diff options
author | Matt Johnston <matt@ucc.asn.au> | 2011-02-23 15:50:30 +0000 |
---|---|---|
committer | Matt Johnston <matt@ucc.asn.au> | 2011-02-23 15:50:30 +0000 |
commit | 38ed870ffeea569f6da1e615685147a84f231cf3 (patch) | |
tree | cc0c3378b7e231df6b44c881d10235c313478a60 /svr-auth.c | |
parent | 1e4ed404c500c4bf01300a9efe7e2fb329dc3b02 (diff) |
Improve capitalisation for all logged strings
--HG--
extra : convert_revision : 997e53cec7a9efb7413ac6e17b6be60a5597bd2e
Diffstat (limited to 'svr-auth.c')
-rw-r--r-- | svr-auth.c | 9 |
1 files changed, 4 insertions, 5 deletions
@@ -222,7 +222,7 @@ static int checkusername(unsigned char *username, unsigned int userlen) { strcmp(username, ses.authstate.username) != 0) { /* the username needs resetting */ if (ses.authstate.username != NULL) { - dropbear_log(LOG_WARNING, "client trying multiple usernames from %s", + dropbear_log(LOG_WARNING, "Client trying multiple usernames from %s", svr_ses.addrstring); m_free(ses.authstate.username); } @@ -235,7 +235,7 @@ static int checkusername(unsigned char *username, unsigned int userlen) { if (!ses.authstate.pw_name) { TRACE(("leave checkusername: user '%s' doesn't exist", username)) dropbear_log(LOG_WARNING, - "login attempt for nonexistent user from %s", + "Login attempt for nonexistent user from %s", svr_ses.addrstring); send_msg_userauth_failure(0, 1); return DROPBEAR_FAILURE; @@ -252,7 +252,7 @@ static int checkusername(unsigned char *username, unsigned int userlen) { /* check for an empty password */ if (ses.authstate.pw_passwd[0] == '\0') { TRACE(("leave checkusername: empty pword")) - dropbear_log(LOG_WARNING, "user '%s' has blank password, rejected", + dropbear_log(LOG_WARNING, "User '%s' has blank password, rejected", ses.authstate.pw_name); send_msg_userauth_failure(0, 1); return DROPBEAR_FAILURE; @@ -281,7 +281,7 @@ static int checkusername(unsigned char *username, unsigned int userlen) { /* no matching shell */ endusershell(); TRACE(("no matching shell")) - dropbear_log(LOG_WARNING, "user '%s' has invalid shell, rejected", + dropbear_log(LOG_WARNING, "User '%s' has invalid shell, rejected", ses.authstate.pw_name); send_msg_userauth_failure(0, 1); return DROPBEAR_FAILURE; @@ -343,7 +343,6 @@ void send_msg_userauth_failure(int partial, int incrfail) { /* We delay for 300ms +- 50ms, 0.1ms granularity */ delay = 250000 + (delay % 1000)*100; usleep(delay); - dropbear_log(LOG_INFO, "delay is %d", delay); ses.authstate.failcount++; } |