diff options
author | Ben Lindstrom <mouring@eviladmin.org> | 2000-12-22 01:43:59 +0000 |
---|---|---|
committer | Ben Lindstrom <mouring@eviladmin.org> | 2000-12-22 01:43:59 +0000 |
commit | 46c162204b5a6f7471525c2f75cb2c607c88b83f (patch) | |
tree | 9041b006ab612c18bdb16b606601839a00ca5b2c /ssh-keygen.c | |
parent | a074feb65d6f1fcad02e80b751e2287fd6230b09 (diff) |
One way to massive patch. <sigh> It compiles and works under Linux..
And I think I have all the bits right from the OpenBSD tree.
20001222
- Updated RCSID for pty.c
- (bal) OpenBSD CVS Updates:
- markus@cvs.openbsd.org 2000/12/21 15:10:16
[auth-rh-rsa.c hostfile.c hostfile.h sshconnect.c]
print keyfile:line for changed hostkeys, for deraadt@, ok deraadt@
- markus@cvs.openbsd.org 2000/12/20 19:26:56
[authfile.c]
allow ssh -i userkey for root
- markus@cvs.openbsd.org 2000/12/20 19:37:21
[authfd.c authfd.h kex.c sshconnect2.c sshd.c uidswap.c uidswap.h]
fix prototypes; from stevesk@pobox.com
- markus@cvs.openbsd.org 2000/12/20 19:32:08
[sshd.c]
init pointer to NULL; report from Jan.Ivan@cern.ch
- markus@cvs.openbsd.org 2000/12/19 23:17:54
[auth-krb4.c auth-options.c auth-options.h auth-rhosts.c auth-rsa.c
auth1.c auth2-skey.c auth2.c authfd.c authfd.h authfile.c bufaux.c
bufaux.h buffer.c canohost.c channels.c clientloop.c compress.c
crc32.c deattack.c getput.h hmac.c hmac.h hostfile.c kex.c kex.h
key.c key.h log.c login.c match.c match.h mpaux.c mpaux.h packet.c
packet.h radix.c readconf.c rsa.c scp.c servconf.c servconf.h
serverloop.c session.c sftp-server.c ssh-agent.c ssh-dss.c ssh-dss.h
ssh-keygen.c ssh-keyscan.c ssh-rsa.c ssh-rsa.h ssh.c ssh.h uuencode.c
uuencode.h sshconnect1.c sshconnect2.c sshd.c tildexpand.c]
replace 'unsigned bla' with 'u_bla' everywhere. also replace 'char
unsigned' with u_char.
Diffstat (limited to 'ssh-keygen.c')
-rw-r--r-- | ssh-keygen.c | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/ssh-keygen.c b/ssh-keygen.c index 89c03d901..533cf192e 100644 --- a/ssh-keygen.c +++ b/ssh-keygen.c | |||
@@ -12,7 +12,7 @@ | |||
12 | */ | 12 | */ |
13 | 13 | ||
14 | #include "includes.h" | 14 | #include "includes.h" |
15 | RCSID("$OpenBSD: ssh-keygen.c,v 1.35 2000/11/25 17:19:33 markus Exp $"); | 15 | RCSID("$OpenBSD: ssh-keygen.c,v 1.36 2000/12/19 23:17:58 markus Exp $"); |
16 | 16 | ||
17 | #include <openssl/evp.h> | 17 | #include <openssl/evp.h> |
18 | #include <openssl/pem.h> | 18 | #include <openssl/pem.h> |
@@ -137,7 +137,7 @@ do_convert_to_ssh2(struct passwd *pw) | |||
137 | { | 137 | { |
138 | Key *k; | 138 | Key *k; |
139 | int len; | 139 | int len; |
140 | unsigned char *blob; | 140 | u_char *blob; |
141 | struct stat st; | 141 | struct stat st; |
142 | 142 | ||
143 | if (!have_identity) | 143 | if (!have_identity) |
@@ -171,7 +171,7 @@ buffer_get_bignum_bits(Buffer *b, BIGNUM *value) | |||
171 | int bytes = (bits + 7) / 8; | 171 | int bytes = (bits + 7) / 8; |
172 | if (buffer_len(b) < bytes) | 172 | if (buffer_len(b) < bytes) |
173 | fatal("buffer_get_bignum_bits: input buffer too small"); | 173 | fatal("buffer_get_bignum_bits: input buffer too small"); |
174 | BN_bin2bn((unsigned char *)buffer_ptr(b), bytes, value); | 174 | BN_bin2bn((u_char *)buffer_ptr(b), bytes, value); |
175 | buffer_consume(b, bytes); | 175 | buffer_consume(b, bytes); |
176 | } | 176 | } |
177 | 177 | ||
@@ -275,7 +275,7 @@ do_convert_from_ssh2(struct passwd *pw) | |||
275 | *p = '\0'; | 275 | *p = '\0'; |
276 | strlcat(encoded, line, sizeof(encoded)); | 276 | strlcat(encoded, line, sizeof(encoded)); |
277 | } | 277 | } |
278 | blen = uudecode(encoded, (unsigned char *)blob, sizeof(blob)); | 278 | blen = uudecode(encoded, (u_char *)blob, sizeof(blob)); |
279 | if (blen < 0) { | 279 | if (blen < 0) { |
280 | fprintf(stderr, "uudecode failed.\n"); | 280 | fprintf(stderr, "uudecode failed.\n"); |
281 | exit(1); | 281 | exit(1); |
@@ -332,7 +332,7 @@ do_fingerprint(struct passwd *pw) | |||
332 | Key *public; | 332 | Key *public; |
333 | char *comment = NULL, *cp, *ep, line[16*1024]; | 333 | char *comment = NULL, *cp, *ep, line[16*1024]; |
334 | int i, skip = 0, num = 1, invalid = 1, success = 0; | 334 | int i, skip = 0, num = 1, invalid = 1, success = 0; |
335 | unsigned int ignore; | 335 | u_int ignore; |
336 | struct stat st; | 336 | struct stat st; |
337 | 337 | ||
338 | if (!have_identity) | 338 | if (!have_identity) |