diff options
author | Damien Miller <djm@mindrot.org> | 2001-10-10 15:03:36 +1000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2001-10-10 15:03:36 +1000 |
commit | 058655ccedb9cdad84be346bce7416454e45a598 (patch) | |
tree | 336530bdeaa2a6e970035a78f1a7e86496bee6fc /authfile.c | |
parent | 59d9fb9e55f2448ec8b0911f05bdb943e8235ed2 (diff) |
- markus@cvs.openbsd.org 2001/10/07 10:29:52
[authfile.c]
grammer; Matthew_Clarke@mindlink.bc.ca
Diffstat (limited to 'authfile.c')
-rw-r--r-- | authfile.c | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/authfile.c b/authfile.c index cf2957dde..135be76b5 100644 --- a/authfile.c +++ b/authfile.c | |||
@@ -36,7 +36,7 @@ | |||
36 | */ | 36 | */ |
37 | 37 | ||
38 | #include "includes.h" | 38 | #include "includes.h" |
39 | RCSID("$OpenBSD: authfile.c,v 1.38 2001/09/23 11:09:13 markus Exp $"); | 39 | RCSID("$OpenBSD: authfile.c,v 1.39 2001/10/07 10:29:52 markus Exp $"); |
40 | 40 | ||
41 | #include <openssl/err.h> | 41 | #include <openssl/err.h> |
42 | #include <openssl/evp.h> | 42 | #include <openssl/evp.h> |
@@ -250,7 +250,7 @@ key_load_public_rsa1(int fd, const char *filename, char **commentp) | |||
250 | 250 | ||
251 | /* Check that it is at least big enough to contain the ID string. */ | 251 | /* Check that it is at least big enough to contain the ID string. */ |
252 | if (len < sizeof(authfile_id_string)) { | 252 | if (len < sizeof(authfile_id_string)) { |
253 | debug3("No RSA1 key file %.200s.", filename); | 253 | debug3("Not a RSA1 key file %.200s.", filename); |
254 | buffer_free(&buffer); | 254 | buffer_free(&buffer); |
255 | return NULL; | 255 | return NULL; |
256 | } | 256 | } |
@@ -260,7 +260,7 @@ key_load_public_rsa1(int fd, const char *filename, char **commentp) | |||
260 | */ | 260 | */ |
261 | for (i = 0; i < sizeof(authfile_id_string); i++) | 261 | for (i = 0; i < sizeof(authfile_id_string); i++) |
262 | if (buffer_get_char(&buffer) != authfile_id_string[i]) { | 262 | if (buffer_get_char(&buffer) != authfile_id_string[i]) { |
263 | debug3("No RSA1 key file %.200s.", filename); | 263 | debug3("Not a RSA1 key file %.200s.", filename); |
264 | buffer_free(&buffer); | 264 | buffer_free(&buffer); |
265 | return NULL; | 265 | return NULL; |
266 | } | 266 | } |
@@ -336,7 +336,7 @@ key_load_private_rsa1(int fd, const char *filename, const char *passphrase, | |||
336 | 336 | ||
337 | /* Check that it is at least big enough to contain the ID string. */ | 337 | /* Check that it is at least big enough to contain the ID string. */ |
338 | if (len < sizeof(authfile_id_string)) { | 338 | if (len < sizeof(authfile_id_string)) { |
339 | debug3("No RSA1 key file %.200s.", filename); | 339 | debug3("Not a RSA1 key file %.200s.", filename); |
340 | buffer_free(&buffer); | 340 | buffer_free(&buffer); |
341 | close(fd); | 341 | close(fd); |
342 | return NULL; | 342 | return NULL; |
@@ -347,7 +347,7 @@ key_load_private_rsa1(int fd, const char *filename, const char *passphrase, | |||
347 | */ | 347 | */ |
348 | for (i = 0; i < sizeof(authfile_id_string); i++) | 348 | for (i = 0; i < sizeof(authfile_id_string); i++) |
349 | if (buffer_get_char(&buffer) != authfile_id_string[i]) { | 349 | if (buffer_get_char(&buffer) != authfile_id_string[i]) { |
350 | debug3("No RSA1 key file %.200s.", filename); | 350 | debug3("Not a RSA1 key file %.200s.", filename); |
351 | buffer_free(&buffer); | 351 | buffer_free(&buffer); |
352 | close(fd); | 352 | close(fd); |
353 | return NULL; | 353 | return NULL; |