summaryrefslogtreecommitdiffstats
path: root/secure/lib/libtelnet
diff options
context:
space:
mode:
authorrgrimes <rgrimes@FreeBSD.org>1995-05-30 06:12:45 +0000
committerrgrimes <rgrimes@FreeBSD.org>1995-05-30 06:12:45 +0000
commitf3a2b348daf9fa6063c38d2d69563f732a2f80e7 (patch)
tree4d38911cf1e5e1ef56a662eddcbe2f706b2e6973 /secure/lib/libtelnet
parentf05428e4cd63dde97bac14b84dd146a5c00455e3 (diff)
downloadFreeBSD-src-f3a2b348daf9fa6063c38d2d69563f732a2f80e7.zip
FreeBSD-src-f3a2b348daf9fa6063c38d2d69563f732a2f80e7.tar.gz
Remove trailing whitespace.
Diffstat (limited to 'secure/lib/libtelnet')
-rw-r--r--secure/lib/libtelnet/auth-proto.h2
-rw-r--r--secure/lib/libtelnet/auth.c2
-rw-r--r--secure/lib/libtelnet/enc_des.c6
-rw-r--r--secure/lib/libtelnet/encrypt.c8
-rw-r--r--secure/lib/libtelnet/kerberos.c4
-rw-r--r--secure/lib/libtelnet/kerberos5.c44
-rw-r--r--secure/lib/libtelnet/krb4encpwd.c2
-rw-r--r--secure/lib/libtelnet/read_password.c8
-rw-r--r--secure/lib/libtelnet/rsaencpwd.c2
9 files changed, 39 insertions, 39 deletions
diff --git a/secure/lib/libtelnet/auth-proto.h b/secure/lib/libtelnet/auth-proto.h
index 06bba2b..111033d 100644
--- a/secure/lib/libtelnet/auth-proto.h
+++ b/secure/lib/libtelnet/auth-proto.h
@@ -40,7 +40,7 @@
* to require a specific license from the United States Government.
* It is the responsibility of any person or organization contemplating
* export to obtain such a license before exporting.
- *
+ *
* WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
* distribute this software and its documentation for any purpose and
* without fee is hereby granted, provided that the above copyright
diff --git a/secure/lib/libtelnet/auth.c b/secure/lib/libtelnet/auth.c
index 485ac83..226a206 100644
--- a/secure/lib/libtelnet/auth.c
+++ b/secure/lib/libtelnet/auth.c
@@ -467,7 +467,7 @@ auth_send(data, cnt)
* We requested strong authentication, however no mechanisms worked.
* Therefore, exit on client end.
*/
- printf("Unable to securely authenticate user ... exit\n");
+ printf("Unable to securely authenticate user ... exit\n");
exit(0);
#endif /* KANNAN */
}
diff --git a/secure/lib/libtelnet/enc_des.c b/secure/lib/libtelnet/enc_des.c
index 15e8521..6f90520 100644
--- a/secure/lib/libtelnet/enc_des.c
+++ b/secure/lib/libtelnet/enc_des.c
@@ -580,7 +580,7 @@ fb64_stream_key(key, stp)
* INPUT --(--------->(+)+---> DATA
* | |
* +-------------+
- *
+ *
*
* Given:
* iV: Initial vector, 64 bits (8 bytes) long.
