summaryrefslogtreecommitdiff
path: root/sshconnect1.c
diff options
context:
space:
mode:
authorBen Lindstrom <mouring@eviladmin.org>2000-12-22 01:43:59 +0000
committerBen Lindstrom <mouring@eviladmin.org>2000-12-22 01:43:59 +0000
commit46c162204b5a6f7471525c2f75cb2c607c88b83f (patch)
tree9041b006ab612c18bdb16b606601839a00ca5b2c /sshconnect1.c
parenta074feb65d6f1fcad02e80b751e2287fd6230b09 (diff)
One way to massive patch. <sigh> It compiles and works under Linux..
And I think I have all the bits right from the OpenBSD tree. 20001222 - Updated RCSID for pty.c - (bal) OpenBSD CVS Updates: - markus@cvs.openbsd.org 2000/12/21 15:10:16 [auth-rh-rsa.c hostfile.c hostfile.h sshconnect.c] print keyfile:line for changed hostkeys, for deraadt@, ok deraadt@ - markus@cvs.openbsd.org 2000/12/20 19:26:56 [authfile.c] allow ssh -i userkey for root - markus@cvs.openbsd.org 2000/12/20 19:37:21 [authfd.c authfd.h kex.c sshconnect2.c sshd.c uidswap.c uidswap.h] fix prototypes; from stevesk@pobox.com - markus@cvs.openbsd.org 2000/12/20 19:32:08 [sshd.c] init pointer to NULL; report from Jan.Ivan@cern.ch - markus@cvs.openbsd.org 2000/12/19 23:17:54 [auth-krb4.c auth-options.c auth-options.h auth-rhosts.c auth-rsa.c auth1.c auth2-skey.c auth2.c authfd.c authfd.h authfile.c bufaux.c bufaux.h buffer.c canohost.c channels.c clientloop.c compress.c crc32.c deattack.c getput.h hmac.c hmac.h hostfile.c kex.c kex.h key.c key.h log.c login.c match.c match.h mpaux.c mpaux.h packet.c packet.h radix.c readconf.c rsa.c scp.c servconf.c servconf.h serverloop.c session.c sftp-server.c ssh-agent.c ssh-dss.c ssh-dss.h ssh-keygen.c ssh-keyscan.c ssh-rsa.c ssh-rsa.h ssh.c ssh.h uuencode.c uuencode.h sshconnect1.c sshconnect2.c sshd.c tildexpand.c] replace 'unsigned bla' with 'u_bla' everywhere. also replace 'char unsigned' with u_char.
Diffstat (limited to 'sshconnect1.c')
-rw-r--r--sshconnect1.c32
1 files changed, 16 insertions, 16 deletions
diff --git a/sshconnect1.c b/sshconnect1.c
index f95c031da..d6230529f 100644
--- a/sshconnect1.c
+++ b/sshconnect1.c
@@ -13,7 +13,7 @@
13 */ 13 */
14 14
15#include "includes.h" 15#include "includes.h"
16RCSID("$OpenBSD: sshconnect1.c,v 1.12 2000/12/10 17:01:53 markus Exp $"); 16RCSID("$OpenBSD: sshconnect1.c,v 1.13 2000/12/19 23:17:58 markus Exp $");
17 17
18#include <openssl/bn.h> 18#include <openssl/bn.h>
19#include <openssl/dsa.h> 19#include <openssl/dsa.h>
@@ -34,8 +34,8 @@ RCSID("$OpenBSD: sshconnect1.c,v 1.12 2000/12/10 17:01:53 markus Exp $");
34#include "authfile.h" 34#include "authfile.h"
35 35
36/* Session id for the current session. */ 36/* Session id for the current session. */
37unsigned char session_id[16]; 37u_char session_id[16];
38unsigned int supported_authentications = 0; 38u_int supported_authentications = 0;
39 39
40extern Options options; 40extern Options options;
41extern char *__progname; 41extern char *__progname;
@@ -50,8 +50,8 @@ try_agent_authentication()
50 int type; 50 int type;
51 char *comment; 51 char *comment;
52 AuthenticationConnection *auth; 52 AuthenticationConnection *auth;
53 unsigned char response[16]; 53 u_char response[16];
54 unsigned int i; 54 u_int i;
55 int plen, clen; 55 int plen, clen;
56 Key *key; 56 Key *key;
57 BIGNUM *challenge; 57 BIGNUM *challenge;
@@ -146,7 +146,7 @@ try_agent_authentication()
