summaryrefslogtreecommitdiffhomepage
path: root/svr-authpasswd.c
diff options
context:
space:
mode:
authorMatt Johnston <matt@ucc.asn.au>2011-02-23 15:50:30 +0000
committerMatt Johnston <matt@ucc.asn.au>2011-02-23 15:50:30 +0000
commit38ed870ffeea569f6da1e615685147a84f231cf3 (patch)
treecc0c3378b7e231df6b44c881d10235c313478a60 /svr-authpasswd.c
parent1e4ed404c500c4bf01300a9efe7e2fb329dc3b02 (diff)
Improve capitalisation for all logged strings
--HG-- extra : convert_revision : 997e53cec7a9efb7413ac6e17b6be60a5597bd2e
Diffstat (limited to 'svr-authpasswd.c')
-rw-r--r--svr-authpasswd.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/svr-authpasswd.c b/svr-authpasswd.c
index 53550a2..a29fd63 100644
--- a/svr-authpasswd.c
+++ b/svr-authpasswd.c
@@ -64,7 +64,7 @@ void svr_auth_password() {
* since the shadow password may differ to that tested
* in auth.c */
if (passwdcrypt[0] == '\0') {
- dropbear_log(LOG_WARNING, "user '%s' has blank password, rejected",
+ dropbear_log(LOG_WARNING, "User '%s' has blank password, rejected",
ses.authstate.pw_name);
send_msg_userauth_failure(0, 1);
return;
@@ -88,13 +88,13 @@ void svr_auth_password() {
if (strcmp(testcrypt, passwdcrypt) == 0) {
/* successful authentication */
dropbear_log(LOG_NOTICE,
- "password auth succeeded for '%s' from %s",
+ "Password auth succeeded for '%s' from %s",
ses.authstate.pw_name,
svr_ses.addrstring);
send_msg_userauth_success();
} else {
dropbear_log(LOG_WARNING,
- "bad password attempt for '%s' from %s",
+ "Bad password attempt for '%s' from %s",
ses.authstate.pw_name,
svr_ses.addrstring);
send_msg_userauth_failure(0, 1);