summaryrefslogtreecommitdiffstats
path: root/src/lib
diff options
context:
space:
mode:
authorKen Raeburn <raeburn@mit.edu>2011-09-04 23:52:34 +0000
committerKen Raeburn <raeburn@mit.edu>2011-09-04 23:52:34 +0000
commit4ba58f9b6b7ccb372f09e31ee3d302ffafd50b15 (patch)
treef0d339ede66f7af9153dd1fe016a46ee3aa5d372 /src/lib
parent3b5d496d3d63b28ebd2e23242a3422b1fa838e18 (diff)
downloadkrb5-4ba58f9b6b7ccb372f09e31ee3d302ffafd50b15.tar.gz
krb5-4ba58f9b6b7ccb372f09e31ee3d302ffafd50b15.tar.xz
krb5-4ba58f9b6b7ccb372f09e31ee3d302ffafd50b15.zip
Reindent per krb5-batch-reindent.el.
Some minor reformatting added in places to avoid exceeding 80 columns. Used Emacs 22.1 built-in C mode. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@25144 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/lib')
-rw-r--r--src/lib/gssapi/generic/gssapi_generic.c10
-rw-r--r--src/lib/gssapi/krb5/accept_sec_context.c1
-rw-r--r--src/lib/gssapi/krb5/acquire_cred.c1
-rw-r--r--src/lib/gssapi/krb5/gssapi_krb5.c16
-rw-r--r--src/lib/gssapi/krb5/import_name.c2
-rw-r--r--src/lib/gssapi/krb5/init_sec_context.c1
-rw-r--r--src/lib/gssapi/krb5/prf.c1
-rw-r--r--src/lib/gssapi/krb5/store_cred.c1
-rw-r--r--src/lib/gssapi/mechglue/g_acquire_cred_with_pw.c2
-rw-r--r--src/lib/gssapi/mechglue/g_mechattr.c28
-rw-r--r--src/lib/kadm5/srv/pwqual_princ.c2
-rw-r--r--src/lib/krb5/asn.1/asn1_k_decode_fast.c1
-rw-r--r--src/lib/krb5/asn.1/asn1_k_decode_kdc.c4
-rw-r--r--src/lib/krb5/asn.1/asn1_k_decode_macros.h10
-rw-r--r--src/lib/krb5/asn.1/asn1_k_decode_sam.c1
-rw-r--r--src/lib/krb5/asn.1/asn1_k_encode.c2
-rw-r--r--src/lib/krb5/asn.1/krb5_decode_kdc.c3
-rw-r--r--src/lib/krb5/asn.1/krb5_decode_macros.h6
-rw-r--r--src/lib/krb5/krb/authdata.c2
-rw-r--r--src/lib/krb5/krb/authdata_dec.c2
-rw-r--r--src/lib/krb5/krb/copy_auth.c4
-rw-r--r--src/lib/krb5/krb/fast.c2
-rw-r--r--src/lib/krb5/krb/gic_opt.c4
-rw-r--r--src/lib/krb5/krb/init_ctx.c12
-rw-r--r--src/lib/krb5/krb/int-proto.h2
-rw-r--r--src/lib/krb5/krb/rd_cred.c18
-rw-r--r--src/lib/krb5/krb/s4u_authdata.c11
-rw-r--r--src/lib/krb5/krb/s4u_creds.c18
-rw-r--r--src/lib/krb5/krb/t_expire_warn.c20
-rw-r--r--src/lib/krb5/krb/t_vfy_increds.c2
-rw-r--r--src/lib/krb5/krb/val_renew.c62
-rw-r--r--src/lib/krb5/os/locate_kdc.c4
-rw-r--r--src/lib/krb5/os/trace.c2
33 files changed, 125 insertions, 132 deletions
diff --git a/src/lib/gssapi/generic/gssapi_generic.c b/src/lib/gssapi/generic/gssapi_generic.c
index 3ef2c0c8e..dd254cf97 100644
--- a/src/lib/gssapi/generic/gssapi_generic.c
+++ b/src/lib/gssapi/generic/gssapi_generic.c
@@ -371,11 +371,11 @@ static struct mech_attr_info_desc {
OM_uint32
generic_gss_display_mech_attr(
- OM_uint32 *minor_status,
- gss_const_OID mech_attr,
- gss_buffer_t name,
- gss_buffer_t short_desc,
- gss_buffer_t long_desc)
+ OM_uint32 *minor_status,
+ gss_const_OID mech_attr,
+ gss_buffer_t name,
+ gss_buffer_t short_desc,
+ gss_buffer_t long_desc)
{
size_t i;
diff --git a/src/lib/gssapi/krb5/accept_sec_context.c b/src/lib/gssapi/krb5/accept_sec_context.c
index 3d4158163..a41968ed8 100644
--- a/src/lib/gssapi/krb5/accept_sec_context.c
+++ b/src/lib/gssapi/krb5/accept_sec_context.c
@@ -1374,4 +1374,3 @@ krb5_gss_accept_sec_context(minor_status, context_handle,
delegated_cred_handle,
&exts);
}
-
diff --git a/src/lib/gssapi/krb5/acquire_cred.c b/src/lib/gssapi/krb5/acquire_cred.c
