summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--ChangeLog5
-rw-r--r--channels.c4
-rw-r--r--kex.h4
-rw-r--r--key.c5
-rw-r--r--monitor.c17
-rw-r--r--monitor_wrap.c4
-rw-r--r--radix.c9
-rw-r--r--uuencode.c5
8 files changed, 30 insertions, 23 deletions
diff --git a/ChangeLog b/ChangeLog
index e3626cb91..8b1d28722 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -8,6 +8,9 @@
8 [monitor_wrap.c monitor_wrap.h] 8 [monitor_wrap.c monitor_wrap.h]
9 kerberos support for privsep. confirmed to work by lha@stacken.kth.se 9 kerberos support for privsep. confirmed to work by lha@stacken.kth.se
10 patch from markus 10 patch from markus
11 - markus@cvs.openbsd.org 2002/09/09 14:54:15
12 [channels.c kex.h key.c monitor.c monitor_wrap.c radix.c uuencode.c]
13 signed vs unsigned from -pedantic; ok henning@
11 14
1220020911 1520020911
13 - (djm) Sync openbsd-compat with OpenBSD -current 16 - (djm) Sync openbsd-compat with OpenBSD -current
@@ -1628,4 +1631,4 @@
1628 - (stevesk) entropy.c: typo in debug message 1631 - (stevesk) entropy.c: typo in debug message
1629 - (djm) ssh-keygen -i needs seeded RNG; report from markus@ 1632 - (djm) ssh-keygen -i needs seeded RNG; report from markus@
1630 1633
1631$Id: ChangeLog,v 1.2453 2002/09/11 23:47:29 djm Exp $ 1634$Id: ChangeLog,v 1.2454 2002/09/11 23:49:15 djm Exp $
diff --git a/channels.c b/channels.c
index fe99cdbec..0ae37b6d8 100644
--- a/channels.c
+++ b/channels.c
@@ -39,7 +39,7 @@
39 */ 39 */
40 40
41#include "includes.h" 41#include "includes.h"
42RCSID("$OpenBSD: channels.c,v 1.180 2002/07/04 08:12:15 deraadt Exp $"); 42RCSID("$OpenBSD: channels.c,v 1.181 2002/09/09 14:54:14 markus Exp $");
43 43
44#include "ssh.h" 44#include "ssh.h"
45#include "ssh1.h" 45#include "ssh1.h"
@@ -875,7 +875,7 @@ channel_pre_x11_open(Channel *c, fd_set * readset, fd_set * writeset)
875static int 875static int
876channel_decode_socks4(Channel *c, fd_set * readset, fd_set * writeset) 876channel_decode_socks4(Channel *c, fd_set * readset, fd_set * writeset)
877{ 877{
878 u_char *p, *host; 878 char *p, *host;
879 int len, have, i, found; 879 int len, have, i, found;
880 char username[256]; 880 char username[256];
881 struct { 881 struct {
diff --git a/kex.h b/kex.h
index 12edcdc63..93a529e12 100644
--- a/kex.h
+++ b/kex.h
@@ -1,4 +1,4 @@
1/* $OpenBSD: kex.h,v 1.31 2002/05/16 22:02:50 markus Exp $ */ 1/* $OpenBSD: kex.h,v 1.32 2002/09/09 14:54:14 markus Exp $ */
2 2
3/* 3/*
4 * Copyright (c) 2000, 2001 Markus Friedl. All rights reserved. 4 * Copyright (c) 2000, 2001 Markus Friedl. All rights reserved.
