From 722a5a05381086e4e3432c0a87be4e2017d9a746 Mon Sep 17 00:00:00 2001 From: markus Date: Fri, 14 Apr 2000 10:30:29 +0000 Subject: [PATCH] whitespace cleanup --- usr.bin/ssh/auth-krb4.c | 10 ++--- usr.bin/ssh/auth-passwd.c | 4 +- usr.bin/ssh/auth-rh-rsa.c | 14 +++---- usr.bin/ssh/auth-rhosts.c | 18 ++++----- usr.bin/ssh/auth-rsa.c | 16 ++++---- usr.bin/ssh/auth-skey.c | 18 ++++----- usr.bin/ssh/auth.c | 46 ++++++++++----------- usr.bin/ssh/authfd.c | 24 +++++------ usr.bin/ssh/authfd.h | 22 +++++----- usr.bin/ssh/authfile.c | 14 +++---- usr.bin/ssh/bufaux.c | 24 +++++------ usr.bin/ssh/bufaux.h | 12 +++--- usr.bin/ssh/buffer.c | 34 ++++++++-------- usr.bin/ssh/buffer.h | 14 +++---- usr.bin/ssh/canohost.c | 20 +++++----- usr.bin/ssh/channels.c | 84 +++++++++++++++++++-------------------- usr.bin/ssh/channels.h | 6 +-- usr.bin/ssh/cipher.c | 34 ++++++++-------- usr.bin/ssh/cipher.h | 24 +++++------ usr.bin/ssh/clientloop.c | 58 +++++++++++++-------------- usr.bin/ssh/compat.c | 6 +-- usr.bin/ssh/compress.c | 22 +++++----- usr.bin/ssh/compress.h | 14 +++---- usr.bin/ssh/crc32.h | 14 +++---- usr.bin/ssh/dispatch.c | 4 +- usr.bin/ssh/dsa.c | 10 ++--- usr.bin/ssh/getput.h | 16 ++++---- usr.bin/ssh/hostfile.c | 14 +++---- usr.bin/ssh/hostfile.h | 2 +- usr.bin/ssh/includes.h | 12 +++--- usr.bin/ssh/kex.c | 12 +++--- usr.bin/ssh/log-client.c | 14 +++---- usr.bin/ssh/log-server.c | 16 ++++---- usr.bin/ssh/login.c | 20 +++++----- usr.bin/ssh/match.c | 16 ++++---- usr.bin/ssh/mpaux.c | 14 +++---- usr.bin/ssh/mpaux.h | 14 +++---- usr.bin/ssh/nchan.c | 6 +-- usr.bin/ssh/packet.c | 26 ++++++------ usr.bin/ssh/packet.h | 16 ++++---- usr.bin/ssh/pty.c | 22 +++++----- usr.bin/ssh/pty.h | 14 +++---- usr.bin/ssh/radix.c | 12 +++--- usr.bin/ssh/readconf.c | 26 ++++++------ usr.bin/ssh/readconf.h | 22 +++++----- usr.bin/ssh/readpass.c | 4 +- usr.bin/ssh/rsa.c | 30 +++++++------- usr.bin/ssh/rsa.h | 14 +++---- usr.bin/ssh/scp.c | 20 +++++----- usr.bin/ssh/servconf.c | 24 +++++------ usr.bin/ssh/servconf.h | 14 +++---- usr.bin/ssh/serverloop.c | 32 +++++++-------- usr.bin/ssh/session.c | 16 ++++---- usr.bin/ssh/ssh-agent.c | 10 ++--- usr.bin/ssh/ssh-keygen.c | 4 +- usr.bin/ssh/ssh.c | 39 ++++-------------- usr.bin/ssh/ssh.h | 30 +++++++------- usr.bin/ssh/ssh2.h | 20 +++++----- usr.bin/ssh/sshconnect.c | 38 +++++++++--------- usr.bin/ssh/sshd.c | 54 ++++++++++++------------- usr.bin/ssh/ttymodes.c | 10 ++--- usr.bin/ssh/ttymodes.h | 12 +++--- usr.bin/ssh/uidswap.c | 8 ++-- usr.bin/ssh/uidswap.h | 10 ++--- usr.bin/ssh/xmalloc.c | 4 +- usr.bin/ssh/xmalloc.h | 14 +++---- 66 files changed, 622 insertions(+), 645 deletions(-) diff --git a/usr.bin/ssh/auth-krb4.c b/usr.bin/ssh/auth-krb4.c index 7e30646f88d..a26842713aa 100644 --- a/usr.bin/ssh/auth-krb4.c +++ b/usr.bin/ssh/auth-krb4.c @@ -19,7 +19,7 @@ extern ServerOptions options; * return 1 on success, 0 on failure, -1 if krb4 is not available */ -int +int auth_krb4_password(struct passwd * pw, const char *password) { AUTH_DAT adata; @@ -135,7 +135,7 @@ krb4_cleanup_proc(void *ignore) } } -int +int krb4_init(uid_t uid) { static int cleanup_registered = 0; @@ -179,7 +179,7 @@ krb4_init(uid_t uid) return 0; } -int +int auth_krb4(const char *server_user, KTEXT auth, char **client) { AUTH_DAT adat = {0}; @@ -252,7 +252,7 @@ auth_krb4(const char *server_user, KTEXT auth, char **client) #endif /* KRB4 */ #ifdef AFS -int +int auth_kerberos_tgt(struct passwd *pw, const char *string) { CREDENTIALS creds; @@ -307,7 +307,7 @@ auth_kerberos_tgt_failure: return 0; } -int +int auth_afs_token(struct passwd *pw, const char *token_string) { CREDENTIALS creds; diff --git a/usr.bin/ssh/auth-passwd.c b/usr.bin/ssh/auth-passwd.c index de0f6402d7e..fea75d925bd 100644 --- a/usr.bin/ssh/auth-passwd.c +++ b/usr.bin/ssh/auth-passwd.c @@ -8,7 +8,7 @@ */ #include "includes.h" -RCSID("$Id: auth-passwd.c,v 1.14 1999/12/29 12:47:46 markus Exp $"); +RCSID("$Id: auth-passwd.c,v 1.15 2000/04/14 10:30:29 markus Exp $"); #include "packet.h" #include "ssh.h" @@ -19,7 +19,7 @@ RCSID("$Id: auth-passwd.c,v 1.14 1999/12/29 12:47:46 markus Exp $"); * Tries to authenticate the user using password. Returns true if * authentication succeeds. */ -int +int auth_password(struct passwd * pw, const char *password) { extern ServerOptions options; diff --git a/usr.bin/ssh/auth-rh-rsa.c b/usr.bin/ssh/auth-rh-rsa.c index 4f46e3b32d9..f251fb9cc3e 100644 --- a/usr.bin/ssh/auth-rh-rsa.c +++ b/usr.bin/ssh/auth-rh-rsa.c @@ -1,21 +1,21 @@ /* - * + * * auth-rh-rsa.c - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Sun May 7 03:08:06 1995 ylo - * + * * Rhosts or /etc/hosts.equiv authentication combined with RSA host * authentication. * */ #include "includes.h" -RCSID("$Id: auth-rh-rsa.c,v 1.12 2000/04/12 09:39:09 markus Exp $"); +RCSID("$Id: auth-rh-rsa.c,v 1.13 2000/04/14 10:30:29 markus Exp $"); #include "packet.h" #include "ssh.h" @@ -33,7 +33,7 @@ RCSID("$Id: auth-rh-rsa.c,v 1.12 2000/04/12 09:39:09 markus Exp $"); * its host key. Returns true if authentication succeeds. */ -int +int auth_rhosts_rsa(struct passwd *pw, const char *client_user, RSA *client_host_key) { extern ServerOptions options; diff --git a/usr.bin/ssh/auth-rhosts.c b/usr.bin/ssh/auth-rhosts.c index 843242875ae..3393b86661d 100644 --- a/usr.bin/ssh/auth-rhosts.c +++ b/usr.bin/ssh/auth-rhosts.c @@ -1,22 +1,22 @@ /* - * + * * auth-rhosts.c - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Fri Mar 17 05:12:18 1995 ylo - * + * * Rhosts authentication. This file contains code to check whether to admit * the login based on rhosts authentication. This file also processes * /etc/hosts.equiv. - * + * */ #include "includes.h" -RCSID("$Id: auth-rhosts.c,v 1.12 1999/12/27 10:46:11 markus Exp $"); +RCSID("$Id: auth-rhosts.c,v 1.13 2000/04/14 10:30:29 markus Exp $"); #include "packet.h" #include "ssh.h" @@ -30,7 +30,7 @@ RCSID("$Id: auth-rhosts.c,v 1.12 1999/12/27 10:46:11 markus Exp $"); * based on the file, and returns zero otherwise. */ -int +int check_rhosts_file(const char *filename, const char *hostname, const char *ipaddr, const char *client_user, const char *server_user) @@ -146,7 +146,7 @@ check_rhosts_file(const char *filename, const char *hostname, * /etc/hosts.equiv will be considered (.rhosts and .shosts are ignored). */ -int +int auth_rhosts(struct passwd *pw, const char *client_user) { extern ServerOptions options; diff --git a/usr.bin/ssh/auth-rsa.c b/usr.bin/ssh/auth-rsa.c index 9e43cf6fee5..7963c344277 100644 --- a/usr.bin/ssh/auth-rsa.c +++ b/usr.bin/ssh/auth-rsa.c @@ -1,22 +1,22 @@ /* - * + * * auth-rsa.c - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Mon Mar 27 01:46:52 1995 ylo - * + * * RSA-based authentication. This code determines whether to admit a login * based on RSA authentication. This file also contains functions to check * validity of the host key. - * + * */ #include "includes.h" -RCSID("$Id: auth-rsa.c,v 1.20 2000/04/12 09:39:09 markus Exp $"); +RCSID("$Id: auth-rsa.c,v 1.21 2000/04/14 10:30:29 markus Exp $"); #include "rsa.h" #include "packet.h" @@ -238,7 +238,7 @@ auth_rsa(struct passwd *pw, BIGNUM *client_n) debug("%.100s, line %lu: bad key syntax", SSH_USER_PERMITTED_KEYS, linenum); packet_send_debug("%.100s, line %lu: bad key syntax", - SSH_USER_PERMITTED_KEYS, linenum); + SSH_USER_PERMITTED_KEYS, linenum); continue; } /* cp now points to the comment part. */ diff --git a/usr.bin/ssh/auth-skey.c b/usr.bin/ssh/auth-skey.c index 3610a67eff2..5f3fe9ee1b9 100644 --- a/usr.bin/ssh/auth-skey.c +++ b/usr.bin/ssh/auth-skey.c @@ -1,16 +1,16 @@ #include "includes.h" -RCSID("$Id: auth-skey.c,v 1.5 1999/12/06 19:04:57 deraadt Exp $"); +RCSID("$Id: auth-skey.c,v 1.6 2000/04/14 10:30:29 markus Exp $"); #include "ssh.h" #include "packet.h" #include -/* +/* * try skey authentication, - * return 1 on success, 0 on failure, -1 if skey is not available + * return 1 on success, 0 on failure, -1 if skey is not available */ -int +int auth_skey_password(struct passwd * pw, const char *password) { if (strncasecmp(password, "s/key", 5) == 0) { @@ -43,18 +43,18 @@ auth_skey_password(struct passwd * pw, const char *password) */ static u_int32_t hash_collapse(s) - u_char *s; + u_char *s; { - int len, target; + int len, target; u_int32_t i; if ((strlen(s) % sizeof(u_int32_t)) == 0) - target = strlen(s); /* Multiple of 4 */ + target = strlen(s); /* Multiple of 4 */ else target = strlen(s) - (strlen(s) % sizeof(u_int32_t)); - + for (i = 0, len = 0; len < target; len += 4) - i ^= ROUND(s + len); + i ^= ROUND(s + len); return i; } diff --git a/usr.bin/ssh/auth.c b/usr.bin/ssh/auth.c index b5677bf059c..d20a4e3fe3e 100644 --- a/usr.bin/ssh/auth.c +++ b/usr.bin/ssh/auth.c @@ -5,7 +5,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: auth.c,v 1.3 2000/04/14 10:09:14 markus Exp $"); +RCSID("$OpenBSD: auth.c,v 1.4 2000/04/14 10:30:29 markus Exp $"); #include "xmalloc.h" #include "rsa.h" @@ -36,9 +36,9 @@ extern char *forced_command; * DenyUsers or user's primary group is listed in DenyGroups, false will * be returned. If AllowUsers isn't empty and user isn't listed there, or * if AllowGroups isn't empty and user isn't listed there, false will be - * returned. + * returned. * If the user's shell is not executable, false will be returned. - * Otherwise true is returned. + * Otherwise true is returned. */ static int allowed_user(struct passwd * pw) @@ -184,10 +184,10 @@ do_fake_authloop1(char *user) packet_write_wait(); continue; } else if (type == SSH_CMSG_AUTH_PASSWORD && - options.password_authentication && - (password = packet_get_string(&dlen)) != NULL && - dlen == 5 && - strncasecmp(password, "s/key", 5) == 0 ) { + options.password_authentication && + (password = packet_get_string(&dlen)) != NULL && + dlen == 5 && + strncasecmp(password, "s/key", 5) == 0 ) { packet_send_debug(skeyinfo); } } @@ -437,21 +437,21 @@ do_authloop(struct passwd * pw) log("Unknown message during authentication: type %d", type); break; } - - /* - * Check if the user is logging in as root and root logins - * are disallowed. - * Note that root login is allowed for forced commands. - */ - if (authenticated && pw->pw_uid == 0 && !options.permit_root_login) { - if (forced_command) { - log("Root login accepted for forced command."); - } else { - authenticated = 0; - log("ROOT LOGIN REFUSED FROM %.200s", - get_canonical_hostname()); - } - } + + /* + * Check if the user is logging in as root and root logins + * are disallowed. + * Note that root login is allowed for forced commands. + */ + if (authenticated && pw->pw_uid == 0 && !options.permit_root_login) { + if (forced_command) { + log("Root login accepted for forced command."); + } else { + authenticated = 0; + log("ROOT LOGIN REFUSED FROM %.200s", + get_canonical_hostname()); + } + } /* Raise logging level */ if (authenticated || @@ -725,7 +725,7 @@ input_userauth_request(int type, int plen) xfree(user); xfree(method); } -void +void do_authentication2() { dispatch_init(&protocol_error); diff --git a/usr.bin/ssh/authfd.c b/usr.bin/ssh/authfd.c index 93188f23d71..6ab66004e45 100644 --- a/usr.bin/ssh/authfd.c +++ b/usr.bin/ssh/authfd.c @@ -1,20 +1,20 @@ /* - * + * * authfd.c - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Wed Mar 29 01:30:28 1995 ylo - * + * * Functions for connecting the local authentication agent. - * + * */ #include "includes.h" -RCSID("$Id: authfd.c,v 1.17 2000/04/12 09:39:09 markus Exp $"); +RCSID("$Id: authfd.c,v 1.18 2000/04/14 10:30:29 markus Exp $"); #include "ssh.h" #include "rsa.h" @@ -64,7 +64,7 @@ ssh_get_authentication_socket() * ssh_get_authentication_socket(). */ -void +void ssh_close_authentication_socket(int sock) { if (getenv(SSH_AUTHSOCKET_ENV_NAME)) @@ -108,7 +108,7 @@ ssh_get_authentication_connection() * memory. */ -void +void ssh_close_authentication_connection(AuthenticationConnection *ac) { buffer_free(&ac->packet); @@ -338,7 +338,7 @@ error_cleanup: * be used by normal applications. */ -int +int ssh_add_identity(AuthenticationConnection *auth, RSA * key, const char *comment) { @@ -426,7 +426,7 @@ error_cleanup: * meant to be used by normal applications. */ -int +int ssh_remove_identity(AuthenticationConnection *auth, RSA *key) { Buffer buffer; @@ -509,7 +509,7 @@ error_cleanup: * by normal applications. */ -int +int ssh_remove_all_identities(AuthenticationConnection *auth) { Buffer buffer; diff --git a/usr.bin/ssh/authfd.h b/usr.bin/ssh/authfd.h index 2af4858052f..fbeea2334dc 100644 --- a/usr.bin/ssh/authfd.h +++ b/usr.bin/ssh/authfd.h @@ -1,19 +1,19 @@ /* - * + * * authfd.h - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Wed Mar 29 01:17:41 1995 ylo - * + * * Functions to interface with the SSH_AUTHENTICATION_FD socket. - * + * */ -/* RCSID("$Id: authfd.h,v 1.6 1999/11/24 19:53:44 markus Exp $"); */ +/* RCSID("$Id: authfd.h,v 1.7 2000/04/14 10:30:30 markus Exp $"); */ #ifndef AUTHFD_H #define AUTHFD_H @@ -67,7 +67,7 @@ void ssh_close_authentication_connection(AuthenticationConnection * ac); * integers before the call, and free the comment after a successful call * (before calling ssh_get_next_identity). */ -int +int ssh_get_first_identity(AuthenticationConnection * connection, BIGNUM * e, BIGNUM * n, char **comment); @@ -77,13 +77,13 @@ ssh_get_first_identity(AuthenticationConnection * connection, * function. This returns 0 if there are no more identities. The caller * must free comment after a successful return. */ -int +int ssh_get_next_identity(AuthenticationConnection * connection, BIGNUM * e, BIGNUM * n, char **comment); /* Requests the agent to decrypt the given challenge. Returns true if the agent claims it was able to decrypt it. */ -int +int ssh_decrypt_challenge(AuthenticationConnection * auth, BIGNUM * e, BIGNUM * n, BIGNUM * challenge, unsigned char session_id[16], @@ -95,7 +95,7 @@ ssh_decrypt_challenge(AuthenticationConnection * auth, * be used by normal applications. This returns true if the identity was * successfully added. */ -int +int ssh_add_identity(AuthenticationConnection * connection, RSA * key, const char *comment); diff --git a/usr.bin/ssh/authfile.c b/usr.bin/ssh/authfile.c index 50f24379a7a..82a0990917d 100644 --- a/usr.bin/ssh/authfile.c +++ b/usr.bin/ssh/authfile.c @@ -1,21 +1,21 @@ /* - * + * * authfile.c - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Mon Mar 27 03:52:05 1995 ylo - * + * * This file contains functions for reading and writing identity files, and * for reading the passphrase from the user. - * + * */ #include "includes.h" -RCSID("$Id: authfile.c,v 1.13 2000/04/12 09:39:10 markus Exp $"); +RCSID("$Id: authfile.c,v 1.14 2000/04/14 10:30:30 markus Exp $"); #include #include "xmalloc.h" diff --git a/usr.bin/ssh/bufaux.c b/usr.bin/ssh/bufaux.c index c7a2e318296..922acc4e114 100644 --- a/usr.bin/ssh/bufaux.c +++ b/usr.bin/ssh/bufaux.c @@ -1,14 +1,14 @@ /* - * + * * bufaux.c - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Wed Mar 29 02:24:47 1995 ylo - * + * * Auxiliary functions for storing and retrieving various data types to/from * Buffers. * @@ -17,7 +17,7 @@ */ #include "includes.h" -RCSID("$Id: bufaux.c,v 1.10 2000/04/12 09:39:10 markus Exp $"); +RCSID("$Id: bufaux.c,v 1.11 2000/04/14 10:30:30 markus Exp $"); #include "ssh.h" #include @@ -124,7 +124,7 @@ buffer_get_bignum2(Buffer *buffer, BIGNUM *value) /* * Returns an integer from the buffer (4 bytes, msb first). */ -unsigned int +unsigned int buffer_get_int(Buffer *buffer) { unsigned char buf[4]; @@ -135,7 +135,7 @@ buffer_get_int(Buffer *buffer) /* * Stores an integer in the buffer in 4 bytes, msb first. */ -void +void buffer_put_int(Buffer *buffer, unsigned int value) { char buf[4]; @@ -175,13 +175,13 @@ buffer_get_string(Buffer *buffer, unsigned int *length_ptr) /* * Stores and arbitrary binary string in the buffer. */ -void +void buffer_put_string(Buffer *buffer, const void *buf, unsigned int len) { buffer_put_int(buffer, len); buffer_append(buffer, buf, len); } -void +void buffer_put_cstring(Buffer *buffer, const char *s) { buffer_put_string(buffer, s, strlen(s)); @@ -190,7 +190,7 @@ buffer_put_cstring(Buffer *buffer, const char *s) /* * Returns a character from the buffer (0 - 255). */ -int +int buffer_get_char(Buffer *buffer) { char ch; @@ -201,7 +201,7 @@ buffer_get_char(Buffer *buffer) /* * Stores a character in the buffer. */ -void +void buffer_put_char(Buffer *buffer, int value) { char ch = value; diff --git a/usr.bin/ssh/bufaux.h b/usr.bin/ssh/bufaux.h index f21491f5c1c..8ba92f8b592 100644 --- a/usr.bin/ssh/bufaux.h +++ b/usr.bin/ssh/bufaux.h @@ -1,17 +1,17 @@ /* - * + * * bufaux.h - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Wed Mar 29 02:18:23 1995 ylo - * + * */ -/* RCSID("$Id: bufaux.h,v 1.5 2000/03/28 20:24:18 markus Exp $"); */ +/* RCSID("$Id: bufaux.h,v 1.6 2000/04/14 10:30:30 markus Exp $"); */ #ifndef BUFAUX_H #define BUFAUX_H diff --git a/usr.bin/ssh/buffer.c b/usr.bin/ssh/buffer.c index a1eaeca7377..4d8343322cd 100644 --- a/usr.bin/ssh/buffer.c +++ b/usr.bin/ssh/buffer.c @@ -1,20 +1,20 @@ /* - * + * * buffer.c - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Sat Mar 18 04:15:33 1995 ylo - * + * * Functions for manipulating fifo buffers (that can grow if needed). - * + * */ #include "includes.h" -RCSID("$Id: buffer.c,v 1.5 2000/04/12 10:22:38 markus Exp $"); +RCSID("$Id: buffer.c,v 1.6 2000/04/14 10:30:30 markus Exp $"); #include "xmalloc.h" #include "buffer.h" @@ -22,7 +22,7 @@ RCSID("$Id: buffer.c,v 1.5 2000/04/12 10:22:38 markus Exp $"); /* Initializes the buffer structure. */ -void +void buffer_init(Buffer *buffer) { buffer->alloc = 4096; @@ -33,7 +33,7 @@ buffer_init(Buffer *buffer) /* Frees any memory used for the buffer. */ -void +void buffer_free(Buffer *buffer) { memset(buffer->buf, 0, buffer->alloc); @@ -45,7 +45,7 @@ buffer_free(Buffer *buffer) * zero the memory. */ -void +void buffer_clear(Buffer *buffer) { buffer->offset = 0; @@ -54,7 +54,7 @@ buffer_clear(Buffer *buffer) /* Appends data to the buffer, expanding it if necessary. */ -void +void buffer_append(Buffer *buffer, const char *data, unsigned int len) { char *cp; @@ -68,7 +68,7 @@ buffer_append(Buffer *buffer, const char *data, unsigned int len) * to the allocated region. */ -void +void buffer_append_space(Buffer *buffer, char **datap, unsigned int len) { /* If the buffer is empty, start using it from the beginning. */ @@ -102,7 +102,7 @@ restart: /* Returns the number of bytes of data in the buffer. */ -unsigned int +unsigned int buffer_len(Buffer *buffer) { return buffer->end - buffer->offset; @@ -110,7 +110,7 @@ buffer_len(Buffer *buffer) /* Gets data from the beginning of the buffer. */ -void +void buffer_get(Buffer *buffer, char *buf, unsigned int len) { if (len > buffer->end - buffer->offset) @@ -121,7 +121,7 @@ buffer_get(Buffer *buffer, char *buf, unsigned int len) /* Consumes the given number of bytes from the beginning of the buffer. */ -void +void buffer_consume(Buffer *buffer, unsigned int bytes) { if (bytes > buffer->end - buffer->offset) @@ -131,7 +131,7 @@ buffer_consume(Buffer *buffer, unsigned int bytes) /* Consumes the given number of bytes from the end of the buffer. */ -void +void buffer_consume_end(Buffer *buffer, unsigned int bytes) { if (bytes > buffer->end - buffer->offset) @@ -149,7 +149,7 @@ buffer_ptr(Buffer *buffer) /* Dumps the contents of the buffer to stderr. */ -void +void buffer_dump(Buffer *buffer) { int i; diff --git a/usr.bin/ssh/buffer.h b/usr.bin/ssh/buffer.h index 04efc25221c..be4fdc3cabd 100644 --- a/usr.bin/ssh/buffer.h +++ b/usr.bin/ssh/buffer.h @@ -1,19 +1,19 @@ /* - * + * * buffer.h - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Sat Mar 18 04:12:25 1995 ylo - * + * * Code for manipulating FIFO buffers. - * + * */ -/* RCSID("$Id: buffer.h,v 1.3 1999/11/24 19:53:44 markus Exp $"); */ +/* RCSID("$Id: buffer.h,v 1.4 2000/04/14 10:30:30 markus Exp $"); */ #ifndef BUFFER_H #define BUFFER_H diff --git a/usr.bin/ssh/canohost.c b/usr.bin/ssh/canohost.c index fcf743cd417..a73f8d0ecf2 100644 --- a/usr.bin/ssh/canohost.c +++ b/usr.bin/ssh/canohost.c @@ -1,20 +1,20 @@ /* - * + * * canohost.c - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Sun Jul 2 17:52:22 1995 ylo - * + * * Functions for returning the canonical host name of the remote site. - * + * */ #include "includes.h" -RCSID("$Id: canohost.c,v 1.11 2000/01/04 13:41:32 markus Exp $"); +RCSID("$Id: canohost.c,v 1.12 2000/04/14 10:30:30 markus Exp $"); #include "packet.h" #include "xmalloc.h" @@ -241,7 +241,7 @@ get_sock_port(int sock, int local) /* Returns remote/local port number for the current connection. */ -int +int get_port(int local) { /* @@ -255,13 +255,13 @@ get_port(int local) return get_sock_port(packet_get_connection_in(), local); } -int +int get_peer_port(int sock) { return get_sock_port(sock, 0); } -int +int get_remote_port() { return get_port(0); diff --git a/usr.bin/ssh/channels.c b/usr.bin/ssh/channels.c index 3a634bfb9da..eabcc91c909 100644 --- a/usr.bin/ssh/channels.c +++ b/usr.bin/ssh/channels.c @@ -1,23 +1,23 @@ /* - * + * * channels.c - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Fri Mar 24 16:35:24 1995 ylo - * + * * This file contains functions for generic socket connection forwarding. * There is also code for initiating connection forwarding for X11 connections, * arbitrary tcp/ip connections, and the authentication agent connection. - * + * * SSH2 support added by Markus Friedl. */ #include "includes.h" -RCSID("$Id: channels.c,v 1.48 2000/04/14 10:09:14 markus Exp $"); +RCSID("$Id: channels.c,v 1.49 2000/04/14 10:30:30 markus Exp $"); #include "ssh.h" #include "packet.h" @@ -109,7 +109,7 @@ static int have_hostname_in_open = 0; /* Sets specific protocol options. */ -void +void channel_set_options(int hostname_in_open) { have_hostname_in_open = hostname_in_open; @@ -121,7 +121,7 @@ channel_set_options(int hostname_in_open) * and the server has no way to know but to trust the client anyway. */ -void +void channel_permit_all_opens() { all_opens_permitted = 1; @@ -150,7 +150,7 @@ channel_lookup(int id) * remote_name to be freed. */ -int +int channel_new(char *ctype, int type, int rfd, int wfd, int efd, int window, int maxpack, int extended_usage, char *remote_name) { @@ -226,7 +226,7 @@ channel_new(char *ctype, int type, int rfd, int wfd, int efd, debug("channel %d: new [%s]", found, remote_name); return found; } -int +int channel_allocate(int type, int sock, char *remote_name) { return channel_new("", type, sock, sock, -1, 0, 0, 0, remote_name); @@ -234,7 +234,7 @@ channel_allocate(int type, int sock, char *remote_name) /* Free the channel and close its socket. */ -void +void channel_free(int id) { Channel *c = channel_lookup(id); @@ -361,7 +361,7 @@ channel_pre_output_draining(Channel *c, fd_set * readset, fd_set * writeset) { if (buffer_len(&c->output) == 0) channel_free(c->self); - else + else FD_SET(c->sock, writeset); } @@ -784,7 +784,7 @@ channel_handler_init(void) channel_handler_init_15(); } -void +void channel_handler(chan_fn *ftab[], fd_set * readset, fd_set * writeset) { static int did_init = 0; @@ -806,13 +806,13 @@ channel_handler(chan_fn *ftab[], fd_set * readset, fd_set * writeset) } } -void +void channel_prepare_select(fd_set * readset, fd_set * writeset) { channel_handler(channel_pre, readset, writeset); } -void +void channel_after_select(fd_set * readset, fd_set * writeset) { channel_handler(channel_post, readset, writeset); @@ -820,7 +820,7 @@ channel_after_select(fd_set * readset, fd_set * writeset) /* If there is data to send to the