summaryrefslogtreecommitdiff
path: root/usr.bin
diff options
context:
space:
mode:
authorMarkus Friedl <markus@cvs.openbsd.org>2002-03-25 09:21:14 +0000
committerMarkus Friedl <markus@cvs.openbsd.org>2002-03-25 09:21:14 +0000
commit1e78a5a31d0a183ad2378ec6e0d4b0d44c66b670 (patch)
tree43b642934ecfa2eeba895db707312f8400214c68 /usr.bin
parent2e6524ea16e95da5c624d14aac0871e431a44011 (diff)
return 0 (not NULL); tomh@po.crl.go.jp
Diffstat (limited to 'usr.bin')
-rw-r--r--usr.bin/ssh/auth-rsa.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/usr.bin/ssh/auth-rsa.c b/usr.bin/ssh/auth-rsa.c
index 9c5d484b19e..c51400c2a93 100644
--- a/usr.bin/ssh/auth-rsa.c
+++ b/usr.bin/ssh/auth-rsa.c
@@ -14,7 +14,7 @@
*/
#include "includes.h"
-RCSID("$OpenBSD: auth-rsa.c,v 1.52 2002/03/18 17:50:31 provos Exp $");
+RCSID("$OpenBSD: auth-rsa.c,v 1.53 2002/03/25 09:21:13 markus Exp $");
#include <openssl/rsa.h>
#include <openssl/md5.h>
@@ -165,7 +165,7 @@ auth_rsa_key_allowed(struct passwd *pw, BIGNUM *client_n, Key **rkey)
/* Restore the privileged uid. */
restore_uid();
xfree(file);
- return (NULL);
+ return (0);
}
/* Open the file containing the authorized keys. */
f = fopen(file, "r");
@@ -173,7 +173,7 @@ auth_rsa_key_allowed(struct passwd *pw, BIGNUM *client_n, Key **rkey)
/* Restore the privileged uid. */
restore_uid();
xfree(file);
- return (NULL);
+ return (0);
}
if (options.strict_modes &&
secure_filename(f, file, pw, line, sizeof(line)) != 0) {
@@ -181,7 +181,7 @@ auth_rsa_key_allowed(struct passwd *pw, BIGNUM *client_n, Key **rkey)
fclose(f);
log("Authentication refused: %s", line);
restore_uid();
- return (NULL);
+ return (0);
}
/* Flag indicating whether the key is allowed. */