[Git][NTPsec/ntpsec][master] Chomp some of the trailing white space

Matt Selsky (@selsky) gitlab at mg.gitlab.com
Wed Mar 12 04:08:48 UTC 2025



Matt Selsky pushed to branch master at NTPsec / ntpsec


Commits:
68f67047 by James Browning at 2025-03-12T04:05:22+00:00
Chomp some of the trailing white space

- - - - -


5 changed files:

- attic/aes-siv-timing.c
- attic/samba/fake-ntp-client.c
- attic/samba/fake-samba.c
- attic/samba/fake.h
- attic/samba/mssntp-blaster.c


Changes:

=====================================
attic/aes-siv-timing.c
=====================================
@@ -6,7 +6,7 @@
 
 /* Last modified on Sat Aug 28 14:30:11 PDT 1999 by murray */
 
-/* 
+/*
  * Hack to time aead routines from libaes_siv
  *
  * RFC5297, October 2008
@@ -58,12 +58,12 @@ static void ssl_init(void)
 
 static void nts_lock_cookielock(void) {
         int err = pthread_mutex_lock(&cookie_lock);
-        if (0 != err) {      
+        if (0 != err) {
                 printf("ERR: Can't lock cookie_lock: %d\n", err);
                 exit(2);
-        }                    
+        }
 }
-        
+
 static void nts_unlock_cookielock(void) {
         int err = pthread_mutex_unlock(&cookie_lock);
         if (0 != err) {
@@ -211,7 +211,7 @@ static void DoMakeCookie(
 	  default:
 		printf("Bogus aead\n");
 		exit(1);
-	} 
+	}
 
         ntp_RAND_bytes(c2s, NTS_MAX_KEYLEN);
         ntp_RAND_bytes(s2c, NTS_MAX_KEYLEN);
@@ -263,7 +263,7 @@ static void DoMakeCrypto(
 	  default:
 		printf("Bogus aead\n");
 		exit(1);
-	} 
+	}
 
         ntp_RAND_bytes(c2s, NTS_MAX_KEYLEN);
         ntp_RAND_bytes(s2c, NTS_MAX_KEYLEN);


=====================================
attic/samba/fake-ntp-client.c
=====================================
@@ -78,7 +78,7 @@ int main (int argc, char *argv[])
     (addr >> 0) & 0xff);
 
   if ((0)) printf("Sending: len = %zu, header=%8x\n",
-    sizeof(ntp_send), ntp_send.header); 
+    sizeof(ntp_send), ntp_send.header);
 
   bzero((char *)&server, sizeof(server));
   bcopy((char *)target->h_addr, (char *)&server.sin_addr, target->h_length);
@@ -92,10 +92,10 @@ int main (int argc, char *argv[])
   client.sin_family = AF_INET;
   client.sin_addr.s_addr = htonl(INADDR_ANY);
   client.sin_port = htons(0);
-  
+
   ec = bind(sock, (struct sockaddr *)&client, sizeof(client) );
   if (ec) bailout("bind");
-  
+
   ec = connect(sock, (struct sockaddr *)&server, sizeof(server) );
   if (ec) bailout("connect");
 
@@ -104,7 +104,7 @@ int main (int argc, char *argv[])
   setsockopt(sock, SOL_SOCKET, SO_RCVTIMEO, (char*)&tv, sizeof(tv));
 
   ntp_send.header = htonl(0x23000000);
-  ntp_send.keyid = 56578;  
+  ntp_send.keyid = 56578;
 
   for (i = 0; i < packets; i++) {
     int len;
@@ -124,6 +124,6 @@ int main (int argc, char *argv[])
     usleep(delay);
   }
   close(sock);
-  
+
   return 0;
 }


=====================================
attic/samba/fake-samba.c
=====================================
@@ -40,7 +40,7 @@ int main(int argc, char *argv[]) {
 	  printf("## socket() failed: %s\n", strerror(errno));
 	  return 1;
 	}
-	
+
 	bzero(&addr, sizeof(addr));
 	addr.sun_family = AF_UNIX;
 	strncpy(addr.sun_path, name, sizeof(addr.sun_path));


=====================================
attic/samba/fake.h
=====================================
@@ -30,7 +30,7 @@ struct to_samba {
 
 struct from_samba {
   uint32_t version;
-  uint32_t op; 
+  uint32_t op;
   uint32_t packet_id;
   char pkt[LEN_PKT_NOMAC];
   uint32_t key_id;


=====================================
attic/samba/mssntp-blaster.c
=====================================
@@ -84,7 +84,7 @@ int main (int argc, char *argv[])
     (addr >> 0) & 0xff);
 
   if (0) printf("Sending: len = %ld, header=%8x\n",
-    sizeof(ntp_send), ntp_send.header); 
+    sizeof(ntp_send), ntp_send.header);
 
   bzero((char *)&server, sizeof(server));
   bcopy((char *)target->h_addr, (char *)&server.sin_addr, target->h_length);
@@ -98,10 +98,10 @@ int main (int argc, char *argv[])
   client.sin_family = AF_INET;
   client.sin_addr.s_addr = htonl(INADDR_ANY);
   client.sin_port = htons(0);
-  
+
   ec = bind(sock, (struct sockaddr *)&client, sizeof(client) );
   if (ec) bailout("bind");
-  
+
   ec = connect(sock, (struct sockaddr *)&server, sizeof(server) );
   if (ec) bailout("connect");
 
@@ -133,6 +133,6 @@ int main (int argc, char *argv[])
     nanosleep(&delay_spec, NULL);
   }
   close(sock);
-  
+
   return 0;
 }



View it on GitLab: https://gitlab.com/NTPsec/ntpsec/-/commit/68f6704708bfd987e29ee39a93f43f7ccedf91ab

-- 
View it on GitLab: https://gitlab.com/NTPsec/ntpsec/-/commit/68f6704708bfd987e29ee39a93f43f7ccedf91ab
You're receiving this email because of your account on gitlab.com.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ntpsec.org/pipermail/vc/attachments/20250312/c20578a1/attachment-0001.htm>


More information about the vc mailing list