summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--ChangeLog7
-rw-r--r--auth-options.c6
-rw-r--r--bufaux.c4
-rw-r--r--bufaux.h4
-rw-r--r--channels.c18
-rw-r--r--clientloop.c4
-rw-r--r--hostfile.c8
-rw-r--r--misc.c8
-rw-r--r--monitor.c4
-rw-r--r--readconf.c4
-rw-r--r--servconf.c4
-rw-r--r--sftp-client.c6
-rw-r--r--sftp.c4
-rw-r--r--ssh-add.c6
-rw-r--r--ssh-keygen.c4
-rw-r--r--ssh.c8
-rw-r--r--sshconnect.c6
17 files changed, 55 insertions, 50 deletions
diff --git a/ChangeLog b/ChangeLog
index 2fd25234c..0722b57c6 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -4,6 +4,11 @@
4 [readconf.c] 4 [readconf.c]
5 Check listen addresses for null, prevents xfree from dying during 5 Check listen addresses for null, prevents xfree from dying during
6 ClearAllForwardings (bz #996). From Craig Leres, ok markus@ 6 ClearAllForwardings (bz #996). From Craig Leres, ok markus@
7 - deraadt@cvs.openbsd.org 2005/03/10 22:01:05
8 [misc.c ssh-keygen.c servconf.c clientloop.c auth-options.c ssh-add.c
9 monitor.c sftp-client.c bufaux.h hostfile.c ssh.c sshconnect.c channels.c
10 readconf.c bufaux.c sftp.c]
11 spacing
7 12
820050313 1320050313
9 - (dtucker) [contrib/cygwin/ssh-host-config] Makes the query for the 14 - (dtucker) [contrib/cygwin/ssh-host-config] Makes the query for the
@@ -2338,4 +2343,4 @@
2338 - (djm) Trim deprecated options from INSTALL. Mention UsePAM 2343 - (djm) Trim deprecated options from INSTALL. Mention UsePAM
2339 - (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu 2344 - (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu
2340 2345
2341$Id: ChangeLog,v 1.3711 2005/03/14 12:02:46 dtucker Exp $ 2346$Id: ChangeLog,v 1.3712 2005/03/14 12:08:12 dtucker Exp $
diff --git a/auth-options.c b/auth-options.c
index 04d12d66e..829c37f1d 100644
--- a/auth-options.c
+++ b/auth-options.c
@@ -10,7 +10,7 @@
10 */ 10 */
11 11
12#include "includes.h" 12#include "includes.h"
13RCSID("$OpenBSD: auth-options.c,v 1.29 2005/03/01 10:09:52 djm Exp $"); 13RCSID("$OpenBSD: auth-options.c,v 1.30 2005/03/10 22:01:05 deraadt Exp $");
14 14
15#include "xmalloc.h" 15#include "xmalloc.h"
16#include "match.h" 16#include "match.h"
@@ -255,8 +255,8 @@ auth_parse_options(struct passwd *pw, char *opts, char *file, u_long linenum)
255 xfree(patterns); 255 xfree(patterns);
256 goto bad_option; 256 goto bad_option;
257 } 257 }
258 host = cleanhostname(host); 258 host = cleanhostname(host);
259 if (p == NULL || (port = a2port(p)) == 0) { 259 if (p == NULL || (port = a2port(p)) == 0) {
260 debug("%.100s, line %lu: Bad permitopen port " 260 debug("%.100s, line %lu: Bad permitopen port "
261 "<%.100s>", file, linenum, p ? p : ""); 261 "<%.100s>", file, linenum, p ? p : "");
262 auth_debug_add("%.100s, line %lu: " 262 auth_debug_add("%.100s, line %lu: "
diff --git a/bufaux.c b/bufaux.c
index 4ea6af1b6..5dbf2b770 100644
--- a/bufaux.c
+++ b/bufaux.c
@@ -37,7 +37,7 @@
37 */ 37 */
38 38
39#include "includes.h" 39#include "includes.h"
40RCSID("$OpenBSD: bufaux.c,v 1.34 2004/12/06 16:00:43 markus Exp $"); 40RCSID("$OpenBSD: bufaux.c,v 1.35 2005/03/10 22:01:05 deraadt Exp $");
41 41
42#include <openssl/bn.h> 42#include <openssl/bn.h>
43#include "bufaux.h" 43#include "bufaux.h"
