diff options
author | Ben Lindstrom <mouring@eviladmin.org> | 2000-12-22 01:43:59 +0000 |
---|---|---|
committer | Ben Lindstrom <mouring@eviladmin.org> | 2000-12-22 01:43:59 +0000 |
commit | 46c162204b5a6f7471525c2f75cb2c607c88b83f (patch) | |
tree | 9041b006ab612c18bdb16b606601839a00ca5b2c /sshconnect1.c | |
parent | a074feb65d6f1fcad02e80b751e2287fd6230b09 (diff) |
One way to massive patch. <sigh> It compiles and works under Linux..
And I think I have all the bits right from the OpenBSD tree.
20001222
- Updated RCSID for pty.c
- (bal) OpenBSD CVS Updates:
- markus@cvs.openbsd.org 2000/12/21 15:10:16
[auth-rh-rsa.c hostfile.c hostfile.h sshconnect.c]
print keyfile:line for changed hostkeys, for deraadt@, ok deraadt@
- markus@cvs.openbsd.org 2000/12/20 19:26:56
[authfile.c]
allow ssh -i userkey for root
- markus@cvs.openbsd.org 2000/12/20 19:37:21
[authfd.c authfd.h kex.c sshconnect2.c sshd.c uidswap.c uidswap.h]
fix prototypes; from stevesk@pobox.com
- markus@cvs.openbsd.org 2000/12/20 19:32:08
[sshd.c]
init pointer to NULL; report from Jan.Ivan@cern.ch
- markus@cvs.openbsd.org 2000/12/19 23:17:54
[auth-krb4.c auth-options.c auth-options.h auth-rhosts.c auth-rsa.c
auth1.c auth2-skey.c auth2.c authfd.c authfd.h authfile.c bufaux.c
bufaux.h buffer.c canohost.c channels.c clientloop.c compress.c
crc32.c deattack.c getput.h hmac.c hmac.h hostfile.c kex.c kex.h
key.c key.h log.c login.c match.c match.h mpaux.c mpaux.h packet.c
packet.h radix.c readconf.c rsa.c scp.c servconf.c servconf.h
serverloop.c session.c sftp-server.c ssh-agent.c ssh-dss.c ssh-dss.h
ssh-keygen.c ssh-keyscan.c ssh-rsa.c ssh-rsa.h ssh.c ssh.h uuencode.c
uuencode.h sshconnect1.c sshconnect2.c sshd.c tildexpand.c]
replace 'unsigned bla' with 'u_bla' everywhere. also replace 'char
unsigned' with u_char.
Diffstat (limited to 'sshconnect1.c')
-rw-r--r-- | sshconnect1.c | 32 |
1 files changed, 16 insertions, 16 deletions
diff --git a/sshconnect1.c b/sshconnect1.c index f95c031da..d6230529f 100644 --- a/sshconnect1.c +++ b/sshconnect1.c | |||
@@ -13,7 +13,7 @@ | |||
13 | */ | 13 | */ |
14 | 14 | ||
15 | #include "includes.h" | 15 | #include "includes.h" |
16 | RCSID("$OpenBSD: sshconnect1.c,v 1.12 2000/12/10 17:01:53 markus Exp $"); | 16 | RCSID("$OpenBSD: sshconnect1.c,v 1.13 2000/12/19 23:17:58 markus Exp $"); |
17 | 17 | ||
18 | #include <openssl/bn.h> | 18 | #include <openssl/bn.h> |
19 | #include <openssl/dsa.h> | 19 | #include <openssl/dsa.h> |
@@ -34,8 +34,8 @@ RCSID("$OpenBSD: sshconnect1.c,v 1.12 2000/12/10 17:01:53 markus Exp $"); | |||
34 | #include "authfile.h" | 34 | #include "authfile.h" |
35 | 35 | ||
36 | /* Session id for the current session. */ | 36 | /* Session id for the current session. */ |
37 | unsigned char session_id[16]; | 37 | u_char session_id[16]; |
38 | unsigned int supported_authentications = 0; | 38 | u_int supported_authentications = 0; |
39 | 39 | ||
40 | extern Options options; | 40 | extern Options options; |
41 | extern char *__progname; | 41 | extern char *__progname; |
@@ -50,8 +50,8 @@ try_agent_authentication() | |||
50 | int type; | 50 | int type; |
51 | char *comment; | 51 | char *comment; |
52 | AuthenticationConnection *auth; | 52 | AuthenticationConnection *auth; |
53 | unsigned char response[16]; | 53 | u_char response[16]; |
54 | unsigned int i; | 54 | u_int i; |
55 | int plen, clen; | 55 | int plen, clen; |
56 | Key *key; | 56 | Key *key; |
57 | BIGNUM *challenge; | 57 | BIGNUM *challenge; |
@@ -146,7 +146,7 @@ try_agent_authentication() | |||
146 | void | 146 | void |
147 | respond_to_rsa_challenge(BIGNUM * challenge, RSA * prv) | 147 | respond_to_rsa_challenge(BIGNUM * challenge, RSA * prv) |
