[Git][NTPsec/ntpsec][master] Chomp some of the trailing white space
Matt Selsky (@selsky)
gitlab at mg.gitlab.com
Wed Mar 12 04:08:48 UTC 2025
Matt Selsky pushed to branch master at NTPsec / ntpsec
Commits:
68f67047 by James Browning at 2025-03-12T04:05:22+00:00
Chomp some of the trailing white space
- - - - -
5 changed files:
- attic/aes-siv-timing.c
- attic/samba/fake-ntp-client.c
- attic/samba/fake-samba.c
- attic/samba/fake.h
- attic/samba/mssntp-blaster.c
Changes:
=====================================
attic/aes-siv-timing.c
=====================================
@@ -6,7 +6,7 @@
/* Last modified on Sat Aug 28 14:30:11 PDT 1999 by murray */
-/*
+/*
* Hack to time aead routines from libaes_siv
*
* RFC5297, October 2008
@@ -58,12 +58,12 @@ static void ssl_init(void)
static void nts_lock_cookielock(void) {
int err = pthread_mutex_lock(&cookie_lock);
- if (0 != err) {
+ if (0 != err) {
printf("ERR: Can't lock cookie_lock: %d\n", err);
exit(2);
- }
+ }
}
-
+
static void nts_unlock_cookielock(void) {
int err = pthread_mutex_unlock(&cookie_lock);
if (0 != err) {
@@ -211,7 +211,7 @@ static void DoMakeCookie(
default:
printf("Bogus aead\n");
exit(1);
- }
+ }
ntp_RAND_bytes(c2s, NTS_MAX_KEYLEN);
ntp_RAND_bytes(s2c, NTS_MAX_KEYLEN);
@@ -263,7 +263,7 @@ static void DoMakeCrypto(
default:
printf("Bogus aead\n");
exit(1);
- }
+ }
ntp_RAND_bytes(c2s, NTS_MAX_KEYLEN);
ntp_RAND_bytes(s2c, NTS_MAX_KEYLEN);
=====================================
attic/samba/fake-ntp-client.c
=====================================
@@ -78,7 +78,7 @@ int main (int argc, char *argv[])
(addr >> 0) & 0xff);
if ((0)) printf("Sending: len = %zu, header=%8x\n",
- sizeof(ntp_send), ntp_send.header);
+ sizeof(ntp_send), ntp_send.header);
bzero((char *)&server, sizeof(server));
bcopy((char *)target->h_addr, (char *)&server.sin_addr, target->h_length);
@@ -92,10 +92,10 @@ int main (int argc, char *argv[])
client.sin_family = AF_INET;
client.sin_addr.s_addr = htonl(INADDR_ANY);
client.sin_port = htons(0);
-
+
ec = bind(sock, (struct sockaddr *)&client, sizeof(client) );
if (ec) bailout("bind");
-
+
ec = connect(sock, (struct sockaddr *)&server, sizeof(server) );
if (ec) bailout("connect");
@@ -104,7 +104,7 @@ int main (int argc, char *argv[])
setsockopt(sock, SOL_SOCKET, SO_RCVTIMEO, (char*)&tv, sizeof(tv));
ntp_send.header = htonl(0x23000000);
- ntp_send.keyid = 56578;
+ ntp_send.keyid = 56578;
for (i = 0; i < packets; i++) {
int len;
@@ -124,6 +124,6 @@ int main (int argc, char *argv[])
usleep(delay);
}
close(sock);
-
+
return 0;
}
=====================================
attic/samba/fake-samba.c
=====================================
@@ -40,7 +40,7 @@ int main(int argc, char *argv[]) {
printf("## socket() failed: %s\n", strerror(errno));
return 1;
}
-
+
bzero(&addr, sizeof(addr));
addr.sun_family = AF_UNIX;
strncpy(addr.sun_path, name, sizeof(addr.sun_path));
=====================================
attic/samba/fake.h
=====================================
@@ -30,7 +30,7 @@ struct to_samba {
struct from_samba {
uint32_t version;
- uint32_t op;
+ uint32_t op;
uint32_t packet_id;
char pkt[LEN_PKT_NOMAC];
uint32_t key_id;
=====================================
attic/samba/mssntp-blaster.c
=====================================
@@ -84,7 +84,7 @@ int main (int argc, char *argv[])
(addr >> 0) & 0xff);
if (0) printf("Sending: len = %ld, header=%8x\n",
- sizeof(ntp_send), ntp_send.header);
+ sizeof(ntp_send), ntp_send.header);
bzero((char *)&server, sizeof(server));
bcopy((char *)target->h_addr, (char *)&server.sin_addr, target->h_length);
@@ -98,10 +98,10 @@ int main (int argc, char *argv[])
client.sin_family = AF_INET;
client.sin_addr.s_addr = htonl(INADDR_ANY);
client.sin_port = htons(0);
-
+
ec = bind(sock, (struct sockaddr *)&client, sizeof(client) );
if (ec) bailout("bind");
-
+
ec = connect(sock, (struct sockaddr *)&server, sizeof(server) );
if (ec) bailout("connect");
@@ -133,6 +133,6 @@ int main (int argc, char *argv[])
nanosleep(&delay_spec, NULL);
}
close(sock);
-
+
return 0;
}
View it on GitLab: https://gitlab.com/NTPsec/ntpsec/-/commit/68f6704708bfd987e29ee39a93f43f7ccedf91ab
--
View it on GitLab: https://gitlab.com/NTPsec/ntpsec/-/commit/68f6704708bfd987e29ee39a93f43f7ccedf91ab
You're receiving this email because of your account on gitlab.com.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ntpsec.org/pipermail/vc/attachments/20250312/c20578a1/attachment-0001.htm>
More information about the vc
mailing list