@@ -179,7 +179,7 @@ buffer_get_bignum2_ret(Buffer *buffer, BIGNUM *value)
179{ 179{
180 u_int len; 180 u_int len;
181 u_char *bin; 181 u_char *bin;
182 182
183 if ((bin = buffer_get_string_ret(buffer, &len)) == NULL) { 183 if ((bin = buffer_get_string_ret(buffer, &len)) == NULL) {
184 error("buffer_get_bignum2_ret: invalid bignum"); 184 error("buffer_get_bignum2_ret: invalid bignum");
185 return (-1); 185 return (-1);
diff --git a/bufaux.h b/bufaux.h
index e30911ddc..f5efaed3e 100644
--- a/bufaux.h
+++ b/bufaux.h
@@ -1,4 +1,4 @@
1/* $OpenBSD: bufaux.h,v 1.20 2004/10/29 23:56:17 djm Exp $ */ 1/* $OpenBSD: bufaux.h,v 1.21 2005/03/10 22:01:05 deraadt Exp $ */
2 2
3/* 3/*
4 * Author: Tatu Ylonen <ylo@cs.hut.fi> 4 * Author: Tatu Ylonen <ylo@cs.hut.fi>
@@ -40,7 +40,7 @@ void buffer_put_string(Buffer *, const void *, u_int);
40void buffer_put_cstring(Buffer *, const char *); 40void buffer_put_cstring(Buffer *, const char *);
41 41
42#define buffer_skip_string(b) \ 42#define buffer_skip_string(b) \
43 do { u_int l = buffer_get_int(b); buffer_consume(b, l); } while(0) 43 do { u_int l = buffer_get_int(b); buffer_consume(b, l); } while (0)
44 44
45int buffer_put_bignum_ret(Buffer *, const BIGNUM *); 45int buffer_put_bignum_ret(Buffer *, const BIGNUM *);
46int buffer_get_bignum_ret(Buffer *, BIGNUM *); 46int buffer_get_bignum_ret(Buffer *, BIGNUM *);
diff --git a/channels.c b/channels.c
index 1be213bce..4bd9af8e6 100644
--- a/channels.c
+++ b/channels.c
@@ -39,7 +39,7 @@
39 */ 39 */
40 40
41#include "includes.h" 41#include "includes.h"
42RCSID("$OpenBSD: channels.c,v 1.212 2005/03/01 10:09:52 djm Exp $"); 42RCSID("$OpenBSD: channels.c,v 1.213 2005/03/10 22:01:05 deraadt Exp $");
43 43
44#include "ssh.h" 44#include "ssh.h"
45#include "ssh1.h" 45#include "ssh1.h"
@@ -1018,7 +1018,7 @@ channel_decode_socks5(Channel *c, fd_set * readset, fd_set * writeset)
1018 debug2("channel %d: only socks5 connect supported", c->self); 1018 debug2("channel %d: only socks5 connect supported", c->self);
1019 return -1; 1019 return -1;
1020 } 1020 }
1021 switch(s5_req.atyp){ 1021 switch (s5_req.atyp){
1022 case SSH_SOCKS5_IPV4: 1022 case SSH_SOCKS5_IPV4:
1023 addrlen = 4; 1023 addrlen = 4;
1024 af = AF_INET; 1024 af = AF_INET;
@@ -2199,11 +2199,11 @@ channel_setup_fwd_listener(int type, const char *listen_addr, u_short listen_por
2199 2199
2200 /* 2200 /*
2201 * Determine whether or not a port forward listens to loopback, 2201 * Determine whether or not a port forward listens to loopback,
2202 * specified address or wildcard. On the client, a specified bind 2202 * specified address or wildcard. On the client, a specified bind
2203 * address will always override gateway_ports. On the server, a 2203 * address will always override gateway_ports. On the server, a
2204 * gateway_ports of 1 (``yes'') will override the client's 2204 * gateway_ports of 1 (``yes'') will override the client's
2205 * specification and force a wildcard bind, whereas a value of 2 2205 * specification and force a wildcard bind, whereas a value of 2
2206 * (``clientspecified'') will bind to whatever address the client 2206 * (``clientspecified'') will bind to whatever address the client
2207 * asked for. 2207 * asked for.
