summaryrefslogtreecommitdiff
path: root/sshd.c
diff options
context:
space:
mode:
Diffstat (limited to 'sshd.c')
-rw-r--r--sshd.c18
1 files changed, 11 insertions, 7 deletions
diff --git a/sshd.c b/sshd.c
index 5062d3761..98b6138ab 100644
--- a/sshd.c
+++ b/sshd.c
@@ -11,7 +11,7 @@
11 */ 11 */
12 12
13#include "includes.h" 13#include "includes.h"
14RCSID("$OpenBSD: sshd.c,v 1.91 2000/03/09 19:31:47 markus Exp $"); 14RCSID("$OpenBSD: sshd.c,v 1.92 2000/03/16 20:56:15 markus Exp $");
15 15
16#include "xmalloc.h" 16#include "xmalloc.h"
17#include "rsa.h" 17#include "rsa.h"
@@ -1202,7 +1202,8 @@ void
1202do_authentication() 1202do_authentication()
1203{ 1203{
1204 struct passwd *pw, pwcopy; 1204 struct passwd *pw, pwcopy;
1205 int plen, ulen; 1205 int plen;
1206 unsigned int ulen;
1206 char *user; 1207 char *user;
1207 1208
1208 /* Get the name of the user that we wish to log in as. */ 1209 /* Get the name of the user that we wish to log in as. */
@@ -1304,7 +1305,9 @@ do_authloop(struct passwd * pw)
1304 BIGNUM *n; 1305 BIGNUM *n;
1305 char *client_user = NULL, *password = NULL; 1306 char *client_user = NULL, *password = NULL;
1306 char user[1024]; 1307 char user[1024];
1307 int plen, dlen, nlen, ulen, elen; 1308 unsigned int dlen;
1309 int plen, nlen, elen;
1310 unsigned int ulen;
1308 int type = 0; 1311 int type = 0;
1309 void (*authlog) (const char *fmt,...) = verbose; 1312 void (*authlog) (const char *fmt,...) = verbose;
1310 1313
@@ -1608,7 +1611,7 @@ do_fake_authloop(char *user)
1608 (void)packet_read(&plen); 1611 (void)packet_read(&plen);
1609#else /* SKEY */ 1612#else /* SKEY */
1610 int type = packet_read(&plen); 1613 int type = packet_read(&plen);
1611 int dlen; 1614 unsigned int dlen;
1612 char *password, *skeyinfo; 1615 char *password, *skeyinfo;
1613 /* Try to send a fake s/key challenge. */ 1616 /* Try to send a fake s/key challenge. */
1614 if (options.skey_authentication == 1 && 1617 if (options.skey_authentication == 1 &&
@@ -1697,6 +1700,8 @@ do_authenticated(struct passwd * pw)
1697 int row, col, xpixel, ypixel, screen; 1700 int row, col, xpixel, ypixel, screen;
1698 char ttyname[64]; 1701 char ttyname[64];
1699 char *command, *term = NULL, *display = NULL, *proto = NULL, *data = NULL; 1702 char *command, *term = NULL, *display = NULL, *proto = NULL, *data = NULL;
1703 int plen;
1704 unsigned int dlen;
1700 int n_bytes; 1705 int n_bytes;
1701 1706
1702 /* 1707 /*
@@ -1720,7 +1725,6 @@ do_authenticated(struct passwd * pw)
1720 * or a command. 1725 * or a command.
1721 */ 1726 */
1722 while (1) { 1727 while (1) {
1723 int plen, dlen;
1724 1728
1725 /* Get a packet from the client. */ 1729 /* Get a packet from the client. */
1726 type = packet_read(&plen); 1730 type = packet_read(&plen);
@@ -1799,7 +1803,7 @@ do_authenticated(struct passwd * pw)
1799 if (display) 1803 if (display)
1800 packet_disconnect("Protocol error: X11 display already set."); 1804 packet_disconnect("Protocol error: X11 display already set.");
1801 { 1805 {
1802 int proto_len, data_len; 1806 unsigned int proto_len, data_len;
1803 proto = packet_get_string(&proto_len); 1807 proto = packet_get_string(&proto_len);
1804 data = packet_get_string(&data_len); 1808 data = packet_get_string(&data_len);
1805 packet_integrity_check(plen, 4 + proto_len + 4 + data_len + 4, type); 1809 packet_integrity_check(plen, 4 + proto_len + 4 + data_len + 4, type);
@@ -1881,7 +1885,7 @@ do_authenticated(struct passwd * pw)
1881 goto do_forced_command; 1885 goto do_forced_command;
1882 /* Get command from the packet. */ 1886 /* Get command from the packet. */
1883 { 1887 {
1884 int dlen; 1888 unsigned int dlen;
1885 command = packet_get_string(&dlen); 1889 command = packet_get_string(&dlen);
1886 debug("Executing command '%.500s'", command); 1890 debug("Executing command '%.500s'", command);
1887 packet_integrity_check(plen, 4 + dlen, type); 1891 packet_integrity_check(plen, 4 + dlen, type);