summaryrefslogtreecommitdiff
path: root/channels.c
diff options
context:
space:
mode:
authorBen Lindstrom <mouring@eviladmin.org>2000-12-22 01:43:59 +0000
committerBen Lindstrom <mouring@eviladmin.org>2000-12-22 01:43:59 +0000
commit46c162204b5a6f7471525c2f75cb2c607c88b83f (patch)
tree9041b006ab612c18bdb16b606601839a00ca5b2c /channels.c
parenta074feb65d6f1fcad02e80b751e2287fd6230b09 (diff)
One way to massive patch. <sigh> It compiles and works under Linux..
And I think I have all the bits right from the OpenBSD tree. 20001222 - Updated RCSID for pty.c - (bal) OpenBSD CVS Updates: - markus@cvs.openbsd.org 2000/12/21 15:10:16 [auth-rh-rsa.c hostfile.c hostfile.h sshconnect.c] print keyfile:line for changed hostkeys, for deraadt@, ok deraadt@ - markus@cvs.openbsd.org 2000/12/20 19:26:56 [authfile.c] allow ssh -i userkey for root - markus@cvs.openbsd.org 2000/12/20 19:37:21 [authfd.c authfd.h kex.c sshconnect2.c sshd.c uidswap.c uidswap.h] fix prototypes; from stevesk@pobox.com - markus@cvs.openbsd.org 2000/12/20 19:32:08 [sshd.c] init pointer to NULL; report from Jan.Ivan@cern.ch - markus@cvs.openbsd.org 2000/12/19 23:17:54 [auth-krb4.c auth-options.c auth-options.h auth-rhosts.c auth-rsa.c auth1.c auth2-skey.c auth2.c authfd.c authfd.h authfile.c bufaux.c bufaux.h buffer.c canohost.c channels.c clientloop.c compress.c crc32.c deattack.c getput.h hmac.c hmac.h hostfile.c kex.c kex.h key.c key.h log.c login.c match.c match.h mpaux.c mpaux.h packet.c packet.h radix.c readconf.c rsa.c scp.c servconf.c servconf.h serverloop.c session.c sftp-server.c ssh-agent.c ssh-dss.c ssh-dss.h ssh-keygen.c ssh-keyscan.c ssh-rsa.c ssh-rsa.h ssh.c ssh.h uuencode.c uuencode.h sshconnect1.c sshconnect2.c sshd.c tildexpand.c] replace 'unsigned bla' with 'u_bla' everywhere. also replace 'char unsigned' with u_char.
Diffstat (limited to 'channels.c')
-rw-r--r--channels.c32
1 files changed, 16 insertions, 16 deletions
diff --git a/channels.c b/channels.c
index 8c0a7a455..3c2f15f2a 100644
--- a/channels.c
+++ b/channels.c
@@ -40,7 +40,7 @@
40 */ 40 */
41 41
42#include "includes.h" 42#include "includes.h"
43RCSID("$OpenBSD: channels.c,v 1.76 2000/12/19 22:43:44 markus Exp $"); 43RCSID("$OpenBSD: channels.c,v 1.77 2000/12/19 23:17:56 markus Exp $");
44 44
45#include "ssh.h" 45#include "ssh.h"
46#include "packet.h" 46#include "packet.h"
@@ -95,14 +95,14 @@ char *x11_saved_proto = NULL;
95 95
96/* Saved X11 authentication data. This is the real data. */ 96/* Saved X11 authentication data. This is the real data. */
97char *x11_saved_data = NULL; 97char *x11_saved_data = NULL;
98unsigned int x11_saved_data_len = 0; 98u_int x11_saved_data_len = 0;
99 99
100/* 100/*
101 * Fake X11 authentication data. This is what the server will be sending us; 101 * Fake X11 authentication data. This is what the server will be sending us;
102 * we should replace any occurrences of this by the real data. 102 * we should replace any occurrences of this by the real data.
103 */ 103 */
104char *x11_fake_data = NULL; 104char *x11_fake_data = NULL;
105unsigned int x11_fake_data_len; 105u_int x11_fake_data_len;
106 106
107/* 107/*
108 * Data structure for storing which hosts are permitted for forward requests. 108 * Data structure for storing which hosts are permitted for forward requests.
