svn rev #24151: trunk/src/lib/apputils/

ghudson@MIT.EDU ghudson at MIT.EDU
Wed Jun 30 12:03:22 EDT 2010


http://src.mit.edu/fisheye/changelog/krb5/?cs=24151
Commit By: ghudson
Log Message:
Improve coding style conformance in net-server.c.



Changed Files:
U   trunk/src/lib/apputils/net-server.c
Modified: trunk/src/lib/apputils/net-server.c
===================================================================
--- trunk/src/lib/apputils/net-server.c	2010-06-30 14:56:40 UTC (rev 24150)
+++ trunk/src/lib/apputils/net-server.c	2010-06-30 16:03:22 UTC (rev 24151)
@@ -88,7 +88,8 @@
     }
 }
 
-static int ipv6_enabled()
+static int
+ipv6_enabled()
 {
 #ifdef KRB5_USE_INET6
     static int result = -1;
@@ -159,7 +160,8 @@
 }
 
 
-static const char *paddr (struct sockaddr *sa)
+static const char *
+paddr(struct sockaddr *sa)
 {
     static char buf[100];
     char portbuf[10];
@@ -281,7 +283,8 @@
 static struct select_state sstate;
 static fd_set rpc_listenfds;
 
-krb5_error_code add_udp_port(int port)
+krb5_error_code
+add_udp_port(int port)
 {
     int i;
     void *tmp;
@@ -299,7 +302,8 @@
     return 0;
 }
 
-krb5_error_code add_tcp_port(int port)
+krb5_error_code
+add_tcp_port(int port)
 {
     int i;
     void *tmp;
@@ -317,8 +321,8 @@
     return 0;
 }
 
-krb5_error_code add_rpc_service(int port, u_long prognum, u_long versnum,
-                                void (*dispatch)())
+krb5_error_code
+add_rpc_service(int port, u_long prognum, u_long versnum, void (*dispatch)())
 {
     int i;
     void *tmp;
@@ -356,8 +360,8 @@
 };
 
 static struct connection *
-add_fd (struct socksetup *data, int sock, enum conn_type conntype,
-        void (*service)(void *handle, struct connection *, const char *, int))
+add_fd(struct socksetup *data, int sock, enum conn_type conntype,
+       void (*service)(void *handle, struct connection *, const char *, int))
 {
     struct connection *newconn;
     void *tmp;
@@ -391,33 +395,38 @@
     return newconn;
 }
 
-static void process_packet(void *handle, struct connection *, const char *, int);
-static void accept_tcp_connection(void *handle, struct connection *, const char *, int);
-static void process_tcp_connection(void *handle, struct connection *, const char *, int);
-static void accept_rpc_connection(void *handle, struct connection *, const char *, int);
-static void process_rpc_connection(void *handle, struct connection *, const char *, int);
+static void process_packet(void *handle, struct connection *, const char *,
+                           int);
+static void accept_tcp_connection(void *handle, struct connection *,
+                                  const char *, int);
+static void process_tcp_connection(void *handle, struct connection *,
+                                   const char *, int);
+static void accept_rpc_connection(void *handle, struct connection *,
+                                  const char *, int);
+static void process_rpc_connection(void *handle, struct connection *,
+                                   const char *, int);
 
 static struct connection *
-add_udp_fd (struct socksetup *data, int sock, int pktinfo)
+add_udp_fd(struct socksetup *data, int sock, int pktinfo)
 {
     return add_fd(data, sock, pktinfo ? CONN_UDP_PKTINFO : CONN_UDP,
                   process_packet);
 }
 
 static struct connection *
-add_tcp_listener_fd (struct socksetup *data, int sock)
+add_tcp_listener_fd(struct socksetup *data, int sock)
 {
     return add_fd(data, sock, CONN_TCP_LISTENER, accept_tcp_connection);
 }
 
 static struct connection *
-add_tcp_data_fd (struct socksetup *data, int sock)
+add_tcp_data_fd(struct socksetup *data, int sock)
 {
     return add_fd(data, sock, CONN_TCP, process_tcp_connection);
 }
 
 static void
-delete_fd (struct connection *xconn)
+delete_fd(struct connection *xconn)
 {
     struct connection *conn;
     int i;
@@ -431,7 +440,7 @@
 }
 
 static struct connection *
-add_rpc_listener_fd (struct socksetup *data, struct rpc_svc_data *svc, int sock)
+add_rpc_listener_fd(struct socksetup *data, struct rpc_svc_data *svc, int sock)
 {
     struct connection *conn;
 