@@ -641,7 +641,7 @@ cfb64_decrypt(data)
des_ecb_encrypt(stp->str_output, b, stp->str_sched, 1);
bcopy((void *)b, (void *)stp->str_feed, sizeof(Block));
stp->str_index = 1; /* Next time will be 1 */
- index = 0; /* But now use 0 */
+ index = 0; /* But now use 0 */
}
/* On decryption we store (data) which is cypher. */
@@ -714,7 +714,7 @@ ofb64_decrypt(data)
des_ecb_encrypt(stp->str_feed, b, stp->str_sched, 1);
bcopy((void *)b, (void *)stp->str_feed, sizeof(Block));
stp->str_index = 1; /* Next time will be 1 */
- index = 0; /* But now use 0 */
+ index = 0; /* But now use 0 */
}
return(data ^ stp->str_feed[index]);
diff --git a/secure/lib/libtelnet/encrypt.c b/secure/lib/libtelnet/encrypt.c
index 8662473..1ced89b 100644
--- a/secure/lib/libtelnet/encrypt.c
+++ b/secure/lib/libtelnet/encrypt.c
@@ -106,7 +106,7 @@ static long remote_supports_decrypt = 0;
static Encryptions encryptions[] = {
#ifdef DES_ENCRYPTION
{ "DES_CFB64", ENCTYPE_DES_CFB64,
- cfb64_encrypt,
+ cfb64_encrypt,
cfb64_decrypt,
cfb64_init,
cfb64_start,
@@ -116,7 +116,7 @@ static Encryptions encryptions[] = {
cfb64_keyid,
cfb64_printsub },
{ "DES_OFB64", ENCTYPE_DES_OFB64,
- ofb64_encrypt,
+ ofb64_encrypt,
ofb64_decrypt,
ofb64_init,
ofb64_start,
@@ -708,7 +708,7 @@ encrypt_request_end()
* Called when ENCRYPT REQUEST-START is received. If we receive
* this before a type is picked, then that indicates that the
* other side wants us to start encrypting data as soon as we
- * can.
+ * can.
*/
void
encrypt_request_start(data, cnt)
@@ -851,7 +851,7 @@ encrypt_start_output(type)
i = (*ep->start)(DIR_ENCRYPT, Server);
if (encrypt_debug_mode) {
printf(">>>%s: Encrypt start: %s (%d) %s\r\n",
- Name,
+ Name,
(i < 0) ? "failed" :
"initial negotiation in progress",
i, ENCTYPE_NAME(type));
diff --git a/secure/lib/libtelnet/kerberos.c b/secure/lib/libtelnet/kerberos.c
index 7c5771c..5eef373 100644
--- a/secure/lib/libtelnet/kerberos.c
+++ b/secure/lib/libtelnet/kerberos.c
@@ -177,7 +177,7 @@ kerberos4_send(ap)
CREDENTIALS cred;
int r;
- printf("[ Trying KERBEROS4 ... ]\n");
+ printf("[ Trying KERBEROS4 ... ]\n");
if (!UserNameRequested) {
if (auth_debug_mode) {
printf("Kerberos V4: no user name supplied\r\n");
@@ -245,7 +245,7 @@ kerberos4_send(ap)
des_ecb_encrypt(challenge, challenge, sched, 1);
}
#endif /* ENCRYPTION */
-
+
if (auth_debug_mode) {
printf("CK: %d:", kerberos4_cksum(auth.dat, auth.length));
printd(auth.dat, auth.length);
diff --git a/secure/lib/libtelnet/kerberos5.c b/secure/lib/libtelnet/kerberos5.c
index d2eb34f..f167b38 100644
--- a/secure/lib/libtelnet/kerberos5.c
+++ b/secure/lib/libtelnet/kerberos5.c
@@ -1,7 +1,7 @@
/*
- * $Source: /home/ncvs/src/lib/libtelnet/kerberos5.c,v $
- * $Author: rgrimes $
- * $Id: kerberos5.c,v 1.1.1.1 1994/05/27 05:00:20 rgrimes Exp $
+ * $Source: /home/ncvs/src/secure/lib/libtelnet/kerberos5.c,v $
+ * $Author: csgr $
+ * $Id: kerberos5.c,v 1.1.1.1 1994/08/12 22:02:59 csgr Exp $
