diff options
-rw-r--r-- | authfd.c | 4 | ||||
-rw-r--r-- | authfile.c | 4 | ||||
-rw-r--r-- | msg.c | 4 | ||||
-rw-r--r-- | ssh-keygen.c | 4 | ||||
-rw-r--r-- | ssh-pkcs11-client.c | 4 | ||||
-rw-r--r-- | sshkey-xmss.c | 4 |
6 files changed, 12 insertions, 12 deletions
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: authfd.c,v 1.110 2018/07/03 11:39:54 djm Exp $ */ | 1 | /* $OpenBSD: authfd.c,v 1.111 2018/07/09 21:59:10 markus Exp $ */ |
2 | /* | 2 | /* |
3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
@@ -133,7 +133,7 @@ ssh_request_reply(int sock, struct sshbuf *request, struct sshbuf *reply) | |||
133 | 133 | ||
134 | /* Send the length and then the packet to the agent. */ | 134 | /* Send the length and then the packet to the agent. */ |
135 | if (atomicio(vwrite, sock, buf, 4) != 4 || | 135 | if (atomicio(vwrite, sock, buf, 4) != 4 || |
136 | atomicio(vwrite, sock, (u_char *)sshbuf_ptr(request), | 136 | atomicio(vwrite, sock, sshbuf_mutable_ptr(request), |
137 | sshbuf_len(request)) != sshbuf_len(request)) | 137 | sshbuf_len(request)) != sshbuf_len(request)) |
138 | return SSH_ERR_AGENT_COMMUNICATION; | 138 | return SSH_ERR_AGENT_COMMUNICATION; |
139 | /* | 139 | /* |
diff --git a/authfile.c b/authfile.c index c3a6345d3..be4a57736 100644 --- a/authfile.c +++ b/authfile.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: authfile.c,v 1.129 2018/06/06 18:29:18 markus Exp $ */ | 1 | /* $OpenBSD: authfile.c,v 1.130 2018/07/09 21:59:10 markus Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2000, 2013 Markus Friedl. All rights reserved. | 3 | * Copyright (c) 2000, 2013 Markus Friedl. All rights reserved. |
4 | * | 4 | * |
@@ -59,7 +59,7 @@ sshkey_save_private_blob(struct sshbuf *keybuf, const char *filename) | |||
59 | 59 | ||
60 | if ((fd = open(filename, O_WRONLY | O_CREAT | O_TRUNC, 0600)) < 0) | 60 | if ((fd = open(filename, O_WRONLY | O_CREAT | O_TRUNC, 0600)) < 0) |
61 | return SSH_ERR_SYSTEM_ERROR; | 61 | return SSH_ERR_SYSTEM_ERROR; |
62 | if (atomicio(vwrite, fd, (u_char *)sshbuf_ptr(keybuf), | 62 | if (atomicio(vwrite, fd, sshbuf_mutable_ptr(keybuf), |
63 | sshbuf_len(keybuf)) != sshbuf_len(keybuf)) { | 63 | sshbuf_len(keybuf)) != sshbuf_len(keybuf)) { |
64 | oerrno = errno; | 64 | oerrno = errno; |
65 | close(fd); | 65 | close(fd); |
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: msg.c,v 1.16 2015/01/15 09:40:00 djm Exp $ */ | 1 | /* $OpenBSD: msg.c,v 1.17 2018/07/09 21:59:10 markus Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2002 Markus Friedl. All rights reserved. | 3 | * Copyright (c) 2002 Markus Friedl. All rights reserved. |
4 | * | 4 | * |
@@ -55,7 +55,7 @@ ssh_msg_send(int fd, u_char type, struct sshbuf *m) | |||
55 | error("ssh_msg_send: write"); | 55 | error("ssh_msg_send: write"); |
56 | return (-1); | 56 | return (-1); |
57 | } | 57 | } |
58 | if (atomicio(vwrite, fd, (u_char *)sshbuf_ptr(m), mlen) != mlen) { | 58 | if (atomicio(vwrite, fd, sshbuf_mutable_ptr(m), mlen) != mlen) { |
59 | error("ssh_msg_send: write"); | 59 | error("ssh_msg_send: write"); |
60 | return (-1); | 60 | return (-1); |
61 | } | 61 | } |
diff --git a/ssh-keygen.c b/ssh-keygen.c index ccebbaf76..822e7e7c4 100644 --- a/ssh-keygen.c +++ b/ssh-keygen.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssh-keygen.c,v 1.317 2018/06/06 18:29:18 markus Exp $ */ | 1 | /* $OpenBSD: ssh-keygen.c,v 1.318 2018/07/09 21:59:10 markus Exp $ */ |
