comparison svr-authpasswd.c @ 594:a98a2138364a

Improve capitalisation for all logged strings
author Matt Johnston <matt@ucc.asn.au>
date Wed, 23 Feb 2011 15:50:30 +0000
parents 4317be8b7cf9
children d40f3cc47aed
comparison
equal deleted inserted replaced
593:ea103e4476ce 594:a98a2138364a
62 62
63 /* check for empty password - need to do this again here 63 /* check for empty password - need to do this again here
64 * since the shadow password may differ to that tested 64 * since the shadow password may differ to that tested
65 * in auth.c */ 65 * in auth.c */
66 if (passwdcrypt[0] == '\0') { 66 if (passwdcrypt[0] == '\0') {
67 dropbear_log(LOG_WARNING, "user '%s' has blank password, rejected", 67 dropbear_log(LOG_WARNING, "User '%s' has blank password, rejected",
68 ses.authstate.pw_name); 68 ses.authstate.pw_name);
69 send_msg_userauth_failure(0, 1); 69 send_msg_userauth_failure(0, 1);
70 return; 70 return;
71 } 71 }
72 72
86 m_free(password); 86 m_free(password);
87 87
88 if (strcmp(testcrypt, passwdcrypt) == 0) { 88 if (strcmp(testcrypt, passwdcrypt) == 0) {
89 /* successful authentication */ 89 /* successful authentication */
90 dropbear_log(LOG_NOTICE, 90 dropbear_log(LOG_NOTICE,
91 "password auth succeeded for '%s' from %s", 91 "Password auth succeeded for '%s' from %s",
92 ses.authstate.pw_name, 92 ses.authstate.pw_name,
93 svr_ses.addrstring); 93 svr_ses.addrstring);
94 send_msg_userauth_success(); 94 send_msg_userauth_success();
95 } else { 95 } else {
96 dropbear_log(LOG_WARNING, 96 dropbear_log(LOG_WARNING,
97 "bad password attempt for '%s' from %s", 97 "Bad password attempt for '%s' from %s",
98 ses.authstate.pw_name, 98 ses.authstate.pw_name,
99 svr_ses.addrstring); 99 svr_ses.addrstring);
100 send_msg_userauth_failure(0, 1); 100 send_msg_userauth_failure(0, 1);
101 } 101 }
102 102