index e71420881..b95a5397e 100644
--- a/src/lib/gssapi/krb5/acquire_cred.c
+++ b/src/lib/gssapi/krb5/acquire_cred.c
@@ -875,4 +875,3 @@ gss_krb5int_import_cred(OM_uint32 *minor_status,
k5_mutex_destroy(&name.lock);
return code;
}
-
diff --git a/src/lib/gssapi/krb5/gssapi_krb5.c b/src/lib/gssapi/krb5/gssapi_krb5.c
index 8dccc60d0..4d4f545f5 100644
--- a/src/lib/gssapi/krb5/gssapi_krb5.c
+++ b/src/lib/gssapi/krb5/gssapi_krb5.c
@@ -647,8 +647,8 @@ krb5_gss_inquire_mech_for_saslname(OM_uint32 *minor_status,
*mech_type = (gss_OID)gss_mech_krb5;
return GSS_S_COMPLETE;
} else if (sasl_mech_name->length == GS2_IAKERB_SASL_NAME_LEN &&
- memcmp(sasl_mech_name->value,
- GS2_IAKERB_SASL_NAME, GS2_IAKERB_SASL_NAME_LEN) == 0) {
+ memcmp(sasl_mech_name->value,
+ GS2_IAKERB_SASL_NAME, GS2_IAKERB_SASL_NAME_LEN) == 0) {
if (mech_type != NULL)
*mech_type = (gss_OID)gss_mech_iakerb;
return GSS_S_COMPLETE;
@@ -668,7 +668,8 @@ krb5_gss_inquire_saslname_for_mech(OM_uint32 *minor_status,
if (!g_make_string_buffer(GS2_IAKERB_SASL_NAME, sasl_mech_name) ||
!g_make_string_buffer("iakerb", mech_name) ||
!g_make_string_buffer("Initial and Pass Through Authentication "
- "Kerberos Mechanism (IAKERB)", mech_description))
+ "Kerberos Mechanism (IAKERB)",
+ mech_description))
goto fail;
} else {
if (!g_make_string_buffer(GS2_KRB5_SASL_NAME, sasl_mech_name) ||
@@ -703,10 +704,11 @@ krb5_gss_inquire_attrs_for_mech(OM_uint32 *minor_status,
if (GSS_ERROR(major))
goto cleanup;
-#define MA_SUPPORTED(ma) do { \
- major = gss_add_oid_set_member(minor_status, (gss_OID)ma, mech_attrs); \
- if (GSS_ERROR(major)) \
- goto cleanup; \
+#define MA_SUPPORTED(ma) do { \
+ major = gss_add_oid_set_member(minor_status, (gss_OID)ma, \
+ mech_attrs); \
+ if (GSS_ERROR(major)) \
+ goto cleanup; \
} while (0)
MA_SUPPORTED(GSS_C_MA_MECH_CONCRETE);
diff --git a/src/lib/gssapi/krb5/import_name.c b/src/lib/gssapi/krb5/import_name.c
index 7583be72d..0e730f98e 100644
--- a/src/lib/gssapi/krb5/import_name.c
+++ b/src/lib/gssapi/krb5/import_name.c
@@ -219,7 +219,7 @@ krb5_gss_import_name(minor_status, input_name_buffer,
goto do_getpwuid;
#endif
} else if (g_OID_equal(input_name_type, gss_nt_exported_name)) {
-#define BOUNDS_CHECK(cp, end, n) \
+#define BOUNDS_CHECK(cp, end, n) \
do { if ((end) - (cp) < (n)) goto fail_name; } while (0)
cp = (unsigned char *)tmp;
end = cp + input_name_buffer->length;
diff --git a/src/lib/gssapi/krb5/init_sec_context.c b/src/lib/gssapi/krb5/init_sec_context.c
index ea00c22af..0133bf084 100644
--- a/src/lib/gssapi/krb5/init_sec_context.c
+++ b/src/lib/gssapi/krb5/init_sec_context.c
@@ -1135,4 +1135,3 @@ krb5_gss_init_sec_context(minor_status, claimant_cred_handle,
time_rec,
&exts);
}
-
diff --git a/src/lib/gssapi/krb5/prf.c b/src/lib/gssapi/krb5/prf.c
index 66cbe7078..6fd34e954 100644
--- a/src/lib/gssapi/krb5/prf.c
+++ b/src/lib/gssapi/krb5/prf.c
@@ -132,4 +132,3 @@ cleanup:
*minor_status = (OM_uint32)code;
return (code == 0) ? GSS_S_COMPLETE : GSS_S_FAILURE;
}
-
diff --git a/src/lib/gssapi/krb5/store_cred.c b/src/lib/gssapi/krb5/store_cred.c
index 94cfd4326..5b4dfe8f7 100644
--- a/src/lib/gssapi/krb5/store_cred.c
+++ b/src/lib/gssapi/krb5/store_cred.c
@@ -182,4 +182,3 @@ krb5_gss_store_cred(OM_uint32 *minor_status,
return GSS_S_COMPLETE;
}
-
diff --git a/src/lib/gssapi/mechglue/g_acquire_cred_with_pw.c b/src/lib/gssapi/mechglue/g_acquire_cred_with_pw.c
