4random(); - buf[0] = rnd & 0xff; - buf[1] = (rnd >> 8) & 0xff; + rand = arc4random(); + buf[0] = rand & 0xff; + buf[1] = (rand >> 8) & 0xff; buf[2] = buf[0]; buf[3] = buf[1]; buffer_append(&buffer, buf, 4); @@ -236,16 +236,14 @@ struct stat st; char *cp; int i; - size_t len; + off_t len; if (fstat(fd, &st) < 0) { error("fstat for key file %.200s failed: %.100s", filename, strerror(errno)); return NULL; } - if (st.st_size > 1*1024*1024) - close(fd); - len = (size_t)st.st_size; /* truncated */ + len = st.st_size; buffer_init(&buffer); cp = buffer_append_space(&buffer, len); @@ -320,7 +318,7 @@ char **commentp) { int i, check1, check2, cipher_type; - size_t len; + off_t len; Buffer buffer, decrypted; u_char *cp; CipherContext ciphercontext; @@ -334,11 +332,7 @@ close(fd); return NULL; } - if (st.st_size > 1*1024*1024) { - close(fd); - return (NULL); - } - len = (size_t)st.st_size; /* truncated */ + len = st.st_size; buffer_init(&buffer); cp = buffer_append_space(&buffer, len);