connection, send some of it now. */ -void +void channel_output_poll() { int len, i; @@ -911,7 +911,7 @@ channel_output_poll() * still there. */ -void +void channel_input_data(int type, int plen) { int id; @@ -956,7 +956,7 @@ channel_input_data(int type, int plen) buffer_append(&c->output, data, data_len); xfree(data); } -void +void channel_input_extended_data(int type, int plen) { int id; @@ -1002,7 +1002,7 @@ channel_input_extended_data(int type, int plen) * more channel is overfull. */ -int +int channel_not_very_much_buffered_data() { unsigned int i; @@ -1026,7 +1026,7 @@ channel_not_very_much_buffered_data() return 1; } -void +void channel_input_ieof(int type, int plen) { int id; @@ -1041,7 +1041,7 @@ channel_input_ieof(int type, int plen) chan_rcvd_ieof(c); } -void +void channel_input_close(int type, int plen) { int id; @@ -1080,7 +1080,7 @@ channel_input_close(int type, int plen) } /* proto version 1.5 overloads CLOSE_CONFIRMATION with OCLOSE */ -void +void channel_input_oclose(int type, int plen) { int id = packet_get_int(); @@ -1091,7 +1091,7 @@ channel_input_oclose(int type, int plen) chan_rcvd_oclose(c); } -void +void channel_input_close_confirmation(int type, int plen) { int id = packet_get_int(); @@ -1107,7 +1107,7 @@ channel_input_close_confirmation(int type, int plen) channel_free(c->self); } -void +void channel_input_open_confirmation(int type, int plen) { int id, remote_id; @@ -1141,7 +1141,7 @@ channel_input_open_confirmation(int type, int plen) } } -void +void channel_input_open_failure(int type, int plen) { int id; @@ -1194,7 +1194,7 @@ debug("cb_fn %p cb_event %d", c->cb_fn , c->cb_event); } } -void +void channel_input_window_adjust(int type, int plen) { Channel *c; @@ -1223,7 +1223,7 @@ channel_input_window_adjust(int type, int plen) * might have. */ -void +void channel_stop_listening() { int i; @@ -1250,7 +1250,7 @@ channel_stop_listening() * descriptors after a fork. */ -void +void channel_close_all() { int i; @@ -1262,7 +1262,7 @@ channel_close_all() /* Returns the maximum file descriptor number used by the channels. */ -int +int channel_max_fd() { return channel_max_fd_value; @@ -1270,7 +1270,7 @@ channel_max_fd() /* Returns true if any channel is still open. */ -int +int channel_still_open() { unsigned int i; @@ -1357,7 +1357,7 @@ channel_open_message() * channel to host:port from remote side. */ -void +void channel_request_local_forwarding(u_short port, const char *host, u_short host_port, int gateway_ports) { @@ -1441,7 +1441,7 @@ channel_request_local_forwarding(u_short port, const char *host, * the secure channel to host:port from local side. */ -void +void channel_request_remote_forwarding(u_short listen_port, const char *host_to_connect, u_short port_to_connect) { @@ -1484,7 +1484,7 @@ channel_request_remote_forwarding(u_short listen_port, const char *host_to_conne * message if there was an error). This never returns if there was an error. */ -void +void channel_input_port_forward_request(int is_root) { u_short port, host_port; @@ -1567,7 +1567,7 @@ channel_connect_to(const char *host, u_short host_port) * or CHANNEL_OPEN_FAILURE. */ -void +void channel_input_port_open(int type, int plen) { u_short host_port; @@ -1761,7 +1761,7 @@ connect_local_xsocket(unsigned int dnr) * with either SSH_MSG_OPEN_CONFIRMATION or SSH_MSG_OPEN_FAILURE. */ -void +void x11_input_open(int type, int plen) { int remote_channel, display_number, sock = 0, newch; @@ -1865,7 +1865,7 @@ x11_input_open(int type, int plen) } freeaddrinfo(aitop); if (!ai) { - error("connect %.100s port %d: %.100s", buf, 6000 + display_number, + error("connect %.100s port %d: %.100s", buf, 6000 + display_number, strerror(errno)); goto fail; } @@ -1899,7 +1899,7 @@ fail: * data, and enables authentication spoofing. */ -void +void x11_request_forwarding_with_spoofing(const char *proto, const char *data) { unsigned int data_len = (unsigned int) strlen(data) / 2; @@ -1957,7 +1957,7 @@ x11_request_forwarding_with_spoofing(const char *proto, const char *data) /* Sends a message to the server to request authentication fd forwarding. */ -void +void auth_request_forwarding() { packet_start(SSH_CMSG_AGENT_REQUEST_FORWARDING); @@ -1979,7 +1979,7 @@ auth_get_socket_name() /* removes the agent forwarding socket */ -void +void cleanup_socket(void) { remove(channel_forwarded_auth_socket_name); @@ -1991,7 +1991,7 @@ cleanup_socket(void) * This starts forwarding authentication requests. */ -void +void auth_input_request_forwarding(struct passwd * pw) { int sock, newch; @@ -2049,7 +2049,7 @@ auth_input_request_forwarding(struct passwd * pw) /* This is called to process an SSH_SMSG_AGENT_OPEN message. */ -void +void auth_input_open_request(int type, int plen) { int remch, sock, newch; diff --git a/usr.bin/ssh/channels.h b/usr.bin/ssh/channels.h index 840f885a3c4..307ad8fc4f7 100644 --- a/usr.bin/ssh/channels.h +++ b/usr.bin/ssh/channels.h @@ -1,4 +1,4 @@ -/* RCSID("$Id: channels.h,v 1.8 2000/04/03 07:07:15 markus Exp $"); */ +/* RCSID("$Id: channels.h,v 1.9 2000/04/14 10:30:30 markus Exp $"); */ #ifndef CHANNELS_H #define CHANNELS_H @@ -149,7 +149,7 @@ char *channel_open_message(void); * channel to host:port from remote side. This never returns if there was an * error. */ -void +void channel_request_local_forwarding(u_short port, const char *host, u_short remote_port, int gateway_ports); @@ -159,7 +159,7 @@ channel_request_local_forwarding(u_short port, const char *host, * there was an error. This registers that open requests for that port are * permitted. */ -void +void channel_request_remote_forwarding(u_short port, const char *host, u_short remote_port); diff --git a/usr.bin/ssh/cipher.c b/usr.bin/ssh/cipher.c index 701fbb1e0a3..bcaff024db2 100644 --- a/usr.bin/ssh/cipher.c +++ b/usr.bin/ssh/cipher.c @@ -1,18 +1,18 @@ /* - * + * * cipher.c - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Wed Apr 19 17:41:39 1995 ylo - * + * */ #include "includes.h" -RCSID("$Id: cipher.c,v 1.25 2000/04/12 09:39:10 markus Exp $"); +RCSID("$Id: cipher.c,v 1.26 2000/04/14 10:30:30 markus Exp $"); #include "ssh.h" #include "cipher.h" @@ -133,7 +133,7 @@ static char *cipher_names[] = * supported cipher. */ -unsigned int +unsigned int cipher_mask1() { unsigned int mask = 0; @@ -141,7 +141,7 @@ cipher_mask1() mask |= 1 << SSH_CIPHER_BLOWFISH; return mask; } -unsigned int +unsigned int cipher_mask2() { unsigned int mask = 0; @@ -151,7 +151,7 @@ cipher_mask2() mask |= 1 << SSH_CIPHER_CAST128_CBC; return mask; } -unsigned int +unsigned int cipher_mask() { return cipher_mask1() | cipher_mask2(); @@ -213,7 +213,7 @@ cipher_number(const char *name) * passphrase and using the resulting 16 bytes as the key. */ -void +void cipher_set_key_string(CipherContext *context, int cipher, const char *passphrase) { MD5_CTX md; @@ -231,7 +231,7 @@ cipher_set_key_string(CipherContext *context, int cipher, const char *passphrase /* Selects the cipher to use and sets the key. */ -void +void cipher_set_key(CipherContext *context, int cipher, const unsigned char *key, int keylen) { @@ -292,9 +292,9 @@ cipher_set_key(CipherContext *context, int cipher, const unsigned char *key, memset(padded, 0, sizeof(padded)); } -void +void cipher_set_key_iv(CipherContext * context, int cipher, - const unsigned char *key, int keylen, + const unsigned char *key, int keylen, const unsigned char *iv, int ivlen) { /* Set cipher type. */ @@ -352,7 +352,7 @@ cipher_set_key_iv(CipherContext * context, int cipher, /* Encrypts data using the cipher. */ -void +void cipher_encrypt(CipherContext *context, unsigned char *dest, const unsigned char *src, unsigned int len) { @@ -374,14 +374,14 @@ cipher_encrypt(CipherContext *context, unsigned char *dest, case SSH_CIPHER_BLOWFISH: swap_bytes(src, dest, len); BF_cbc_encrypt(dest, dest, len, - &context->u.bf.key, context->u.bf.iv, + &context->u.bf.key, context->u.bf.iv, BF_ENCRYPT); swap_bytes(dest, dest, len); break; case SSH_CIPHER_BLOWFISH_CBC: BF_cbc_encrypt((void *)src, dest, len, - &context->u.bf.key, context->u.bf.iv, + &context->u.bf.key, context->u.bf.iv, BF_ENCRYPT); break; @@ -407,7 +407,7 @@ cipher_encrypt(CipherContext *context, unsigned char *dest, /* Decrypts data using the cipher. */ -void +void cipher_decrypt(CipherContext *context, unsigned char *dest, const unsigned char *src, unsigned int len) { diff --git a/usr.bin/ssh/cipher.h b/usr.bin/ssh/cipher.h index 877df9a25b7..b4cd1a3761a 100644 --- a/usr.bin/ssh/cipher.h +++ b/usr.bin/ssh/cipher.h @@ -1,17 +1,17 @@ /* - * + * * cipher.h - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Wed Apr 19 16:50:42 1995 ylo - * + * */ -/* RCSID("$Id: cipher.h,v 1.15 2000/04/12 09:39:10 markus Exp $"); */ +/* RCSID("$Id: cipher.h,v 1.16 2000/04/14 10:30:30 markus Exp $"); */ #ifndef CIPHER_H #define CIPHER_H @@ -85,29 +85,29 @@ int ciphers_valid(const char *names); * Selects the cipher to use and sets the key. If for_encryption is true, * the key is setup for encryption; otherwise it is setup for decryption. */ -void +void cipher_set_key(CipherContext * context, int cipher, const unsigned char *key, int keylen); -void +void cipher_set_key_iv(CipherContext * context, int cipher, - const unsigned char *key, int keylen, + const unsigned char *key, int keylen, const unsigned char *iv, int ivlen); /* * Sets key for the cipher by computing the MD5 checksum of the passphrase, * and using the resulting 16 bytes as the key. */ -void +void cipher_set_key_string(CipherContext * context, int cipher, const char *passphrase); /* Encrypts data using the cipher. */ -void +void cipher_encrypt(CipherContext * context, unsigned char *dest, const unsigned char *src, unsigned int len); /* Decrypts data using the cipher. */ -void +void cipher_decrypt(CipherContext * context, unsigned char *dest, const unsigned char *src, unsigned int len); diff --git a/usr.bin/ssh/clientloop.c b/usr.bin/ssh/clientloop.c index 0b21d519633..61872397bce 100644 --- a/usr.bin/ssh/clientloop.c +++ b/usr.bin/ssh/clientloop.c @@ -1,22 +1,22 @@ /* - * + * * clientloop.c - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * - * + * + * * Created: Sat Sep 23 12:23:57 1995 ylo - * + * * The main loop for the interactive session (client side). - * + * * SSH2 support added by Markus Friedl. */ #include "includes.h" -RCSID("$Id: clientloop.c,v 1.19 2000/04/14 10:09:15 markus Exp $"); +RCSID("$Id: clientloop.c,v 1.20 2000/04/14 10:30:30 markus Exp $"); #include "xmalloc.h" #include "ssh.h" @@ -83,7 +83,7 @@ int session_ident = -1; /* Returns the user\'s terminal to normal mode if it had been put in raw mode. */ -void +void leave_raw_mode() { if (!in_raw_mode) @@ -97,7 +97,7 @@ leave_raw_mode() /* Puts the user\'s terminal in raw mode. */ -void +void enter_raw_mode() { struct termios tio; @@ -123,7 +123,7 @@ enter_raw_mode() /* Restores stdin to blocking mode. */ -void +void leave_non_blocking() { if (in_non_blocking_mode) { @@ -135,7 +135,7 @@ leave_non_blocking() /* Puts stdin terminal in non-blocking mode. */ -void +void enter_non_blocking() { in_non_blocking_mode = 1; @@ -148,7 +148,7 @@ enter_non_blocking() * flag indicating that the window has changed. */ -void +void window_change_handler(int sig) { received_window_change_signal = 1; @@ -160,7 +160,7 @@ window_change_handler(int sig) * signals must be trapped to restore terminal modes. */ -void +void signal_handler(int sig) { if (in_raw_mode) @@ -177,7 +177,7 @@ signal_handler(int sig) * available resolution. */ -double +double get_current_time() { struct timeval tv; @@ -191,7 +191,7 @@ get_current_time() * not appear to wake up when redirecting from /dev/null. */ -void +void client_check_initial_eof_on_stdin() { int len; @@ -245,7 +245,7 @@ client_check_initial_eof_on_stdin() * connection. */ -void +void