diff options
-rw-r--r-- | ChangeLog | 7 | ||||
-rw-r--r-- | auth-options.c | 6 | ||||
-rw-r--r-- | bufaux.c | 4 | ||||
-rw-r--r-- | bufaux.h | 4 | ||||
-rw-r--r-- | channels.c | 18 | ||||
-rw-r--r-- | clientloop.c | 4 | ||||
-rw-r--r-- | hostfile.c | 8 | ||||
-rw-r--r-- | misc.c | 8 | ||||
-rw-r--r-- | monitor.c | 4 | ||||
-rw-r--r-- | readconf.c | 4 | ||||
-rw-r--r-- | servconf.c | 4 | ||||
-rw-r--r-- | sftp-client.c | 6 | ||||
-rw-r--r-- | sftp.c | 4 | ||||
-rw-r--r-- | ssh-add.c | 6 | ||||
-rw-r--r-- | ssh-keygen.c | 4 | ||||
-rw-r--r-- | ssh.c | 8 | ||||
-rw-r--r-- | sshconnect.c | 6 |
17 files changed, 55 insertions, 50 deletions
@@ -4,6 +4,11 @@ | |||
4 | [readconf.c] | 4 | [readconf.c] |
5 | Check listen addresses for null, prevents xfree from dying during | 5 | Check listen addresses for null, prevents xfree from dying during |
6 | ClearAllForwardings (bz #996). From Craig Leres, ok markus@ | 6 | ClearAllForwardings (bz #996). From Craig Leres, ok markus@ |
7 | - deraadt@cvs.openbsd.org 2005/03/10 22:01:05 | ||
8 | [misc.c ssh-keygen.c servconf.c clientloop.c auth-options.c ssh-add.c | ||
9 | monitor.c sftp-client.c bufaux.h hostfile.c ssh.c sshconnect.c channels.c | ||
10 | readconf.c bufaux.c sftp.c] | ||
11 | spacing | ||
7 | 12 | ||
8 | 20050313 | 13 | 20050313 |
9 | - (dtucker) [contrib/cygwin/ssh-host-config] Makes the query for the | 14 | - (dtucker) [contrib/cygwin/ssh-host-config] Makes the query for the |
@@ -2338,4 +2343,4 @@ | |||
2338 | - (djm) Trim deprecated options from INSTALL. Mention UsePAM | 2343 | - (djm) Trim deprecated options from INSTALL. Mention UsePAM |
2339 | - (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu | 2344 | - (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu |
2340 | 2345 | ||
2341 | $Id: ChangeLog,v 1.3711 2005/03/14 12:02:46 dtucker Exp $ | 2346 | $Id: ChangeLog,v 1.3712 2005/03/14 12:08:12 dtucker Exp $ |
diff --git a/auth-options.c b/auth-options.c index 04d12d66e..829c37f1d 100644 --- a/auth-options.c +++ b/auth-options.c | |||
@@ -10,7 +10,7 @@ | |||
10 | */ | 10 | */ |
11 | 11 | ||
12 | #include "includes.h" | 12 | #include "includes.h" |
13 | RCSID("$OpenBSD: auth-options.c,v 1.29 2005/03/01 10:09:52 djm Exp $"); | 13 | RCSID("$OpenBSD: auth-options.c,v 1.30 2005/03/10 22:01:05 deraadt Exp $"); |
14 | 14 | ||
15 | #include "xmalloc.h" | 15 | #include "xmalloc.h" |
16 | #include "match.h" | 16 | #include "match.h" |
@@ -255,8 +255,8 @@ auth_parse_options(struct passwd *pw, char *opts, char *file, u_long linenum) | |||
255 | xfree(patterns); | 255 | xfree(patterns); |
256 | goto bad_option; | 256 | goto bad_option; |
257 | } | 257 | } |
258 | host = cleanhostname(host); | 258 | host = cleanhostname(host); |
259 | if (p == NULL || (port = a2port(p)) == 0) { | 259 | if (p == NULL || (port = a2port(p)) == 0) { |
260 | debug("%.100s, line %lu: Bad permitopen port " | 260 | debug("%.100s, line %lu: Bad permitopen port " |
