diff options
author | Rob Crittenden <rcritten@redhat.com> | 2015-10-02 15:34:36 -0400 |
---|---|---|
committer | Rob Crittenden <rcritten@redhat.com> | 2015-10-02 16:51:57 -0400 |
commit | 44409398b2bb63a092e16db686f4ddcd2cd88554 (patch) | |
tree | 5fa20ddef0200b7fd4262d474791256f2173107e /nss_engine_pphrase.c | |
parent | 242f32c7f567dcd2ee35f46c07c9ecf2adf954f6 (diff) | |
download | mod_nss-44409398b2bb63a092e16db686f4ddcd2cd88554.tar.gz mod_nss-44409398b2bb63a092e16db686f4ddcd2cd88554.tar.xz mod_nss-44409398b2bb63a092e16db686f4ddcd2cd88554.zip |
Cleanup to remove a slew of trailing whitespace
Diffstat (limited to 'nss_engine_pphrase.c')
-rw-r--r-- | nss_engine_pphrase.c | 18 |
1 files changed, 9 insertions, 9 deletions
diff --git a/nss_engine_pphrase.c b/nss_engine_pphrase.c index b747076..9a25454 100644 --- a/nss_engine_pphrase.c +++ b/nss_engine_pphrase.c @@ -100,12 +100,12 @@ SECStatus nss_Init_Tokens(server_rec *s) 2. We'll get a bogus error message from nss_engine_init, -8053, instead of -8177. */ - return SECFailure; + return SECFailure; } parg->retryCount = 0; /* reset counter to 0 for the next token */ PK11_FreeSlot(slot); } - + /* * reset NSS password callback to blank, so that the server won't prompt * again after initialization is done. @@ -113,7 +113,7 @@ SECStatus nss_Init_Tokens(server_rec *s) PK11_SetPasswordFunc(nss_no_password); free(parg); - return status; + return status; } /* @@ -179,7 +179,7 @@ static char * nss_password_prompt(PK11SlotInfo *slot, PRBool retry, void *arg) * Enforce basic password sanity rules on the password. We don't do * any actual enforcement here but it demonstrates the sorts of things * that may be done. - */ + */ static PRBool nss_check_password(unsigned char *cp) { int len; @@ -316,17 +316,17 @@ static char *nss_get_password(FILE *input, FILE *output, nss_die(); } - /* Just return what we got. If we got this far and we don't have a + /* Just return what we got. If we got this far and we don't have a * PIN then I/O is already shut down, so we can't do anything really * clever. */ pwdstr = strdup(buf); } - /* If we got a password we're done */ + /* If we got a password we're done */ if (pwdstr) return pwdstr; - + for (;;) { /* Prompt for password */ if (isTTY) { @@ -341,7 +341,7 @@ static char *nss_get_password(FILE *input, FILE *output, fprintf(output, "\n"); echoOn(infd); } - /* stomp on newline */ + /* stomp on newline */ phrase[strlen((char*)phrase)-1] = 0; /* Validate password */ @@ -350,7 +350,7 @@ static char *nss_get_password(FILE *input, FILE *output, if (!isTTY) return 0; fprintf(output, "Password must be at least 8 characters long with one or more\n"); fprintf(output, "non-alphabetic characters\n"); - continue; + continue; } if (PK11_IsFIPS() && strlen((char *)phrase) == 0) { ap_log_error(APLOG_MARK, APLOG_ERR, 0, NULL, |