diff options
author | djm <djm> | 2002-01-22 12:11:38 +0000 |
---|---|---|
committer | djm <djm> | 2002-01-22 12:11:38 +0000 |
commit | cca2701585b8c1ac86c67e0e4ad6fad2d933df84 (patch) | |
tree | 6353f924226a7d3f30f5b984d4e453be18bdd288 /auth-rsa.c | |
parent | c539d57036b114cb7affe3011e251285f0fd3972 (diff) | |
download | openssh-cca2701585b8c1ac86c67e0e4ad6fad2d933df84.tar.gz |
- markus@cvs.openbsd.org 2001/12/27 20:39:58
[auth1.c auth-rsa.c channels.c clientloop.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshd.c ttymodes.c]
get rid of packet_integrity_check, use packet_done() instead.
Diffstat (limited to 'auth-rsa.c')
-rw-r--r-- | auth-rsa.c | 4 |
1 files changed, 2 insertions, 2 deletions
@@ -14,7 +14,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: auth-rsa.c,v 1.47 2001/12/27 18:22:16 markus Exp $"); +RCSID("$OpenBSD: auth-rsa.c,v 1.48 2001/12/27 20:39:58 markus Exp $"); #include <openssl/rsa.h> #include <openssl/md5.h> @@ -92,9 +92,9 @@ auth_rsa_challenge_dialog(RSA *pk) /* Wait for a response. */ packet_read_expect(&plen, SSH_CMSG_AUTH_RSA_RESPONSE); - packet_integrity_check(plen, 16, SSH_CMSG_AUTH_RSA_RESPONSE); for (i = 0; i < 16; i++) response[i] = packet_get_char(); + packet_done(); /* The response is MD5 of decrypted challenge plus session id. */ len = BN_num_bytes(challenge); |