summaryrefslogtreecommitdiff
path: root/serverloop.c
diff options
context:
space:
mode:
authordjm@openbsd.org <djm@openbsd.org>2018-06-08 01:55:40 +0000
committerDamien Miller <djm@mindrot.org>2018-06-09 13:10:59 +1000
commit027607fc2db6a0475a3380f8d95c635482714cb0 (patch)
treea7dbfd4ea8da14facec186af7b18aa0b5070e0b7 /serverloop.c
parent6ff6fda705bc204456a5fa12518dde6e8790bb02 (diff)
upstream: fix some over-long lines and __func__ up some debug
messages OpenBSD-Commit-ID: c70a60b4c8207d9f242fc2351941ba50916bb267
Diffstat (limited to 'serverloop.c')
-rw-r--r--serverloop.c18
1 files changed, 9 insertions, 9 deletions
diff --git a/serverloop.c b/serverloop.c
index d6fe24cc1..5ecafded8 100644
--- a/serverloop.c
+++ b/serverloop.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: serverloop.c,v 1.205 2018/03/03 03:15:51 djm Exp $ */ 1/* $OpenBSD: serverloop.c,v 1.206 2018/06/08 01:55:40 djm Exp $ */
2/* 2/*
3 * Author: Tatu Ylonen <ylo@cs.hut.fi> 3 * Author: Tatu Ylonen <ylo@cs.hut.fi>
4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -145,7 +145,7 @@ notify_done(fd_set *readset)
145 145
146 if (notify_pipe[0] != -1 && FD_ISSET(notify_pipe[0], readset)) 146 if (notify_pipe[0] != -1 && FD_ISSET(notify_pipe[0], readset))
147 while (read(notify_pipe[0], &c, 1) != -1) 147 while (read(notify_pipe[0], &c, 1) != -1)
148 debug2("notify_done: reading"); 148 debug2("%s: reading", __func__);
149} 149}
150 150
151/*ARGSUSED*/ 151/*ARGSUSED*/
@@ -623,7 +623,7 @@ server_input_channel_open(int type, u_int32_t seq, struct ssh *ssh)
623 rwindow = packet_get_int(); 623 rwindow = packet_get_int();
624 rmaxpack = packet_get_int(); 624 rmaxpack = packet_get_int();
625 625
626 debug("server_input_channel_open: ctype %s rchan %d win %d max %d", 626 debug("%s: ctype %s rchan %d win %d max %d", __func__,
627 ctype, rchan, rwindow, rmaxpack); 627 ctype, rchan, rwindow, rmaxpack);
628 628
629 if (strcmp(ctype, "session") == 0) { 629 if (strcmp(ctype, "session") == 0) {
@@ -636,7 +636,7 @@ server_input_channel_open(int type, u_int32_t seq, struct ssh *ssh)
636 c = server_request_tun(ssh); 636 c = server_request_tun(ssh);
637 } 637 }
638 if (c != NULL) { 638 if (c != NULL) {
639 debug("server_input_channel_open: confirm %s", ctype); 639 debug("%s: confirm %s", __func__, ctype);
640 c->remote_id = rchan; 640 c->remote_id = rchan;
641 c->have_remote_id = 1; 641 c->have_remote_id = 1;
642 c->remote_window = rwindow; 642 c->remote_window = rwindow;
@@ -650,7 +650,7 @@ server_input_channel_open(int type, u_int32_t seq, struct ssh *ssh)
650 packet_send(); 650 packet_send();
651 } 651 }
652 } else { 652 } else {
653 debug("server_input_channel_open: failure %s", ctype); 653 debug("%s: failure %s", __func__, ctype);
654 packet_start(SSH2_MSG_CHANNEL_OPEN_FAILURE); 654 packet_start(SSH2_MSG_CHANNEL_OPEN_FAILURE);
655 packet_put_int(rchan); 655 packet_put_int(rchan);
656 packet_put_int(reason); 656 packet_put_int(reason);
@@ -750,11 +750,11 @@ server_input_global_request(int type, u_int32_t seq, struct ssh *ssh)
750 struct passwd *pw = the_authctxt->pw; 750 struct passwd *pw = the_authctxt->pw;
751 751
752 if (pw == NULL || !the_authctxt->valid) 752 if (pw == NULL || !the_authctxt->valid)
753 fatal("server_input_global_request: no/invalid user"); 753 fatal("%s: no/invalid user", __func__);
754 754
755 rtype = packet_get_string(NULL); 755 rtype = packet_get_string(NULL);
756 want_reply = packet_get_char(); 756 want_reply = packet_get_char();
757 debug("server_input_global_request: rtype %s want_reply %d", rtype, want_reply); 757 debug("%s: rtype %s want_reply %d", __func__, rtype, want_reply);
758 758
759 /* -R style forwarding */ 759 /* -R style forwarding */
760 if (strcmp(rtype, "tcpip-forward") == 0) { 760 if (strcmp(rtype, "tcpip-forward") == 0) {
@@ -763,7 +763,7 @@ server_input_global_request(int type, u_int32_t seq, struct ssh *ssh)
763 memset(&fwd, 0, sizeof(fwd)); 763 memset(&fwd, 0, sizeof(fwd));
764 fwd.listen_host = packet_get_string(NULL); 764 fwd.listen_host = packet_get_string(NULL);
765 fwd.listen_port = (u_short)packet_get_int(); 765 fwd.listen_port = (u_short)packet_get_int();
766 debug("server_input_global_request: tcpip-forward listen %s port %d", 766 debug("%s: tcpip-forward listen %s port %d", __func__,
767 fwd.listen_host, fwd.listen_port); 767 fwd.listen_host, fwd.listen_port);
768 768
769 /* check permissions */ 769 /* check permissions */
@@ -802,7 +802,7 @@ server_input_global_request(int type, u_int32_t seq, struct ssh *ssh)
802 802
803 memset(&fwd, 0, sizeof(fwd)); 803 memset(&fwd, 0, sizeof(fwd));
804 fwd.listen_path = packet_get_string(NULL); 804 fwd.listen_path = packet_get_string(NULL);
805 debug("server_input_global_request: streamlocal-forward listen path %s", 805 debug("%s: streamlocal-forward listen path %s", __func__,
806 fwd.listen_path); 806 fwd.listen_path);
807 807
808 /* check permissions */ 808 /* check permissions */