diff options
-rw-r--r-- | ChangeLog | 5 | ||||
-rw-r--r-- | authfile.c | 4 | ||||
-rw-r--r-- | channels.c | 4 | ||||
-rw-r--r-- | progressmeter.c | 4 | ||||
-rw-r--r-- | scard.c | 10 | ||||
-rw-r--r-- | servconf.c | 6 | ||||
-rw-r--r-- | ssh.c | 4 |
7 files changed, 20 insertions, 17 deletions
@@ -51,6 +51,9 @@ | |||
51 | [sshconnect1.c sshconnect2.c sshd.c sshlogin.c sshtty.c uuencode.c] | 51 | [sshconnect1.c sshconnect2.c sshd.c sshlogin.c sshtty.c uuencode.c] |
52 | [uuencode.h xmalloc.c] | 52 | [uuencode.h xmalloc.c] |
53 | move #include <stdio.h> out of includes.h | 53 | move #include <stdio.h> out of includes.h |
54 | - stevesk@cvs.openbsd.org 2006/08/01 23:36:12 | ||
55 | [authfile.c channels.c progressmeter.c scard.c servconf.c ssh.c] | ||
56 | clean extra spaces | ||
54 | 57 | ||
55 | 20060804 | 58 | 20060804 |
56 | - (dtucker) [configure.ac] The "crippled AES" test does not work on recent | 59 | - (dtucker) [configure.ac] The "crippled AES" test does not work on recent |
@@ -5121,4 +5124,4 @@ | |||
5121 | - (djm) Trim deprecated options from INSTALL. Mention UsePAM | 5124 | - (djm) Trim deprecated options from INSTALL. Mention UsePAM |
5122 | - (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu | 5125 | - (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu |
5123 | 5126 | ||
5124 | $Id: ChangeLog,v 1.4450 2006/08/05 01:37:59 djm Exp $ | 5127 | $Id: ChangeLog,v 1.4451 2006/08/05 01:38:40 djm Exp $ |
diff --git a/authfile.c b/authfile.c index f1d47b00b..400e60b39 100644 --- a/authfile.c +++ b/authfile.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: authfile.c,v 1.74 2006/08/01 23:22:47 stevesk Exp $ */ | 1 | /* $OpenBSD: authfile.c,v 1.75 2006/08/01 23:36:11 stevesk Exp $ */ |
2 | /* | 2 | /* |
3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
@@ -195,7 +195,7 @@ key_save_private_pem(Key *key, const char *filename, const char *_passphrase, | |||
195 | return 0; | 195 | return 0; |
196 | } | 196 | } |
197 | fp = fdopen(fd, "w"); | 197 | fp = fdopen(fd, "w"); |
198 | if (fp == NULL ) { | 198 | if (fp == NULL) { |
199 | error("fdopen %s failed: %s.", filename, strerror(errno)); | 199 | error("fdopen %s failed: %s.", filename, strerror(errno)); |
200 | close(fd); | 200 | close(fd); |
201 | return 0; | 201 | return 0; |
diff --git a/channels.c b/channels.c index 80cb32461..fb4d287d6 100644 --- a/channels.c +++ b/channels.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: channels.c,v 1.263 2006/08/01 23:22:47 stevesk Exp $ */ | 1 | /* $OpenBSD: channels.c,v 1.264 2006/08/01 23:36:11 stevesk Exp $ */ |
2 | /* | 2 | /* |
3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
@@ -1052,7 +1052,7 @@ channel_decode_socks5(Channel *c, fd_set *readset, fd_set *writeset) | |||
1052 | return 0; | 1052 | return 0; |
1053 | /* look for method: "NO AUTHENTICATION REQUIRED" */ | 1053 | /* look for method: "NO AUTHENTICATION REQUIRED" */ |
1054 | for (found = 0, i = 2 ; i < nmethods + 2; i++) { | 1054 | for (found = 0, i = 2 ; i < nmethods + 2; i++) { |
1055 | if (p[i] == SSH_SOCKS5_NOAUTH ) { | 1055 | if (p[i] == SSH_SOCKS5_NOAUTH) { |
1056 | found = 1; | 1056 | found = 1; |
1057 | break; | 1057 | break; |
1058 | } | 1058 | } |
diff --git a/progressmeter.c b/progressmeter.c index cbbb34023..e8534fa2f 100644 --- a/progressmeter.c +++ b/progressmeter.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: progressmeter.c,v 1.35 2006/08/01 23:22:47 stevesk Exp $ */ | 1 | /* $OpenBSD: progressmeter.c,v 1.36 2006/08/01 23:36:12 stevesk Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2003 Nils Nordman. All rights reserved. | 3 | * Copyright (c) 2003 Nils Nordman. All rights reserved. |
4 | * | 4 | * |
@@ -164,7 +164,7 @@ refresh_progress_meter(void) | |||
164 | len = 0; | 164 | len = 0; |
165 | if (len >= file_len + 1) | 165 | if (len >= file_len + 1) |
166 | len = file_len; | 166 | len = file_len; |
167 | for (i = len; i < file_len; i++ ) | 167 | for (i = len; i < file_len; i++) |
168 | buf[i] = ' '; | 168 | buf[i] = ' '; |
169 | buf[file_len] = '\0'; | 169 | buf[file_len] = '\0'; |
170 | } | 170 | } |
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: scard.c,v 1.33 2006/07/25 02:01:34 stevesk Exp $ */ | 1 | /* $OpenBSD: scard.c,v 1.34 2006/08/01 23:36:12 stevesk Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2001 Markus Friedl. All rights reserved. | 3 | * Copyright (c) 2001 Markus Friedl. All rights reserved. |
