diff options
author | Damien Miller <djm@mindrot.org> | 2000-04-16 11:18:38 +1000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2000-04-16 11:18:38 +1000 |
commit | 4af51306d9a51459a5bef922df1037f876ae51fe (patch) | |
tree | 09ecfc215fce82345a3259f8a0f384b9a67906f0 /authfd.c | |
parent | 5d1705ecf9bd3216dc99a84242bcdf2e7297d307 (diff) |
- OpenBSD CVS updates.
[ssh.1 ssh.c]
- ssh -2
[auth.c channels.c clientloop.c packet.c packet.h serverloop.c]
[session.c sshconnect.c]
- check payload for (illegal) extra data
[ALL]
- whitespace cleanup
Diffstat (limited to 'authfd.c')
-rw-r--r-- | authfd.c | 24 |
1 files changed, 12 insertions, 12 deletions
@@ -1,20 +1,20 @@ | |||
1 | /* | 1 | /* |
2 | * | 2 | * |
3 | * authfd.c | 3 | * authfd.c |
4 | * | 4 | * |
5 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 5 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
6 | * | 6 | * |
7 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 7 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
8 | * All rights reserved | 8 | * All rights reserved |
9 | * | 9 | * |
10 | * Created: Wed Mar 29 01:30:28 1995 ylo | 10 | * Created: Wed Mar 29 01:30:28 1995 ylo |
11 | * | 11 | * |
12 | * Functions for connecting the local authentication agent. | 12 | * Functions for connecting the local authentication agent. |
13 | * | 13 | * |
14 | */ | 14 | */ |
15 | 15 | ||
16 | #include "includes.h" | 16 | #include "includes.h" |
17 | RCSID("$Id: authfd.c,v 1.11 2000/04/13 02:26:35 damien Exp $"); | 17 | RCSID("$Id: authfd.c,v 1.12 2000/04/16 01:18:40 damien Exp $"); |
18 | 18 | ||
19 | #include "ssh.h" | 19 | #include "ssh.h" |
20 | #include "rsa.h" | 20 | #include "rsa.h" |
@@ -69,7 +69,7 @@ ssh_get_authentication_socket() | |||
69 | * ssh_get_authentication_socket(). | 69 | * ssh_get_authentication_socket(). |
70 | */ | 70 | */ |
71 | 71 | ||
72 | void | 72 | void |
73 | ssh_close_authentication_socket(int sock) | 73 | ssh_close_authentication_socket(int sock) |
74 | { | 74 | { |
75 | if (getenv(SSH_AUTHSOCKET_ENV_NAME)) | 75 | if (getenv(SSH_AUTHSOCKET_ENV_NAME)) |
@@ -113,7 +113,7 @@ ssh_get_authentication_connection() | |||
113 | * memory. | 113 | * memory. |
114 | */ | 114 | */ |
115 | 115 | ||
116 | void | 116 | void |
117 | ssh_close_authentication_connection(AuthenticationConnection *ac) | 117 | ssh_close_authentication_connection(AuthenticationConnection *ac) |
118 | { | 118 | { |
119 | buffer_free(&ac->packet); | 119 | buffer_free(&ac->packet); |
@@ -343,7 +343,7 @@ error_cleanup: | |||
343 | * be used by normal applications. | 343 | * be used by normal applications. |
344 | */ | 344 | */ |
345 | 345 | ||
346 | int | 346 | int |
347 | ssh_add_identity(AuthenticationConnection *auth, | 347 | ssh_add_identity(AuthenticationConnection *auth, |
348 | RSA * key, const char *comment) | 348 | RSA * key, const char *comment) |
349 | { | 349 | { |
@@ -431,7 +431,7 @@ error_cleanup: | |||
431 | * meant to be used by normal applications. | 431 | * meant to be used by normal applications. |
432 | */ | 432 | */ |
433 | 433 | ||
434 | int | 434 | int |
435 | ssh_remove_identity(AuthenticationConnection *auth, RSA *key) | 435 | ssh_remove_identity(AuthenticationConnection *auth, RSA *key) |
436 | { | 436 | { |
437 | Buffer buffer; | 437 | Buffer buffer; |
@@ -514,7 +514,7 @@ error_cleanup: | |||
514 | * by normal applications. | 514 | * by normal applications. |
515 | */ | 515 | */ |
516 | 516 | ||
517 | int | 517 | int |
518 | ssh_remove_all_identities(AuthenticationConnection *auth) | 518 | ssh_remove_all_identities(AuthenticationConnection *auth) |
519 | { | 519 | { |
520 | Buffer buffer; | 520 | Buffer buffer; |