summaryrefslogtreecommitdiff
path: root/authfile.c
diff options
context:
space:
mode:
authorDarren Tucker <dtucker@zip.com.au>2004-06-22 12:56:01 +1000
committerDarren Tucker <dtucker@zip.com.au>2004-06-22 12:56:01 +1000
commit3f9fdc71219d498a996c4e4ca8330df7f598fb5d (patch)
tree902072deed2ca26a5b0b3fa5f3749783e0bd62e6 /authfile.c
parentb357afc0a03a4238a01acf5d9641ebda9f71d500 (diff)
- avsm@cvs.openbsd.org 2004/06/21 17:36:31
[auth-rsa.c auth2-gss.c auth2-pubkey.c authfile.c canohost.c channels.c cipher.c dns.c kex.c monitor.c monitor_fdpass.c monitor_wrap.c monitor_wrap.h nchan.c packet.c progressmeter.c scp.c sftp-server.c sftp.c ssh-gss.h ssh-keygen.c ssh.c sshconnect.c sshconnect1.c sshlogin.c sshpty.c] make ssh -Wshadow clean, no functional changes markus@ ok There are also some portable-specific -Wshadow warnings to be fixed in monitor.c and montior_wrap.c.
Diffstat (limited to 'authfile.c')
-rw-r--r--authfile.c10
1 files changed, 5 insertions, 5 deletions
diff --git a/authfile.c b/authfile.c
index 305e9473b..76a60d020 100644
--- a/authfile.c
+++ b/authfile.c
@@ -36,7 +36,7 @@
36 */ 36 */
37 37
38#include "includes.h" 38#include "includes.h"
39RCSID("$OpenBSD: authfile.c,v 1.56 2004/05/11 19:01:43 deraadt Exp $"); 39RCSID("$OpenBSD: authfile.c,v 1.57 2004/06/21 17:36:31 avsm Exp $");
40 40
41#include <openssl/err.h> 41#include <openssl/err.h>
42#include <openssl/evp.h> 42#include <openssl/evp.h>
@@ -72,7 +72,7 @@ key_save_private_rsa1(Key *key, const char *filename, const char *passphrase,
72 int fd, i, cipher_num; 72 int fd, i, cipher_num;
73 CipherContext ciphercontext; 73 CipherContext ciphercontext;
74 Cipher *cipher; 74 Cipher *cipher;
75 u_int32_t rand; 75 u_int32_t rnd;
76 76
77 /* 77 /*
78 * If the passphrase is empty, use SSH_CIPHER_NONE to ease converting 78 * If the passphrase is empty, use SSH_CIPHER_NONE to ease converting
@@ -87,9 +87,9 @@ key_save_private_rsa1(Key *key, const char *filename, const char *passphrase,
87 buffer_init(&buffer); 87 buffer_init(&buffer);
88 88
89 /* Put checkbytes for checking passphrase validity. */ 89 /* Put checkbytes for checking passphrase validity. */
90 rand = arc4random(); 90 rnd = arc4random();
91 buf[0] = rand & 0xff; 91 buf[0] = rnd & 0xff;
92 buf[1] = (rand >> 8) & 0xff; 92 buf[1] = (rnd >> 8) & 0xff;
93 buf[2] = buf[0]; 93 buf[2] = buf[0];
94 buf[3] = buf[1]; 94 buf[3] = buf[1];
95 buffer_append(&buffer, buf, 4); 95 buffer_append(&buffer, buf, 4);