summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2001-10-10 15:03:36 +1000
committerDamien Miller <djm@mindrot.org>2001-10-10 15:03:36 +1000
commit058655ccedb9cdad84be346bce7416454e45a598 (patch)
tree336530bdeaa2a6e970035a78f1a7e86496bee6fc
parent59d9fb9e55f2448ec8b0911f05bdb943e8235ed2 (diff)
- markus@cvs.openbsd.org 2001/10/07 10:29:52
[authfile.c] grammer; Matthew_Clarke@mindlink.bc.ca
-rw-r--r--ChangeLog5
-rw-r--r--authfile.c10
2 files changed, 9 insertions, 6 deletions
diff --git a/ChangeLog b/ChangeLog
index 3e580c0c..d125c1ad 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -18,6 +18,9 @@
- markus@cvs.openbsd.org 2001/10/06 11:18:19
[sshconnect1.c sshconnect2.c sshconnect.c]
unify hostkey check error messages, simplify prompt.
+ - markus@cvs.openbsd.org 2001/10/07 10:29:52
+ [authfile.c]
+ grammer; Matthew_Clarke@mindlink.bc.ca
20011007
- (bal) ssh-copy-id corrected permissions for .ssh/ and authorized_keys.
@@ -6663,4 +6666,4 @@
- Wrote replacements for strlcpy and mkdtemp
- Released 1.0pre1
-$Id: ChangeLog,v 1.1590 2001/10/10 05:03:11 djm Exp $
+$Id: ChangeLog,v 1.1591 2001/10/10 05:03:36 djm Exp $
diff --git a/authfile.c b/authfile.c
index cf2957dd..135be76b 100644
--- a/authfile.c
+++ b/authfile.c
@@ -36,7 +36,7 @@
*/
#include "includes.h"
-RCSID("$OpenBSD: authfile.c,v 1.38 2001/09/23 11:09:13 markus Exp $");
+RCSID("$OpenBSD: authfile.c,v 1.39 2001/10/07 10:29:52 markus Exp $");
#include <openssl/err.h>
#include <openssl/evp.h>
@@ -250,7 +250,7 @@ key_load_public_rsa1(int fd, const char *filename, char **commentp)
/* Check that it is at least big enough to contain the ID string. */
if (len < sizeof(authfile_id_string)) {
- debug3("No RSA1 key file %.200s.", filename);
+ debug3("Not a RSA1 key file %.200s.", filename);
buffer_free(&buffer);
return NULL;
}
@@ -260,7 +260,7 @@ key_load_public_rsa1(int fd, const char *filename, char **commentp)
*/
for (i = 0; i < sizeof(authfile_id_string); i++)
if (buffer_get_char(&buffer) != authfile_id_string[i]) {
- debug3("No RSA1 key file %.200s.", filename);
+ debug3("Not a RSA1 key file %.200s.", filename);
buffer_free(&buffer);
return NULL;
}
@@ -336,7 +336,7 @@ key_load_private_rsa1(int fd, const char *filename, const char *passphrase,
/* Check that it is at least big enough to contain the ID string. */
if (len < sizeof(authfile_id_string)) {
- debug3("No RSA1 key file %.200s.", filename);
+ debug3("Not a RSA1 key file %.200s.", filename);
buffer_free(&buffer);
close(fd);
return NULL;
@@ -347,7 +347,7 @@ key_load_private_rsa1(int fd, const char *filename, const char *passphrase,
*/
for (i = 0; i < sizeof(authfile_id_string); i++)
if (buffer_get_char(&buffer) != authfile_id_string[i]) {
- debug3("No RSA1 key file %.200s.", filename);
+ debug3("Not a RSA1 key file %.200s.", filename);
buffer_free(&buffer);
close(fd);
return NULL;