diff options
author | markus@openbsd.org <markus@openbsd.org> | 2017-05-30 08:52:19 +0000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2017-05-31 10:47:31 +1000 |
commit | 54d90ace1d3535b44d92a8611952dc109a74a031 (patch) | |
tree | 1b5ff69321b88b32fba058fe2c966bf177c95b28 /ssh.c | |
parent | c221219b1fbee47028dcaf66613f4f8d6b7640e9 (diff) |
upstream commit
switch from Key typedef with struct sshkey; ok djm@
Upstream-ID: 3067d33e04efbe5131ce8f70668c47a58e5b7a1f
Diffstat (limited to 'ssh.c')
-rw-r--r-- | ssh.c | 10 |
1 files changed, 5 insertions, 5 deletions
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssh.c,v 1.459 2017/05/02 08:06:33 jmc Exp $ */ | 1 | /* $OpenBSD: ssh.c,v 1.460 2017/05/30 08:52:19 markus Exp $ */ |
2 | /* | 2 | /* |
3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
@@ -1278,7 +1278,7 @@ main(int ac, char **av) | |||
1278 | if (options.hostbased_authentication) { | 1278 | if (options.hostbased_authentication) { |
1279 | sensitive_data.nkeys = 9; | 1279 | sensitive_data.nkeys = 9; |
1280 | sensitive_data.keys = xcalloc(sensitive_data.nkeys, | 1280 | sensitive_data.keys = xcalloc(sensitive_data.nkeys, |
1281 | sizeof(Key)); | 1281 | sizeof(struct sshkey)); /* XXX */ |
1282 | for (i = 0; i < sensitive_data.nkeys; i++) | 1282 | for (i = 0; i < sensitive_data.nkeys; i++) |
1283 | sensitive_data.keys[i] = NULL; | 1283 | sensitive_data.keys[i] = NULL; |
1284 | 1284 | ||
@@ -1849,16 +1849,16 @@ load_public_identity_files(void) | |||
1849 | { | 1849 | { |
1850 | char *filename, *cp, thishost[NI_MAXHOST]; | 1850 | char *filename, *cp, thishost[NI_MAXHOST]; |
1851 | char *pwdir = NULL, *pwname = NULL; | 1851 | char *pwdir = NULL, *pwname = NULL; |
1852 | Key *public; | 1852 | struct sshkey *public; |
1853 | struct passwd *pw; | 1853 | struct passwd *pw; |
1854 | int i; | 1854 | int i; |
1855 | u_int n_ids, n_certs; | 1855 | u_int n_ids, n_certs; |
1856 | char *identity_files[SSH_MAX_IDENTITY_FILES]; | 1856 | char *identity_files[SSH_MAX_IDENTITY_FILES]; |
1857 | Key *identity_keys[SSH_MAX_IDENTITY_FILES]; | 1857 | struct sshkey *identity_keys[SSH_MAX_IDENTITY_FILES]; |
1858 | char *certificate_files[SSH_MAX_CERTIFICATE_FILES]; | 1858 | char *certificate_files[SSH_MAX_CERTIFICATE_FILES]; |
1859 | struct sshkey *certificates[SSH_MAX_CERTIFICATE_FILES]; | 1859 | struct sshkey *certificates[SSH_MAX_CERTIFICATE_FILES]; |
1860 | #ifdef ENABLE_PKCS11 | 1860 | #ifdef ENABLE_PKCS11 |
1861 | Key **keys; | 1861 | struct sshkey **keys; |
1862 | int nkeys; | 1862 | int nkeys; |
1863 | #endif /* PKCS11 */ | 1863 | #endif /* PKCS11 */ |
1864 | 1864 | ||