4 | * | 4 | * |
@@ -127,7 +127,7 @@ sc_init(void) | |||
127 | if (status == SCARD_ERROR_NOCARD) { | 127 | if (status == SCARD_ERROR_NOCARD) { |
128 | return SCARD_ERROR_NOCARD; | 128 | return SCARD_ERROR_NOCARD; |
129 | } | 129 | } |
130 | if (status < 0 ) { | 130 | if (status < 0) { |
131 | error("sc_open failed"); | 131 | error("sc_open failed"); |
132 | return status; | 132 | return status; |
133 | } | 133 | } |
@@ -217,7 +217,7 @@ sc_private_decrypt(int flen, u_char *from, u_char *to, RSA *rsa, | |||
217 | olen = len = sw = 0; | 217 | olen = len = sw = 0; |
218 | if (sc_fd < 0) { | 218 | if (sc_fd < 0) { |
219 | status = sc_init(); | 219 | status = sc_init(); |
220 | if (status < 0 ) | 220 | if (status < 0) |
221 | goto err; | 221 | goto err; |
222 | } | 222 | } |
223 | if (padding != RSA_PKCS1_PADDING) | 223 | if (padding != RSA_PKCS1_PADDING) |
@@ -257,7 +257,7 @@ sc_private_encrypt(int flen, u_char *from, u_char *to, RSA *rsa, | |||
257 | len = sw = 0; | 257 | len = sw = 0; |
258 | if (sc_fd < 0) { | 258 | if (sc_fd < 0) { |
259 | status = sc_init(); | 259 | status = sc_init(); |
260 | if (status < 0 ) | 260 | if (status < 0) |
261 | goto err; | 261 | goto err; |
262 | } | 262 | } |
263 | if (padding != RSA_PKCS1_PADDING) | 263 | if (padding != RSA_PKCS1_PADDING) |
@@ -380,7 +380,7 @@ sc_get_keys(const char *id, const char *pin) | |||
380 | key_free(k); | 380 | key_free(k); |
381 | return NULL; | 381 | return NULL; |
382 | } | 382 | } |
383 | if (status < 0 ) { | 383 | if (status < 0) { |
384 | error("sc_read_pubkey failed"); | 384 | error("sc_read_pubkey failed"); |
385 | key_free(k); | 385 | key_free(k); |
386 | return NULL; | 386 | return NULL; |
diff --git a/servconf.c b/servconf.c index 4edc80efe..b1fc45c50 100644 --- a/servconf.c +++ b/servconf.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: servconf.c,v 1.162 2006/08/01 23:22:47 stevesk Exp $ */ | 1 | /* $OpenBSD: servconf.c,v 1.163 2006/08/01 23:36:12 stevesk Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 3 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
4 | * All rights reserved | 4 | * All rights reserved |
@@ -961,7 +961,7 @@ parse_flag: | |||
961 | case sDenyUsers: | 961 | case sDenyUsers: |
962 | while ((arg = strdelim(&cp)) && *arg != '\0') { | 962 | while ((arg = strdelim(&cp)) && *arg != '\0') { |
963 | if (options->num_deny_users >= MAX_DENY_USERS) | 963 | if (options->num_deny_users >= MAX_DENY_USERS) |
964 | fatal( "%s line %d: too many deny users.", | 964 | fatal("%s line %d: too many deny users.", |
965 | filename, linenum); | 965 | filename, linenum); |
966 | options->deny_users[options->num_deny_users++] = | 966 | options->deny_users[options->num_deny_users++] = |
967 | xstrdup(arg); | 967 | xstrdup(arg); |
@@ -1096,7 +1096,7 @@ parse_flag: | |||
1096 | */ | 1096 | */ |
1097 | case sAuthorizedKeysFile: | 1097 | case sAuthorizedKeysFile: |
1098 | case sAuthorizedKeysFile2: | 1098 | case sAuthorizedKeysFile2: |
1099 | charptr = (opcode == sAuthorizedKeysFile ) ? | 1099 | charptr = (opcode == sAuthorizedKeysFile) ? |
1100 | &options->authorized_keys_file : | 1100 | &options->authorized_keys_file : |
1101 | &options->authorized_keys_file2; | 1101 | &options->authorized_keys_file2; |
1102 | goto parse_filename; | 1102 | goto parse_filename; |
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssh.c,v 1.291 2006/08/01 23:22:47 stevesk Exp $ */ | 1 | /* $OpenBSD: ssh.c,v 1.292 2006/08/01 23:36:12 stevesk Exp $ */ |
2 | /* | 2 | /* |
3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
@@ -1229,7 +1229,7 @@ load_public_identity_files(void) | |||
1229 | 1229 | ||
1230 | if (options.smartcard_device != NULL && | 1230 | if (options.smartcard_device != NULL && |
1231 | options.num_identity_files < SSH_MAX_IDENTITY_FILES && | 1231 | options.num_identity_files < SSH_MAX_IDENTITY_FILES && |
1232 | (keys = sc_get_keys(options.smartcard_device, NULL)) != NULL ) { | 1232 | (keys = sc_get_keys(options.smartcard_device, NULL)) != NULL) { |
1233 | int count = 0; | 1233 | int count = 0; |
1234 | for (i = 0; keys[i] != NULL; i++) { | 1234 | for (i = 0; keys[i] != NULL; i++) { |
1235 | count++; | 1235 | count++; |