More consistent use of CRLF.
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@891 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
@@ -170,7 +170,7 @@ kerberos4_send(char *name, Authenticator *ap)
|
|||||||
CREDENTIALS cred;
|
CREDENTIALS cred;
|
||||||
int r;
|
int r;
|
||||||
|
|
||||||
printf("[ Trying %s ... ]\n", name);
|
printf("[ Trying %s ... ]\r\n", name);
|
||||||
if (!UserNameRequested) {
|
if (!UserNameRequested) {
|
||||||
if (auth_debug_mode) {
|
if (auth_debug_mode) {
|
||||||
printf("Kerberos V4: no user name supplied\r\n");
|
printf("Kerberos V4: no user name supplied\r\n");
|
||||||
@@ -387,7 +387,7 @@ kerberos4_reply(ap, data, cnt)
|
|||||||
auth_send_retry();
|
auth_send_retry();
|
||||||
return;
|
return;
|
||||||
case KRB_ACCEPT:
|
case KRB_ACCEPT:
|
||||||
printf("[ Kerberos V4 accepts you ]\n");
|
printf("[ Kerberos V4 accepts you ]\r\n");
|
||||||
if ((ap->way & AUTH_HOW_MASK) == AUTH_HOW_MUTUAL) {
|
if ((ap->way & AUTH_HOW_MASK) == AUTH_HOW_MUTUAL) {
|
||||||
/*
|
/*
|
||||||
* Send over the encrypted challenge.
|
* Send over the encrypted challenge.
|
||||||
|
@@ -486,14 +486,14 @@ kerberos5_reply(ap, data, cnt)
|
|||||||
case KRB_ACCEPT:
|
case KRB_ACCEPT:
|
||||||
if ((ap->way & AUTH_HOW_MASK) == AUTH_HOW_MUTUAL &&
|
if ((ap->way & AUTH_HOW_MASK) == AUTH_HOW_MUTUAL &&
|
||||||
!mutual_complete) {
|
!mutual_complete) {
|
||||||
printf("[ Kerberos V5 accepted you, but didn't provide mutual authentication! ]\n");
|
printf("[ Kerberos V5 accepted you, but didn't provide mutual authentication! ]\r\n");
|
||||||
auth_send_retry();
|
auth_send_retry();
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
if (cnt)
|
if (cnt)
|
||||||
printf("[ Kerberos V5 accepts you as ``%.*s'' ]\n", cnt, data);
|
printf("[ Kerberos V5 accepts you as ``%.*s'' ]\r\n", cnt, data);
|
||||||
else
|
else
|
||||||
printf("[ Kerberos V5 accepts you ]\n");
|
printf("[ Kerberos V5 accepts you ]\r\n");
|
||||||
auth_finished(ap, AUTH_USER);
|
auth_finished(ap, AUTH_USER);
|
||||||
#ifdef FORWARD
|
#ifdef FORWARD
|
||||||
if (forward_flags & OPTS_FORWARD_CREDS)
|
if (forward_flags & OPTS_FORWARD_CREDS)
|
||||||
@@ -516,14 +516,14 @@ kerberos5_reply(ap, data, cnt)
|
|||||||
tmpkey.length = sizeof(des_cblock);
|
tmpkey.length = sizeof(des_cblock);
|
||||||
|
|
||||||
if (r = krb5_rd_rep(&inbuf, &tmpkey, &reply)) {
|
if (r = krb5_rd_rep(&inbuf, &tmpkey, &reply)) {
|
||||||
printf("[ Mutual authentication failed: %s ]\n",
|
printf("[ Mutual authentication failed: %s ]\r\n",
|
||||||
error_message(r));
|
error_message(r));
|
||||||
auth_send_retry();
|
auth_send_retry();
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
if (reply->ctime != authenticator.ctime ||
|
if (reply->ctime != authenticator.ctime ||
|
||||||
reply->cusec != authenticator.cusec) {
|
reply->cusec != authenticator.cusec) {
|
||||||
printf("[ Mutual authentication failed (mismatched KRB_AP_REP) ]\n");
|
printf("[ Mutual authentication failed (mismatched KRB_AP_REP) ]\r\n");
|
||||||
auth_send_retry();
|
auth_send_retry();
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