261 | "<%.100s>", file, linenum, p ? p : ""); | 261 | "<%.100s>", file, linenum, p ? p : ""); |
262 | auth_debug_add("%.100s, line %lu: " | 262 | auth_debug_add("%.100s, line %lu: " |
@@ -37,7 +37,7 @@ | |||
37 | */ | 37 | */ |
38 | 38 | ||
39 | #include "includes.h" | 39 | #include "includes.h" |
40 | RCSID("$OpenBSD: bufaux.c,v 1.34 2004/12/06 16:00:43 markus Exp $"); | 40 | RCSID("$OpenBSD: bufaux.c,v 1.35 2005/03/10 22:01:05 deraadt Exp $"); |
41 | 41 | ||
42 | #include <openssl/bn.h> | 42 | #include <openssl/bn.h> |
43 | #include "bufaux.h" | 43 | #include "bufaux.h" |
@@ -179,7 +179,7 @@ buffer_get_bignum2_ret(Buffer *buffer, BIGNUM *value) | |||
179 | { | 179 | { |
180 | u_int len; | 180 | u_int len; |
181 | u_char *bin; | 181 | u_char *bin; |
182 | 182 | ||
183 | if ((bin = buffer_get_string_ret(buffer, &len)) == NULL) { | 183 | if ((bin = buffer_get_string_ret(buffer, &len)) == NULL) { |
184 | error("buffer_get_bignum2_ret: invalid bignum"); | 184 | error("buffer_get_bignum2_ret: invalid bignum"); |
185 | return (-1); | 185 | return (-1); |
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: bufaux.h,v 1.20 2004/10/29 23:56:17 djm Exp $ */ | 1 | /* $OpenBSD: bufaux.h,v 1.21 2005/03/10 22:01:05 deraadt Exp $ */ |
2 | 2 | ||
3 | /* | 3 | /* |
4 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 4 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
@@ -40,7 +40,7 @@ void buffer_put_string(Buffer *, const void *, u_int); | |||
40 | void buffer_put_cstring(Buffer *, const char *); | 40 | void buffer_put_cstring(Buffer *, const char *); |
41 | 41 | ||
42 | #define buffer_skip_string(b) \ | 42 | #define buffer_skip_string(b) \ |
43 | do { u_int l = buffer_get_int(b); buffer_consume(b, l); } while(0) | 43 | do { u_int l = buffer_get_int(b); buffer_consume(b, l); } while (0) |
44 | 44 | ||
45 | int buffer_put_bignum_ret(Buffer *, const BIGNUM *); | 45 | int buffer_put_bignum_ret(Buffer *, const BIGNUM *); |
46 | int buffer_get_bignum_ret(Buffer *, BIGNUM *); | 46 | int buffer_get_bignum_ret(Buffer *, BIGNUM *); |
diff --git a/channels.c b/channels.c index 1be213bce..4bd9af8e6 100644 --- a/channels.c +++ b/channels.c | |||
@@ -39,7 +39,7 @@ | |||
39 | */ | 39 | */ |
40 | 40 | ||
41 | #include "includes.h" | 41 | #include "includes.h" |
42 | RCSID("$OpenBSD: channels.c,v 1.212 2005/03/01 10:09:52 djm Exp $"); | 42 | RCSID("$OpenBSD: channels.c,v 1.213 2005/03/10 22:01:05 deraadt Exp $"); |
43 | 43 | ||
44 | #include "ssh.h" | 44 | #include "ssh.h" |
45 | #include "ssh1.h" | 45 | #include "ssh1.h" |
@@ -1018,7 +1018,7 @@ channel_decode_socks5(Channel *c, fd_set * readset, fd_set * writeset) | |||
1018 | debug2("channel %d: only socks5 connect supported", c->self); | 1018 | debug2("channel %d: only socks5 connect supported", c->self); |
1019 | return -1; | 1019 | return -1; |
1020 | } | 1020 | } |
1021 | switch(s5_req.atyp){ | 1021 | switch (s5_req.atyp){ |
1022 | case SSH_SOCKS5_IPV4: | 1022 | case SSH_SOCKS5_IPV4: |
