diff options
author | Ben Lindstrom <mouring@eviladmin.org> | 2000-12-22 01:43:59 +0000 |
---|---|---|
committer | Ben Lindstrom <mouring@eviladmin.org> | 2000-12-22 01:43:59 +0000 |
commit | 46c162204b5a6f7471525c2f75cb2c607c88b83f (patch) | |
tree | 9041b006ab612c18bdb16b606601839a00ca5b2c /kex.h | |
parent | a074feb65d6f1fcad02e80b751e2287fd6230b09 (diff) |
One way to massive patch. <sigh> It compiles and works under Linux..
And I think I have all the bits right from the OpenBSD tree.
20001222
- Updated RCSID for pty.c
- (bal) OpenBSD CVS Updates:
- markus@cvs.openbsd.org 2000/12/21 15:10:16
[auth-rh-rsa.c hostfile.c hostfile.h sshconnect.c]
print keyfile:line for changed hostkeys, for deraadt@, ok deraadt@
- markus@cvs.openbsd.org 2000/12/20 19:26:56
[authfile.c]
allow ssh -i userkey for root
- markus@cvs.openbsd.org 2000/12/20 19:37:21
[authfd.c authfd.h kex.c sshconnect2.c sshd.c uidswap.c uidswap.h]
fix prototypes; from stevesk@pobox.com
- markus@cvs.openbsd.org 2000/12/20 19:32:08
[sshd.c]
init pointer to NULL; report from Jan.Ivan@cern.ch
- markus@cvs.openbsd.org 2000/12/19 23:17:54
[auth-krb4.c auth-options.c auth-options.h auth-rhosts.c auth-rsa.c
auth1.c auth2-skey.c auth2.c authfd.c authfd.h authfile.c bufaux.c
bufaux.h buffer.c canohost.c channels.c clientloop.c compress.c
crc32.c deattack.c getput.h hmac.c hmac.h hostfile.c kex.c kex.h
key.c key.h log.c login.c match.c match.h mpaux.c mpaux.h packet.c
packet.h radix.c readconf.c rsa.c scp.c servconf.c servconf.h
serverloop.c session.c sftp-server.c ssh-agent.c ssh-dss.c ssh-dss.h
ssh-keygen.c ssh-keyscan.c ssh-rsa.c ssh-rsa.h ssh.c ssh.h uuencode.c
uuencode.h sshconnect1.c sshconnect2.c sshd.c tildexpand.c]
replace 'unsigned bla' with 'u_bla' everywhere. also replace 'char
unsigned' with u_char.
Diffstat (limited to 'kex.h')
-rw-r--r-- | kex.h | 16 |
1 files changed, 8 insertions, 8 deletions
@@ -62,15 +62,15 @@ struct Enc { | |||
62 | char *name; | 62 | char *name; |
63 | Cipher *cipher; | 63 | Cipher *cipher; |
64 | int enabled; | 64 | int enabled; |
65 | unsigned char *key; | 65 | u_char *key; |
66 | unsigned char *iv; | 66 | u_char *iv; |
67 | }; | 67 | }; |
68 | struct Mac { | 68 | struct Mac { |
69 | char *name; | 69 | char *name; |
70 | int enabled; | 70 | int enabled; |
71 | EVP_MD *md; | 71 | EVP_MD *md; |
72 | int mac_len; | 72 | int mac_len; |
73 | unsigned char *key; | 73 | u_char *key; |
74 | int key_len; | 74 | int key_len; |
75 | }; | 75 | }; |
76 | struct Comp { | 76 | struct Comp { |
@@ -97,15 +97,15 @@ kex_exchange_kexinit( | |||
97 | Kex * | 97 | Kex * |
98 | kex_choose_conf(char *cprop[PROPOSAL_MAX], | 98 | kex_choose_conf(char *cprop[PROPOSAL_MAX], |
99 | char *sprop[PROPOSAL_MAX], int server); | 99 | char *sprop[PROPOSAL_MAX], int server); |
100 | int kex_derive_keys(Kex *k, unsigned char *hash, BIGNUM *shared_secret); | 100 | int kex_derive_keys(Kex *k, u_char *hash, BIGNUM *shared_secret); |
101 | void packet_set_kex(Kex *k); | 101 | void packet_set_kex(Kex *k); |
102 | int dh_pub_is_valid(DH *dh, BIGNUM *dh_pub); | 102 | int dh_pub_is_valid(DH *dh, BIGNUM *dh_pub); |
103 | DH *dh_new_group_asc(const char *, const char *); | 103 | DH *dh_new_group_asc(const char *, const char *); |
104 | DH *dh_new_group(BIGNUM *, BIGNUM *); | 104 | DH *dh_new_group(BIGNUM *, BIGNUM *); |
105 | void dh_gen_key(); | 105 | void dh_gen_key(DH *); |
106 | DH *dh_new_group1(); | 106 | DH *dh_new_group1(void); |
107 | 107 | ||
108 | unsigned char * | 108 | u_char * |
109 | kex_hash( | 109 | kex_hash( |
110 | char *client_version_string, | 110 | char *client_version_string, |
111 | char *server_version_string, | 111 | char *server_version_string, |
@@ -116,7 +116,7 @@ kex_hash( | |||
116 | BIGNUM *server_dh_pub, | 116 | BIGNUM *server_dh_pub, |
117 | BIGNUM *shared_secret); | 117 | BIGNUM *shared_secret); |
118 | 118 | ||
119 | unsigned char * | 119 | u_char * |
120 | kex_hash_gex( | 120 | kex_hash_gex( |
121 | char *client_version_string, | 121 | char *client_version_string, |
122 | char *server_version_string, | 122 | char *server_version_string, |