Skip to content

Commit 31d8d23

Browse files
committed
upstream: highly polished whitespace, mostly fixing spaces-for-tab
and bad indentation on continuation lines. Prompted by GHPR#185 OpenBSD-Commit-ID: e5c81f0cbdcc6144df1ce468ec1bac366d8ad6e9
1 parent 34afde5 commit 31d8d23

40 files changed

+155
-151
lines changed

addrmatch.c

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: addrmatch.c,v 1.16 2021/01/09 11:58:50 dtucker Exp $ */
1+
/* $OpenBSD: addrmatch.c,v 1.17 2021/04/03 06:18:40 djm Exp $ */
22

33
/*
44
* Copyright (c) 2004-2008 Damien Miller <djm@mindrot.org>
@@ -76,7 +76,7 @@ addr_match_list(const char *addr, const char *_list)
7676
break;
7777
} else if (r == 0) {
7878
if (addr != NULL && addr_netmatch(&try_addr,
79-
&match_addr, masklen) == 0) {
79+
&match_addr, masklen) == 0) {
8080
foundit:
8181
if (neg) {
8282
ret = -1;

auth-krb5.c

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: auth-krb5.c,v 1.23 2018/07/09 21:35:50 markus Exp $ */
1+
/* $OpenBSD: auth-krb5.c,v 1.24 2021/04/03 06:18:40 djm Exp $ */
22
/*
33
* Kerberos v5 authentication and ticket-passing routines.
44
*
@@ -99,7 +99,7 @@ auth_krb5_password(Authctxt *authctxt, const char *password)
9999
#ifdef HEIMDAL
100100
# ifdef HAVE_KRB5_CC_NEW_UNIQUE
101101
problem = krb5_cc_new_unique(authctxt->krb5_ctx,
102-
krb5_mcc_ops.prefix, NULL, &ccache);
102+
krb5_mcc_ops.prefix, NULL, &ccache);
103103
# else
104104
problem = krb5_cc_gen_new(authctxt->krb5_ctx, &krb5_mcc_ops, &ccache);
105105
# endif
@@ -123,7 +123,7 @@ auth_krb5_password(Authctxt *authctxt, const char *password)
123123

124124
# ifdef HAVE_KRB5_CC_NEW_UNIQUE
125125
problem = krb5_cc_new_unique(authctxt->krb5_ctx,
126-
krb5_fcc_ops.prefix, NULL, &authctxt->krb5_fwd_ccache);
126+
krb5_fcc_ops.prefix, NULL, &authctxt->krb5_fwd_ccache);
127127
# else
128128
problem = krb5_cc_gen_new(authctxt->krb5_ctx, &krb5_fcc_ops,
129129
&authctxt->krb5_fwd_ccache);

auth-options.c

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: auth-options.c,v 1.94 2020/10/18 11:32:01 djm Exp $ */
1+
/* $OpenBSD: auth-options.c,v 1.95 2021/04/03 06:18:40 djm Exp $ */
22
/*
33
* Copyright (c) 2018 Damien Miller <djm@mindrot.org>
44
*
@@ -810,7 +810,7 @@ sshauthopt_serialise(const struct sshauthopt *opts, struct sshbuf *m,
810810
(r = serialise_nullable_string(m,
811811
untrusted ? NULL : opts->required_from_host_cert)) != 0 ||
812812
(r = serialise_nullable_string(m,
813-
untrusted ? NULL : opts->required_from_host_keys)) != 0)
813+
untrusted ? NULL : opts->required_from_host_keys)) != 0)
814814
return r;
815815

