summaryrefslogtreecommitdiff
path: root/auth-options.c
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2006-07-24 14:01:43 +1000
committerDamien Miller <djm@mindrot.org>2006-07-24 14:01:43 +1000
commit98299261eb970688a7bad346491cffdf2a7f6072 (patch)
tree350cae6ab39538a9f62fd30b24a10c150c119fc0 /auth-options.c
parente6b3b610ece508f565a114a60f6ce0edb70a5dd2 (diff)
- dtucker@cvs.openbsd.org 2006/07/17 12:02:24
[auth-options.c] Use '\0' rather than 0 to terminates strings; ok djm@
Diffstat (limited to 'auth-options.c')
-rw-r--r--auth-options.c12
1 files changed, 6 insertions, 6 deletions
diff --git a/auth-options.c b/auth-options.c
index 0b11151cf..7e6bfeb40 100644
--- a/auth-options.c
+++ b/auth-options.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: auth-options.c,v 1.37 2006/07/12 22:28:51 stevesk Exp $ */ 1/* $OpenBSD: auth-options.c,v 1.38 2006/07/17 12:02:24 dtucker Exp $ */
2/* 2/*
3 * Author: Tatu Ylonen <ylo@cs.hut.fi> 3 * Author: Tatu Ylonen <ylo@cs.hut.fi>
4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -138,7 +138,7 @@ auth_parse_options(struct passwd *pw, char *opts, char *file, u_long linenum)
138 forced_command = NULL; 138 forced_command = NULL;
139 goto bad_option; 139 goto bad_option;
140 } 140 }
141 forced_command[i] = 0; 141 forced_command[i] = '\0';
142 auth_debug_add("Forced command: %.900s", forced_command); 142 auth_debug_add("Forced command: %.900s", forced_command);
143 opts++; 143 opts++;
144 goto next_option; 144 goto next_option;
@@ -170,7 +170,7 @@ auth_parse_options(struct passwd *pw, char *opts, char *file, u_long linenum)
170 xfree(s); 170 xfree(s);
171 goto bad_option; 171 goto bad_option;
172 } 172 }
173 s[i] = 0; 173 s[i] = '\0';
174 auth_debug_add("Adding to environment: %.900s", s); 174 auth_debug_add("Adding to environment: %.900s", s);
175 debug("Adding to environment: %.900s", s); 175 debug("Adding to environment: %.900s", s);
176 opts++; 176 opts++;
@@ -207,7 +207,7 @@ auth_parse_options(struct passwd *pw, char *opts, char *file, u_long linenum)
207 xfree(patterns); 207 xfree(patterns);
208 goto bad_option; 208 goto bad_option;
209 } 209 }
210 patterns[i] = 0; 210 patterns[i] = '\0';
211 opts++; 211 opts++;
212 if (match_host_and_ip(remote_host, remote_ip, 212 if (match_host_and_ip(remote_host, remote_ip,
213 patterns) != 1) { 213 patterns) != 1) {
@@ -252,7 +252,7 @@ auth_parse_options(struct passwd *pw, char *opts, char *file, u_long linenum)
252 xfree(patterns); 252 xfree(patterns);
253 goto bad_option; 253 goto bad_option;
254 } 254 }
255 patterns[i] = 0; 255 patterns[i] = '\0';
256 opts++; 256 opts++;
257 p = patterns; 257 p = patterns;
258 host = hpdelim(&p); 258 host = hpdelim(&p);
@@ -300,7 +300,7 @@ auth_parse_options(struct passwd *pw, char *opts, char *file, u_long linenum)
300 forced_tun_device = -1; 300 forced_tun_device = -1;
301 goto bad_option; 301 goto bad_option;
302 } 302 }
303 tun[i] = 0; 303 tun[i] = '\0';
304 forced_tun_device = a2tun(tun, NULL); 304 forced_tun_device = a2tun(tun, NULL);
305 xfree(tun); 305 xfree(tun);
306 if (forced_tun_device == SSH_TUNID_ERR) { 306 if (forced_tun_device == SSH_TUNID_ERR) {