diff options
-rw-r--r-- | ChangeLog | 5 | ||||
-rw-r--r-- | auth2-chall.c | 4 | ||||
-rw-r--r-- | channels.c | 4 | ||||
-rw-r--r-- | dns.c | 4 | ||||
-rw-r--r-- | sftp.c | 4 | ||||
-rw-r--r-- | ssh-keygen.c | 6 | ||||
-rw-r--r-- | ssh.c | 4 |
7 files changed, 17 insertions, 14 deletions
@@ -32,6 +32,9 @@ | |||
32 | - stevesk@cvs.openbsd.org 2007/01/03 00:53:38 | 32 | - stevesk@cvs.openbsd.org 2007/01/03 00:53:38 |
33 | [ssh-keygen.c] | 33 | [ssh-keygen.c] |
34 | remove small dead code; arnaud.lacombe.1@ulaval.ca via Coverity scan | 34 | remove small dead code; arnaud.lacombe.1@ulaval.ca via Coverity scan |
35 | - stevesk@cvs.openbsd.org 2007/01/03 03:01:40 | ||
36 | [auth2-chall.c channels.c dns.c sftp.c ssh-keygen.c ssh.c] | ||
37 | spaces | ||
35 | 38 | ||
36 | 20061205 | 39 | 20061205 |
37 | - (djm) [auth.c] Fix NULL pointer dereference in fakepw(). Crash would | 40 | - (djm) [auth.c] Fix NULL pointer dereference in fakepw(). Crash would |
@@ -2652,4 +2655,4 @@ | |||
2652 | OpenServer 6 and add osr5bigcrypt support so when someone migrates | 2655 | OpenServer 6 and add osr5bigcrypt support so when someone migrates |
2653 | passwords between UnixWare and OpenServer they will still work. OK dtucker@ | 2656 | passwords between UnixWare and OpenServer they will still work. OK dtucker@ |
2654 | 2657 | ||
2655 | $Id: ChangeLog,v 1.4599 2007/01/05 05:29:55 djm Exp $ | 2658 | $Id: ChangeLog,v 1.4600 2007/01/05 05:30:16 djm Exp $ |
diff --git a/auth2-chall.c b/auth2-chall.c index b78b739cd..51059c2bd 100644 --- a/auth2-chall.c +++ b/auth2-chall.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: auth2-chall.c,v 1.31 2006/08/05 08:28:24 dtucker Exp $ */ | 1 | /* $OpenBSD: auth2-chall.c,v 1.32 2007/01/03 03:01:40 stevesk Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2001 Markus Friedl. All rights reserved. | 3 | * Copyright (c) 2001 Markus Friedl. All rights reserved. |
4 | * Copyright (c) 2001 Per Allansson. All rights reserved. | 4 | * Copyright (c) 2001 Per Allansson. All rights reserved. |
@@ -206,7 +206,7 @@ auth2_challenge_stop(Authctxt *authctxt) | |||
206 | { | 206 | { |
207 | /* unregister callback */ | 207 | /* unregister callback */ |
208 | dispatch_set(SSH2_MSG_USERAUTH_INFO_RESPONSE, NULL); | 208 | dispatch_set(SSH2_MSG_USERAUTH_INFO_RESPONSE, NULL); |
209 | if (authctxt->kbdintctxt != NULL) { | 209 | if (authctxt->kbdintctxt != NULL) { |
210 | kbdint_free(authctxt->kbdintctxt); | 210 | kbdint_free(authctxt->kbdintctxt); |
211 | authctxt->kbdintctxt = NULL; | 211 | authctxt->kbdintctxt = NULL; |
212 | } | 212 | } |
diff --git a/channels.c b/channels.c index 6be121970..9d522a6c3 100644 --- a/channels.c +++ b/channels.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: channels.c,v 1.267 2006/12/12 03:58:42 djm Exp $ */ | 1 | /* $OpenBSD: channels.c,v 1.268 2007/01/03 03:01:40 stevesk Exp $ */ |
2 | /* | 2 | /* |
3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
@@ -1052,7 +1052,7 @@ channel_decode_socks5(Channel *c, fd_set *readset, fd_set *writeset) | |||
1052 | if (have < nmethods + 2) | 1052 | if (have < nmethods + 2) |
1053 | return 0; | 1053 | return 0; |
1054 | /* look for method: "NO AUTHENTICATION REQUIRED" */ | 1054 | /* look for method: "NO AUTHENTICATION REQUIRED" */ |
1055 | for (found = 0, i = 2 ; i < nmethods + 2; i++) { | 1055 | for (found = 0, i = 2; i < nmethods + 2; i++) { |
1056 | if (p[i] == SSH_SOCKS5_NOAUTH) { | 1056 | if (p[i] == SSH_SOCKS5_NOAUTH) { |
1057 | found = 1; | 1057 | found = 1; |
1058 | break; | 1058 | break; |
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: dns.c,v 1.23 2006/08/03 03:34:42 deraadt Exp $ */ | 1 | /* $OpenBSD: dns.c,v 1.24 2007/01/03 03:01:40 stevesk Exp $ */ |
2 | 2 | ||
3 | /* | 3 | /* |
4 | * Copyright (c) 2003 Wesley Griffin. All rights reserved. | 4 | * Copyright (c) 2003 Wesley Griffin. All rights reserved. |
@@ -217,7 +217,7 @@ verify_host_key_dns(const char *hostname, struct sockaddr *address, | |||
