summaryrefslogtreecommitdiff
path: root/ssh.c
diff options
context:
space:
mode:
authormarkus@openbsd.org <markus@openbsd.org>2017-05-30 08:52:19 +0000
committerDamien Miller <djm@mindrot.org>2017-05-31 10:47:31 +1000
commit54d90ace1d3535b44d92a8611952dc109a74a031 (patch)
tree1b5ff69321b88b32fba058fe2c966bf177c95b28 /ssh.c
parentc221219b1fbee47028dcaf66613f4f8d6b7640e9 (diff)
upstream commit
switch from Key typedef with struct sshkey; ok djm@ Upstream-ID: 3067d33e04efbe5131ce8f70668c47a58e5b7a1f
Diffstat (limited to 'ssh.c')
-rw-r--r--ssh.c10
1 files changed, 5 insertions, 5 deletions
diff --git a/ssh.c b/ssh.c
index 70631c24d..cfd6b70e5 100644
--- a/ssh.c
+++ b/ssh.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssh.c,v 1.459 2017/05/02 08:06:33 jmc Exp $ */ 1/* $OpenBSD: ssh.c,v 1.460 2017/05/30 08:52:19 markus Exp $ */
2/* 2/*
3 * Author: Tatu Ylonen <ylo@cs.hut.fi> 3 * Author: Tatu Ylonen <ylo@cs.hut.fi>
4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -1278,7 +1278,7 @@ main(int ac, char **av)
1278 if (options.hostbased_authentication) { 1278 if (options.hostbased_authentication) {
1279 sensitive_data.nkeys = 9; 1279 sensitive_data.nkeys = 9;
1280 sensitive_data.keys = xcalloc(sensitive_data.nkeys, 1280 sensitive_data.keys = xcalloc(sensitive_data.nkeys,
1281 sizeof(Key)); 1281 sizeof(struct sshkey)); /* XXX */
1282 for (i = 0; i < sensitive_data.nkeys; i++) 1282 for (i = 0; i < sensitive_data.nkeys; i++)
1283 sensitive_data.keys[i] = NULL; 1283 sensitive_data.keys[i] = NULL;
1284 1284
@@ -1849,16 +1849,16 @@ load_public_identity_files(void)
1849{ 1849{
1850 char *filename, *cp, thishost[NI_MAXHOST]; 1850 char *filename, *cp, thishost[NI_MAXHOST];
1851 char *pwdir = NULL, *pwname = NULL; 1851 char *pwdir = NULL, *pwname = NULL;
1852 Key *public; 1852 struct sshkey *public;
1853 struct passwd *pw; 1853 struct passwd *pw;
1854 int i; 1854 int i;
1855 u_int n_ids, n_certs; 1855 u_int n_ids, n_certs;
1856 char *identity_files[SSH_MAX_IDENTITY_FILES]; 1856 char *identity_files[SSH_MAX_IDENTITY_FILES];
1857 Key *identity_keys[SSH_MAX_IDENTITY_FILES]; 1857 struct sshkey *identity_keys[SSH_MAX_IDENTITY_FILES];
1858 char *certificate_files[SSH_MAX_CERTIFICATE_FILES]; 1858 char *certificate_files[SSH_MAX_CERTIFICATE_FILES];
1859 struct sshkey *certificates[SSH_MAX_CERTIFICATE_FILES]; 1859 struct sshkey *certificates[SSH_MAX_CERTIFICATE_FILES];
1860#ifdef ENABLE_PKCS11 1860#ifdef ENABLE_PKCS11
1861 Key **keys; 1861 struct sshkey **keys;
1862 int nkeys; 1862 int nkeys;
1863#endif /* PKCS11 */ 1863#endif /* PKCS11 */
1864 1864