diff options
author | Damien Miller <djm@mindrot.org> | 2001-12-21 14:45:46 +1100 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2001-12-21 14:45:46 +1100 |
commit | 9f0f5c64bc4b6144e3fed6a7f538f7c21819a492 (patch) | |
tree | f79317ab211f59181a61b526f566e9c8cfe70c73 /session.c | |
parent | 89681214ca2f50a1b1ed6164c3afe1ce14995ffc (diff) |
- deraadt@cvs.openbsd.org 2001/12/19 07:18:56
[auth1.c auth2.c auth2-chall.c auth-bsdauth.c auth.c authfile.c auth.h]
[auth-krb4.c auth-rhosts.c auth-skey.c bufaux.c canohost.c channels.c]
[cipher.c clientloop.c compat.c compress.c deattack.c key.c log.c mac.c]
[match.c misc.c nchan.c packet.c readconf.c rijndael.c rijndael.h scard.c]
[servconf.c servconf.h serverloop.c session.c sftp.c sftp-client.c]
[sftp-glob.c sftp-int.c sftp-server.c ssh-add.c ssh-agent.c ssh.c]
[sshconnect1.c sshconnect2.c sshconnect.c sshd.8 sshd.c sshd_config]
[ssh-keygen.c sshlogin.c sshpty.c sshtty.c ttymodes.c uidswap.c]
basic KNF done while i was looking for something else
Diffstat (limited to 'session.c')
-rw-r--r-- | session.c | 46 |
1 files changed, 23 insertions, 23 deletions
@@ -33,7 +33,7 @@ | |||
33 | */ | 33 | */ |
34 | 34 | ||
35 | #include "includes.h" | 35 | #include "includes.h" |
36 | RCSID("$OpenBSD: session.c,v 1.111 2001/12/06 18:09:23 stevesk Exp $"); | 36 | RCSID("$OpenBSD: session.c,v 1.112 2001/12/19 07:18:56 deraadt Exp $"); |
37 | 37 | ||
38 | #include "ssh.h" | 38 | #include "ssh.h" |
39 | #include "ssh1.h" | 39 | #include "ssh1.h" |
@@ -258,7 +258,7 @@ do_authenticated1(Authctxt *authctxt) | |||
258 | compression_level = packet_get_int(); | 258 | compression_level = packet_get_int(); |
259 | if (compression_level < 1 || compression_level > 9) { | 259 | if (compression_level < 1 || compression_level > 9) { |
260 | packet_send_debug("Received illegal compression level %d.", | 260 | packet_send_debug("Received illegal compression level %d.", |
261 | compression_level); | 261 | compression_level); |
262 | break; | 262 | break; |
263 | } | 263 | } |
264 | /* Enable compression after we have responded with SUCCESS. */ | 264 | /* Enable compression after we have responded with SUCCESS. */ |
@@ -323,7 +323,7 @@ do_authenticated1(Authctxt *authctxt) | |||
323 | if (packet_set_maxsize(packet_get_int()) > 0) | 323 | if (packet_set_maxsize(packet_get_int()) > 0) |
324 | success = 1; | 324 | success = 1; |
325 | break; | 325 | break; |
326 | 326 | ||
327 | #if defined(AFS) || defined(KRB5) | 327 | #if defined(AFS) || defined(KRB5) |
328 | case SSH_CMSG_HAVE_KERBEROS_TGT: | 328 | case SSH_CMSG_HAVE_KERBEROS_TGT: |
329 | if (!options.kerberos_tgt_passing) { | 329 | if (!options.kerberos_tgt_passing) { |
@@ -331,14 +331,14 @@ do_authenticated1(Authctxt *authctxt) | |||
331 | } else { | 331 | } else { |
332 | char *kdata = packet_get_string(&dlen); | 332 | char *kdata = packet_get_string(&dlen); |
333 | packet_integrity_check(plen, 4 + dlen, type); | 333 | packet_integrity_check(plen, 4 + dlen, type); |
334 | 334 | ||
335 | /* XXX - 0x41, see creds_to_radix version */ | 335 | /* XXX - 0x41, see creds_to_radix version */ |
336 | if (kdata[0] != 0x41) { | 336 | if (kdata[0] != 0x41) { |
337 | #ifdef KRB5 | 337 | #ifdef KRB5 |
338 | krb5_data tgt; | 338 | krb5_data tgt; |
339 | tgt.data = kdata; | 339 | tgt.data = kdata; |
340 | tgt.length = dlen; | 340 | tgt.length = dlen; |
341 | 341 | ||
342 | if (auth_krb5_tgt(s->authctxt, &tgt)) | 342 | if (auth_krb5_tgt(s->authctxt, &tgt)) |
343 | success = 1; | 343 | success = 1; |
344 | else | 344 | else |
@@ -356,7 +356,7 @@ do_authenticated1(Authctxt *authctxt) | |||
356 | } | 356 | } |
357 | break; | 357 | break; |
