diff options
author | Ben Lindstrom <mouring@eviladmin.org> | 2001-06-25 05:01:22 +0000 |
---|---|---|
committer | Ben Lindstrom <mouring@eviladmin.org> | 2001-06-25 05:01:22 +0000 |
commit | bba81213b972ce15fbbaca60b9ffabb42371ce8f (patch) | |
tree | e6bd40752969f2b93d179cfb9aaae9074ca45956 /sshconnect1.c | |
parent | 34f91883a6f3123656b0a8017d68b658f7cf2403 (diff) |
- itojun@cvs.openbsd.org 2001/06/23 15:12:20
[auth1.c auth2.c auth2-chall.c authfd.c authfile.c auth-rhosts.c
canohost.c channels.c cipher.c clientloop.c deattack.c dh.c
hostfile.c kex.c kexdh.c kexgex.c key.c nchan.c packet.c radix.c
readpass.c scp.c servconf.c serverloop.c session.c sftp.c
sftp-client.c sftp-glob.c sftp-int.c sftp-server.c ssh-add.c
ssh-agent.c ssh.c sshconnect1.c sshconnect2.c sshconnect.c sshd.c
ssh-keygen.c ssh-keyscan.c]
more strict prototypes. raise warning level in Makefile.inc.
markus ok'ed
TODO; cleanup headers
Diffstat (limited to 'sshconnect1.c')
-rw-r--r-- | sshconnect1.c | 20 |
1 files changed, 10 insertions, 10 deletions
diff --git a/sshconnect1.c b/sshconnect1.c index 4c469c20d..a03233f28 100644 --- a/sshconnect1.c +++ b/sshconnect1.c | |||
@@ -13,7 +13,7 @@ | |||
13 | */ | 13 | */ |
14 | 14 | ||
15 | #include "includes.h" | 15 | #include "includes.h" |
16 | RCSID("$OpenBSD: sshconnect1.c,v 1.34 2001/06/23 02:34:32 markus Exp $"); | 16 | RCSID("$OpenBSD: sshconnect1.c,v 1.35 2001/06/23 15:12:21 itojun Exp $"); |
17 | 17 | ||
18 | #include <openssl/bn.h> | 18 | #include <openssl/bn.h> |
19 | #include <openssl/evp.h> | 19 | #include <openssl/evp.h> |
@@ -55,7 +55,7 @@ extern char *__progname; | |||
55 | * Checks if the user has an authentication agent, and if so, tries to | 55 | * Checks if the user has an authentication agent, and if so, tries to |
56 | * authenticate using the agent. | 56 | * authenticate using the agent. |
57 | */ | 57 | */ |
58 | int | 58 | static int |
59 | try_agent_authentication(void) | 59 | try_agent_authentication(void) |
60 | { | 60 | { |
61 | int type; | 61 | int type; |
@@ -155,7 +155,7 @@ try_agent_authentication(void) | |||
155 | * Computes the proper response to a RSA challenge, and sends the response to | 155 | * Computes the proper response to a RSA challenge, and sends the response to |
156 | * the server. | 156 | * the server. |
157 | */ | 157 | */ |
158 | void | 158 | static void |
159 | respond_to_rsa_challenge(BIGNUM * challenge, RSA * prv) | 159 | respond_to_rsa_challenge(BIGNUM * challenge, RSA * prv) |
160 | { | 160 | { |
161 | u_char buf[32], response[16]; | 161 | u_char buf[32], response[16]; |
@@ -200,7 +200,7 @@ respond_to_rsa_challenge(BIGNUM * challenge, RSA * prv) | |||
200 | * Checks if the user has authentication file, and if so, tries to authenticate | 200 | * Checks if the user has authentication file, and if so, tries to authenticate |
201 | * the user using it. | 201 | * the user using it. |
202 | */ | 202 | */ |
203 | int | 203 | static int |
204 | try_rsa_authentication(const char *authfile) | 204 | try_rsa_authentication(const char *authfile) |
205 | { | 205 | { |
206 | BIGNUM *challenge; | 206 | BIGNUM *challenge; |
@@ -321,7 +321,7 @@ try_rsa_authentication(const char *authfile) | |||
321 | * Tries to authenticate the user using combined rhosts or /etc/hosts.equiv | 321 | * Tries to authenticate the user using combined rhosts or /etc/hosts.equiv |
322 | * authentication and RSA host authentication. | 322 | * authentication and RSA host authentication. |
323 | */ | 323 | */ |
324 | int | 324 | static int |
325 | try_rhosts_rsa_authentication(const char *local_user, Key * host_key) | 325 | try_rhosts_rsa_authentication(const char *local_user, Key * host_key) |
326 | { | 326 | { |
327 | int type; | 327 | int type; |
@@ -379,7 +379,7 @@ try_rhosts_rsa_authentication(const char *local_user, Key * host_key) | |||
379 | } | 379 | } |
380 | 380 | ||
381 | #ifdef KRB4 | 381 | #ifdef KRB4 |
382 | int | 382 | static int |
383 | try_kerberos_authentication(void) | 383 | try_kerberos_authentication(void) |
384 | { | 384 | { |
385 | KTEXT_ST auth; /* Kerberos data */ | 385 | KTEXT_ST auth; /* Kerberos data */ |
@@ -496,7 +496,7 @@ try_kerberos_authentication(void) | |||
496 | #endif /* KRB4 */ | 496 | #endif /* KRB4 */ |
497 | 497 | ||
498 | #ifdef AFS | 498 | #ifdef AFS |
499 | int | 499 | static int |
500 | send_kerberos_tgt(void) | 500 | send_kerberos_tgt(void) |
501 | { | 501 | { |
502 | CREDENTIALS *creds; | 502 | CREDENTIALS *creds; |
@@ -541,7 +541,7 @@ send_kerberos_tgt(void) | |||
541 | return 1; | 541 | return 1; |
542 | } | 542 | } |
543 | 543 | ||
544 | void | 544 | static void |
545 | send_afs_tokens(void) | 545 | send_afs_tokens(void) |
546 | { | 546 | { |
547 | CREDENTIALS creds; | 547 | CREDENTIALS creds; |
@@ -615,7 +615,7 @@ send_afs_tokens(void) | |||
615 | * Tries to authenticate with any string-based challenge/response system. | 615 | * Tries to authenticate with any string-based challenge/response system. |
616 | * Note that the client code is not tied to s/key or TIS. | 616 | * Note that the client code is not tied to s/key or TIS. |
617 | */ | 617 | */ |
618 | int | 618 | static int |
619 | try_challenge_response_authentication(void) | 619 | try_challenge_response_authentication(void) |
620 | { | 620 | { |
621 | int type, i; | 621 | int type, i; |
@@ -677,7 +677,7 @@ try_challenge_response_authentication(void) | |||
677 | /* | 677 | /* |
678 | * Tries to authenticate with plain passwd authentication. | 678 | * Tries to authenticate with plain passwd authentication. |
679 | */ | 679 | */ |
680 | int | 680 | static int |
681 | try_password_authentication(char *prompt) | 681 | try_password_authentication(char *prompt) |
682 | { | 682 | { |
683 | int type, i, payload_len; | 683 | int type, i, payload_len; |