2 | /* | 2 | /* |
3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
4 | * Copyright (c) 1994 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 4 | * Copyright (c) 1994 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
@@ -2255,7 +2255,7 @@ do_gen_krl(struct passwd *pw, int updating, int argc, char **argv) | |||
2255 | fatal("Couldn't generate KRL"); | 2255 | fatal("Couldn't generate KRL"); |
2256 | if ((fd = open(identity_file, O_WRONLY|O_CREAT|O_TRUNC, 0644)) == -1) | 2256 | if ((fd = open(identity_file, O_WRONLY|O_CREAT|O_TRUNC, 0644)) == -1) |
2257 | fatal("open %s: %s", identity_file, strerror(errno)); | 2257 | fatal("open %s: %s", identity_file, strerror(errno)); |
2258 | if (atomicio(vwrite, fd, (void *)sshbuf_ptr(kbuf), sshbuf_len(kbuf)) != | 2258 | if (atomicio(vwrite, fd, sshbuf_mutable_ptr(kbuf), sshbuf_len(kbuf)) != |
2259 | sshbuf_len(kbuf)) | 2259 | sshbuf_len(kbuf)) |
2260 | fatal("write %s: %s", identity_file, strerror(errno)); | 2260 | fatal("write %s: %s", identity_file, strerror(errno)); |
2261 | close(fd); | 2261 | close(fd); |
diff --git a/ssh-pkcs11-client.c b/ssh-pkcs11-client.c index 0544b0e86..028b272cb 100644 --- a/ssh-pkcs11-client.c +++ b/ssh-pkcs11-client.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssh-pkcs11-client.c,v 1.9 2018/07/09 20:39:28 markus Exp $ */ | 1 | /* $OpenBSD: ssh-pkcs11-client.c,v 1.10 2018/07/09 21:59:10 markus Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2010 Markus Friedl. All rights reserved. | 3 | * Copyright (c) 2010 Markus Friedl. All rights reserved. |
4 | * | 4 | * |
@@ -57,7 +57,7 @@ send_msg(struct sshbuf *m) | |||
57 | 57 | ||
58 | POKE_U32(buf, mlen); | 58 | POKE_U32(buf, mlen); |
59 | if (atomicio(vwrite, fd, buf, 4) != 4 || | 59 | if (atomicio(vwrite, fd, buf, 4) != 4 || |
60 | atomicio(vwrite, fd, (u_char *)sshbuf_ptr(m), | 60 | atomicio(vwrite, fd, sshbuf_mutable_ptr(m), |
61 | sshbuf_len(m)) != sshbuf_len(m)) | 61 | sshbuf_len(m)) != sshbuf_len(m)) |
62 | error("write to helper failed"); | 62 | error("write to helper failed"); |
63 | if ((r = sshbuf_consume(m, mlen)) != 0) | 63 | if ((r = sshbuf_consume(m, mlen)) != 0) |
diff --git a/sshkey-xmss.c b/sshkey-xmss.c index 2c50f75f8..aaae70289 100644 --- a/sshkey-xmss.c +++ b/sshkey-xmss.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: sshkey-xmss.c,v 1.2 2018/04/10 00:10:49 djm Exp $ */ | 1 | /* $OpenBSD: sshkey-xmss.c,v 1.3 2018/07/09 21:59:10 markus Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2017 Markus Friedl. All rights reserved. | 3 | * Copyright (c) 2017 Markus Friedl. All rights reserved. |
4 | * | 4 | * |
@@ -625,7 +625,7 @@ sshkey_xmss_update_state(const struct sshkey *k, sshkey_printfn *pr) | |||
625 | close(fd); | 625 | close(fd); |
626 | goto done; | 626 | goto done; |
627 | } | 627 | } |
628 | if (atomicio(vwrite, fd, (void *)sshbuf_ptr(enc), sshbuf_len(enc)) != | 628 | if (atomicio(vwrite, fd, sshbuf_mutable_ptr(enc), sshbuf_len(enc)) != |
629 | sshbuf_len(enc)) { | 629 | sshbuf_len(enc)) { |
630 | ret = SSH_ERR_SYSTEM_ERROR; | 630 | ret = SSH_ERR_SYSTEM_ERROR; |
631 | PRINT("%s: write new state file data: %s", __func__, nstatefile); | 631 | PRINT("%s: write new state file data: %s", __func__, nstatefile); |