index 3030ee741..92b30bafe 100644
--- a/src/lib/gssapi/mechglue/g_acquire_cred_with_pw.c
+++ b/src/lib/gssapi/mechglue/g_acquire_cred_with_pw.c
@@ -177,7 +177,7 @@ OM_uint32 * time_rec;
/* for each requested mech attempt to obtain a credential */
for (i = 0; i < mechs->count; i++) {
major = gss_add_cred_with_password(minor_status, (gss_cred_id_t)creds,
- desired_name,
+ desired_name,
&mechs->elements[i],
password,
cred_usage, time_req, time_req, NULL,
diff --git a/src/lib/gssapi/mechglue/g_mechattr.c b/src/lib/gssapi/mechglue/g_mechattr.c
index 663e02ad4..64bb03bc3 100644
--- a/src/lib/gssapi/mechglue/g_mechattr.c
+++ b/src/lib/gssapi/mechglue/g_mechattr.c
@@ -90,11 +90,11 @@ testMechAttrsKnown(gss_const_OID_set critical,
OM_uint32 KRB5_CALLCONV
gss_indicate_mechs_by_attrs(
- OM_uint32 *minor,
- gss_const_OID_set desired_mech_attrs,
- gss_const_OID_set except_mech_attrs,
- gss_const_OID_set critical_mech_attrs,
- gss_OID_set *mechs)
+ OM_uint32 *minor,
+ gss_const_OID_set desired_mech_attrs,
+ gss_const_OID_set except_mech_attrs,
+ gss_const_OID_set critical_mech_attrs,
+ gss_OID_set *mechs)
{
OM_uint32 status, tmpMinor;
gss_OID_set allMechs = GSS_C_NO_OID_SET;
@@ -154,10 +154,10 @@ cleanup:
OM_uint32 KRB5_CALLCONV
gss_inquire_attrs_for_mech(
- OM_uint32 *minor,
- gss_const_OID mech_oid,
- gss_OID_set *mech_attrs,
- gss_OID_set *known_mech_attrs)
+ OM_uint32 *minor,
+ gss_const_OID mech_oid,
+ gss_OID_set *mech_attrs,
+ gss_OID_set *known_mech_attrs)
{
OM_uint32 status, tmpMinor;
gss_mechanism mech;
@@ -214,11 +214,11 @@ gss_inquire_attrs_for_mech(
OM_uint32 KRB5_CALLCONV
gss_display_mech_attr(
- OM_uint32 *minor,
- gss_const_OID mech_attr,
- gss_buffer_t name,
- gss_buffer_t short_desc,
- gss_buffer_t long_desc)
+ OM_uint32 *minor,
+ gss_const_OID mech_attr,
+ gss_buffer_t name,
+ gss_buffer_t short_desc,
+ gss_buffer_t long_desc)
{
return generic_gss_display_mech_attr(minor, mech_attr,
name, short_desc, long_desc);
diff --git a/src/lib/kadm5/srv/pwqual_princ.c b/src/lib/kadm5/srv/pwqual_princ.c
index f733a393f..cbf2d7205 100644
--- a/src/lib/kadm5/srv/pwqual_princ.c
+++ b/src/lib/kadm5/srv/pwqual_princ.c
@@ -61,7 +61,7 @@ princ_check(krb5_context context, krb5_pwqual_moddata data,
krb5_error_code
pwqual_princ_initvt(krb5_context context, int maj_ver, int min_ver,
- krb5_plugin_vtable vtable)
+ krb5_plugin_vtable vtable)
{
krb5_pwqual_vtable vt;
diff --git a/src/lib/krb5/asn.1/asn1_k_decode_fast.c b/src/lib/krb5/asn.1/asn1_k_decode_fast.c
index 6d9ddd436..57546ac93 100644
--- a/src/lib/krb5/asn.1/asn1_k_decode_fast.c
+++ b/src/lib/krb5/asn.1/asn1_k_decode_fast.c
@@ -76,4 +76,3 @@ asn1_decode_fast_finished_ptr(asn1buf *buf, krb5_fast_finished **valptr)
{
decode_ptr( krb5_fast_finished *, asn1_decode_fast_finished);
}
-
diff --git a/src/lib/krb5/asn.1/asn1_k_decode_kdc.c b/src/lib/krb5/asn.1/asn1_k_decode_kdc.c
index 52c371b9b..1711ca04a 100644
--- a/src/lib/krb5/asn.1/asn1_k_decode_kdc.c
+++ b/src/lib/krb5/asn.1/asn1_k_decode_kdc.c
@@ -25,7 +25,7 @@
*/
#include "asn1_k_decode_macros.h"
-
+
asn1_error_code
asn1_decode_kdc_req(asn1buf *buf, krb5_kdc_req *val)
{
@@ -47,7 +47,7 @@ error_out:
val->padata = NULL;
return retval;
}
-
+
asn1_error_code
asn1_decode_kdc_req_body(asn1buf *buf, krb5_kdc_req *val)
{
diff --git a/src/lib/krb5/asn.1/asn1_k_decode_macros.h b/src/lib/krb5/asn.1/asn1_k_decode_macros.h