146void 146void
147respond_to_rsa_challenge(BIGNUM * challenge, RSA * prv) 147respond_to_rsa_challenge(BIGNUM * challenge, RSA * prv)
148{ 148{
149 unsigned char buf[32], response[16]; 149 u_char buf[32], response[16];
150 MD5_CTX md; 150 MD5_CTX md;
151 int i, len; 151 int i, len;
152 152
@@ -441,7 +441,7 @@ try_kerberos_authentication()
441 debug("Kerberos V4 authentication accepted."); 441 debug("Kerberos V4 authentication accepted.");
442 442
443 /* Get server's response. */ 443 /* Get server's response. */
444 reply = packet_get_string((unsigned int *) &auth.length); 444 reply = packet_get_string((u_int *) &auth.length);
445 memcpy(auth.dat, reply, auth.length); 445 memcpy(auth.dat, reply, auth.length);
446 xfree(reply); 446 xfree(reply);
447 447
@@ -506,7 +506,7 @@ send_kerberos_tgt()
506 debug("Kerberos V4 ticket expired: %s", TKT_FILE); 506 debug("Kerberos V4 ticket expired: %s", TKT_FILE);
507 return 0; 507 return 0;
508 } 508 }
509 creds_to_radix(creds, (unsigned char *)buffer, sizeof buffer); 509 creds_to_radix(creds, (u_char *)buffer, sizeof buffer);
510 xfree(creds); 510 xfree(creds);
511 511
512 packet_start(SSH_CMSG_HAVE_KERBEROS_TGT); 512 packet_start(SSH_CMSG_HAVE_KERBEROS_TGT);
@@ -545,10 +545,10 @@ send_afs_tokens(void)
545 p = buf; 545 p = buf;
546 546
547 /* Get secret token. */ 547 /* Get secret token. */
548 memcpy(&creds.ticket_st.length, p, sizeof(unsigned int)); 548 memcpy(&creds.ticket_st.length, p, sizeof(u_int));
549 if (creds.ticket_st.length > MAX_KTXT_LEN) 549 if (creds.ticket_st.length > MAX_KTXT_LEN)
550 break; 550 break;
551 p += sizeof(unsigned int); 551 p += sizeof(u_int);
552 memcpy(creds.ticket_st.dat, p, creds.ticket_st.length); 552 memcpy(creds.ticket_st.dat, p, creds.ticket_st.length);
553 p += creds.ticket_st.length; 553 p += creds.ticket_st.length;
554 554
@@ -574,7 +574,7 @@ send_afs_tokens(void)
574 creds.pinst[0] = '\0'; 574 creds.pinst[0] = '\0';
575 575
576 /* Encode token, ship it off. */ 576 /* Encode token, ship it off. */
577 if (creds_to_radix(&creds, (unsigned char*) buffer, sizeof buffer) <= 0) 577 if (creds_to_radix(&creds, (u_char*) buffer, sizeof buffer) <= 0)
578 break; 578 break;
579 packet_start(SSH_CMSG_HAVE_AFS_TOKEN); 579 packet_start(SSH_CMSG_HAVE_AFS_TOKEN);
580 packet_put_string(buffer, strlen(buffer)); 580 packet_put_string(buffer, strlen(buffer));
@@ -603,7 +603,7 @@ try_skey_authentication()
603{ 603{
604 int type, i; 604 int type, i;
605 int payload_len; 605 int payload_len;
606 unsigned int clen; 606 u_int clen;
607 char prompt[1024]; 607 char prompt[1024];
608 char *challenge, *response; 608 char *challenge, *response;
609 609
@@ -702,10 +702,10 @@ ssh_kex(char *host, struct sockaddr *hostaddr)
702 Key k; 702 Key k;
703 int bits, rbits; 703 int bits, rbits;
704 int ssh_cipher_default = SSH_CIPHER_3DES; 704 int ssh_cipher_default = SSH_CIPHER_3DES;
705 unsigned char session_key[SSH_SESSION_KEY_LENGTH]; 705 u_char session_key[SSH_SESSION_KEY_LENGTH];
706 unsigned char cookie[8]; 706 u_char cookie[8];
707 unsigned int supported_ciphers; 707 u_int supported_ciphers;
708 unsigned int server_flags, client_flags; 708 u_int server_flags, client_flags;
709 int payload_len, clen, sum_len = 0; 709 int payload_len, clen, sum_len = 0;
710 u_int32_t rand = 0; 710 u_int32_t rand = 0;
711 711