From f3a2b348daf9fa6063c38d2d69563f732a2f80e7 Mon Sep 17 00:00:00 2001 From: rgrimes Date: Tue, 30 May 1995 06:12:45 +0000 Subject: Remove trailing whitespace. --- secure/lib/libtelnet/auth-proto.h | 2 +- secure/lib/libtelnet/auth.c | 2 +- secure/lib/libtelnet/enc_des.c | 6 ++--- secure/lib/libtelnet/encrypt.c | 8 +++---- secure/lib/libtelnet/kerberos.c | 4 ++-- secure/lib/libtelnet/kerberos5.c | 44 ++++++++++++++++++------------------ secure/lib/libtelnet/krb4encpwd.c | 2 +- secure/lib/libtelnet/read_password.c | 8 +++---- secure/lib/libtelnet/rsaencpwd.c | 2 +- 9 files changed, 39 insertions(+), 39 deletions(-) (limited to 'secure/lib/libtelnet') diff --git a/secure/lib/libtelnet/auth-proto.h b/secure/lib/libtelnet/auth-proto.h index 06bba2b..111033d 100644 --- a/secure/lib/libtelnet/auth-proto.h +++ b/secure/lib/libtelnet/auth-proto.h @@ -40,7 +40,7 @@ * to require a specific license from the United States Government. * It is the responsibility of any person or organization contemplating * export to obtain such a license before exporting. - * + * * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and * distribute this software and its documentation for any purpose and * without fee is hereby granted, provided that the above copyright diff --git a/secure/lib/libtelnet/auth.c b/secure/lib/libtelnet/auth.c index 485ac83..226a206 100644 --- a/secure/lib/libtelnet/auth.c +++ b/secure/lib/libtelnet/auth.c @@ -467,7 +467,7 @@ auth_send(data, cnt) * We requested strong authentication, however no mechanisms worked. * Therefore, exit on client end. */ - printf("Unable to securely authenticate user ... exit\n"); + printf("Unable to securely authenticate user ... exit\n"); exit(0); #endif /* KANNAN */ } diff --git a/secure/lib/libtelnet/enc_des.c b/secure/lib/libtelnet/enc_des.c index 15e8521..6f90520 100644 --- a/secure/lib/libtelnet/enc_des.c +++ b/secure/lib/libtelnet/enc_des.c @@ -580,7 +580,7 @@ fb64_stream_key(key, stp) * INPUT --(--------->(+)+---> DATA * | | * +-------------+ - * + * * * Given: * iV: Initial vector, 64 bits (8 bytes) long. @@ -641,7 +641,7 @@ cfb64_decrypt(data) des_ecb_encrypt(stp->str_output, b, stp->str_sched, 1); bcopy((void *)b, (void *)stp->str_feed, sizeof(Block)); stp->str_index = 1; /* Next time will be 1 */ - index = 0; /* But now use 0 */ + index = 0; /* But now use 0 */ } /* On decryption we store (data) which is cypher. */ @@ -714,7 +714,7 @@ ofb64_decrypt(data) des_ecb_encrypt(stp->str_feed, b, stp->str_sched, 1); bcopy((void *)b, (void *)stp->str_feed, sizeof(Block)); stp->str_index = 1; /* Next time will be 1 */ - index = 0; /* But now use 0 */ + index = 0; /* But now use 0 */ } return(data ^ stp->str_feed[index]); diff --git a/secure/lib/libtelnet/encrypt.c b/secure/lib/libtelnet/encrypt.c index 8662473..1ced89b 100644 --- a/secure/lib/libtelnet/encrypt.c +++ b/secure/lib/libtelnet/encrypt.c @@ -106,7 +106,7 @@ static long remote_supports_decrypt = 0; static Encryptions encryptions[] = { #ifdef DES_ENCRYPTION { "DES_CFB64", ENCTYPE_DES_CFB64, - cfb64_encrypt, + cfb64_encrypt, cfb64_decrypt, cfb64_init, cfb64_start, @@ -116,7 +116,7 @@ static Encryptions encryptions[] = { cfb64_keyid, cfb64_printsub }, { "DES_OFB64", ENCTYPE_DES_OFB64, - ofb64_encrypt, + ofb64_encrypt, ofb64_decrypt, ofb64_init, ofb64_start, @@ -708,7 +708,7 @@ encrypt_request_end() * Called when ENCRYPT REQUEST-START is received. If we receive * this before a type is picked, then that indicates that the * other side wants us to start encrypting data as soon as we - * can. + * can. */ void encrypt_request_start(data, cnt) @@ -851,7 +851,7 @@ encrypt_start_output(type) i = (*ep->start)(DIR_ENCRYPT, Server); if (encrypt_debug_mode) { printf(">>>%s: Encrypt start: %s (%d) %s\r\n", - Name, + Name, (i < 0) ? "failed" : "initial negotiation in progress", i, ENCTYPE_NAME(type)); diff --git a/secure/lib/libtelnet/kerberos.c b/secure/lib/libtelnet/kerberos.c index 7c5771c..5eef373 100644 --- a/secure/lib/libtelnet/kerberos.c +++ b/secure/lib/libtelnet/kerberos.c @@ -177,7 +177,7 @@ kerberos4_send(ap) CREDENTIALS cred; int r; - printf("[ Trying KERBEROS4 ... ]\n"); + printf("[ Trying KERBEROS4 ... ]\n"); if (!UserNameRequested) { if (auth_debug_mode) { printf("Kerberos V4: no user name supplied\r\n"); @@ -245,7 +245,7 @@ kerberos4_send(ap) des_ecb_encrypt(challenge, challenge, sched, 1); } #endif /* ENCRYPTION */ - + if (auth_debug_mode) { printf("CK: %d:", kerberos4_cksum(auth.dat, auth.length)); printd(auth.dat, auth.length); diff --git a/secure/lib/libtelnet/kerberos5.c b/secure/lib/libtelnet/kerberos5.c index d2eb34f..f167b38 100644 --- a/secure/lib/libtelnet/kerberos5.c +++ b/secure/lib/libtelnet/kerberos5.c @@ -1,7 +1,7 @@ /* - * $Source: /home/ncvs/src/lib/libtelnet/kerberos5.c,v $ - * $Author: rgrimes $ - * $Id: kerberos5.c,v 1.1.1.1 1994/05/27 05:00:20 rgrimes Exp $ + * $Source: /home/ncvs/src/secure/lib/libtelnet/kerberos5.c,v $ + * $Author: csgr $ + * $Id: kerberos5.c,v 1.1.1.1 1994/08/12 22:02:59 csgr Exp $ */ #if !defined(lint) && !defined(SABER) @@ -9,7 +9,7 @@ static #ifdef __STDC__ const #endif -char rcsid_kerberos5_c[] = "$Id: kerberos5.c,v 1.1.1.1 1994/05/27 05:00:20 rgrimes Exp $"; +char rcsid_kerberos5_c[] = "$Id: kerberos5.c,v 1.1.1.1 1994/08/12 22:02:59 csgr Exp $"; #endif /* lint */ /*- @@ -84,7 +84,7 @@ static char sccsid[] = "@(#)kerberos5.c 8.2 (Berkeley) 12/15/93"; /* kerberos 5 include files (ext-proto.h) will get an appropriate stdlib.h and string.h/strings.h */ - + #include "encrypt.h" #include "auth.h" #include "misc.h" @@ -204,7 +204,7 @@ kerberos5_send(ap) ksum.contents = sum; ksum.length = sizeof(sum); bzero((Voidptr )sum, sizeof(sum)); - + if (!UserNameRequested) { if (auth_debug_mode) { printf("Kerberos V5: no user name supplied\r\n"); @@ -254,7 +254,7 @@ kerberos5_send(ap) krb5_free_host_realm(realms); return(0); } - + bzero((char *)&creds, sizeof(creds)); creds.server = server; @@ -284,7 +284,7 @@ kerberos5_send(ap) ap_opts = AP_OPTS_MUTUAL_REQUIRED; else ap_opts = 0; - + r = krb5_mk_req_extended(ap_opts, &ksum, krb5_kdc_default_options, 0, #ifdef ENCRYPTION &newkey, @@ -441,7 +441,7 @@ kerberos5_is(ap, data, cnt) goto errout; } Data(ap, KRB_RESPONSE, outbuf.data, outbuf.length); - } + } if (krb5_unparse_name(authdat->ticket->enc_part2 ->client, &name)) name = 0; @@ -451,7 +451,7 @@ kerberos5_is(ap, data, cnt) name ? name : ""); } auth_finished(ap, AUTH_USER); - + free(name); if (authdat->authenticator->subkey && authdat->authenticator->subkey->keytype == KEYTYPE_DES) { @@ -463,7 +463,7 @@ kerberos5_is(ap, data, cnt) (Voidptr )session_key, sizeof(Block)); } else break; - + #ifdef ENCRYPTION skey.type = SK_DES; skey.length = 8; @@ -475,17 +475,17 @@ kerberos5_is(ap, data, cnt) case KRB_FORWARD: inbuf.data = (char *)data; inbuf.length = cnt; - if (r = rd_and_store_for_creds(&inbuf, authdat->ticket, + if (r = rd_and_store_for_creds(&inbuf, authdat->ticket, UserNameRequested)) { char errbuf[128]; - + (void) strcpy(errbuf, "Read forwarded creds failed: "); (void) strcat(errbuf, error_message(r)); Data(ap, KRB_FORWARD_REJECT, errbuf, -1); if (auth_debug_mode) printf("Could not read forwarded credentials\r\n"); } - else + else Data(ap, KRB_FORWARD_ACCEPT, 0, 0); if (auth_debug_mode) printf("Forwarded credentials obtained\r\n"); @@ -690,16 +690,16 @@ kerberos5_forward(ap) krb5_ccache ccache; int i; - if (!