index de433c2da..e7c8a54eb 100644
--- a/src/lib/krb5/asn.1/asn1_k_decode_macros.h
+++ b/src/lib/krb5/asn.1/asn1_k_decode_macros.h
@@ -41,11 +41,11 @@
#define clean_return(val) { retval = val; goto error_out; }
/* Declare useful decoder variables. */
-#define setup() \
- asn1_error_code retval; \
- asn1_class asn1class; \
- asn1_construction construction KRB5_ATTR_UNUSED; \
- asn1_tagnum tagnum; \
+#define setup() \
+ asn1_error_code retval; \
+ asn1_class asn1class; \
+ asn1_construction construction KRB5_ATTR_UNUSED; \
+ asn1_tagnum tagnum; \
unsigned int length, taglen KRB5_ATTR_UNUSED
#define unused_var(x) if (0) { x = 0; x = x - x; }
diff --git a/src/lib/krb5/asn.1/asn1_k_decode_sam.c b/src/lib/krb5/asn.1/asn1_k_decode_sam.c
index ae4e42f4b..70405eb2f 100644
--- a/src/lib/krb5/asn.1/asn1_k_decode_sam.c
+++ b/src/lib/krb5/asn.1/asn1_k_decode_sam.c
@@ -270,4 +270,3 @@ error_out:
krb5_free_predicted_sam_response_contents(NULL, val);
return retval;
}
-
diff --git a/src/lib/krb5/asn.1/asn1_k_encode.c b/src/lib/krb5/asn.1/asn1_k_encode.c
index 746b9128c..fffe9474c 100644
--- a/src/lib/krb5/asn.1/asn1_k_encode.c
+++ b/src/lib/krb5/asn.1/asn1_k_encode.c
@@ -1419,7 +1419,7 @@ static unsigned int iakerb_finished_optional(const void *p)
}
DEFSEQTYPE(iakerb_finished, krb5_iakerb_finished, iakerb_finished_fields,
-iakerb_finished_optional);
+ iakerb_finished_optional);
/* Exported complete encoders -- these produce a krb5_data with
the encoding in the correct byte order. */
diff --git a/src/lib/krb5/asn.1/krb5_decode_kdc.c b/src/lib/krb5/asn.1/krb5_decode_kdc.c
index 36380c2fb..ac6ef2056 100644
--- a/src/lib/krb5/asn.1/krb5_decode_kdc.c
+++ b/src/lib/krb5/asn.1/krb5_decode_kdc.c
@@ -95,7 +95,7 @@ decode_krb5_kdc_req_body(const krb5_data *code, krb5_kdc_req **repptr)
cleanup(free);
}
-
+
krb5_error_code
decode_krb5_fast_req(const krb5_data *code, krb5_fast_req **repptr)
{
@@ -167,4 +167,3 @@ decode_krb5_pa_pk_as_req_draft9(const krb5_data *code,
cleanup(free);
}
#endif /* DISABLE_PKINIT */
-
diff --git a/src/lib/krb5/asn.1/krb5_decode_macros.h b/src/lib/krb5/asn.1/krb5_decode_macros.h
index 16ae6fe2f..aada1be62 100644
--- a/src/lib/krb5/asn.1/krb5_decode_macros.h
+++ b/src/lib/krb5/asn.1/krb5_decode_macros.h
@@ -53,9 +53,9 @@
retval = asn1buf_wrap_data(&buf,code); \
if (retval) return retval
-#define setup_no_tagnum(type) \
- asn1_class asn1class KRB5_ATTR_UNUSED; \
- asn1_construction construction KRB5_ATTR_UNUSED; \
+#define setup_no_tagnum(type) \
+ asn1_class asn1class KRB5_ATTR_UNUSED; \
+ asn1_construction construction KRB5_ATTR_UNUSED; \
setup_buf_only(type)
#define setup_no_length(type) \
diff --git a/src/lib/krb5/krb/authdata.c b/src/lib/krb5/krb/authdata.c
index 351762eb1..a24143062 100644
--- a/src/lib/krb5/krb/authdata.c
+++ b/src/lib/krb5/krb/authdata.c
@@ -1199,7 +1199,7 @@ krb5_ser_authdata_context_init(krb5_context kcontext)
krb5_error_code
krb5int_copy_authdatum(krb5_context context,
- const krb5_authdata *inad, krb5_authdata **outad)
+ const krb5_authdata *inad, krb5_authdata **outad)
{
krb5_authdata *tmpad;
diff --git a/src/lib/krb5/krb/authdata_dec.c b/src/lib/krb5/krb/authdata_dec.c
index 5c9efbb16..9809b3376 100644
--- a/src/lib/krb5/krb/authdata_dec.c
+++ b/src/lib/krb5/krb/authdata_dec.c
@@ -105,7 +105,7 @@ grow_find_authdata(krb5_context context, struct find_authdata_context *fctx,
