diff options
author | Daniel Stenberg <daniel@haxx.se> | 2011-04-20 15:17:42 +0200 |
---|---|---|
committer | Daniel Stenberg <daniel@haxx.se> | 2011-04-27 09:09:35 +0200 |
commit | b903186fa0189ff241d756d25d07fdfe9885ae49 (patch) | |
tree | bd942ac8753469172661b0d30153986378337fdf /lib/http_negotiate_sspi.c | |
parent | 592eda8e3feb1bf8d0f85c2baa485323b315f9d9 (diff) | |
download | curl-b903186fa0189ff241d756d25d07fdfe9885ae49.tar.gz |
source cleanup: unify look, style and indent levels
By the use of a the new lib/checksrc.pl script that checks that our
basic source style rules are followed.
Diffstat (limited to 'lib/http_negotiate_sspi.c')
-rw-r--r-- | lib/http_negotiate_sspi.c | 20 |
1 files changed, 10 insertions, 10 deletions
diff --git a/lib/http_negotiate_sspi.c b/lib/http_negotiate_sspi.c index 5843ab251..7e431965b 100644 --- a/lib/http_negotiate_sspi.c +++ b/lib/http_negotiate_sspi.c @@ -133,11 +133,11 @@ int Curl_input_negotiate(struct connectdata *conn, bool proxy, (ret = get_gss_name(conn, proxy, neg_ctx->server_name))) return ret; - if (!neg_ctx->max_token_length) { + if(!neg_ctx->max_token_length) { PSecPkgInfo SecurityPackage; ret = s_pSecFn->QuerySecurityPackageInfo((SEC_CHAR *)"Negotiate", &SecurityPackage); - if (ret != SEC_E_OK) + if(ret != SEC_E_OK) return -1; /* Allocate input and output buffers according to the max token size @@ -164,14 +164,14 @@ int Curl_input_negotiate(struct connectdata *conn, bool proxy, return -1; } - if ( !input_token ) { - /* first call in a new negotiation, we have to require credentials, + if(!input_token) { + /* first call in a new negotation, we have to require credentials, and allocate memory for the context */ neg_ctx->credentials = (CredHandle *)malloc(sizeof(CredHandle)); neg_ctx->context = (CtxtHandle *)malloc(sizeof(CtxtHandle)); - if ( !neg_ctx->credentials || !neg_ctx->context) + if( !neg_ctx->credentials || !neg_ctx->context) return -1; neg_ctx->status = @@ -179,7 +179,7 @@ int Curl_input_negotiate(struct connectdata *conn, bool proxy, SECPKG_CRED_OUTBOUND, NULL, NULL, NULL, NULL, neg_ctx->credentials, &lifetime); - if ( neg_ctx->status != SEC_E_OK ) + if( neg_ctx->status != SEC_E_OK ) return -1; } @@ -193,7 +193,7 @@ int Curl_input_negotiate(struct connectdata *conn, bool proxy, out_sec_buff.pvBuffer = neg_ctx->output_token; - if (input_token) { + if(input_token) { in_buff_desc.ulVersion = 0; in_buff_desc.cBuffers = 1; in_buff_desc.pBuffers = &out_sec_buff; @@ -217,14 +217,14 @@ int Curl_input_negotiate(struct connectdata *conn, bool proxy, &context_attributes, &lifetime); - if ( GSS_ERROR(neg_ctx->status) ) + if( GSS_ERROR(neg_ctx->status) ) return -1; - if ( neg_ctx->status == SEC_I_COMPLETE_NEEDED || + if( neg_ctx->status == SEC_I_COMPLETE_NEEDED || neg_ctx->status == SEC_I_COMPLETE_AND_CONTINUE ) { neg_ctx->status = s_pSecFn->CompleteAuthToken(neg_ctx->context, &out_buff_desc); - if ( GSS_ERROR(neg_ctx->status) ) + if( GSS_ERROR(neg_ctx->status) ) return -1; } |