diff options
author | Ben Lindstrom <mouring@eviladmin.org> | 2001-12-06 18:00:18 +0000 |
---|---|---|
committer | Ben Lindstrom <mouring@eviladmin.org> | 2001-12-06 18:00:18 +0000 |
commit | 1c37c6a51842f8bed3283ef18ec16cf6a0ae8640 (patch) | |
tree | e17ea7a703397ef0b7f7c76d668bb5ac0d4f4fec /sshd.c | |
parent | 3c36bb29ca67d459ef9d8c1961415d77efc20e55 (diff) |
- deraadt@cvs.openbsd.org 2001/12/05 10:06:12
[authfd.c authfile.c bufaux.c channels.c compat.c kex.c kexgex.c
key.c misc.c packet.c servconf.c ssh-agent.c sshconnect2.c
sshconnect.c sshd.c ssh-dss.c ssh-keygen.c ssh-rsa.c]
minor KNF
Diffstat (limited to 'sshd.c')
-rw-r--r-- | sshd.c | 8 |
1 files changed, 4 insertions, 4 deletions
@@ -40,7 +40,7 @@ | |||
40 | */ | 40 | */ |
41 | 41 | ||
42 | #include "includes.h" | 42 | #include "includes.h" |
43 | RCSID("$OpenBSD: sshd.c,v 1.213 2001/12/05 03:50:01 itojun Exp $"); | 43 | RCSID("$OpenBSD: sshd.c,v 1.214 2001/12/05 10:06:13 deraadt Exp $"); |
44 | 44 | ||
45 | #include <openssl/dh.h> | 45 | #include <openssl/dh.h> |
46 | #include <openssl/bn.h> | 46 | #include <openssl/bn.h> |
@@ -410,7 +410,7 @@ sshd_exchange_identification(int sock_in, int sock_out) | |||
410 | } | 410 | } |
411 | 411 | ||
412 | mismatch = 0; | 412 | mismatch = 0; |
413 | switch(remote_major) { | 413 | switch (remote_major) { |
414 | case 1: | 414 | case 1: |
415 | if (remote_minor == 99) { | 415 | if (remote_minor == 99) { |
416 | if (options.protocol & SSH_PROTO_2) | 416 | if (options.protocol & SSH_PROTO_2) |
@@ -487,7 +487,7 @@ list_hostkey_types(void) | |||
487 | Key *key = sensitive_data.host_keys[i]; | 487 | Key *key = sensitive_data.host_keys[i]; |
488 | if (key == NULL) | 488 | if (key == NULL) |
489 | continue; | 489 | continue; |
490 | switch(key->type) { | 490 | switch (key->type) { |
491 | case KEY_RSA: | 491 | case KEY_RSA: |
492 | case KEY_DSA: | 492 | case KEY_DSA: |
493 | strlcat(buf, key_ssh_name(key), sizeof buf); | 493 | strlcat(buf, key_ssh_name(key), sizeof buf); |
@@ -737,7 +737,7 @@ main(int ac, char **av) | |||
737 | sensitive_data.host_keys[i] = NULL; | 737 | sensitive_data.host_keys[i] = NULL; |
738 | continue; | 738 | continue; |
739 | } | 739 | } |
740 | switch(key->type){ | 740 | switch (key->type) { |
741 | case KEY_RSA1: | 741 | case KEY_RSA1: |
742 | sensitive_data.ssh1_host_key = key; | 742 | sensitive_data.ssh1_host_key = key; |
743 | sensitive_data.have_ssh1_key = 1; | 743 | sensitive_data.have_ssh1_key = 1; |