diff options
author | Ben Lindstrom <mouring@eviladmin.org> | 2002-06-25 23:19:13 +0000 |
---|---|---|
committer | Ben Lindstrom <mouring@eviladmin.org> | 2002-06-25 23:19:13 +0000 |
commit | c5a7f4fdf98ec9067166f1643408a64acf308ff5 (patch) | |
tree | 802a47d8d1c0d66c1cfe8935b4fab29dec980540 | |
parent | 4fed2be856c2677c4b92825dfcfcbb178c241a8c (diff) |
- markus@cvs.openbsd.org 2002/06/24 14:55:38
[authfile.c kex.c ssh-agent.c]
cat to (void) when output from buffer_get_X is ignored
-rw-r--r-- | ChangeLog | 5 | ||||
-rw-r--r-- | authfile.c | 6 | ||||
-rw-r--r-- | kex.c | 6 | ||||
-rw-r--r-- | ssh-agent.c | 6 |
4 files changed, 13 insertions, 10 deletions
@@ -10,6 +10,9 @@ | |||
10 | - markus@cvs.openbsd.org 2002/06/24 14:33:27 | 10 | - markus@cvs.openbsd.org 2002/06/24 14:33:27 |
11 | [channels.c channels.h clientloop.c serverloop.c] | 11 | [channels.c channels.h clientloop.c serverloop.c] |
12 | move channel counter to u_int | 12 | move channel counter to u_int |
13 | - markus@cvs.openbsd.org 2002/06/24 14:55:38 | ||
14 | [authfile.c kex.c ssh-agent.c] | ||
15 | cat to (void) when output from buffer_get_X is ignored | ||
13 | 16 | ||
14 | 20020625 | 17 | 20020625 |
15 | - (stevesk) [INSTALL acconfig.h configure.ac defines.h] remove --with-rsh | 18 | - (stevesk) [INSTALL acconfig.h configure.ac defines.h] remove --with-rsh |
@@ -1109,4 +1112,4 @@ | |||
1109 | - (stevesk) entropy.c: typo in debug message | 1112 | - (stevesk) entropy.c: typo in debug message |
1110 | - (djm) ssh-keygen -i needs seeded RNG; report from markus@ | 1113 | - (djm) ssh-keygen -i needs seeded RNG; report from markus@ |
1111 | 1114 | ||
1112 | $Id: ChangeLog,v 1.2276 2002/06/25 23:17:36 mouring Exp $ | 1115 | $Id: ChangeLog,v 1.2277 2002/06/25 23:19:13 mouring Exp $ |
diff --git a/authfile.c b/authfile.c index 6d936de56..1fa5d811a 100644 --- a/authfile.c +++ b/authfile.c | |||
@@ -36,7 +36,7 @@ | |||
36 | */ | 36 | */ |
37 | 37 | ||
38 | #include "includes.h" | 38 | #include "includes.h" |
39 | RCSID("$OpenBSD: authfile.c,v 1.49 2002/05/23 19:24:30 markus Exp $"); | 39 | RCSID("$OpenBSD: authfile.c,v 1.50 2002/06/24 14:55:38 markus Exp $"); |
40 | 40 | ||
41 | #include <openssl/err.h> | 41 | #include <openssl/err.h> |
42 | #include <openssl/evp.h> | 42 | #include <openssl/evp.h> |
@@ -270,7 +270,7 @@ key_load_public_rsa1(int fd, const char *filename, char **commentp) | |||
270 | (void) buffer_get_int(&buffer); /* reserved */ | 270 | (void) buffer_get_int(&buffer); /* reserved */ |
271 | 271 | ||
272 | /* Read the public key from the buffer. */ | 272 | /* Read the public key from the buffer. */ |
273 | buffer_get_int(&buffer); | 273 | (void) buffer_get_int(&buffer); |
274 | pub = key_new(KEY_RSA1); | 274 | pub = key_new(KEY_RSA1); |
275 | buffer_get_bignum(&buffer, pub->rsa->n); | 275 | buffer_get_bignum(&buffer, pub->rsa->n); |
276 | buffer_get_bignum(&buffer, pub->rsa->e); | 276 | buffer_get_bignum(&buffer, pub->rsa->e); |
@@ -357,7 +357,7 @@ key_load_private_rsa1(int fd, const char *filename, const char *passphrase, | |||
357 | (void) buffer_get_int(&buffer); /* Reserved data. */ | 357 | (void) buffer_get_int(&buffer); /* Reserved data. */ |
358 | 358 | ||