*/
#if !defined(lint) && !defined(SABER)
@@ -9,7 +9,7 @@ static
#ifdef __STDC__
const
#endif
-char rcsid_kerberos5_c[] = "$Id: kerberos5.c,v 1.1.1.1 1994/05/27 05:00:20 rgrimes Exp $";
+char rcsid_kerberos5_c[] = "$Id: kerberos5.c,v 1.1.1.1 1994/08/12 22:02:59 csgr Exp $";
#endif /* lint */
/*-
@@ -84,7 +84,7 @@ static char sccsid[] = "@(#)kerberos5.c 8.2 (Berkeley) 12/15/93";
/* kerberos 5 include files (ext-proto.h) will get an appropriate stdlib.h
and string.h/strings.h */
-
+
#include "encrypt.h"
#include "auth.h"
#include "misc.h"
@@ -204,7 +204,7 @@ kerberos5_send(ap)
ksum.contents = sum;
ksum.length = sizeof(sum);
bzero((Voidptr )sum, sizeof(sum));
-
+
if (!UserNameRequested) {
if (auth_debug_mode) {
printf("Kerberos V5: no user name supplied\r\n");
@@ -254,7 +254,7 @@ kerberos5_send(ap)
krb5_free_host_realm(realms);
return(0);
}
-
+
bzero((char *)&creds, sizeof(creds));
creds.server = server;
@@ -284,7 +284,7 @@ kerberos5_send(ap)
ap_opts = AP_OPTS_MUTUAL_REQUIRED;
else
ap_opts = 0;
-
+
r = krb5_mk_req_extended(ap_opts, &ksum, krb5_kdc_default_options, 0,
#ifdef ENCRYPTION
&newkey,
@@ -441,7 +441,7 @@ kerberos5_is(ap, data, cnt)
goto errout;
}
Data(ap, KRB_RESPONSE, outbuf.data, outbuf.length);
- }
+ }
if (krb5_unparse_name(authdat->ticket->enc_part2 ->client,
&name))
name = 0;
@@ -451,7 +451,7 @@ kerberos5_is(ap, data, cnt)
name ? name : "");
}
auth_finished(ap, AUTH_USER);
-
+
free(name);
if (authdat->authenticator->subkey &&
authdat->authenticator->subkey->keytype == KEYTYPE_DES) {
@@ -463,7 +463,7 @@ kerberos5_is(ap, data, cnt)
(Voidptr )session_key, sizeof(Block));
} else
break;
-
+
#ifdef ENCRYPTION
skey.type = SK_DES;
skey.length = 8;
@@ -475,17 +475,17 @@ kerberos5_is(ap, data, cnt)
case KRB_FORWARD:
inbuf.data = (char *)data;
inbuf.length = cnt;
- if (r = rd_and_store_for_creds(&inbuf, authdat->ticket,
+ if (r = rd_and_store_for_creds(&inbuf, authdat->ticket,
UserNameRequested)) {
char errbuf[128];
-
+
(void) strcpy(errbuf, "Read forwarded creds failed: ");
(void) strcat(errbuf, error_message(r));
Data(ap, KRB_FORWARD_REJECT, errbuf, -1);
if (auth_debug_mode)
printf("Could not read forwarded credentials\r\n");
}
- else
+ else
Data(ap, KRB_FORWARD_ACCEPT, 0, 0);
if (auth_debug_mode)
printf("Forwarded credentials obtained\r\n");
@@ -690,16 +690,16 @@ kerberos5_forward(ap)
krb5_ccache ccache;
int i;
- if (!(local_creds = (krb5_creds *)
+ if (!(local_creds = (krb5_creds *)
calloc(1, sizeof(*local_creds)))) {
- if (auth_debug_mode)
+ if (auth_debug_mode)
printf("Kerberos V5: could not allocate memory for credentials\r\n");
return;
}
if (r = krb5_sname_to_principal(RemoteHostName, "host", 1,
&local_creds->server)) {
- if (auth_debug_mode)
+ if (auth_debug_mode)
printf("Kerberos V5: could not build server name - %s\r\n",
error_message(r));
krb5_free_creds(local_creds);
@@ -707,7 +707,7 @@ kerberos5_forward(ap)
}