2208 * 2208 *
2209 * Special-case listen_addrs are: 2209 * Special-case listen_addrs are:
@@ -2317,7 +2317,7 @@ channel_cancel_rport_listener(const char *host, u_short port)
2317 u_int i; 2317 u_int i;
2318 int found = 0; 2318 int found = 0;
2319 2319
2320 for(i = 0; i < channels_alloc; i++) { 2320 for (i = 0; i < channels_alloc; i++) {
2321 Channel *c = channels[i]; 2321 Channel *c = channels[i];
2322 2322
2323 if (c != NULL && c->type == SSH_CHANNEL_RPORT_LISTENER && 2323 if (c != NULL && c->type == SSH_CHANNEL_RPORT_LISTENER &&
@@ -2629,7 +2629,7 @@ channel_send_window_changes(void)
2629 struct winsize ws; 2629 struct winsize ws;
2630 2630
2631 for (i = 0; i < channels_alloc; i++) { 2631 for (i = 0; i < channels_alloc; i++) {
2632 if (channels[i] == NULL || !channels[i]->client_tty || 2632 if (channels[i] == NULL || !channels[i]->client_tty ||
2633 channels[i]->type != SSH_CHANNEL_OPEN) 2633 channels[i]->type != SSH_CHANNEL_OPEN)
2634 continue; 2634 continue;
2635 if (ioctl(channels[i]->rfd, TIOCGWINSZ, &ws) < 0) 2635 if (ioctl(channels[i]->rfd, TIOCGWINSZ, &ws) < 0)
diff --git a/clientloop.c b/clientloop.c
index 1e250883f..1591215bd 100644
--- a/clientloop.c
+++ b/clientloop.c
@@ -59,7 +59,7 @@
59 */ 59 */
60 60
61#include "includes.h" 61#include "includes.h"
62RCSID("$OpenBSD: clientloop.c,v 1.135 2005/03/01 10:09:52 djm Exp $"); 62RCSID("$OpenBSD: clientloop.c,v 1.136 2005/03/10 22:01:05 deraadt Exp $");
63 63
64#include "ssh.h" 64#include "ssh.h"
65#include "ssh1.h" 65#include "ssh1.h"
@@ -627,7 +627,7 @@ client_process_control(fd_set * readset)
627 "to %s? ", host); 627 "to %s? ", host);
628 if (allowed) 628 if (allowed)
629 quit_pending = 1; 629 quit_pending = 1;
630 /* FALLTHROUGH */ 630 /* FALLTHROUGH */
631 case SSHMUX_COMMAND_ALIVE_CHECK: 631 case SSHMUX_COMMAND_ALIVE_CHECK:
632 /* Reply for SSHMUX_COMMAND_TERMINATE and ALIVE_CHECK */ 632 /* Reply for SSHMUX_COMMAND_TERMINATE and ALIVE_CHECK */
633 buffer_clear(&m); 633 buffer_clear(&m);
diff --git a/hostfile.c b/hostfile.c
index 2e1c8bcd0..bf2a31c9b 100644
--- a/hostfile.c
+++ b/hostfile.c
@@ -36,7 +36,7 @@
36 */ 36 */
37 37
38#include "includes.h" 38#include "includes.h"
39RCSID("$OpenBSD: hostfile.c,v 1.33 2005/03/01 10:40:26 djm Exp $"); 39RCSID("$OpenBSD: hostfile.c,v 1.34 2005/03/10 22:01:05 deraadt Exp $");
40 40
41#include <resolv.h> 41#include <resolv.h>
42#include <openssl/hmac.h> 42#include <openssl/hmac.h>
@@ -92,7 +92,7 @@ extract_salt(const char *s, u_int l, char *salt, size_t salt_len)
92 salt_len, ret); 92 salt_len, ret);
93 return (-1); 93 return (-1);
94 } 94 }
95 95
96 return (0); 96 return (0);
97} 97}
98 98
@@ -123,7 +123,7 @@ host_hash(const char *host, const char *name_from_hostfile, u_int src_len)
123 HMAC_Final(&mac_ctx, result, NULL); 123 HMAC_Final(&mac_ctx, result, NULL);
124 HMAC_cleanup(&mac_ctx); 124 HMAC_cleanup(&mac_ctx);
125 125
126 if (__b64_ntop(salt, len, uu_salt, sizeof(uu_salt)) == -1 || 126 if (__b64_ntop(salt, len, uu_salt, sizeof(uu_salt)) == -1 ||
