- (stevesk) auth-pam.c: use do_pam_authenticate(PAM_DISALLOW_NULL_AUTHTOK)
if permit_empty_passwd == 0 so null password check cannot be bypassed.
jayaraj@amritapuri.com OpenBSD bug 2168
-
+ - markus@cvs.openbsd.org 2001/11/09 19:08:35
+ [sshd.c]
+ remove extra trailing dot from log message; pilot@naughty.monkey.org
+
20011103
- (tim) [ contrib/caldera/openssh.spec contrib/caldera/sshd.init] Updates
from Raymund Will <ray@caldera.de>
- Wrote replacements for strlcpy and mkdtemp
- Released 1.0pre1
-$Id: ChangeLog,v 1.1651 2001/11/12 00:06:32 djm Exp $
+$Id: ChangeLog,v 1.1652 2001/11/12 00:06:54 djm Exp $
*/
#include "includes.h"
-RCSID("$OpenBSD: sshd.c,v 1.207 2001/10/24 08:41:41 markus Exp $");
+RCSID("$OpenBSD: sshd.c,v 1.208 2001/11/09 19:08:35 markus Exp $");
#include <openssl/dh.h>
#include <openssl/bn.h>
/* Send our protocol version identification. */
if (atomicio(write, sock_out, server_version_string, strlen(server_version_string))
!= strlen(server_version_string)) {
- log("Could not write ident string to %s.", get_remote_ipaddr());
+ log("Could not write ident string to %s", get_remote_ipaddr());
fatal_cleanup();
}
memset(buf, 0, sizeof(buf));
for (i = 0; i < sizeof(buf) - 1; i++) {
if (atomicio(read, sock_in, &buf[i], 1) != 1) {
- log("Did not receive identification string from %s.",
+ log("Did not receive identification string from %s",
get_remote_ipaddr());
fatal_cleanup();
}