diff options
author | 2002-09-09 14:54:14 +0000 | |
---|---|---|
committer | 2002-09-09 14:54:14 +0000 | |
commit | a0952d72ab60de336ca69a175f29e1b9c9870d16 (patch) | |
tree | 367c667cce0f73c302bb88d2aef8de510302fe75 /usr.bin/ssh | |
parent | move OpenSSL include up (diff) | |
download | wireguard-openbsd-a0952d72ab60de336ca69a175f29e1b9c9870d16.tar.xz wireguard-openbsd-a0952d72ab60de336ca69a175f29e1b9c9870d16.zip |
signed vs unsigned from -pedantic; ok henning@
Diffstat (limited to 'usr.bin/ssh')
-rw-r--r-- | usr.bin/ssh/channels.c | 4 | ||||
-rw-r--r-- | usr.bin/ssh/kex.h | 4 | ||||
-rw-r--r-- | usr.bin/ssh/key.c | 5 | ||||
-rw-r--r-- | usr.bin/ssh/monitor.c | 17 | ||||
-rw-r--r-- | usr.bin/ssh/monitor_wrap.c | 4 | ||||
-rw-r--r-- | usr.bin/ssh/radix.c | 9 | ||||
-rw-r--r-- | usr.bin/ssh/uuencode.c | 4 |
7 files changed, 25 insertions, 22 deletions
diff --git a/usr.bin/ssh/channels.c b/usr.bin/ssh/channels.c index d1ed2da491b..b59a4632c19 100644 --- a/usr.bin/ssh/channels.c +++ b/usr.bin/ssh/channels.c @@ -39,7 +39,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: channels.c,v 1.180 2002/07/04 08:12:15 deraadt Exp $"); +RCSID("$OpenBSD: channels.c,v 1.181 2002/09/09 14:54:14 markus Exp $"); #include "ssh.h" #include "ssh1.h" @@ -874,7 +874,7 @@ channel_pre_x11_open(Channel *c, fd_set * readset, fd_set * writeset) static int channel_decode_socks4(Channel *c, fd_set * readset, fd_set * writeset) { - u_char *p, *host; + char *p, *host; int len, have, i, found; char username[256]; struct { diff --git a/usr.bin/ssh/kex.h b/usr.bin/ssh/kex.h index 12edcdc63b3..93a529e125b 100644 --- a/usr.bin/ssh/kex.h +++ b/usr.bin/ssh/kex.h @@ -1,4 +1,4 @@ -/* $OpenBSD: kex.h,v 1.31 2002/05/16 22:02:50 markus Exp $ */ +/* $OpenBSD: kex.h,v 1.32 2002/09/09 14:54:14 markus Exp $ */ /* * Copyright (c) 2000, 2001 Markus Friedl. All rights reserved. @@ -96,7 +96,7 @@ struct Newkeys { }; struct Kex { u_char *session_id; - int session_id_len; + u_int session_id_len; Newkeys *newkeys[MODE_MAX]; int we_need; int server; diff --git a/usr.bin/ssh/key.c b/usr.bin/ssh/key.c index 0b03e991454..9806a729a8a 100644 --- a/usr.bin/ssh/key.c +++ b/usr.bin/ssh/key.c @@ -32,7 +32,7 @@ * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #include "includes.h" -RCSID("$OpenBSD: key.c,v 1.48 2002/07/04 10:41:47 markus Exp $"); +RCSID("$OpenBSD: key.c,v 1.49 2002/09/09 14:54:14 markus Exp $"); #include <openssl/evp.h> @@ -494,7 +494,8 @@ key_write(Key *key, FILE *f) { int n, success = 0; u_int len, bits = 0; - u_char *blob, *uu; + u_char *blob; + char *uu; if (key->type == KEY_RSA1 && key->rsa != NULL) { /* size of modulus 'n' */ diff --git a/usr.bin/ssh/monitor.c b/usr.bin/ssh/monitor.c index eadd691f646..0f541163fe9 100644 --- a/usr.bin/ssh/monitor.c +++ b/usr.bin/ssh/monitor.c @@ -25,7 +25,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: monitor.c,v 1.25 2002/09/09 06:48:06 itojun Exp $"); +RCSID("$OpenBSD: monitor.c,v 1.26 2002/09/09 14:54:15 markus Exp $"); #include <openssl/dh.h> @@ -127,8 +127,8 @@ static BIGNUM *ssh1_challenge = NULL; /* used for ssh1 rsa auth */ static u_char *key_blob = NULL; static u_int key_bloblen = 0; static int key_blobtype = MM_NOKEY; -static u_char *hostbased_cuser = NULL; -static u_char *hostbased_chost = NULL; +static char *hostbased_cuser = NULL; +static char *hostbased_chost = NULL; static char *auth_method = "unknown"; static int session_id2_len = 0; static u_char *session_id2 = NULL; @@ -723,7 +723,8 @@ int mm_answer_keyallowed(int socket, Buffer *m) { Key *key; - u_char *cuser, *chost, *blob; + char *cuser, *chost; + u_char *blob; u_int bloblen; enum mm_keytype type = 0; int allowed = 0; @@ -799,7 +800,7 @@ static int monitor_valid_userblob(u_char *data, u_int datalen) { Buffer b; - u_char *p; + char *p; u_int len; int fail = 0; @@ -852,11 +853,11 @@ monitor_valid_userblob(u_char *data, u_int datalen) } static int -monitor_valid_hostbasedblob(u_char *data, u_int datalen, u_char *cuser, - u_char *chost) +monitor_valid_hostbasedblob(u_char *data, u_int datalen, char *cuser, + char *chost) { Buffer b; - u_char *p; + char *p; u_int len; int fail = 0; diff --git a/usr.bin/ssh/monitor_wrap.c b/usr.bin/ssh/monitor_wrap.c index 202374e9cc9..9ee1ee4e541 100644 --- a/usr.bin/ssh/monitor_wrap.c +++ b/usr.bin/ssh/monitor_wrap.c @@ -25,7 +25,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: monitor_wrap.c,v 1.17 2002/09/09 06:48:06 itojun Exp $"); +RCSID("$OpenBSD: monitor_wrap.c,v 1.18 2002/09/09 14:54:15 markus Exp $"); #include <openssl/bn.h> #include <openssl/dh.h> @@ -597,7 +597,7 @@ int mm_pty_allocate(int *ptyfd, int *ttyfd, char *namebuf, int namebuflen) { Buffer m; - u_char *p; + char *p; int success = 0; buffer_init(&m); diff --git a/usr.bin/ssh/radix.c b/usr.bin/ssh/radix.c index 580e7e07fa6..c680d6bf3f6 100644 --- a/usr.bin/ssh/radix.c +++ b/usr.bin/ssh/radix.c @@ -26,7 +26,7 @@ #include "includes.h" #include "uuencode.h" -RCSID("$OpenBSD: radix.c,v 1.21 2002/06/19 00:27:55 deraadt Exp $"); +RCSID("$OpenBSD: radix.c,v 1.22 2002/09/09 14:54:15 markus Exp $"); #ifdef AFS #include <krb.h> @@ -93,9 +93,10 @@ int radix_to_creds(const char *buf, CREDENTIALS *creds) { Buffer b; - char c, version, *space, *p; - u_int endTime; - int len, blen, ret; + u_char *space; + char c, version, *p; + u_int endTime, len; + int blen, ret; ret = 0; blen = strlen(buf); diff --git a/usr.bin/ssh/uuencode.c b/usr.bin/ssh/uuencode.c index 0074cd89070..60904c20bda 100644 --- a/usr.bin/ssh/uuencode.c +++ b/usr.bin/ssh/uuencode.c @@ -23,7 +23,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: uuencode.c,v 1.15 2002/03/04 17:27:39 stevesk Exp $"); +RCSID("$OpenBSD: uuencode.c,v 1.16 2002/09/09 14:54:15 markus Exp $"); #include "xmalloc.h" #include "uuencode.h" @@ -60,7 +60,7 @@ uudecode(const char *src, u_char *target, size_t targsize) void dump_base64(FILE *fp, u_char *data, u_int len) { - u_char *buf = xmalloc(2*len); + char *buf = xmalloc(2*len); int i, n; n = uuencode(data, len, buf, 2*len); |