1023 | addrlen = 4; | 1023 | addrlen = 4; |
1024 | af = AF_INET; | 1024 | af = AF_INET; |
@@ -2199,11 +2199,11 @@ channel_setup_fwd_listener(int type, const char *listen_addr, u_short listen_por | |||
2199 | 2199 | ||
2200 | /* | 2200 | /* |
2201 | * Determine whether or not a port forward listens to loopback, | 2201 | * Determine whether or not a port forward listens to loopback, |
2202 | * specified address or wildcard. On the client, a specified bind | 2202 | * specified address or wildcard. On the client, a specified bind |
2203 | * address will always override gateway_ports. On the server, a | 2203 | * address will always override gateway_ports. On the server, a |
2204 | * gateway_ports of 1 (``yes'') will override the client's | 2204 | * gateway_ports of 1 (``yes'') will override the client's |
2205 | * specification and force a wildcard bind, whereas a value of 2 | 2205 | * specification and force a wildcard bind, whereas a value of 2 |
2206 | * (``clientspecified'') will bind to whatever address the client | 2206 | * (``clientspecified'') will bind to whatever address the client |
2207 | * asked for. | 2207 | * asked for. |
2208 | * | 2208 | * |
2209 | * Special-case listen_addrs are: | 2209 | * Special-case listen_addrs are: |
@@ -2317,7 +2317,7 @@ channel_cancel_rport_listener(const char *host, u_short port) | |||
2317 | u_int i; | 2317 | u_int i; |
2318 | int found = 0; | 2318 | int found = 0; |
2319 | 2319 | ||
2320 | for(i = 0; i < channels_alloc; i++) { | 2320 | for (i = 0; i < channels_alloc; i++) { |
2321 | Channel *c = channels[i]; | 2321 | Channel *c = channels[i]; |
2322 | 2322 | ||
2323 | if (c != NULL && c->type == SSH_CHANNEL_RPORT_LISTENER && | 2323 | if (c != NULL && c->type == SSH_CHANNEL_RPORT_LISTENER && |
@@ -2629,7 +2629,7 @@ channel_send_window_changes(void) | |||
2629 | struct winsize ws; | 2629 | struct winsize ws; |
2630 | 2630 | ||
2631 | for (i = 0; i < channels_alloc; i++) { | 2631 | for (i = 0; i < channels_alloc; i++) { |
2632 | if (channels[i] == NULL || !channels[i]->client_tty || | 2632 | if (channels[i] == NULL || !channels[i]->client_tty || |
2633 | channels[i]->type != SSH_CHANNEL_OPEN) | 2633 | channels[i]->type != SSH_CHANNEL_OPEN) |
2634 | continue; | 2634 | continue; |
2635 | if (ioctl(channels[i]->rfd, TIOCGWINSZ, &ws) < 0) | 2635 | if (ioctl(channels[i]->rfd, TIOCGWINSZ, &ws) < 0) |
diff --git a/clientloop.c b/clientloop.c index 1e250883f..1591215bd 100644 --- a/clientloop.c +++ b/clientloop.c | |||
@@ -59,7 +59,7 @@ | |||
59 | */ | 59 | */ |
60 | 60 | ||
61 | #include "includes.h" | 61 | #include "includes.h" |
62 | RCSID("$OpenBSD: clientloop.c,v 1.135 2005/03/01 10:09:52 djm Exp $"); | 62 | RCSID("$OpenBSD: clientloop.c,v 1.136 2005/03/10 22:01:05 deraadt Exp $"); |
63 | 63 | ||
64 | #include "ssh.h" | 64 | #include "ssh.h" |
65 | #include "ssh1.h" | 65 | #include "ssh1.h" |
@@ -627,7 +627,7 @@ client_process_control(fd_set * readset) | |||
