diff options
author | tb <> | 2022-06-08 20:07:31 +0000 |
---|---|---|
committer | tb <> | 2022-06-08 20:07:31 +0000 |
commit | 30390cf6a56b6f7204c346b80f10bb9353672c49 (patch) | |
tree | bcbdf296be970fc54ce312b5661076fd42893e07 /src/usr.bin/nc/netcat.c | |
parent | d8f16653f5405f7b85a6e2574638fc1ce7990ad8 (diff) | |
download | openbsd-30390cf6a56b6f7204c346b80f10bb9353672c49.tar.gz openbsd-30390cf6a56b6f7204c346b80f10bb9353672c49.tar.bz2 openbsd-30390cf6a56b6f7204c346b80f10bb9353672c49.zip |
KNF, mostly whitespace - no binary change on amd64
Diffstat (limited to 'src/usr.bin/nc/netcat.c')
-rw-r--r-- | src/usr.bin/nc/netcat.c | 41 |
1 files changed, 19 insertions, 22 deletions
diff --git a/src/usr.bin/nc/netcat.c b/src/usr.bin/nc/netcat.c index 811551f57d..4a26db6aec 100644 --- a/src/usr.bin/nc/netcat.c +++ b/src/usr.bin/nc/netcat.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: netcat.c,v 1.218 2021/07/12 15:09:20 beck Exp $ */ | 1 | /* $OpenBSD: netcat.c,v 1.219 2022/06/08 20:07:31 tb Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2001 Eric Jackson <ericj@monkey.org> | 3 | * Copyright (c) 2001 Eric Jackson <ericj@monkey.org> |
4 | * Copyright (c) 2015 Bob Beck. All rights reserved. | 4 | * Copyright (c) 2015 Bob Beck. All rights reserved. |
@@ -668,7 +668,6 @@ main(int argc, char *argv[]) | |||
668 | if (uflag) | 668 | if (uflag) |
669 | unlink(unix_dg_tmp_socket); | 669 | unlink(unix_dg_tmp_socket); |
670 | return ret; | 670 | return ret; |
671 | |||
672 | } else { | 671 | } else { |
673 | int i = 0; | 672 | int i = 0; |
674 | 673 | ||
@@ -725,8 +724,8 @@ main(int argc, char *argv[]) | |||
725 | * if we aren't connecting thru a proxy and | 724 | * if we aren't connecting thru a proxy and |
726 | * there is something to report, print IP | 725 | * there is something to report, print IP |
727 | */ | 726 | */ |
728 | if (!nflag && !xflag | 727 | if (!nflag && !xflag && |
729 | && (strcmp(host, ipaddr) != 0)) | 728 | strcmp(host, ipaddr) != 0) |
730 | fprintf(stderr, " (%s)", ipaddr); | 729 | fprintf(stderr, " (%s)", ipaddr); |
731 | 730 | ||
732 | fprintf(stderr, " %s port [%s/%s] succeeded!\n", | 731 | fprintf(stderr, " %s port [%s/%s] succeeded!\n", |
@@ -824,7 +823,7 @@ tls_setup_client(struct tls *tls_ctx, int s, char *host) | |||
824 | const char *errstr; | 823 | const char *errstr; |
825 | 824 | ||
826 | if (tls_connect_socket(tls_ctx, s, | 825 | if (tls_connect_socket(tls_ctx, s, |
827 | tls_expectname ? tls_expectname : host) == -1) { | 826 | tls_expectname ? tls_expectname : host) == -1) { |
828 | errx(1, "tls connection failed (%s)", | 827 | errx(1, "tls connection failed (%s)", |
829 | tls_error(tls_ctx)); | 828 | tls_error(tls_ctx)); |
830 | } | 829 | } |
@@ -913,7 +912,6 @@ unix_connect(char *path) | |||
913 | return -1; | 912 | return -1; |
914 | } | 913 | } |
915 | return s; | 914 | return s; |
916 | |||
917 | } | 915 | } |
918 | 916 | ||
919 | /* | 917 | /* |
@@ -1449,7 +1447,6 @@ atelnet(int nfd, unsigned char *buf, unsigned int size) | |||
1449 | } | 1447 | } |
1450 | } | 1448 | } |
1451 | 1449 | ||
1452 | |||
1453 | int | 1450 | int |
1454 | strtoport(char *portstr, int udp) | 1451 | strtoport(char *portstr, int udp) |
1455 | { | 1452 | { |
@@ -1550,12 +1547,12 @@ set_common_sockopts(int s, int af) | |||
1550 | 1547 | ||
1551 | if (Sflag) { | 1548 | if (Sflag) { |
1552 | if (setsockopt(s, IPPROTO_TCP, TCP_MD5SIG, | 1549 | if (setsockopt(s, IPPROTO_TCP, TCP_MD5SIG, |
1553 | &x, sizeof(x)) == -1) | 1550 | &x, sizeof(x)) == -1) |
1554 | err(1, NULL); | 1551 | err(1, NULL); |
1555 | } | 1552 | } |
1556 | if (Dflag) { | 1553 | if (Dflag) { |
1557 | if (setsockopt(s, SOL_SOCKET, SO_DEBUG, | 1554 | if (setsockopt(s, SOL_SOCKET, SO_DEBUG, |
