mirror of
https://github.com/PowerShell/openssh-portable.git
synced 2025-07-26 15:24:47 +02:00
- markus@cvs.openbsd.org 2001/11/09 19:08:35
[sshd.c] remove extra trailing dot from log message; pilot@naughty.monkey.org
This commit is contained in:
parent
79faeff2c1
commit
e4a0ff4748
@ -63,6 +63,9 @@
|
|||||||
- (stevesk) auth-pam.c: use do_pam_authenticate(PAM_DISALLOW_NULL_AUTHTOK)
|
- (stevesk) auth-pam.c: use do_pam_authenticate(PAM_DISALLOW_NULL_AUTHTOK)
|
||||||
if permit_empty_passwd == 0 so null password check cannot be bypassed.
|
if permit_empty_passwd == 0 so null password check cannot be bypassed.
|
||||||
jayaraj@amritapuri.com OpenBSD bug 2168
|
jayaraj@amritapuri.com OpenBSD bug 2168
|
||||||
|
- markus@cvs.openbsd.org 2001/11/09 19:08:35
|
||||||
|
[sshd.c]
|
||||||
|
remove extra trailing dot from log message; pilot@naughty.monkey.org
|
||||||
|
|
||||||
20011103
|
20011103
|
||||||
- (tim) [ contrib/caldera/openssh.spec contrib/caldera/sshd.init] Updates
|
- (tim) [ contrib/caldera/openssh.spec contrib/caldera/sshd.init] Updates
|
||||||
@ -6867,4 +6870,4 @@
|
|||||||
- Wrote replacements for strlcpy and mkdtemp
|
- Wrote replacements for strlcpy and mkdtemp
|
||||||
- Released 1.0pre1
|
- Released 1.0pre1
|
||||||
|
|
||||||
$Id: ChangeLog,v 1.1651 2001/11/12 00:06:32 djm Exp $
|
$Id: ChangeLog,v 1.1652 2001/11/12 00:06:54 djm Exp $
|
||||||
|
6
sshd.c
6
sshd.c
@ -40,7 +40,7 @@
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
#include "includes.h"
|
#include "includes.h"
|
||||||
RCSID("$OpenBSD: sshd.c,v 1.207 2001/10/24 08:41:41 markus Exp $");
|
RCSID("$OpenBSD: sshd.c,v 1.208 2001/11/09 19:08:35 markus Exp $");
|
||||||
|
|
||||||
#include <openssl/dh.h>
|
#include <openssl/dh.h>
|
||||||
#include <openssl/bn.h>
|
#include <openssl/bn.h>
|
||||||
@ -337,7 +337,7 @@ sshd_exchange_identification(int sock_in, int sock_out)
|
|||||||
/* Send our protocol version identification. */
|
/* Send our protocol version identification. */
|
||||||
if (atomicio(write, sock_out, server_version_string, strlen(server_version_string))
|
if (atomicio(write, sock_out, server_version_string, strlen(server_version_string))
|
||||||
!= strlen(server_version_string)) {
|
!= strlen(server_version_string)) {
|
||||||
log("Could not write ident string to %s.", get_remote_ipaddr());
|
log("Could not write ident string to %s", get_remote_ipaddr());
|
||||||
fatal_cleanup();
|
fatal_cleanup();
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -345,7 +345,7 @@ sshd_exchange_identification(int sock_in, int sock_out)
|
|||||||
memset(buf, 0, sizeof(buf));
|
memset(buf, 0, sizeof(buf));
|
||||||
for (i = 0; i < sizeof(buf) - 1; i++) {
|
for (i = 0; i < sizeof(buf) - 1; i++) {
|
||||||
if (atomicio(read, sock_in, &buf[i], 1) != 1) {
|
if (atomicio(read, sock_in, &buf[i], 1) != 1) {
|
||||||
log("Did not receive identification string from %s.",
|
log("Did not receive identification string from %s",
|
||||||
get_remote_ipaddr());
|
get_remote_ipaddr());
|
||||||
fatal_cleanup();
|
fatal_cleanup();
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user