diff options
author | djm <djm> | 2002-01-22 12:11:38 +0000 |
---|---|---|
committer | djm <djm> | 2002-01-22 12:11:38 +0000 |
commit | 7d551c1f6d17bbd750873d17e563892816ce38bb (patch) | |
tree | 6ac290d9a86b87d788ad854d7fce4e75cd8e8847 /kexgex.c | |
parent | cca2701585b8c1ac86c67e0e4ad6fad2d933df84 (diff) | |
download | openssh-7d551c1f6d17bbd750873d17e563892816ce38bb.tar.gz |
- markus@cvs.openbsd.org 2001/12/27 20:39:58
[auth1.c auth-rsa.c channels.c clientloop.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshd.c ttymodes.c]
get rid of packet_integrity_check, use packet_done() instead.
Diffstat (limited to 'kexgex.c')
-rw-r--r-- | kexgex.c | 8 |
1 files changed, 4 insertions, 4 deletions
@@ -24,7 +24,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: kexgex.c,v 1.12 2001/12/27 19:37:23 markus Exp $"); +RCSID("$OpenBSD: kexgex.c,v 1.13 2001/12/28 12:14:27 markus Exp $"); #include <openssl/bn.h> @@ -146,7 +146,7 @@ kexgex_client(Kex *kex) if ((g = BN_new()) == NULL) fatal("BN_new"); packet_get_bignum2(g, &dlen); - packet_done(); + packet_check_eom(); if (BN_num_bits(p) < min || BN_num_bits(p) > max) fatal("DH_GEX group out of range: %d !< %d !< %d", @@ -196,7 +196,7 @@ kexgex_client(Kex *kex) /* signed H */ signature = packet_get_string(&slen); - packet_done(); + packet_check_eom(); if (!dh_pub_is_valid(dh, dh_server_pub)) packet_disconnect("bad server public DH value"); @@ -289,7 +289,7 @@ kexgex_server(Kex *kex) default: fatal("protocol error during kex, no DH_GEX_REQUEST: %d", type); } - packet_done(); + packet_check_eom(); if (max < min || nbits < min || max < nbits) fatal("DH_GEX_REQUEST, bad parameters: %d !< %d !< %d", |