remove trailing whitespace

git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@23815 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
Love Hörnquist Åstrand
2008-09-13 09:21:03 +00:00
parent e172367898
commit 6937d41a02
940 changed files with 23827 additions and 23827 deletions

View File

@@ -132,7 +132,7 @@ Data(Authenticator *ap, int type, const void *d, int c)
p0 = malloc(len);
if (p0 == NULL)
return 0;
memcpy(p0, str_data, sizeof(str_data));
p = p0 + sizeof(str_data);
@@ -199,14 +199,14 @@ kerberos5_send(char *name, Authenticator *ap)
int ap_opts;
krb5_data cksum_data;
char ap_msg[2];
if (!UserNameRequested) {
if (auth_debug_mode) {
printf("Kerberos V5: no user name supplied\r\n");
}
return(0);
}
ret = krb5_cc_default(context, &ccache);
if (ret) {
if (auth_debug_mode) {
@@ -222,7 +222,7 @@ kerberos5_send(char *name, Authenticator *ap)
ap_opts = 0;
ap_opts |= AP_OPTS_USE_SUBKEY;
ret = krb5_auth_con_init (context, &auth_context);
if (ret) {
if (auth_debug_mode) {
@@ -282,7 +282,7 @@ kerberos5_send(char *name, Authenticator *ap)
}
printf("[ Trying %s (%s)... ]\r\n", name, sname);
ret = krb5_mk_req_exact(context, &auth_context, ap_opts,
service,
service,
&cksum_data, ccache, &auth);
krb5_free_principal (context, service);
@@ -395,7 +395,7 @@ kerberos5_is(Authenticator *ap, unsigned char *data, int cnt)
ret = krb5_rd_req(context,
&auth_context,
&auth,
&auth,
server,
NULL,
NULL,
@@ -421,13 +421,13 @@ kerberos5_is(Authenticator *ap, unsigned char *data, int cnt)
{
char ap_msg[2];
ap_msg[0] = ap->type;
ap_msg[1] = ap->way;
ret = krb5_verify_authenticator_checksum(context,
auth_context,
ap_msg,
ap_msg,
sizeof(ap_msg));
if (ret) {
@@ -435,7 +435,7 @@ kerberos5_is(Authenticator *ap, unsigned char *data, int cnt)
char *errbuf;
int ret2;
ret2 = asprintf(&errbuf, "Bad checksum: %s",
ret2 = asprintf(&errbuf, "Bad checksum: %s",
krb5_get_err_text(context, ret));
if (ret2 != -1)
errbuf2 = errbuf;
@@ -501,7 +501,7 @@ kerberos5_is(Authenticator *ap, unsigned char *data, int cnt)
UserNameRequested)) {
Data(ap, KRB_ACCEPT, name, name ? -1 : 0);
log_message("%s accepted as user %s from %s",
name ? name : "<unknown>",
name ? name : "<unknown>",
UserNameRequested ? UserNameRequested : "<unknown>",
RemoteHostName ? RemoteHostName : "<unknown>");
@@ -521,7 +521,7 @@ kerberos5_is(Authenticator *ap, unsigned char *data, int cnt)
char *msg;
ret = asprintf (&msg, "user `%s' is not authorized to "
"login as `%s'",
"login as `%s'",
name ? name : "<unknown>",
UserNameRequested ? UserNameRequested : "<nobody>");
if (ret != -1)
@@ -638,7 +638,7 @@ kerberos5_reply(Authenticator *ap, unsigned char *data, int cnt)
printf("[ Kerberos V5 accepts you as ``%.*s'' ]\r\n", cnt, data);
else
printf("[ Kerberos V5 accepts you ]\r\n");
ret = krb5_auth_con_getlocalsubkey (context,
auth_context,
&keyblock);
@@ -652,7 +652,7 @@ kerberos5_reply(Authenticator *ap, unsigned char *data, int cnt)
auth_send_retry();
return;
}
skey.type = SK_DES;
skey.length = 8;
skey.data = keyblock->keyvalue.data;
@@ -669,7 +669,7 @@ kerberos5_reply(Authenticator *ap, unsigned char *data, int cnt)
krb5_ap_rep_enc_part *reply;
krb5_data inbuf;
krb5_error_code ret;
inbuf.length = cnt;
inbuf.data = (char *)data;
@@ -722,7 +722,7 @@ kerberos5_status(Authenticator *ap, char *name, size_t name_sz, int level)
#define ADDC(buf, len, c) if ((len) > 0) {*(buf)++ = (c); --(len);}
void
kerberos5_printsub(unsigned char *data, size_t cnt,
kerberos5_printsub(unsigned char *data, size_t cnt,
unsigned char *buf, size_t buflen)
{
int i;
@@ -811,7 +811,7 @@ kerberos5_forward(Authenticator *ap)
memset (&creds, 0, sizeof(creds));
creds.client = principal;
ret = krb5_build_principal (context,
&creds.server,
strlen(principal->realm),