server session MAINTENANCE formatting and minor problems
diff --git a/src/session_server_ssh.c b/src/session_server_ssh.c
index f22fc8d..2c19210 100644
--- a/src/session_server_ssh.c
+++ b/src/session_server_ssh.c
@@ -150,7 +150,7 @@
     server_opts.interactive_auth_data = user_data;
     server_opts.interactive_auth_data_free = free_user_data;
 }
- 
+
 API void
 nc_server_ssh_set_pubkey_auth_clb(int (*pubkey_auth_clb)(const struct nc_session *session, ssh_key key, void *user_data),
                                   void *user_data, void (*free_user_data)(void *user_data))
@@ -848,7 +848,7 @@
     char *pass_hash;
 
     if (server_opts.interactive_auth_clb) {
-        auth_ret = server_opts.interactive_auth_clb(session, msg, server_opts.interactive_auth_data);  
+        auth_ret = server_opts.interactive_auth_clb(session, msg, server_opts.interactive_auth_data);
     } else {
         if (!ssh_message_auth_kbdint_is_response(msg)) {
             const char *prompts[] = {"Password: "};
@@ -939,12 +939,11 @@
     const char *username;
     int signature_state;
 
-    if(server_opts.pubkey_auth_clb){
-        if(server_opts.pubkey_auth_clb(session, ssh_message_auth_pubkey(msg), server_opts.pubkey_auth_data)){
+    if (server_opts.pubkey_auth_clb) {
+        if (server_opts.pubkey_auth_clb(session, ssh_message_auth_pubkey(msg), server_opts.pubkey_auth_data)) {
             goto fail;
         }
-    }
-    else{
+    } else {
         if ((username = auth_pubkey_compare_key(ssh_message_auth_pubkey(msg))) == NULL) {
             VRB("User \"%s\" tried to use an unknown (unauthorized) public key.", session->username);
             goto fail;