indent changes and removed libssh2_ prefix from static function

This commit is contained in:
Daniel Stenberg
2009-03-28 21:22:16 +00:00
parent 8f78a935ca
commit 55744f8f34

View File

@@ -572,11 +572,11 @@ file_read_publickey(LIBSSH2_SESSION * session, unsigned char **method,
* Read a PEM encoded private key from an id_??? style file
*/
static int
libssh2_file_read_privatekey(LIBSSH2_SESSION * session,
const LIBSSH2_HOSTKEY_METHOD ** hostkey_method,
void **hostkey_abstract,
const unsigned char *method, int method_len,
const char *privkeyfile, const char *passphrase)
file_read_privatekey(LIBSSH2_SESSION * session,
const LIBSSH2_HOSTKEY_METHOD ** hostkey_method,
void **hostkey_abstract,
const unsigned char *method, int method_len,
const char *privkeyfile, const char *passphrase)
{
const LIBSSH2_HOSTKEY_METHOD **hostkey_methods_avail =
libssh2_hostkey_methods();
@@ -692,7 +692,7 @@ userauth_hostbased_fromfile(LIBSSH2_SESSION *session,
session->userauth_host_s += 9;
_libssh2_htonu32(session->userauth_host_s,
session->userauth_host_method_len);
session->userauth_host_method_len);
session->userauth_host_s += 4;
memcpy(session->userauth_host_s, session->userauth_host_method,
session->userauth_host_method_len);
@@ -713,9 +713,10 @@ userauth_hostbased_fromfile(LIBSSH2_SESSION *session,
memcpy(session->userauth_host_s, local_username, local_username_len);
session->userauth_host_s += local_username_len;
if (libssh2_file_read_privatekey
(session, &privkeyobj, &abstract, session->userauth_host_method,
session->userauth_host_method_len, privatekey, passphrase)) {
if (file_read_privatekey(session, &privkeyobj, &abstract,
session->userauth_host_method,
session->userauth_host_method_len,
privatekey, passphrase)) {
LIBSSH2_FREE(session, session->userauth_host_method);
session->userauth_host_method = NULL;
LIBSSH2_FREE(session, session->userauth_host_packet);
@@ -772,11 +773,11 @@ userauth_hostbased_fromfile(LIBSSH2_SESSION *session,
session->userauth_host_packet + session->userauth_host_packet_len;
_libssh2_htonu32(session->userauth_host_s,
4 + session->userauth_host_method_len + 4 + sig_len);
4 + session->userauth_host_method_len + 4 + sig_len);
session->userauth_host_s += 4;
_libssh2_htonu32(session->userauth_host_s,
session->userauth_host_method_len);
session->userauth_host_method_len);
session->userauth_host_s += 4;
memcpy(session->userauth_host_s, session->userauth_host_method,
session->userauth_host_method_len);
@@ -798,8 +799,8 @@ userauth_hostbased_fromfile(LIBSSH2_SESSION *session,
if (session->userauth_host_state == libssh2_NB_state_created) {
rc = _libssh2_transport_write(session, session->userauth_host_packet,
session->userauth_host_s -
session->userauth_host_packet);
session->userauth_host_s -
session->userauth_host_packet);
if (rc == PACKET_EAGAIN) {
return PACKET_EAGAIN;
} else if (rc) {
@@ -825,11 +826,12 @@ userauth_hostbased_fromfile(LIBSSH2_SESSION *session,
userauth_host_packet_requirev_state);
if (rc == PACKET_EAGAIN) {
return PACKET_EAGAIN;
} else if (rc) {
session->userauth_host_state = libssh2_NB_state_idle;
return -1;
}
session->userauth_host_state = libssh2_NB_state_idle;
if (rc)
return -1;
if (session->userauth_host_data[0] == SSH_MSG_USERAUTH_SUCCESS) {
_libssh2_debug(session, LIBSSH2_DBG_AUTH,
"Hostbased authentication successful");
@@ -837,7 +839,6 @@ userauth_hostbased_fromfile(LIBSSH2_SESSION *session,
LIBSSH2_FREE(session, session->userauth_host_data);
session->userauth_host_data = NULL;
session->state |= LIBSSH2_STATE_AUTHENTICATED;
session->userauth_host_state = libssh2_NB_state_idle;
return 0;
}
}
@@ -849,7 +850,6 @@ userauth_hostbased_fromfile(LIBSSH2_SESSION *session,
"Invalid signature for supplied public key, or bad "
"username/public key combination",
0);
session->userauth_host_state = libssh2_NB_state_idle;
return -1;
}
@@ -1057,9 +1057,10 @@ userauth_publickey_fromfile(LIBSSH2_SESSION *session,
LIBSSH2_FREE(session, session->userauth_pblc_data);
session->userauth_pblc_data = NULL;
if (libssh2_file_read_privatekey
(session, &privkeyobj, &abstract, session->userauth_pblc_method,
session->userauth_pblc_method_len, privatekey, passphrase)) {
if (file_read_privatekey(session, &privkeyobj, &abstract,
session->userauth_pblc_method,
session->userauth_pblc_method_len,
privatekey, passphrase)) {
LIBSSH2_FREE(session, session->userauth_pblc_method);
session->userauth_pblc_method = NULL;
LIBSSH2_FREE(session, session->userauth_pblc_packet);
@@ -1127,11 +1128,11 @@ userauth_publickey_fromfile(LIBSSH2_SESSION *session,
session->userauth_pblc_b = NULL;
_libssh2_htonu32(session->userauth_pblc_s,
4 + session->userauth_pblc_method_len + 4 + sig_len);
4 + session->userauth_pblc_method_len + 4 + sig_len);
session->userauth_pblc_s += 4;
_libssh2_htonu32(session->userauth_pblc_s,
session->userauth_pblc_method_len);
session->userauth_pblc_method_len);
session->userauth_pblc_s += 4;
memcpy(session->userauth_pblc_s, session->userauth_pblc_method,
session->userauth_pblc_method_len);
@@ -1153,8 +1154,8 @@ userauth_publickey_fromfile(LIBSSH2_SESSION *session,
if (session->userauth_pblc_state == libssh2_NB_state_sent1) {
rc = _libssh2_transport_write(session, session->userauth_pblc_packet,
session->userauth_pblc_s -
session->userauth_pblc_packet);
session->userauth_pblc_s -
session->userauth_pblc_packet);
if (rc == PACKET_EAGAIN) {
return PACKET_EAGAIN;
} else if (rc) {