@@ -459,7 +468,7 @@
 }
 
 static struct connection *
-add_rpc_data_fd (struct socksetup *data, int sock)
+add_rpc_data_fd(struct socksetup *data, int sock)
 {
     return add_fd(data, sock, CONN_RPC, process_rpc_connection);
 }
@@ -648,7 +657,7 @@
 #endif /* KRB5_USE_INET6 */
         }
 
-        /* Sockets are created, prepare to listen on them.  */
+        /* Sockets are created, prepare to listen on them. */
         if (s4 >= 0) {
             if (add_tcp_listener_fd(data, s4) == NULL)
                 close(s4);
@@ -752,7 +761,8 @@
     return 0;
 }
 
-#if defined(CMSG_SPACE) && defined(HAVE_STRUCT_CMSGHDR) && (defined(IP_PKTINFO) || defined(IPV6_PKTINFO))
+#if defined(CMSG_SPACE) && defined(HAVE_STRUCT_CMSGHDR) && \
+    (defined(IP_PKTINFO) || defined(IPV6_PKTINFO))
 union pktinfo {
 #ifdef HAVE_STRUCT_IN6_PKTINFO
     struct in6_pktinfo pi6;
@@ -848,15 +858,15 @@
             close(sock);
             return 1;
         }
-#if !(defined(CMSG_SPACE) && defined(HAVE_STRUCT_CMSGHDR) && (defined(IP_PKTINFO) || defined(IPV6_PKTINFO)))
+#if !(defined(CMSG_SPACE) && defined(HAVE_STRUCT_CMSGHDR) && \
+      (defined(IP_PKTINFO) || defined(IPV6_PKTINFO)))
         assert(pktinfo == 0);
 #endif
         if (pktinfo) {
             r = set_pktinfo(sock, addr->sa_family);
             if (r) {
-                com_err(data->prog, r,
-                        "Cannot request packet info for udp socket address %s port %d",
-                        haddrbuf, port);
+                com_err(data->prog, r, "Cannot request packet info for "
+                        "udp socket address %s port %d", haddrbuf, port);
                 close(sock);
                 return 1;
             }
@@ -933,7 +943,8 @@
 }
 
 #if 1
-static void klog_handler(const void *data, size_t len)
+static void
+klog_handler(const void *data, size_t len)
 {
     static char buf[BUFSIZ];
     static int bufoffset;
@@ -982,7 +993,8 @@
 #ifdef HAVE_STRUCT_RT_MSGHDR
 #include <net/route.h>
 
-static char *rtm_type_name(int type)
+static char *
+rtm_type_name(int type)
 {
     switch (type) {
     case RTM_ADD: return "RTM_ADD";
@@ -1005,8 +1017,9 @@
     }
 }
 
-static void process_routing_update(void *handle, struct connection *conn,
-                                   const char *prog, int selflags)
+static void
+process_routing_update(void *handle, struct connection *conn, const char *prog,
+                       int selflags)
 {
     int n_read;
     struct rt_msghdr rtm;
@@ -1097,8 +1110,8 @@
 #endif
             break;
         default:
-            krb5_klog_syslog(LOG_INFO,
-                             "unhandled routing message type %d, will reconfigure just for the fun of it",
+            krb5_klog_syslog(LOG_INFO, "unhandled routing message type %d, "
+                             "will reconfigure just for the fun of it",
                              rtm.rtm_type);
             network_reconfiguration_needed = 1;
             break;
@@ -1137,7 +1150,7 @@
     FD_ZERO(&sstate.xfds);
     sstate.max = 0;
 
