diff options
-rw-r--r-- | ChangeLog | 5 | ||||
-rw-r--r-- | channels.c | 4 | ||||
-rw-r--r-- | kex.h | 4 | ||||
-rw-r--r-- | key.c | 5 | ||||
-rw-r--r-- | monitor.c | 17 | ||||
-rw-r--r-- | monitor_wrap.c | 4 | ||||
-rw-r--r-- | radix.c | 9 | ||||
-rw-r--r-- | uuencode.c | 5 |
8 files changed, 30 insertions, 23 deletions
@@ -8,6 +8,9 @@ | |||
8 | [monitor_wrap.c monitor_wrap.h] | 8 | [monitor_wrap.c monitor_wrap.h] |
9 | kerberos support for privsep. confirmed to work by lha@stacken.kth.se | 9 | kerberos support for privsep. confirmed to work by lha@stacken.kth.se |
10 | patch from markus | 10 | patch from markus |
11 | - markus@cvs.openbsd.org 2002/09/09 14:54:15 | ||
12 | [channels.c kex.h key.c monitor.c monitor_wrap.c radix.c uuencode.c] | ||
13 | signed vs unsigned from -pedantic; ok henning@ | ||
11 | 14 | ||
12 | 20020911 | 15 | 20020911 |
13 | - (djm) Sync openbsd-compat with OpenBSD -current | 16 | - (djm) Sync openbsd-compat with OpenBSD -current |
@@ -1628,4 +1631,4 @@ | |||
1628 | - (stevesk) entropy.c: typo in debug message | 1631 | - (stevesk) entropy.c: typo in debug message |
1629 | - (djm) ssh-keygen -i needs seeded RNG; report from markus@ | 1632 | - (djm) ssh-keygen -i needs seeded RNG; report from markus@ |
1630 | 1633 | ||
1631 | $Id: ChangeLog,v 1.2453 2002/09/11 23:47:29 djm Exp $ | 1634 | $Id: ChangeLog,v 1.2454 2002/09/11 23:49:15 djm Exp $ |
diff --git a/channels.c b/channels.c index fe99cdbec..0ae37b6d8 100644 --- a/channels.c +++ b/channels.c | |||
@@ -39,7 +39,7 @@ | |||
39 | */ | 39 | */ |
40 | 40 | ||
41 | #include "includes.h" | 41 | #include "includes.h" |
42 | RCSID("$OpenBSD: channels.c,v 1.180 2002/07/04 08:12:15 deraadt Exp $"); | 42 | RCSID("$OpenBSD: channels.c,v 1.181 2002/09/09 14:54:14 markus Exp $"); |
43 | 43 | ||
44 | #include "ssh.h" | 44 | #include "ssh.h" |
45 | #include "ssh1.h" | 45 | #include "ssh1.h" |
@@ -875,7 +875,7 @@ channel_pre_x11_open(Channel *c, fd_set * readset, fd_set * writeset) | |||
875 | static int | 875 | static int |
876 | channel_decode_socks4(Channel *c, fd_set * readset, fd_set * writeset) | 876 | channel_decode_socks4(Channel *c, fd_set * readset, fd_set * writeset) |
877 | { | 877 | { |
878 | u_char *p, *host; | 878 | char *p, *host; |
879 | int len, have, i, found; | 879 | int len, have, i, found; |
880 | char username[256]; | 880 | char username[256]; |
881 | struct { | 881 | struct { |
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: kex.h,v 1.31 2002/05/16 22:02:50 markus Exp $ */ | 1 | /* $OpenBSD: kex.h,v 1.32 2002/09/09 14:54:14 markus Exp $ */ |
2 | 2 | ||
3 | /* | 3 | /* |
4 | * Copyright (c) 2000, 2001 Markus Friedl. All rights reserved. | 4 | * Copyright (c) 2000, 2001 Markus Friedl. All rights reserved. |
@@ -96,7 +96,7 @@ struct Newkeys { | |||
96 | }; | 96 | }; |
97 | struct Kex { | 97 | struct Kex { |
98 | u_char *session_id; | 98 | u_char *session_id; |
99 | int session_id_len; | 99 | u_int session_id_len; |
100 | Newkeys *newkeys[MODE_MAX]; | 100 | Newkeys *newkeys[MODE_MAX]; |
101 | int we_need; | 101 | int we_need; |
102 | int server; | 102 | int server; |
@@ -32,7 +32,7 @@ | |||
