summaryrefslogtreecommitdiff
path: root/ssh-keygen.c
diff options
context:
space:
mode:
authorBen Lindstrom <mouring@eviladmin.org>2000-12-22 01:43:59 +0000
committerBen Lindstrom <mouring@eviladmin.org>2000-12-22 01:43:59 +0000
commit46c162204b5a6f7471525c2f75cb2c607c88b83f (patch)
tree9041b006ab612c18bdb16b606601839a00ca5b2c /ssh-keygen.c
parenta074feb65d6f1fcad02e80b751e2287fd6230b09 (diff)
One way to massive patch. <sigh> It compiles and works under Linux..
And I think I have all the bits right from the OpenBSD tree. 20001222 - Updated RCSID for pty.c - (bal) OpenBSD CVS Updates: - markus@cvs.openbsd.org 2000/12/21 15:10:16 [auth-rh-rsa.c hostfile.c hostfile.h sshconnect.c] print keyfile:line for changed hostkeys, for deraadt@, ok deraadt@ - markus@cvs.openbsd.org 2000/12/20 19:26:56 [authfile.c] allow ssh -i userkey for root - markus@cvs.openbsd.org 2000/12/20 19:37:21 [authfd.c authfd.h kex.c sshconnect2.c sshd.c uidswap.c uidswap.h] fix prototypes; from stevesk@pobox.com - markus@cvs.openbsd.org 2000/12/20 19:32:08 [sshd.c] init pointer to NULL; report from Jan.Ivan@cern.ch - markus@cvs.openbsd.org 2000/12/19 23:17:54 [auth-krb4.c auth-options.c auth-options.h auth-rhosts.c auth-rsa.c auth1.c auth2-skey.c auth2.c authfd.c authfd.h authfile.c bufaux.c bufaux.h buffer.c canohost.c channels.c clientloop.c compress.c crc32.c deattack.c getput.h hmac.c hmac.h hostfile.c kex.c kex.h key.c key.h log.c login.c match.c match.h mpaux.c mpaux.h packet.c packet.h radix.c readconf.c rsa.c scp.c servconf.c servconf.h serverloop.c session.c sftp-server.c ssh-agent.c ssh-dss.c ssh-dss.h ssh-keygen.c ssh-keyscan.c ssh-rsa.c ssh-rsa.h ssh.c ssh.h uuencode.c uuencode.h sshconnect1.c sshconnect2.c sshd.c tildexpand.c] replace 'unsigned bla' with 'u_bla' everywhere. also replace 'char unsigned' with u_char.
Diffstat (limited to 'ssh-keygen.c')
-rw-r--r--ssh-keygen.c10
1 files changed, 5 insertions, 5 deletions
diff --git a/ssh-keygen.c b/ssh-keygen.c
index 89c03d901..533cf192e 100644
--- a/ssh-keygen.c
+++ b/ssh-keygen.c
@@ -12,7 +12,7 @@
12 */ 12 */
13 13
14#include "includes.h" 14#include "includes.h"
15RCSID("$OpenBSD: ssh-keygen.c,v 1.35 2000/11/25 17:19:33 markus Exp $"); 15RCSID("$OpenBSD: ssh-keygen.c,v 1.36 2000/12/19 23:17:58 markus Exp $");
16 16
17#include <openssl/evp.h> 17#include <openssl/evp.h>
18#include <openssl/pem.h> 18#include <openssl/pem.h>
@@ -137,7 +137,7 @@ do_convert_to_ssh2(struct passwd *pw)
137{ 137{
138 Key *k; 138 Key *k;
139 int len; 139 int len;
140 unsigned char *blob; 140 u_char *blob;
141 struct stat st; 141 struct stat st;
142 142
143 if (!have_identity) 143 if (!have_identity)
@@ -171,7 +171,7 @@ buffer_get_bignum_bits(Buffer *b, BIGNUM *value)
171 int bytes = (bits + 7) / 8; 171 int bytes = (bits + 7) / 8;
172 if (buffer_len(b) < bytes) 172 if (buffer_len(b) < bytes)
173 fatal("buffer_get_bignum_bits: input buffer too small"); 173 fatal("buffer_get_bignum_bits: input buffer too small");
174 BN_bin2bn((unsigned char *)buffer_ptr(b), bytes, value); 174 BN_bin2bn((u_char *)buffer_ptr(b), bytes, value);
175 buffer_consume(b, bytes); 175 buffer_consume(b, bytes);
176} 176}
177 177
@@ -275,7 +275,7 @@ do_convert_from_ssh2(struct passwd *pw)
275 *p = '\0'; 275 *p = '\0';
276 strlcat(encoded, line, sizeof(encoded)); 276 strlcat(encoded, line, sizeof(encoded));
277 } 277 }
278 blen = uudecode(encoded, (unsigned char *)blob, sizeof(blob)); 278 blen = uudecode(encoded, (u_char *)blob, sizeof(blob));
279 if (blen < 0) { 279 if (blen < 0) {
280 fprintf(stderr, "uudecode failed.\n"); 280 fprintf(stderr, "uudecode failed.\n");
281 exit(1); 281 exit(1);
@@ -332,7 +332,7 @@ do_fingerprint(struct passwd *pw)
332 Key *public; 332 Key *public;
333 char *comment = NULL, *cp, *ep, line[16*1024]; 333 char *comment = NULL, *cp, *ep, line[16*1024];
334 int i, skip = 0, num = 1, invalid = 1, success = 0; 334 int i, skip = 0, num = 1, invalid = 1, success = 0;
335 unsigned int ignore; 335 u_int ignore;
336 struct stat st; 336 struct stat st;
337 337
338 if (!have_identity) 338 if (!have_identity)