}
fctx->out[fctx->length+1] = NULL;
retval = krb5int_copy_authdatum(context, elem,
- &fctx->out[fctx->length]);
+ &fctx->out[fctx->length]);
if (retval == 0)
fctx->length++;
return retval;
diff --git a/src/lib/krb5/krb/copy_auth.c b/src/lib/krb5/krb/copy_auth.c
index a22d8cbb8..06a06450c 100644
--- a/src/lib/krb5/krb/copy_auth.c
+++ b/src/lib/krb5/krb/copy_auth.c
@@ -86,7 +86,7 @@ krb5_merge_authdata(krb5_context context,
if (inauthdat1) {
for (nelems = 0; inauthdat1[nelems]; nelems++) {
retval = krb5int_copy_authdatum(context, inauthdat1[nelems],
- &tempauthdat[nelems]);
+ &tempauthdat[nelems]);
if (retval) {
krb5_free_authdata(context, tempauthdat);
return retval;
@@ -97,7 +97,7 @@ krb5_merge_authdata(krb5_context context,
if (inauthdat2) {
for (nelems2 = 0; inauthdat2[nelems2]; nelems2++) {
retval = krb5int_copy_authdatum(context, inauthdat2[nelems2],
- &tempauthdat[nelems++]);
+ &tempauthdat[nelems++]);
if (retval) {
krb5_free_authdata(context, tempauthdat);
return retval;
diff --git a/src/lib/krb5/krb/fast.c b/src/lib/krb5/krb/fast.c
index 0d04cc2b0..2290d4874 100644
--- a/src/lib/krb5/krb/fast.c
+++ b/src/lib/krb5/krb/fast.c
@@ -153,7 +153,7 @@ krb5int_fast_as_armor(krb5_context context,
&ccache);
if (retval == 0) {
retval = krb5int_tgtname(context, target_realm, target_realm,
- &target_principal);
+ &target_principal);
}
if (retval == 0) {
krb5_data config_data;
diff --git a/src/lib/krb5/krb/gic_opt.c b/src/lib/krb5/krb/gic_opt.c
index acb6f126d..a98a47ed2 100644
--- a/src/lib/krb5/krb/gic_opt.c
+++ b/src/lib/krb5/krb/gic_opt.c
@@ -228,8 +228,8 @@ krb5_get_init_creds_opt_free(krb5_context context,
static krb5_error_code
gic_opte_copy(krb5_context context,
- krb5_get_init_creds_opt *opt,
- krb5_gic_opt_ext **opte)
+ krb5_get_init_creds_opt *opt,
+ krb5_gic_opt_ext **opte)
{
krb5_gic_opt_ext *oe;
diff --git a/src/lib/krb5/krb/init_ctx.c b/src/lib/krb5/krb/init_ctx.c
index 4896bef02..f244d566e 100644
--- a/src/lib/krb5/krb/init_ctx.c
+++ b/src/lib/krb5/krb/init_ctx.c
@@ -143,12 +143,12 @@ krb5_init_context_profile(profile_t profile, krb5_flags flags,
* The context being NULL is ok.
*/
krb5_win_ccdll_load(ctx);
-p
- /*
- * krb5_vercheck() is defined in win_glue.c, and this is
- * where we handle the timebomb and version server checks.
- */
- retval = krb5_vercheck();
+ p
+ /*
+ * krb5_vercheck() is defined in win_glue.c, and this is
+ * where we handle the timebomb and version server checks.
+ */
+ retval = krb5_vercheck();
if (retval)
return retval;
#endif
diff --git a/src/lib/krb5/krb/int-proto.h b/src/lib/krb5/krb/int-proto.h
index 4a3cea80d..336c04571 100644
--- a/src/lib/krb5/krb/int-proto.h
+++ b/src/lib/krb5/krb/int-proto.h
@@ -29,7 +29,7 @@
krb5_error_code
krb5int_tgtname(krb5_context context, const krb5_data *, const krb5_data *,
- krb5_principal *);
+ krb5_principal *);
krb5_error_code
krb5int_libdefault_boolean(krb5_context, const krb5_data *, const char *,
diff --git a/src/lib/krb5/krb/rd_cred.c b/src/lib/krb5/krb/rd_cred.c
index df9497b2d..22eb4ec7c 100644
--- a/src/lib/krb5/krb/rd_cred.c
+++ b/src/lib/krb5/krb/rd_cred.c
@@ -208,15 +208,15 @@ krb5_rd_cred(krb5_context context, krb5_auth_context auth_context,
* If decrypting with the subsession key fails, perhaps the
* credentials are stored in the session key so try decrypting with that.
