diff options
-rw-r--r-- | ChangeLog | 5 | ||||
-rw-r--r-- | auth-rsa.c | 6 | ||||
-rw-r--r-- | auth2.c | 4 | ||||
-rw-r--r-- | deattack.c | 4 | ||||
-rw-r--r-- | packet.c | 6 |
5 files changed, 14 insertions, 11 deletions
@@ -100,6 +100,9 @@ | |||
100 | - deraadt@cvs.openbsd.org 2001/03/01 02:29:04 | 100 | - deraadt@cvs.openbsd.org 2001/03/01 02:29:04 |
101 | [ssh.c] | 101 | [ssh.c] |
102 | shorten usage by a line | 102 | shorten usage by a line |
103 | - deraadt@cvs.openbsd.org 2001/03/01 02:45:10 | ||
104 | [auth-rsa.c auth2.c deattack.c packet.c] | ||
105 | KNF | ||
103 | 106 | ||
104 | 20010304 | 107 | 20010304 |
105 | - (bal) Remove make-ssh-known-hosts.1 since it's no longer valid. | 108 | - (bal) Remove make-ssh-known-hosts.1 since it's no longer valid. |
@@ -4292,4 +4295,4 @@ | |||
4292 | - Wrote replacements for strlcpy and mkdtemp | 4295 | - Wrote replacements for strlcpy and mkdtemp |
4293 | - Released 1.0pre1 | 4296 | - Released 1.0pre1 |
4294 | 4297 | ||
4295 | $Id: ChangeLog,v 1.882 2001/03/05 06:45:21 mouring Exp $ | 4298 | $Id: ChangeLog,v 1.883 2001/03/05 06:47:00 mouring Exp $ |
diff --git a/auth-rsa.c b/auth-rsa.c index ee71655f3..30e5a54c4 100644 --- a/auth-rsa.c +++ b/auth-rsa.c | |||
@@ -14,7 +14,7 @@ | |||
14 | */ | 14 | */ |
15 | 15 | ||
16 | #include "includes.h" | 16 | #include "includes.h" |
17 | RCSID("$OpenBSD: auth-rsa.c,v 1.38 2001/01/21 19:05:42 markus Exp $"); | 17 | RCSID("$OpenBSD: auth-rsa.c,v 1.39 2001/03/01 02:45:10 deraadt Exp $"); |
18 | 18 | ||
19 | #include <openssl/rsa.h> | 19 | #include <openssl/rsa.h> |
20 | #include <openssl/md5.h> | 20 | #include <openssl/md5.h> |
@@ -186,8 +186,8 @@ auth_rsa(struct passwd *pw, BIGNUM *client_n) | |||
186 | } | 186 | } |
187 | if (fail) { | 187 | if (fail) { |
188 | fclose(f); | 188 | fclose(f); |
189 | log("%s",buf); | 189 | log("%s", buf); |
190 | packet_send_debug("%s",buf); | 190 | packet_send_debug("%s", buf); |
191 | restore_uid(); | 191 | restore_uid(); |
192 | return 0; | 192 | return 0; |
193 | } | 193 | } |
@@ -23,7 +23,7 @@ | |||
23 | */ | 23 | */ |
24 | 24 | ||
25 | #include "includes.h" | 25 | #include "includes.h" |
26 | RCSID("$OpenBSD: auth2.c,v 1.43 2001/02/22 21:59:44 markus Exp $"); | 26 | RCSID("$OpenBSD: auth2.c,v 1.44 2001/03/01 02:45:10 deraadt Exp $"); |
27 | 27 | ||
28 | #include <openssl/evp.h> | 28 | #include <openssl/evp.h> |
29 | 29 | ||
@@ -640,7 +640,7 @@ user_key_allowed(struct passwd *pw, Key *key) | |||
640 | } | 640 | } |
641 | if (fail) { | 641 | if (fail) { |
642 | fclose(f); | 642 | fclose(f); |
643 | log("%s",buf); | 643 | log("%s", buf); |
644 | restore_uid(); | 644 | restore_uid(); |
645 | return 0; | 645 | return 0; |
646 | } | 646 | } |
diff --git a/deattack.c b/deattack.c index 9b9babace..36023e0d3 100644 --- a/deattack.c +++ b/deattack.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: deattack.c,v 1.12 2001/01/21 19:05:48 markus Exp $ */ | 1 | /* $OpenBSD: deattack.c,v 1.13 2001/03/01 02:45:10 deraadt Exp $ */ |
2 | 2 | ||
3 | /* | 3 | /* |
4 | * Cryptographic attack detector for ssh - source code | 4 | * Cryptographic attack detector for ssh - source code |
@@ -44,7 +44,7 @@ | |||
44 | /* Hash function (Input keys are cipher results) */ | 44 | /* Hash function (Input keys are cipher results) */ |
45 | #define HASH(x) GET_32BIT(x) | 45 | #define HASH(x) GET_32BIT(x) |
46 | 46 | ||
47 | #define CMP(a,b) (memcmp(a, b, SSH_BLOCKSIZE)) | 47 | #define CMP(a, b) (memcmp(a, b, SSH_BLOCKSIZE)) |
48 | 48 | ||
49 | 49 | ||
50 | void | 50 | void |
@@ -37,7 +37,7 @@ | |||
37 | */ | 37 | */ |
38 | 38 | ||
39 | #include "includes.h" | 39 | #include "includes.h" |
40 | RCSID("$OpenBSD: packet.c,v 1.54 2001/02/28 21:27:47 markus Exp $"); | 40 | RCSID("$OpenBSD: packet.c,v 1.55 2001/03/01 02:45:10 deraadt Exp $"); |
41 | 41 | ||
42 | #include "xmalloc.h" | 42 | #include "xmalloc.h" |
43 | #include "buffer.h" | 43 | #include "buffer.h" |
@@ -389,7 +389,7 @@ packet_start2(int type) | |||
389 | void | 389 | void |
390 | packet_start(int type) | 390 | packet_start(int type) |
391 | { | 391 | { |
392 | DBG(debug("packet_start[%d]",type)); | 392 | DBG(debug("packet_start[%d]", type)); |
393 | if (use_ssh2_packet_format) | 393 | if (use_ssh2_packet_format) |
394 | packet_start2(type); | 394 | packet_start2(type); |
395 | else | 395 | else |
@@ -942,7 +942,7 @@ packet_read_poll2(int *payload_len_ptr) | |||
942 | } | 942 | } |
943 | 943 | ||
944 | #ifdef PACKET_DEBUG | 944 | #ifdef PACKET_DEBUG |
945 | fprintf(stderr, "read/plain[%d]:\r\n",type); | 945 | fprintf(stderr, "read/plain[%d]:\r\n", type); |
946 | buffer_dump(&incoming_packet); | 946 | buffer_dump(&incoming_packet); |
947 | #endif | 947 | #endif |
948 | return (u_char)type; | 948 | return (u_char)type; |