From d432ccf7403b725fce590818a85804625b7cad20 Mon Sep 17 00:00:00 2001 From: Damien Miller Date: Tue, 22 Jan 2002 23:14:44 +1100 Subject: - markus@cvs.openbsd.org 2001/12/28 13:57:33 [auth1.c kexdh.c kexgex.c packet.c packet.h sshconnect1.c sshd.c] packet_get_bignum* no longer returns a size --- auth1.c | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) (limited to 'auth1.c') diff --git a/auth1.c b/auth1.c index 42524cc9..6585fa7c 100644 --- a/auth1.c +++ b/auth1.c @@ -10,7 +10,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: auth1.c,v 1.32 2001/12/28 12:14:27 markus Exp $"); +RCSID("$OpenBSD: auth1.c,v 1.33 2001/12/28 13:57:33 markus Exp $"); #include "xmalloc.h" #include "rsa.h" @@ -71,7 +71,7 @@ do_authloop(Authctxt *authctxt) char *client_user, *password; char info[1024]; u_int dlen; - int plen, nlen, elen; + int plen; u_int ulen; int type = 0; struct passwd *pw = authctxt->pw; @@ -203,8 +203,8 @@ do_authloop(Authctxt *authctxt) /* Get the client host key. */ client_host_key = key_new(KEY_RSA1); bits = packet_get_int(); - packet_get_bignum(client_host_key->rsa->e, &elen); - packet_get_bignum(client_host_key->rsa->n, &nlen); + packet_get_bignum(client_host_key->rsa->e); + packet_get_bignum(client_host_key->rsa->n); if (bits != BN_num_bits(client_host_key->rsa->n)) verbose("Warning: keysize mismatch for client_host_key: " @@ -227,7 +227,7 @@ do_authloop(Authctxt *authctxt) /* RSA authentication requested. */ if ((n = BN_new()) == NULL) fatal("do_authloop: BN_new failed"); - packet_get_bignum(n, &nlen); + packet_get_bignum(n); packet_check_eom(); authenticated = auth_rsa(pw, n); BN_clear_free(n); -- cgit v1.2.3