mirror of
git://anongit.mindrot.org/openssh.git
synced 2025-02-17 06:16:55 +00:00
- stevesk@cvs.openbsd.org 2001/11/17 19:14:34
[auth2.c auth.c readconf.c servconf.c ssh-agent.c ssh-keygen.c] enum/int type cleanup where it made sense to do so; ok markus@
This commit is contained in:
parent
eaffb9d6b6
commit
65366a8c76
@ -6,6 +6,9 @@
|
|||||||
- markus@cvs.openbsd.org 2001/11/16 12:46:13
|
- markus@cvs.openbsd.org 2001/11/16 12:46:13
|
||||||
[ssh-keyscan.c]
|
[ssh-keyscan.c]
|
||||||
handle empty lines instead of dumping core; report from sha@sha-1.net
|
handle empty lines instead of dumping core; report from sha@sha-1.net
|
||||||
|
- stevesk@cvs.openbsd.org 2001/11/17 19:14:34
|
||||||
|
[auth2.c auth.c readconf.c servconf.c ssh-agent.c ssh-keygen.c]
|
||||||
|
enum/int type cleanup where it made sense to do so; ok markus@
|
||||||
|
|
||||||
20011126
|
20011126
|
||||||
- (tim) [contrib/cygwin/README, openbsd-compat/bsd-cygwin_util.c,
|
- (tim) [contrib/cygwin/README, openbsd-compat/bsd-cygwin_util.c,
|
||||||
@ -6928,4 +6931,4 @@
|
|||||||
- Wrote replacements for strlcpy and mkdtemp
|
- Wrote replacements for strlcpy and mkdtemp
|
||||||
- Released 1.0pre1
|
- Released 1.0pre1
|
||||||
|
|
||||||
$Id: ChangeLog,v 1.1668 2001/12/06 16:28:19 mouring Exp $
|
$Id: ChangeLog,v 1.1669 2001/12/06 16:32:47 mouring Exp $
|
||||||
|
4
auth.c
4
auth.c
@ -23,7 +23,7 @@
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
#include "includes.h"
|
#include "includes.h"
|
||||||
RCSID("$OpenBSD: auth.c,v 1.29 2001/11/08 20:02:24 markus Exp $");
|
RCSID("$OpenBSD: auth.c,v 1.30 2001/11/17 19:14:34 stevesk Exp $");
|
||||||
|
|
||||||
#ifdef HAVE_LOGIN_H
|
#ifdef HAVE_LOGIN_H
|
||||||
#include <login.h>
|
#include <login.h>
|
||||||
@ -315,7 +315,7 @@ check_key_in_hostfiles(struct passwd *pw, Key *key, const char *host,
|
|||||||
Key *found;
|
Key *found;
|
||||||
char *user_hostfile;
|
char *user_hostfile;
|
||||||
struct stat st;
|
struct stat st;
|
||||||
int host_status;
|
HostStatus host_status;
|
||||||
|
|
||||||
/* Check if we know the host and its host key. */
|
/* Check if we know the host and its host key. */
|
||||||
found = key_new(key->type);
|
found = key_new(key->type);
|
||||||
|
5
auth2.c
5
auth2.c
@ -23,7 +23,7 @@
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
#include "includes.h"
|
#include "includes.h"
|
||||||
RCSID("$OpenBSD: auth2.c,v 1.72 2001/11/07 22:41:51 markus Exp $");
|
RCSID("$OpenBSD: auth2.c,v 1.73 2001/11/17 19:14:34 stevesk Exp $");
|
||||||
|
|
||||||
#include <openssl/evp.h>
|
#include <openssl/evp.h>
|
||||||
|
|
||||||
@ -761,7 +761,8 @@ hostbased_key_allowed(struct passwd *pw, const char *cuser, char *chost,
|
|||||||
Key *key)
|
Key *key)
|
||||||
{
|
{
|
||||||
const char *resolvedname, *ipaddr, *lookup;
|
const char *resolvedname, *ipaddr, *lookup;
|
||||||
int host_status, len;
|
HostStatus host_status;
|
||||||
|
int len;
|
||||||
|
|
||||||
resolvedname = get_canonical_hostname(options.reverse_mapping_check);
|
resolvedname = get_canonical_hostname(options.reverse_mapping_check);
|
||||||
ipaddr = get_remote_ipaddr();
|
ipaddr = get_remote_ipaddr();
|
||||||
|
@ -12,7 +12,7 @@
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
#include "includes.h"
|
#include "includes.h"
|
||||||
RCSID("$OpenBSD: readconf.c,v 1.91 2001/10/01 21:51:16 markus Exp $");
|
RCSID("$OpenBSD: readconf.c,v 1.92 2001/11/17 19:14:34 stevesk Exp $");
|
||||||
|
|
||||||
#include "ssh.h"
|
#include "ssh.h"
|
||||||
#include "xmalloc.h"
|
#include "xmalloc.h"
|
||||||
@ -187,7 +187,7 @@ static struct {
|
|||||||
{ "smartcarddevice", oSmartcardDevice },
|
{ "smartcarddevice", oSmartcardDevice },
|
||||||
{ "clearallforwardings", oClearAllForwardings },
|
{ "clearallforwardings", oClearAllForwardings },
|
||||||
{ "nohostauthenticationforlocalhost", oNoHostAuthenticationForLocalhost },
