- markus@cvs.openbsd.org 2001/04/15 08:43:47
[dh.c sftp-glob.c sftp-glob.h sftp-int.c sshconnect2.c sshd.c] some unused variable and typos; from tomh@po.crl.go.jp
This commit is contained in:
parent
ac2f003903
commit
206941fdd8
|
@ -3,6 +3,9 @@
|
||||||
- stevesk@cvs.openbsd.org 2001/04/15 01:35:22
|
- stevesk@cvs.openbsd.org 2001/04/15 01:35:22
|
||||||
[ttymodes.c]
|
[ttymodes.c]
|
||||||
fix comments
|
fix comments
|
||||||
|
- markus@cvs.openbsd.org 2001/04/15 08:43:47
|
||||||
|
[dh.c sftp-glob.c sftp-glob.h sftp-int.c sshconnect2.c sshd.c]
|
||||||
|
some unused variable and typos; from tomh@po.crl.go.jp
|
||||||
|
|
||||||
20010415
|
20010415
|
||||||
- OpenBSD CVS Sync
|
- OpenBSD CVS Sync
|
||||||
|
@ -5088,4 +5091,4 @@
|
||||||
- Wrote replacements for strlcpy and mkdtemp
|
- Wrote replacements for strlcpy and mkdtemp
|
||||||
- Released 1.0pre1
|
- Released 1.0pre1
|
||||||
|
|
||||||
$Id: ChangeLog,v 1.1117 2001/04/15 14:25:12 mouring Exp $
|
$Id: ChangeLog,v 1.1118 2001/04/15 14:27:16 mouring Exp $
|
||||||
|
|
11
dh.c
11
dh.c
|
@ -23,7 +23,7 @@
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#include "includes.h"
|
#include "includes.h"
|
||||||
RCSID("$OpenBSD: dh.c,v 1.13 2001/04/04 23:09:17 markus Exp $");
|
RCSID("$OpenBSD: dh.c,v 1.14 2001/04/15 08:43:45 markus Exp $");
|
||||||
|
|
||||||
#include "xmalloc.h"
|
#include "xmalloc.h"
|
||||||
|
|
||||||
|
@ -80,10 +80,10 @@ parse_prime(int linenum, char *line, struct dhgroup *dhg)
|
||||||
|
|
||||||
dhg->g = BN_new();
|
dhg->g = BN_new();
|
||||||
dhg->p = BN_new();
|
dhg->p = BN_new();
|
||||||
if (BN_hex2bn(&dhg->g, gen) < 0)
|
if (BN_hex2bn(&dhg->g, gen) == 0)
|
||||||
goto failclean;
|
goto failclean;
|
||||||
|
|
||||||
if (BN_hex2bn(&dhg->p, prime) < 0)
|
if (BN_hex2bn(&dhg->p, prime) == 0)
|
||||||
goto failclean;
|
goto failclean;
|
||||||
|
|
||||||
if (BN_num_bits(dhg->p) != dhg->size)
|
if (BN_num_bits(dhg->p) != dhg->size)
|
||||||
|
@ -228,15 +228,14 @@ DH *
|
||||||
dh_new_group_asc(const char *gen, const char *modulus)
|
dh_new_group_asc(const char *gen, const char *modulus)
|
||||||
{
|
{
|
||||||
DH *dh;
|
DH *dh;
|
||||||
int ret;
|
|
||||||
|
|
||||||
dh = DH_new();
|
dh = DH_new();
|
||||||
if (dh == NULL)
|
if (dh == NULL)
|
||||||
fatal("DH_new");
|
fatal("DH_new");
|
||||||
|
|
||||||
if ((ret = BN_hex2bn(&dh->p, modulus)) < 0)
|
if (BN_hex2bn(&dh->p, modulus) == 0)
|
||||||
fatal("BN_hex2bn p");
|
fatal("BN_hex2bn p");
|
||||||
if ((ret = BN_hex2bn(&dh->g, gen)) < 0)
|
if (BN_hex2bn(&dh->g, gen) == 0)
|
||||||
fatal("BN_hex2bn g");
|
fatal("BN_hex2bn g");
|
||||||
|
|
||||||
return (dh);
|
return (dh);
|
||||||
|
|
|
@ -23,7 +23,7 @@
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#include "includes.h"
