summaryrefslogtreecommitdiff
path: root/usr.bin
diff options
context:
space:
mode:
authorTheo de Raadt <deraadt@cvs.openbsd.org>2001-03-01 02:45:11 +0000
committerTheo de Raadt <deraadt@cvs.openbsd.org>2001-03-01 02:45:11 +0000
commita47f3fc14da5e2a107a9388b2fa4e3257fd02a92 (patch)
tree6e1d70722bf8b60533dfd308dc345120fa719f5b /usr.bin
parent59b39b475d54c4c4a570aba1acfdaf779d339302 (diff)
KNF
Diffstat (limited to 'usr.bin')
-rw-r--r--usr.bin/ssh/auth-rsa.c6
-rw-r--r--usr.bin/ssh/auth2.c4
-rw-r--r--usr.bin/ssh/deattack.c4
-rw-r--r--usr.bin/ssh/packet.c6
4 files changed, 10 insertions, 10 deletions
diff --git a/usr.bin/ssh/auth-rsa.c b/usr.bin/ssh/auth-rsa.c
index ee71655f364..30e5a54c47d 100644
--- a/usr.bin/ssh/auth-rsa.c
+++ b/usr.bin/ssh/auth-rsa.c
@@ -14,7 +14,7 @@
*/
#include "includes.h"
-RCSID("$OpenBSD: auth-rsa.c,v 1.38 2001/01/21 19:05:42 markus Exp $");
+RCSID("$OpenBSD: auth-rsa.c,v 1.39 2001/03/01 02:45:10 deraadt Exp $");
#include <openssl/rsa.h>
#include <openssl/md5.h>
@@ -186,8 +186,8 @@ auth_rsa(struct passwd *pw, BIGNUM *client_n)
}
if (fail) {
fclose(f);
- log("%s",buf);
- packet_send_debug("%s",buf);
+ log("%s", buf);
+ packet_send_debug("%s", buf);
restore_uid();
return 0;
}
diff --git a/usr.bin/ssh/auth2.c b/usr.bin/ssh/auth2.c
index 380c607b54f..c96516a796e 100644
--- a/usr.bin/ssh/auth2.c
+++ b/usr.bin/ssh/auth2.c
@@ -23,7 +23,7 @@
*/
#include "includes.h"
-RCSID("$OpenBSD: auth2.c,v 1.43 2001/02/22 21:59:44 markus Exp $");
+RCSID("$OpenBSD: auth2.c,v 1.44 2001/03/01 02:45:10 deraadt Exp $");
#include <openssl/evp.h>
@@ -576,7 +576,7 @@ user_key_allowed(struct passwd *pw, Key *key)
}
if (fail) {
fclose(f);
- log("%s",buf);
+ log("%s", buf);
restore_uid();
return 0;
}
diff --git a/usr.bin/ssh/deattack.c b/usr.bin/ssh/deattack.c
index 9b9babace3b..36023e0d337 100644
--- a/usr.bin/ssh/deattack.c
+++ b/usr.bin/ssh/deattack.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: deattack.c,v 1.12 2001/01/21 19:05:48 markus Exp $ */
+/* $OpenBSD: deattack.c,v 1.13 2001/03/01 02:45:10 deraadt Exp $ */
/*
* Cryptographic attack detector for ssh - source code
@@ -44,7 +44,7 @@
/* Hash function (Input keys are cipher results) */
#define HASH(x) GET_32BIT(x)
-#define CMP(a,b) (memcmp(a, b, SSH_BLOCKSIZE))
+#define CMP(a, b) (memcmp(a, b, SSH_BLOCKSIZE))
void
diff --git a/usr.bin/ssh/packet.c b/usr.bin/ssh/packet.c
index 67bbd83323f..b43dfaa38ee 100644
--- a/usr.bin/ssh/packet.c
+++ b/usr.bin/ssh/packet.c
@@ -37,7 +37,7 @@
*/
#include "includes.h"
-RCSID("$OpenBSD: packet.c,v 1.54 2001/02/28 21:27:47 markus Exp $");
+RCSID("$OpenBSD: packet.c,v 1.55 2001/03/01 02:45:10 deraadt Exp $");
#include "xmalloc.h"
#include "buffer.h"
@@ -389,7 +389,7 @@ packet_start2(int type)
void
packet_start(int type)
{
- DBG(debug("packet_start[%d]",type));
+ DBG(debug("packet_start[%d]", type));
if (use_ssh2_packet_format)
packet_start2(type);
else
@@ -942,7 +942,7 @@ packet_read_poll2(int *payload_len_ptr)
}
#ifdef PACKET_DEBUG
- fprintf(stderr, "read/plain[%d]:\r\n",type);
+ fprintf(stderr, "read/plain[%d]:\r\n", type);
buffer_dump(&incoming_packet);
#endif
return (u_char)type;