From 4e636cf201ce6e7e3b9088568218f9d4e2c51712 Mon Sep 17 00:00:00 2001 From: "djm@openbsd.org" Date: Fri, 8 May 2015 03:56:51 +0000 Subject: [PATCH] upstream commit whitespace at EOL --- PROTOCOL | 4 ++-- PROTOCOL.agent | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/PROTOCOL b/PROTOCOL index 91bfe270d..85641e650 100644 --- a/PROTOCOL +++ b/PROTOCOL @@ -175,7 +175,7 @@ whitelisted to receive this message upon request. OpenSSH supports layer 2 and layer 3 tunnelling via the "tun@openssh.com" channel type. This channel type supports forwarding of network packets -with datagram boundaries intact between endpoints equipped with +with datagram boundaries intact between endpoints equipped with interfaces like the BSD tun(4) device. Tunnel forwarding channels are requested by the client with the following packet: @@ -453,4 +453,4 @@ respond with a SSH_FXP_STATUS message. This extension is advertised in the SSH_FXP_VERSION hello with version "1". -$OpenBSD: PROTOCOL,v 1.27 2015/02/20 22:17:21 djm Exp $ +$OpenBSD: PROTOCOL,v 1.28 2015/05/08 03:56:51 djm Exp $ diff --git a/PROTOCOL.agent b/PROTOCOL.agent index 3fcaa14d4..27ec0c1de 100644 --- a/PROTOCOL.agent +++ b/PROTOCOL.agent @@ -413,7 +413,7 @@ It may be requested using this message: "rsa_e" and "rsa_n" are used to identify which private key to use. "encrypted_challenge" is a challenge blob that has (presumably) -been encrypted with the public key and must be in the range +been encrypted with the public key and must be in the range 1 <= encrypted_challenge < 2^256. "session_id" is the SSH protocol 1 session ID (computed from the server host key, the server semi-ephemeral key and the session cookie). @@ -557,4 +557,4 @@ Locking and unlocking affects both protocol 1 and protocol 2 keys. SSH_AGENT_CONSTRAIN_LIFETIME 1 SSH_AGENT_CONSTRAIN_CONFIRM 2 -$OpenBSD: PROTOCOL.agent,v 1.7 2013/01/02 00:33:49 djm Exp $ +$OpenBSD: PROTOCOL.agent,v 1.8 2015/05/08 03:56:51 djm Exp $