- djm@cvs.openbsd.org 2005/07/16 01:35:24

[auth1.c channels.c cipher.c clientloop.c kex.c session.c ssh.c]
     [sshconnect.c]
     spacing
This commit is contained in:
Damien Miller 2005-07-17 17:02:09 +10:00
parent 4f1adad4f6
commit 46d38de48b
9 changed files with 32 additions and 25 deletions

View File

@ -1,3 +1,10 @@
20050717
- OpenBSD CVS Sync
- djm@cvs.openbsd.org 2005/07/16 01:35:24
[auth1.c channels.c cipher.c clientloop.c kex.c session.c ssh.c]
[sshconnect.c]
spacing
20050716 20050716
- (dtucker) [auth-pam.c] Ensure that only one side of the authentication - (dtucker) [auth-pam.c] Ensure that only one side of the authentication
socketpair stays open on in both the monitor and PAM process. Patch from socketpair stays open on in both the monitor and PAM process. Patch from
@ -2830,4 +2837,4 @@
- (djm) Trim deprecated options from INSTALL. Mention UsePAM - (djm) Trim deprecated options from INSTALL. Mention UsePAM
- (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu - (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu
$Id: ChangeLog,v 1.3846 2005/07/16 01:33:06 dtucker Exp $ $Id: ChangeLog,v 1.3847 2005/07/17 07:02:09 djm Exp $

View File

@ -10,7 +10,7 @@
*/ */
#include "includes.h" #include "includes.h"
RCSID("$OpenBSD: auth1.c,v 1.61 2005/06/17 02:44:32 djm Exp $"); RCSID("$OpenBSD: auth1.c,v 1.62 2005/07/16 01:35:24 djm Exp $");
#include "xmalloc.h" #include "xmalloc.h"
#include "rsa.h" #include "rsa.h"
@ -179,7 +179,7 @@ static int
auth1_process_tis_challenge(Authctxt *authctxt, char *info, size_t infolen) auth1_process_tis_challenge(Authctxt *authctxt, char *info, size_t infolen)
{ {
char *challenge; char *challenge;
if ((challenge = get_challenge(authctxt)) == NULL) if ((challenge = get_challenge(authctxt)) == NULL)
return (0); return (0);

View File

@ -39,7 +39,7 @@
*/ */
#include "includes.h" #include "includes.h"
RCSID("$OpenBSD: channels.c,v 1.220 2005/07/04 14:04:11 markus Exp $"); RCSID("$OpenBSD: channels.c,v 1.221 2005/07/16 01:35:24 djm Exp $");
#include "ssh.h" #include "ssh.h"
#include "ssh1.h" #include "ssh1.h"
@ -2986,7 +2986,7 @@ x11_request_forwarding_with_spoofing(int client_session_id, const char *disp,
/* Save protocol name. */ /* Save protocol name. */
x11_saved_proto = xstrdup(proto); x11_saved_proto = xstrdup(proto);
/* /*
* Extract real authentication data and generate fake data * Extract real authentication data and generate fake data
* of the same length. * of the same length.
*/ */
x11_saved_data = xmalloc(data_len); x11_saved_data = xmalloc(data_len);

View File

@ -35,7 +35,7 @@
*/ */
#include "includes.h" #include "includes.h"
RCSID("$OpenBSD: cipher.c,v 1.76 2005/06/17 02:44:32 djm Exp $"); RCSID("$OpenBSD: cipher.c,v 1.77 2005/07/16 01:35:24 djm Exp $");
#include "xmalloc.h" #include "xmalloc.h"
#include "log.h" #include "log.h"
@ -249,7 +249,7 @@ cipher_init(CipherContext *cc, Cipher *cipher,
cipher->name); cipher->name);
#endif #endif
if (cipher->discard_len > 0) { if (cipher->discard_len > 0) {
junk = xmalloc(cipher->discard_len); junk = xmalloc(cipher->discard_len);
discard = xmalloc(cipher->discard_len); discard = xmalloc(cipher->discard_len);
if (EVP_Cipher(&cc->evp, discard, junk, if (EVP_Cipher(&cc->evp, discard, junk,

View File

@ -59,7 +59,7 @@
*/ */
#include "includes.h" #include "includes.h"
RCSID("$OpenBSD: clientloop.c,v 1.140 2005/07/04 00:58:43 djm Exp $"); RCSID("$OpenBSD: clientloop.c,v 1.141 2005/07/16 01:35:24 djm Exp $");
#include "ssh.h" #include "ssh.h"
#include "ssh1.h" #include "ssh1.h"
@ -642,7 +642,7 @@ client_extra_session2_setup(int id, void *arg)
if ((c = channel_lookup(id)) == NULL) if ((c = channel_lookup(id)) == NULL)
fatal("%s: no channel for id %d", __func__, id); fatal("%s: no channel for id %d", __func__, id);
display = getenv("DISPLAY"); display = getenv("DISPLAY");
if (cctx->want_x_fwd && options.forward_x11 && display != NULL) { if (cctx->want_x_fwd && options.forward_x11 && display != NULL) {
char *proto, *data; char *proto, *data;
/* Get reasonable local authentication information. */ /* Get reasonable local authentication information. */