358 | #endif /* AFS || KRB5 */ | 358 | #endif /* AFS || KRB5 */ |
359 | 359 | ||
360 | #ifdef AFS | 360 | #ifdef AFS |
361 | case SSH_CMSG_HAVE_AFS_TOKEN: | 361 | case SSH_CMSG_HAVE_AFS_TOKEN: |
362 | if (!options.afs_token_passing || !k_hasafs()) { | 362 | if (!options.afs_token_passing || !k_hasafs()) { |
@@ -365,7 +365,7 @@ do_authenticated1(Authctxt *authctxt) | |||
365 | /* Accept AFS token. */ | 365 | /* Accept AFS token. */ |
366 | char *token = packet_get_string(&dlen); | 366 | char *token = packet_get_string(&dlen); |
367 | packet_integrity_check(plen, 4 + dlen, type); | 367 | packet_integrity_check(plen, 4 + dlen, type); |
368 | 368 | ||
369 | if (auth_afs_token(s->authctxt, token)) | 369 | if (auth_afs_token(s->authctxt, token)) |
370 | success = 1; | 370 | success = 1; |
371 | else | 371 | else |
@@ -649,7 +649,7 @@ do_pre_login(Session *s) | |||
649 | if (packet_connection_is_on_socket()) { | 649 | if (packet_connection_is_on_socket()) { |
650 | fromlen = sizeof(from); | 650 | fromlen = sizeof(from); |
651 | if (getpeername(packet_get_connection_in(), | 651 | if (getpeername(packet_get_connection_in(), |
652 | (struct sockaddr *) & from, &fromlen) < 0) { | 652 | (struct sockaddr *) & from, &fromlen) < 0) { |
653 | debug("getpeername: %.100s", strerror(errno)); | 653 | debug("getpeername: %.100s", strerror(errno)); |
654 | fatal_cleanup(); | 654 | fatal_cleanup(); |
655 | } | 655 | } |
@@ -811,7 +811,7 @@ check_quietlogin(Session *s, const char *command) | |||
811 | */ | 811 | */ |
812 | static void | 812 | static void |
813 | child_set_env(char ***envp, u_int *envsizep, const char *name, | 813 | child_set_env(char ***envp, u_int *envsizep, const char *name, |
814 | const char *value) | 814 | const char *value) |
815 | { | 815 | { |
816 | u_int i, namelen; | 816 | u_int i, namelen; |
817 | char **env; | 817 | char **env; |
@@ -852,7 +852,7 @@ child_set_env(char ***envp, u_int *envsizep, const char *name, | |||
852 | */ | 852 | */ |
853 | static void | 853 | static void |
854 | read_environment_file(char ***env, u_int *envsize, | 854 | read_environment_file(char ***env, u_int *envsize, |
855 | const char *filename) | 855 | const char *filename) |
856 | { | 856 | { |
857 | FILE *f; | 857 | FILE *f; |
858 | char buf[4096]; | 858 | char buf[4096]; |
@@ -1304,7 +1304,7 @@ do_child(Session *s, const char *command) | |||
1304 | 1304 | ||
1305 | if (auth_get_socket_name() != NULL) | 1305 | if (auth_get_socket_name() != NULL) |
1306 | child_set_env(&env, &envsize, SSH_AUTHSOCKET_ENV_NAME, | 1306 | child_set_env(&env, &envsize, SSH_AUTHSOCKET_ENV_NAME, |
1307 | auth_get_socket_name()); | 1307 | auth_get_socket_name()); |
1308 | 1308 | ||
1309 | /* read $HOME/.ssh/environment. */ | 1309 | /* read $HOME/.ssh/environment. */ |
1310 | if (!options.use_login) { | 1310 | if (!options.use_login) { |
@@ -1367,10 +1367,10 @@ do_child(Session *s, const char *command) | |||
1367 | /* Try to get AFS tokens for the local cell. */ | 1367 | /* Try to get AFS tokens for the local cell. */ |
1368 | if (k_hasafs()) { | 1368 | if (k_hasafs()) { |
1369 | char cell[64]; | 1369 | char cell[64]; |
1370 | 1370 | ||
1371 | if (k_afs_cell_of_file(pw->pw_dir, cell, sizeof(cell)) == 0) | 1371 | if (k_afs_cell_of_file(pw->pw_dir, cell, sizeof(cell)) == 0) |
1372 | krb_afslog(cell, 0); | 1372 | krb_afslog(cell, 0); |
1373 | 1373 | ||
1374 | krb_afslog(0, 0); | 1374 | krb_afslog(0, 0); |
1375 | } | 1375 | } |
1376 | #endif /* AFS */ | 1376 | #endif /* AFS */ |
@@ -1487,9 +1487,9 @@ do_child(Session *s, const char *command) | |||
1487 | 1487 | ||
1488 | execl(LOGIN_PROGRAM, "login", "-h", hostname, | 1488 | execl(LOGIN_PROGRAM, "login", "-h", hostname, |
