spacing
authorreyk <reyk@openbsd.org>
Mon, 28 Apr 2014 11:19:22 +0000 (11:19 +0000)
committerreyk <reyk@openbsd.org>
Mon, 28 Apr 2014 11:19:22 +0000 (11:19 +0000)
sbin/iked/ikev2.c
sbin/iked/ikev2_pld.c
sbin/iked/ocsp.c

index ffcbce7..2cf82ec 100644 (file)
@@ -1,4 +1,4 @@
-/*     $OpenBSD: ikev2.c,v 1.100 2014/04/10 16:08:02 reyk Exp $        */
+/*     $OpenBSD: ikev2.c,v 1.101 2014/04/28 11:21:02 reyk Exp $        */
 
 /*
  * Copyright (c) 2010-2013 Reyk Floeter <reyk@openbsd.org>
@@ -284,7 +284,7 @@ ikev2_dispatch_cert(int fd, struct privsep_proc *p, struct imsg *imsg)
                            __func__);
                        break;
                }
-               
+
                sa_stateflags(sa, IKED_REQ_CERT);
 
                if (ikev2_ike_auth(env, sa, NULL) != 0)
index a271163..451f57c 100644 (file)
@@ -1,4 +1,4 @@
-/*     $OpenBSD: ikev2_pld.c,v 1.39 2014/04/10 16:08:02 reyk Exp $     */
+/*     $OpenBSD: ikev2_pld.c,v 1.40 2014/04/28 11:21:02 reyk Exp $     */
 
 /*
  * Copyright (c) 2010-2013 Reyk Floeter <reyk@openbsd.org>
@@ -484,7 +484,7 @@ ikev2_validate_xform(struct iked_message *msg, size_t offset, size_t total,
        }
        if (total < xfrm_length) {
                log_debug("%s: malformed payload: too long for payload size "
-                  "(%zu < %zu)", __func__, total, xfrm_length);
+                   "(%zu < %zu)", __func__, total, xfrm_length);
                return (-1);
        }
 
@@ -1371,7 +1371,7 @@ ikev2_pld_delete(struct iked *env, struct ikev2_payload *pld,
        if (!ikev2_msg_frompeer(msg))
                goto done;
 
-       if (msg->msg_parent->msg_response) {
+       if (msg->msg_parent->msg_response) {
                ret = 0;
                goto done;
        }
index 80ce1b6..fb60ba3 100644 (file)
@@ -155,7 +155,7 @@ ocsp_connect_cb(int fd, short event, void *arg)
 {
        struct ocsp_connect     *oc = arg;
        int                      error, send_fd = -1;
-       socklen_t                len;
+       socklen_t                len;
 
        len = sizeof(error);
        if (getsockopt(fd, SOL_SOCKET, SO_ERROR, &error, &len) < 0) {
@@ -207,8 +207,8 @@ int
 ocsp_validate_cert(struct iked *env, struct iked_static_id *id,
     void *data, size_t len, struct iked_sahdr sh, u_int8_t type)
 {
-       struct iked_ocsp_entry  *ioe;
-       struct iked_ocsp        *ocsp;
+       struct iked_ocsp_entry  *ioe;
+       struct iked_ocsp        *ocsp;
        BIO                     *rawcert = NULL, *bissuer = NULL;
        X509                    *cert = NULL, *issuer = NULL;