627 | "to %s? ", host); | 627 | "to %s? ", host); |
628 | if (allowed) | 628 | if (allowed) |
629 | quit_pending = 1; | 629 | quit_pending = 1; |
630 | /* FALLTHROUGH */ | 630 | /* FALLTHROUGH */ |
631 | case SSHMUX_COMMAND_ALIVE_CHECK: | 631 | case SSHMUX_COMMAND_ALIVE_CHECK: |
632 | /* Reply for SSHMUX_COMMAND_TERMINATE and ALIVE_CHECK */ | 632 | /* Reply for SSHMUX_COMMAND_TERMINATE and ALIVE_CHECK */ |
633 | buffer_clear(&m); | 633 | buffer_clear(&m); |
diff --git a/hostfile.c b/hostfile.c index 2e1c8bcd0..bf2a31c9b 100644 --- a/hostfile.c +++ b/hostfile.c | |||
@@ -36,7 +36,7 @@ | |||
36 | */ | 36 | */ |
37 | 37 | ||
38 | #include "includes.h" | 38 | #include "includes.h" |
39 | RCSID("$OpenBSD: hostfile.c,v 1.33 2005/03/01 10:40:26 djm Exp $"); | 39 | RCSID("$OpenBSD: hostfile.c,v 1.34 2005/03/10 22:01:05 deraadt Exp $"); |
40 | 40 | ||
41 | #include <resolv.h> | 41 | #include <resolv.h> |
42 | #include <openssl/hmac.h> | 42 | #include <openssl/hmac.h> |
@@ -92,7 +92,7 @@ extract_salt(const char *s, u_int l, char *salt, size_t salt_len) | |||
92 | salt_len, ret); | 92 | salt_len, ret); |
93 | return (-1); | 93 | return (-1); |
94 | } | 94 | } |
95 | 95 | ||
96 | return (0); | 96 | return (0); |
97 | } | 97 | } |
98 | 98 | ||
@@ -123,7 +123,7 @@ host_hash(const char *host, const char *name_from_hostfile, u_int src_len) | |||
123 | HMAC_Final(&mac_ctx, result, NULL); | 123 | HMAC_Final(&mac_ctx, result, NULL); |
124 | HMAC_cleanup(&mac_ctx); | 124 | HMAC_cleanup(&mac_ctx); |
125 | 125 | ||
126 | if (__b64_ntop(salt, len, uu_salt, sizeof(uu_salt)) == -1 || | 126 | if (__b64_ntop(salt, len, uu_salt, sizeof(uu_salt)) == -1 || |
127 | __b64_ntop(result, len, uu_result, sizeof(uu_result)) == -1) | 127 | __b64_ntop(result, len, uu_result, sizeof(uu_result)) == -1) |
128 | fatal("host_hash: __b64_ntop failed"); | 128 | fatal("host_hash: __b64_ntop failed"); |
129 | 129 | ||
@@ -310,7 +310,7 @@ lookup_key_in_hostfile_by_type(const char *filename, const char *host, | |||
310 | */ | 310 | */ |
311 | 311 | ||
312 | int | 312 | int |
313 | add_host_to_hostfile(const char *filename, const char *host, const Key *key, | 313 | add_host_to_hostfile(const char *filename, const char *host, const Key *key, |
314 | int store_hash) | 314 | int store_hash) |
315 | { | 315 | { |
316 | FILE *f; | 316 | FILE *f; |
@@ -23,7 +23,7 @@ | |||
23 | */ | 23 | */ |
24 | 24 | ||
25 | #include "includes.h" | 25 | #include "includes.h" |
26 | RCSID("$OpenBSD: misc.c,v 1.28 2005/03/01 10:09:52 djm Exp $"); | 26 | RCSID("$OpenBSD: misc.c,v 1.29 2005/03/10 22:01:05 deraadt Exp $"); |
27 | 27 | ||
28 | #include "misc.h" | 28 | #include "misc.h" |
29 | #include "log.h" | 29 | #include "log.h" |
@@ -303,13 +303,13 @@ hpdelim(char **cp) | |||
303 | case '\0': | 303 | case '\0': |
304 | *cp = NULL; /* no more fields*/ | 304 | *cp = NULL; /* no more fields*/ |
305 | break; | 305 | break; |
306 | 306 | ||
