comparison svr-kex.c @ 340:454a34b2dfd1

Fixes from Erik Hovland: cli-authpubkey.c: fix leak of keybuf cli-kex.c: fix leak of fingerprint fp cli-service.c: remove commented out code dropbearkey.c: don't attepmt to free NULL key on failure common-kex.c: only free key if it is initialised keyimport.c: remove dead encrypted-key code don't leak a FILE* loading OpenSSH keys rsa.c, dss.c: check return values for some libtommath functions svr-kex.c: check return value retrieving DH kex mpint svr-tcpfwd.c: fix null-dereference if remote tcp forward request fails tcp-accept.c: don't incorrectly free the tcpinfo var
author Matt Johnston <matt@ucc.asn.au>
date Fri, 07 Jul 2006 09:17:18 +0000
parents 0cfba3034be5
children 3aa74a4d83ae 76097ec1a29a
comparison
equal deleted inserted replaced
339:31743c9bdf78 340:454a34b2dfd1
50 if (!ses.kexstate.recvkexinit) { 50 if (!ses.kexstate.recvkexinit) {
51 dropbear_exit("Premature kexdh_init message received"); 51 dropbear_exit("Premature kexdh_init message received");
52 } 52 }
53 53
54 m_mp_init(&dh_e); 54 m_mp_init(&dh_e);
55 buf_getmpint(ses.payload, &dh_e); 55 if (buf_getmpint(ses.payload, &dh_e) != DROPBEAR_SUCCESS) {
56 dropbear_exit("Failed to get kex value");
57 }
56 58
57 send_msg_kexdh_reply(&dh_e); 59 send_msg_kexdh_reply(&dh_e);
58 60
59 mp_clear(&dh_e); 61 mp_clear(&dh_e);
60 62