148 | { | 148 | { |
149 | unsigned char buf[32], response[16]; | 149 | u_char buf[32], response[16]; |
150 | MD5_CTX md; | 150 | MD5_CTX md; |
151 | int i, len; | 151 | int i, len; |
152 | 152 | ||
@@ -441,7 +441,7 @@ try_kerberos_authentication() | |||
441 | debug("Kerberos V4 authentication accepted."); | 441 | debug("Kerberos V4 authentication accepted."); |
442 | 442 | ||
443 | /* Get server's response. */ | 443 | /* Get server's response. */ |
444 | reply = packet_get_string((unsigned int *) &auth.length); | 444 | reply = packet_get_string((u_int *) &auth.length); |
445 | memcpy(auth.dat, reply, auth.length); | 445 | memcpy(auth.dat, reply, auth.length); |
446 | xfree(reply); | 446 | xfree(reply); |
447 | 447 | ||
@@ -506,7 +506,7 @@ send_kerberos_tgt() | |||
506 | debug("Kerberos V4 ticket expired: %s", TKT_FILE); | 506 | debug("Kerberos V4 ticket expired: %s", TKT_FILE); |
507 | return 0; | 507 | return 0; |
508 | } | 508 | } |
509 | creds_to_radix(creds, (unsigned char *)buffer, sizeof buffer); | 509 | creds_to_radix(creds, (u_char *)buffer, sizeof buffer); |
510 | xfree(creds); | 510 | xfree(creds); |
511 | 511 | ||
512 | packet_start(SSH_CMSG_HAVE_KERBEROS_TGT); | 512 | packet_start(SSH_CMSG_HAVE_KERBEROS_TGT); |
@@ -545,10 +545,10 @@ send_afs_tokens(void) | |||
545 | p = buf; | 545 | p = buf; |
546 | 546 | ||
547 | /* Get secret token. */ | 547 | /* Get secret token. */ |
548 | memcpy(&creds.ticket_st.length, p, sizeof(unsigned int)); | 548 | memcpy(&creds.ticket_st.length, p, sizeof(u_int)); |
549 | if (creds.ticket_st.length > MAX_KTXT_LEN) | 549 | if (creds.ticket_st.length > MAX_KTXT_LEN) |
550 | break; | 550 | break; |
551 | p += sizeof(unsigned int); | 551 | p += sizeof(u_int); |
552 | memcpy(creds.ticket_st.dat, p, creds.ticket_st.length); | 552 | memcpy(creds.ticket_st.dat, p, creds.ticket_st.length); |
553 | p += creds.ticket_st.length; | 553 | p += creds.ticket_st.length; |
554 | 554 | ||
@@ -574,7 +574,7 @@ send_afs_tokens(void) | |||
574 | creds.pinst[0] = '\0'; | 574 | creds.pinst[0] = '\0'; |
575 | 575 | ||
576 | /* Encode token, ship it off. */ | 576 | /* Encode token, ship it off. */ |
577 | if (creds_to_radix(&creds, (unsigned char*) buffer, sizeof buffer) <= 0) | 577 | if (creds_to_radix(&creds, (u_char*) buffer, sizeof buffer) <= 0) |
578 | break; | 578 | break; |
579 | packet_start(SSH_CMSG_HAVE_AFS_TOKEN); | 579 | packet_start(SSH_CMSG_HAVE_AFS_TOKEN); |
580 | packet_put_string(buffer, strlen(buffer)); | 580 | packet_put_string(buffer, strlen(buffer)); |
@@ -603,7 +603,7 @@ try_skey_authentication() | |||
603 | { | 603 | { |
604 | int type, i; | 604 | int type, i; |
605 | int payload_len; | 605 | int payload_len; |
606 | unsigned int clen; | 606 | u_int clen; |
607 | char prompt[1024]; | 607 | char prompt[1024]; |
608 | char *challenge, *response; | 608 | char *challenge, *response; |
609 | 609 | ||
@@ -702,10 +702,10 @@ ssh_kex(char *host, struct sockaddr *hostaddr) | |||
702 | Key k; | 702 | Key k; |
703 | int bits, rbits; | 703 | int bits, rbits; |
704 | int ssh_cipher_default = SSH_CIPHER_3DES; | 704 | int ssh_cipher_default = SSH_CIPHER_3DES; |
705 | unsigned char session_key[SSH_SESSION_KEY_LENGTH]; | 705 | u_char session_key[SSH_SESSION_KEY_LENGTH]; |
706 | unsigned char cookie[8]; | 706 | u_char cookie[8]; |
707 | unsigned int supported_ciphers; | 707 | u_int supported_ciphers; |
708 | unsigned int server_flags, client_flags; | 708 | u_int server_flags, client_flags; |
709 | int payload_len, clen, sum_len = 0; | 709 | int payload_len, clen, sum_len = 0; |
710 | u_int32_t rand = 0; | 710 | u_int32_t rand = 0; |
711 | 711 | ||