307 | case ':': | 307 | case ':': |
308 | case '/': | 308 | case '/': |
309 | *s = '\0'; /* terminate */ | 309 | *s = '\0'; /* terminate */ |
310 | *cp = s + 1; | 310 | *cp = s + 1; |
311 | break; | 311 | break; |
312 | 312 | ||
313 | default: | 313 | default: |
314 | return NULL; | 314 | return NULL; |
315 | } | 315 | } |
@@ -391,7 +391,7 @@ read_keyfile_line(FILE *f, const char *filename, char *buf, size_t bufsz, | |||
391 | debug("%s: %s line %lu exceeds size limit", __func__, | 391 | debug("%s: %s line %lu exceeds size limit", __func__, |
392 | filename, *lineno); | 392 | filename, *lineno); |
393 | /* discard remainder of line */ | 393 | /* discard remainder of line */ |
394 | while(fgetc(f) != '\n' && !feof(f)) | 394 | while (fgetc(f) != '\n' && !feof(f)) |
395 | ; /* nothing */ | 395 | ; /* nothing */ |
396 | } | 396 | } |
397 | } | 397 | } |
@@ -25,7 +25,7 @@ | |||
25 | */ | 25 | */ |
26 | 26 | ||
27 | #include "includes.h" | 27 | #include "includes.h" |
28 | RCSID("$OpenBSD: monitor.c,v 1.62 2005/01/30 11:18:08 dtucker Exp $"); | 28 | RCSID("$OpenBSD: monitor.c,v 1.63 2005/03/10 22:01:05 deraadt Exp $"); |
29 | 29 | ||
30 | #include <openssl/dh.h> | 30 | #include <openssl/dh.h> |
31 | 31 | ||
@@ -976,7 +976,7 @@ mm_answer_keyallowed(int sock, Buffer *m) | |||
976 | debug3("%s: key_from_blob: %p", __func__, key); | 976 | debug3("%s: key_from_blob: %p", __func__, key); |
977 | 977 | ||
978 | if (key != NULL && authctxt->valid) { | 978 | if (key != NULL && authctxt->valid) { |
979 | switch(type) { | 979 | switch (type) { |
980 | case MM_USERKEY: | 980 | case MM_USERKEY: |
981 | allowed = options.pubkey_authentication && | 981 | allowed = options.pubkey_authentication && |
982 | user_key_allowed(authctxt->pw, key); | 982 | user_key_allowed(authctxt->pw, key); |
diff --git a/readconf.c b/readconf.c index f35fe5647..8ace1bbd4 100644 --- a/readconf.c +++ b/readconf.c | |||
@@ -12,7 +12,7 @@ | |||
12 | */ | 12 | */ |
13 | 13 | ||
14 | #include "includes.h" | 14 | #include "includes.h" |
15 | RCSID("$OpenBSD: readconf.c,v 1.138 2005/03/10 10:15:02 dtucker Exp $"); | 15 | RCSID("$OpenBSD: readconf.c,v 1.139 2005/03/10 22:01:05 deraadt Exp $"); |
16 | 16 | ||
17 | #include "ssh.h" | 17 | #include "ssh.h" |
18 | #include "xmalloc.h" | 18 | #include "xmalloc.h" |
@@ -301,7 +301,7 @@ process_config_line(Options *options, const char *host, | |||
301 | Forward fwd; | 301 | Forward fwd; |
302 | 302 | ||
303 | /* Strip trailing whitespace */ | 303 | /* Strip trailing whitespace */ |
304 | for(len = strlen(line) - 1; len > 0; len--) { | 304 | for (len = strlen(line) - 1; len > 0; len--) { |
305 | if (strchr(WHITESPACE, line[len]) == NULL) | 305 | if (strchr(WHITESPACE, line[len]) == NULL) |
306 | break; | 306 | break; |
307 | line[len] = '\0'; | 307 | line[len] = '\0'; |
diff --git a/servconf.c b/servconf.c index 2d1a0c362..96ad18084 100644 --- a/servconf.c +++ b/servconf.c | |||
@@ -10,7 +10,7 @@ | |||
