diff options
-rw-r--r-- | ChangeLog | 3 | ||||
-rw-r--r-- | sftp.c | 5 | ||||
-rw-r--r-- | ssh-keygen.c | 7 | ||||
-rw-r--r-- | ssh-pkcs11.c | 12 |
4 files changed, 16 insertions, 11 deletions
@@ -41,6 +41,9 @@ | |||
41 | [auth-options.c auth-rsa.c bufaux.c buffer.h channels.c hostfile.c] | 41 | [auth-options.c auth-rsa.c bufaux.c buffer.h channels.c hostfile.c] |
42 | [hostfile.h mux.c packet.c packet.h roaming_common.c serverloop.c] | 42 | [hostfile.h mux.c packet.c packet.h roaming_common.c serverloop.c] |
43 | fix pointer-signedness warnings from clang/llvm-3.3; "seems nice" deraadt@ | 43 | fix pointer-signedness warnings from clang/llvm-3.3; "seems nice" deraadt@ |
44 | - djm@cvs.openbsd.org 2013/07/12 00:20:00 | ||
45 | [sftp.c ssh-keygen.c ssh-pkcs11.c] | ||
46 | fix pointer-signedness warnings from clang/llvm-3.3; "seems nice" deraadt@ | ||
44 | 47 | ||
45 | 20130702 | 48 | 20130702 |
46 | - (dtucker) [contrib/cygwin/README contrib/cygwin/ssh-host-config | 49 | - (dtucker) [contrib/cygwin/README contrib/cygwin/ssh-host-config |
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: sftp.c,v 1.146 2013/06/04 20:42:36 dtucker Exp $ */ | 1 | /* $OpenBSD: sftp.c,v 1.147 2013/07/12 00:20:00 djm Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2001-2004 Damien Miller <djm@openbsd.org> | 3 | * Copyright (c) 2001-2004 Damien Miller <djm@openbsd.org> |
4 | * | 4 | * |
@@ -1830,7 +1830,8 @@ static unsigned char | |||
1830 | complete(EditLine *el, int ch) | 1830 | complete(EditLine *el, int ch) |
1831 | { | 1831 | { |
1832 | char **argv, *line, quote; | 1832 | char **argv, *line, quote; |
1833 | u_int argc, carg, cursor, len, terminated, ret = CC_ERROR; | 1833 | int argc, carg; |
1834 | u_int cursor, len, terminated, ret = CC_ERROR; | ||
1834 | const LineInfo *lf; | 1835 | const LineInfo *lf; |
1835 | struct complete_ctx *complete_ctx; | 1836 | struct complete_ctx *complete_ctx; |
1836 | 1837 | ||
diff --git a/ssh-keygen.c b/ssh-keygen.c index f24387475..504ebaf7b 100644 --- a/ssh-keygen.c +++ b/ssh-keygen.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssh-keygen.c,v 1.227 2013/05/17 00:13:14 djm Exp $ */ | 1 | /* $OpenBSD: ssh-keygen.c,v 1.228 2013/07/12 00:20:00 djm Exp $ */ |
2 | /* | 2 | /* |
3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
4 | * Copyright (c) 1994 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 4 | * Copyright (c) 1994 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
@@ -524,7 +524,7 @@ do_convert_from_ssh2(struct passwd *pw, Key **k, int *private) | |||
524 | fatal("%s: %s: %s", __progname, identity_file, strerror(errno)); | 524 | fatal("%s: %s: %s", __progname, identity_file, strerror(errno)); |
525 | encoded[0] = '\0'; | 525 | encoded[0] = '\0'; |
526 | while ((blen = get_line(fp, line, sizeof(line))) != -1) { | 526 | while ((blen = get_line(fp, line, sizeof(line))) != -1) { |
527 | if (line[blen - 1] == '\\') | 527 | if (blen > 0 && line[blen - 1] == '\\') |
