diff options
author | Damien Miller <djm@mindrot.org> | 2002-01-22 23:11:40 +1100 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2002-01-22 23:11:40 +1100 |
commit | 48b03fc5460390318e94462707182b72dfaba91f (patch) | |
tree | 5fca9bcb09bab53083b274e0121a92dc8c1fbb16 /auth-rsa.c | |
parent | 66823cddbe80d1d22ac44d503b8c121f071e7105 (diff) |
- markus@cvs.openbsd.org 2001/12/27 20:39:58
[auth1.c auth-rsa.c channels.c clientloop.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshd.c ttymodes.c]
get rid of packet_integrity_check, use packet_done() instead.
Diffstat (limited to 'auth-rsa.c')
-rw-r--r-- | auth-rsa.c | 4 |
1 files changed, 2 insertions, 2 deletions
@@ -14,7 +14,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: auth-rsa.c,v 1.48 2001/12/27 20:39:58 markus Exp $"); +RCSID("$OpenBSD: auth-rsa.c,v 1.49 2001/12/28 12:14:27 markus Exp $"); #include <openssl/rsa.h> #include <openssl/md5.h> @@ -94,7 +94,7 @@ auth_rsa_challenge_dialog(RSA *pk) packet_read_expect(&plen, SSH_CMSG_AUTH_RSA_RESPONSE); for (i = 0; i < 16; i++) response[i] = packet_get_char(); - packet_done(); + packet_check_eom(); /* The response is MD5 of decrypted challenge plus session id. */ len = BN_num_bytes(challenge); |