*/
- if (auth_context->recv_subkey == NULL ||
- (retval = krb5_rd_cred_basic(context, pcreddata,
- auth_context->recv_subkey,
- &replaydata, pppcreds))) {
- retval = krb5_rd_cred_basic(context, pcreddata,
- auth_context->key,
- &replaydata, pppcreds);
- if (retval)
- return retval;
+ if (auth_context->recv_subkey == NULL ||
+ (retval = krb5_rd_cred_basic(context, pcreddata,
+ auth_context->recv_subkey,
+ &replaydata, pppcreds))) {
+ retval = krb5_rd_cred_basic(context, pcreddata,
+ auth_context->key,
+ &replaydata, pppcreds);
+ if (retval)
+ return retval;
}
if (auth_context->auth_context_flags & KRB5_AUTH_CONTEXT_DO_TIME) {
diff --git a/src/lib/krb5/krb/s4u_authdata.c b/src/lib/krb5/krb/s4u_authdata.c
index 54713cc85..d93e75816 100644
--- a/src/lib/krb5/krb/s4u_authdata.c
+++ b/src/lib/krb5/krb/s4u_authdata.c
@@ -190,7 +190,7 @@ s4u2proxy_export_authdata(krb5_context kcontext,
*out_authdata = authdata;
- return 0;
+ return 0;
}
static krb5_error_code
@@ -287,8 +287,8 @@ s4u2proxy_get_attribute(krb5_context kcontext,
const krb5_data *attribute,
krb5_boolean *authenticated,
krb5_boolean *complete,
- krb5_data *value,
- krb5_data *display_value,
+ krb5_data *value,
+ krb5_data *display_value,
int *more)
{
struct s4u2proxy_context *s4uctx = (struct s4u2proxy_context *)request_context;
@@ -423,7 +423,7 @@ s4u2proxy_size(krb5_context kcontext,
if (code != 0)
return code;
}
-
+
*sizep += sizeof(krb5_int32); /* authenticated flag */
return code;
@@ -463,7 +463,7 @@ s4u2proxy_externalize(krb5_context kcontext,
if (code != 0)
return code;
}
-
+
krb5_ser_pack_int32(s4uctx->authenticated, &bp, &remain); /* authenticated */
*buffer = bp;
@@ -599,4 +599,3 @@ krb5plugin_authdata_client_ftable_v0 krb5int_s4u2proxy_authdata_client_ftable =
s4u2proxy_internalize,
s4u2proxy_copy
};
-
diff --git a/src/lib/krb5/krb/s4u_creds.c b/src/lib/krb5/krb/s4u_creds.c
index 57e8b92d4..e4cc8a14b 100644
--- a/src/lib/krb5/krb/s4u_creds.c
+++ b/src/lib/krb5/krb/s4u_creds.c
@@ -82,7 +82,7 @@ s4u_identify_user(krb5_context context,
return krb5_copy_principal(context,
anonymous ? in_creds->server
- : in_creds->client,
+ : in_creds->client,
canon_user);
}
@@ -685,14 +685,14 @@ krb5_get_credentials_for_user(krb5_context context, krb5_flags options,
if (in_creds->client != NULL &&
in_creds->client->type == KRB5_NT_ENTERPRISE_PRINCIPAL) {
- /* Post-canonicalisation check for enterprise principals */
- krb5_creds mcreds = *in_creds;
- mcreds.client = realm;
- code = krb5_get_credentials(context, options | KRB5_GC_CACHED,
- ccache, &mcreds, out_creds);
- if ((code != KRB5_CC_NOTFOUND && code != KRB5_CC_NOT_KTYPE)
- || (options & KRB5_GC_CACHED))
- goto cleanup;
+ /* Post-canonicalisation check for enterprise principals */
+ krb5_creds mcreds = *in_creds;
+ mcreds.client = realm;
+ code = krb5_get_credentials(context, options | KRB5_GC_CACHED,
+ ccache, &mcreds, out_creds);
+ if ((code != KRB5_CC_NOTFOUND && code != KRB5_CC_NOT_KTYPE)
+ || (options & KRB5_GC_CACHED))
+ goto cleanup;
}
code = krb5_get_self_cred_from_kdc(context, options, ccache,
diff --git a/src/lib/krb5/krb/t_expire_warn.c b/src/lib/krb5/krb/t_expire_warn.c
index c6ff8242e..1e59acba1 100644
--- a/src/lib/krb5/krb/t_expire_warn.c
+++ b/src/lib/krb5/krb/t_expire_warn.c
@@ -30,7 +30,7 @@ static int exp_dummy, prompt_dummy;
static krb5_error_code
prompter_cb(krb5_context ctx, void *data, const char *name,
- const char *banner, int num_prompts, krb5_prompt prompts[])
+ const char *banner, int num_prompts, krb5_prompt prompts[])
{
/* Not expecting any actual prompts, only banners. */
assert(num_prompts == 0);
@@ -41,7 +41,7 @@ prompter_cb(krb5_context ctx, void *data, const char *name,
static void
expire_cb(krb5_context ctx, void *data, krb5_timestamp password_expiration,
- krb5_timestamp account_expiration, krb5_boolean is_last_req)
