]> andersk Git - openssh.git/blobdiff - ssh.c
- markus@cvs.openbsd.org 2001/12/28 14:50:54
[openssh.git] / ssh.c
diff --git a/ssh.c b/ssh.c
index 76d45c96aa9ef6e6def3251bf0668e4a728080dc..6cf9f9b7ab8eea96ba26079f6dfb8df97154f88a 100644 (file)
--- a/ssh.c
+++ b/ssh.c
@@ -39,7 +39,7 @@
  */
 
 #include "includes.h"
-RCSID("$OpenBSD: ssh.c,v 1.155 2001/12/28 12:14:27 markus Exp $");
+RCSID("$OpenBSD: ssh.c,v 1.156 2001/12/28 14:50:54 markus Exp $");
 
 #include <openssl/evp.h>
 #include <openssl/err.h>
@@ -880,7 +880,6 @@ static int
 ssh_session(void)
 {
        int type;
-       int plen;
        int interactive = 0;
        int have_tty = 0;
        struct winsize ws;
@@ -898,7 +897,7 @@ ssh_session(void)
                packet_put_int(options.compression_level);
                packet_send();
                packet_write_wait();
-               type = packet_read(&plen);
+               type = packet_read();
                if (type == SSH_SMSG_SUCCESS)
                        packet_start_compression(options.compression_level);
                else if (type == SSH_SMSG_FAILURE)
@@ -936,7 +935,7 @@ ssh_session(void)
                packet_write_wait();
 
                /* Read response from the server. */
-               type = packet_read(&plen);
+               type = packet_read();
                if (type == SSH_SMSG_SUCCESS) {
                        interactive = 1;
                        have_tty = 1;
@@ -955,7 +954,7 @@ ssh_session(void)
                x11_request_forwarding_with_spoofing(0, proto, data);
 
                /* Read response from the server. */
-               type = packet_read(&plen);
+               type = packet_read();
                if (type == SSH_SMSG_SUCCESS) {
                        interactive = 1;
                } else if (type == SSH_SMSG_FAILURE) {
@@ -975,7 +974,7 @@ ssh_session(void)
                auth_request_forwarding();
 
                /* Read response from the server. */
-               type = packet_read(&plen);
+               type = packet_read();
                packet_check_eom();
                if (type != SSH_SMSG_SUCCESS)
                        log("Warning: Remote host denied authentication agent forwarding.");
This page took 0.032457 seconds and 4 git commands to generate.