10 | */ | 10 | */ |
11 | 11 | ||
12 | #include "includes.h" | 12 | #include "includes.h" |
13 | RCSID("$OpenBSD: servconf.c,v 1.139 2005/03/01 10:09:52 djm Exp $"); | 13 | RCSID("$OpenBSD: servconf.c,v 1.140 2005/03/10 22:01:05 deraadt Exp $"); |
14 | 14 | ||
15 | #include "ssh.h" | 15 | #include "ssh.h" |
16 | #include "log.h" | 16 | #include "log.h" |
@@ -1001,7 +1001,7 @@ parse_server_config(ServerOptions *options, const char *filename, Buffer *conf) | |||
1001 | 1001 | ||
1002 | obuf = cbuf = xstrdup(buffer_ptr(conf)); | 1002 | obuf = cbuf = xstrdup(buffer_ptr(conf)); |
1003 | linenum = 1; | 1003 | linenum = 1; |
1004 | while((cp = strsep(&cbuf, "\n")) != NULL) { | 1004 | while ((cp = strsep(&cbuf, "\n")) != NULL) { |
1005 | if (process_server_config_line(options, cp, filename, | 1005 | if (process_server_config_line(options, cp, filename, |
1006 | linenum++) != 0) | 1006 | linenum++) != 0) |
1007 | bad_options++; | 1007 | bad_options++; |
diff --git a/sftp-client.c b/sftp-client.c index d894a11f2..92df42751 100644 --- a/sftp-client.c +++ b/sftp-client.c | |||
@@ -20,7 +20,7 @@ | |||
20 | /* XXX: copy between two remote sites */ | 20 | /* XXX: copy between two remote sites */ |
21 | 21 | ||
22 | #include "includes.h" | 22 | #include "includes.h" |
23 | RCSID("$OpenBSD: sftp-client.c,v 1.52 2004/11/25 22:22:14 markus Exp $"); | 23 | RCSID("$OpenBSD: sftp-client.c,v 1.53 2005/03/10 22:01:05 deraadt Exp $"); |
24 | 24 | ||
25 | #include "openbsd-compat/sys-queue.h" | 25 | #include "openbsd-compat/sys-queue.h" |
26 | 26 | ||
@@ -856,7 +856,7 @@ do_download(struct sftp_conn *conn, char *remote_path, char *local_path, | |||
856 | debug3("Received reply T:%u I:%u R:%d", type, id, max_req); | 856 | debug3("Received reply T:%u I:%u R:%d", type, id, max_req); |
857 | 857 | ||
858 | /* Find the request in our queue */ | 858 | /* Find the request in our queue */ |
859 | for(req = TAILQ_FIRST(&requests); | 859 | for (req = TAILQ_FIRST(&requests); |
860 | req != NULL && req->id != id; | 860 | req != NULL && req->id != id; |
861 | req = TAILQ_NEXT(req, tq)) | 861 | req = TAILQ_NEXT(req, tq)) |
862 | ; | 862 | ; |
@@ -1109,7 +1109,7 @@ do_upload(struct sftp_conn *conn, char *local_path, char *remote_path, | |||
1109 | debug3("SSH2_FXP_STATUS %d", status); | 1109 | debug3("SSH2_FXP_STATUS %d", status); |
1110 | 1110 | ||
1111 | /* Find the request in our queue */ | 1111 | /* Find the request in our queue */ |
1112 | for(ack = TAILQ_FIRST(&acks); | 1112 | for (ack = TAILQ_FIRST(&acks); |
1113 | ack != NULL && ack->id != r_id; | 1113 | ack != NULL && ack->id != r_id; |
1114 | ack = TAILQ_NEXT(ack, tq)) | 1114 | ack = TAILQ_NEXT(ack, tq)) |
1115 | ; | 1115 | ; |
@@ -16,7 +16,7 @@ | |||
16 | 16 | ||
17 | #include "includes.h" | 17 | #include "includes.h" |
18 | 18 | ||
19 | RCSID("$OpenBSD: sftp.c,v 1.62 2005/02/20 22:59:06 djm Exp $"); | 19 | RCSID("$OpenBSD: sftp.c,v 1.63 2005/03/10 22:01:05 deraadt Exp $"); |