127 __b64_ntop(result, len, uu_result, sizeof(uu_result)) == -1) 127 __b64_ntop(result, len, uu_result, sizeof(uu_result)) == -1)
128 fatal("host_hash: __b64_ntop failed"); 128 fatal("host_hash: __b64_ntop failed");
129 129
@@ -310,7 +310,7 @@ lookup_key_in_hostfile_by_type(const char *filename, const char *host,
310 */ 310 */
311 311
312int 312int
313add_host_to_hostfile(const char *filename, const char *host, const Key *key, 313add_host_to_hostfile(const char *filename, const char *host, const Key *key,
314 int store_hash) 314 int store_hash)
315{ 315{
316 FILE *f; 316 FILE *f;
diff --git a/misc.c b/misc.c
index 2e366f81b..7adbcea1c 100644
--- a/misc.c
+++ b/misc.c
@@ -23,7 +23,7 @@
23 */ 23 */
24 24
25#include "includes.h" 25#include "includes.h"
26RCSID("$OpenBSD: misc.c,v 1.28 2005/03/01 10:09:52 djm Exp $"); 26RCSID("$OpenBSD: misc.c,v 1.29 2005/03/10 22:01:05 deraadt Exp $");
27 27
28#include "misc.h" 28#include "misc.h"
29#include "log.h" 29#include "log.h"
@@ -303,13 +303,13 @@ hpdelim(char **cp)
303 case '\0': 303 case '\0':
304 *cp = NULL; /* no more fields*/ 304 *cp = NULL; /* no more fields*/
305 break; 305 break;
306 306
307 case ':': 307 case ':':
308 case '/': 308 case '/':
309 *s = '\0'; /* terminate */ 309 *s = '\0'; /* terminate */
310 *cp = s + 1; 310 *cp = s + 1;
311 break; 311 break;
312 312
313 default: 313 default:
314 return NULL; 314 return NULL;
315 } 315 }
@@ -391,7 +391,7 @@ read_keyfile_line(FILE *f, const char *filename, char *buf, size_t bufsz,
391 debug("%s: %s line %lu exceeds size limit", __func__, 391 debug("%s: %s line %lu exceeds size limit", __func__,
392 filename, *lineno); 392 filename, *lineno);
393 /* discard remainder of line */ 393 /* discard remainder of line */
394 while(fgetc(f) != '\n' && !feof(f)) 394 while (fgetc(f) != '\n' && !feof(f))
395 ; /* nothing */ 395 ; /* nothing */
396 } 396 }
397 } 397 }
diff --git a/monitor.c b/monitor.c
index 301e150b3..4dc11a275 100644
--- a/monitor.c
+++ b/monitor.c
@@ -25,7 +25,7 @@
25 */ 25 */
26 26
27#include "includes.h" 27#include "includes.h"
28RCSID("$OpenBSD: monitor.c,v 1.62 2005/01/30 11:18:08 dtucker Exp $"); 28RCSID("$OpenBSD: monitor.c,v 1.63 2005/03/10 22:01:05 deraadt Exp $");
29 29
30#include <openssl/dh.h> 30#include <openssl/dh.h>
31 31
@@ -976,7 +976,7 @@ mm_answer_keyallowed(int sock, Buffer *m)
976 debug3("%s: key_from_blob: %p", __func__, key); 976 debug3("%s: key_from_blob: %p", __func__, key);
977 977
978 if (key != NULL && authctxt->valid) { 978 if (key != NULL && authctxt->valid) {
979 switch(type) { 979 switch (type) {
980 case MM_USERKEY: 980 case MM_USERKEY:
981 allowed = options.pubkey_authentication && 981 allowed = options.pubkey_authentication &&
982 user_key_allowed(authctxt->pw, key); 982 user_key_allowed(authctxt->pw, key);
diff --git a/readconf.c b/readconf.c
index f35fe5647..8ace1bbd4 100644
--- a/readconf.c
+++ b/readconf.c
