summaryrefslogtreecommitdiff
path: root/authfile.c
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2001-10-10 15:03:36 +1000
committerDamien Miller <djm@mindrot.org>2001-10-10 15:03:36 +1000
commit058655ccedb9cdad84be346bce7416454e45a598 (patch)
tree336530bdeaa2a6e970035a78f1a7e86496bee6fc /authfile.c
parent59d9fb9e55f2448ec8b0911f05bdb943e8235ed2 (diff)
- markus@cvs.openbsd.org 2001/10/07 10:29:52
[authfile.c] grammer; Matthew_Clarke@mindlink.bc.ca
Diffstat (limited to 'authfile.c')
-rw-r--r--authfile.c10
1 files changed, 5 insertions, 5 deletions
diff --git a/authfile.c b/authfile.c
index cf2957dde..135be76b5 100644
--- a/authfile.c
+++ b/authfile.c
@@ -36,7 +36,7 @@
36 */ 36 */
37 37
38#include "includes.h" 38#include "includes.h"
39RCSID("$OpenBSD: authfile.c,v 1.38 2001/09/23 11:09:13 markus Exp $"); 39RCSID("$OpenBSD: authfile.c,v 1.39 2001/10/07 10:29:52 markus Exp $");
40 40
41#include <openssl/err.h> 41#include <openssl/err.h>
42#include <openssl/evp.h> 42#include <openssl/evp.h>
@@ -250,7 +250,7 @@ key_load_public_rsa1(int fd, const char *filename, char **commentp)
250 250
251 /* Check that it is at least big enough to contain the ID string. */ 251 /* Check that it is at least big enough to contain the ID string. */
252 if (len < sizeof(authfile_id_string)) { 252 if (len < sizeof(authfile_id_string)) {
253 debug3("No RSA1 key file %.200s.", filename); 253 debug3("Not a RSA1 key file %.200s.", filename);
254 buffer_free(&buffer); 254 buffer_free(&buffer);
255 return NULL; 255 return NULL;
256 } 256 }
@@ -260,7 +260,7 @@ key_load_public_rsa1(int fd, const char *filename, char **commentp)
260 */ 260 */
261 for (i = 0; i < sizeof(authfile_id_string); i++) 261 for (i = 0; i < sizeof(authfile_id_string); i++)
262 if (buffer_get_char(&buffer) != authfile_id_string[i]) { 262 if (buffer_get_char(&buffer) != authfile_id_string[i]) {
263 debug3("No RSA1 key file %.200s.", filename); 263 debug3("Not a RSA1 key file %.200s.", filename);
264 buffer_free(&buffer); 264 buffer_free(&buffer);
265 return NULL; 265 return NULL;
266 } 266 }
@@ -336,7 +336,7 @@ key_load_private_rsa1(int fd, const char *filename, const char *passphrase,
336 336
337 /* Check that it is at least big enough to contain the ID string. */ 337 /* Check that it is at least big enough to contain the ID string. */
338 if (len < sizeof(authfile_id_string)) { 338 if (len < sizeof(authfile_id_string)) {
339 debug3("No RSA1 key file %.200s.", filename); 339 debug3("Not a RSA1 key file %.200s.", filename);
340 buffer_free(&buffer); 340 buffer_free(&buffer);
341 close(fd); 341 close(fd);
342 return NULL; 342 return NULL;
@@ -347,7 +347,7 @@ key_load_private_rsa1(int fd, const char *filename, const char *passphrase,
347 */ 347 */
348 for (i = 0; i < sizeof(authfile_id_string); i++) 348 for (i = 0; i < sizeof(authfile_id_string); i++)
349 if (buffer_get_char(&buffer) != authfile_id_string[i]) { 349 if (buffer_get_char(&buffer) != authfile_id_string[i]) {
350 debug3("No RSA1 key file %.200s.", filename); 350 debug3("Not a RSA1 key file %.200s.", filename);
351 buffer_free(&buffer); 351 buffer_free(&buffer);
352 close(fd); 352 close(fd);
353 return NULL; 353 return NULL;