@@ -96,7 +96,7 @@ struct Newkeys {
96}; 96};
97struct Kex { 97struct Kex {
98 u_char *session_id; 98 u_char *session_id;
99 int session_id_len; 99 u_int session_id_len;
100 Newkeys *newkeys[MODE_MAX]; 100 Newkeys *newkeys[MODE_MAX];
101 int we_need; 101 int we_need;
102 int server; 102 int server;
diff --git a/key.c b/key.c
index 0b03e9914..9806a729a 100644
--- a/key.c
+++ b/key.c
@@ -32,7 +32,7 @@
32 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 32 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
33 */ 33 */
34#include "includes.h" 34#include "includes.h"
35RCSID("$OpenBSD: key.c,v 1.48 2002/07/04 10:41:47 markus Exp $"); 35RCSID("$OpenBSD: key.c,v 1.49 2002/09/09 14:54:14 markus Exp $");
36 36
37#include <openssl/evp.h> 37#include <openssl/evp.h>
38 38
@@ -494,7 +494,8 @@ key_write(Key *key, FILE *f)
494{ 494{
495 int n, success = 0; 495 int n, success = 0;
496 u_int len, bits = 0; 496 u_int len, bits = 0;
497 u_char *blob, *uu; 497 u_char *blob;
498 char *uu;
498 499
499 if (key->type == KEY_RSA1 && key->rsa != NULL) { 500 if (key->type == KEY_RSA1 && key->rsa != NULL) {
500 /* size of modulus 'n' */ 501 /* size of modulus 'n' */
diff --git a/monitor.c b/monitor.c
index 562efcaf8..69445ee25 100644
--- a/monitor.c
+++ b/monitor.c
@@ -25,7 +25,7 @@
25 */ 25 */
26 26
27#include "includes.h" 27#include "includes.h"
28RCSID("$OpenBSD: monitor.c,v 1.25 2002/09/09 06:48:06 itojun Exp $"); 28RCSID("$OpenBSD: monitor.c,v 1.26 2002/09/09 14:54:15 markus Exp $");
29 29
30#include <openssl/dh.h> 30#include <openssl/dh.h>
31 31
@@ -131,8 +131,8 @@ static BIGNUM *ssh1_challenge = NULL; /* used for ssh1 rsa auth */
131static u_char *key_blob = NULL; 131static u_char *key_blob = NULL;
132static u_int key_bloblen = 0; 132static u_int key_bloblen = 0;
133static int key_blobtype = MM_NOKEY; 133static int key_blobtype = MM_NOKEY;
134static u_char *hostbased_cuser = NULL; 134static char *hostbased_cuser = NULL;
135static u_char *hostbased_chost = NULL; 135static char *hostbased_chost = NULL;
136static char *auth_method = "unknown"; 136static char *auth_method = "unknown";
137static int session_id2_len = 0; 137static int session_id2_len = 0;
138static u_char *session_id2 = NULL; 138static u_char *session_id2 = NULL;
@@ -758,7 +758,8 @@ int
758mm_answer_keyallowed(int socket, Buffer *m) 758mm_answer_keyallowed(int socket, Buffer *m)
759{ 759{
760 Key *key; 760 Key *key;
761 u_char *cuser, *chost, *blob; 761 char *cuser, *chost;
762 u_char *blob;
762 u_int bloblen; 763 u_int bloblen;
763 enum mm_keytype type = 0; 764 enum mm_keytype type = 0;
764 int allowed = 0; 765 int allowed = 0;
@@ -834,7 +835,7 @@ static int
834monitor_valid_userblob(u_char *data, u_int datalen) 835monitor_valid_userblob(u_char *data, u_int datalen)
835{ 836{
836 Buffer b; 837 Buffer b;
837 u_char *p; 838 char *p;
838 u_int len; 839 u_int len;
839 int fail = 0; 840 int fail = 0;
840 841
