More consistent use of CRLF.

git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@891 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
Björn Groenvall
1996-10-25 20:44:28 +00:00
parent 9806986c40
commit bf75c22ae2
5 changed files with 14 additions and 14 deletions

View File

@@ -170,7 +170,7 @@ kerberos4_send(char *name, Authenticator *ap)
CREDENTIALS cred; CREDENTIALS cred;
int r; int r;
printf("[ Trying %s ... ]\n", name); printf("[ Trying %s ... ]\r\n", name);
if (!UserNameRequested) { if (!UserNameRequested) {
if (auth_debug_mode) { if (auth_debug_mode) {
printf("Kerberos V4: no user name supplied\r\n"); printf("Kerberos V4: no user name supplied\r\n");
@@ -387,7 +387,7 @@ kerberos4_reply(ap, data, cnt)
auth_send_retry(); auth_send_retry();
return; return;
case KRB_ACCEPT: case KRB_ACCEPT:
printf("[ Kerberos V4 accepts you ]\n"); printf("[ Kerberos V4 accepts you ]\r\n");
if ((ap->way & AUTH_HOW_MASK) == AUTH_HOW_MUTUAL) { if ((ap->way & AUTH_HOW_MASK) == AUTH_HOW_MUTUAL) {
/* /*
* Send over the encrypted challenge. * Send over the encrypted challenge.

View File

@@ -486,14 +486,14 @@ kerberos5_reply(ap, data, cnt)
case KRB_ACCEPT: case KRB_ACCEPT:
if ((ap->way & AUTH_HOW_MASK) == AUTH_HOW_MUTUAL && if ((ap->way & AUTH_HOW_MASK) == AUTH_HOW_MUTUAL &&
!mutual_complete) { !mutual_complete) {
printf("[ Kerberos V5 accepted you, but didn't provide mutual authentication! ]\n"); printf("[ Kerberos V5 accepted you, but didn't provide mutual authentication! ]\r\n");
auth_send_retry(); auth_send_retry();
return; return;
} }
if (cnt) if (cnt)
printf("[ Kerberos V5 accepts you as ``%.*s'' ]\n", cnt, data); printf("[ Kerberos V5 accepts you as ``%.*s'' ]\r\n", cnt, data);
else else
printf("[ Kerberos V5 accepts you ]\n"); printf("[ Kerberos V5 accepts you ]\r\n");
auth_finished(ap, AUTH_USER); auth_finished(ap, AUTH_USER);
#ifdef FORWARD #ifdef FORWARD
if (forward_flags & OPTS_FORWARD_CREDS) if (forward_flags & OPTS_FORWARD_CREDS)
@@ -516,14 +516,14 @@ kerberos5_reply(ap, data, cnt)
tmpkey.length = sizeof(des_cblock); tmpkey.length = sizeof(des_cblock);
if (r = krb5_rd_rep(&inbuf, &tmpkey, &reply)) { if (r = krb5_rd_rep(&inbuf, &tmpkey, &reply)) {
printf("[ Mutual authentication failed: %s ]\n", printf("[ Mutual authentication failed: %s ]\r\n",
error_message(r)); error_message(r));
auth_send_retry(); auth_send_retry();
return; return;
} }
if (reply->ctime != authenticator.ctime || if (reply->ctime != authenticator.ctime ||
reply->cusec != authenticator.cusec) { reply->cusec != authenticator.cusec) {
printf("[ Mutual authentication failed (mismatched KRB_AP_REP) ]\n"); printf("[ Mutual authentication failed (mismatched KRB_AP_REP) ]\r\n");
auth_send_retry(); auth_send_retry();
return; return;
} }
@@ -533,7 +533,7 @@ kerberos5_reply(ap, data, cnt)
return; return;
#ifdef FORWARD #ifdef FORWARD
case KRB_FORWARD_ACCEPT: case KRB_FORWARD_ACCEPT:
printf("[ Kerberos V5 accepted forwarded credentials ]\n"); printf("[ Kerberos V5 accepted forwarded credentials ]\r\n");
return; return;
case KRB_FORWARD_REJECT: case KRB_FORWARD_REJECT:
printf("[ Kerberos V5 refuses forwarded credentials because %.*s ]\r\n", printf("[ Kerberos V5 refuses forwarded credentials because %.*s ]\r\n",

View File

@@ -181,7 +181,7 @@ krb4encpwd_send(ap)
Authenticator *ap; Authenticator *ap;
{ {
printf("[ Trying KRB4ENCPWD ... ]\n"); printf("[ Trying KRB4ENCPWD ... ]\r\n");
if (!UserNameRequested) { if (!UserNameRequested) {
return(0); return(0);
} }
@@ -299,7 +299,7 @@ krb4encpwd_reply(ap, data, cnt)
auth_send_retry(); auth_send_retry();
return; return;
case KRB4_ENCPWD_ACCEPT: case KRB4_ENCPWD_ACCEPT:
printf("[ KRB4_ENCPWD accepts you ]\n"); printf("[ KRB4_ENCPWD accepts you ]\r\n");
auth_finished(ap, AUTH_USER); auth_finished(ap, AUTH_USER);
return; return;
case KRB4_ENCPWD_CHALLENGE: case KRB4_ENCPWD_CHALLENGE:

View File

@@ -179,7 +179,7 @@ rsaencpwd_send(ap)
Authenticator *ap; Authenticator *ap;
{ {
printf("[ Trying RSAENCPWD ... ]\n"); printf("[ Trying RSAENCPWD ... ]\r\n");
if (!UserNameRequested) { if (!UserNameRequested) {
return(0); return(0);
} }
@@ -339,7 +339,7 @@ rsaencpwd_reply(ap, data, cnt)
auth_send_retry(); auth_send_retry();
return; return;
case RSA_ENCPWD_ACCEPT: case RSA_ENCPWD_ACCEPT:
printf("[ RSA_ENCPWD accepts you ]\n"); printf("[ RSA_ENCPWD accepts you ]\r\n");
auth_finished(ap, AUTH_USER); auth_finished(ap, AUTH_USER);
return; return;
case RSA_ENCPWD_CHALLENGEKEY: case RSA_ENCPWD_CHALLENGEKEY:

View File

@@ -216,7 +216,7 @@ spx_send(ap)
int deleg_flag=1, mutual_flag=0, replay_flag=0, seq_flag=0; int deleg_flag=1, mutual_flag=0, replay_flag=0, seq_flag=0;
char *address; char *address;
printf("[ Trying SPX ... ]\n"); printf("[ Trying SPX ... ]\r\n");
strcpy(targ_printable, "SERVICE:rcmd@"); strcpy(targ_printable, "SERVICE:rcmd@");
strcat(targ_printable, RemoteHostName); strcat(targ_printable, RemoteHostName);
@@ -429,7 +429,7 @@ spx_reply(ap, data, cnt)
auth_send_retry(); auth_send_retry();
return; return;
case SPX_ACCEPT: case SPX_ACCEPT:
printf("[ SPX accepts you ]\n"); printf("[ SPX accepts you ]\r\n");
if ((ap->way & AUTH_HOW_MASK) == AUTH_HOW_MUTUAL) { if ((ap->way & AUTH_HOW_MASK) == AUTH_HOW_MUTUAL) {
/* /*
* Send over the encrypted challenge. * Send over the encrypted challenge.