if (r = krb5_cc_default(&ccache)) {
- if (auth_debug_mode)
+ if (auth_debug_mode)
printf("Kerberos V5: could not get default ccache - %s\r\n",
error_message(r));
krb5_free_creds(local_creds);
@@ -715,7 +715,7 @@ kerberos5_forward(ap)
}
if (r = krb5_cc_get_principal(ccache, &local_creds->client)) {
- if (auth_debug_mode)
+ if (auth_debug_mode)
printf("Kerberos V5: could not get default principal - %s\r\n",
error_message(r));
krb5_free_creds(local_creds);
@@ -724,7 +724,7 @@ kerberos5_forward(ap)
/* Get ticket from credentials cache */
if (r = krb5_get_credentials(KRB5_GC_CACHED, ccache, local_creds)) {
- if (auth_debug_mode)
+ if (auth_debug_mode)
printf("Kerberos V5: could not obtain credentials - %s\r\n",
error_message(r));
krb5_free_creds(local_creds);
@@ -738,13 +738,13 @@ kerberos5_forward(ap)
&local_creds->keyblock,
forward_flags & OPTS_FORWARDABLE_CREDS,
&forw_creds)) {
- if (auth_debug_mode)
+ if (auth_debug_mode)
printf("Kerberos V5: error getting forwarded creds - %s\r\n",
error_message(r));
krb5_free_creds(local_creds);
return;
}
-
+
/* Send forwarded credentials */
if (!Data(ap, KRB_FORWARD, forw_creds.data, forw_creds.length)) {
if (auth_debug_mode)
diff --git a/secure/lib/libtelnet/krb4encpwd.c b/secure/lib/libtelnet/krb4encpwd.c
index 0f75d4d..3d17b53 100644
--- a/secure/lib/libtelnet/krb4encpwd.c
+++ b/secure/lib/libtelnet/krb4encpwd.c
@@ -266,7 +266,7 @@ krb4encpwd_is(ap, data, cnt)
Data(ap, KRB4_ENCPWD_CHALLENGE, (void *)challenge, strlen(challenge));
}
break;
-
+
default:
Data(ap, KRB4_ENCPWD_REJECT, 0, 0);
break;
diff --git a/secure/lib/libtelnet/read_password.c b/secure/lib/libtelnet/read_password.c
index 5eaa895..d487ab6 100644
--- a/secure/lib/libtelnet/read_password.c
+++ b/secure/lib/libtelnet/read_password.c
@@ -36,8 +36,8 @@ static char sccsid[] = "@(#)read_password.c 8.2 (Berkeley) 12/15/93";
#endif /* not lint */
/*
- * $Source: /home/ncvs/src/lib/libtelnet/read_password.c,v $
- * $Author: rgrimes $
+ * $Source: /home/ncvs/src/secure/lib/libtelnet/read_password.c,v $
+ * $Author: csgr $
*
* Copyright 1985, 1986, 1987, 1988 by the Massachusetts Institute
* of Technology.
@@ -76,7 +76,7 @@ local_des_read_pw_string(s,max,prompt,verify)
{
int ok = 0;
char *ptr;
-
+
jmp_buf old_env;
struct sgttyb tty_state;
char key_string[BUFSIZ];
@@ -91,7 +91,7 @@ local_des_read_pw_string(s,max,prompt,verify)
goto lose;
/* save terminal state*/
- if (ioctl(0,TIOCGETP,(char *)&tty_state) == -1)
+ if (ioctl(0,TIOCGETP,(char *)&tty_state) == -1)
return -1;
/*
push_signals();
diff --git a/secure/lib/libtelnet/rsaencpwd.c b/secure/lib/libtelnet/rsaencpwd.c
index eda70fe..4c1cb48 100644
--- a/secure/lib/libtelnet/rsaencpwd.c
+++ b/secure/lib/libtelnet/rsaencpwd.c
@@ -304,7 +304,7 @@ rsaencpwd_is(ap, data, cnt)
Data(ap, RSA_ENCPWD_CHALLENGEKEY, (void *)chalkey, chalkey_len);
}
break;
-
+
default:
Data(ap, RSA_ENCPWD_REJECT, 0, 0);
break;
OpenPOWER on IntegriCloud