summaryrefslogtreecommitdiff
path: root/src/usr.bin/nc/netcat.c
diff options
context:
space:
mode:
authortb <>2022-06-08 20:07:31 +0000
committertb <>2022-06-08 20:07:31 +0000
commit30390cf6a56b6f7204c346b80f10bb9353672c49 (patch)
treebcbdf296be970fc54ce312b5661076fd42893e07 /src/usr.bin/nc/netcat.c
parentd8f16653f5405f7b85a6e2574638fc1ce7990ad8 (diff)
downloadopenbsd-30390cf6a56b6f7204c346b80f10bb9353672c49.tar.gz
openbsd-30390cf6a56b6f7204c346b80f10bb9353672c49.tar.bz2
openbsd-30390cf6a56b6f7204c346b80f10bb9353672c49.zip
KNF, mostly whitespace - no binary change on amd64
Diffstat (limited to 'src/usr.bin/nc/netcat.c')
-rw-r--r--src/usr.bin/nc/netcat.c41
1 files changed, 19 insertions, 22 deletions
diff --git a/src/usr.bin/nc/netcat.c b/src/usr.bin/nc/netcat.c
index 811551f57d..4a26db6aec 100644
--- a/src/usr.bin/nc/netcat.c
+++ b/src/usr.bin/nc/netcat.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: netcat.c,v 1.218 2021/07/12 15:09:20 beck Exp $ */ 1/* $OpenBSD: netcat.c,v 1.219 2022/06/08 20:07:31 tb Exp $ */
2/* 2/*
3 * Copyright (c) 2001 Eric Jackson <ericj@monkey.org> 3 * Copyright (c) 2001 Eric Jackson <ericj@monkey.org>
4 * Copyright (c) 2015 Bob Beck. All rights reserved. 4 * Copyright (c) 2015 Bob Beck. All rights reserved.
@@ -668,7 +668,6 @@ main(int argc, char *argv[])
668 if (uflag) 668 if (uflag)
669 unlink(unix_dg_tmp_socket); 669 unlink(unix_dg_tmp_socket);
670 return ret; 670 return ret;
671
672 } else { 671 } else {
673 int i = 0; 672 int i = 0;
674 673
@@ -725,8 +724,8 @@ main(int argc, char *argv[])
725 * if we aren't connecting thru a proxy and 724 * if we aren't connecting thru a proxy and
726 * there is something to report, print IP 725 * there is something to report, print IP
727 */ 726 */
728 if (!nflag && !xflag 727 if (!nflag && !xflag &&
729 && (strcmp(host, ipaddr) != 0)) 728 strcmp(host, ipaddr) != 0)
730 fprintf(stderr, " (%s)", ipaddr); 729 fprintf(stderr, " (%s)", ipaddr);
731 730
732 fprintf(stderr, " %s port [%s/%s] succeeded!\n", 731 fprintf(stderr, " %s port [%s/%s] succeeded!\n",
@@ -824,7 +823,7 @@ tls_setup_client(struct tls *tls_ctx, int s, char *host)
824 const char *errstr; 823 const char *errstr;
825 824
826 if (tls_connect_socket(tls_ctx, s, 825 if (tls_connect_socket(tls_ctx, s,
827 tls_expectname ? tls_expectname : host) == -1) { 826 tls_expectname ? tls_expectname : host) == -1) {
828 errx(1, "tls connection failed (%s)", 827 errx(1, "tls connection failed (%s)",
829 tls_error(tls_ctx)); 828 tls_error(tls_ctx));
830 } 829 }
@@ -913,7 +912,6 @@ unix_connect(char *path)
913 return -1; 912 return -1;
914 } 913 }
915 return s; 914 return s;
916
917} 915}
918 916
919/* 917/*
@@ -1449,7 +1447,6 @@ atelnet(int nfd, unsigned char *buf, unsigned int size)
1449 } 1447 }
1450} 1448}
1451 1449
1452
1453int 1450int
1454strtoport(char *portstr, int udp) 1451strtoport(char *portstr, int udp)
1455{ 1452{
@@ -1550,12 +1547,12 @@ set_common_sockopts(int s, int af)
1550 1547
1551 if (Sflag) { 1548 if (Sflag) {
1552 if (setsockopt(s, IPPROTO_TCP, TCP_MD5SIG, 1549 if (setsockopt(s, IPPROTO_TCP, TCP_MD5SIG,
1553 &x, sizeof(x)) == -1) 1550 &x, sizeof(x)) == -1)
1554 err(1, NULL); 1551 err(1, NULL);
1555 } 1552 }
1556 if (Dflag) { 1553 if (Dflag) {
1557 if (setsockopt(s, SOL_SOCKET, SO_DEBUG, 1554 if (setsockopt(s, SOL_SOCKET, SO_DEBUG,