32 | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 32 | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
33 | */ | 33 | */ |
34 | #include "includes.h" | 34 | #include "includes.h" |
35 | RCSID("$OpenBSD: key.c,v 1.48 2002/07/04 10:41:47 markus Exp $"); | 35 | RCSID("$OpenBSD: key.c,v 1.49 2002/09/09 14:54:14 markus Exp $"); |
36 | 36 | ||
37 | #include <openssl/evp.h> | 37 | #include <openssl/evp.h> |
38 | 38 | ||
@@ -494,7 +494,8 @@ key_write(Key *key, FILE *f) | |||
494 | { | 494 | { |
495 | int n, success = 0; | 495 | int n, success = 0; |
496 | u_int len, bits = 0; | 496 | u_int len, bits = 0; |
497 | u_char *blob, *uu; | 497 | u_char *blob; |
498 | char *uu; | ||
498 | 499 | ||
499 | if (key->type == KEY_RSA1 && key->rsa != NULL) { | 500 | if (key->type == KEY_RSA1 && key->rsa != NULL) { |
500 | /* size of modulus 'n' */ | 501 | /* size of modulus 'n' */ |
@@ -25,7 +25,7 @@ | |||
25 | */ | 25 | */ |
26 | 26 | ||
27 | #include "includes.h" | 27 | #include "includes.h" |
28 | RCSID("$OpenBSD: monitor.c,v 1.25 2002/09/09 06:48:06 itojun Exp $"); | 28 | RCSID("$OpenBSD: monitor.c,v 1.26 2002/09/09 14:54:15 markus Exp $"); |
29 | 29 | ||
30 | #include <openssl/dh.h> | 30 | #include <openssl/dh.h> |
31 | 31 | ||
@@ -131,8 +131,8 @@ static BIGNUM *ssh1_challenge = NULL; /* used for ssh1 rsa auth */ | |||
131 | static u_char *key_blob = NULL; | 131 | static u_char *key_blob = NULL; |
132 | static u_int key_bloblen = 0; | 132 | static u_int key_bloblen = 0; |
133 | static int key_blobtype = MM_NOKEY; | 133 | static int key_blobtype = MM_NOKEY; |
134 | static u_char *hostbased_cuser = NULL; | 134 | static char *hostbased_cuser = NULL; |
135 | static u_char *hostbased_chost = NULL; | 135 | static char *hostbased_chost = NULL; |
136 | static char *auth_method = "unknown"; | 136 | static char *auth_method = "unknown"; |
137 | static int session_id2_len = 0; | 137 | static int session_id2_len = 0; |
138 | static u_char *session_id2 = NULL; | 138 | static u_char *session_id2 = NULL; |
@@ -758,7 +758,8 @@ int | |||
758 | mm_answer_keyallowed(int socket, Buffer *m) | 758 | mm_answer_keyallowed(int socket, Buffer *m) |
759 | { | 759 | { |
760 | Key *key; | 760 | Key *key; |
761 | u_char *cuser, *chost, *blob; | 761 | char *cuser, *chost; |
762 | u_char *blob; | ||
762 | u_int bloblen; | 763 | u_int bloblen; |
763 | enum mm_keytype type = 0; | 764 | enum mm_keytype type = 0; |
764 | int allowed = 0; | 765 | int allowed = 0; |
@@ -834,7 +835,7 @@ static int | |||
834 | monitor_valid_userblob(u_char *data, u_int datalen) | 835 | monitor_valid_userblob(u_char *data, u_int datalen) |
835 | { | 836 | { |
836 | Buffer b; | 837 | Buffer b; |
837 | u_char *p; | 838 | char *p; |
838 | u_int len; | 839 | u_int len; |
839 | int fail = 0; | 840 | int fail = 0; |
840 | 841 | ||
@@ -887,11 +888,11 @@ monitor_valid_userblob(u_char *data, u_int datalen) | |||
887 | } | 888 | } |
888 | 889 | ||
889 | static int | 890 | static int |
890 | monitor_valid_hostbasedblob(u_char *data, u_int datalen, u_char *cuser, | 891 | monitor_valid_hostbasedblob(u_char *data, u_int datalen, char *cuser, |
