summaryrefslogtreecommitdiff
path: root/sshconnect1.c
diff options
context:
space:
mode:
authorBen Lindstrom <mouring@eviladmin.org>2001-06-09 01:42:01 +0000
committerBen Lindstrom <mouring@eviladmin.org>2001-06-09 01:42:01 +0000
commit664408d2a794806722aa3f321b92c7bdd667c42e (patch)
tree0dbce8250bc4d6325ed2f2b6950221a24d62dc2a /sshconnect1.c
parent9d0c06667eb4ca616ffa690e88b9dd7c438e3103 (diff)
- markus@cvs.openbsd.org 2001/06/07 20:23:05
[authfd.c authfile.c channels.c kexdh.c kexgex.c packet.c ssh.c sshconnect.c sshconnect1.c] use xxx_put_cstring()
Diffstat (limited to 'sshconnect1.c')
-rw-r--r--sshconnect1.c12
1 files changed, 6 insertions, 6 deletions
diff --git a/sshconnect1.c b/sshconnect1.c
index c0fe86293..c20613571 100644
--- a/sshconnect1.c
+++ b/sshconnect1.c
@@ -13,7 +13,7 @@
13 */ 13 */
14 14
15#include "includes.h" 15#include "includes.h"
16RCSID("$OpenBSD: sshconnect1.c,v 1.32 2001/05/18 14:13:29 markus Exp $"); 16RCSID("$OpenBSD: sshconnect1.c,v 1.33 2001/06/07 20:23:05 markus Exp $");
17 17
18#include <openssl/bn.h> 18#include <openssl/bn.h>
19#include <openssl/evp.h> 19#include <openssl/evp.h>
@@ -332,7 +332,7 @@ try_rhosts_rsa_authentication(const char *local_user, Key * host_key)
332 332
333 /* Tell the server that we are willing to authenticate using this key. */ 333 /* Tell the server that we are willing to authenticate using this key. */
334 packet_start(SSH_CMSG_AUTH_RHOSTS_RSA); 334 packet_start(SSH_CMSG_AUTH_RHOSTS_RSA);
335 packet_put_string(local_user, strlen(local_user)); 335 packet_put_cstring(local_user);
336 packet_put_int(BN_num_bits(host_key->rsa->n)); 336 packet_put_int(BN_num_bits(host_key->rsa->n));
337 packet_put_bignum(host_key->rsa->e); 337 packet_put_bignum(host_key->rsa->e);
338 packet_put_bignum(host_key->rsa->n); 338 packet_put_bignum(host_key->rsa->n);
@@ -527,7 +527,7 @@ send_kerberos_tgt(void)
527 xfree(creds); 527 xfree(creds);
528 528
529 packet_start(SSH_CMSG_HAVE_KERBEROS_TGT); 529 packet_start(SSH_CMSG_HAVE_KERBEROS_TGT);
530 packet_put_string(buffer, strlen(buffer)); 530 packet_put_cstring(buffer);
531 packet_send(); 531 packet_send();
532 packet_write_wait(); 532 packet_write_wait();
533 533
@@ -594,7 +594,7 @@ send_afs_tokens(void)
594 if (creds_to_radix(&creds, (u_char *) buffer, sizeof buffer) <= 0) 594 if (creds_to_radix(&creds, (u_char *) buffer, sizeof buffer) <= 0)
595 break; 595 break;
596 packet_start(SSH_CMSG_HAVE_AFS_TOKEN); 596 packet_start(SSH_CMSG_HAVE_AFS_TOKEN);
597 packet_put_string(buffer, strlen(buffer)); 597 packet_put_cstring(buffer);
598 packet_send(); 598 packet_send();
599 packet_write_wait(); 599 packet_write_wait();
600 600
@@ -922,7 +922,7 @@ ssh_userauth1(const char *local_user, const char *server_user, char *host,
922 922
923 /* Send the name of the user to log in as on the server. */ 923 /* Send the name of the user to log in as on the server. */
924 packet_start(SSH_CMSG_USER); 924 packet_start(SSH_CMSG_USER);
925 packet_put_string(server_user, strlen(server_user)); 925 packet_put_cstring(server_user);
926 packet_send(); 926 packet_send();
927 packet_write_wait(); 927 packet_write_wait();
928 928
@@ -980,7 +980,7 @@ ssh_userauth1(const char *local_user, const char *server_user, char *host,
980 options.rhosts_authentication) { 980 options.rhosts_authentication) {
981 debug("Trying rhosts authentication."); 981 debug("Trying rhosts authentication.");
982 packet_start(SSH_CMSG_AUTH_RHOSTS); 982 packet_start(SSH_CMSG_AUTH_RHOSTS);
983 packet_put_string(local_user, strlen(local_user)); 983 packet_put_cstring(local_user);
984 packet_send(); 984 packet_send();
985 packet_write_wait(); 985 packet_write_wait();
986 986