528 | escaped++; | 528 | escaped++; |
529 | if (strncmp(line, "----", 4) == 0 || | 529 | if (strncmp(line, "----", 4) == 0 || |
530 | strstr(line, ": ") != NULL) { | 530 | strstr(line, ": ") != NULL) { |
@@ -1797,7 +1797,8 @@ add_cert_option(char *opt) | |||
1797 | static void | 1797 | static void |
1798 | show_options(const Buffer *optbuf, int v00, int in_critical) | 1798 | show_options(const Buffer *optbuf, int v00, int in_critical) |
1799 | { | 1799 | { |
1800 | u_char *name, *data; | 1800 | char *name; |
1801 | u_char *data; | ||
1801 | u_int dlen; | 1802 | u_int dlen; |
1802 | Buffer options, option; | 1803 | Buffer options, option; |
1803 | 1804 | ||
diff --git a/ssh-pkcs11.c b/ssh-pkcs11.c index a17326baa..618c07526 100644 --- a/ssh-pkcs11.c +++ b/ssh-pkcs11.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssh-pkcs11.c,v 1.7 2013/05/17 00:13:14 djm Exp $ */ | 1 | /* $OpenBSD: ssh-pkcs11.c,v 1.8 2013/07/12 00:20:00 djm Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2010 Markus Friedl. All rights reserved. | 3 | * Copyright (c) 2010 Markus Friedl. All rights reserved. |
4 | * | 4 | * |
@@ -263,8 +263,8 @@ pkcs11_rsa_private_encrypt(int flen, const u_char *from, u_char *to, RSA *rsa, | |||
263 | pin = read_passphrase(prompt, RP_ALLOW_EOF); | 263 | pin = read_passphrase(prompt, RP_ALLOW_EOF); |
264 | if (pin == NULL) | 264 | if (pin == NULL) |
265 | return (-1); /* bail out */ | 265 | return (-1); /* bail out */ |
266 | if ((rv = f->C_Login(si->session, CKU_USER, pin, strlen(pin))) | 266 | if ((rv = f->C_Login(si->session, CKU_USER, |
267 | != CKR_OK) { | 267 | (u_char *)pin, strlen(pin))) != CKR_OK) { |
268 | free(pin); | 268 | free(pin); |
269 | error("C_Login failed: %lu", rv); | 269 | error("C_Login failed: %lu", rv); |
270 | return (-1); | 270 | return (-1); |
@@ -328,7 +328,7 @@ pkcs11_rsa_wrap(struct pkcs11_provider *provider, CK_ULONG slotidx, | |||
328 | 328 | ||
329 | /* remove trailing spaces */ | 329 | /* remove trailing spaces */ |
330 | static void | 330 | static void |
331 | rmspace(char *buf, size_t len) | 331 | rmspace(u_char *buf, size_t len) |
332 | { | 332 | { |
333 | size_t i; | 333 | size_t i; |
334 | 334 | ||
@@ -366,8 +366,8 @@ pkcs11_open_session(struct pkcs11_provider *p, CK_ULONG slotidx, char *pin) | |||
366 | return (-1); | 366 | return (-1); |
367 | } | 367 | } |
368 | if (login_required && pin) { | 368 | if (login_required && pin) { |
369 | if ((rv = f->C_Login(session, CKU_USER, pin, strlen(pin))) | 369 | if ((rv = f->C_Login(session, CKU_USER, |
370 | != CKR_OK) { | 370 | (u_char *)pin, strlen(pin))) != CKR_OK) { |
371 | error("C_Login failed: %lu", rv); | 371 | error("C_Login failed: %lu", rv); |
372 | if ((rv = f->C_CloseSession(session)) != CKR_OK) | 372 | if ((rv = f->C_CloseSession(session)) != CKR_OK) |
373 | error("C_CloseSession failed: %lu", rv); | 373 | error("C_CloseSession failed: %lu", rv); |