20 | 20 | ||
21 | #ifdef USE_LIBEDIT | 21 | #ifdef USE_LIBEDIT |
22 | #include <histedit.h> | 22 | #include <histedit.h> |
@@ -357,7 +357,7 @@ parse_ls_flags(const char **cpp, int *lflag) | |||
357 | 357 | ||
358 | /* Check for flags */ | 358 | /* Check for flags */ |
359 | if (cp++[0] == '-') { | 359 | if (cp++[0] == '-') { |
360 | for(; strchr(WHITESPACE, *cp) == NULL; cp++) { | 360 | for (; strchr(WHITESPACE, *cp) == NULL; cp++) { |
361 | switch (*cp) { | 361 | switch (*cp) { |
362 | case 'l': | 362 | case 'l': |
363 | *lflag &= ~VIEW_FLAGS; | 363 | *lflag &= ~VIEW_FLAGS; |
@@ -35,7 +35,7 @@ | |||
35 | */ | 35 | */ |
36 | 36 | ||
37 | #include "includes.h" | 37 | #include "includes.h" |
38 | RCSID("$OpenBSD: ssh-add.c,v 1.70 2004/05/08 00:21:31 djm Exp $"); | 38 | RCSID("$OpenBSD: ssh-add.c,v 1.71 2005/03/10 22:01:06 deraadt Exp $"); |
39 | 39 | ||
40 | #include <openssl/evp.h> | 40 | #include <openssl/evp.h> |
41 | 41 | ||
@@ -389,7 +389,7 @@ main(int argc, char **argv) | |||
389 | goto done; | 389 | goto done; |
390 | } | 390 | } |
391 | 391 | ||
392 | for(i = 0; default_files[i]; i++) { | 392 | for (i = 0; default_files[i]; i++) { |
393 | snprintf(buf, sizeof(buf), "%s/%s", pw->pw_dir, | 393 | snprintf(buf, sizeof(buf), "%s/%s", pw->pw_dir, |
394 | default_files[i]); | 394 | default_files[i]); |
395 | if (stat(buf, &st) < 0) | 395 | if (stat(buf, &st) < 0) |
@@ -402,7 +402,7 @@ main(int argc, char **argv) | |||
402 | if (count == 0) | 402 | if (count == 0) |
403 | ret = 1; | 403 | ret = 1; |
404 | } else { | 404 | } else { |
405 | for(i = 0; i < argc; i++) { | 405 | for (i = 0; i < argc; i++) { |
406 | if (do_file(ac, deleting, argv[i]) == -1) | 406 | if (do_file(ac, deleting, argv[i]) == -1) |
407 | ret = 1; | 407 | ret = 1; |
408 | } | 408 | } |
diff --git a/ssh-keygen.c b/ssh-keygen.c index a9931d4d8..b38e9c9c4 100644 --- a/ssh-keygen.c +++ b/ssh-keygen.c | |||
@@ -12,7 +12,7 @@ | |||
12 | */ | 12 | */ |
13 | 13 | ||
14 | #include "includes.h" | 14 | #include "includes.h" |
15 | RCSID("$OpenBSD: ssh-keygen.c,v 1.120 2005/03/02 01:27:41 djm Exp $"); | 15 | RCSID("$OpenBSD: ssh-keygen.c,v 1.121 2005/03/10 22:01:06 deraadt Exp $"); |
16 | 16 | ||
17 | #include <openssl/evp.h> | 17 | #include <openssl/evp.h> |
18 | #include <openssl/pem.h> | 18 | #include <openssl/pem.h> |
@@ -684,7 +684,7 @@ do_known_hosts(struct passwd *pw, const char *name) | |||
684 | if (delete_host && !c) | 684 | if (delete_host && !c) |
685 | print_host(out, cp, public, 0); | 685 | print_host(out, cp, public, 0); |
686 | } else if (hash_hosts) { | 686 | } else if (hash_hosts) { |
687 | for(cp2 = strsep(&cp, ","); | 687 | for (cp2 = strsep(&cp, ","); |
688 | cp2 != NULL && *cp2 != '\0'; | 688 | cp2 != NULL && *cp2 != '\0'; |
689 | cp2 = strsep(&cp, ",")) { | 689 | cp2 = strsep(&cp, ",")) { |
690 | if (strcspn(cp2, "*?!") != strlen(cp2)) | 690 | if (strcspn(cp2, "*?!") != strlen(cp2)) |