+ krb5_timestamp account_expiration, krb5_boolean is_last_req)
{
printf("password_expiration = %ld\n", (long)password_expiration);
printf("account_expiration = %ld\n", (long)account_expiration);
@@ -59,26 +59,26 @@ main(int argc, char **argv)
krb5_creds creds;
if (argc < 4) {
- fprintf(stderr, "Usage: %s username password {1|0} [service]\n",
- argv[0]);
- return 1;
+ fprintf(stderr, "Usage: %s username password {1|0} [service]\n",
+ argv[0]);
+ return 1;
}
user = argv[1];
password = argv[2];
use_cb = atoi(argv[3]);
if (argc >= 5)
- service = argv[4];
+ service = argv[4];
assert(krb5_init_context(&ctx) == 0);
assert(krb5_get_init_creds_opt_alloc(ctx, &opt) == 0);
if (use_cb) {
- assert(krb5_get_init_creds_opt_set_expire_callback(ctx, opt, expire_cb,
- &exp_dummy) == 0);
+ assert(krb5_get_init_creds_opt_set_expire_callback(ctx, opt, expire_cb,
+ &exp_dummy) == 0);
}
assert(krb5_parse_name(ctx, user, &client) == 0);
assert(krb5_get_init_creds_password(ctx, &creds, client, password,
- prompter_cb, &prompt_dummy, 0, service,
- opt) == 0);
+ prompter_cb, &prompt_dummy, 0, service,
+ opt) == 0);
krb5_get_init_creds_opt_free(ctx, opt);
krb5_free_principal(ctx, client);
krb5_free_cred_contents(ctx, &creds);
diff --git a/src/lib/krb5/krb/t_vfy_increds.c b/src/lib/krb5/krb/t_vfy_increds.c
index 4fb2498f2..e5d68777a 100644
--- a/src/lib/krb5/krb/t_vfy_increds.c
+++ b/src/lib/krb5/krb/t_vfy_increds.c
@@ -51,6 +51,6 @@ main(int argc, char **argv)
assert(krb5_cc_close(context, ccache) == 0);
if (krb5_verify_init_creds(context, &creds, NULL, NULL, NULL, NULL) != 0)
- return 1;
+ return 1;
return 0;
}
diff --git a/src/lib/krb5/krb/val_renew.c b/src/lib/krb5/krb/val_renew.c
index ef37bdfed..39912aaa8 100644
--- a/src/lib/krb5/krb/val_renew.c
+++ b/src/lib/krb5/krb/val_renew.c
@@ -46,7 +46,7 @@
*/
static krb5_error_code
get_new_creds(krb5_context context, krb5_ccache ccache, krb5_creds *in_creds,
- krb5_flags kdcopt, krb5_creds **out_creds)
+ krb5_flags kdcopt, krb5_creds **out_creds)
{
krb5_error_code code;
krb5_creds old_creds, *new_creds = NULL;
@@ -55,19 +55,19 @@ get_new_creds(krb5_context context, krb5_ccache ccache, krb5_creds *in_creds,
/* Retrieve an existing cached credential matching in_creds. */
code = krb5_cc_retrieve_cred(context, ccache, KRB5_TC_SUPPORTED_KTYPES,
- in_creds, &old_creds);
+ in_creds, &old_creds);
if (code != 0)
- return code;
+ return code;
/* Use KDC options from old credential as well as requested options. */
kdcopt |= (old_creds.ticket_flags & KDC_TKT_COMMON_MASK);
/* Use the old credential to get a new credential from the KDC. */
code = krb5_get_cred_via_tkt(context, &old_creds, kdcopt,
- old_creds.addresses, in_creds, &new_creds);
+ old_creds.addresses, in_creds, &new_creds);
krb5_free_cred_contents(context, &old_creds);
if (code != 0)
- return code;
+ return code;
*out_creds = new_creds;
return code;
@@ -80,7 +80,7 @@ get_new_creds(krb5_context context, krb5_ccache ccache, krb5_creds *in_creds,
*/
static krb5_error_code
gc_valrenew(krb5_context context, krb5_ccache ccache, krb5_creds *in_creds,
- krb5_flags kdcopt, krb5_creds **out_creds)
+ krb5_flags kdcopt, krb5_creds **out_creds)
{
krb5_error_code code;
krb5_creds *new_creds = NULL;
@@ -89,7 +89,7 @@ gc_valrenew(krb5_context context, krb5_ccache ccache, krb5_creds *in_creds,
/* Get the validated or renewed credential. */
code = get_new_creds(context, ccache, in_creds, kdcopt, &new_creds);
if (code != 0)
- goto cleanup;
+ goto cleanup;
/* Reinitialize the cache without changing its default principal. */
code = krb5_cc_get_principal(context, ccache, &default_princ);
@@ -102,7 +102,7 @@ gc_valrenew(krb5_context context, krb5_ccache ccache, krb5_creds *in_creds,
/* Store the validated or renewed cred in the now-empty cache. */
code = krb5_cc_store_cred(context, ccache, new_creds);
if (code != 0)
- goto cleanup;