891 | u_char *chost) | 892 | char *chost) |
892 | { | 893 | { |
893 | Buffer b; | 894 | Buffer b; |
894 | u_char *p; | 895 | char *p; |
895 | u_int len; | 896 | u_int len; |
896 | int fail = 0; | 897 | int fail = 0; |
897 | 898 | ||
diff --git a/monitor_wrap.c b/monitor_wrap.c index ed1c50ff9..5d11a6593 100644 --- a/monitor_wrap.c +++ b/monitor_wrap.c | |||
@@ -25,7 +25,7 @@ | |||
25 | */ | 25 | */ |
26 | 26 | ||
27 | #include "includes.h" | 27 | #include "includes.h" |
28 | RCSID("$OpenBSD: monitor_wrap.c,v 1.17 2002/09/09 06:48:06 itojun Exp $"); | 28 | RCSID("$OpenBSD: monitor_wrap.c,v 1.18 2002/09/09 14:54:15 markus Exp $"); |
29 | 29 | ||
30 | #include <openssl/bn.h> | 30 | #include <openssl/bn.h> |
31 | #include <openssl/dh.h> | 31 | #include <openssl/dh.h> |
@@ -599,7 +599,7 @@ int | |||
599 | mm_pty_allocate(int *ptyfd, int *ttyfd, char *namebuf, int namebuflen) | 599 | mm_pty_allocate(int *ptyfd, int *ttyfd, char *namebuf, int namebuflen) |
600 | { | 600 | { |
601 | Buffer m; | 601 | Buffer m; |
602 | u_char *p; | 602 | char *p; |
603 | int success = 0; | 603 | int success = 0; |
604 | 604 | ||
605 | buffer_init(&m); | 605 | buffer_init(&m); |
@@ -26,7 +26,7 @@ | |||
26 | #include "includes.h" | 26 | #include "includes.h" |
27 | #include "uuencode.h" | 27 | #include "uuencode.h" |
28 | 28 | ||
29 | RCSID("$OpenBSD: radix.c,v 1.21 2002/06/19 00:27:55 deraadt Exp $"); | 29 | RCSID("$OpenBSD: radix.c,v 1.22 2002/09/09 14:54:15 markus Exp $"); |
30 | 30 | ||
31 | #ifdef AFS | 31 | #ifdef AFS |
32 | #include <krb.h> | 32 | #include <krb.h> |
@@ -93,9 +93,10 @@ int | |||
93 | radix_to_creds(const char *buf, CREDENTIALS *creds) | 93 | radix_to_creds(const char *buf, CREDENTIALS *creds) |
94 | { | 94 | { |
95 | Buffer b; | 95 | Buffer b; |
96 | char c, version, *space, *p; | 96 | u_char *space; |
97 | u_int endTime; | 97 | char c, version, *p; |
98 | int len, blen, ret; | 98 | u_int endTime, len; |
99 | int blen, ret; | ||
99 | 100 | ||
100 | ret = 0; | 101 | ret = 0; |
101 | blen = strlen(buf); | 102 | blen = strlen(buf); |
diff --git a/uuencode.c b/uuencode.c index 89fcb0815..21eaf4d3f 100644 --- a/uuencode.c +++ b/uuencode.c | |||
@@ -23,9 +23,10 @@ | |||
23 | */ | 23 | */ |
24 | 24 | ||
25 | #include "includes.h" | 25 | #include "includes.h" |
26 | RCSID("$OpenBSD: uuencode.c,v 1.16 2002/09/09 14:54:15 markus Exp $"); | ||
27 | |||
26 | #include "xmalloc.h" | 28 | #include "xmalloc.h" |
27 | #include "uuencode.h" | 29 | #include "uuencode.h" |
28 | RCSID("$OpenBSD: uuencode.c,v 1.15 2002/03/04 17:27:39 stevesk Exp $"); | ||
29 | 30 | ||
30 | int | 31 | int |
31 | uuencode(u_char *src, u_int srclength, | 32 | uuencode(u_char *src, u_int srclength, |
@@ -57,7 +58,7 @@ uudecode(const char *src, u_char *target, size_t targsize) | |||
57 | void | 58 | void |
58 | dump_base64(FILE *fp, u_char *data, u_int len) | 59 | dump_base64(FILE *fp, u_char *data, u_int len) |
59 | { | 60 | { |
60 | u_char *buf = xmalloc(2*len); | 61 | char *buf = xmalloc(2*len); |
61 | int i, n; | 62 | int i, n; |
62 | 63 | ||
63 | n = uuencode(data, len, buf, 2*len); | 64 | n = uuencode(data, len, buf, 2*len); |