|
#include "includes.h"
|
||||||
RCSID("$OpenBSD: sftp-glob.c,v 1.4 2001/04/05 10:42:53 markus Exp $");
|
RCSID("$OpenBSD: sftp-glob.c,v 1.5 2001/04/15 08:43:46 markus Exp $");
|
||||||
|
|
||||||
#include "ssh.h"
|
#include "ssh.h"
|
||||||
#include "buffer.h"
|
#include "buffer.h"
|
||||||
|
@ -151,7 +151,7 @@ int fudge_stat(const char *path, struct stat *st)
|
||||||
|
|
||||||
int
|
int
|
||||||
remote_glob(int fd_in, int fd_out, const char *pattern, int flags,
|
remote_glob(int fd_in, int fd_out, const char *pattern, int flags,
|
||||||
const int (*errfunc)(const char *, int), glob_t *pglob)
|
int (*errfunc)(const char *, int), glob_t *pglob)
|
||||||
{
|
{
|
||||||
pglob->gl_opendir = (void*)fudge_opendir;
|
pglob->gl_opendir = (void*)fudge_opendir;
|
||||||
pglob->gl_readdir = (void*)fudge_readdir;
|
pglob->gl_readdir = (void*)fudge_readdir;
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
/* $OpenBSD: sftp-glob.h,v 1.2 2001/04/05 10:42:53 markus Exp $ */
|
/* $OpenBSD: sftp-glob.h,v 1.3 2001/04/15 08:43:46 markus Exp $ */
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Copyright (c) 2001 Damien Miller. All rights reserved.
|
* Copyright (c) 2001 Damien Miller. All rights reserved.
|
||||||
|
@ -28,5 +28,5 @@
|
||||||
|
|
||||||
int
|
int
|
||||||
remote_glob(int fd_in, int fd_out, const char *pattern, int flags,
|
remote_glob(int fd_in, int fd_out, const char *pattern, int flags,
|
||||||
const int (*errfunc)(const char *, int), glob_t *pglob);
|
int (*errfunc)(const char *, int), glob_t *pglob);
|
||||||
|
|
||||||
|
|
|
@ -26,7 +26,7 @@
|
||||||
/* XXX: recursive operations */
|
/* XXX: recursive operations */
|
||||||
|
|
||||||
#include "includes.h"
|
#include "includes.h"
|
||||||
RCSID("$OpenBSD: sftp-int.c,v 1.35 2001/04/12 23:17:54 mouring Exp $");
|
RCSID("$OpenBSD: sftp-int.c,v 1.36 2001/04/15 08:43:46 markus Exp $");
|
||||||
|
|
||||||
#include "buffer.h"
|
#include "buffer.h"
|
||||||
#include "xmalloc.h"
|
#include "xmalloc.h"
|
||||||
|
@ -146,7 +146,7 @@ help(void)
|
||||||
void
|
void
|
||||||
local_do_shell(const char *args)
|
local_do_shell(const char *args)
|
||||||
{
|
{
|
||||||
int ret, status;
|
int status;
|
||||||
char *shell;
|
char *shell;
|
||||||
pid_t pid;
|
pid_t pid;
|
||||||
|
|
||||||
|
@ -163,10 +163,10 @@ local_do_shell(const char *args)
|
||||||
/* XXX: child has pipe fds to ssh subproc open - issue? */
|
/* XXX: child has pipe fds to ssh subproc open - issue? */
|
||||||
if (args) {
|
if (args) {
|
||||||
debug3("Executing %s -c \"%s\"", shell, args);
|
debug3("Executing %s -c \"%s\"", shell, args);
|
||||||
ret = execl(shell, shell, "-c", args, NULL);
|
execl(shell, shell, "-c", args, NULL);
