- stevesk@cvs.openbsd.org 2001/02/04 08:32:27
     [many files; did this manually to our top-level source dir]
     unexpand and remove end-of-line whitespace; ok markus@
diff --git a/auth2.c b/auth2.c
index 5f8b423..ca2743a 100644
--- a/auth2.c
+++ b/auth2.c
@@ -203,7 +203,7 @@
 	if ((style = strchr(user, ':')) != NULL)
 		*style++ = 0;
 
-	if (authctxt->attempt++ == 0) { 
+	if (authctxt->attempt++ == 0) {
 		/* setup auth context */
 		struct passwd *pw = NULL;
 		setproctitle("%s", user);
@@ -300,7 +300,7 @@
 	return;
 }
 
-void   
+void
 userauth_reply(Authctxt *authctxt, int authenticated)
 {
 	char *methods;
@@ -309,8 +309,8 @@
 	if (authenticated) {
 #ifdef WITH_AIXAUTHENTICATE
 		/* We don't have a pty yet, so just label the line as "ssh" */
-		if (loginsuccess(authctxt->user?authctxt->user:"NOUSER", 
-		    get_canonical_hostname(options.reverse_mapping_check), 
+		if (loginsuccess(authctxt->user?authctxt->user:"NOUSER",
+		    get_canonical_hostname(options.reverse_mapping_check),
 		    "ssh", &aixloginmsg) < 0)
 			aixloginmsg = NULL;
 #endif /* WITH_AIXAUTHENTICATE */
@@ -323,7 +323,7 @@
 		authctxt->success = 1;
 	} else {
 		if (authctxt->failures++ > AUTH_FAIL_MAX)
-                        packet_disconnect(AUTH_FAIL_MSG, authctxt->user);
+			packet_disconnect(AUTH_FAIL_MSG, authctxt->user);
 		methods = authmethods_get();
 		packet_start(SSH2_MSG_USERAUTH_FAILURE);
 		packet_put_cstring(methods);
@@ -342,11 +342,11 @@
 	if (m != NULL)
 		m->enabled = NULL;
 	packet_done();
-        userauth_banner();
+	userauth_banner();
 
 	if (authctxt->valid == 0)
 		return(0);
-		
+
 #ifdef HAVE_CYGWIN
 	if (check_nt_auth(1, authctxt->pw->pw_uid) == 0)
 		return(0);
@@ -354,9 +354,9 @@
 #ifdef USE_PAM
 	return auth_pam_password(authctxt->pw, "");
 #elif defined(HAVE_OSF_SIA)
-	return (sia_validate_user(NULL, saved_argc, saved_argv, 
-	    get_canonical_hostname(options.reverse_mapping_check), 
-	    authctxt->user?authctxt->user:"NOUSER", NULL, 0, 
+	return (sia_validate_user(NULL, saved_argc, saved_argv,
+	    get_canonical_hostname(options.reverse_mapping_check),
+	    authctxt->user?authctxt->user:"NOUSER", NULL, 0,
 	    NULL, "") == SIASUCCESS);
 #else /* !HAVE_OSF_SIA && !USE_PAM */
 	return auth_password(authctxt->pw, "");
@@ -382,9 +382,9 @@
 #ifdef USE_PAM
 	    auth_pam_password(authctxt->pw, password) == 1)
 #elif defined(HAVE_OSF_SIA)
-	    sia_validate_user(NULL, saved_argc, saved_argv, 
-	    get_canonical_hostname(options.reverse_mapping_check), 
-	    authctxt->user?authctxt->user:"NOUSER", NULL, 0, NULL, 
+	    sia_validate_user(NULL, saved_argc, saved_argv,
+	    get_canonical_hostname(options.reverse_mapping_check),
+	    authctxt->user?authctxt->user:"NOUSER", NULL, 0, NULL,
 	    password) == SIASUCCESS)
 #else /* !USE_PAM && !HAVE_OSF_SIA */
 	    auth_password(authctxt->pw, password) == 1)