217 | if (fingerprints->rri_nrdatas) | 217 | if (fingerprints->rri_nrdatas) |
218 | *flags |= DNS_VERIFY_FOUND; | 218 | *flags |= DNS_VERIFY_FOUND; |
219 | 219 | ||
220 | for (counter = 0; counter < fingerprints->rri_nrdatas; counter++) { | 220 | for (counter = 0; counter < fingerprints->rri_nrdatas; counter++) { |
221 | /* | 221 | /* |
222 | * Extract the key from the answer. Ignore any badly | 222 | * Extract the key from the answer. Ignore any badly |
223 | * formatted fingerprints. | 223 | * formatted fingerprints. |
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: sftp.c,v 1.94 2006/11/23 01:35:11 ray Exp $ */ | 1 | /* $OpenBSD: sftp.c,v 1.95 2007/01/03 03:01:40 stevesk Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2001-2004 Damien Miller <djm@openbsd.org> | 3 | * Copyright (c) 2001-2004 Damien Miller <djm@openbsd.org> |
4 | * | 4 | * |
@@ -1566,7 +1566,7 @@ main(int argc, char **argv) | |||
1566 | fprintf(stderr, "Missing username\n"); | 1566 | fprintf(stderr, "Missing username\n"); |
1567 | usage(); | 1567 | usage(); |
1568 | } | 1568 | } |
1569 | addargs(&args, "-l%s",userhost); | 1569 | addargs(&args, "-l%s", userhost); |
1570 | } | 1570 | } |
1571 | 1571 | ||
1572 | if ((cp = colon(host)) != NULL) { | 1572 | if ((cp = colon(host)) != NULL) { |
diff --git a/ssh-keygen.c b/ssh-keygen.c index f43b12493..4c5b14005 100644 --- a/ssh-keygen.c +++ b/ssh-keygen.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssh-keygen.c,v 1.157 2007/01/03 00:53:38 stevesk Exp $ */ | 1 | /* $OpenBSD: ssh-keygen.c,v 1.158 2007/01/03 03:01:40 stevesk Exp $ */ |
2 | /* | 2 | /* |
3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
4 | * Copyright (c) 1994 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 4 | * Copyright (c) 1994 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
@@ -253,7 +253,7 @@ do_convert_private_ssh2_from_blob(u_char *blob, u_int blen) | |||
253 | i2 = buffer_get_int(&b); | 253 | i2 = buffer_get_int(&b); |
254 | i3 = buffer_get_int(&b); | 254 | i3 = buffer_get_int(&b); |
255 | i4 = buffer_get_int(&b); | 255 | i4 = buffer_get_int(&b); |
256 | debug("ignore (%d %d %d %d)", i1,i2,i3,i4); | 256 | debug("ignore (%d %d %d %d)", i1, i2, i3, i4); |
257 | if (strcmp(cipher, "none") != 0) { | 257 | if (strcmp(cipher, "none") != 0) { |
258 | error("unsupported cipher %s", cipher); | 258 | error("unsupported cipher %s", cipher); |
259 | xfree(cipher); | 259 | xfree(cipher); |
@@ -553,7 +553,7 @@ do_fingerprint(struct passwd *pw) | |||
553 | for (cp = line; *cp == ' ' || *cp == '\t'; cp++) | 553 | for (cp = line; *cp == ' ' || *cp == '\t'; cp++) |
554 | ; | 554 | ; |
555 | if (!*cp || *cp == '\n' || *cp == '#') | 555 | if (!*cp || *cp == '\n' || *cp == '#') |
556 | continue ; | 556 | continue; |
557 | i = strtol(cp, &ep, 10); | 557 | i = strtol(cp, &ep, 10); |
558 | if (i == 0 || ep == NULL || (*ep != ' ' && *ep != '\t')) { | 558 | if (i == 0 || ep == NULL || (*ep != ' ' && *ep != '\t')) { |
559 | int quoted = 0; | 559 | int quoted = 0; |
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssh.c,v 1.294 2006/10/06 02:29:19 djm Exp $ */ | 1 | /* $OpenBSD: ssh.c,v 1.295 2007/01/03 03:01:40 stevesk Exp $ */ |
2 | /* | 2 | /* |
3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
@@ -614,7 +614,7 @@ main(int ac, char **av) | |||
614 | if (!read_config_file(config, host, &options, 0)) | 614 | if (!read_config_file(config, host, &options, 0)) |
615 | fatal("Can't open user config file %.100s: " | 615 | fatal("Can't open user config file %.100s: " |
616 | "%.100s", config, strerror(errno)); | 616 | "%.100s", config, strerror(errno)); |
617 | } else { | 617 | } else { |
618 | snprintf(buf, sizeof buf, "%.100s/%.100s", pw->pw_dir, | 618 | snprintf(buf, sizeof buf, "%.100s/%.100s", pw->pw_dir, |
619 | _PATH_SSH_USER_CONFFILE); | 619 | _PATH_SSH_USER_CONFFILE); |
620 | (void)read_config_file(buf, host, &options, 1); | 620 | (void)read_config_file(buf, host, &options, 1); |