summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh
diff options
context:
space:
mode:
authormarkus <markus@openbsd.org>2002-09-09 14:54:14 +0000
committermarkus <markus@openbsd.org>2002-09-09 14:54:14 +0000
commita0952d72ab60de336ca69a175f29e1b9c9870d16 (patch)
tree367c667cce0f73c302bb88d2aef8de510302fe75 /usr.bin/ssh
parentmove OpenSSL include up (diff)
downloadwireguard-openbsd-a0952d72ab60de336ca69a175f29e1b9c9870d16.tar.xz
wireguard-openbsd-a0952d72ab60de336ca69a175f29e1b9c9870d16.zip
signed vs unsigned from -pedantic; ok henning@
Diffstat (limited to 'usr.bin/ssh')
-rw-r--r--usr.bin/ssh/channels.c4
-rw-r--r--usr.bin/ssh/kex.h4
-rw-r--r--usr.bin/ssh/key.c5
-rw-r--r--usr.bin/ssh/monitor.c17
-rw-r--r--usr.bin/ssh/monitor_wrap.c4
-rw-r--r--usr.bin/ssh/radix.c9
-rw-r--r--usr.bin/ssh/uuencode.c4
7 files changed, 25 insertions, 22 deletions
diff --git a/usr.bin/ssh/channels.c b/usr.bin/ssh/channels.c
index d1ed2da491b..b59a4632c19 100644
--- a/usr.bin/ssh/channels.c
+++ b/usr.bin/ssh/channels.c
@@ -39,7 +39,7 @@
*/
#include "includes.h"
-RCSID("$OpenBSD: channels.c,v 1.180 2002/07/04 08:12:15 deraadt Exp $");
+RCSID("$OpenBSD: channels.c,v 1.181 2002/09/09 14:54:14 markus Exp $");
#include "ssh.h"
#include "ssh1.h"
@@ -874,7 +874,7 @@ channel_pre_x11_open(Channel *c, fd_set * readset, fd_set * writeset)
static int
channel_decode_socks4(Channel *c, fd_set * readset, fd_set * writeset)
{
- u_char *p, *host;
+ char *p, *host;
int len, have, i, found;
char username[256];
struct {
diff --git a/usr.bin/ssh/kex.h b/usr.bin/ssh/kex.h
index 12edcdc63b3..93a529e125b 100644
--- a/usr.bin/ssh/kex.h
+++ b/usr.bin/ssh/kex.h
@@ -1,4 +1,4 @@
-/* $OpenBSD: kex.h,v 1.31 2002/05/16 22:02:50 markus Exp $ */
+/* $OpenBSD: kex.h,v 1.32 2002/09/09 14:54:14 markus Exp $ */
/*
* Copyright (c) 2000, 2001 Markus Friedl. All rights reserved.
@@ -96,7 +96,7 @@ struct Newkeys {
};
struct Kex {
u_char *session_id;
- int session_id_len;
+ u_int session_id_len;
Newkeys *newkeys[MODE_MAX];
int we_need;
int server;
diff --git a/usr.bin/ssh/key.c b/usr.bin/ssh/key.c
index 0b03e991454..9806a729a8a 100644
--- a/usr.bin/ssh/key.c
+++ b/usr.bin/ssh/key.c
@@ -32,7 +32,7 @@
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include "includes.h"
-RCSID("$OpenBSD: key.c,v 1.48 2002/07/04 10:41:47 markus Exp $");
+RCSID("$OpenBSD: key.c,v 1.49 2002/09/09 14:54:14 markus Exp $");
#include <openssl/evp.h>
@@ -494,7 +494,8 @@ key_write(Key *key, FILE *f)
{
int n, success = 0;
u_int len, bits = 0;
- u_char *blob, *uu;
+ u_char *blob;
+ char *uu;
if (key->type == KEY_RSA1 && key->rsa != NULL) {
/* size of modulus 'n' */
diff --git a/usr.bin/ssh/monitor.c b/usr.bin/ssh/monitor.c
index eadd691f646..0f541163fe9 100644
--- a/usr.bin/ssh/monitor.c
+++ b/usr.bin/ssh/monitor.c
@@ -25,7 +25,7 @@
*/
#include "includes.h"
-RCSID("$OpenBSD: monitor.c,v 1.25 2002/09/09 06:48:06 itojun Exp $");
+RCSID("$OpenBSD: monitor.c,v 1.26 2002/09/09 14:54:15 markus Exp $");
#include <openssl/dh.h>
