summaryrefslogtreecommitdiff
path: root/kex.h
diff options
context:
space:
mode:
authorBen Lindstrom <mouring@eviladmin.org>2000-12-22 01:43:59 +0000
committerBen Lindstrom <mouring@eviladmin.org>2000-12-22 01:43:59 +0000
commit46c162204b5a6f7471525c2f75cb2c607c88b83f (patch)
tree9041b006ab612c18bdb16b606601839a00ca5b2c /kex.h
parenta074feb65d6f1fcad02e80b751e2287fd6230b09 (diff)
One way to massive patch. <sigh> It compiles and works under Linux..
And I think I have all the bits right from the OpenBSD tree. 20001222 - Updated RCSID for pty.c - (bal) OpenBSD CVS Updates: - markus@cvs.openbsd.org 2000/12/21 15:10:16 [auth-rh-rsa.c hostfile.c hostfile.h sshconnect.c] print keyfile:line for changed hostkeys, for deraadt@, ok deraadt@ - markus@cvs.openbsd.org 2000/12/20 19:26:56 [authfile.c] allow ssh -i userkey for root - markus@cvs.openbsd.org 2000/12/20 19:37:21 [authfd.c authfd.h kex.c sshconnect2.c sshd.c uidswap.c uidswap.h] fix prototypes; from stevesk@pobox.com - markus@cvs.openbsd.org 2000/12/20 19:32:08 [sshd.c] init pointer to NULL; report from Jan.Ivan@cern.ch - markus@cvs.openbsd.org 2000/12/19 23:17:54 [auth-krb4.c auth-options.c auth-options.h auth-rhosts.c auth-rsa.c auth1.c auth2-skey.c auth2.c authfd.c authfd.h authfile.c bufaux.c bufaux.h buffer.c canohost.c channels.c clientloop.c compress.c crc32.c deattack.c getput.h hmac.c hmac.h hostfile.c kex.c kex.h key.c key.h log.c login.c match.c match.h mpaux.c mpaux.h packet.c packet.h radix.c readconf.c rsa.c scp.c servconf.c servconf.h serverloop.c session.c sftp-server.c ssh-agent.c ssh-dss.c ssh-dss.h ssh-keygen.c ssh-keyscan.c ssh-rsa.c ssh-rsa.h ssh.c ssh.h uuencode.c uuencode.h sshconnect1.c sshconnect2.c sshd.c tildexpand.c] replace 'unsigned bla' with 'u_bla' everywhere. also replace 'char unsigned' with u_char.
Diffstat (limited to 'kex.h')
-rw-r--r--kex.h16
1 files changed, 8 insertions, 8 deletions
diff --git a/kex.h b/kex.h
index b445cee63..143769a31 100644
--- a/kex.h
+++ b/kex.h
@@ -62,15 +62,15 @@ struct Enc {
62 char *name; 62 char *name;
63 Cipher *cipher; 63 Cipher *cipher;
64 int enabled; 64 int enabled;
65 unsigned char *key; 65 u_char *key;
66 unsigned char *iv; 66 u_char *iv;
67}; 67};
68struct Mac { 68struct Mac {
69 char *name; 69 char *name;
70 int enabled; 70 int enabled;
71 EVP_MD *md; 71 EVP_MD *md;
72 int mac_len; 72 int mac_len;
73 unsigned char *key; 73 u_char *key;
74 int key_len; 74 int key_len;
75}; 75};
76struct Comp { 76struct Comp {
@@ -97,15 +97,15 @@ kex_exchange_kexinit(
97Kex * 97Kex *
98kex_choose_conf(char *cprop[PROPOSAL_MAX], 98kex_choose_conf(char *cprop[PROPOSAL_MAX],
99 char *sprop[PROPOSAL_MAX], int server); 99 char *sprop[PROPOSAL_MAX], int server);
100int kex_derive_keys(Kex *k, unsigned char *hash, BIGNUM *shared_secret); 100int kex_derive_keys(Kex *k, u_char *hash, BIGNUM *shared_secret);
101void packet_set_kex(Kex *k); 101void packet_set_kex(Kex *k);
102int dh_pub_is_valid(DH *dh, BIGNUM *dh_pub); 102int dh_pub_is_valid(DH *dh, BIGNUM *dh_pub);
103DH *dh_new_group_asc(const char *, const char *); 103DH *dh_new_group_asc(const char *, const char *);
104DH *dh_new_group(BIGNUM *, BIGNUM *); 104DH *dh_new_group(BIGNUM *, BIGNUM *);
105void dh_gen_key(); 105void dh_gen_key(DH *);
106DH *dh_new_group1(); 106DH *dh_new_group1(void);
107 107
108unsigned char * 108u_char *
109kex_hash( 109kex_hash(
110 char *client_version_string, 110 char *client_version_string,
111 char *server_version_string, 111 char *server_version_string,
@@ -116,7 +116,7 @@ kex_hash(
116 BIGNUM *server_dh_pub, 116 BIGNUM *server_dh_pub,
117 BIGNUM *shared_secret); 117 BIGNUM *shared_secret);
118 118
119unsigned char * 119u_char *
120kex_hash_gex( 120kex_hash_gex(
121 char *client_version_string, 121 char *client_version_string,
122 char *server_version_string, 122 char *server_version_string,