misc: Reformat ssh_path_expand_escape

Signed-off-by: Jakub Jelen <jjelen@redhat.com>
Reviewed-by: Pavol Žáčik <pzacik@redhat.com>
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
This commit is contained in:
Jakub Jelen
2026-01-28 14:58:38 +01:00
parent 76b14eaed7
commit 3dfaa70fcf

View File

@@ -1282,8 +1282,7 @@ char *ssh_path_expand_escape(ssh_session session, const char *s)
if (session->opts.sshdir) { if (session->opts.sshdir) {
x = strdup(session->opts.sshdir); x = strdup(session->opts.sshdir);
} else { } else {
ssh_set_error(session, SSH_FATAL, ssh_set_error(session, SSH_FATAL, "Cannot expand sshdir");
"Cannot expand sshdir");
free(buf); free(buf);
free(r); free(r);
return NULL; return NULL;
@@ -1301,8 +1300,7 @@ char *ssh_path_expand_escape(ssh_session session, const char *s)
if (session->opts.host) { if (session->opts.host) {
x = strdup(session->opts.host); x = strdup(session->opts.host);
} else { } else {
ssh_set_error(session, SSH_FATAL, ssh_set_error(session, SSH_FATAL, "Cannot expand host");
"Cannot expand host");
free(buf); free(buf);
free(r); free(r);
return NULL; return NULL;
@@ -1312,25 +1310,24 @@ char *ssh_path_expand_escape(ssh_session session, const char *s)
if (session->opts.username) { if (session->opts.username) {
x = strdup(session->opts.username); x = strdup(session->opts.username);
} else { } else {
ssh_set_error(session, SSH_FATAL, ssh_set_error(session, SSH_FATAL, "Cannot expand username");
"Cannot expand username");
free(buf); free(buf);
free(r); free(r);
return NULL; return NULL;
} }
break; break;
case 'p': case 'p': {
{
char tmp[6]; char tmp[6];
snprintf(tmp, sizeof(tmp), "%hu", snprintf(tmp, sizeof(tmp), "%hu",
(uint16_t)(session->opts.port > 0 ? session->opts.port (uint16_t)(session->opts.port > 0 ? session->opts.port
: 22)); : 22));
x = strdup(tmp); x = strdup(tmp);
}
break; break;
}
default: default:
ssh_set_error(session, SSH_FATAL, ssh_set_error(session,
SSH_FATAL,
"Wrong escape sequence detected"); "Wrong escape sequence detected");
free(buf); free(buf);
free(r); free(r);
@@ -1346,8 +1343,7 @@ char *ssh_path_expand_escape(ssh_session session, const char *s)
i += strlen(x); i += strlen(x);
if (i >= MAX_BUF_SIZE) { if (i >= MAX_BUF_SIZE) {
ssh_set_error(session, SSH_FATAL, ssh_set_error(session, SSH_FATAL, "String too long");
"String too long");
free(buf); free(buf);
free(x); free(x);
free(r); free(r);