client_make_packets_from_stdin_data() { unsigned int len; @@ -276,7 +276,7 @@ client_make_packets_from_stdin_data() * appropriate. */ -void +void client_check_window_change() { struct winsize ws; @@ -313,7 +313,7 @@ client_check_window_change() * one of the file descriptors). */ -void +void client_wait_until_can_do_something(fd_set * readset, fd_set * writeset) { /*debug("client_wait_until_can_do_something"); */ @@ -380,7 +380,7 @@ client_wait_until_can_do_something(fd_set * readset, fd_set * writeset) } } -void +void client_suspend_self() { struct winsize oldws, newws; @@ -425,7 +425,7 @@ client_suspend_self() enter_raw_mode(); } -void +void client_process_net_input(fd_set * readset) { int len; @@ -468,7 +468,7 @@ client_process_net_input(fd_set * readset) } } -void +void client_process_input(fd_set * readset) { int len, pid; @@ -657,7 +657,7 @@ Supported escape sequences:\r\n\ } } -void +void client_process_output(fd_set * writeset) { int len; @@ -717,7 +717,7 @@ client_process_output(fd_set * writeset) * preparatory phase. */ -void +void client_process_buffered_input_packets() { dispatch_run(DISPATCH_NONBLOCK, &quit_pending); @@ -730,7 +730,7 @@ client_process_buffered_input_packets() * character for terminating or suspending the session. */ -int +int client_loop(int have_pty, int escape_char_arg) { extern Options options; @@ -953,7 +953,7 @@ client_input_exit_status(int type, int plen) quit_pending = 1; } -void +void client_init_dispatch_20() { dispatch_init(&dispatch_protocol_error); @@ -966,7 +966,7 @@ client_init_dispatch_20() dispatch_set(SSH2_MSG_CHANNEL_REQUEST, &channel_input_channel_request); dispatch_set(SSH2_MSG_CHANNEL_WINDOW_ADJUST, &channel_input_window_adjust); } -void +void client_init_dispatch_13() { dispatch_init(NULL); @@ -983,14 +983,14 @@ client_init_dispatch_13() dispatch_set(SSH_SMSG_STDOUT_DATA, &client_input_stdout_data); dispatch_set(SSH_SMSG_X11_OPEN, &x11_input_open); } -void +void client_init_dispatch_15() { client_init_dispatch_13(); dispatch_set(SSH_MSG_CHANNEL_CLOSE, &channel_input_ieof); dispatch_set(SSH_MSG_CHANNEL_CLOSE_CONFIRMATION, & channel_input_oclose); } -void +void client_init_dispatch() { if (compat20) diff --git a/usr.bin/ssh/compat.c b/usr.bin/ssh/compat.c index 5e9e60a5f66..bcd1ff2ae56 100644 --- a/usr.bin/ssh/compat.c +++ b/usr.bin/ssh/compat.c @@ -28,7 +28,7 @@ */ #include "includes.h" -RCSID("$Id: compat.c,v 1.10 2000/04/12 07:45:43 markus Exp $"); +RCSID("$Id: compat.c,v 1.11 2000/04/14 10:30:31 markus Exp $"); #include "ssh.h" #include "packet.h" @@ -39,14 +39,14 @@ int compat13 = 0; int compat20 = 0; int datafellows = 0; -void +void enable_compat20(void) { verbose("Enabling compatibility mode for protocol 2.0"); compat20 = 1; packet_set_ssh2_format(); } -void +void enable_compat13(void) { verbose("Enabling compatibility mode for protocol 1.3"); diff --git a/usr.bin/ssh/compress.c b/usr.bin/ssh/compress.c index d04b6eb4804..86ccaa28ae2 100644 --- a/usr.bin/ssh/compress.c +++ b/usr.bin/ssh/compress.c @@ -1,20 +1,20 @@ /* - * + * * compress.c - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Wed Oct 25 22:12:46 1995 ylo - * + * * Interface to packet compression for ssh. - * + * */ #include "includes.h" -RCSID("$Id: compress.c,v 1.6 2000/03/28 20:25:14 markus Exp $"); +RCSID("$Id: compress.c,v 1.7 2000/04/14 10:30:31 markus Exp $"); #include "ssh.h" #include "buffer.h" @@ -28,7 +28,7 @@ static z_stream outgoing_stream; * (as in gzip). */ -void +void buffer_compress_init(int level) { debug("Enabling compression at level %d.", level); @@ -40,7 +40,7 @@ buffer_compress_init(int level) /* Frees any data structures allocated for compression. */ -void +void buffer_compress_uninit() { debug("compress outgoing: raw data %lu, compressed %lu, factor %.2f", @@ -64,7 +64,7 @@ buffer_compress_uninit() * receiver. This appends the compressed data to the output buffer. */ -void +void buffer_compress(Buffer * input_buffer, Buffer * output_buffer) { char buf[4096]; @@ -108,7 +108,7 @@ buffer_compress(Buffer * input_buffer, Buffer * output_buffer) * with that. This appends the uncompressed data to the output buffer. */ -void +void buffer_uncompress(Buffer * input_buffer, Buffer * output_buffer) { char buf[4096]; diff --git a/usr.bin/ssh/compress.h b/usr.bin/ssh/compress.h index 4e9c598abf5..f9756132259 100644 --- a/usr.bin/ssh/compress.h +++ b/usr.bin/ssh/compress.h @@ -1,19 +1,19 @@ /* - * + * * compress.h - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Wed Oct 25 22:12:46 1995 ylo - * + * * Interface to packet compression for ssh. - * + * */ -/* RCSID("$Id: compress.h,v 1.3 1999/11/24 19:53:46 markus Exp $"); */ +/* RCSID("$Id: compress.h,v 1.4 2000/04/14 10:30:31 markus Exp $"); */ #ifndef COMPRESS_H #define COMPRESS_H diff --git a/usr.bin/ssh/crc32.h b/usr.bin/ssh/crc32.h index 54299fccb11..4176e8a5f7c 100644 --- a/usr.bin/ssh/crc32.h +++ b/usr.bin/ssh/crc32.h @@ -1,19 +1,19 @@ /* - * + * * crc32.h - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1992 Tatu Ylonen, Espoo, Finland * All rights reserved - * + * * Created: Tue Feb 11 14:37:27 1992 ylo - * + * * Functions for computing 32-bit CRC. - * + * */ -/* RCSID("$Id: crc32.h,v 1.4 1999/11/24 19:53:46 markus Exp $"); */ +/* RCSID("$Id: crc32.h,v 1.5 2000/04/14 10:30:31 markus Exp $"); */ #ifndef CRC32_H #define CRC32_H diff --git a/usr.bin/ssh/dispatch.c b/usr.bin/ssh/dispatch.c index 85fd134ab79..9b7def74685 100644 --- a/usr.bin/ssh/dispatch.c +++ b/usr.bin/ssh/dispatch.c @@ -27,7 +27,7 @@ * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #include "includes.h" -RCSID("$Id: dispatch.c,v 1.1 2000/03/28 20:40:48 markus Exp $"); +RCSID("$Id: dispatch.c,v 1.2 2000/04/14 10:30:31 markus Exp $"); #include "ssh.h" #include "dispatch.h" #include "packet.h" @@ -42,7 +42,7 @@ dispatch_protocol_error(int type, int plen) { error("Hm, dispatch protocol error: type %d plen %d", type, plen); } -void +void dispatch_init(dispatch_fn *dflt) { int i; diff --git a/usr.bin/ssh/dsa.c b/usr.bin/ssh/dsa.c index 0f085ac8888..1594c14f53a 100644 --- a/usr.bin/ssh/dsa.c +++ b/usr.bin/ssh/dsa.c @@ -28,7 +28,7 @@ */ #include "includes.h" -RCSID("$Id: dsa.c,v 1.3 2000/04/12 09:39:10 markus Exp $"); +RCSID("$Id: dsa.c,v 1.4 2000/04/14 10:30:31 markus Exp $"); #include "ssh.h" #include "xmalloc.h" @@ -96,7 +96,7 @@ dsa_load_private(char *filename) in = BIO_new(BIO_s_file()); if (in == NULL) fatal("BIO_new failed"); - if (BIO_read_filename(in, filename) <= 0) + if (BIO_read_filename(in, filename) <= 0) fatal("BIO_read failed %s: %s", filename, strerror(errno)); fprintf(stderr, "read DSA private key\n"); dsa = PEM_read_bio_DSAPrivateKey(in,NULL,NULL,NULL); @@ -170,9 +170,9 @@ dsa_sign( sig = DSA_do_sign(digest, evp_md->md_size, key->dsa); - rlen = BN_num_bytes(sig->r); - slen = BN_num_bytes(sig->s); - if (rlen > INTBLOB_LEN || slen > INTBLOB_LEN) { + rlen = BN_num_bytes(sig->r); + slen = BN_num_bytes(sig->s); + if (rlen > INTBLOB_LEN || slen > INTBLOB_LEN) { error("bad sig size %d %d", rlen, slen); DSA_SIG_free(sig); return -1; diff --git a/usr.bin/ssh/getput.h b/usr.bin/ssh/getput.h index d2e138089a4..e1aa9bb64b1 100644 --- a/usr.bin/ssh/getput.h +++ b/usr.bin/ssh/getput.h @@ -1,19 +1,19 @@ /* - * + * * getput.h - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Wed Jun 28 22:36:30 1995 ylo - * + * * Macros for storing and retrieving data in msb first and lsb first order. - * + * */ -/* RCSID("$Id: getput.h,v 1.2 1999/11/24 00:26:02 deraadt Exp $"); */ +/* RCSID("$Id: getput.h,v 1.3 2000/04/14 10:30:31 markus Exp $"); */ #ifndef GETPUT_H #define GETPUT_H @@ -21,7 +21,7 @@ /*------------ macros for storing/extracting msb first words -------------*/ #define GET_32BIT(cp) (((unsigned long)(unsigned char)(cp)[0] << 24) | \ - ((unsigned long)(unsigned char)(cp)[1] << 16) | \ + ((unsigned long)(unsigned char)(cp)[1] << 16) | \ ((unsigned long)(unsigned char)(cp)[2] << 8) | \ ((unsigned long)(unsigned char)(cp)[3])) diff --git a/usr.bin/ssh/hostfile.c b/usr.bin/ssh/hostfile.c index 33df5e9d9f6..29efe5656a1 100644 --- a/usr.bin/ssh/hostfile.c +++ b/usr.bin/ssh/hostfile.c @@ -1,20 +1,20 @@ /* - * + * * hostfile.c - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Thu Jun 29 07:10:56 1995 ylo - * + * * Functions for manipulating the known hosts files. - * + * */ #include "includes.h" -RCSID("$OpenBSD: hostfile.c,v 1.15 2000/04/12 09:39:10 markus Exp $"); +RCSID("$OpenBSD: hostfile.c,v 1.16 2000/04/14 10:30:31 markus Exp $"); #include "packet.h" #include "match.h" diff --git a/usr.bin/ssh/hostfile.h b/usr.bin/ssh/hostfile.h index 64fe185da9f..c9bdd7f2e49 100644 --- a/usr.bin/ssh/hostfile.h +++ b/usr.bin/ssh/hostfile.h @@ -10,7 +10,7 @@ typedef enum { HOST_OK, HOST_NEW, HOST_CHANGED } HostStatus; -HostStatus +HostStatus check_host_in_hostfile(const char *filename, const char *host, Key *key, Key *found); /* diff --git a/usr.bin/ssh/includes.h b/usr.bin/ssh/includes.h index 68690e3a53f..ef374dfe808 100644 --- a/usr.bin/ssh/includes.h +++ b/usr.bin/ssh/includes.h @@ -1,16 +1,16 @@ /* - * + * * includes.h - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Thu Mar 23 16:29:37 1995 ylo - * + * * This file includes most of the needed system headers. - * + * */ #ifndef INCLUDES_H diff --git a/usr.bin/ssh/kex.c b/usr.bin/ssh/kex.c index f9f5dde3f0b..4b55c074859 100644 --- a/usr.bin/ssh/kex.c +++ b/usr.bin/ssh/kex.c @@ -28,7 +28,7 @@ */ #include "includes.h" -RCSID("$Id: kex.c,v 1.4 2000/04/12 09:39:10 markus Exp $"); +RCSID("$Id: kex.c,v 1.5 2000/04/14 10:30:31 markus Exp $"); #include "ssh.h" #include "ssh2.h" @@ -143,12 +143,12 @@ void dump_digest(unsigned char *digest, int len) { int i; - for (i = 0; i< len; i++){ - fprintf(stderr, "%02x", digest[i]); + for (i = 0; i< len; i++){ + fprintf(stderr, "%02x", digest[i]); if(i%2!=0) fprintf(stderr, " "); } - fprintf(stderr, "\n"); + fprintf(stderr, "\n"); } unsigned char * @@ -195,7 +195,7 @@ kex_hash( buffer_free(&b); #ifdef DEBUG_KEX - dump_digest(digest, evp_md->md_size); + dump_digest(digest, evp_md->md_size); #endif return digest; } @@ -339,7 +339,7 @@ choose_kex(Kex *k, char *client, char *server) k->name = get_match(client, server); if (k->name == NULL) fatal("no kex alg"); - if (strcmp(k->name, KEX_DH1) != 0) + if (strcmp(k->name, KEX_DH1) != 0) fatal("bad kex alg %s", k->name); } void diff --git a/usr.bin/ssh/log-client.c b/usr.bin/ssh/log-client.c index 9e20a313afc..1e3c162cb37 100644 --- a/usr.bin/ssh/log-client.c +++ b/usr.bin/ssh/log-client.c @@ -1,21 +1,21 @@ /* - * + * * log-client.c - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Mon Mar 20 21:13:40 1995 ylo - * + * * Client-side versions of debug(), log(), etc. These print to stderr. * This is a stripped down version of log-server.c. - * + * */ #include "includes.h" -RCSID("$Id: log-client.c,v 1.7 2000/02/27 18:50:09 deraadt Exp $"); +RCSID("$Id: log-client.c,v 1.8 2000/04/14 10:30:31 markus Exp $"); #include "xmalloc.h" #include "ssh.h" diff --git a/usr.bin/ssh/log-server.c b/usr.bin/ssh/log-server.c index a9145347474..81ba67371f0 100644 --- a/usr.bin/ssh/log-server.c +++ b/usr.bin/ssh/log-server.c @@ -1,21 +1,21 @@ /* - * + * * log-server.c - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Mon Mar 20 21:19:30 1995 ylo - * + * * Server-side versions of debug(), log(), etc. These normally send the output * to the system log. - * + * */ #include "includes.h" -RCSID("$Id: log-server.c,v 1.13 2000/03/28 20:26:21 markus Exp $"); +RCSID("$Id: log-server.c,v 1.14 2000/04/14 10:30:31 markus Exp $"); #include #include "packet.h" @@ -32,7 +32,7 @@ static int log_facility = LOG_AUTH; * level logging level */ -void +void log_init(char *av0, LogLevel level, SyslogFacility facility, int on_stderr) { switch (level) { diff --git a/usr.bin/ssh/login.c