diff options
author | Ben Lindstrom <mouring@eviladmin.org> | 2001-06-09 01:42:01 +0000 |
---|---|---|
committer | Ben Lindstrom <mouring@eviladmin.org> | 2001-06-09 01:42:01 +0000 |
commit | 664408d2a794806722aa3f321b92c7bdd667c42e (patch) | |
tree | 0dbce8250bc4d6325ed2f2b6950221a24d62dc2a /sshconnect1.c | |
parent | 9d0c06667eb4ca616ffa690e88b9dd7c438e3103 (diff) |
- markus@cvs.openbsd.org 2001/06/07 20:23:05
[authfd.c authfile.c channels.c kexdh.c kexgex.c packet.c ssh.c
sshconnect.c sshconnect1.c]
use xxx_put_cstring()
Diffstat (limited to 'sshconnect1.c')
-rw-r--r-- | sshconnect1.c | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/sshconnect1.c b/sshconnect1.c index c0fe86293..c20613571 100644 --- a/sshconnect1.c +++ b/sshconnect1.c | |||
@@ -13,7 +13,7 @@ | |||
13 | */ | 13 | */ |
14 | 14 | ||
15 | #include "includes.h" | 15 | #include "includes.h" |
16 | RCSID("$OpenBSD: sshconnect1.c,v 1.32 2001/05/18 14:13:29 markus Exp $"); | 16 | RCSID("$OpenBSD: sshconnect1.c,v 1.33 2001/06/07 20:23:05 markus Exp $"); |
17 | 17 | ||
18 | #include <openssl/bn.h> | 18 | #include <openssl/bn.h> |
19 | #include <openssl/evp.h> | 19 | #include <openssl/evp.h> |
@@ -332,7 +332,7 @@ try_rhosts_rsa_authentication(const char *local_user, Key * host_key) | |||
332 | 332 | ||
333 | /* Tell the server that we are willing to authenticate using this key. */ | 333 | /* Tell the server that we are willing to authenticate using this key. */ |
334 | packet_start(SSH_CMSG_AUTH_RHOSTS_RSA); | 334 | packet_start(SSH_CMSG_AUTH_RHOSTS_RSA); |
335 | packet_put_string(local_user, strlen(local_user)); | 335 | packet_put_cstring(local_user); |
336 | packet_put_int(BN_num_bits(host_key->rsa->n)); | 336 | packet_put_int(BN_num_bits(host_key->rsa->n)); |
337 | packet_put_bignum(host_key->rsa->e); | 337 | packet_put_bignum(host_key->rsa->e); |
338 | packet_put_bignum(host_key->rsa->n); | 338 | packet_put_bignum(host_key->rsa->n); |
@@ -527,7 +527,7 @@ send_kerberos_tgt(void) | |||
527 | xfree(creds); | 527 | xfree(creds); |
528 | 528 | ||
529 | packet_start(SSH_CMSG_HAVE_KERBEROS_TGT); | 529 | packet_start(SSH_CMSG_HAVE_KERBEROS_TGT); |
530 | packet_put_string(buffer, strlen(buffer)); | 530 | packet_put_cstring(buffer); |
531 | packet_send(); | 531 | packet_send(); |
532 | packet_write_wait(); | 532 | packet_write_wait(); |
533 | 533 | ||
@@ -594,7 +594,7 @@ send_afs_tokens(void) | |||
594 | if (creds_to_radix(&creds, (u_char *) buffer, sizeof buffer) <= 0) | 594 | if (creds_to_radix(&creds, (u_char *) buffer, sizeof buffer) <= 0) |
595 | break; | 595 | break; |
596 | packet_start(SSH_CMSG_HAVE_AFS_TOKEN); | 596 | packet_start(SSH_CMSG_HAVE_AFS_TOKEN); |
597 | packet_put_string(buffer, strlen(buffer)); | 597 | packet_put_cstring(buffer); |
598 | packet_send(); | 598 | packet_send(); |
599 | packet_write_wait(); | 599 | packet_write_wait(); |
600 | 600 | ||
@@ -922,7 +922,7 @@ ssh_userauth1(const char *local_user, const char *server_user, char *host, | |||
922 | 922 | ||
923 | /* Send the name of the user to log in as on the server. */ | 923 | /* Send the name of the user to log in as on the server. */ |
924 | packet_start(SSH_CMSG_USER); | 924 | packet_start(SSH_CMSG_USER); |
925 | packet_put_string(server_user, strlen(server_user)); | 925 | packet_put_cstring(server_user); |
926 | packet_send(); | 926 | packet_send(); |
927 | packet_write_wait(); | 927 | packet_write_wait(); |
928 | 928 | ||
@@ -980,7 +980,7 @@ ssh_userauth1(const char *local_user, const char *server_user, char *host, | |||
980 | options.rhosts_authentication) { | 980 | options.rhosts_authentication) { |
981 | debug("Trying rhosts authentication."); | 981 | debug("Trying rhosts authentication."); |
982 | packet_start(SSH_CMSG_AUTH_RHOSTS); | 982 | packet_start(SSH_CMSG_AUTH_RHOSTS); |
983 | packet_put_string(local_user, strlen(local_user)); | 983 | packet_put_cstring(local_user); |
984 | packet_send(); | 984 | packet_send(); |
985 | packet_write_wait(); | 985 | packet_write_wait(); |
986 | 986 | ||