summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--ChangeLog5
-rw-r--r--authfile.c4
-rw-r--r--channels.c4
-rw-r--r--progressmeter.c4
-rw-r--r--scard.c10
-rw-r--r--servconf.c6
-rw-r--r--ssh.c4
7 files changed, 20 insertions, 17 deletions
diff --git a/ChangeLog b/ChangeLog
index de401547e..b955ea8a4 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -51,6 +51,9 @@
51 [sshconnect1.c sshconnect2.c sshd.c sshlogin.c sshtty.c uuencode.c] 51 [sshconnect1.c sshconnect2.c sshd.c sshlogin.c sshtty.c uuencode.c]
52 [uuencode.h xmalloc.c] 52 [uuencode.h xmalloc.c]
53 move #include <stdio.h> out of includes.h 53 move #include <stdio.h> out of includes.h
54 - stevesk@cvs.openbsd.org 2006/08/01 23:36:12
55 [authfile.c channels.c progressmeter.c scard.c servconf.c ssh.c]
56 clean extra spaces
54 57
5520060804 5820060804
56 - (dtucker) [configure.ac] The "crippled AES" test does not work on recent 59 - (dtucker) [configure.ac] The "crippled AES" test does not work on recent
@@ -5121,4 +5124,4 @@
5121 - (djm) Trim deprecated options from INSTALL. Mention UsePAM 5124 - (djm) Trim deprecated options from INSTALL. Mention UsePAM
5122 - (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu 5125 - (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu
5123 5126
5124$Id: ChangeLog,v 1.4450 2006/08/05 01:37:59 djm Exp $ 5127$Id: ChangeLog,v 1.4451 2006/08/05 01:38:40 djm Exp $
diff --git a/authfile.c b/authfile.c
index f1d47b00b..400e60b39 100644
--- a/authfile.c
+++ b/authfile.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: authfile.c,v 1.74 2006/08/01 23:22:47 stevesk Exp $ */ 1/* $OpenBSD: authfile.c,v 1.75 2006/08/01 23:36:11 stevesk Exp $ */
2/* 2/*
3 * Author: Tatu Ylonen <ylo@cs.hut.fi> 3 * Author: Tatu Ylonen <ylo@cs.hut.fi>
4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -195,7 +195,7 @@ key_save_private_pem(Key *key, const char *filename, const char *_passphrase,
195 return 0; 195 return 0;
196 } 196 }
197 fp = fdopen(fd, "w"); 197 fp = fdopen(fd, "w");
198 if (fp == NULL ) { 198 if (fp == NULL) {
199 error("fdopen %s failed: %s.", filename, strerror(errno)); 199 error("fdopen %s failed: %s.", filename, strerror(errno));
200 close(fd); 200 close(fd);
201 return 0; 201 return 0;
diff --git a/channels.c b/channels.c
index 80cb32461..fb4d287d6 100644
--- a/channels.c
+++ b/channels.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: channels.c,v 1.263 2006/08/01 23:22:47 stevesk Exp $ */ 1/* $OpenBSD: channels.c,v 1.264 2006/08/01 23:36:11 stevesk Exp $ */
2/* 2/*
3 * Author: Tatu Ylonen <ylo@cs.hut.fi> 3 * Author: Tatu Ylonen <ylo@cs.hut.fi>
4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -1052,7 +1052,7 @@ channel_decode_socks5(Channel *c, fd_set *readset, fd_set *writeset)
1052 return 0; 1052 return 0;
1053 /* look for method: "NO AUTHENTICATION REQUIRED" */ 1053 /* look for method: "NO AUTHENTICATION REQUIRED" */
1054 for (found = 0, i = 2 ; i < nmethods + 2; i++) { 1054 for (found = 0, i = 2 ; i < nmethods + 2; i++) {
1055 if (p[i] == SSH_SOCKS5_NOAUTH ) { 1055 if (p[i] == SSH_SOCKS5_NOAUTH) {
1056 found = 1; 1056 found = 1;
1057 break; 1057 break;
1058 } 1058 }
diff --git a/progressmeter.c b/progressmeter.c
index cbbb34023..e8534fa2f 100644
--- a/progressmeter.c
+++ b/progressmeter.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: progressmeter.c,v 1.35 2006/08/01 23:22:47 stevesk Exp $ */ 1/* $OpenBSD: progressmeter.c,v 1.36 2006/08/01 23:36:12 stevesk Exp $ */
2/* 2/*
3 * Copyright (c) 2003 Nils Nordman. All rights reserved. 3 * Copyright (c) 2003 Nils Nordman. All rights reserved.
4 * 4 *
@@ -164,7 +164,7 @@ refresh_progress_meter(void)
164 len = 0; 164 len = 0;
165 if (len >= file_len + 1) 165 if (len >= file_len + 1)
166 len = file_len; 166 len = file_len;
167 for (i = len; i < file_len; i++ ) 167 for (i = len; i < file_len; i++)
168 buf[i] = ' '; 168 buf[i] = ' ';
169 buf[file_len] = '\0'; 169 buf[file_len] = '\0';
170 } 170 }
diff --git a/scard.c b/scard.c
index 237a4e438..e22da596f 100644
--- a/scard.c
+++ b/scard.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: scard.c,v 1.33 2006/07/25 02:01:34 stevesk Exp $ */ 1/* $OpenBSD: scard.c,v 1.34 2006/08/01 23:36:12 stevesk Exp $ */
2/* 2/*
3 * Copyright (c) 2001 Markus Friedl. All rights reserved. 3 * Copyright (c) 2001 Markus Friedl. All rights reserved.
