mirror of
https://git.tartarus.org/simon/putty.git
synced 2025-07-14 17:47:33 -05:00
Adopt C99 <stdbool.h>'s true/false.
This commit includes <stdbool.h> from defs.h and deletes my traditional definitions of TRUE and FALSE, but other than that, it's a 100% mechanical search-and-replace transforming all uses of TRUE and FALSE into the C99-standardised lowercase spellings. No actual types are changed in this commit; that will come next. This is just getting the noise out of the way, so that subsequent commits can have a higher proportion of signal.
This commit is contained in:
22
ssh2bpp.c
22
ssh2bpp.c
@ -117,7 +117,7 @@ void ssh2_bpp_new_outgoing_crypto(
|
||||
ssh2_cipher_alg(s->out.cipher)->text_name));
|
||||
} else {
|
||||
s->out.cipher = NULL;
|
||||
s->cbc_ignore_workaround = FALSE;
|
||||
s->cbc_ignore_workaround = false;
|
||||
}
|
||||
s->out.etm_mode = etm_mode;
|
||||
if (mac) {
|
||||
@ -217,7 +217,7 @@ void ssh2_bpp_new_incoming_crypto(
|
||||
|
||||
/* Clear the pending_newkeys flag, so that handle_input below will
|
||||
* start consuming the input data again. */
|
||||
s->pending_newkeys = FALSE;
|
||||
s->pending_newkeys = false;
|
||||
|
||||
/* And schedule a run of handle_input, in case there's already
|
||||
* input data in the queue. */
|
||||
@ -349,7 +349,7 @@ static void ssh2_bpp_handle_input(BinaryPacketProtocol *bpp)
|
||||
s->pktin = snew_plus(PktIn, s->maxlen);
|
||||
s->pktin->qnode.prev = s->pktin->qnode.next = NULL;
|
||||
s->pktin->type = 0;
|
||||
s->pktin->qnode.on_free_queue = FALSE;
|
||||
s->pktin->qnode.on_free_queue = false;
|
||||
s->data = snew_plus_get_aux(s->pktin);
|
||||
memcpy(s->data, s->buf, s->maxlen);
|
||||
} else if (s->in.mac && s->in.etm_mode) {
|
||||
@ -399,7 +399,7 @@ static void ssh2_bpp_handle_input(BinaryPacketProtocol *bpp)
|
||||
s->pktin = snew_plus(PktIn, OUR_V2_PACKETLIMIT + s->maclen);
|
||||
s->pktin->qnode.prev = s->pktin->qnode.next = NULL;
|
||||
s->pktin->type = 0;
|
||||
s->pktin->qnode.on_free_queue = FALSE;
|
||||
s->pktin->qnode.on_free_queue = false;
|
||||
s->data = snew_plus_get_aux(s->pktin);
|
||||
memcpy(s->data, s->buf, 4);
|
||||
|
||||
@ -465,7 +465,7 @@ static void ssh2_bpp_handle_input(BinaryPacketProtocol *bpp)
|
||||
s->pktin = snew_plus(PktIn, s->maxlen);
|
||||
s->pktin->qnode.prev = s->pktin->qnode.next = NULL;
|
||||
s->pktin->type = 0;
|
||||
s->pktin->qnode.on_free_queue = FALSE;
|
||||
s->pktin->qnode.on_free_queue = false;
|
||||
s->data = snew_plus_get_aux(s->pktin);
|
||||
memcpy(s->data, s->buf, s->cipherblk);
|
||||
|
||||
@ -562,7 +562,7 @@ static void ssh2_bpp_handle_input(BinaryPacketProtocol *bpp)
|
||||
if (s->bpp.logctx) {
|
||||
logblank_t blanks[MAX_BLANKS];
|
||||
int nblanks = ssh2_censor_packet(
|
||||
s->bpp.pls, s->pktin->type, FALSE,
|
||||
s->bpp.pls, s->pktin->type, false,
|
||||
make_ptrlen(s->data, s->length), blanks);
|
||||
log_packet(s->bpp.logctx, PKT_INCOMING, s->pktin->type,
|
||||
ssh2_pkt_type(s->bpp.pls->kctx, s->bpp.pls->actx,
|
||||
@ -590,7 +590,7 @@ static void ssh2_bpp_handle_input(BinaryPacketProtocol *bpp)
|
||||
* the transport layer has initialised the new keys by
|
||||
* calling ssh2_bpp_new_incoming_crypto above.
|
||||
*/
|
||||
s->pending_newkeys = TRUE;
|
||||
s->pending_newkeys = true;
|
||||
crWaitUntilV(!s->pending_newkeys);
|
||||
continue;
|
||||
}
|
||||
@ -611,7 +611,7 @@ static void ssh2_bpp_handle_input(BinaryPacketProtocol *bpp)
|
||||
* that a delayed compression method enabled in any
|
||||
* future rekey will be treated as un-delayed.
|
||||
*/
|
||||
s->seen_userauth_success = TRUE;
|
||||
s->seen_userauth_success = true;
|
||||
}
|
||||
|
||||
if (s->pending_compression && userauth_range(type)) {
|
||||
@ -627,7 +627,7 @@ static void ssh2_bpp_handle_input(BinaryPacketProtocol *bpp)
|
||||
* to authenticate. The next userauth packet we send
|
||||
* will re-block the output direction.
|
||||
*/
|
||||
s->pending_compression = FALSE;
|
||||
s->pending_compression = false;
|
||||
queue_idempotent_callback(&s->bpp.ic_out_pq);
|
||||
}
|
||||
}
|
||||
@ -665,7 +665,7 @@ static void ssh2_bpp_format_packet_inner(struct ssh2_bpp_state *s, PktOut *pkt)
|
||||
pkt->length - pkt->prefix);
|
||||
logblank_t blanks[MAX_BLANKS];
|
||||
int nblanks = ssh2_censor_packet(
|
||||
s->bpp.pls, pkt->type, TRUE, pktdata, blanks);
|
||||
s->bpp.pls, pkt->type, true, pktdata, blanks);
|
||||
log_packet(s->bpp.logctx, PKT_OUTGOING, pkt->type,
|
||||
ssh2_pkt_type(s->bpp.pls->kctx, s->bpp.pls->actx,
|
||||
pkt->type),
|
||||
@ -894,7 +894,7 @@ static void ssh2_bpp_handle_output(BinaryPacketProtocol *bpp)
|
||||
* USERAUTH_SUCCESS. Block (non-userauth) outgoing packets
|
||||
* until we see the reply.
|
||||
*/
|
||||
s->pending_compression = TRUE;
|
||||
s->pending_compression = true;
|
||||
return;
|
||||
} else if (type == SSH2_MSG_USERAUTH_SUCCESS && s->is_server) {
|
||||
ssh2_bpp_enable_pending_compression(s);
|
||||
|
Reference in New Issue
Block a user