summaryrefslogtreecommitdiff
path: root/auth2-pubkey.c
diff options
context:
space:
mode:
authorDarren Tucker <dtucker@zip.com.au>2004-06-22 12:56:01 +1000
committerDarren Tucker <dtucker@zip.com.au>2004-06-22 12:56:01 +1000
commit3f9fdc71219d498a996c4e4ca8330df7f598fb5d (patch)
tree902072deed2ca26a5b0b3fa5f3749783e0bd62e6 /auth2-pubkey.c
parentb357afc0a03a4238a01acf5d9641ebda9f71d500 (diff)
- avsm@cvs.openbsd.org 2004/06/21 17:36:31
[auth-rsa.c auth2-gss.c auth2-pubkey.c authfile.c canohost.c channels.c cipher.c dns.c kex.c monitor.c monitor_fdpass.c monitor_wrap.c monitor_wrap.h nchan.c packet.c progressmeter.c scp.c sftp-server.c sftp.c ssh-gss.h ssh-keygen.c ssh.c sshconnect.c sshconnect1.c sshlogin.c sshpty.c] make ssh -Wshadow clean, no functional changes markus@ ok There are also some portable-specific -Wshadow warnings to be fixed in monitor.c and montior_wrap.c.
Diffstat (limited to 'auth2-pubkey.c')
-rw-r--r--auth2-pubkey.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/auth2-pubkey.c b/auth2-pubkey.c
index 3063eecc3..9898d4a63 100644
--- a/auth2-pubkey.c
+++ b/auth2-pubkey.c
@@ -23,7 +23,7 @@
23 */ 23 */
24 24
25#include "includes.h" 25#include "includes.h"
26RCSID("$OpenBSD: auth2-pubkey.c,v 1.6 2004/01/19 21:25:15 markus Exp $"); 26RCSID("$OpenBSD: auth2-pubkey.c,v 1.7 2004/06/21 17:36:31 avsm Exp $");
27 27
28#include "ssh2.h" 28#include "ssh2.h"
29#include "xmalloc.h" 29#include "xmalloc.h"
@@ -205,7 +205,7 @@ user_key_allowed2(struct passwd *pw, Key *key, char *file)
205 found = key_new(key->type); 205 found = key_new(key->type);
206 206
207 while (fgets(line, sizeof(line), f)) { 207 while (fgets(line, sizeof(line), f)) {
208 char *cp, *options = NULL; 208 char *cp, *key_options = NULL;
209 linenum++; 209 linenum++;
210 /* Skip leading whitespace, empty and comment lines. */ 210 /* Skip leading whitespace, empty and comment lines. */
211 for (cp = line; *cp == ' ' || *cp == '\t'; cp++) 211 for (cp = line; *cp == ' ' || *cp == '\t'; cp++)
@@ -217,7 +217,7 @@ user_key_allowed2(struct passwd *pw, Key *key, char *file)
217 /* no key? check if there are options for this key */ 217 /* no key? check if there are options for this key */
218 int quoted = 0; 218 int quoted = 0;
219 debug2("user_key_allowed: check options: '%s'", cp); 219 debug2("user_key_allowed: check options: '%s'", cp);
220 options = cp; 220 key_options = cp;
221 for (; *cp && (quoted || (*cp != ' ' && *cp != '\t')); cp++) { 221 for (; *cp && (quoted || (*cp != ' ' && *cp != '\t')); cp++) {
222 if (*cp == '\\' && cp[1] == '"') 222 if (*cp == '\\' && cp[1] == '"')
223 cp++; /* Skip both */ 223 cp++; /* Skip both */
@@ -234,7 +234,7 @@ user_key_allowed2(struct passwd *pw, Key *key, char *file)
234 } 234 }
235 } 235 }
236 if (key_equal(found, key) && 236 if (key_equal(found, key) &&
237 auth_parse_options(pw, options, file, linenum) == 1) { 237 auth_parse_options(pw, key_options, file, linenum) == 1) {
238 found_key = 1; 238 found_key = 1;
239 debug("matching key found: file %s, line %lu", 239 debug("matching key found: file %s, line %lu",
240 file, linenum); 240 file, linenum);