-/*    krb5int_debug_sendto_kdc = 1; */
+    /* krb5int_debug_sendto_kdc = 1; */
     krb5int_sendtokdc_debug_handler = klog_handler;
 
     setup_data.prog = prog;
@@ -1146,10 +1159,12 @@
 #ifdef HAVE_STRUCT_RT_MSGHDR
     setup_routing_socket(&setup_data);
 #endif
-    /* To do: Use RFC 2292 interface (or follow-on) and IPV6_PKTINFO,
-       so we might need only one UDP socket; fall back to binding
-       sockets on each address only if IPV6_PKTINFO isn't
-       supported.  */
+    /*
+     * To do: Use RFC 2292 interface (or follow-on) and IPV6_PKTINFO,
+     * so we might need only one UDP socket; fall back to binding
+     * sockets on each address only if IPV6_PKTINFO isn't
+     * supported.
+     */
     setup_data.udp_flags = UDP_DO_IPV4 | UDP_DO_IPV6;
     setup_udp_pktinfo_ports(&setup_data);
     if (setup_data.udp_flags) {
@@ -1168,7 +1183,8 @@
     return 0;
 }
 
-void init_addr(krb5_fulladdr *faddr, struct sockaddr *sa)
+void
+init_addr(krb5_fulladdr *faddr, struct sockaddr *sa)
 {
     switch (sa->sa_family) {
     case AF_INET:
@@ -1277,7 +1293,8 @@
                 return r;
             }
 #endif
-#if defined(KRB5_USE_INET6) && defined(IPV6_PKTINFO)&& defined(HAVE_STRUCT_IN6_PKTINFO)
+#if defined(KRB5_USE_INET6) && defined(IPV6_PKTINFO) && \
+    defined(HAVE_STRUCT_IN6_PKTINFO)
             if (cmsgptr->cmsg_level == IPPROTO_IPV6
                 && cmsgptr->cmsg_type == IPV6_PKTINFO
                 && *tolen >= sizeof(struct sockaddr_in6)) {
@@ -1353,7 +1370,8 @@
         msg.msg_controllen = CMSG_SPACE(sizeof(struct in_pktinfo));
         break;
 #endif
-#if defined(KRB5_USE_INET6) && defined(IPV6_PKTINFO) && defined(HAVE_STRUCT_IN6_PKTINFO)
+#if defined(KRB5_USE_INET6) && defined(IPV6_PKTINFO) && \
+    defined(HAVE_STRUCT_IN6_PKTINFO)
     case AF_INET6:
         if (fromlen != sizeof(struct sockaddr_in6))
             goto use_sendto;
@@ -1362,7 +1380,8 @@
         cmsgptr->cmsg_len = CMSG_LEN(sizeof(struct in6_pktinfo));
         {
             struct in6_pktinfo *p = (struct in6_pktinfo *)CMSG_DATA(cmsgptr);
-            const struct sockaddr_in6 *from6 = (const struct sockaddr_in6 *)from;
+            const struct sockaddr_in6 *from6 =
+                (const struct sockaddr_in6 *)from;
             p->ipi6_addr = from6->sin6_addr;
             /*
              * Because of the possibility of asymmetric routing, we
@@ -1386,9 +1405,9 @@
 #endif
 }
 
-static void process_packet(void *handle,
-                           struct connection *conn, const char *prog,
-                           int selflags)
+static void
+process_packet(void *handle, struct connection *conn, const char *prog,
+               int selflags)
 {
     int cc;
     socklen_t saddr_len, daddr_len;
@@ -1412,9 +1431,11 @@
                       &auxaddr);
     if (cc == -1) {
         if (errno != EINTR
-            /* This is how Linux indicates that a previous
-               transmission was refused, e.g., if the client timed out
-               before getting the response packet.  */
+            /*
+             * This is how Linux indicates that a previous transmission was
+             * refused, e.g., if the client timed out before getting the
+             * response packet.
+             */
             && errno != ECONNREFUSED
         )
             com_err(prog, errno, "while receiving from network");
@@ -1434,22 +1455,24 @@
 #endif
 
     if (daddr_len == 0 && conn->type == CONN_UDP) {
-        /* If the PKTINFO option isn't set, this socket should be
-           bound to a specific local address.  This info probably
-           should've been saved in our socket data structure at setup
-           time.  */
+        /*
+         * If the PKTINFO option isn't set, this socket should be bound to a
+         * specific local address.  This info probably should've been saved in
+         * our socket data structure at setup time.
+         */
         daddr_len = sizeof(daddr);
         if (getsockname(port_fd, (struct sockaddr *)&daddr, &daddr_len) != 0)
             daddr_len = 0;
-        /* On failure, keep going anyways.  */
+        /* On failure, keep going anyways. */
     }
 
