diff options
author | 2018-06-08 01:55:40 +0000 | |
---|---|---|
committer | 2018-06-08 01:55:40 +0000 | |
commit | e997376054921baccb6a30c7201096bb3d6e50bd (patch) | |
tree | 72bf96ead7ea7247cbbd2fb35c89461c3c84b9ef /usr.bin/ssh/serverloop.c | |
parent | Prevent ggc3 error: redefinition of `fuse_dirh_t' (diff) | |
download | wireguard-openbsd-e997376054921baccb6a30c7201096bb3d6e50bd.tar.xz wireguard-openbsd-e997376054921baccb6a30c7201096bb3d6e50bd.zip |
fix some over-long lines and __func__ up some debug messages
Diffstat (limited to 'usr.bin/ssh/serverloop.c')
-rw-r--r-- | usr.bin/ssh/serverloop.c | 18 |
1 files changed, 9 insertions, 9 deletions
diff --git a/usr.bin/ssh/serverloop.c b/usr.bin/ssh/serverloop.c index aaaf1c240b0..330bd8d1215 100644 --- a/usr.bin/ssh/serverloop.c +++ b/usr.bin/ssh/serverloop.c @@ -1,4 +1,4 @@ -/* $OpenBSD: serverloop.c,v 1.205 2018/03/03 03:15:51 djm Exp $ */ +/* $OpenBSD: serverloop.c,v 1.206 2018/06/08 01:55:40 djm Exp $ */ /* * Author: Tatu Ylonen <ylo@cs.hut.fi> * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland @@ -141,7 +141,7 @@ notify_done(fd_set *readset) if (notify_pipe[0] != -1 && FD_ISSET(notify_pipe[0], readset)) while (read(notify_pipe[0], &c, 1) != -1) - debug2("notify_done: reading"); + debug2("%s: reading", __func__); } /*ARGSUSED*/ @@ -613,7 +613,7 @@ server_input_channel_open(int type, u_int32_t seq, struct ssh *ssh) rwindow = packet_get_int(); rmaxpack = packet_get_int(); - debug("server_input_channel_open: ctype %s rchan %d win %d max %d", + debug("%s: ctype %s rchan %d win %d max %d", __func__, ctype, rchan, rwindow, rmaxpack); if (strcmp(ctype, "session") == 0) { @@ -626,7 +626,7 @@ server_input_channel_open(int type, u_int32_t seq, struct ssh *ssh) c = server_request_tun(ssh); } if (c != NULL) { - debug("server_input_channel_open: confirm %s", ctype); + debug("%s: confirm %s", __func__, ctype); c->remote_id = rchan; c->have_remote_id = 1; c->remote_window = rwindow; @@ -640,7 +640,7 @@ server_input_channel_open(int type, u_int32_t seq, struct ssh *ssh) packet_send(); } } else { - debug("server_input_channel_open: failure %s", ctype); + debug("%s: failure %s", __func__, ctype); packet_start(SSH2_MSG_CHANNEL_OPEN_FAILURE); packet_put_int(rchan); packet_put_int(reason); @@ -740,11 +740,11 @@ server_input_global_request(int type, u_int32_t seq, struct ssh *ssh) struct passwd *pw = the_authctxt->pw; if (pw == NULL || !the_authctxt->valid) - fatal("server_input_global_request: no/invalid user"); + fatal("%s: no/invalid user", __func__); rtype = packet_get_string(NULL); want_reply = packet_get_char(); - debug("server_input_global_request: rtype %s want_reply %d", rtype, want_reply); + debug("%s: rtype %s want_reply %d", __func__, rtype, want_reply); /* -R style forwarding */ if (strcmp(rtype, "tcpip-forward") == 0) { @@ -753,7 +753,7 @@ server_input_global_request(int type, u_int32_t seq, struct ssh *ssh) memset(&fwd, 0, sizeof(fwd)); fwd.listen_host = packet_get_string(NULL); fwd.listen_port = (u_short)packet_get_int(); - debug("server_input_global_request: tcpip-forward listen %s port %d", + debug("%s: tcpip-forward listen %s port %d", __func__, fwd.listen_host, fwd.listen_port); /* check permissions */ @@ -792,7 +792,7 @@ server_input_global_request(int type, u_int32_t seq, struct ssh *ssh) memset(&fwd, 0, sizeof(fwd)); fwd.listen_path = packet_get_string(NULL); - debug("server_input_global_request: streamlocal-forward listen path %s", + debug("%s: streamlocal-forward listen path %s", __func__, fwd.listen_path); /* check permissions */ |