816816
/* Array options */

auth.c

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: auth.c,v 1.151 2020/12/22 00:12:22 djm Exp $ */
1+
/* $OpenBSD: auth.c,v 1.152 2021/04/03 06:18:40 djm Exp $ */
22
/*
33
* Copyright (c) 2000 Markus Friedl. All rights reserved.
44
*
@@ -514,7 +514,7 @@ auth_openfile(const char *file, struct passwd *pw, int strict_modes,
514514
if ((fd = open(file, O_RDONLY|O_NONBLOCK)) == -1) {
515515
if (log_missing || errno != ENOENT)
516516
debug("Could not open %s '%s': %s", file_type, file,
517-
strerror(errno));
517+
strerror(errno));
518518
return NULL;
519519
}
520520

auth2-pubkey.c

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: auth2-pubkey.c,v 1.106 2021/01/27 10:05:28 djm Exp $ */
1+
/* $OpenBSD: auth2-pubkey.c,v 1.107 2021/04/03 06:18:40 djm Exp $ */
22
/*
33
* Copyright (c) 2000 Markus Friedl. All rights reserved.
44
*
@@ -674,7 +674,8 @@ check_authkey_line(struct ssh *ssh, struct passwd *pw, struct sshkey *key,
674674
goto fail_reason;
675675
}
676676
if (sshkey_cert_check_authority(key, 0, 0, 0,
677-
keyopts->cert_principals == NULL ? pw->pw_name : NULL, &reason) != 0)
677+
keyopts->cert_principals == NULL ? pw->pw_name : NULL,
678+
&reason) != 0)
678679
goto fail_reason;
679680

680681
verbose("Accepted certificate ID \"%s\" (serial %llu) "
@@ -785,7 +786,7 @@ user_cert_trusted_ca(struct ssh *ssh, struct passwd *pw, struct sshkey *key,
785786
found_principal = 1;
786787
/* If principals file or command is specified, then require a match */
787788
use_authorized_principals = principals_file != NULL ||
788-
options.authorized_principals_command != NULL;
789+
options.authorized_principals_command != NULL;
789790
if (!found_principal && use_authorized_principals) {
790791
reason = "Certificate does not contain an authorized principal";
791792
goto fail_reason;

auth2.c

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: auth2.c,v 1.160 2021/01/27 10:05:28 djm Exp $ */
1+
/* $OpenBSD: auth2.c,v 1.161 2021/04/03 06:18:40 djm Exp $ */
22
/*
33
* Copyright (c) 2000 Markus Friedl. All rights reserved.
44
*
@@ -228,7 +228,7 @@ user_specific_delay(const char *user)
228228
double delay;
229229

230230
(void)snprintf(b, sizeof b, "%llu%s",
231-
(unsigned long long)options.timing_secret, user);
231+
(unsigned long long)options.timing_secret, user);
232232
if (ssh_digest_memory(SSH_DIGEST_SHA512, b, strlen(b), hash, len) != 0)
233233
fatal_f("ssh_digest_memory");
234234
/* 0-4.2 ms of delay */
@@ -703,7 +703,7 @@ void
703703
auth2_record_info(Authctxt *authctxt, const char *fmt, ...)
704704
{
705705
va_list ap;
706-
int i;
706+
int i;
707707

708708
free(authctxt->auth_method_info);
709709
authctxt->auth_method_info = NULL;

channels.c

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: channels.c,v 1.405 2021/02/15 20:43:15 markus Exp $ */
1+
/* $OpenBSD: channels.c,v 1.406 2021/04/03 06:18:40 djm Exp $ */
22
/*
33
* Author: Tatu Ylonen <ylo@cs.hut.fi>
44
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -2299,7 +2299,7 @@ channel_handler_init(struct ssh_channels *sc)
22992299
chan_fn **pre, **post;
23002300

23012301
if ((pre = calloc(SSH_CHANNEL_MAX_TYPE, sizeof(*pre))) == NULL ||
2302-
(post = calloc(SSH_CHANNEL_MAX_TYPE, sizeof(*post))) == NULL)
2302+
(post = calloc(SSH_CHANNEL_MAX_TYPE, sizeof(*post))) == NULL)
23032303
fatal_f("allocation failed");
23042304

