summaryrefslogtreecommitdiffhomepage
path: root/svr-auth.c
diff options
context:
space:
mode:
authorMatt Johnston <matt@ucc.asn.au>2011-02-23 15:50:30 +0000
committerMatt Johnston <matt@ucc.asn.au>2011-02-23 15:50:30 +0000
commit38ed870ffeea569f6da1e615685147a84f231cf3 (patch)
treecc0c3378b7e231df6b44c881d10235c313478a60 /svr-auth.c
parent1e4ed404c500c4bf01300a9efe7e2fb329dc3b02 (diff)
Improve capitalisation for all logged strings
--HG-- extra : convert_revision : 997e53cec7a9efb7413ac6e17b6be60a5597bd2e
Diffstat (limited to 'svr-auth.c')
-rw-r--r--svr-auth.c9
1 files changed, 4 insertions, 5 deletions
diff --git a/svr-auth.c b/svr-auth.c
index 9e468fa..87e3c5e 100644
--- a/svr-auth.c
+++ b/svr-auth.c
@@ -222,7 +222,7 @@ static int checkusername(unsigned char *username, unsigned int userlen) {
strcmp(username, ses.authstate.username) != 0) {
/* the username needs resetting */
if (ses.authstate.username != NULL) {
- dropbear_log(LOG_WARNING, "client trying multiple usernames from %s",
+ dropbear_log(LOG_WARNING, "Client trying multiple usernames from %s",
svr_ses.addrstring);
m_free(ses.authstate.username);
}
@@ -235,7 +235,7 @@ static int checkusername(unsigned char *username, unsigned int userlen) {
if (!ses.authstate.pw_name) {
TRACE(("leave checkusername: user '%s' doesn't exist", username))
dropbear_log(LOG_WARNING,
- "login attempt for nonexistent user from %s",
+ "Login attempt for nonexistent user from %s",
svr_ses.addrstring);
send_msg_userauth_failure(0, 1);
return DROPBEAR_FAILURE;
@@ -252,7 +252,7 @@ static int checkusername(unsigned char *username, unsigned int userlen) {
/* check for an empty password */
if (ses.authstate.pw_passwd[0] == '\0') {
TRACE(("leave checkusername: empty pword"))
- dropbear_log(LOG_WARNING, "user '%s' has blank password, rejected",
+ dropbear_log(LOG_WARNING, "User '%s' has blank password, rejected",
ses.authstate.pw_name);
send_msg_userauth_failure(0, 1);
return DROPBEAR_FAILURE;
@@ -281,7 +281,7 @@ static int checkusername(unsigned char *username, unsigned int userlen) {
/* no matching shell */
endusershell();
TRACE(("no matching shell"))
- dropbear_log(LOG_WARNING, "user '%s' has invalid shell, rejected",
+ dropbear_log(LOG_WARNING, "User '%s' has invalid shell, rejected",
ses.authstate.pw_name);
send_msg_userauth_failure(0, 1);
return DROPBEAR_FAILURE;
@@ -343,7 +343,6 @@ void send_msg_userauth_failure(int partial, int incrfail) {
/* We delay for 300ms +- 50ms, 0.1ms granularity */
delay = 250000 + (delay % 1000)*100;
usleep(delay);
- dropbear_log(LOG_INFO, "delay is %d", delay);
ses.authstate.failcount++;
}