=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/usr.bin/ssh/session.c,v retrieving revision 1.115 retrieving revision 1.116 diff -u -r1.115 -r1.116 --- src/usr.bin/ssh/session.c 2001/12/27 20:39:58 1.115 +++ src/usr.bin/ssh/session.c 2001/12/28 12:14:27 1.116 @@ -33,7 +33,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: session.c,v 1.115 2001/12/27 20:39:58 markus Exp $"); +RCSID("$OpenBSD: session.c,v 1.116 2001/12/28 12:14:27 markus Exp $"); #include "ssh.h" #include "ssh1.h" @@ -205,7 +205,7 @@ switch (type) { case SSH_CMSG_REQUEST_COMPRESSION: compression_level = packet_get_int(); - packet_done(); + packet_check_eom(); if (compression_level < 1 || compression_level > 9) { packet_send_debug("Received illegal compression level %d.", compression_level); @@ -236,7 +236,7 @@ } else { s->screen = 0; } - packet_done(); + packet_check_eom(); success = session_setup_x11fwd(s); if (!success) { xfree(s->auth_proto); @@ -280,7 +280,7 @@ verbose("Kerberos TGT passing disabled."); } else { char *kdata = packet_get_string(&dlen); - packet_done(); + packet_check_eom(); /* XXX - 0x41, see creds_to_radix version */ if (kdata[0] != 0x41) { @@ -314,7 +314,7 @@ } else { /* Accept AFS token. */ char *token = packet_get_string(&dlen); - packet_done(); + packet_check_eom(); if (auth_afs_token(s->authctxt, token)) success = 1; @@ -336,7 +336,7 @@ } else { do_exec(s, NULL); } - packet_done(); + packet_check_eom(); session_close(s); return; @@ -1221,7 +1221,7 @@ s->row = packet_get_int(); s->xpixel = packet_get_int(); s->ypixel = packet_get_int(); - packet_done(); + packet_check_eom(); pty_change_window_size(s->ptyfd, s->row, s->col, s->xpixel, s->ypixel); return 1; } @@ -1286,7 +1286,7 @@ /* Set window size from the packet. */ pty_change_window_size(s->ptyfd, s->row, s->col, s->xpixel, s->ypixel); - packet_done(); + packet_check_eom(); session_proctitle(s); return 1; } @@ -1300,7 +1300,7 @@ char *cmd, *subsys = packet_get_string(&len); int i; - packet_done(); + packet_check_eom(); log("subsystem request for %s", subsys); for (i = 0; i < options.num_subsystems; i++) { @@ -1335,7 +1335,7 @@ s->auth_proto = packet_get_string(NULL); s->auth_data = packet_get_string(NULL); s->screen = packet_get_int(); - packet_done(); + packet_check_eom(); success = session_setup_x11fwd(s); if (!success) { @@ -1350,7 +1350,7 @@ static int session_shell_req(Session *s) { - packet_done(); + packet_check_eom(); do_exec(s, NULL); return 1; } @@ -1360,7 +1360,7 @@ { u_int len; char *command = packet_get_string(&len); - packet_done(); + packet_check_eom(); do_exec(s, command); xfree(command); return 1; @@ -1370,7 +1370,7 @@ session_auth_agent_req(Session *s) { static int called = 0; - packet_done(); + packet_check_eom(); if (no_agent_forwarding_flag) { debug("session_auth_agent_req: no_agent_forwarding_flag"); return 0;