23052305
pre[SSH_CHANNEL_OPEN] = &channel_pre_open;
@@ -2699,7 +2699,7 @@ channel_proxy_downstream(struct ssh *ssh, Channel *downstream)
26992699
goto out;
27002700
}
27012701
c = channel_new(ssh, "mux proxy", SSH_CHANNEL_MUX_PROXY,
2702-
-1, -1, -1, 0, 0, 0, ctype, 1);
2702+
-1, -1, -1, 0, 0, 0, ctype, 1);
27032703
c->mux_ctx = downstream; /* point to mux client */
27042704
c->mux_downstream_id = id; /* original downstream id */
27052705
if ((r = sshbuf_put_cstring(modified, ctype)) != 0 ||
@@ -2726,7 +2726,7 @@ channel_proxy_downstream(struct ssh *ssh, Channel *downstream)
27262726
goto out;
27272727
}
27282728
c = channel_new(ssh, "mux proxy", SSH_CHANNEL_MUX_PROXY,
2729-
-1, -1, -1, 0, 0, 0, "mux-down-connect", 1);
2729+
-1, -1, -1, 0, 0, 0, "mux-down-connect", 1);
27302730
c->mux_ctx = downstream; /* point to mux client */
27312731
c->mux_downstream_id = id;
27322732
c->remote_id = remote_id;

channels.h

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: channels.h,v 1.136 2021/04/03 05:54:14 djm Exp $ */
1+
/* $OpenBSD: channels.h,v 1.137 2021/04/03 06:18:40 djm Exp $ */
22

33
/*
44
* Author: Tatu Ylonen <ylo@cs.hut.fi>
@@ -289,7 +289,7 @@ int channel_input_status_confirm(int, u_int32_t, struct ssh *);
289289
/* file descriptor handling (read/write) */
290290

291291
void channel_prepare_select(struct ssh *, fd_set **, fd_set **, int *,
292-
u_int*, time_t*);
292+
u_int*, time_t*);
293293
void channel_after_select(struct ssh *, fd_set *, fd_set *);
294294
void channel_output_poll(struct ssh *);
295295

cipher.c

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: cipher.c,v 1.118 2020/12/21 11:09:32 dtucker Exp $ */
1+
/* $OpenBSD: cipher.c,v 1.119 2021/04/03 06:18:40 djm Exp $ */
22
/*
33
* Author: Tatu Ylonen <ylo@cs.hut.fi>
44
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -495,9 +495,9 @@ cipher_get_keyiv(struct sshcipher_ctx *cc, u_char *iv, size_t len)
495495
if (cipher_authlen(c)) {
496496
if (!EVP_CIPHER_CTX_ctrl(cc->evp, EVP_CTRL_GCM_IV_GEN,
497497
len, iv))
498-
return SSH_ERR_LIBCRYPTO_ERROR;
498+
return SSH_ERR_LIBCRYPTO_ERROR;
499499
} else if (!EVP_CIPHER_CTX_get_iv(cc->evp, iv, len))
500-
return SSH_ERR_LIBCRYPTO_ERROR;
500+
return SSH_ERR_LIBCRYPTO_ERROR;
501501
#endif
502502
return 0;
503503
}

dh.c

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: dh.c,v 1.73 2021/03/12 04:08:19 dtucker Exp $ */
1+
/* $OpenBSD: dh.c,v 1.74 2021/04/03 06:18:40 djm Exp $ */
22
/*
33
* Copyright (c) 2000 Niels Provos. All rights reserved.
44
*
@@ -274,7 +274,7 @@ dh_pub_is_valid(const DH *dh, const BIGNUM *dh_pub)
274274
*/
275275
if (bits_set < 4) {
276276
logit("invalid public DH value (%d/%d)",
277-
bits_set, BN_num_bits(dh_p));
277+
bits_set, BN_num_bits(dh_p));
278278
return 0;
279279
}
280280
return 1;

0 commit comments

Comments
 (0)