summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--auth-bsdauth.c4
-rw-r--r--monitor.c6
-rw-r--r--sshbuf-getput-basic.c8
3 files changed, 9 insertions, 9 deletions
diff --git a/auth-bsdauth.c b/auth-bsdauth.c
index 37ff893e6..e00718f2e 100644
--- a/auth-bsdauth.c
+++ b/auth-bsdauth.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: auth-bsdauth.c,v 1.13 2014/06/24 01:13:21 djm Exp $ */ 1/* $OpenBSD: auth-bsdauth.c,v 1.14 2015/10/20 23:24:25 mmcc Exp $ */
2/* 2/*
3 * Copyright (c) 2001 Markus Friedl. All rights reserved. 3 * Copyright (c) 2001 Markus Friedl. All rights reserved.
4 * 4 *
@@ -103,7 +103,7 @@ bsdauth_respond(void *ctx, u_int numresponses, char **responses)
103 if (!authctxt->valid) 103 if (!authctxt->valid)
104 return -1; 104 return -1;
105 105
106 if (authctxt->as == 0) 106 if (authctxt->as == NULL)
107 error("bsdauth_respond: no bsd auth session"); 107 error("bsdauth_respond: no bsd auth session");
108 108
109 if (numresponses != 1) 109 if (numresponses != 1)
diff --git a/monitor.c b/monitor.c
index 0af23d650..395a6f64e 100644
--- a/monitor.c
+++ b/monitor.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: monitor.c,v 1.153 2015/09/04 04:44:08 djm Exp $ */ 1/* $OpenBSD: monitor.c,v 1.154 2015/10/20 23:24:25 mmcc Exp $ */
2/* 2/*
3 * Copyright 2002 Niels Provos <provos@citi.umich.edu> 3 * Copyright 2002 Niels Provos <provos@citi.umich.edu>
4 * Copyright 2002 Markus Friedl <markus@openbsd.org> 4 * Copyright 2002 Markus Friedl <markus@openbsd.org>
@@ -966,7 +966,7 @@ mm_answer_bsdauthrespond(int sock, Buffer *m)
966 char *response; 966 char *response;
967 int authok; 967 int authok;
968 968
969 if (authctxt->as == 0) 969 if (authctxt->as == NULL)
970 fatal("%s: no bsd auth session", __func__); 970 fatal("%s: no bsd auth session", __func__);
971 971
972 response = buffer_get_string(m, NULL); 972 response = buffer_get_string(m, NULL);
@@ -1847,7 +1847,7 @@ monitor_apply_keystate(struct monitor *pmonitor)
1847 sshbuf_free(child_state); 1847 sshbuf_free(child_state);
1848 child_state = NULL; 1848 child_state = NULL;
1849 1849
1850 if ((kex = ssh->kex) != 0) { 1850 if ((kex = ssh->kex) != NULL) {
1851 /* XXX set callbacks */ 1851 /* XXX set callbacks */
1852#ifdef WITH_OPENSSL 1852#ifdef WITH_OPENSSL
1853 kex->kex[KEX_DH_GRP1_SHA1] = kexdh_server; 1853 kex->kex[KEX_DH_GRP1_SHA1] = kexdh_server;
diff --git a/sshbuf-getput-basic.c b/sshbuf-getput-basic.c
index 8ff8a0a28..23e0fd7c1 100644
--- a/sshbuf-getput-basic.c
+++ b/sshbuf-getput-basic.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: sshbuf-getput-basic.c,v 1.4 2015/01/14 15:02:39 djm Exp $ */ 1/* $OpenBSD: sshbuf-getput-basic.c,v 1.5 2015/10/20 23:24:25 mmcc Exp $ */
2/* 2/*
3 * Copyright (c) 2011 Damien Miller 3 * Copyright (c) 2011 Damien Miller
4 * 4 *
@@ -131,7 +131,7 @@ sshbuf_get_string_direct(struct sshbuf *buf, const u_char **valp, size_t *lenp)
131 *lenp = 0; 131 *lenp = 0;
132 if ((r = sshbuf_peek_string_direct(buf, &p, &len)) < 0) 132 if ((r = sshbuf_peek_string_direct(buf, &p, &len)) < 0)
133 return r; 133 return r;
134 if (valp != 0) 134 if (valp != NULL)
135 *valp = p; 135 *valp = p;
136 if (lenp != NULL) 136 if (lenp != NULL)
137 *lenp = len; 137 *lenp = len;
@@ -168,7 +168,7 @@ sshbuf_peek_string_direct(const struct sshbuf *buf, const u_char **valp,
168 SSHBUF_DBG(("SSH_ERR_MESSAGE_INCOMPLETE")); 168 SSHBUF_DBG(("SSH_ERR_MESSAGE_INCOMPLETE"));
169 return SSH_ERR_MESSAGE_INCOMPLETE; 169 return SSH_ERR_MESSAGE_INCOMPLETE;
170 } 170 }
171 if (valp != 0) 171 if (valp != NULL)
172 *valp = p + 4; 172 *valp = p + 4;
173 if (lenp != NULL) 173 if (lenp != NULL)
174 *lenp = len; 174 *lenp = len;
@@ -448,7 +448,7 @@ sshbuf_get_bignum2_bytes_direct(struct sshbuf *buf,
448 d++; 448 d++;
449 len--; 449 len--;
450 } 450 }
451 if (valp != 0) 451 if (valp != NULL)
452 *valp = d; 452 *valp = d;
453 if (lenp != NULL) 453 if (lenp != NULL)
454 *lenp = len; 454 *lenp = len;