1489 | #ifdef LOGIN_NEEDS_TERM | 1489 | #ifdef LOGIN_NEEDS_TERM |
1490 | s->term? s->term : "unknown", | 1490 | s->term? s->term : "unknown", |
1491 | #endif | 1491 | #endif |
1492 | "-p", "-f", "--", pw->pw_name, (char *)NULL); | 1492 | "-p", "-f", "--", pw->pw_name, (char *)NULL); |
1493 | 1493 | ||
1494 | /* Login couldn't be executed, die. */ | 1494 | /* Login couldn't be executed, die. */ |
1495 | 1495 | ||
@@ -1517,12 +1517,12 @@ session_new(void) | |||
1517 | static int did_init = 0; | 1517 | static int did_init = 0; |
1518 | if (!did_init) { | 1518 | if (!did_init) { |
1519 | debug("session_new: init"); | 1519 | debug("session_new: init"); |
1520 | for(i = 0; i < MAX_SESSIONS; i++) { | 1520 | for (i = 0; i < MAX_SESSIONS; i++) { |
1521 | sessions[i].used = 0; | 1521 | sessions[i].used = 0; |
1522 | } | 1522 | } |
1523 | did_init = 1; | 1523 | did_init = 1; |
1524 | } | 1524 | } |
1525 | for(i = 0; i < MAX_SESSIONS; i++) { | 1525 | for (i = 0; i < MAX_SESSIONS; i++) { |
1526 | Session *s = &sessions[i]; | 1526 | Session *s = &sessions[i]; |
1527 | if (! s->used) { | 1527 | if (! s->used) { |
1528 | memset(s, 0, sizeof(*s)); | 1528 | memset(s, 0, sizeof(*s)); |
@@ -1542,7 +1542,7 @@ static void | |||
1542 | session_dump(void) | 1542 | session_dump(void) |
1543 | { | 1543 | { |
1544 | int i; | 1544 | int i; |
1545 | for(i = 0; i < MAX_SESSIONS; i++) { | 1545 | for (i = 0; i < MAX_SESSIONS; i++) { |
1546 | Session *s = &sessions[i]; | 1546 | Session *s = &sessions[i]; |
1547 | debug("dump: used %d session %d %p channel %d pid %d", | 1547 | debug("dump: used %d session %d %p channel %d pid %d", |
1548 | s->used, | 1548 | s->used, |
@@ -1575,7 +1575,7 @@ static Session * | |||
1575 | session_by_channel(int id) | 1575 | session_by_channel(int id) |
1576 | { | 1576 | { |
1577 | int i; | 1577 | int i; |
1578 | for(i = 0; i < MAX_SESSIONS; i++) { | 1578 | for (i = 0; i < MAX_SESSIONS; i++) { |
1579 | Session *s = &sessions[i]; | 1579 | Session *s = &sessions[i]; |
1580 | if (s->used && s->chanid == id) { | 1580 | if (s->used && s->chanid == id) { |
1581 | debug("session_by_channel: session %d channel %d", i, id); | 1581 | debug("session_by_channel: session %d channel %d", i, id); |
@@ -1592,7 +1592,7 @@ session_by_pid(pid_t pid) | |||
1592 | { | 1592 | { |
1593 | int i; | 1593 | int i; |
1594 | debug("session_by_pid: pid %d", pid); | 1594 | debug("session_by_pid: pid %d", pid); |
1595 | for(i = 0; i < MAX_SESSIONS; i++) { | 1595 | for (i = 0; i < MAX_SESSIONS; i++) { |
1596 | Session *s = &sessions[i]; | 1596 | Session *s = &sessions[i]; |
1597 | if (s->used && s->pid == pid) | 1597 | if (s->used && s->pid == pid) |
1598 | return s; | 1598 | return s; |
@@ -2001,9 +2001,9 @@ void | |||
2001 | session_destroy_all(void) | 2001 | session_destroy_all(void) |
2002 | { | 2002 | { |
2003 | int i; | 2003 | int i; |
2004 | for(i = 0; i < MAX_SESSIONS; i++) { | 2004 | for (i = 0; i < MAX_SESSIONS; i++) { |
2005 | Session *s = &sessions[i]; | 2005 | Session *s = &sessions[i]; |
2006 | if (s->used) | 2006 | if (s->used) |
2007 | session_close(s); | 2007 | session_close(s); |
2008 | } | 2008 | } |
2009 | } | 2009 | } |
@@ -2014,7 +2014,7 @@ session_tty_list(void) | |||
2014 | static char buf[1024]; | 2014 | static char buf[1024]; |
2015 | int i; | 2015 | int i; |
2016 | buf[0] = '\0'; | 2016 | buf[0] = '\0'; |
2017 | for(i = 0; i < MAX_SESSIONS; i++) { | 2017 | for (i = 0; i < MAX_SESSIONS; i++) { |
2018 | Session *s = &sessions[i]; | 2018 | Session *s = &sessions[i]; |
2019 | if (s->used && s->ttyfd != -1) { | 2019 | if (s->used && s->ttyfd != -1) { |
2020 | if (buf[0] != '\0') | 2020 | if (buf[0] != '\0') |