@@ -12,7 +12,7 @@
12 */ 12 */
13 13
14#include "includes.h" 14#include "includes.h"
15RCSID("$OpenBSD: readconf.c,v 1.138 2005/03/10 10:15:02 dtucker Exp $"); 15RCSID("$OpenBSD: readconf.c,v 1.139 2005/03/10 22:01:05 deraadt Exp $");
16 16
17#include "ssh.h" 17#include "ssh.h"
18#include "xmalloc.h" 18#include "xmalloc.h"
@@ -301,7 +301,7 @@ process_config_line(Options *options, const char *host,
301 Forward fwd; 301 Forward fwd;
302 302
303 /* Strip trailing whitespace */ 303 /* Strip trailing whitespace */
304 for(len = strlen(line) - 1; len > 0; len--) { 304 for (len = strlen(line) - 1; len > 0; len--) {
305 if (strchr(WHITESPACE, line[len]) == NULL) 305 if (strchr(WHITESPACE, line[len]) == NULL)
306 break; 306 break;
307 line[len] = '\0'; 307 line[len] = '\0';
diff --git a/servconf.c b/servconf.c
index 2d1a0c362..96ad18084 100644
--- a/servconf.c
+++ b/servconf.c
@@ -10,7 +10,7 @@
10 */ 10 */
11 11
12#include "includes.h" 12#include "includes.h"
13RCSID("$OpenBSD: servconf.c,v 1.139 2005/03/01 10:09:52 djm Exp $"); 13RCSID("$OpenBSD: servconf.c,v 1.140 2005/03/10 22:01:05 deraadt Exp $");
14 14
15#include "ssh.h" 15#include "ssh.h"
16#include "log.h" 16#include "log.h"
@@ -1001,7 +1001,7 @@ parse_server_config(ServerOptions *options, const char *filename, Buffer *conf)
1001 1001
1002 obuf = cbuf = xstrdup(buffer_ptr(conf)); 1002 obuf = cbuf = xstrdup(buffer_ptr(conf));
1003 linenum = 1; 1003 linenum = 1;
1004 while((cp = strsep(&cbuf, "\n")) != NULL) { 1004 while ((cp = strsep(&cbuf, "\n")) != NULL) {
1005 if (process_server_config_line(options, cp, filename, 1005 if (process_server_config_line(options, cp, filename,
1006 linenum++) != 0) 1006 linenum++) != 0)
1007 bad_options++; 1007 bad_options++;
diff --git a/sftp-client.c b/sftp-client.c
index d894a11f2..92df42751 100644
--- a/sftp-client.c
+++ b/sftp-client.c
@@ -20,7 +20,7 @@
20/* XXX: copy between two remote sites */ 20/* XXX: copy between two remote sites */
21 21
22#include "includes.h" 22#include "includes.h"
23RCSID("$OpenBSD: sftp-client.c,v 1.52 2004/11/25 22:22:14 markus Exp $"); 23RCSID("$OpenBSD: sftp-client.c,v 1.53 2005/03/10 22:01:05 deraadt Exp $");
24 24
25#include "openbsd-compat/sys-queue.h" 25#include "openbsd-compat/sys-queue.h"
26 26
@@ -856,7 +856,7 @@ do_download(struct sftp_conn *conn, char *remote_path, char *local_path,
856 debug3("Received reply T:%u I:%u R:%d", type, id, max_req); 856 debug3("Received reply T:%u I:%u R:%d", type, id, max_req);
857 857
858 /* Find the request in our queue */ 858 /* Find the request in our queue */
859 for(req = TAILQ_FIRST(&requests); 859 for (req = TAILQ_FIRST(&requests);
860 req != NULL && req->id != id; 860 req != NULL && req->id != id;
861 req = TAILQ_NEXT(req, tq)) 861 req = TAILQ_NEXT(req, tq))
862 ; 862 ;
@@ -1109,7 +1109,7 @@ do_upload(struct sftp_conn *conn, char *local_path, char *remote_path,
1109 debug3("SSH2_FXP_STATUS %d", status); 1109 debug3("SSH2_FXP_STATUS %d", status);
