[Openvas-commits] r3535 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Fri May 29 11:16:23 CEST 2009


Author: felix
Date: 2009-05-29 11:16:22 +0200 (Fri, 29 May 2009)
New Revision: 3535

Modified:
   trunk/openvas-plugins/ChangeLog
   trunk/openvas-plugins/scripts/slad_ssh.inc
Log:
* scripts/slad_ssh.inc:
Begin messages text with capital letter.

* ChangeLog: minimal reformatting.


Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2009-05-29 07:44:37 UTC (rev 3534)
+++ trunk/openvas-plugins/ChangeLog	2009-05-29 09:16:22 UTC (rev 3535)
@@ -1,4 +1,10 @@
-2009-05-29 Chandan S <schandan at secpod.com> 
+2009-05-29  Felix Wolfsteller <felix.wolfsteller at intevation.de>
+
+	* scripts/slad_ssh.inc:
+	Begin messages text with capital letter.
+
+2009-05-29  Chandan S <schandan at secpod.com>
+
 	* scripts/secpod_netdecision_tftp_server_dir_trav_vuln.nasl,
 	secpod_avg_detect_win.nasl,
 	secpod_sorinara_audio_player_bof_vuln.nasl,
@@ -13,7 +19,8 @@
 	* scripts/squirrelmail_detect.nasl:
 	thorough_tests removed.
 
-2009-05-28 Michael Meyer <mime at gmx.de>
+2009-05-28  Michael Meyer <mime at gmx.de>
+
 	* scripts/cacti_27749.nasl,
 	scripts/lighttpd_35097.nasl,
 	scripts/apache_CVE_2009_1195.nasl:

Modified: trunk/openvas-plugins/scripts/slad_ssh.inc
===================================================================
--- trunk/openvas-plugins/scripts/slad_ssh.inc	2009-05-29 07:44:37 UTC (rev 3534)
+++ trunk/openvas-plugins/scripts/slad_ssh.inc	2009-05-29 09:16:22 UTC (rev 3535)
@@ -22,18 +22,18 @@
   else port = int (port);
   
   if (!slad_login_name) {
-    security_note (port: port, data: "no username given for SLAD checks. SLAD checks will be disabled.");
+    security_note (port: port, data: "No username given for SLAD checks. SLAD checks will be disabled.");
     exit (0);
   }
   if (!slad_private_key) {
-    security_note (port: port, data: "no key given for SLAD checks. SLAD checks will be disabled.");
+    security_note (port: port, data: "No key given for SLAD checks. SLAD checks will be disabled.");
     exit (0);
   }
   
   # Connect via SSH
   sock = open_sock_tcp (port);
   if (!sock || sock < 1) {
-    security_warning (port: port, data: "could not get socket");
+    security_warning (port: port, data: "Could not get socket.");
     exit (0);
   }
   if (ssh_login (socket:sock, login: slad_login_name, password: NULL,



More information about the Openvas-commits mailing list