diff options
author | djm <djm> | 2002-01-22 12:16:32 +0000 |
---|---|---|
committer | djm <djm> | 2002-01-22 12:16:32 +0000 |
commit | f33c1e34e6c073b4b63f25996eebecfef956fc01 (patch) | |
tree | 36384c807ebc2f58f63582d6e4f37fe36870f025 /auth-rsa.c | |
parent | d6f87ead761331d374a5f5a6435d46f4de1207cf (diff) | |
download | openssh-f33c1e34e6c073b4b63f25996eebecfef956fc01.tar.gz |
- markus@cvs.openbsd.org 2001/12/28 14:50:54
[auth1.c auth-rsa.c channels.c dispatch.c kex.c kexdh.c kexgex.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshconnect2.c sshd.c]
packet_read* no longer return the packet length, since it's not used.
Diffstat (limited to 'auth-rsa.c')
-rw-r--r-- | auth-rsa.c | 6 |
1 files changed, 3 insertions, 3 deletions
@@ -14,7 +14,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: auth-rsa.c,v 1.49 2001/12/28 12:14:27 markus Exp $"); +RCSID("$OpenBSD: auth-rsa.c,v 1.50 2001/12/28 14:50:54 markus Exp $"); #include <openssl/rsa.h> #include <openssl/md5.h> @@ -66,7 +66,7 @@ auth_rsa_challenge_dialog(RSA *pk) u_char buf[32], mdbuf[16], response[16]; MD5_CTX md; u_int i; - int plen, len; + int len; if ((encrypted_challenge = BN_new()) == NULL) fatal("auth_rsa_challenge_dialog: BN_new() failed"); @@ -91,7 +91,7 @@ auth_rsa_challenge_dialog(RSA *pk) packet_write_wait(); /* Wait for a response. */ - packet_read_expect(&plen, SSH_CMSG_AUTH_RSA_RESPONSE); + packet_read_expect(SSH_CMSG_AUTH_RSA_RESPONSE); for (i = 0; i < 16; i++) response[i] = packet_get_char(); packet_check_eom(); |