|
{ "nohostauthenticationforlocalhost", oNoHostAuthenticationForLocalhost },
|
||||||
{ NULL, 0 }
|
{ NULL, oBadOption }
|
||||||
};
|
};
|
||||||
|
|
||||||
/*
|
/*
|
||||||
|
@ -10,7 +10,7 @@
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
#include "includes.h"
|
#include "includes.h"
|
||||||
RCSID("$OpenBSD: servconf.c,v 1.91 2001/11/12 18:17:07 markus Exp $");
|
RCSID("$OpenBSD: servconf.c,v 1.92 2001/11/17 19:14:34 stevesk Exp $");
|
||||||
|
|
||||||
#if defined(KRB4) || defined(KRB5)
|
#if defined(KRB4) || defined(KRB5)
|
||||||
#include <krb.h>
|
#include <krb.h>
|
||||||
@ -334,7 +334,7 @@ static struct {
|
|||||||
{ "clientalivecountmax", sClientAliveCountMax },
|
{ "clientalivecountmax", sClientAliveCountMax },
|
||||||
{ "authorizedkeysfile", sAuthorizedKeysFile },
|
{ "authorizedkeysfile", sAuthorizedKeysFile },
|
||||||
{ "authorizedkeysfile2", sAuthorizedKeysFile2 },
|
{ "authorizedkeysfile2", sAuthorizedKeysFile2 },
|
||||||
{ NULL, 0 }
|
{ NULL, sBadOption }
|
||||||
};
|
};
|
||||||
|
|
||||||
/*
|
/*
|
||||||
|
16
ssh-agent.c
16
ssh-agent.c
@ -1,4 +1,4 @@
|
|||||||
/* $OpenBSD: ssh-agent.c,v 1.72 2001/08/03 10:31:30 jakob Exp $ */
|
/* $OpenBSD: ssh-agent.c,v 1.73 2001/11/17 19:14:34 stevesk Exp $ */
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Author: Tatu Ylonen <ylo@cs.hut.fi>
|
* Author: Tatu Ylonen <ylo@cs.hut.fi>
|
||||||
@ -36,7 +36,7 @@
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
#include "includes.h"
|
#include "includes.h"
|
||||||
RCSID("$OpenBSD: ssh-agent.c,v 1.72 2001/08/03 10:31:30 jakob Exp $");
|
RCSID("$OpenBSD: ssh-agent.c,v 1.73 2001/11/17 19:14:34 stevesk Exp $");
|
||||||
|
|
||||||
#include <openssl/evp.h>
|
#include <openssl/evp.h>
|
||||||
#include <openssl/md5.h>
|
#include <openssl/md5.h>
|
||||||
@ -61,11 +61,15 @@ RCSID("$OpenBSD: ssh-agent.c,v 1.72 2001/08/03 10:31:30 jakob Exp $");
|
|||||||
#include "scard.h"
|
#include "scard.h"
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
typedef enum {
|
||||||
|
AUTH_UNUSED,
|
||||||
|
AUTH_SOCKET,
|
||||||
|
AUTH_CONNECTION
|
||||||
|
} sock_type;
|
||||||
|
|
||||||
typedef struct {
|
typedef struct {
|
||||||
int fd;
|
int fd;
|
||||||
enum {
|
sock_type type;
|
||||||
AUTH_UNUSED, AUTH_SOCKET, AUTH_CONNECTION
|
|
||||||
} type;
|
|
||||||
Buffer input;
|
Buffer input;
|
||||||
Buffer output;
|
Buffer output;
|
||||||
} SocketEntry;
|
} SocketEntry;
|
||||||
@ -627,7 +631,7 @@ process_message(SocketEntry *e)
|
|||||||
}
|
}
|
||||||
|
|
||||||
static void
|
static void
|
||||||
new_socket(int type, int fd)
|
new_socket(sock_type type, int fd)
|
||||||
{
|
{
|
||||||
u_int i, old_alloc;
|
u_int i, old_alloc;
|
||||||
if (fcntl(fd, F_SETFL, O_NONBLOCK) < 0)
|
if (fcntl(fd, F_SETFL, O_NONBLOCK) < 0)
|
||||||
|
@ -12,7 +12,7 @@
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
#include "includes.h"
|
#include "includes.h"
|
||||||
RCSID("$OpenBSD: ssh-keygen.c,v 1.83 2001/10/25 21:14:32 markus Exp $");
|
RCSID("$OpenBSD: ssh-keygen.c,v 1.84 2001/11/17 19:14:34 stevesk Exp $");
|
||||||
|
|
||||||
#include <openssl/evp.h>
|
#include <openssl/evp.h>
|
||||||
#include <openssl/pem.h>
|
#include <openssl/pem.h>
|
||||||
@ -534,7 +534,9 @@ do_fingerprint(struct passwd *pw)
|
|||||||
FILE *f;
|
FILE *f;
|
||||||
Key *public;
|
Key *public;
|
||||||
char *comment = NULL, *cp, *ep, line[16*1024], *fp;
|
char *comment = NULL, *cp, *ep, line[16*1024], *fp;
|
||||||
int i, skip = 0, num = 1, invalid = 1, rep, fptype;
|
int i, skip = 0, num = 1, invalid = 1;
|
||||||
|
enum fp_rep rep;
|
||||||
|
enum fp_type fptype;
|
||||||
struct stat st;
|
struct stat st;
|
||||||
|
|
||||||
fptype = print_bubblebabble ? SSH_FP_SHA1 : SSH_FP_MD5;
|
fptype = print_bubblebabble ? SSH_FP_SHA1 : SSH_FP_MD5;
|
||||||
|
Loading…
Reference in New Issue
Block a user