4
kex.c
View File

@ -23,7 +23,7 @@
*/ */
#include "includes.h" #include "includes.h"
RCSID("$OpenBSD: kex.c,v 1.61 2005/06/17 02:44:32 djm Exp $"); RCSID("$OpenBSD: kex.c,v 1.62 2005/07/16 01:35:24 djm Exp $");
#include <openssl/crypto.h> #include <openssl/crypto.h>
@ -411,7 +411,7 @@ derive_key(Kex *kex, int id, u_int need, u_char *hash, BIGNUM *shared_secret)
u_int have; u_int have;
int mdsz = EVP_MD_size(evp_md); int mdsz = EVP_MD_size(evp_md);
u_char *digest; u_char *digest;
if (mdsz < 0) if (mdsz < 0)
fatal("derive_key: mdsz < 0"); fatal("derive_key: mdsz < 0");
digest = xmalloc(roundup(need, mdsz)); digest = xmalloc(roundup(need, mdsz));

View File

@ -33,7 +33,7 @@
*/ */
#include "includes.h" #include "includes.h"
RCSID("$OpenBSD: session.c,v 1.182 2005/06/17 02:44:33 djm Exp $"); RCSID("$OpenBSD: session.c,v 1.183 2005/07/16 01:35:24 djm Exp $");
#include "ssh.h" #include "ssh.h"
#include "ssh1.h" #include "ssh1.h"
@ -196,11 +196,11 @@ auth_input_request_forwarding(struct passwd * pw)
static void static void
display_loginmsg(void) display_loginmsg(void)
{ {
if (buffer_len(&loginmsg) > 0) { if (buffer_len(&loginmsg) > 0) {
buffer_append(&loginmsg, "\0", 1); buffer_append(&loginmsg, "\0", 1);
printf("%s", (char *)buffer_ptr(&loginmsg)); printf("%s", (char *)buffer_ptr(&loginmsg));
buffer_clear(&loginmsg); buffer_clear(&loginmsg);
} }
} }
void void

12
ssh.c
View File

@ -40,7 +40,7 @@
*/ */
#include "includes.h" #include "includes.h"
RCSID("$OpenBSD: ssh.c,v 1.247 2005/07/04 00:58:43 djm Exp $"); RCSID("$OpenBSD: ssh.c,v 1.248 2005/07/16 01:35:24 djm Exp $");
#include <openssl/evp.h> #include <openssl/evp.h>
#include <openssl/err.h> #include <openssl/err.h>
@ -790,8 +790,8 @@ ssh_init_forwarding(void)
for (i = 0; i < options.num_remote_forwards; i++) { for (i = 0; i < options.num_remote_forwards; i++) {
debug("Remote connections from %.200s:%d forwarded to " debug("Remote connections from %.200s:%d forwarded to "
"local address %.200s:%d", "local address %.200s:%d",
(options.remote_forwards[i].listen_host == NULL) ? (options.remote_forwards[i].listen_host == NULL) ?
(options.gateway_ports ? "*" : "LOCALHOST") : (options.gateway_ports ? "*" : "LOCALHOST") :
options.remote_forwards[i].listen_host, options.remote_forwards[i].listen_host,
options.remote_forwards[i].listen_port, options.remote_forwards[i].listen_port,
options.remote_forwards[i].connect_host, options.remote_forwards[i].connect_host,
@ -1037,7 +1037,7 @@ ssh_session2_setup(int id, void *arg)
const char *display; const char *display;
int interactive = tty_flag; int interactive = tty_flag;
display = getenv("DISPLAY"); display = getenv("DISPLAY");
if (options.forward_x11 && display != NULL) { if (options.forward_x11 && display != NULL) {
char *proto, *data; char *proto, *data;
/* Get reasonable local authentication information. */ /* Get reasonable local authentication information. */
@ -1253,7 +1253,7 @@ control_client(const char *path)
close(sock); close(sock);
return; return;
} }
if (stdin_null_flag) { if (stdin_null_flag) {
if ((fd = open(_PATH_DEVNULL, O_RDONLY)) == -1) if ((fd = open(_PATH_DEVNULL, O_RDONLY)) == -1)
fatal("open(/dev/null): %s", strerror(errno)); fatal("open(/dev/null): %s", strerror(errno));
@ -1262,7 +1262,7 @@ control_client(const char *path)
if (fd > STDERR_FILENO) if (fd > STDERR_FILENO)
close(fd); close(fd);
} }
term = getenv("TERM"); term = getenv("TERM");
flags = 0; flags = 0;

View File

@ -13,7 +13,7 @@
*/ */
#include "includes.h" #include "includes.h"
RCSID("$OpenBSD: sshconnect.c,v 1.166 2005/06/17 22:53:47 djm Exp $"); RCSID("$OpenBSD: sshconnect.c,v 1.167 2005/07/16 01:35:24 djm Exp $");
#include <openssl/bn.h> #include <openssl/bn.h>
@ -404,7 +404,7 @@ ssh_exchange_identification(void)
for (i = 0; i < sizeof(buf) - 1; i++) { for (i = 0; i < sizeof(buf) - 1; i++) {
size_t len = atomicio(read, connection_in, &buf[i], 1); size_t len = atomicio(read, connection_in, &buf[i], 1);
if (len != 1 && errno == EPIPE) if (len != 1 && errno == EPIPE)
fatal("ssh_exchange_identification: Connection closed by remote host"); fatal("ssh_exchange_identification: Connection closed by remote host");
else if (len != 1) else if (len != 1)
fatal("ssh_exchange_identification: read: %.100s", strerror(errno)); fatal("ssh_exchange_identification: read: %.100s", strerror(errno));