@@ -533,7 +533,7 @@ kerberos5_reply(ap, data, cnt)
|
|||||||
return;
|
return;
|
||||||
#ifdef FORWARD
|
#ifdef FORWARD
|
||||||
case KRB_FORWARD_ACCEPT:
|
case KRB_FORWARD_ACCEPT:
|
||||||
printf("[ Kerberos V5 accepted forwarded credentials ]\n");
|
printf("[ Kerberos V5 accepted forwarded credentials ]\r\n");
|
||||||
return;
|
return;
|
||||||
case KRB_FORWARD_REJECT:
|
case KRB_FORWARD_REJECT:
|
||||||
printf("[ Kerberos V5 refuses forwarded credentials because %.*s ]\r\n",
|
printf("[ Kerberos V5 refuses forwarded credentials because %.*s ]\r\n",
|
||||||
|
@@ -181,7 +181,7 @@ krb4encpwd_send(ap)
|
|||||||
Authenticator *ap;
|
Authenticator *ap;
|
||||||
{
|
{
|
||||||
|
|
||||||
printf("[ Trying KRB4ENCPWD ... ]\n");
|
printf("[ Trying KRB4ENCPWD ... ]\r\n");
|
||||||
if (!UserNameRequested) {
|
if (!UserNameRequested) {
|
||||||
return(0);
|
return(0);
|
||||||
}
|
}
|
||||||
@@ -299,7 +299,7 @@ krb4encpwd_reply(ap, data, cnt)
|
|||||||
auth_send_retry();
|
auth_send_retry();
|
||||||
return;
|
return;
|
||||||
case KRB4_ENCPWD_ACCEPT:
|
case KRB4_ENCPWD_ACCEPT:
|
||||||
printf("[ KRB4_ENCPWD accepts you ]\n");
|
printf("[ KRB4_ENCPWD accepts you ]\r\n");
|
||||||
auth_finished(ap, AUTH_USER);
|
auth_finished(ap, AUTH_USER);
|
||||||
return;
|
return;
|
||||||
case KRB4_ENCPWD_CHALLENGE:
|
case KRB4_ENCPWD_CHALLENGE:
|
||||||
|
@@ -179,7 +179,7 @@ rsaencpwd_send(ap)
|
|||||||
Authenticator *ap;
|
Authenticator *ap;
|
||||||
{
|
{
|
||||||
|
|
||||||
printf("[ Trying RSAENCPWD ... ]\n");
|
printf("[ Trying RSAENCPWD ... ]\r\n");
|
||||||
if (!UserNameRequested) {
|
if (!UserNameRequested) {
|
||||||
return(0);
|
return(0);
|
||||||
}
|
}
|
||||||
@@ -339,7 +339,7 @@ rsaencpwd_reply(ap, data, cnt)
|
|||||||
auth_send_retry();
|
auth_send_retry();
|
||||||
return;
|
return;
|
||||||
case RSA_ENCPWD_ACCEPT:
|
case RSA_ENCPWD_ACCEPT:
|
||||||
printf("[ RSA_ENCPWD accepts you ]\n");
|
printf("[ RSA_ENCPWD accepts you ]\r\n");
|
||||||
auth_finished(ap, AUTH_USER);
|
auth_finished(ap, AUTH_USER);
|
||||||
return;
|
return;
|
||||||
case RSA_ENCPWD_CHALLENGEKEY:
|
case RSA_ENCPWD_CHALLENGEKEY:
|
||||||
|
@@ -216,7 +216,7 @@ spx_send(ap)
|
|||||||
int deleg_flag=1, mutual_flag=0, replay_flag=0, seq_flag=0;
|
int deleg_flag=1, mutual_flag=0, replay_flag=0, seq_flag=0;
|
||||||
char *address;
|
char *address;
|
||||||
|
|
||||||
printf("[ Trying SPX ... ]\n");
|
printf("[ Trying SPX ... ]\r\n");
|
||||||
strcpy(targ_printable, "SERVICE:rcmd@");
|
strcpy(targ_printable, "SERVICE:rcmd@");
|
||||||
strcat(targ_printable, RemoteHostName);
|
strcat(targ_printable, RemoteHostName);
|
||||||
|
|
||||||
@@ -429,7 +429,7 @@ spx_reply(ap, data, cnt)
|
|||||||
auth_send_retry();
|
auth_send_retry();
|
||||||
return;
|
return;
|
||||||
case SPX_ACCEPT:
|
case SPX_ACCEPT:
|
||||||
printf("[ SPX accepts you ]\n");
|
printf("[ SPX accepts you ]\r\n");
|
||||||
if ((ap->way & AUTH_HOW_MASK) == AUTH_HOW_MUTUAL) {
|
if ((ap->way & AUTH_HOW_MASK) == AUTH_HOW_MUTUAL) {
|
||||||
/*
|
/*
|
||||||
* Send over the encrypted challenge.
|
* Send over the encrypted challenge.
|
||||||
|
Reference in New Issue
Block a user