server session MAINTENANCE formatting and minor problems
diff --git a/src/session_server_ssh.c b/src/session_server_ssh.c
index f22fc8d..2c19210 100644
--- a/src/session_server_ssh.c
+++ b/src/session_server_ssh.c
@@ -150,7 +150,7 @@
server_opts.interactive_auth_data = user_data;
server_opts.interactive_auth_data_free = free_user_data;
}
-
+
API void
nc_server_ssh_set_pubkey_auth_clb(int (*pubkey_auth_clb)(const struct nc_session *session, ssh_key key, void *user_data),
void *user_data, void (*free_user_data)(void *user_data))
@@ -848,7 +848,7 @@
char *pass_hash;
if (server_opts.interactive_auth_clb) {
- auth_ret = server_opts.interactive_auth_clb(session, msg, server_opts.interactive_auth_data);
+ auth_ret = server_opts.interactive_auth_clb(session, msg, server_opts.interactive_auth_data);
} else {
if (!ssh_message_auth_kbdint_is_response(msg)) {
const char *prompts[] = {"Password: "};
@@ -939,12 +939,11 @@
const char *username;
int signature_state;
- if(server_opts.pubkey_auth_clb){
- if(server_opts.pubkey_auth_clb(session, ssh_message_auth_pubkey(msg), server_opts.pubkey_auth_data)){
+ if (server_opts.pubkey_auth_clb) {
+ if (server_opts.pubkey_auth_clb(session, ssh_message_auth_pubkey(msg), server_opts.pubkey_auth_data)) {
goto fail;
}
- }
- else{
+ } else {
if ((username = auth_pubkey_compare_key(ssh_message_auth_pubkey(msg))) == NULL) {
VRB("User \"%s\" tried to use an unknown (unauthorized) public key.", session->username);
goto fail;