4 * 4 *
@@ -127,7 +127,7 @@ sc_init(void)
127 if (status == SCARD_ERROR_NOCARD) { 127 if (status == SCARD_ERROR_NOCARD) {
128 return SCARD_ERROR_NOCARD; 128 return SCARD_ERROR_NOCARD;
129 } 129 }
130 if (status < 0 ) { 130 if (status < 0) {
131 error("sc_open failed"); 131 error("sc_open failed");
132 return status; 132 return status;
133 } 133 }
@@ -217,7 +217,7 @@ sc_private_decrypt(int flen, u_char *from, u_char *to, RSA *rsa,
217 olen = len = sw = 0; 217 olen = len = sw = 0;
218 if (sc_fd < 0) { 218 if (sc_fd < 0) {
219 status = sc_init(); 219 status = sc_init();
220 if (status < 0 ) 220 if (status < 0)
221 goto err; 221 goto err;
222 } 222 }
223 if (padding != RSA_PKCS1_PADDING) 223 if (padding != RSA_PKCS1_PADDING)
@@ -257,7 +257,7 @@ sc_private_encrypt(int flen, u_char *from, u_char *to, RSA *rsa,
257 len = sw = 0; 257 len = sw = 0;
258 if (sc_fd < 0) { 258 if (sc_fd < 0) {
259 status = sc_init(); 259 status = sc_init();
260 if (status < 0 ) 260 if (status < 0)
261 goto err; 261 goto err;
262 } 262 }
263 if (padding != RSA_PKCS1_PADDING) 263 if (padding != RSA_PKCS1_PADDING)
@@ -380,7 +380,7 @@ sc_get_keys(const char *id, const char *pin)
380 key_free(k); 380 key_free(k);
381 return NULL; 381 return NULL;
382 } 382 }
383 if (status < 0 ) { 383 if (status < 0) {
384 error("sc_read_pubkey failed"); 384 error("sc_read_pubkey failed");
385 key_free(k); 385 key_free(k);
386 return NULL; 386 return NULL;
diff --git a/servconf.c b/servconf.c
index 4edc80efe..b1fc45c50 100644
--- a/servconf.c
+++ b/servconf.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: servconf.c,v 1.162 2006/08/01 23:22:47 stevesk Exp $ */ 1/* $OpenBSD: servconf.c,v 1.163 2006/08/01 23:36:12 stevesk Exp $ */
2/* 2/*
3 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 3 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
4 * All rights reserved 4 * All rights reserved
@@ -961,7 +961,7 @@ parse_flag:
961 case sDenyUsers: 961 case sDenyUsers:
962 while ((arg = strdelim(&cp)) && *arg != '\0') { 962 while ((arg = strdelim(&cp)) && *arg != '\0') {
963 if (options->num_deny_users >= MAX_DENY_USERS) 963 if (options->num_deny_users >= MAX_DENY_USERS)
964 fatal( "%s line %d: too many deny users.", 964 fatal("%s line %d: too many deny users.",
965 filename, linenum); 965 filename, linenum);
966 options->deny_users[options->num_deny_users++] = 966 options->deny_users[options->num_deny_users++] =
967 xstrdup(arg); 967 xstrdup(arg);
@@ -1096,7 +1096,7 @@ parse_flag:
1096 */ 1096 */
1097 case sAuthorizedKeysFile: 1097 case sAuthorizedKeysFile:
1098 case sAuthorizedKeysFile2: 1098 case sAuthorizedKeysFile2:
1099 charptr = (opcode == sAuthorizedKeysFile ) ? 1099 charptr = (opcode == sAuthorizedKeysFile) ?
1100 &options->authorized_keys_file : 1100 &options->authorized_keys_file :
1101 &options->authorized_keys_file2; 1101 &options->authorized_keys_file2;
1102 goto parse_filename; 1102 goto parse_filename;
diff --git a/ssh.c b/ssh.c
index 8dc987214..10dd8777a 100644
--- a/ssh.c
+++ b/ssh.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssh.c,v 1.291 2006/08/01 23:22:47 stevesk Exp $ */ 1/* $OpenBSD: ssh.c,v 1.292 2006/08/01 23:36:12 stevesk Exp $ */
2/* 2/*
3 * Author: Tatu Ylonen <ylo@cs.hut.fi> 3 * Author: Tatu Ylonen <ylo@cs.hut.fi>
4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -1229,7 +1229,7 @@ load_public_identity_files(void)
1229 1229
1230 if (options.smartcard_device != NULL && 1230 if (options.smartcard_device != NULL &&
1231 options.num_identity_files < SSH_MAX_IDENTITY_FILES && 1231 options.num_identity_files < SSH_MAX_IDENTITY_FILES &&
1232 (keys = sc_get_keys(options.smartcard_device, NULL)) != NULL ) { 1232 (keys = sc_get_keys(options.smartcard_device, NULL)) != NULL) {
1233 int count = 0; 1233 int count = 0;
1234 for (i = 0; keys[i] != NULL; i++) { 1234 for (i = 0; keys[i] != NULL; i++) {
1235 count++; 1235 count++;