mirror of
https://git.tartarus.org/simon/putty.git
synced 2025-07-01 11:32:48 -05:00
Formatting: realign run-on parenthesised stuff.
My bulk indentation check also turned up a lot of cases where a run-on function call or if statement didn't have its later lines aligned correctly relative to the open paren. I think this is quite easy to do by getting things out of sync (editing the first line of the function call and forgetting to update the rest, perhaps even because you never _saw_ the rest during a search-replace). But a few didn't quite fit into that pattern, in particular an outright misleading case in unix/askpass.c where the second line of a call was aligned neatly below the _wrong_ one of the open parens on the opening line. Restored as many alignments as I could easily find.
This commit is contained in:
@ -1034,7 +1034,7 @@ SeatPromptResult verify_ssh_host_key(
|
||||
seat_dialog_text_append(
|
||||
text, SDT_PARA, "If you were expecting this change and trust the "
|
||||
"new key, %s to update %s's cache and carry on connecting.",
|
||||
pds->hk_accept_action, appname);
|
||||
pds->hk_accept_action, appname);
|
||||
seat_dialog_text_append(
|
||||
text, SDT_PARA, "If you want to carry on connecting but without "
|
||||
"updating the cache, %s.", pds->hk_connect_once_action);
|
||||
|
@ -50,7 +50,7 @@ static bool ssh1_login_server_get_specials(
|
||||
PacketProtocolLayer *ppl, add_special_fn_t add_special,
|
||||
void *ctx) { return false; }
|
||||
static void ssh1_login_server_special_cmd(PacketProtocolLayer *ppl,
|
||||
SessionSpecialCode code, int arg) {}
|
||||
SessionSpecialCode code, int arg) {}
|
||||
static void ssh1_login_server_reconfigure(
|
||||
PacketProtocolLayer *ppl, Conf *conf) {}
|
||||
|
||||
|
@ -866,8 +866,8 @@ static void ssh1_login_process_queue(PacketProtocolLayer *ppl)
|
||||
return;
|
||||
}
|
||||
} else if (conf_get_bool(s->conf, CONF_try_tis_auth) &&
|
||||
(s->supported_auths_mask & (1 << SSH1_AUTH_CCARD)) &&
|
||||
!s->ccard_auth_refused) {
|
||||
(s->supported_auths_mask & (1 << SSH1_AUTH_CCARD)) &&
|
||||
!s->ccard_auth_refused) {
|
||||
ssh1_login_setup_tis_scc(s);
|
||||
s->pwpkt_type = SSH1_CMSG_AUTH_CCARD_RESPONSE;
|
||||
ppl_logevent("Requested CryptoCard authentication");
|
||||
|
@ -344,7 +344,7 @@ static void mainchan_open_failure(Channel *chan, const char *errtext)
|
||||
}
|
||||
|
||||
static size_t mainchan_send(Channel *chan, bool is_stderr,
|
||||
const void *data, size_t length)
|
||||
const void *data, size_t length)
|
||||
{
|
||||
assert(chan->vt == &mainchan_channelvt);
|
||||
mainchan *mc = container_of(chan, mainchan, chan);
|
||||
|
@ -575,7 +575,7 @@ static bool fxp_got_attrs(struct sftp_packet *pktin, struct fxp_attrs *attrs)
|
||||
}
|
||||
|
||||
bool fxp_stat_recv(struct sftp_packet *pktin, struct sftp_request *req,
|
||||
struct fxp_attrs *attrs)
|
||||
struct fxp_attrs *attrs)
|
||||
{
|
||||
sfree(req);
|
||||
if (pktin->type == SSH_FXP_ATTRS) {
|
||||
|
@ -664,7 +664,7 @@ static struct share_xchannel *share_find_xchannel_by_server
|
||||
}
|
||||
|
||||
static void share_remove_xchannel(struct ssh_sharing_connstate *cs,
|
||||
struct share_xchannel *xc)
|
||||
struct share_xchannel *xc)
|
||||
{
|
||||
del234(cs->xchannels_by_us, xc);
|
||||
del234(cs->xchannels_by_server, xc);
|
||||
|
@ -43,7 +43,7 @@ static void ssh_verstring_handle_input(BinaryPacketProtocol *bpp);
|
||||
static void ssh_verstring_handle_output(BinaryPacketProtocol *bpp);
|
||||
static PktOut *ssh_verstring_new_pktout(int type);
|
||||
static void ssh_verstring_queue_disconnect(BinaryPacketProtocol *bpp,
|
||||
const char *msg, int category);
|
||||
const char *msg, int category);
|
||||
|
||||
static const BinaryPacketProtocolVtable ssh_verstring_vtable = {
|
||||
.free = ssh_verstring_free,
|
||||
|
@ -495,7 +495,7 @@ static size_t x11_send(
|
||||
while (len > 0 &&
|
||||
xconn->data_read < 12 + xconn->auth_psize + xconn->auth_dsize)
|
||||
xconn->auth_data[xconn->data_read++ - 12 -
|
||||
xconn->auth_psize] = (unsigned char) (len--, *data++);
|
||||
xconn->auth_psize] = (unsigned char) (len--, *data++);
|
||||
if (xconn->data_read < 12 + xconn->auth_psize + xconn->auth_dsize)
|
||||
return 0;
|
||||
|
||||
|
@ -946,7 +946,7 @@ void zlib_decompress_cleanup(ssh_decompressor *dc)
|
||||
}
|
||||
|
||||
static int zlib_huflookup(unsigned long *bitsp, int *nbitsp,
|
||||
struct zlib_table *tab)
|
||||
struct zlib_table *tab)
|
||||
{
|
||||
unsigned long bits = *bitsp;
|
||||
int nbits = *nbitsp;
|
||||
@ -1094,7 +1094,7 @@ bool zlib_decompress_block(ssh_decompressor *dc,
|
||||
if (dctx->lenptr >= dctx->hlit + dctx->hdist) {
|
||||
dctx->currlentable = zlib_mktable(dctx->lengths, dctx->hlit);
|
||||
dctx->currdisttable = zlib_mktable(dctx->lengths + dctx->hlit,
|
||||
dctx->hdist);
|
||||
dctx->hdist);
|
||||
zlib_freetable(&dctx->lenlentable);
|
||||
dctx->lenlentable = NULL;
|
||||
dctx->state = INBLK;
|
||||
@ -1112,7 +1112,7 @@ bool zlib_decompress_block(ssh_decompressor *dc,
|
||||
dctx->lenextrabits = (code == 16 ? 2 : code == 17 ? 3 : 7);
|
||||
dctx->lenaddon = (code == 18 ? 11 : 3);
|
||||
dctx->lenrep = (code == 16 && dctx->lenptr > 0 ?
|
||||
dctx->lengths[dctx->lenptr - 1] : 0);
|
||||
dctx->lengths[dctx->lenptr - 1] : 0);
|
||||
dctx->state = TREES_LENREP;
|
||||
}
|
||||
break;
|
||||
|
Reference in New Issue
Block a user