1558 | &x, sizeof(x)) == -1) | 1555 | &x, sizeof(x)) == -1) |
1559 | err(1, NULL); | 1556 | err(1, NULL); |
1560 | } | 1557 | } |
1561 | if (Tflag != -1) { | 1558 | if (Tflag != -1) { |
@@ -1704,7 +1701,7 @@ save_peer_cert(struct tls *tls_ctx, FILE *fp) | |||
1704 | } | 1701 | } |
1705 | 1702 | ||
1706 | void | 1703 | void |
1707 | report_tls(struct tls * tls_ctx, char * host) | 1704 | report_tls(struct tls *tls_ctx, char *host) |
1708 | { | 1705 | { |
1709 | time_t t; | 1706 | time_t t; |
1710 | const char *ocsp_url; | 1707 | const char *ocsp_url; |
@@ -1732,7 +1729,7 @@ report_tls(struct tls * tls_ctx, char * host) | |||
1732 | switch (tls_peer_ocsp_response_status(tls_ctx)) { | 1729 | switch (tls_peer_ocsp_response_status(tls_ctx)) { |
1733 | case TLS_OCSP_RESPONSE_SUCCESSFUL: | 1730 | case TLS_OCSP_RESPONSE_SUCCESSFUL: |
1734 | fprintf(stderr, "OCSP Stapling: %s\n", | 1731 | fprintf(stderr, "OCSP Stapling: %s\n", |
1735 | tls_peer_ocsp_result(tls_ctx) == NULL ? "" : | 1732 | tls_peer_ocsp_result(tls_ctx) == NULL ? "" : |
1736 | tls_peer_ocsp_result(tls_ctx)); | 1733 | tls_peer_ocsp_result(tls_ctx)); |
1737 | fprintf(stderr, | 1734 | fprintf(stderr, |
1738 | " response_status=%d cert_status=%d crl_reason=%d\n", | 1735 | " response_status=%d cert_status=%d crl_reason=%d\n", |
@@ -1742,22 +1739,22 @@ report_tls(struct tls * tls_ctx, char * host) | |||
1742 | t = tls_peer_ocsp_this_update(tls_ctx); | 1739 | t = tls_peer_ocsp_this_update(tls_ctx); |
1743 | fprintf(stderr, " this update: %s", | 1740 | fprintf(stderr, " this update: %s", |
1744 | t != -1 ? ctime(&t) : "\n"); | 1741 | t != -1 ? ctime(&t) : "\n"); |
1745 | t = tls_peer_ocsp_next_update(tls_ctx); | 1742 | t = tls_peer_ocsp_next_update(tls_ctx); |
1746 | fprintf(stderr, " next update: %s", | 1743 | fprintf(stderr, " next update: %s", |
1747 | t != -1 ? ctime(&t) : "\n"); | 1744 | t != -1 ? ctime(&t) : "\n"); |
1748 | t = tls_peer_ocsp_revocation_time(tls_ctx); | 1745 | t = tls_peer_ocsp_revocation_time(tls_ctx); |
1749 | fprintf(stderr, " revocation: %s", | 1746 | fprintf(stderr, " revocation: %s", |
1750 | t != -1 ? ctime(&t) : "\n"); | 1747 | t != -1 ? ctime(&t) : "\n"); |
1751 | break; | 1748 | break; |
1752 | case -1: | 1749 | case -1: |
1753 | break; | 1750 | break; |
1754 | default: | 1751 | default: |
1755 | fprintf(stderr, "OCSP Stapling: failure - response_status %d (%s)\n", | 1752 | fprintf(stderr, |
1753 | "OCSP Stapling: failure - response_status %d (%s)\n", | ||
1756 | tls_peer_ocsp_response_status(tls_ctx), | 1754 | tls_peer_ocsp_response_status(tls_ctx), |
1757 | tls_peer_ocsp_result(tls_ctx) == NULL ? "" : | 1755 | tls_peer_ocsp_result(tls_ctx) == NULL ? "" : |
1758 | tls_peer_ocsp_result(tls_ctx)); | 1756 | tls_peer_ocsp_result(tls_ctx)); |
1759 | break; | 1757 | break; |
1760 | |||
1761 | } | 1758 | } |
1762 | } | 1759 | } |
1763 | 1760 | ||
@@ -1780,12 +1777,12 @@ report_sock(const char *msg, const struct sockaddr *sa, socklen_t salen, | |||
1780 | herr = getnameinfo(sa, salen, host, sizeof(host), port, sizeof(port), | 1777 | herr = getnameinfo(sa, salen, host, sizeof(host), port, sizeof(port), |
1781 | flags); | 1778 | flags); |
1782 | switch (herr) { | 1779 | switch (herr) { |
1783 | case 0: | 1780 | case 0: |
1784 | break; | 1781 | break; |
1785 | case EAI_SYSTEM: | 1782 | case EAI_SYSTEM: |
1786 | err(1, "getnameinfo"); | 1783 | err(1, "getnameinfo"); |
1787 | default: | 1784 | default: |
1788 | errx(1, "getnameinfo: %s", gai_strerror(herr)); | 1785 | errx(1, "getnameinfo: %s", gai_strerror(herr)); |
1789 | } | 1786 | } |
1790 | 1787 | ||
1791 | fprintf(stderr, "%s on %s %s\n", msg, host, port); | 1788 | fprintf(stderr, "%s on %s %s\n", msg, host, port); |