1110 1110
1111 /* Find the request in our queue */ 1111 /* Find the request in our queue */
1112 for(ack = TAILQ_FIRST(&acks); 1112 for (ack = TAILQ_FIRST(&acks);
1113 ack != NULL && ack->id != r_id; 1113 ack != NULL && ack->id != r_id;
1114 ack = TAILQ_NEXT(ack, tq)) 1114 ack = TAILQ_NEXT(ack, tq))
1115 ; 1115 ;
diff --git a/sftp.c b/sftp.c
index f8553ed82..16a6cf0c6 100644
--- a/sftp.c
+++ b/sftp.c
@@ -16,7 +16,7 @@
16 16
17#include "includes.h" 17#include "includes.h"
18 18
19RCSID("$OpenBSD: sftp.c,v 1.62 2005/02/20 22:59:06 djm Exp $"); 19RCSID("$OpenBSD: sftp.c,v 1.63 2005/03/10 22:01:05 deraadt Exp $");
20 20
21#ifdef USE_LIBEDIT 21#ifdef USE_LIBEDIT
22#include <histedit.h> 22#include <histedit.h>
@@ -357,7 +357,7 @@ parse_ls_flags(const char **cpp, int *lflag)
357 357
358 /* Check for flags */ 358 /* Check for flags */
359 if (cp++[0] == '-') { 359 if (cp++[0] == '-') {
360 for(; strchr(WHITESPACE, *cp) == NULL; cp++) { 360 for (; strchr(WHITESPACE, *cp) == NULL; cp++) {
361 switch (*cp) { 361 switch (*cp) {
362 case 'l': 362 case 'l':
363 *lflag &= ~VIEW_FLAGS; 363 *lflag &= ~VIEW_FLAGS;
diff --git a/ssh-add.c b/ssh-add.c
index 06a52464e..a796647a7 100644
--- a/ssh-add.c
+++ b/ssh-add.c
@@ -35,7 +35,7 @@
35 */ 35 */
36 36
37#include "includes.h" 37#include "includes.h"
38RCSID("$OpenBSD: ssh-add.c,v 1.70 2004/05/08 00:21:31 djm Exp $"); 38RCSID("$OpenBSD: ssh-add.c,v 1.71 2005/03/10 22:01:06 deraadt Exp $");
39 39
40#include <openssl/evp.h> 40#include <openssl/evp.h>
41 41
@@ -389,7 +389,7 @@ main(int argc, char **argv)
389 goto done; 389 goto done;
390 } 390 }
391 391
392 for(i = 0; default_files[i]; i++) { 392 for (i = 0; default_files[i]; i++) {
393 snprintf(buf, sizeof(buf), "%s/%s", pw->pw_dir, 393 snprintf(buf, sizeof(buf), "%s/%s", pw->pw_dir,
394 default_files[i]); 394 default_files[i]);
395 if (stat(buf, &st) < 0) 395 if (stat(buf, &st) < 0)
@@ -402,7 +402,7 @@ main(int argc, char **argv)
402 if (count == 0) 402 if (count == 0)
403 ret = 1; 403 ret = 1;
404 } else { 404 } else {
405 for(i = 0; i < argc; i++) { 405 for (i = 0; i < argc; i++) {
406 if (do_file(ac, deleting, argv[i]) == -1) 406 if (do_file(ac, deleting, argv[i]) == -1)
407 ret = 1; 407 ret = 1;
408 } 408 }
diff --git a/ssh-keygen.c b/ssh-keygen.c
index a9931d4d8..b38e9c9c4 100644
--- a/ssh-keygen.c
+++ b/ssh-keygen.c
@@ -12,7 +12,7 @@
12 */ 12 */
13 13
14#include "includes.h" 14#include "includes.h"
15RCSID("$OpenBSD: ssh-keygen.c,v 1.120 2005/03/02 01:27:41 djm Exp $"); 15RCSID("$OpenBSD: ssh-keygen.c,v 1.121 2005/03/10 22:01:06 deraadt Exp $");
16 16
17#include <openssl/evp.h> 17#include <openssl/evp.h>
18#include <openssl/pem.h> 18#include <openssl/pem.h>
@@ -684,7 +684,7 @@ do_known_hosts(struct passwd *pw, const char *name)
684 if (delete_host && !c) 684 if (delete_host && !c)
685 print_host(out, cp, public, 0); 685 print_host(out, cp, public, 0);
686 } else if (hash_hosts) { 686 } else if (hash_hosts) {