|
||||||
} else {
|
} else {
|
||||||
debug3("Executing %s", shell);
|
debug3("Executing %s", shell);
|
||||||
ret = execl(shell, shell, NULL);
|
execl(shell, shell, NULL);
|
||||||
}
|
}
|
||||||
fprintf(stderr, "Couldn't execute \"%s\": %s\n", shell,
|
fprintf(stderr, "Couldn't execute \"%s\": %s\n", shell,
|
||||||
strerror(errno));
|
strerror(errno));
|
||||||
|
|
|
@ -23,7 +23,7 @@
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#include "includes.h"
|
#include "includes.h"
|
||||||
RCSID("$OpenBSD: sshconnect2.c,v 1.68 2001/04/12 19:15:25 markus Exp $");
|
RCSID("$OpenBSD: sshconnect2.c,v 1.69 2001/04/15 08:43:47 markus Exp $");
|
||||||
|
|
||||||
#include <openssl/bn.h>
|
#include <openssl/bn.h>
|
||||||
#include <openssl/md5.h>
|
#include <openssl/md5.h>
|
||||||
|
@ -358,7 +358,7 @@ input_userauth_pk_ok(int type, int plen, void *ctxt)
|
||||||
Authctxt *authctxt = ctxt;
|
Authctxt *authctxt = ctxt;
|
||||||
Key *key = NULL;
|
Key *key = NULL;
|
||||||
Buffer b;
|
Buffer b;
|
||||||
int alen, blen, pktype, sent = 0;
|
int alen, blen, sent = 0;
|
||||||
char *pkalg, *pkblob, *fp;
|
char *pkalg, *pkblob, *fp;
|
||||||
|
|
||||||
if (authctxt == NULL)
|
if (authctxt == NULL)
|
||||||
|
@ -386,7 +386,7 @@ input_userauth_pk_ok(int type, int plen, void *ctxt)
|
||||||
debug("no last key or no sign cb");
|
debug("no last key or no sign cb");
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
if ((pktype = key_type_from_name(pkalg)) == KEY_UNSPEC) {
|
if (key_type_from_name(pkalg) == KEY_UNSPEC) {
|
||||||
debug("unknown pkalg %s", pkalg);
|
debug("unknown pkalg %s", pkalg);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
|
6
sshd.c
6
sshd.c
|
@ -40,7 +40,7 @@
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#include "includes.h"
|
#include "includes.h"
|
||||||
RCSID("$OpenBSD: sshd.c,v 1.193 2001/04/12 20:09:38 stevesk Exp $");
|
RCSID("$OpenBSD: sshd.c,v 1.194 2001/04/15 08:43:47 markus Exp $");
|
||||||
|
|
||||||
#include <openssl/dh.h>
|
#include <openssl/dh.h>
|
||||||
#include <openssl/bn.h>
|
#include <openssl/bn.h>
|
||||||
|
@ -799,9 +799,9 @@ main(int ac, char **av)
|
||||||
|
|
||||||
/* Start listening for a socket, unless started from inetd. */
|
/* Start listening for a socket, unless started from inetd. */
|
||||||
if (inetd_flag) {
|
if (inetd_flag) {
|
||||||
int s1, s2;
|
int s1;
|
||||||
s1 = dup(0); /* Make sure descriptors 0, 1, and 2 are in use. */
|
s1 = dup(0); /* Make sure descriptors 0, 1, and 2 are in use. */
|
||||||
s2 = dup(s1);
|
dup(s1);
|
||||||
sock_in = dup(0);
|
sock_in = dup(0);
|
||||||
sock_out = dup(1);
|
sock_out = dup(1);
|
||||||
startup_pipe = -1;
|
startup_pipe = -1;
|
||||||
|
|
Loading…
Reference in New Issue