]> andersk Git - openssh.git/commitdiff
- deraadt@cvs.openbsd.org 2001/03/01 02:45:10
authormouring <mouring>
Mon, 5 Mar 2001 06:47:00 +0000 (06:47 +0000)
committermouring <mouring>
Mon, 5 Mar 2001 06:47:00 +0000 (06:47 +0000)
     [auth-rsa.c auth2.c deattack.c packet.c]
     KNF

ChangeLog
auth-rsa.c
auth2.c
deattack.c
packet.c

index e7b5ddd33e145b23c5a85dd3e98341118aa74913..a9c6d038640187c7ab850645bb05966a21b7ebd8 100644 (file)
--- a/ChangeLog
+++ b/ChangeLog
    - deraadt@cvs.openbsd.org 2001/03/01 02:29:04
      [ssh.c]
      shorten usage by a line
+   - deraadt@cvs.openbsd.org 2001/03/01 02:45:10
+     [auth-rsa.c auth2.c deattack.c packet.c]
+     KNF
 
 20010304
  - (bal) Remove make-ssh-known-hosts.1 since it's no longer valid.
index ee71655f364d93ffd30aa7936cc4c2c17ca264b8..30e5a54c47d8de2d125798e38a9c7febd6d72403 100644 (file)
@@ -14,7 +14,7 @@
  */
 
 #include "includes.h"
-RCSID("$OpenBSD: auth-rsa.c,v 1.38 2001/01/21 19:05:42 markus Exp $");
+RCSID("$OpenBSD: auth-rsa.c,v 1.39 2001/03/01 02:45:10 deraadt Exp $");
 
 #include <openssl/rsa.h>
 #include <openssl/md5.h>
@@ -186,8 +186,8 @@ auth_rsa(struct passwd *pw, BIGNUM *client_n)
                }
                if (fail) {
                        fclose(f);
-                       log("%s",buf);
-                       packet_send_debug("%s",buf);
+                       log("%s", buf);
+                       packet_send_debug("%s", buf);
                        restore_uid();
                        return 0;
                }
diff --git a/auth2.c b/auth2.c
index 5d7de3a1c850e2ac1497dd885b9480c3fb679fee..e60bed10b9b32105f86a55b90b582d7a225500d6 100644 (file)
--- a/auth2.c
+++ b/auth2.c
@@ -23,7 +23,7 @@
  */
 
 #include "includes.h"
-RCSID("$OpenBSD: auth2.c,v 1.43 2001/02/22 21:59:44 markus Exp $");
+RCSID("$OpenBSD: auth2.c,v 1.44 2001/03/01 02:45:10 deraadt Exp $");
 
 #include <openssl/evp.h>
 
@@ -640,7 +640,7 @@ user_key_allowed(struct passwd *pw, Key *key)
                }
                if (fail) {
                        fclose(f);
-                       log("%s",buf);
+                       log("%s", buf);
                        restore_uid();
                        return 0;
                }
index 9b9babace3b35f2b5411c79190de8edb6dfda753..36023e0d3371dd5e541f76c510f91195a6d55e2a 100644 (file)
@@ -1,4 +1,4 @@
-/*     $OpenBSD: deattack.c,v 1.12 2001/01/21 19:05:48 markus Exp $    */
+/*     $OpenBSD: deattack.c,v 1.13 2001/03/01 02:45:10 deraadt Exp $   */
 
 /*
  * Cryptographic attack detector for ssh - source code
@@ -44,7 +44,7 @@
 /* Hash function (Input keys are cipher results) */
 #define HASH(x)                GET_32BIT(x)
 
-#define CMP(a,b)       (memcmp(a, b, SSH_BLOCKSIZE))
+#define CMP(a, b)      (memcmp(a, b, SSH_BLOCKSIZE))
 
 
 void
index a1a5d8a76c7ae8549e05067c4733853a4fb0ce6a..419b2f7778f236e525ba965066f6fc799890e91b 100644 (file)
--- a/packet.c
+++ b/packet.c
@@ -37,7 +37,7 @@
  */
 
 #include "includes.h"
-RCSID("$OpenBSD: packet.c,v 1.54 2001/02/28 21:27:47 markus Exp $");
+RCSID("$OpenBSD: packet.c,v 1.55 2001/03/01 02:45:10 deraadt Exp $");
 
 #include "xmalloc.h"
 #include "buffer.h"
@@ -389,7 +389,7 @@ packet_start2(int type)
 void
 packet_start(int type)
 {
-       DBG(debug("packet_start[%d]",type));
+       DBG(debug("packet_start[%d]", type));
        if (use_ssh2_packet_format)
                packet_start2(type);
        else
@@ -942,7 +942,7 @@ packet_read_poll2(int *payload_len_ptr)
        }
 
 #ifdef PACKET_DEBUG
-       fprintf(stderr, "read/plain[%d]:\r\n",type);
+       fprintf(stderr, "read/plain[%d]:\r\n", type);
        buffer_dump(&incoming_packet);
 #endif
        return (u_char)type;
This page took 0.110317 seconds and 5 git commands to generate.