@@ -887,11 +888,11 @@ monitor_valid_userblob(u_char *data, u_int datalen)
887} 888}
888 889
889static int 890static int
890monitor_valid_hostbasedblob(u_char *data, u_int datalen, u_char *cuser, 891monitor_valid_hostbasedblob(u_char *data, u_int datalen, char *cuser,
891 u_char *chost) 892 char *chost)
892{ 893{
893 Buffer b; 894 Buffer b;
894 u_char *p; 895 char *p;
895 u_int len; 896 u_int len;
896 int fail = 0; 897 int fail = 0;
897 898
diff --git a/monitor_wrap.c b/monitor_wrap.c
index ed1c50ff9..5d11a6593 100644
--- a/monitor_wrap.c
+++ b/monitor_wrap.c
@@ -25,7 +25,7 @@
25 */ 25 */
26 26
27#include "includes.h" 27#include "includes.h"
28RCSID("$OpenBSD: monitor_wrap.c,v 1.17 2002/09/09 06:48:06 itojun Exp $"); 28RCSID("$OpenBSD: monitor_wrap.c,v 1.18 2002/09/09 14:54:15 markus Exp $");
29 29
30#include <openssl/bn.h> 30#include <openssl/bn.h>
31#include <openssl/dh.h> 31#include <openssl/dh.h>
@@ -599,7 +599,7 @@ int
599mm_pty_allocate(int *ptyfd, int *ttyfd, char *namebuf, int namebuflen) 599mm_pty_allocate(int *ptyfd, int *ttyfd, char *namebuf, int namebuflen)
600{ 600{
601 Buffer m; 601 Buffer m;
602 u_char *p; 602 char *p;
603 int success = 0; 603 int success = 0;
604 604
605 buffer_init(&m); 605 buffer_init(&m);
diff --git a/radix.c b/radix.c
index 580e7e07f..c680d6bf3 100644
--- a/radix.c
+++ b/radix.c
@@ -26,7 +26,7 @@
26#include "includes.h" 26#include "includes.h"
27#include "uuencode.h" 27#include "uuencode.h"
28 28
29RCSID("$OpenBSD: radix.c,v 1.21 2002/06/19 00:27:55 deraadt Exp $"); 29RCSID("$OpenBSD: radix.c,v 1.22 2002/09/09 14:54:15 markus Exp $");
30 30
31#ifdef AFS 31#ifdef AFS
32#include <krb.h> 32#include <krb.h>
@@ -93,9 +93,10 @@ int
93radix_to_creds(const char *buf, CREDENTIALS *creds) 93radix_to_creds(const char *buf, CREDENTIALS *creds)
94{ 94{
95 Buffer b; 95 Buffer b;
96 char c, version, *space, *p; 96 u_char *space;
97 u_int endTime; 97 char c, version, *p;
98 int len, blen, ret; 98 u_int endTime, len;
99 int blen, ret;
99 100
100 ret = 0; 101 ret = 0;
101 blen = strlen(buf); 102 blen = strlen(buf);
diff --git a/uuencode.c b/uuencode.c
index 89fcb0815..21eaf4d3f 100644
--- a/uuencode.c
+++ b/uuencode.c
@@ -23,9 +23,10 @@
23 */ 23 */
24 24
25#include "includes.h" 25#include "includes.h"
26RCSID("$OpenBSD: uuencode.c,v 1.16 2002/09/09 14:54:15 markus Exp $");
27
26#include "xmalloc.h" 28#include "xmalloc.h"
27#include "uuencode.h" 29#include "uuencode.h"
28RCSID("$OpenBSD: uuencode.c,v 1.15 2002/03/04 17:27:39 stevesk Exp $");
29 30
30int 31int
31uuencode(u_char *src, u_int srclength, 32uuencode(u_char *src, u_int srclength,
@@ -57,7 +58,7 @@ uudecode(const char *src, u_char *target, size_t targsize)
57void 58void
58dump_base64(FILE *fp, u_char *data, u_int len) 59dump_base64(FILE *fp, u_char *data, u_int len)
59{ 60{
60 u_char *buf = xmalloc(2*len); 61 char *buf = xmalloc(2*len);
61 int i, n; 62 int i, n;
62 63
63 n = uuencode(data, len, buf, 2*len); 64 n = uuencode(data, len, buf, 2*len);