b/usr.bin/ssh/login.c index 574a9cc88c6..5669c46d474 100644 --- a/usr.bin/ssh/login.c +++ b/usr.bin/ssh/login.c @@ -1,24 +1,24 @@ /* - * + * * login.c - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Fri Mar 24 14:51:08 1995 ylo - * + * * This file performs some of the things login(1) normally does. We cannot * easily use something like login -p -h host -f user, because there are * several different logins around, and it is hard to determined what kind of * login the current system has. Also, we want to be able to execute commands * on a tty. - * + * */ #include "includes.h" -RCSID("$Id: login.c,v 1.11 2000/01/04 00:07:59 markus Exp $"); +RCSID("$Id: login.c,v 1.12 2000/04/14 10:30:31 markus Exp $"); #include #include @@ -35,7 +35,7 @@ RCSID("$Id: login.c,v 1.11 2000/01/04 00:07:59 markus Exp $"); * is found). The name of the host used last time is returned in buf. */ -unsigned long +unsigned long get_last_login_time(uid_t uid, const char *logname, char *buf, unsigned int bufsize) { @@ -67,7 +67,7 @@ get_last_login_time(uid_t uid, const char *logname, * were more standardized. */ -void +void record_login(int pid, const char *ttyname, const char *user, uid_t uid, const char *host, struct sockaddr * addr) { @@ -115,7 +115,7 @@ record_login(int pid, const char *ttyname, const char *user, uid_t uid, /* Records that the user has logged out. */ -void +void record_logout(int pid, const char *ttyname) { const char *line = ttyname + 5; /* /dev/ttyq8 -> ttyq8 */ diff --git a/usr.bin/ssh/match.c b/usr.bin/ssh/match.c index aadcfd6e940..00dff8a8613 100644 --- a/usr.bin/ssh/match.c +++ b/usr.bin/ssh/match.c @@ -1,20 +1,20 @@ /* - * + * * match.c - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Thu Jun 22 01:17:50 1995 ylo - * + * * Simple pattern matching, with '*' and '?' as wildcards. - * + * */ #include "includes.h" -RCSID("$Id: match.c,v 1.5 2000/03/23 22:15:33 markus Exp $"); +RCSID("$Id: match.c,v 1.6 2000/04/14 10:30:31 markus Exp $"); #include "ssh.h" @@ -23,7 +23,7 @@ RCSID("$Id: match.c,v 1.5 2000/03/23 22:15:33 markus Exp $"); * and * as wildcards), and zero if it does not match. */ -int +int match_pattern(const char *s, const char *pattern) { for (;;) { diff --git a/usr.bin/ssh/mpaux.c b/usr.bin/ssh/mpaux.c index f4f6033b8a4..3442070e41b 100644 --- a/usr.bin/ssh/mpaux.c +++ b/usr.bin/ssh/mpaux.c @@ -1,21 +1,21 @@ /* - * + * * mpaux.c - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Sun Jul 16 04:29:30 1995 ylo - * + * * This file contains various auxiliary functions related to multiple * precision integers. - * + * */ #include "includes.h" -RCSID("$Id: mpaux.c,v 1.11 2000/04/12 09:39:10 markus Exp $"); +RCSID("$Id: mpaux.c,v 1.12 2000/04/14 10:30:32 markus Exp $"); #include #include "getput.h" diff --git a/usr.bin/ssh/mpaux.h b/usr.bin/ssh/mpaux.h index 6b30fe03c4a..671fc511a92 100644 --- a/usr.bin/ssh/mpaux.h +++ b/usr.bin/ssh/mpaux.h @@ -1,19 +1,19 @@ /* - * + * * mpaux.h - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Sun Jul 16 04:29:30 1995 ylo - * + * * This file contains various auxiliary functions related to multiple * precision integers. */ -/* RCSID("$Id: mpaux.h,v 1.5 1999/11/24 19:53:48 markus Exp $"); */ +/* RCSID("$Id: mpaux.h,v 1.6 2000/04/14 10:30:32 markus Exp $"); */ #ifndef MPAUX_H #define MPAUX_H @@ -23,7 +23,7 @@ * session id is computed by concatenating the linearized, msb first * representations of host_key_n, session_key_n, and the cookie. */ -void +void compute_session_id(unsigned char session_id[16], unsigned char cookie[8], BIGNUM * host_key_n, diff --git a/usr.bin/ssh/nchan.c b/usr.bin/ssh/nchan.c index 3e30548c295..f592d487998 100644 --- a/usr.bin/ssh/nchan.c +++ b/usr.bin/ssh/nchan.c @@ -28,7 +28,7 @@ */ #include "includes.h" -RCSID("$Id: nchan.c,v 1.13 2000/04/03 07:07:15 markus Exp $"); +RCSID("$Id: nchan.c,v 1.14 2000/04/14 10:30:32 markus Exp $"); #include "ssh.h" @@ -389,11 +389,11 @@ chan_delete_if_full_closed2(Channel *c) if (!(c->flags & CHAN_CLOSE_SENT)) { chan_send_close2(c); } - if ((c->flags & CHAN_CLOSE_SENT) && + if ((c->flags & CHAN_CLOSE_SENT) && (c->flags & CHAN_CLOSE_RCVD)) { debug("channel %d: full closed2", c->self); channel_free(c->self); - } + } } } diff --git a/usr.bin/ssh/packet.c b/usr.bin/ssh/packet.c index af8824f3641..f886d2c8429 100644 --- a/usr.bin/ssh/packet.c +++ b/usr.bin/ssh/packet.c @@ -1,14 +1,14 @@ /* - * + * * packet.c - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Sat Mar 18 02:40:40 1995 ylo - * + * * This file contains code implementing the packet protocol and communication * with the other side. This same code is used both on client and server side. * @@ -17,7 +17,7 @@ */ #include "includes.h" -RCSID("$Id: packet.c,v 1.28 2000/04/14 10:09:15 markus Exp $"); +RCSID("$Id: packet.c,v 1.29 2000/04/14 10:30:32 markus Exp $"); #include "xmalloc.h" #include "buffer.h" @@ -521,7 +521,7 @@ packet_send2() unsigned int packet_length = 0; unsigned int i, padlen, len; u_int32_t rand = 0; - static unsigned int seqnr = 0; + static unsigned int seqnr = 0; int type; Enc *enc = NULL; Mac *mac = NULL; @@ -603,9 +603,9 @@ packet_send2() fprintf(stderr, "encrypted: "); buffer_dump(&output); #endif - /* increment sequence number for outgoing packets */ - if (++seqnr == 0) - log("outgoing seqnr wraps around"); + /* increment sequence number for outgoing packets */ + if (++seqnr == 0) + log("outgoing seqnr wraps around"); buffer_clear(&outgoing_packet); if (type == SSH2_MSG_NEWKEYS) { @@ -869,7 +869,7 @@ packet_read_poll2(int *payload_len_ptr) * compute MAC over seqnr and packet, * increment sequence number for incoming packet */ - if (mac && mac->enabled) { + if (mac && mac->enabled) { macbuf = hmac( mac->md, seqnr, (unsigned char *) buffer_ptr(&incoming_packet), buffer_len(&incoming_packet), @@ -880,8 +880,8 @@ packet_read_poll2(int *payload_len_ptr) DBG(debug("HMAC #%d ok", seqnr)); buffer_consume(&input, mac->mac_len); } - if (++seqnr == 0) - log("incoming seqnr wraps around"); + if (++seqnr == 0) + log("incoming seqnr wraps around"); /* get padlen */ cp = buffer_ptr(&incoming_packet) + 4; diff --git a/usr.bin/ssh/packet.h b/usr.bin/ssh/packet.h index 70fc0ddcdf4..ac96c505af4 100644 --- a/usr.bin/ssh/packet.h +++ b/usr.bin/ssh/packet.h @@ -1,19 +1,19 @@ /* - * + * * packet.h - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Sat Mar 18 02:02:14 1995 ylo - * + * * Interface for the packet protocol functions. - * + * */ -/* RCSID("$Id: packet.h,v 1.14 2000/04/14 10:09:15 markus Exp $"); */ +/* RCSID("$Id: packet.h,v 1.15 2000/04/14 10:30:32 markus Exp $"); */ #ifndef PACKET_H #define PACKET_H @@ -47,7 +47,7 @@ void packet_close(void); * key is used for both sending and reception. However, both directions are * encrypted independently of each other. Cipher types are defined in ssh.h. */ -void +void packet_set_encryption_key(const unsigned char *key, unsigned int keylen, int cipher_type); diff --git a/usr.bin/ssh/pty.c b/usr.bin/ssh/pty.c index 86da668286b..430f9e52950 100644 --- a/usr.bin/ssh/pty.c +++ b/usr.bin/ssh/pty.c @@ -1,20 +1,20 @@ /* - * + * * pty.c - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Fri Mar 17 04:37:25 1995 ylo - * + * * Allocating a pseudo-terminal, and making it the controlling tty. - * + * */ #include "includes.h" -RCSID("$Id: pty.c,v 1.12 2000/02/15 16:52:58 markus Exp $"); +RCSID("$Id: pty.c,v 1.13 2000/04/14 10:30:32 markus Exp $"); #include #include "pty.h" @@ -36,7 +36,7 @@ RCSID("$Id: pty.c,v 1.12 2000/02/15 16:52:58 markus Exp $"); * returned (the buffer must be able to hold at least 64 characters). */ -int +int pty_allocate(int *ptyfd, int *ttyfd, char *namebuf, int namebuflen) { #if defined(HAVE_OPENPTY) || defined(BSD4_4) @@ -174,7 +174,7 @@ pty_allocate(int *ptyfd, int *ttyfd, char *namebuf, int namebuflen) /* Releases the tty. Its ownership is returned to root, and permissions to 0666. */ -void +void pty_release(const char *ttyname) { if (chown(ttyname, (uid_t) 0, (gid_t) 0) < 0) @@ -185,7 +185,7 @@ pty_release(const char *ttyname) /* Makes the tty the processes controlling tty and sets it to sane modes. */ -void +void pty_make_controlling_tty(int *ttyfd, const char *ttyname) { int fd; @@ -238,7 +238,7 @@ pty_make_controlling_tty(int *ttyfd, const char *ttyname) /* Changes the window size associated with the pty. */ -void +void pty_change_window_size(int ptyfd, int row, int col, int xpixel, int ypixel) { diff --git a/usr.bin/ssh/pty.h b/usr.bin/ssh/pty.h index 7d8e09d0d86..a5f9cb22dcc 100644 --- a/usr.bin/ssh/pty.h +++ b/usr.bin/ssh/pty.h @@ -1,19 +1,19 @@ /* - * + * * pty.h - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Fri Mar 17 05:03:28 1995 ylo - * + * * Functions for allocating a pseudo-terminal and making it the controlling * tty. */ -/* RCSID("$Id: pty.h,v 1.5 2000/02/15 16:52:58 markus Exp $"); */ +/* RCSID("$Id: pty.h,v 1.6 2000/04/14 10:30:32 markus Exp $"); */ #ifndef PTY_H #define PTY_H @@ -39,7 +39,7 @@ void pty_release(const char *ttyname); void pty_make_controlling_tty(int *ttyfd, const char *ttyname); /* Changes the window size associated with the pty. */ -void +void pty_change_window_size(int ptyfd, int row, int col, int xpixel, int ypixel); diff --git a/usr.bin/ssh/radix.c b/usr.bin/ssh/radix.c index ea7f5ba2bca..84e390fd1d6 100644 --- a/usr.bin/ssh/radix.c +++ b/usr.bin/ssh/radix.c @@ -1,10 +1,10 @@ /* * radix.c - * + * * base-64 encoding pinched from lynx2-7-2, who pinched it from rpem. * Originally written by Mark Riordan 12 August 1990 and 17 Feb 1991 * and placed in the public domain. - * + * * Dug Song */ @@ -23,7 +23,7 @@ char six2pr[64] = { unsigned char pr2six[256]; -int +int uuencode(unsigned char *bufin, unsigned int nbytes, char *bufcoded) { /* ENC is the basic 1 character encoding function to make a char printing */ @@ -49,7 +49,7 @@ uuencode(unsigned char *bufin, unsigned int nbytes, char *bufcoded) return (outptr - bufcoded); } -int +int uudecode(const char *bufcoded, unsigned char *bufplain, int outbufsize) { /* single character decode */ @@ -162,7 +162,7 @@ typedef unsigned short my_u_short; } -int +int creds_to_radix(CREDENTIALS *creds, unsigned char *buf) { char *p, *s; @@ -216,7 +216,7 @@ creds_to_radix(CREDENTIALS *creds, unsigned char *buf) return (uuencode((unsigned char *)temp, len, (char *)buf)); } -int +int radix_to_creds(const char *buf, CREDENTIALS *creds) { diff --git a/usr.bin/ssh/readconf.c b/usr.bin/ssh/readconf.c index c735099b2be..f7f00dd9c2b 100644 --- a/usr.bin/ssh/readconf.c +++ b/usr.bin/ssh/readconf.c @@ -1,20 +1,20 @@ /* - * + * * readconf.c - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Sat Apr 22 00:03:10 1995 ylo - * + * * Functions for reading the configuration files. - * + * */ #include "includes.h" -RCSID("$Id: readconf.c,v 1.25 2000/04/12 07:45:44 markus Exp $"); +RCSID("$Id: readconf.c,v 1.26 2000/04/14 10:30:32 markus Exp $"); #include "ssh.h" #include "cipher.h" @@ -167,7 +167,7 @@ static struct { * error. */ -void +void add_local_forward(Options *options, u_short port, const char *host, u_short host_port) { @@ -188,7 +188,7 @@ add_local_forward(Options *options, u_short port, const char *host, * an error. */ -void +void add_remote_forward(Options *options, u_short port, const char *host, u_short host_port) { @@ -207,7 +207,7 @@ add_remote_forward(Options *options, u_short port, const char *host, * returns if the token is not known. */ -static OpCodes +static OpCodes parse_token(const char *cp, const char *filename, int linenum) { unsigned int i; @@ -567,7 +567,7 @@ parse_int: * there is an error. If the file does not exist, this returns immediately. */ -void +void read_config_file(const char *filename, const char *host, Options *options) { FILE *f; @@ -607,7 +607,7 @@ read_config_file(const char *filename, const char *host, Options *options) * system config file. Last, fill_default_options is called. */ -void +void initialize_options(Options * options) { memset(options, 'X', sizeof(*options)); @@ -658,7 +658,7 @@ initialize_options(Options * options) * options for which no value has been specified with their default values. */ -void +void fill_default_options(Options * options) { if (options->forward_agent == -1) diff --git a/usr.bin/ssh/readconf.h b/usr.bin/ssh/readconf.h index a88b36fbb90..3391e0ebaad 100644 --- a/usr.bin/ssh/readconf.h +++ b/usr.bin/ssh/readconf.h @@ -1,19 +1,19 @@ /* - * + * * readconf.h - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Sat Apr 22 00:25:29 1995 ylo - * + * * Functions for reading the configuration file. - * + * */ -/* RCSID("$Id: readconf.h,v 1.14 2000/04/12 07:45:44 markus Exp $"); */ +/* RCSID("$Id: readconf.h,v 1.15 2000/04/14 10:30:32 markus Exp $"); */ #ifndef READCONF_H #define READCONF_H @@ -106,7 +106,7 @@ void fill_default_options(Options * options); * only sets those values that have not already been set. Returns 0 for legal * options */ -int +int process_config_line(Options * options, const char *host, char *line, const char *filename, int linenum, int *activep); @@ -116,7 +116,7 @@ process_config_line(Options * options, const char *host, * should already be initialized before this call. This never returns if * there is an error. If the file does not exist, this returns immediately. */ -void +void read_config_file(const char *filename, const char *host, Options * options); @@ -124,7 +124,7 @@ read_config_file(const char *filename, const char *host, * Adds a local TCP/IP port forward to options. Never returns if there is an * error. */ -void +void add_local_forward(Options * options, u_short port, const char *host, u_short host_port); @@ -132,7 +132,7 @@ add_local_forward(Options * options, u_short port, const char *host, * Adds a remote TCP/IP port forward to options. Never returns if there is * an error. */ -void +void add_remote_forward(Options * options, u_short port, const char *host, u_short host_port); diff --git a/usr.bin/ssh/readpass.c b/usr.bin/ssh/readpass.c index deb37cab634..85d88f80461 100644 --- a/usr.bin/ssh/readpass.c +++ b/usr.bin/ssh/readpass.c @@ -32,7 +32,7 @@ */ #include "includes.h" -RCSID("$Id: readpass.c,v 1.9 2000/01/21 21:16:00 deraadt Exp $"); +RCSID("$Id: readpass.c,v 1.10 2000/04/14 10:30:32 markus Exp $"); #include "xmalloc.h" #include "ssh.h" @@ -58,7 +58,7 @@ read_passphrase(const char *prompt, int from_stdin) sigset_t oset, nset; struct sigaction sa, osa; int input, output, echo = 0; - + if (from_stdin) { input = STDIN_FILENO; output = STDERR_FILENO; diff --git a/usr.bin/ssh/rsa.c b/usr.bin/ssh/rsa.c index 955a3f5fd65..002c1cc4f8f 100644 --- a/usr.bin/ssh/rsa.c +++ b/usr.bin/ssh/rsa.c @@ -1,41 +1,41 @@ /* - * + * * rsa.c - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Fri Mar 3 22:07:06 1995 ylo - * + * * Description of the RSA algorithm can be found e.g. from the following sources: - * + * * Bruce Schneier: Applied Cryptography. John Wiley & Sons, 1994. - * + * * Jennifer Seberry and Josed Pieprzyk: Cryptography: An Introduction to * Computer Security. Prentice-Hall, 1989. - * + * * Man Young Rhee: Cryptography and Secure Data Communications. McGraw-Hill, * 1994. - * + * * R. Rivest, A. Shamir, and L. M. Adleman: Cryptographic Communications * System and Method. US Patent 4,405,829, 1983. - * + * * Hans Riesel: Prime Numbers and Computer Methods for Factorization. * Birkhauser, 1994. - * + * * The RSA Frequently Asked Questions document by RSA Data Security, Inc., 1995. - * + * * RSA in 3 lines of perl by Adam Back , 1995, as included * below: - * + * * [gone - had to be deleted - what a pity] - * + * */ #include "includes.h" -RCSID("$Id: rsa.c,v 1.13 2000/03/16 20:56:14 markus Exp $"); +RCSID("$Id: rsa.c,v 1.14 2000/04/14 10:30:32 markus Exp $"); #include "rsa.h" #include "ssh.h" diff --git a/usr.bin/ssh/rsa.h b/usr.bin/ssh/rsa.h index 5765d4aac36..16e319d4312 100644 --- a/usr.bin/ssh/rsa.h +++ b/usr.bin/ssh/rsa.h @@ -1,19 +1,19 @@ /* - * + * * rsa.h - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Fri Mar 3 22:01:06 1995 ylo - * + * * RSA key generation, encryption and decryption. - * + * */ -/* RCSID("$Id: rsa.h,v 1.5 2000/04/12 09:39:10 markus Exp $"); */ +/* RCSID("$Id: rsa.h,v 1.6 2000/04/14 10:30:32 markus Exp $"); */ #ifndef RSA_H #define RSA_H diff --git a/usr.bin/ssh/scp.c b/usr.bin/ssh/scp.c index 915ef97e7f3..8fb24964df2 100644 --- a/usr.bin/ssh/scp.c +++ b/usr.bin/ssh/scp.c @@ -1,13 +1,13 @@ /* - * + * * scp - secure remote copy. This is basically patched BSD rcp which uses ssh * to do the data transfer (instead of using rcmd). - * + * * NOTE: This version should NOT be suid root. (This uses ssh to do the transfer * and ssh has the necessary privileges.) - * + * * 1995 Timo Rinne , Tatu Ylonen - * + * */ /* @@ -45,7 +45,7 @@ */ #include "includes.h" -RCSID("$Id: scp.c,v 1.26 2000/03/16 20:56:14 markus Exp $"); +RCSID("$Id: scp.c,v 1.27 2000/04/14 10:30:32 markus Exp $"); #include "ssh.h" #include "xmalloc.h" @@ -109,7 +109,7 @@ char *port = NULL; * assigns the input and output file descriptors on success. */ -int +int do_cmd(char *host, char *remuser, char *cmd, int *fdin, int *fdout) { int pin[2], pout[2], reserved[2]; @@ -194,7 +194,7 @@ do_cmd(char *host, char *remuser, char *cmd, int *fdin, int *fdout) return 0; } -void +void fatal(const char *fmt,...) { va_list ap; @@ -257,10 +257,10 @@ main(argc, argv) switch (ch) { /* User-visible flags. */ case '4': - IPv4 = 1; + IPv4 = 1; break; case '6': - IPv6 = 1; + IPv6 = 1; break; case 'p': pflag = 1; @@ -1006,7 +1006,7 @@ run_err(const char *fmt,...) * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * - * $Id: scp.c,v 1.26 2000/03/16 20:56:14 markus Exp $ + * $Id: scp.c,v 1.27 2000/04/14 10:30:32 markus Exp $ */ char * diff --git a/usr.bin/ssh/servconf.c b/usr.bin/ssh/servconf.c index a67c440e61e..75ce330053c 100644 --- a/usr.bin/ssh/servconf.c +++ b/usr.bin/ssh/servconf.c @@ -1,18 +1,18 @@ /* - * + * * servconf.c - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Mon Aug 21 15:48:58 1995 ylo - * + * */ #include "includes.h" -RCSID("$Id: servconf.c,v 1.33 2000/04/12 07:45:44 markus Exp $"); +RCSID("$Id: servconf.c,v 1.34 2000/04/14 10:30:33 markus Exp $"); #include "ssh.h" #include "servconf.h" @@ -24,7 +24,7 @@ void add_listen_addr(ServerOptions *options, char *addr); /* Initializes the server options to their default values. */ -void +void initialize_server_options(ServerOptions *options) { memset(options, 0, sizeof(*options)); @@ -73,7 +73,7 @@ initialize_server_options(ServerOptions *options) options->protocol = SSH_PROTO_UNKNOWN; } -void +void fill_default_server_options(ServerOptions *options) { if (options->num_ports == 0) @@ -226,7 +226,7 @@ static struct { * returns if the token is not known. */ -static ServerOpCodes +static ServerOpCodes parse_token(const char *cp, const char *filename, int linenum) { @@ -244,7 +244,7 @@ parse_token(const char *cp, const char *filename, /* * add listen address */ -void +void add_listen_addr(ServerOptions *options, char *addr) { extern int IPv4or6; @@ -274,7 +274,7 @@ add_listen_addr(ServerOptions *options, char *addr) /* Reads the server configuration file. */ -void +void read_server_config(ServerOptions *options, const char *filename) { FILE *f; @@ -310,7 +310,7 @@ read_server_config(ServerOptions *options, const char *filename) "ListenAdress.\n", filename, linenum); if (options->num_ports >= MAX_PORTS) fatal("%s line %d: too many ports.\n", - filename, linenum); + filename, linenum); cp = strtok(NULL, WHITESPACE); if (!cp) fatal("%s line %d: missing port number.\n", diff --git a/usr.bin/ssh/servconf.h b/usr.bin/ssh/servconf.h index f4abace337b..e7623fae7d0 100644 --- a/usr.bin/ssh/servconf.h +++ b/usr.bin/ssh/servconf.h @@ -1,19 +1,19 @@ /* - * + * * servconf.h - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Mon Aug 21 15:35:03 1995 ylo - * + * * Definitions for server configuration data and for the functions reading it. - * + * */ -/* RCSID("$Id: servconf.h,v 1.17 2000/04/12 07:45:44 markus Exp $"); */ +/* RCSID("$Id: servconf.h,v 1.18 2000/04/14 10:30:33 markus Exp $"); */ #ifndef SERVCONF_H #define SERVCONF_H diff --git a/usr.bin/ssh/serverloop.c b/usr.bin/ssh/serverloop.c index 72f6c2ac72a..b482c228ef4 100644 --- a/usr.bin/ssh/serverloop.c +++ b/usr.bin/ssh/serverloop.c @@ -54,7 +54,7 @@ static volatile int child_wait_status; /* Status from wait(). */ void server_init_dispatch(void); -void +void sigchld_handler(int sig) { int save_errno = errno; @@ -72,7 +72,7 @@ sigchld_handler(int sig) signal(SIGCHLD, sigchld_handler); errno = save_errno; } -void +void sigchld_handler2(int sig) { int save_errno = errno; @@ -86,7 +86,7 @@ sigchld_handler2(int sig) * Make packets from buffered stderr data, and buffer it for sending * to the client. */ -void +void make_packets_from_stderr_data() { int len; @@ -115,7 +115,7 @@ make_packets_from_stderr_data() * Make packets from buffered stdout data, and buffer it for sending to the * client. */ -void +void make_packets_from_stdout_data() { int len; @@ -146,7 +146,7 @@ make_packets_from_stdout_data() * have data or can accept data. Optionally, a maximum time can be specified * for the duration of the wait (0 = infinite). */ -void +void wait_until_can_do_something(fd_set * readset, fd_set * writeset, unsigned int max_time_milliseconds) { @@ -237,7 +237,7 @@ retry_select: * Processes input from the client and the program. Input data is stored * in buffers and processed later. */ -void +void process_input(fd_set * readset) { int len; @@ -290,7 +290,7 @@ process_input(fd_set * readset) /* * Sends data from internal buffers to client program stdin. */ -void +void process_output(fd_set * writeset) { int len; @@ -325,7 +325,7 @@ process_output(fd_set * writeset) * Wait until all buffered output has been sent to the client. * This is used when the program terminates. */ -void +void drain_output() { /* Send any buffered stdout data to the client. */ @@ -350,7 +350,7 @@ drain_output() packet_write_wait(); } -void +void process_buffered_input_packets() { dispatch_run(DISPATCH_NONBLOCK, NULL); @@ -363,7 +363,7 @@ process_buffered_input_packets() * stdin (of the child program), and reads from stdout and stderr (of the * child program). */ -void +void server_loop(int pid, int fdin_arg, int fdout_arg, int fderr_arg) { int wait_status, wait_pid; /* Status and pid returned by wait(). */ @@ -591,7 +591,7 @@ server_loop(int pid, int fdin_arg, int fdout_arg, int fderr_arg) /* NOTREACHED */ } -void +void server_loop2(void) { fd_set readset, writeset; @@ -702,7 +702,7 @@ input_direct_tcpip(void) sock, sock, -1, 4*1024, 32*1024, 0, xstrdup("direct-tcpip")); } -void +void server_input_channel_open(int type, int plen) { Channel *c = NULL; @@ -772,7 +772,7 @@ server_input_channel_open(int type, int plen) xfree(ctype); } -void +void server_init_dispatch_20() { debug("server_init_dispatch_20"); @@ -787,7 +787,7 @@ server_init_dispatch_20() dispatch_set(SSH2_MSG_CHANNEL_REQUEST, &channel_input_channel_request); dispatch_set(SSH2_MSG_CHANNEL_WINDOW_ADJUST, &channel_input_window_adjust); } -void +void server_init_dispatch_13() { debug("server_init_dispatch_13"); @@ -802,7 +802,7 @@ server_init_dispatch_13() dispatch_set(SSH_MSG_CHANNEL_OPEN_FAILURE, &channel_input_open_failure); dispatch_set(SSH_MSG_PORT_OPEN, &channel_input_port_open); } -void +void server_init_dispatch_15() { server_init_dispatch_13(); @@ -810,7 +810,7 @@ server_init_dispatch_15() dispatch_set(SSH_MSG_CHANNEL_CLOSE, &channel_input_ieof); dispatch_set(SSH_MSG_CHANNEL_CLOSE_CONFIRMATION, &channel_input_oclose); } -void +void server_init_dispatch() { if (compat20) diff --git a/usr.bin/ssh/session.c b/usr.bin/ssh/session.c index 3849dac6ee2..e21988509c5 100644 --- a/usr.bin/ssh/session.c +++ b/usr.bin/ssh/session.c @@ -8,7 +8,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: session.c,v 1.3 2000/04/14 10:09:16 markus Exp $"); +RCSID("$OpenBSD: session.c,v 1.4 2000/04/14 10:30:33 markus Exp $"); #include "xmalloc.h" #include "ssh.h" @@ -113,7 +113,7 @@ xauthfile_cleanup_proc(void *ignore) * Function to perform cleanup if we get aborted abnormally (e.g., due to a * dropped connection). */ -void +void pty_cleanup_proc(void *session) { Session *s=session; @@ -136,7 +136,7 @@ pty_cleanup_proc(void *session) * terminals are allocated, X11, TCP/IP, and authentication agent forwardings * are requested, etc. */ -void +void do_authenticated(struct passwd * pw) { Session *s; @@ -366,7 +366,7 @@ do_authenticated(struct passwd * pw) * will call do_child from the child, and server_loop from the parent after * setting up file descriptors and such. */ -void +void do_exec_no_pty(Session *s, const char *command, struct passwd * pw) { int pid; @@ -483,7 +483,7 @@ do_exec_no_pty(Session *s, const char *command, struct passwd * pw) * setting up file descriptors, controlling tty, updating wtmp, utmp, * lastlog, and other such operations. */ -void +void do_exec_pty(Session *s, const char *command, struct passwd * pw) { FILE *f; @@ -646,7 +646,7 @@ do_exec_pty(Session *s, const char *command, struct passwd * pw) * Sets the value of the given variable in the environment. If the variable * already exists, its value is overriden. */ -void +void child_set_env(char ***envp, unsigned int *envsizep, const char *name, const char *value) { @@ -687,7 +687,7 @@ child_set_env(char ***envp, unsigned int *envsizep, const char *name, * Otherwise, it must consist of empty lines, comments (line starts with '#') * and assignments of the form name=value. No other forms are allowed. */ -void +void read_environment_file(char ***env, unsigned int *envsize, const char *filename) { @@ -724,7 +724,7 @@ read_environment_file(char ***env, unsigned int *envsize, * environment, closing extra file descriptors, setting the user and group * ids, and executing the command or shell. */ -void +void do_child(const char *command, struct passwd * pw, const char *term, const char *display, const char *auth_proto, const char *auth_data, const char *ttyname) diff --git a/usr.bin/ssh/ssh-agent.c b/usr.bin/ssh/ssh-agent.c index c3cbe0279a4..d5608c5e75d 100644 --- a/usr.bin/ssh/ssh-agent.c +++ b/usr.bin/ssh/ssh-agent.c @@ -1,4 +1,4 @@ -/* $OpenBSD: ssh-agent.c,v 1.27 2000/04/12 09:39:10 markus Exp $ */ +/* $OpenBSD: ssh-agent.c,v 1.28 2000/04/14 10:30:33 markus Exp $ */ /* * Author: Tatu Ylonen @@ -9,7 +9,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: ssh-agent.c,v 1.27 2000/04/12 09:39:10 markus Exp $"); +RCSID("$OpenBSD: ssh-agent.c,v 1.28 2000/04/14 10:30:33 markus Exp $"); #include "ssh.h" #include "rsa.h" @@ -403,7 +403,7 @@ prepare_select(fd_set *readset, fd_set *writeset) } } -void +void after_select(fd_set *readset, fd_set *writeset) { unsigned int i; @@ -637,8 +637,8 @@ main(int ac, char **av) } signal(SIGINT, SIG_IGN); signal(SIGPIPE, SIG_IGN); - signal(SIGHUP, cleanup_exit); - signal(SIGTERM, cleanup_exit); + signal(SIGHUP, cleanup_exit); + signal(SIGTERM, cleanup_exit); while (1) { FD_ZERO(&readset); FD_ZERO(&writeset); diff --git a/usr.bin/ssh/ssh-keygen.c b/usr.bin/ssh/ssh-keygen.c index 29a967dbf48..a8516c9b1ff 100644 --- a/usr.bin/ssh/ssh-keygen.c +++ b/usr.bin/ssh/ssh-keygen.c @@ -7,7 +7,7 @@ */ #include "includes.h" -RCSID("$Id: ssh-keygen.c,v 1.17 2000/03/16 20:56:14 markus Exp $"); +RCSID("$Id: ssh-keygen.c,v 1.18 2000/04/14 10:30:33 markus Exp $"); #include "rsa.h" #include "ssh.h" @@ -504,7 +504,7 @@ passphrase_again: if (identity_comment) { strlcpy(comment, identity_comment, sizeof(comment)); } else { - /* Create default commend field for the passphrase. */ + /* Create default commend field for the passphrase. */ if (gethostname(hostname, sizeof(hostname)) < 0) { perror("gethostname"); exit(1); diff --git a/usr.bin/ssh/ssh.c b/usr.bin/ssh/ssh.c index b598fa77483..850e1e528f4 100644 --- a/usr.bin/ssh/ssh.c +++ b/usr.bin/ssh/ssh.c @@ -11,7 +11,7 @@ */ #include "includes.h" -RCSID("$Id: ssh.c,v 1.47 2000/04/14 10:11:12 markus Exp $"); +RCSID("$Id: ssh.c,v 1.48 2000/04/14 10:30:33 markus Exp $"); #include "xmalloc.h" #include "ssh.h" @@ -242,8 +242,8 @@ main(int ac, char **av) if (host) break; if ((cp = strchr(av[optind], '@'))) { - if(cp == av[optind]) - usage(); + if(cp == av[optind]) + usage(); options.user = av[optind]; *cp = '\0'; host = ++cp; @@ -270,40 +270,31 @@ main(int ac, char **av) case '2': options.protocol = SSH_PROTO_2; break; - case '4': IPv4or6 = AF_INET; break; - case '6': IPv4or6 = AF_INET6; break; - case 'n': stdin_null_flag = 1; break; - case 'f': fork_after_authentication_flag = 1; stdin_null_flag = 1; break; - case 'x': options.forward_x11 = 0; break; - case 'X': options.forward_x11 = 1; break; - case 'g': options.gateway_ports = 1; break; - case 'P': options.use_privileged_port = 0; break; - case 'a': options.forward_agent = 0; break; @@ -325,11 +316,9 @@ main(int ac, char **av) options.identity_files[options.num_identity_files++] = xstrdup(optarg); break; - case 't': tty_flag = 1; break; - case 'v': case 'V': fprintf(stderr, "SSH Version %s, protocol versions %d.%d/%d.%d.\n", @@ -342,11 +331,9 @@ main(int ac, char **av) debug_flag = 1; options.log_level = SYSLOG_LEVEL_DEBUG; break; - case 'q': options.log_level = SYSLOG_LEVEL_QUIET; break; - case 'e': if (optarg[0] == '^' && optarg[2] == 0 && (unsigned char) optarg[1] >= 64 && (unsigned char) optarg[1] < 128) @@ -360,7 +347,6 @@ main(int ac, char **av) exit(1); } break; - case 'c': options.cipher = cipher_number(optarg); if (options.cipher == -1) { @@ -368,15 +354,12 @@ main(int ac, char **av) exit(1); } break; - case 'p': options.port = atoi(optarg); break; - case 'l': options.user = optarg; break; - case 'R': if (sscanf(optarg, "%hu/%255[^/]/%hu", &fwd_port, buf, &fwd_host_port) != 3 && @@ -388,7 +371,6 @@ main(int ac, char **av) } add_remote_forward(&options, fwd_port, buf, fwd_host_port); break; - case 'L': if (sscanf(optarg, "%hu/%255[^/]/%hu", &fwd_port, buf, &fwd_host_port) != 3 && @@ -400,27 +382,22 @@ main(int ac, char **av) } add_local_forward(&options, fwd_port, buf, fwd_host_port); break; - case 'C': options.compression = 1; break; - case 'N': no_shell_flag = 1; no_tty_flag = 1; break; - case 'T': no_tty_flag = 1; break; - case 'o': dummy = 1; if (process_config_line(&options, host ? host : "", optarg, "command-line", 0, &dummy) != 0) exit(1); break; - default: usage(); } @@ -631,7 +608,7 @@ main(int ac, char **av) /* Expand ~ in known host file names. */ options.system_hostfile = tilde_expand_filename(options.system_hostfile, - original_real_uid); + original_real_uid); options.user_hostfile = tilde_expand_filename(options.user_hostfile, original_real_uid); @@ -800,7 +777,7 @@ ssh_session(void) options.local_forwards[i].host, options.local_forwards[i].host_port); channel_request_local_forwarding(options.local_forwards[i].port, - options.local_forwards[i].host, + options.local_forwards[i].host, options.local_forwards[i].host_port, options.gateway_ports); } @@ -813,11 +790,11 @@ ssh_session(void) options.remote_forwards[i].host_port); channel_request_remote_forwarding(options.remote_forwards[i].port, options.remote_forwards[i].host, - options.remote_forwards[i].host_port); + options.remote_forwards[i].host_port); } /* If requested, let ssh continue in the background. */ - if (fork_after_authentication_flag) + if (fork_after_authentication_flag) if (daemon(1, 1) < 0) fatal("daemon() failed: %.200s", strerror(errno)); @@ -856,7 +833,7 @@ init_local_fwd(void) options.local_forwards[i].host, options.local_forwards[i].host_port); channel_request_local_forwarding(options.local_forwards[i].port, - options.local_forwards[i].host, + options.local_forwards[i].host, options.local_forwards[i].host_port, options.gateway_ports); } diff --git a/usr.bin/ssh/ssh.h b/usr.bin/ssh/ssh.h index 2c1d443e0c1..12cd6b84e00 100644 --- a/usr.bin/ssh/ssh.h +++ b/usr.bin/ssh/ssh.h @@ -1,19 +1,19 @@ /* - * + * * ssh.h - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Fri Mar 17 17:09:37 1995 ylo - * + * * Generic header file for ssh. - * + * */ -/* RCSID("$Id: ssh.h,v 1.37 2000/04/12 07:45:44 markus Exp $"); */ +/* RCSID("$Id: ssh.h,v 1.38 2000/04/14 10:30:33 markus Exp $"); */ #ifndef SSH_H #define SSH_H @@ -254,7 +254,7 @@ * information is not available. This must be called before record_login. * The host from which the user logged in is stored in buf. */ -unsigned long +unsigned long get_last_login_time(uid_t uid, const char *logname, char *buf, unsigned int bufsize); @@ -262,7 +262,7 @@ get_last_login_time(uid_t uid, const char *logname, * Records that the user has logged in. This does many things normally done * by login(1). */ -void +void record_login(int pid, const char *ttyname, const char *user, uid_t uid, const char *host, struct sockaddr *addr); @@ -283,7 +283,7 @@ void record_logout(int pid, const char *ttyname); * and zero on failure. If the connection is successful, this calls * packet_set_connection for the connection. */ -int +int ssh_connect(const char *host, struct sockaddr_storage * hostaddr, u_short port, int connection_attempts, int anonymous, uid_t original_real_uid, @@ -298,7 +298,7 @@ ssh_connect(const char *host, struct sockaddr_storage * hostaddr, * references from the packet module). */ -void +void ssh_login(int host_key_valid, RSA * host_key, const char *host, struct sockaddr * hostaddr, uid_t original_real_uid); @@ -315,7 +315,7 @@ int auth_rhosts(struct passwd * pw, const char *client_user); * Tries to authenticate the user using the .rhosts file and the host using * its host key. Returns true if authentication succeeds. */ -int +int auth_rhosts_rsa(struct passwd * pw, const char *client_user, RSA* client_host_key); /* @@ -384,7 +384,7 @@ char *read_passphrase(const char *prompt, int from_stdin); * precede the key to provide identification of the key without needing a * passphrase. */ -int +int save_private_key(const char *filename, const char *passphrase, RSA * private_key, const char *comment); @@ -394,7 +394,7 @@ save_private_key(const char *filename, const char *passphrase, * comment of the key is returned in comment_return if it is non-NULL; the * caller must free the value with xfree. */ -int +int load_public_key(const char *filename, RSA * pub, char **comment_return); @@ -405,7 +405,7 @@ load_public_key(const char *filename, RSA * pub, * comment_return if it is non-NULL; the caller must free the value with * xfree. */ -int +int load_private_key(const char *filename, const char *passphrase, RSA * private_key, char **comment_return); diff --git a/usr.bin/ssh/ssh2.h b/usr.bin/ssh/ssh2.h index cc659f8470b..cf684bacf96 100644 --- a/usr.bin/ssh/ssh2.h +++ b/usr.bin/ssh/ssh2.h @@ -1,31 +1,31 @@ /* - * draft-ietf-secsh-architecture-04.txt + * draft-ietf-secsh-architecture-04.txt * * Transport layer protocol: - * + * * 1-19 Transport layer generic (e.g. disconnect, ignore, debug, * etc) * 20-29 Algorithm negotiation * 30-49 Key exchange method specific (numbers can be reused for * different authentication methods) - * + * * User authentication protocol: - * + * * 50-59 User authentication generic * 60-79 User authentication method specific (numbers can be reused * for different authentication methods) - * + * * Connection protocol: - * + * * 80-89 Connection protocol generic * 90-127 Channel related messages - * + * * Reserved for client protocols: - * + * * 128-191 Reserved - * + * * Local extensions: - * + * * 192-255 Local extensions */ diff --git a/usr.bin/ssh/sshconnect.c b/usr.bin/ssh/sshconnect.c index cecd304c348..4e39eab45cc 100644 --- a/usr.bin/ssh/sshconnect.c +++ b/usr.bin/ssh/sshconnect.c @@ -10,7 +10,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: sshconnect.c,v 1.67 2000/04/14 10:09:16 markus Exp $"); +RCSID("$OpenBSD: sshconnect.c,v 1.68 2000/04/14 10:30:33 markus Exp $"); #include #include "xmalloc.h" @@ -243,7 +243,7 @@ ssh_connect(const char *host, struct sockaddr_storage * hostaddr, debug("Trying again..."); /* Loop through addresses for this host, and try each one in - sequence until the connection succeeds. */ + sequence until the connection succeeds. */ for (ai = aitop; ai; ai = ai->ai_next) { if (ai->ai_family != AF_INET && ai->ai_family != AF_INET6) continue; @@ -257,7 +257,7 @@ ssh_connect(const char *host, struct sockaddr_storage * hostaddr, host, ntop, strport); /* Create a socket for connecting. */ - sock = ssh_create_socket(original_real_uid, + sock = ssh_create_socket(original_real_uid, !anonymous && geteuid() == 0 && port < IPPORT_RESERVED, ai->ai_family); if (sock < 0) @@ -1052,7 +1052,7 @@ ssh_exchange_identification() break; } /* FALLTHROUGH */ - default: + default: mismatch = 1; break; } @@ -1352,13 +1352,13 @@ ssh_kex2(char *host, struct sockaddr *hostaddr) debug("Sending KEX init."); if (options.ciphers != NULL) { - myproposal[PROPOSAL_ENC_ALGS_CTOS] = + myproposal[PROPOSAL_ENC_ALGS_CTOS] = myproposal[PROPOSAL_ENC_ALGS_STOC] = options.ciphers; } else if ( options.cipher == SSH_CIPHER_ARCFOUR || - options.cipher == SSH_CIPHER_3DES_CBC || - options.cipher == SSH_CIPHER_CAST128_CBC || - options.cipher == SSH_CIPHER_BLOWFISH_CBC) { + options.cipher == SSH_CIPHER_3DES_CBC || + options.cipher == SSH_CIPHER_CAST128_CBC || + options.cipher == SSH_CIPHER_BLOWFISH_CBC) { myproposal[PROPOSAL_ENC_ALGS_CTOS] = myproposal[PROPOSAL_ENC_ALGS_STOC] = cipher_name(options.cipher); } @@ -1424,7 +1424,7 @@ ssh_kex2(char *host, struct sockaddr *hostaddr) fprintf(stderr, "\npub= "); bignum_print(dh->pub_key); fprintf(stderr, "\n"); - DHparams_print_fp(stderr, dh); + DHparams_print_fp(stderr, dh); #endif debug("Wait SSH2_MSG_KEXDH_REPLY."); @@ -1466,14 +1466,14 @@ ssh_kex2(char *host, struct sockaddr *hostaddr) kout = DH_compute_key(kbuf, dh_server_pub, dh); #ifdef DEBUG_KEXDH debug("shared secret: len %d/%d", klen, kout); - fprintf(stderr, "shared secret == "); - for (i = 0; i< kout; i++) - fprintf(stderr, "%02x", (kbuf[i])&0xff); - fprintf(stderr, "\n"); + fprintf(stderr, "shared secret == "); + for (i = 0; i< kout; i++) + fprintf(stderr, "%02x", (kbuf[i])&0xff); + fprintf(stderr, "\n"); #endif - shared_secret = BN_new(); + shared_secret = BN_new(); - BN_bin2bn(kbuf, kout, shared_secret); + BN_bin2bn(kbuf, kout, shared_secret); memset(kbuf, 0, klen); xfree(kbuf); @@ -1493,10 +1493,10 @@ ssh_kex2(char *host, struct sockaddr *hostaddr) xfree(client_kexinit); xfree(server_kexinit); #ifdef DEBUG_KEXDH - fprintf(stderr, "hash == "); - for (i = 0; i< 20; i++) - fprintf(stderr, "%02x", (hash[i])&0xff); - fprintf(stderr, "\n"); + fprintf(stderr, "hash == "); + for (i = 0; i< 20; i++) + fprintf(stderr, "%02x", (hash[i])&0xff); + fprintf(stderr, "\n"); #endif dsa_verify(server_host_key, (unsigned char *)signature, slen, hash, 20); key_free(server_host_key); diff --git a/usr.bin/ssh/sshd.c b/usr.bin/ssh/sshd.c index 4400c72031c..3abee5e8cef 100644 --- a/usr.bin/ssh/sshd.c +++ b/usr.bin/ssh/sshd.c @@ -14,7 +14,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: sshd.c,v 1.104 2000/04/12 09:39:10 markus Exp $"); +RCSID("$OpenBSD: sshd.c,v 1.105 2000/04/14 10:30:33 markus Exp $"); #include "xmalloc.h" #include "rsa.h" @@ -58,7 +58,7 @@ ServerOptions options; /* Name of the server configuration file. */ char *config_file_name = SERVER_CONFIG_FILE; -/* +/* * Flag indicating whether IPv4 or IPv6. This can be set on the command line. * Default value is AF_UNSPEC means both IPv4 and IPv6. */ @@ -149,7 +149,7 @@ close_listen_socks(void) * the effect is to reread the configuration file (and to regenerate * the server key). */ -void +void sighup_handler(int sig) { received_sighup = 1; @@ -160,7 +160,7 @@ sighup_handler(int sig) * Called from the main program after receiving SIGHUP. * Restarts the server. */ -void +void sighup_restart() { log("Received SIGHUP; restarting."); @@ -175,7 +175,7 @@ sighup_restart() * These close the listen socket; not closing it seems to cause "Address * already in use" problems on some machines, which is inconvenient. */ -void +void sigterm_handler(int sig) { log("Received signal %d; terminating.", sig); @@ -187,7 +187,7 @@ sigterm_handler(int sig) * SIGCHLD handler. This is called whenever a child dies. This will then * reap any zombies left by exited c. */ -void +void main_sigchld_handler(int sig) { int save_errno = errno; @@ -203,7 +203,7 @@ main_sigchld_handler(int sig) /* * Signal handler for the alarm after the login grace period has expired. */ -void +void grace_alarm_handler(int sig) { /* Close the connection. */ @@ -220,7 +220,7 @@ grace_alarm_handler(int sig) * Thus there should be no concurrency control/asynchronous execution * problems. */ -void +void key_regeneration_alarm(int sig) { int save_errno = errno; @@ -253,15 +253,15 @@ key_regeneration_alarm(int sig) char * chop(char *s) { - char *t = s; - while (*t) { - if(*t == '\n' || *t == '\r') { - *t = '\0'; - return s; - } - t++; - } - return s; + char *t = s; + while (*t) { + if(*t == '\n' || *t == '\r') { + *t = '\0'; + return s; + } + t++; + } + return s; } @@ -324,7 +324,7 @@ sshd_exchange_identification(int sock_in, int sock_out) */ if (sscanf(client_version_string, "SSH-%d.%d-%[^\n]\n", &remote_major, &remote_minor, remote_version) != 3) { - s = "Protocol mismatch.\n"; + s = "Protocol mismatch.\n"; (void) atomicio(write, sock_out, s, strlen(s)); close(sock_in); close(sock_out); @@ -364,7 +364,7 @@ sshd_exchange_identification(int sock_in, int sock_out) break; } /* FALLTHROUGH */ - default: + default: mismatch = 1; break; } @@ -705,8 +705,8 @@ main(int ac, char **av) for (i = 0; i < num_listen_socks; i++) if (listen_socks[i] > maxfd) maxfd = listen_socks[i]; - fdsetsz = howmany(maxfd, NFDBITS) * sizeof(fd_mask); - fdset = (fd_set *)xmalloc(fdsetsz); + fdsetsz = howmany(maxfd, NFDBITS) * sizeof(fd_mask); + fdset = (fd_set *)xmalloc(fdsetsz); /* * Stay listening for connections until the system crashes or @@ -999,7 +999,7 @@ do_ssh1_kex() /* Get cipher type and check whether we accept this. */ cipher_type = packet_get_char(); - if (!(cipher_mask() & (1 << cipher_type))) + if (!(cipher_mask() & (1 << cipher_type))) packet_disconnect("Warning: client selects unsupported cipher."); /* Get check bytes from the packet. These must match those we @@ -1126,7 +1126,7 @@ do_ssh2_kex() /* KEXINIT */ if (options.ciphers != NULL) { - myproposal[PROPOSAL_ENC_ALGS_CTOS] = + myproposal[PROPOSAL_ENC_ALGS_CTOS] = myproposal[PROPOSAL_ENC_ALGS_STOC] = options.ciphers; } @@ -1239,10 +1239,10 @@ do_ssh2_kex() xfree(client_kexinit); xfree(server_kexinit); #ifdef DEBUG_KEXDH - fprintf(stderr, "hash == "); - for (i = 0; i< 20; i++) - fprintf(stderr, "%02x", (hash[i])&0xff); - fprintf(stderr, "\n"); + fprintf(stderr, "hash == "); + for (i = 0; i< 20; i++) + fprintf(stderr, "%02x", (hash[i])&0xff); + fprintf(stderr, "\n"); #endif /* sign H */ dsa_sign(server_host_key, &signature, &slen, hash, 20); diff --git a/usr.bin/ssh/ttymodes.c b/usr.bin/ssh/ttymodes.c index 309885efb4c..25f50134942 100644 --- a/usr.bin/ssh/ttymodes.c +++ b/usr.bin/ssh/ttymodes.c @@ -10,7 +10,7 @@ */ #include "includes.h" -RCSID("$Id: ttymodes.c,v 1.5 1999/11/24 19:53:54 markus Exp $"); +RCSID("$Id: ttymodes.c,v 1.6 2000/04/14 10:30:34 markus Exp $"); #include "packet.h" #include "ssh.h" @@ -23,7 +23,7 @@ RCSID("$Id: ttymodes.c,v 1.5 1999/11/24 19:53:54 markus Exp $"); * Converts POSIX speed_t to a baud rate. The values of the * constants for speed_t are not themselves portable. */ -static int +static int speed_to_baud(speed_t speed) { switch (speed) { @@ -112,7 +112,7 @@ speed_to_baud(speed_t speed) /* * Converts a numeric baud rate to a POSIX speed_t. */ -static speed_t +static speed_t baud_to_speed(int baud) { switch (baud) { @@ -203,7 +203,7 @@ baud_to_speed(int baud) * in a portable manner, and appends the modes to a packet * being constructed. */ -void +void tty_make_modes(int fd) { struct termios tio; @@ -247,7 +247,7 @@ tty_make_modes(int fd) * Decodes terminal modes for the terminal referenced by fd in a portable * manner from a packet being read. */ -void +void tty_parse_modes(int fd, int *n_bytes_ptr) { struct termios tio; diff --git a/usr.bin/ssh/ttymodes.h b/usr.bin/ssh/ttymodes.h index 433ff73efa8..f8243f61f87 100644 --- a/usr.bin/ssh/ttymodes.h +++ b/usr.bin/ssh/ttymodes.h @@ -1,18 +1,18 @@ /* - * + * * ttymodes.h - * + * * Author: Tatu Ylonen * SGTTY stuff contributed by Janne Snabb - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Tue Mar 21 15:42:09 1995 ylo - * + * */ -/* RCSID("$Id: ttymodes.h,v 1.6 1999/11/24 19:53:54 markus Exp $"); */ +/* RCSID("$Id: ttymodes.h,v 1.7 2000/04/14 10:30:34 markus Exp $"); */ /* The tty mode description is a stream of bytes. The stream consists of * opcode-arguments pairs. It is terminated by opcode TTY_OP_END (0). diff --git a/usr.bin/ssh/uidswap.c b/usr.bin/ssh/uidswap.c index aebff0c73c8..20f04cf9bdc 100644 --- a/usr.bin/ssh/uidswap.c +++ b/usr.bin/ssh/uidswap.c @@ -7,7 +7,7 @@ */ #include "includes.h" -RCSID("$Id: uidswap.c,v 1.5 1999/11/24 19:53:54 markus Exp $"); +RCSID("$Id: uidswap.c,v 1.6 2000/04/14 10:30:34 markus Exp $"); #include "ssh.h" #include "uidswap.h" @@ -34,7 +34,7 @@ static uid_t saved_euid = 0; * Temporarily changes to the given uid. If the effective user * id is not root, this does nothing. This call cannot be nested. */ -void +void temporarily_use_uid(uid_t uid) { #ifdef SAVED_IDS_WORK_WITH_SETEUID @@ -58,7 +58,7 @@ temporarily_use_uid(uid_t uid) /* * Restores to the original uid. */ -void +void restore_uid() { #ifdef SAVED_IDS_WORK_WITH_SETEUID @@ -79,7 +79,7 @@ restore_uid() * Permanently sets all uids to the given uid. This cannot be * called while temporarily_use_uid is effective. */ -void +void permanently_set_uid(uid_t uid) { if (setuid(uid) < 0) diff --git a/usr.bin/ssh/uidswap.h b/usr.bin/ssh/uidswap.h index 4755710dea9..c08a3700461 100644 --- a/usr.bin/ssh/uidswap.h +++ b/usr.bin/ssh/uidswap.h @@ -1,15 +1,15 @@ /* - * + * * uidswap.h - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Sat Sep 9 01:43:15 1995 ylo * Last modified: Sat Sep 9 02:34:04 1995 ylo - * + * */ #ifndef UIDSWAP_H diff --git a/usr.bin/ssh/xmalloc.c b/usr.bin/ssh/xmalloc.c index afcdbd97cab..31550991a2b 100644 --- a/usr.bin/ssh/xmalloc.c +++ b/usr.bin/ssh/xmalloc.c @@ -8,7 +8,7 @@ */ #include "includes.h" -RCSID("$Id: xmalloc.c,v 1.5 1999/11/24 00:26:04 deraadt Exp $"); +RCSID("$Id: xmalloc.c,v 1.6 2000/04/14 10:30:34 markus Exp $"); #include "ssh.h" @@ -34,7 +34,7 @@ xrealloc(void *ptr, size_t new_size) return new_ptr; } -void +void xfree(void *ptr) { if (ptr == NULL) diff --git a/usr.bin/ssh/xmalloc.h b/usr.bin/ssh/xmalloc.h index ec49eb1af49..31291ea4ace 100644 --- a/usr.bin/ssh/xmalloc.h +++ b/usr.bin/ssh/xmalloc.h @@ -1,20 +1,20 @@ /* - * + * * xmalloc.h - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Mon Mar 20 22:09:17 1995 ylo - * + * * Versions of malloc and friends that check their results, and never return * failure (they call fatal if they encounter an error). - * + * */ -/* RCSID("$Id: xmalloc.h,v 1.2 1999/11/24 00:26:04 deraadt Exp $"); */ +/* RCSID("$Id: xmalloc.h,v 1.3 2000/04/14 10:30:34 markus Exp $"); */ #ifndef XMALLOC_H #define XMALLOC_H -- 2.20.1