(local_creds = (krb5_creds *) + if (!(local_creds = (krb5_creds *) calloc(1, sizeof(*local_creds)))) { - if (auth_debug_mode) + if (auth_debug_mode) printf("Kerberos V5: could not allocate memory for credentials\r\n"); return; } if (r = krb5_sname_to_principal(RemoteHostName, "host", 1, &local_creds->server)) { - if (auth_debug_mode) + if (auth_debug_mode) printf("Kerberos V5: could not build server name - %s\r\n", error_message(r)); krb5_free_creds(local_creds); @@ -707,7 +707,7 @@ kerberos5_forward(ap) } if (r = krb5_cc_default(&ccache)) { - if (auth_debug_mode) + if (auth_debug_mode) printf("Kerberos V5: could not get default ccache - %s\r\n", error_message(r)); krb5_free_creds(local_creds); @@ -715,7 +715,7 @@ kerberos5_forward(ap) } if (r = krb5_cc_get_principal(ccache, &local_creds->client)) { - if (auth_debug_mode) + if (auth_debug_mode) printf("Kerberos V5: could not get default principal - %s\r\n", error_message(r)); krb5_free_creds(local_creds); @@ -724,7 +724,7 @@ kerberos5_forward(ap) /* Get ticket from credentials cache */ if (r = krb5_get_credentials(KRB5_GC_CACHED, ccache, local_creds)) { - if (auth_debug_mode) + if (auth_debug_mode) printf("Kerberos V5: could not obtain credentials - %s\r\n", error_message(r)); krb5_free_creds(local_creds); @@ -738,13 +738,13 @@ kerberos5_forward(ap) &local_creds->keyblock, forward_flags & OPTS_FORWARDABLE_CREDS, &forw_creds)) { - if (auth_debug_mode) + if (auth_debug_mode) printf("Kerberos V5: error getting forwarded creds - %s\r\n", error_message(r)); krb5_free_creds(local_creds); return; } - + /* Send forwarded credentials */ if (!Data(ap, KRB_FORWARD, forw_creds.data, forw_creds.length)) { if (auth_debug_mode) diff --git a/secure/lib/libtelnet/krb4encpwd.c b/secure/lib/libtelnet/krb4encpwd.c index 0f75d4d..3d17b53 100644 --- a/secure/lib/libtelnet/krb4encpwd.c +++ b/secure/lib/libtelnet/krb4encpwd.c @@ -266,7 +266,7 @@ krb4encpwd_is(ap, data, cnt) Data(ap, KRB4_ENCPWD_CHALLENGE, (void *)challenge, strlen(challenge)); } break; - + default: Data(ap, KRB4_ENCPWD_REJECT, 0, 0); break; diff --git a/secure/lib/libtelnet/read_password.c b/secure/lib/libtelnet/read_password.c index 5eaa895..d487ab6 100644 --- a/secure/lib/libtelnet/read_password.c +++ b/secure/lib/libtelnet/read_password.c @@ -36,8 +36,8 @@ static char sccsid[] = "@(#)read_password.c 8.2 (Berkeley) 12/15/93"; #endif /* not lint */ /* - * $Source: /home/ncvs/src/lib/libtelnet/read_password.c,v $ - * $Author: rgrimes $ + * $Source: /home/ncvs/src/secure/lib/libtelnet/read_password.c,v $ + * $Author: csgr $ * * Copyright 1985, 1986, 1987, 1988 by the Massachusetts Institute * of Technology. @@ -76,7 +76,7 @@ local_des_read_pw_string(s,max,prompt,verify) { int ok = 0; char *ptr; - + jmp_buf old_env; struct sgttyb tty_state; char key_string[BUFSIZ]; @@ -91,7 +91,7 @@ local_des_read_pw_string(s,max,prompt,verify) goto lose; /* save terminal state*/ - if (ioctl(0,TIOCGETP,(char *)&tty_state) == -1) + if (ioctl(0,TIOCGETP,(char *)&tty_state) == -1) return -1; /* push_signals(); diff --git a/secure/lib/libtelnet/rsaencpwd.c b/secure/lib/libtelnet/rsaencpwd.c index eda70fe..4c1cb48 100644 --- a/secure/lib/libtelnet/rsaencpwd.c +++ b/secure/lib/libtelnet/rsaencpwd.c @@ -304,7 +304,7 @@ rsaencpwd_is(ap, data, cnt) Data(ap, RSA_ENCPWD_CHALLENGEKEY, (void *)chalkey, chalkey_len); } break; - + default: Data(ap, RSA_ENCPWD_REJECT, 0, 0); break; -- cgit v1.1