mirror of
https://git.libssh.org/projects/libssh.git
synced 2026-02-11 10:40:27 +09:00
misc: Reformat ssh_path_expand_escape
Signed-off-by: Jakub Jelen <jjelen@redhat.com> Reviewed-by: Pavol Žáčik <pzacik@redhat.com> Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
This commit is contained in:
20
src/misc.c
20
src/misc.c
@@ -1282,8 +1282,7 @@ char *ssh_path_expand_escape(ssh_session session, const char *s)
|
|||||||
if (session->opts.sshdir) {
|
if (session->opts.sshdir) {
|
||||||
x = strdup(session->opts.sshdir);
|
x = strdup(session->opts.sshdir);
|
||||||
} else {
|
} else {
|
||||||
ssh_set_error(session, SSH_FATAL,
|
ssh_set_error(session, SSH_FATAL, "Cannot expand sshdir");
|
||||||
"Cannot expand sshdir");
|
|
||||||
free(buf);
|
free(buf);
|
||||||
free(r);
|
free(r);
|
||||||
return NULL;
|
return NULL;
|
||||||
@@ -1301,8 +1300,7 @@ char *ssh_path_expand_escape(ssh_session session, const char *s)
|
|||||||
if (session->opts.host) {
|
if (session->opts.host) {
|
||||||
x = strdup(session->opts.host);
|
x = strdup(session->opts.host);
|
||||||
} else {
|
} else {
|
||||||
ssh_set_error(session, SSH_FATAL,
|
ssh_set_error(session, SSH_FATAL, "Cannot expand host");
|
||||||
"Cannot expand host");
|
|
||||||
free(buf);
|
free(buf);
|
||||||
free(r);
|
free(r);
|
||||||
return NULL;
|
return NULL;
|
||||||
@@ -1312,25 +1310,24 @@ char *ssh_path_expand_escape(ssh_session session, const char *s)
|
|||||||
if (session->opts.username) {
|
if (session->opts.username) {
|
||||||
x = strdup(session->opts.username);
|
x = strdup(session->opts.username);
|
||||||
} else {
|
} else {
|
||||||
ssh_set_error(session, SSH_FATAL,
|
ssh_set_error(session, SSH_FATAL, "Cannot expand username");
|
||||||
"Cannot expand username");
|
|
||||||
free(buf);
|
free(buf);
|
||||||
free(r);
|
free(r);
|
||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
case 'p':
|
case 'p': {
|
||||||
{
|
|
||||||
char tmp[6];
|
char tmp[6];
|
||||||
|
|
||||||
snprintf(tmp, sizeof(tmp), "%hu",
|
snprintf(tmp, sizeof(tmp), "%hu",
|
||||||
(uint16_t)(session->opts.port > 0 ? session->opts.port
|
(uint16_t)(session->opts.port > 0 ? session->opts.port
|
||||||
: 22));
|
: 22));
|
||||||
x = strdup(tmp);
|
x = strdup(tmp);
|
||||||
}
|
|
||||||
break;
|
break;
|
||||||
|
}
|
||||||
default:
|
default:
|
||||||
ssh_set_error(session, SSH_FATAL,
|
ssh_set_error(session,
|
||||||
|
SSH_FATAL,
|
||||||
"Wrong escape sequence detected");
|
"Wrong escape sequence detected");
|
||||||
free(buf);
|
free(buf);
|
||||||
free(r);
|
free(r);
|
||||||
@@ -1346,8 +1343,7 @@ char *ssh_path_expand_escape(ssh_session session, const char *s)
|
|||||||
|
|
||||||
i += strlen(x);
|
i += strlen(x);
|
||||||
if (i >= MAX_BUF_SIZE) {
|
if (i >= MAX_BUF_SIZE) {
|
||||||
ssh_set_error(session, SSH_FATAL,
|
ssh_set_error(session, SSH_FATAL, "String too long");
|
||||||
"String too long");
|
|
||||||
free(buf);
|
free(buf);
|
||||||
free(x);
|
free(x);
|
||||||
free(r);
|
free(r);
|
||||||
|
|||||||
Reference in New Issue
Block a user