687 for(cp2 = strsep(&cp, ","); 687 for (cp2 = strsep(&cp, ",");
688 cp2 != NULL && *cp2 != '\0'; 688 cp2 != NULL && *cp2 != '\0';
689 cp2 = strsep(&cp, ",")) { 689 cp2 = strsep(&cp, ",")) {
690 if (strcspn(cp2, "*?!") != strlen(cp2)) 690 if (strcspn(cp2, "*?!") != strlen(cp2))
diff --git a/ssh.c b/ssh.c
index 9acec3082..1f025c784 100644
--- a/ssh.c
+++ b/ssh.c
@@ -40,7 +40,7 @@
40 */ 40 */
41 41
42#include "includes.h" 42#include "includes.h"
43RCSID("$OpenBSD: ssh.c,v 1.233 2005/03/01 17:22:06 jmc Exp $"); 43RCSID("$OpenBSD: ssh.c,v 1.234 2005/03/10 22:01:06 deraadt Exp $");
44 44
45#include <openssl/evp.h> 45#include <openssl/evp.h>
46#include <openssl/err.h> 46#include <openssl/err.h>
@@ -856,8 +856,8 @@ ssh_init_forwarding(void)
856 for (i = 0; i < options.num_local_forwards; i++) { 856 for (i = 0; i < options.num_local_forwards; i++) {
857 debug("Local connections to %.200s:%d forwarded to remote " 857 debug("Local connections to %.200s:%d forwarded to remote "
858 "address %.200s:%d", 858 "address %.200s:%d",
859 (options.local_forwards[i].listen_host == NULL) ? 859 (options.local_forwards[i].listen_host == NULL) ?
860 (options.gateway_ports ? "*" : "LOCALHOST") : 860 (options.gateway_ports ? "*" : "LOCALHOST") :
861 options.local_forwards[i].listen_host, 861 options.local_forwards[i].listen_host,
862 options.local_forwards[i].listen_port, 862 options.local_forwards[i].listen_port,
863 options.local_forwards[i].connect_host, 863 options.local_forwards[i].connect_host,
@@ -1343,7 +1343,7 @@ control_client(const char *path)
1343 1343
1344 switch (mux_command) { 1344 switch (mux_command) {
1345 case SSHMUX_COMMAND_ALIVE_CHECK: 1345 case SSHMUX_COMMAND_ALIVE_CHECK:
1346 fprintf(stderr, "Master running (pid=%d)\r\n", 1346 fprintf(stderr, "Master running (pid=%d)\r\n",
1347 control_server_pid); 1347 control_server_pid);
1348 exit(0); 1348 exit(0);
1349 case SSHMUX_COMMAND_TERMINATE: 1349 case SSHMUX_COMMAND_TERMINATE:
diff --git a/sshconnect.c b/sshconnect.c
index 49190560d..07703cf77 100644
--- a/sshconnect.c
+++ b/sshconnect.c
@@ -13,7 +13,7 @@
13 */ 13 */
14 14
15#include "includes.h" 15#include "includes.h"
16RCSID("$OpenBSD: sshconnect.c,v 1.161 2005/03/02 01:00:06 djm Exp $"); 16RCSID("$OpenBSD: sshconnect.c,v 1.162 2005/03/10 22:01:06 deraadt Exp $");
17 17
18#include <openssl/bn.h> 18#include <openssl/bn.h>
19 19
@@ -247,13 +247,13 @@ timeout_connect(int sockfd, const struct sockaddr *serv_addr,
247 tv.tv_sec = timeout; 247 tv.tv_sec = timeout;
248 tv.tv_usec = 0; 248 tv.tv_usec = 0;
249 249
250 for(;;) { 250 for (;;) {
251 rc = select(sockfd + 1, NULL, fdset, NULL, &tv); 251 rc = select(sockfd + 1, NULL, fdset, NULL, &tv);
252 if (rc != -1 || errno != EINTR) 252 if (rc != -1 || errno != EINTR)
253 break; 253 break;
254 } 254 }
255 255
256 switch(rc) { 256 switch (rc) {
257 case 0: 257 case 0:
258 /* Timed out */ 258 /* Timed out */
259 errno = ETIMEDOUT; 259 errno = ETIMEDOUT;