diff options
Diffstat (limited to 'sshd.c')
-rw-r--r-- | sshd.c | 18 |
1 files changed, 11 insertions, 7 deletions
@@ -11,7 +11,7 @@ | |||
11 | */ | 11 | */ |
12 | 12 | ||
13 | #include "includes.h" | 13 | #include "includes.h" |
14 | RCSID("$OpenBSD: sshd.c,v 1.91 2000/03/09 19:31:47 markus Exp $"); | 14 | RCSID("$OpenBSD: sshd.c,v 1.92 2000/03/16 20:56:15 markus Exp $"); |
15 | 15 | ||
16 | #include "xmalloc.h" | 16 | #include "xmalloc.h" |
17 | #include "rsa.h" | 17 | #include "rsa.h" |
@@ -1202,7 +1202,8 @@ void | |||
1202 | do_authentication() | 1202 | do_authentication() |
1203 | { | 1203 | { |
1204 | struct passwd *pw, pwcopy; | 1204 | struct passwd *pw, pwcopy; |
1205 | int plen, ulen; | 1205 | int plen; |
1206 | unsigned int ulen; | ||
1206 | char *user; | 1207 | char *user; |
1207 | 1208 | ||
1208 | /* Get the name of the user that we wish to log in as. */ | 1209 | /* Get the name of the user that we wish to log in as. */ |
@@ -1304,7 +1305,9 @@ do_authloop(struct passwd * pw) | |||
1304 | BIGNUM *n; | 1305 | BIGNUM *n; |
1305 | char *client_user = NULL, *password = NULL; | 1306 | char *client_user = NULL, *password = NULL; |
1306 | char user[1024]; | 1307 | char user[1024]; |
1307 | int plen, dlen, nlen, ulen, elen; | 1308 | unsigned int dlen; |
1309 | int plen, nlen, elen; | ||
1310 | unsigned int ulen; | ||
1308 | int type = 0; | 1311 | int type = 0; |
1309 | void (*authlog) (const char *fmt,...) = verbose; | 1312 | void (*authlog) (const char *fmt,...) = verbose; |
1310 | 1313 | ||
@@ -1608,7 +1611,7 @@ do_fake_authloop(char *user) | |||
1608 | (void)packet_read(&plen); | 1611 | (void)packet_read(&plen); |
1609 | #else /* SKEY */ | 1612 | #else /* SKEY */ |
1610 | int type = packet_read(&plen); | 1613 | int type = packet_read(&plen); |
1611 | int dlen; | 1614 | unsigned int dlen; |
1612 | char *password, *skeyinfo; | 1615 | char *password, *skeyinfo; |
1613 | /* Try to send a fake s/key challenge. */ | 1616 | /* Try to send a fake s/key challenge. */ |
1614 | if (options.skey_authentication == 1 && | 1617 | if (options.skey_authentication == 1 && |
@@ -1697,6 +1700,8 @@ do_authenticated(struct passwd * pw) | |||
1697 | int row, col, xpixel, ypixel, screen; | 1700 | int row, col, xpixel, ypixel, screen; |
1698 | char ttyname[64]; | 1701 | char ttyname[64]; |
1699 | char *command, *term = NULL, *display = NULL, *proto = NULL, *data = NULL; | 1702 | char *command, *term = NULL, *display = NULL, *proto = NULL, *data = NULL; |
1703 | int plen; | ||
1704 | unsigned int dlen; | ||
1700 | int n_bytes; | 1705 | int n_bytes; |
1701 | 1706 | ||
1702 | /* | 1707 | /* |
@@ -1720,7 +1725,6 @@ do_authenticated(struct passwd * pw) | |||
1720 | * or a command. | 1725 | * or a command. |
1721 | */ | 1726 | */ |
1722 | while (1) { | 1727 | while (1) { |
1723 | int plen, dlen; | ||
1724 | 1728 | ||
1725 | /* Get a packet from the client. */ | 1729 | /* Get a packet from the client. */ |
1726 | type = packet_read(&plen); | 1730 | type = packet_read(&plen); |
@@ -1799,7 +1803,7 @@ do_authenticated(struct passwd * pw) | |||
1799 | if (display) | 1803 | if (display) |
1800 | packet_disconnect("Protocol error: X11 display already set."); | 1804 | packet_disconnect("Protocol error: X11 display already set."); |
1801 | { | 1805 | { |
1802 | int proto_len, data_len; | 1806 | unsigned int proto_len, data_len; |
1803 | proto = packet_get_string(&proto_len); | 1807 | proto = packet_get_string(&proto_len); |
1804 | data = packet_get_string(&data_len); | 1808 | data = packet_get_string(&data_len); |
1805 | packet_integrity_check(plen, 4 + proto_len + 4 + data_len + 4, type); | 1809 | packet_integrity_check(plen, 4 + proto_len + 4 + data_len + 4, type); |
@@ -1881,7 +1885,7 @@ do_authenticated(struct passwd * pw) | |||
1881 | goto do_forced_command; | 1885 | goto do_forced_command; |
1882 | /* Get command from the packet. */ | 1886 | /* Get command from the packet. */ |
1883 | { | 1887 | { |
1884 | int dlen; | 1888 | unsigned int dlen; |
1885 | command = packet_get_string(&dlen); | 1889 | command = packet_get_string(&dlen); |
1886 | debug("Executing command '%.500s'", command); | 1890 | debug("Executing command '%.500s'", command); |
1887 | packet_integrity_check(plen, 4 + dlen, type); | 1891 | packet_integrity_check(plen, 4 + dlen, type); |