diff --git a/appl/telnet/libtelnet/kerberos.c b/appl/telnet/libtelnet/kerberos.c index cd4c722ef..5456b74eb 100644 --- a/appl/telnet/libtelnet/kerberos.c +++ b/appl/telnet/libtelnet/kerberos.c @@ -170,7 +170,7 @@ kerberos4_send(char *name, Authenticator *ap) CREDENTIALS cred; int r; - printf("[ Trying %s ... ]\n", name); + printf("[ Trying %s ... ]\r\n", name); if (!UserNameRequested) { if (auth_debug_mode) { printf("Kerberos V4: no user name supplied\r\n"); @@ -387,7 +387,7 @@ kerberos4_reply(ap, data, cnt) auth_send_retry(); return; case KRB_ACCEPT: - printf("[ Kerberos V4 accepts you ]\n"); + printf("[ Kerberos V4 accepts you ]\r\n"); if ((ap->way & AUTH_HOW_MASK) == AUTH_HOW_MUTUAL) { /* * Send over the encrypted challenge. diff --git a/appl/telnet/libtelnet/kerberos5.c b/appl/telnet/libtelnet/kerberos5.c index 78577924c..da652bcb3 100644 --- a/appl/telnet/libtelnet/kerberos5.c +++ b/appl/telnet/libtelnet/kerberos5.c @@ -486,14 +486,14 @@ kerberos5_reply(ap, data, cnt) case KRB_ACCEPT: if ((ap->way & AUTH_HOW_MASK) == AUTH_HOW_MUTUAL && !mutual_complete) { - printf("[ Kerberos V5 accepted you, but didn't provide mutual authentication! ]\n"); + printf("[ Kerberos V5 accepted you, but didn't provide mutual authentication! ]\r\n"); auth_send_retry(); return; } if (cnt) - printf("[ Kerberos V5 accepts you as ``%.*s'' ]\n", cnt, data); + printf("[ Kerberos V5 accepts you as ``%.*s'' ]\r\n", cnt, data); else - printf("[ Kerberos V5 accepts you ]\n"); + printf("[ Kerberos V5 accepts you ]\r\n"); auth_finished(ap, AUTH_USER); #ifdef FORWARD if (forward_flags & OPTS_FORWARD_CREDS) @@ -516,14 +516,14 @@ kerberos5_reply(ap, data, cnt) tmpkey.length = sizeof(des_cblock); if (r = krb5_rd_rep(&inbuf, &tmpkey, &reply)) { - printf("[ Mutual authentication failed: %s ]\n", + printf("[ Mutual authentication failed: %s ]\r\n", error_message(r)); auth_send_retry(); return; } if (reply->ctime != authenticator.ctime || reply->cusec != authenticator.cusec) { - printf("[ Mutual authentication failed (mismatched KRB_AP_REP) ]\n"); + printf("[ Mutual authentication failed (mismatched KRB_AP_REP) ]\r\n"); auth_send_retry(); return; } @@ -533,7 +533,7 @@ kerberos5_reply(ap, data, cnt) return; #ifdef FORWARD case KRB_FORWARD_ACCEPT: - printf("[ Kerberos V5 accepted forwarded credentials ]\n"); + printf("[ Kerberos V5 accepted forwarded credentials ]\r\n"); return; case KRB_FORWARD_REJECT: printf("[ Kerberos V5 refuses forwarded credentials because %.*s ]\r\n", diff --git a/appl/telnet/libtelnet/krb4encpwd.c b/appl/telnet/libtelnet/krb4encpwd.c index e38891f90..24756bf9d 100644 --- a/appl/telnet/libtelnet/krb4encpwd.c +++ b/appl/telnet/libtelnet/krb4encpwd.c @@ -181,7 +181,7 @@ krb4encpwd_send(ap) Authenticator *ap; { - printf("[ Trying KRB4ENCPWD ... ]\n"); + printf("[ Trying KRB4ENCPWD ... ]\r\n"); if (!UserNameRequested) { return(0); } @@ -299,7 +299,7 @@ krb4encpwd_reply(ap, data, cnt) auth_send_retry(); return; case KRB4_ENCPWD_ACCEPT: - printf("[ KRB4_ENCPWD accepts you ]\n"); + printf("[ KRB4_ENCPWD accepts you ]\r\n"); auth_finished(ap, AUTH_USER); return; case KRB4_ENCPWD_CHALLENGE: diff --git a/appl/telnet/libtelnet/rsaencpwd.c b/appl/telnet/libtelnet/rsaencpwd.c index 638df6162..5ebe10352 100644 --- a/appl/telnet/libtelnet/rsaencpwd.c +++ b/appl/telnet/libtelnet/rsaencpwd.c @@ -179,7 +179,7 @@ rsaencpwd_send(ap) Authenticator *ap; { - printf("[ Trying RSAENCPWD ... ]\n"); + printf("[ Trying RSAENCPWD ... ]\r\n"); if (!UserNameRequested) { return(0); } @@ -339,7 +339,7 @@ rsaencpwd_reply(ap, data, cnt) auth_send_retry(); return; case RSA_ENCPWD_ACCEPT: - printf("[ RSA_ENCPWD accepts you ]\n"); + printf("[ RSA_ENCPWD accepts you ]\r\n"); auth_finished(ap, AUTH_USER); return; case RSA_ENCPWD_CHALLENGEKEY: diff --git a/appl/telnet/libtelnet/spx.c b/appl/telnet/libtelnet/spx.c index eb021b79c..1d12713e5 100644 --- a/appl/telnet/libtelnet/spx.c +++ b/appl/telnet/libtelnet/spx.c @@ -216,7 +216,7 @@ spx_send(ap) int deleg_flag=1, mutual_flag=0, replay_flag=0, seq_flag=0; char *address; - printf("[ Trying SPX ... ]\n"); + printf("[ Trying SPX ... ]\r\n"); strcpy(targ_printable, "SERVICE:rcmd@"); strcat(targ_printable, RemoteHostName); @@ -429,7 +429,7 @@ spx_reply(ap, data, cnt) auth_send_retry(); return; case SPX_ACCEPT: - printf("[ SPX accepts you ]\n"); + printf("[ SPX accepts you ]\r\n"); if ((ap->way & AUTH_HOW_MASK) == AUTH_HOW_MUTUAL) { /* * Send over the encrypted challenge.