@@ -40,7 +40,7 @@ | |||
40 | */ | 40 | */ |
41 | 41 | ||
42 | #include "includes.h" | 42 | #include "includes.h" |
43 | RCSID("$OpenBSD: ssh.c,v 1.233 2005/03/01 17:22:06 jmc Exp $"); | 43 | RCSID("$OpenBSD: ssh.c,v 1.234 2005/03/10 22:01:06 deraadt Exp $"); |
44 | 44 | ||
45 | #include <openssl/evp.h> | 45 | #include <openssl/evp.h> |
46 | #include <openssl/err.h> | 46 | #include <openssl/err.h> |
@@ -856,8 +856,8 @@ ssh_init_forwarding(void) | |||
856 | for (i = 0; i < options.num_local_forwards; i++) { | 856 | for (i = 0; i < options.num_local_forwards; i++) { |
857 | debug("Local connections to %.200s:%d forwarded to remote " | 857 | debug("Local connections to %.200s:%d forwarded to remote " |
858 | "address %.200s:%d", | 858 | "address %.200s:%d", |
859 | (options.local_forwards[i].listen_host == NULL) ? | 859 | (options.local_forwards[i].listen_host == NULL) ? |
860 | (options.gateway_ports ? "*" : "LOCALHOST") : | 860 | (options.gateway_ports ? "*" : "LOCALHOST") : |
861 | options.local_forwards[i].listen_host, | 861 | options.local_forwards[i].listen_host, |
862 | options.local_forwards[i].listen_port, | 862 | options.local_forwards[i].listen_port, |
863 | options.local_forwards[i].connect_host, | 863 | options.local_forwards[i].connect_host, |
@@ -1343,7 +1343,7 @@ control_client(const char *path) | |||
1343 | 1343 | ||
1344 | switch (mux_command) { | 1344 | switch (mux_command) { |
1345 | case SSHMUX_COMMAND_ALIVE_CHECK: | 1345 | case SSHMUX_COMMAND_ALIVE_CHECK: |
1346 | fprintf(stderr, "Master running (pid=%d)\r\n", | 1346 | fprintf(stderr, "Master running (pid=%d)\r\n", |
1347 | control_server_pid); | 1347 | control_server_pid); |
1348 | exit(0); | 1348 | exit(0); |
1349 | case SSHMUX_COMMAND_TERMINATE: | 1349 | case SSHMUX_COMMAND_TERMINATE: |
diff --git a/sshconnect.c b/sshconnect.c index 49190560d..07703cf77 100644 --- a/sshconnect.c +++ b/sshconnect.c | |||
@@ -13,7 +13,7 @@ | |||
13 | */ | 13 | */ |
14 | 14 | ||
15 | #include "includes.h" | 15 | #include "includes.h" |
16 | RCSID("$OpenBSD: sshconnect.c,v 1.161 2005/03/02 01:00:06 djm Exp $"); | 16 | RCSID("$OpenBSD: sshconnect.c,v 1.162 2005/03/10 22:01:06 deraadt Exp $"); |
17 | 17 | ||
18 | #include <openssl/bn.h> | 18 | #include <openssl/bn.h> |
19 | 19 | ||
@@ -247,13 +247,13 @@ timeout_connect(int sockfd, const struct sockaddr *serv_addr, | |||
247 | tv.tv_sec = timeout; | 247 | tv.tv_sec = timeout; |
248 | tv.tv_usec = 0; | 248 | tv.tv_usec = 0; |
249 | 249 | ||
250 | for(;;) { | 250 | for (;;) { |
251 | rc = select(sockfd + 1, NULL, fdset, NULL, &tv); | 251 | rc = select(sockfd + 1, NULL, fdset, NULL, &tv); |
252 | if (rc != -1 || errno != EINTR) | 252 | if (rc != -1 || errno != EINTR) |
253 | break; | 253 | break; |
254 | } | 254 | } |
255 | 255 | ||
256 | switch(rc) { | 256 | switch (rc) { |
257 | case 0: | 257 | case 0: |
258 | /* Timed out */ | 258 | /* Timed out */ |
259 | errno = ETIMEDOUT; | 259 | errno = ETIMEDOUT; |