summaryrefslogtreecommitdiff
path: root/authfd.c
diff options
context:
space:
mode:
Diffstat (limited to 'authfd.c')
-rw-r--r--authfd.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/authfd.c b/authfd.c
index d6366ee36..c66ce4199 100644
--- a/authfd.c
+++ b/authfd.c
@@ -35,7 +35,7 @@
35 */ 35 */
36 36
37#include "includes.h" 37#include "includes.h"
38RCSID("$OpenBSD: authfd.c,v 1.45 2001/09/19 19:35:30 stevesk Exp $"); 38RCSID("$OpenBSD: authfd.c,v 1.46 2001/12/05 10:06:12 deraadt Exp $");
39 39
40#include <openssl/evp.h> 40#include <openssl/evp.h>
41 41
@@ -217,7 +217,7 @@ ssh_get_num_identities(AuthenticationConnection *auth, int version)
217 int type, code1 = 0, code2 = 0; 217 int type, code1 = 0, code2 = 0;
218 Buffer request; 218 Buffer request;
219 219
220 switch(version){ 220 switch (version) {
221 case 1: 221 case 1:
222 code1 = SSH_AGENTC_REQUEST_RSA_IDENTITIES; 222 code1 = SSH_AGENTC_REQUEST_RSA_IDENTITIES;
223 code2 = SSH_AGENT_RSA_IDENTITIES_ANSWER; 223 code2 = SSH_AGENT_RSA_IDENTITIES_ANSWER;
@@ -286,7 +286,7 @@ ssh_get_next_identity(AuthenticationConnection *auth, char **comment, int versio
286 * Get the next entry from the packet. These will abort with a fatal 286 * Get the next entry from the packet. These will abort with a fatal
287 * error if the packet is too short or contains corrupt data. 287 * error if the packet is too short or contains corrupt data.
288 */ 288 */
289 switch(version){ 289 switch (version) {
290 case 1: 290 case 1:
291 key = key_new(KEY_RSA1); 291 key = key_new(KEY_RSA1);
292 bits = buffer_get_int(&auth->identities); 292 bits = buffer_get_int(&auth->identities);
@@ -438,7 +438,7 @@ ssh_encode_identity_ssh2(Buffer *b, Key *key, const char *comment)
438 buffer_clear(b); 438 buffer_clear(b);
439 buffer_put_char(b, SSH2_AGENTC_ADD_IDENTITY); 439 buffer_put_char(b, SSH2_AGENTC_ADD_IDENTITY);
440 buffer_put_cstring(b, key_ssh_name(key)); 440 buffer_put_cstring(b, key_ssh_name(key));
441 switch(key->type){ 441 switch (key->type) {
442 case KEY_RSA: 442 case KEY_RSA:
443 buffer_put_bignum2(b, key->rsa->n); 443 buffer_put_bignum2(b, key->rsa->n);
444 buffer_put_bignum2(b, key->rsa->e); 444 buffer_put_bignum2(b, key->rsa->e);