+ goto cleanup;
*out_creds = new_creds;
new_creds = NULL;
@@ -135,29 +135,29 @@ krb5_get_credentials_renew(krb5_context context, krb5_flags options,
*/
static krb5_error_code
get_valrenewed_creds(krb5_context context, krb5_creds *out_creds,
- krb5_principal client, krb5_ccache ccache,
- char *in_tkt_service, int kdcopt)
+ krb5_principal client, krb5_ccache ccache,
+ char *in_tkt_service, int kdcopt)
{
krb5_error_code code;
krb5_creds in_creds, *new_creds;
krb5_principal server = NULL;
if (in_tkt_service != NULL) {
- /* Parse in_tkt_service, but use the client's realm. */
- code = krb5_parse_name(context, in_tkt_service, &server);
- if (code != 0)
- goto cleanup;
- krb5_free_data_contents(context, &server->realm);
- code = krb5int_copy_data_contents(context, &client->realm,
- &server->realm);
- if (code != 0)
- goto cleanup;
+ /* Parse in_tkt_service, but use the client's realm. */
+ code = krb5_parse_name(context, in_tkt_service, &server);
+ if (code != 0)
+ goto cleanup;
+ krb5_free_data_contents(context, &server->realm);
+ code = krb5int_copy_data_contents(context, &client->realm,
+ &server->realm);
+ if (code != 0)
+ goto cleanup;
} else {
- /* Use the TGT name for the client's realm. */
- code = krb5int_tgtname(context, &client->realm, &client->realm,
- &server);
- if (code != 0)
- goto cleanup;
+ /* Use the TGT name for the client's realm. */
+ code = krb5int_tgtname(context, &client->realm, &client->realm,
+ &server);
+ if (code != 0)
+ goto cleanup;
}
memset(&in_creds, 0, sizeof(krb5_creds));
@@ -167,7 +167,7 @@ get_valrenewed_creds(krb5_context context, krb5_creds *out_creds,
/* Get the validated or renewed credential from the KDC. */
code = get_new_creds(context, ccache, &in_creds, kdcopt, &new_creds);
if (code != 0)
- goto cleanup;
+ goto cleanup;
/* Fill in *out_creds and free the unwanted new_creds container. */
*out_creds = *new_creds;
@@ -180,18 +180,18 @@ cleanup:
krb5_error_code KRB5_CALLCONV
krb5_get_validated_creds(krb5_context context, krb5_creds *creds,
- krb5_principal client, krb5_ccache ccache,
- char *in_tkt_service)
+ krb5_principal client, krb5_ccache ccache,
+ char *in_tkt_service)
{
return get_valrenewed_creds(context, creds, client, ccache,
- in_tkt_service, KDC_OPT_VALIDATE);
+ in_tkt_service, KDC_OPT_VALIDATE);
}
krb5_error_code KRB5_CALLCONV
krb5_get_renewed_creds(krb5_context context, krb5_creds *creds,
- krb5_principal client, krb5_ccache ccache,
- char *in_tkt_service)
+ krb5_principal client, krb5_ccache ccache,
+ char *in_tkt_service)
{
return get_valrenewed_creds(context, creds, client, ccache,
- in_tkt_service, KDC_OPT_RENEW);
+ in_tkt_service, KDC_OPT_RENEW);
}
diff --git a/src/lib/krb5/os/locate_kdc.c b/src/lib/krb5/os/locate_kdc.c
index 8bcfb2678..acfce8c87 100644
--- a/src/lib/krb5/os/locate_kdc.c
+++ b/src/lib/krb5/os/locate_kdc.c
@@ -186,8 +186,8 @@ add_host_to_list(struct serverlist *list, const char *hostname, int port,
static krb5_error_code
locate_srv_conf_1(krb5_context context, const krb5_data *realm,
- const char * name, struct serverlist *serverlist,
- int socktype, int udpport, int sec_udpport)
+ const char * name, struct serverlist *serverlist,
+ int socktype, int udpport, int sec_udpport)
{
const char *realm_srv_names[4];
char **hostlist, *host, *port, *cp;
diff --git a/src/lib/krb5/os/trace.c b/src/lib/krb5/os/trace.c
index 83df52eb7..a31b0059f 100644
--- a/src/lib/krb5/os/trace.c
+++ b/src/lib/krb5/os/trace.c
@@ -8,7 +8,7 @@
* require a specific license from the United States Government.
* It is the responsibility of any person or organization contemplating
* export to obtain such a license before exporting.
- *
+ *
* WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
* distribute this software and its documentation for any purpose and
* without fee is hereby granted, provided that the above copyright