remove trailing whitespace

This commit is contained in:
Love Hornquist Astrand
2011-05-21 11:57:31 -07:00
parent 25e86d6f4d
commit 0879b9831a
539 changed files with 6825 additions and 6825 deletions

View File

@@ -59,7 +59,7 @@ kcm_op_noop(krb5_context context,
{
KCM_LOG_REQUEST(context, client, opcode);
return 0;
return 0;
}
/*
@@ -108,7 +108,7 @@ kcm_op_get_name(krb5_context context,
/*
* Request:
*
*
* Response:
* NameZ
*/
@@ -139,9 +139,9 @@ kcm_op_gen_new(krb5_context context,
* Request:
* NameZ
* Principal
*
*
* Response:
*
*
*/
static krb5_error_code
kcm_op_initialize(krb5_context context,
@@ -205,9 +205,9 @@ kcm_op_initialize(krb5_context context,
/*
* Request:
* NameZ
*
*
* Response:
*
*
*/
static krb5_error_code
kcm_op_destroy(krb5_context context,
@@ -238,9 +238,9 @@ kcm_op_destroy(krb5_context context,
* Request:
* NameZ
* Creds
*
*
* Response:
*
*
*/
static krb5_error_code
kcm_op_store(krb5_context context,
@@ -298,7 +298,7 @@ kcm_op_store(krb5_context context,
*
* Response:
* Creds
*
*
*/
static krb5_error_code
kcm_op_retrieve(krb5_context context,
@@ -432,7 +432,7 @@ kcm_op_get_principal(krb5_context context,
*
* Response:
* UUIDs
*
*
*/
static krb5_error_code
kcm_op_get_cred_uuid_list(krb5_context context,
@@ -535,7 +535,7 @@ kcm_op_get_cred_by_uuid(krb5_context context,
* MatchCreds
*
* Response:
*
*
*/
static krb5_error_code
kcm_op_remove_cred(krb5_context context,
@@ -593,7 +593,7 @@ kcm_op_remove_cred(krb5_context context,
* Flags
*
* Response:
*
*
*/
static krb5_error_code
kcm_op_set_flags(krb5_context context,
@@ -640,7 +640,7 @@ kcm_op_set_flags(krb5_context context,
* GID
*
* Response:
*
*
*/
static krb5_error_code
kcm_op_chown(krb5_context context,
@@ -694,7 +694,7 @@ kcm_op_chown(krb5_context context,
* Mode
*
* Response:
*
*
*/
static krb5_error_code
kcm_op_chmod(krb5_context context,
@@ -1257,7 +1257,7 @@ find_ntlm_cred(const char *user, const char *domain, kcm_client *client)
struct kcm_ntlm_cred *c;
for (c = ntlm_head; c != NULL; c = c->next)
if ((user[0] == '\0' || strcmp(user, c->user) == 0) &&
if ((user[0] == '\0' || strcmp(user, c->user) == 0) &&
(domain == NULL || strcmp(domain, c->domain) == 0) &&
kcm_is_same_session(client, c->uid, c->session))
return c;
@@ -1448,7 +1448,7 @@ kcm_op_do_ntlm(krb5_context context,
memset(&type3, 0, sizeof(type3));
sessionkey.data = NULL;
sessionkey.length = 0;
ret = krb5_ret_stringz(request, &user);
if (ret)
goto error;
@@ -1489,22 +1489,22 @@ kcm_op_do_ntlm(krb5_context context,
type3.flags = type2.flags;
type3.targetname = type2.targetname;
type3.ws = rk_UNCONST("workstation");
/*
* NTLM Version 1 if no targetinfo buffer.
*/
if (1 || type2.targetinfo.length == 0) {
struct ntlm_buf sessionkey;
if (type2.flags & NTLM_NEG_NTLM2_SESSION) {
unsigned char nonce[8];
if (RAND_bytes(nonce, sizeof(nonce)) != 1) {
ret = EINVAL;
goto error;
}
ret = heim_ntlm_calculate_ntlm2_sess(nonce,
type2.challenge,
c->nthash.data,
@@ -1515,11 +1515,11 @@ kcm_op_do_ntlm(krb5_context context,
c->nthash.length,
type2.challenge,
&type3.ntlm);
}
if (ret)
goto error;
ret = heim_ntlm_build_ntlm1_master(c->nthash.data,
c->nthash.length,
&sessionkey,
@@ -1541,14 +1541,14 @@ kcm_op_do_ntlm(krb5_context context,
goto error;
}
flags |= NTLM_FLAG_SESSIONKEY;
#if 0
#if 0
} else {
struct ntlm_buf sessionkey;
unsigned char ntlmv2[16];
struct ntlm_targetinfo ti;
/* verify infotarget */
ret = heim_ntlm_decode_targetinfo(&type2.targetinfo, 1, &ti);
if(ret) {
_gss_ntlm_delete_sec_context(minor_status,
@@ -1556,14 +1556,14 @@ kcm_op_do_ntlm(krb5_context context,
*minor_status = ret;
return GSS_S_FAILURE;
}
if (ti.domainname && strcmp(ti.domainname, name->domain) != 0) {
_gss_ntlm_delete_sec_context(minor_status,
context_handle, NULL);
*minor_status = EINVAL;
return GSS_S_FAILURE;
}
ret = heim_ntlm_calculate_ntlm2(ctx->client->key.data,
ctx->client->key.length,
type3.username,
@@ -1578,7 +1578,7 @@ kcm_op_do_ntlm(krb5_context context,
*minor_status = ret;
return GSS_S_FAILURE;
}
ret = heim_ntlm_build_ntlm1_master(ntlmv2, sizeof(ntlmv2),
&sessionkey,
&type3.sessionkey);
@@ -1589,10 +1589,10 @@ kcm_op_do_ntlm(krb5_context context,
*minor_status = ret;
return GSS_S_FAILURE;
}
flags |= NTLM_FLAG_NTLM2_SESSION |
NTLM_FLAG_SESSION;
if (type3.flags & NTLM_NEG_KEYEX)
flags |= NTLM_FLAG_KEYEX;
@@ -1607,7 +1607,7 @@ kcm_op_do_ntlm(krb5_context context,
}
#endif
}
#if 0
if (flags & NTLM_FLAG_NTLM2_SESSION) {
_gss_ntlm_set_key(&ctx->u.v2.send, 0, (ctx->flags & NTLM_NEG_KEYEX),
@@ -1630,7 +1630,7 @@ kcm_op_do_ntlm(krb5_context context,
ret = heim_ntlm_encode_type3(&type3, &ndata);
if (ret)
goto error;
data.data = ndata.data;
data.length = ndata.length;
ret = krb5_store_data(response, data);