summaryrefslogtreecommitdiff
path: root/kexgex.c
diff options
context:
space:
mode:
authordjm <djm>2002-01-22 12:11:38 +0000
committerdjm <djm>2002-01-22 12:11:38 +0000
commit7d551c1f6d17bbd750873d17e563892816ce38bb (patch)
tree6ac290d9a86b87d788ad854d7fce4e75cd8e8847 /kexgex.c
parentcca2701585b8c1ac86c67e0e4ad6fad2d933df84 (diff)
downloadopenssh-7d551c1f6d17bbd750873d17e563892816ce38bb.tar.gz
- markus@cvs.openbsd.org 2001/12/27 20:39:58
[auth1.c auth-rsa.c channels.c clientloop.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshd.c ttymodes.c] get rid of packet_integrity_check, use packet_done() instead.
Diffstat (limited to 'kexgex.c')
-rw-r--r--kexgex.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/kexgex.c b/kexgex.c
index 8822c8dc..49f639c6 100644
--- a/kexgex.c
+++ b/kexgex.c
@@ -24,7 +24,7 @@
*/
#include "includes.h"
-RCSID("$OpenBSD: kexgex.c,v 1.12 2001/12/27 19:37:23 markus Exp $");
+RCSID("$OpenBSD: kexgex.c,v 1.13 2001/12/28 12:14:27 markus Exp $");
#include <openssl/bn.h>
@@ -146,7 +146,7 @@ kexgex_client(Kex *kex)
if ((g = BN_new()) == NULL)
fatal("BN_new");
packet_get_bignum2(g, &dlen);
- packet_done();
+ packet_check_eom();
if (BN_num_bits(p) < min || BN_num_bits(p) > max)
fatal("DH_GEX group out of range: %d !< %d !< %d",
@@ -196,7 +196,7 @@ kexgex_client(Kex *kex)
/* signed H */
signature = packet_get_string(&slen);
- packet_done();
+ packet_check_eom();
if (!dh_pub_is_valid(dh, dh_server_pub))
packet_disconnect("bad server public DH value");
@@ -289,7 +289,7 @@ kexgex_server(Kex *kex)
default:
fatal("protocol error during kex, no DH_GEX_REQUEST: %d", type);
}
- packet_done();
+ packet_check_eom();
if (max < min || nbits < min || max < nbits)
fatal("DH_GEX_REQUEST, bad parameters: %d !< %d !< %d",