summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/auth1.c
diff options
context:
space:
mode:
authormarkus <markus@openbsd.org>2001-12-28 12:14:27 +0000
committermarkus <markus@openbsd.org>2001-12-28 12:14:27 +0000
commit7a330f3f49a47227a0a0fb418683498a25413f98 (patch)
tree21e867e22991e8aab1c2227871ef015eb95bd5e2 /usr.bin/ssh/auth1.c
parentdo not reference plot; from rogier@quaak.org; closes pr/2276 (diff)
downloadwireguard-openbsd-7a330f3f49a47227a0a0fb418683498a25413f98.tar.xz
wireguard-openbsd-7a330f3f49a47227a0a0fb418683498a25413f98.zip
s/packet_done/packet_check_eom/ (end-of-message); ok djm@
Diffstat (limited to 'usr.bin/ssh/auth1.c')
-rw-r--r--usr.bin/ssh/auth1.c16
1 files changed, 8 insertions, 8 deletions
diff --git a/usr.bin/ssh/auth1.c b/usr.bin/ssh/auth1.c
index af7ca8e7164..ffa67bc3d0e 100644
--- a/usr.bin/ssh/auth1.c
+++ b/usr.bin/ssh/auth1.c
@@ -10,7 +10,7 @@
*/
#include "includes.h"
-RCSID("$OpenBSD: auth1.c,v 1.31 2001/12/27 20:39:58 markus Exp $");
+RCSID("$OpenBSD: auth1.c,v 1.32 2001/12/28 12:14:27 markus Exp $");
#include "xmalloc.h"
#include "rsa.h"
@@ -112,7 +112,7 @@ do_authloop(Authctxt *authctxt)
verbose("Kerberos authentication disabled.");
} else {
char *kdata = packet_get_string(&dlen);
- packet_done();
+ packet_check_eom();
if (kdata[0] == 4) { /* KRB_PROT_VERSION */
#ifdef KRB4
@@ -174,7 +174,7 @@ do_authloop(Authctxt *authctxt)
* IP-spoofing on a local network.)
*/
client_user = packet_get_string(&ulen);
- packet_done();
+ packet_check_eom();
/* Try to authenticate using /etc/hosts.equiv and .rhosts. */
authenticated = auth_rhosts(pw, client_user);
@@ -205,7 +205,7 @@ do_authloop(Authctxt *authctxt)
verbose("Warning: keysize mismatch for client_host_key: "
"actual %d, announced %d",
BN_num_bits(client_host_key->rsa->n), bits);
- packet_done();
+ packet_check_eom();
authenticated = auth_rhosts_rsa(pw, client_user,
client_host_key);
@@ -224,7 +224,7 @@ do_authloop(Authctxt *authctxt)
if ((n = BN_new()) == NULL)
fatal("do_authloop: BN_new failed");
packet_get_bignum(n, &nlen);
- packet_done();
+ packet_check_eom();
authenticated = auth_rsa(pw, n);
BN_clear_free(n);
break;
@@ -240,7 +240,7 @@ do_authloop(Authctxt *authctxt)
* not visible to an outside observer.
*/
password = packet_get_string(&dlen);
- packet_done();
+ packet_check_eom();
/* Try authentication with the password. */
authenticated = auth_password(authctxt, password);
@@ -269,7 +269,7 @@ do_authloop(Authctxt *authctxt)
if (options.challenge_response_authentication == 1) {
char *response = packet_get_string(&dlen);
debug("got response '%s'", response);
- packet_done();
+ packet_check_eom();
authenticated = verify_response(authctxt, response);
memset(response, 'r', dlen);
xfree(response);
@@ -332,7 +332,7 @@ do_authentication(void)
/* Get the user name. */
user = packet_get_string(&ulen);
- packet_done();
+ packet_check_eom();
if ((style = strchr(user, ':')) != NULL)
*style++ = '\0';