1558 &x, sizeof(x)) == -1) 1555 &x, sizeof(x)) == -1)
1559 err(1, NULL); 1556 err(1, NULL);
1560 } 1557 }
1561 if (Tflag != -1) { 1558 if (Tflag != -1) {
@@ -1704,7 +1701,7 @@ save_peer_cert(struct tls *tls_ctx, FILE *fp)
1704} 1701}
1705 1702
1706void 1703void
1707report_tls(struct tls * tls_ctx, char * host) 1704report_tls(struct tls *tls_ctx, char *host)
1708{ 1705{
1709 time_t t; 1706 time_t t;
1710 const char *ocsp_url; 1707 const char *ocsp_url;
@@ -1732,7 +1729,7 @@ report_tls(struct tls * tls_ctx, char * host)
1732 switch (tls_peer_ocsp_response_status(tls_ctx)) { 1729 switch (tls_peer_ocsp_response_status(tls_ctx)) {
1733 case TLS_OCSP_RESPONSE_SUCCESSFUL: 1730 case TLS_OCSP_RESPONSE_SUCCESSFUL:
1734 fprintf(stderr, "OCSP Stapling: %s\n", 1731 fprintf(stderr, "OCSP Stapling: %s\n",
1735 tls_peer_ocsp_result(tls_ctx) == NULL ? "" : 1732 tls_peer_ocsp_result(tls_ctx) == NULL ? "" :
1736 tls_peer_ocsp_result(tls_ctx)); 1733 tls_peer_ocsp_result(tls_ctx));
1737 fprintf(stderr, 1734 fprintf(stderr,
1738 " response_status=%d cert_status=%d crl_reason=%d\n", 1735 " response_status=%d cert_status=%d crl_reason=%d\n",
@@ -1742,22 +1739,22 @@ report_tls(struct tls * tls_ctx, char * host)
1742 t = tls_peer_ocsp_this_update(tls_ctx); 1739 t = tls_peer_ocsp_this_update(tls_ctx);
1743 fprintf(stderr, " this update: %s", 1740 fprintf(stderr, " this update: %s",
1744 t != -1 ? ctime(&t) : "\n"); 1741 t != -1 ? ctime(&t) : "\n");
1745 t = tls_peer_ocsp_next_update(tls_ctx); 1742 t = tls_peer_ocsp_next_update(tls_ctx);
1746 fprintf(stderr, " next update: %s", 1743 fprintf(stderr, " next update: %s",
1747 t != -1 ? ctime(&t) : "\n"); 1744 t != -1 ? ctime(&t) : "\n");
1748 t = tls_peer_ocsp_revocation_time(tls_ctx); 1745 t = tls_peer_ocsp_revocation_time(tls_ctx);
1749 fprintf(stderr, " revocation: %s", 1746 fprintf(stderr, " revocation: %s",
1750 t != -1 ? ctime(&t) : "\n"); 1747 t != -1 ? ctime(&t) : "\n");
1751 break; 1748 break;
1752 case -1: 1749 case -1:
1753 break; 1750 break;
1754 default: 1751 default:
1755 fprintf(stderr, "OCSP Stapling: failure - response_status %d (%s)\n", 1752 fprintf(stderr,
1753 "OCSP Stapling: failure - response_status %d (%s)\n",
1756 tls_peer_ocsp_response_status(tls_ctx), 1754 tls_peer_ocsp_response_status(tls_ctx),
1757 tls_peer_ocsp_result(tls_ctx) == NULL ? "" : 1755 tls_peer_ocsp_result(tls_ctx) == NULL ? "" :
1758 tls_peer_ocsp_result(tls_ctx)); 1756 tls_peer_ocsp_result(tls_ctx));
1759 break; 1757 break;
1760
1761 } 1758 }
1762} 1759}
1763 1760
@@ -1780,12 +1777,12 @@ report_sock(const char *msg, const struct sockaddr *sa, socklen_t salen,
1780 herr = getnameinfo(sa, salen, host, sizeof(host), port, sizeof(port), 1777 herr = getnameinfo(sa, salen, host, sizeof(host), port, sizeof(port),
1781 flags); 1778 flags);
1782 switch (herr) { 1779 switch (herr) {
1783 case 0: 1780 case 0:
1784 break; 1781 break;
1785 case EAI_SYSTEM: 1782 case EAI_SYSTEM:
1786 err(1, "getnameinfo"); 1783 err(1, "getnameinfo");
1787 default: 1784 default:
1788 errx(1, "getnameinfo: %s", gai_strerror(herr)); 1785 errx(1, "getnameinfo: %s", gai_strerror(herr));
1789 } 1786 }
1790 1787
1791 fprintf(stderr, "%s on %s %s\n", msg, host, port); 1788 fprintf(stderr, "%s on %s %s\n", msg, host, port);