@@ -127,8 +127,8 @@ static BIGNUM *ssh1_challenge = NULL; /* used for ssh1 rsa auth */
static u_char *key_blob = NULL;
static u_int key_bloblen = 0;
static int key_blobtype = MM_NOKEY;
-static u_char *hostbased_cuser = NULL;
-static u_char *hostbased_chost = NULL;
+static char *hostbased_cuser = NULL;
+static char *hostbased_chost = NULL;
static char *auth_method = "unknown";
static int session_id2_len = 0;
static u_char *session_id2 = NULL;
@@ -723,7 +723,8 @@ int
mm_answer_keyallowed(int socket, Buffer *m)
{
Key *key;
- u_char *cuser, *chost, *blob;
+ char *cuser, *chost;
+ u_char *blob;
u_int bloblen;
enum mm_keytype type = 0;
int allowed = 0;
@@ -799,7 +800,7 @@ static int
monitor_valid_userblob(u_char *data, u_int datalen)
{
Buffer b;
- u_char *p;
+ char *p;
u_int len;
int fail = 0;
@@ -852,11 +853,11 @@ monitor_valid_userblob(u_char *data, u_int datalen)
}
static int
-monitor_valid_hostbasedblob(u_char *data, u_int datalen, u_char *cuser,
- u_char *chost)
+monitor_valid_hostbasedblob(u_char *data, u_int datalen, char *cuser,
+ char *chost)
{
Buffer b;
- u_char *p;
+ char *p;
u_int len;
int fail = 0;
diff --git a/usr.bin/ssh/monitor_wrap.c b/usr.bin/ssh/monitor_wrap.c
index 202374e9cc9..9ee1ee4e541 100644
--- a/usr.bin/ssh/monitor_wrap.c
+++ b/usr.bin/ssh/monitor_wrap.c
@@ -25,7 +25,7 @@
*/
#include "includes.h"
-RCSID("$OpenBSD: monitor_wrap.c,v 1.17 2002/09/09 06:48:06 itojun Exp $");
+RCSID("$OpenBSD: monitor_wrap.c,v 1.18 2002/09/09 14:54:15 markus Exp $");
#include <openssl/bn.h>
#include <openssl/dh.h>
@@ -597,7 +597,7 @@ int
mm_pty_allocate(int *ptyfd, int *ttyfd, char *namebuf, int namebuflen)
{
Buffer m;
- u_char *p;
+ char *p;
int success = 0;
buffer_init(&m);
diff --git a/usr.bin/ssh/radix.c b/usr.bin/ssh/radix.c
index 580e7e07fa6..c680d6bf3f6 100644
--- a/usr.bin/ssh/radix.c
+++ b/usr.bin/ssh/radix.c
@@ -26,7 +26,7 @@
#include "includes.h"
#include "uuencode.h"
-RCSID("$OpenBSD: radix.c,v 1.21 2002/06/19 00:27:55 deraadt Exp $");
+RCSID("$OpenBSD: radix.c,v 1.22 2002/09/09 14:54:15 markus Exp $");
#ifdef AFS
#include <krb.h>
@@ -93,9 +93,10 @@ int
radix_to_creds(const char *buf, CREDENTIALS *creds)
{
Buffer b;
- char c, version, *space, *p;
- u_int endTime;
- int len, blen, ret;
+ u_char *space;
+ char c, version, *p;
+ u_int endTime, len;
+ int blen, ret;
ret = 0;
blen = strlen(buf);
diff --git a/usr.bin/ssh/uuencode.c b/usr.bin/ssh/uuencode.c
index 0074cd89070..60904c20bda 100644
--- a/usr.bin/ssh/uuencode.c
+++ b/usr.bin/ssh/uuencode.c
@@ -23,7 +23,7 @@
*/
#include "includes.h"
-RCSID("$OpenBSD: uuencode.c,v 1.15 2002/03/04 17:27:39 stevesk Exp $");
+RCSID("$OpenBSD: uuencode.c,v 1.16 2002/09/09 14:54:15 markus Exp $");
#include "xmalloc.h"
#include "uuencode.h"
@@ -60,7 +60,7 @@ uudecode(const char *src, u_char *target, size_t targsize)
void
dump_base64(FILE *fp, u_char *data, u_int len)
{
- u_char *buf = xmalloc(2*len);
+ char *buf = xmalloc(2*len);
int i, n;
n = uuencode(data, len, buf, 2*len);