@@ -436,15 +436,15 @@ channel_pre_output_draining(Channel *c, fd_set * readset, fd_set * writeset)
436int 436int
437x11_open_helper(Channel *c) 437x11_open_helper(Channel *c)
438{ 438{
439 unsigned char *ucp; 439 u_char *ucp;
440 unsigned int proto_len, data_len; 440 u_int proto_len, data_len;
441 441
442 /* Check if the fixed size part of the packet is in buffer. */ 442 /* Check if the fixed size part of the packet is in buffer. */
443 if (buffer_len(&c->output) < 12) 443 if (buffer_len(&c->output) < 12)
444 return 0; 444 return 0;
445 445
446 /* Parse the lengths of variable-length fields. */ 446 /* Parse the lengths of variable-length fields. */
447 ucp = (unsigned char *) buffer_ptr(&c->output); 447 ucp = (u_char *) buffer_ptr(&c->output);
448 if (ucp[0] == 0x42) { /* Byte order MSB first. */ 448 if (ucp[0] == 0x42) { /* Byte order MSB first. */
449 proto_len = 256 * ucp[6] + ucp[7]; 449 proto_len = 256 * ucp[6] + ucp[7];
450 data_len = 256 * ucp[8] + ucp[9]; 450 data_len = 256 * ucp[8] + ucp[9];
@@ -1066,7 +1066,7 @@ channel_input_data(int type, int plen, void *ctxt)
1066{ 1066{
1067 int id; 1067 int id;
1068 char *data; 1068 char *data;
1069 unsigned int data_len; 1069 u_int data_len;
1070 Channel *c; 1070 Channel *c;
1071 1071
1072 /* Get the channel number and verify it. */ 1072 /* Get the channel number and verify it. */
@@ -1112,7 +1112,7 @@ channel_input_extended_data(int type, int plen, void *ctxt)
1112 int id; 1112 int id;
1113 int tcode; 1113 int tcode;
1114 char *data; 1114 char *data;
1115 unsigned int data_len; 1115 u_int data_len;
1116 Channel *c; 1116 Channel *c;
1117 1117
1118 /* Get the channel number and verify it. */ 1118 /* Get the channel number and verify it. */
@@ -1155,7 +1155,7 @@ channel_input_extended_data(int type, int plen, void *ctxt)
1155int 1155int
1156channel_not_very_much_buffered_data() 1156channel_not_very_much_buffered_data()
1157{ 1157{
1158 unsigned int i; 1158 u_int i;
1159 Channel *c; 1159 Channel *c;
1160 1160
1161 for (i = 0; i < channels_alloc; i++) { 1161 for (i = 0; i < channels_alloc; i++) {
@@ -1423,7 +1423,7 @@ channel_max_fd()
1423int 1423int
1424channel_still_open() 1424channel_still_open()
1425{ 1425{
1426 unsigned int i; 1426 u_int i;
1427 for (i = 0; i < channels_alloc; i++) 1427 for (i = 0; i < channels_alloc; i++)
1428 switch (channels[i].type) { 1428 switch (channels[i].type) {
1429 case SSH_CHANNEL_FREE: 1429 case SSH_CHANNEL_FREE:
@@ -1786,7 +1786,7 @@ channel_input_port_open(int type, int plen, void *ctxt)
1786 u_short host_port; 1786 u_short host_port;
1787 char *host, *originator_string; 1787 char *host, *originator_string;
1788 int remote_channel, sock = -1, newch, i, denied; 1788 int remote_channel, sock = -1, newch, i, denied;
1789 unsigned int host_len, originator_len; 1789 u_int host_len, originator_len;
1790 1790
1791 /* Get remote channel number. */ 1791 /* Get remote channel number. */
1792 remote_channel = packet_get_int(); 1792 remote_channel = packet_get_int();
@@ -1996,7 +1996,7 @@ x11_create_display_inet(int screen_number, int x11_display_offset)
1996 1996
1997static 1997static
1998int 1998int
1999connect_local_xsocket(unsigned int dnr) 1999connect_local_xsocket(u_int dnr)
2000{ 2000{
2001 static const char *const x_sockets[] = { 2001 static const char *const x_sockets[] = {
2002 X_UNIX_PATH "%u", 2002 X_UNIX_PATH "%u",
@@ -2129,7 +2129,7 @@ x11_input_open(int type, int plen, void *ctxt)
2129{ 2129{
2130 int remote_channel, sock = 0, newch; 2130 int remote_channel, sock = 0, newch;
2131 char *remote_host; 2131 char *remote_host;
2132 unsigned int remote_len; 2132 u_int remote_len;
2133 2133
2134 /* Get remote channel number. */ 2134 /* Get remote channel number. */
2135 remote_channel = packet_get_int(); 2135 remote_channel = packet_get_int();
@@ -2200,8 +2200,8 @@ void
2200x11_request_forwarding_with_spoofing(int client_session_id, 2200x11_request_forwarding_with_spoofing(int client_session_id,
2201 const char *proto, const char *data) 2201 const char *proto, const char *data)
2202{ 2202{
2203 unsigned int data_len = (unsigned int) strlen(data) / 2; 2203 u_int data_len = (u_int) strlen(data) / 2;
2204 unsigned int i, value; 2204 u_int i, value;
2205 char *new_data; 2205 char *new_data;
2206 int screen_number; 2206 int screen_number;
2207 const char *cp; 2207 const char *cp;
@@ -2241,7 +2241,7 @@ x11_request_forwarding_with_spoofing(int client_session_id,
2241 /* Convert the fake data into hex. */ 2241 /* Convert the fake data into hex. */
2242 new_data = xmalloc(2 * data_len + 1); 2242 new_data = xmalloc(2 * data_len + 1);
2243 for (i = 0; i < data_len; i++) 2243 for (i = 0; i < data_len; i++)
2244 sprintf(new_data + 2 * i, "%02x", (unsigned char) x11_fake_data[i]); 2244 sprintf(new_data + 2 * i, "%02x", (u_char) x11_fake_data[i]);
2245 2245
2246 /* Send the request packet. */ 2246 /* Send the request packet. */
2247 if (compat20) { 2247 if (compat20) {