359 | /* Read the public key from the buffer. */ | 359 | /* Read the public key from the buffer. */ |
360 | buffer_get_int(&buffer); | 360 | (void) buffer_get_int(&buffer); |
361 | prv = key_new_private(KEY_RSA1); | 361 | prv = key_new_private(KEY_RSA1); |
362 | 362 | ||
363 | buffer_get_bignum(&buffer, prv->rsa->n); | 363 | buffer_get_bignum(&buffer, prv->rsa->n); |
@@ -23,7 +23,7 @@ | |||
23 | */ | 23 | */ |
24 | 24 | ||
25 | #include "includes.h" | 25 | #include "includes.h" |
26 | RCSID("$OpenBSD: kex.c,v 1.50 2002/05/15 15:47:49 mouring Exp $"); | 26 | RCSID("$OpenBSD: kex.c,v 1.51 2002/06/24 14:55:38 markus Exp $"); |
27 | 27 | ||
28 | #include <openssl/crypto.h> | 28 | #include <openssl/crypto.h> |
29 | 29 | ||
@@ -202,8 +202,8 @@ kex_input_kexinit(int type, u_int32_t seq, void *ctxt) | |||
202 | packet_get_char(); | 202 | packet_get_char(); |
203 | for (i = 0; i < PROPOSAL_MAX; i++) | 203 | for (i = 0; i < PROPOSAL_MAX; i++) |
204 | xfree(packet_get_string(NULL)); | 204 | xfree(packet_get_string(NULL)); |
205 | packet_get_char(); | 205 | (void) packet_get_char(); |
206 | packet_get_int(); | 206 | (void) packet_get_int(); |
207 | packet_check_eom(); | 207 | packet_check_eom(); |
208 | 208 | ||
209 | kex_kexinit_finish(kex); | 209 | kex_kexinit_finish(kex); |
diff --git a/ssh-agent.c b/ssh-agent.c index b3558b258..ac16bae40 100644 --- a/ssh-agent.c +++ b/ssh-agent.c | |||
@@ -35,7 +35,7 @@ | |||
35 | 35 | ||
36 | #include "includes.h" | 36 | #include "includes.h" |
37 | #include "openbsd-compat/fake-queue.h" | 37 | #include "openbsd-compat/fake-queue.h" |
38 | RCSID("$OpenBSD: ssh-agent.c,v 1.96 2002/06/23 10:29:52 deraadt Exp $"); | 38 | RCSID("$OpenBSD: ssh-agent.c,v 1.97 2002/06/24 14:55:38 markus Exp $"); |
39 | 39 | ||
40 | #include <openssl/evp.h> | 40 | #include <openssl/evp.h> |
41 | #include <openssl/md5.h> | 41 | #include <openssl/md5.h> |
@@ -197,7 +197,7 @@ process_authentication_challenge1(SocketEntry *e) | |||
197 | if ((challenge = BN_new()) == NULL) | 197 | if ((challenge = BN_new()) == NULL) |
198 | fatal("process_authentication_challenge1: BN_new failed"); | 198 | fatal("process_authentication_challenge1: BN_new failed"); |
199 | 199 | ||
200 | buffer_get_int(&e->request); /* ignored */ | 200 | (void) buffer_get_int(&e->request); /* ignored */ |
201 | buffer_get_bignum(&e->request, key->rsa->e); | 201 | buffer_get_bignum(&e->request, key->rsa->e); |
202 | buffer_get_bignum(&e->request, key->rsa->n); | 202 | buffer_get_bignum(&e->request, key->rsa->n); |
203 | buffer_get_bignum(&e->request, challenge); | 203 | buffer_get_bignum(&e->request, challenge); |
@@ -398,7 +398,7 @@ process_add_identity(SocketEntry *e, int version) | |||
398 | switch (version) { | 398 | switch (version) { |
399 | case 1: | 399 | case 1: |
400 | k = key_new_private(KEY_RSA1); | 400 | k = key_new_private(KEY_RSA1); |
401 | buffer_get_int(&e->request); /* ignored */ | 401 | (void) buffer_get_int(&e->request); /* ignored */ |
402 | buffer_get_bignum(&e->request, k->rsa->n); | 402 | buffer_get_bignum(&e->request, k->rsa->n); |
403 | buffer_get_bignum(&e->request, k->rsa->e); | 403 | buffer_get_bignum(&e->request, k->rsa->e); |
404 | buffer_get_bignum(&e->request, k->rsa->d); | 404 | buffer_get_bignum(&e->request, k->rsa->d); |