     request.length = cc;
     request.data = pktbuf;
     faddr.address = &addr;
     init_addr(&faddr, ss2sa(&saddr));
-    /* this address is in net order */
-    if ((retval = dispatch(handle, ss2sa(&daddr), &faddr, &request, &response, 0))) {
+    /* This address is in net order. */
+    retval = dispatch(handle, ss2sa(&daddr), &faddr, &request, &response, 0);
+    if (retval) {
         com_err(prog, retval, "while dispatching (udp)");
         return;
     }
@@ -1460,10 +1483,8 @@
                       (struct sockaddr *)&daddr, daddr_len,
                       &auxaddr);
     if (cc == -1) {
-        /*
-         * Note that the local address (daddr*) has no port number
-         * info associated with it.
-         */
+        /* Note that the local address (daddr*) has no port number
+         * info associated with it. */
         char saddrbuf[NI_MAXHOST], sportbuf[NI_MAXSERV];
         char daddrbuf[NI_MAXHOST];
         int e = errno;
@@ -1494,9 +1515,11 @@
 static int tcp_or_rpc_data_counter;
 static int max_tcp_or_rpc_data_connections = 45;
 
-static void kill_tcp_or_rpc_connection(void *, struct connection *, int isForcedClose);
+static void kill_tcp_or_rpc_connection(void *, struct connection *,
+                                       int isForcedClose);
 
-static int kill_lru_tcp_or_rpc_connection(void *handle, struct connection *newconn)
+static int
+kill_lru_tcp_or_rpc_connection(void *handle, struct connection *newconn)
 {
     struct connection *oldest_tcp = NULL;
     struct connection *c;
@@ -1527,9 +1550,9 @@
     return fd;
 }
 
-static void accept_tcp_connection(void *handle,
-                                  struct connection *conn, const char *prog,
-                                  int selflags)
+static void
+accept_tcp_connection(void *handle, struct connection *conn, const char *prog,
+                      int selflags)
 {
     int s;
     struct sockaddr_storage addr_s;
@@ -1607,7 +1630,8 @@
 }
 
 static void
-kill_tcp_or_rpc_connection(void *handle, struct connection *conn, int isForcedClose)
+kill_tcp_or_rpc_connection(void *handle, struct connection *conn,
+                           int isForcedClose)
 {
     assert(conn->type == CONN_TCP || conn->type == CONN_RPC);
     assert(conn->fd != -1);
@@ -1626,12 +1650,14 @@
         )
             sstate.max--;
 
-    /* In the non-forced case, the RPC runtime will close the descriptor for us */
+    /* In the non-forced case, the RPC runtime will close the descriptor for
+     * us. */
     if (conn->type == CONN_TCP || isForcedClose) {
         close(conn->fd);
     }
 
-    /* For RPC connections, call into RPC runtime to flush out any internal state */
+    /* For RPC connections, call into RPC runtime to flush out any internal
+     * state. */
     if (conn->type == CONN_RPC && isForcedClose) {
         fd_set fds;
 
@@ -1642,7 +1668,8 @@
 
         if (FD_ISSET(conn->fd, &svc_fdset)) {
             krb5_klog_syslog(LOG_ERR,
-                             "descriptor %d closed but still in svc_fdset", conn->fd);
+                             "descriptor %d closed but still in svc_fdset",
+                             conn->fd);
         }
     }
 
@@ -1663,8 +1690,8 @@
 }
 
 static void
-process_tcp_connection(void *handle,
-                       struct connection *conn, const char *prog, int selflags)
+process_tcp_connection(void *handle, struct connection *conn, const char *prog,
+                       int selflags)
 {
     int isForcedClose = 1; /* not used now, but for completeness */
 
@@ -1696,26 +1723,26 @@
             }
         }
         if (conn->u.tcp.sgnum == 0) {
-            /* finished sending */
-            /* We should go back to reading, though if we sent a
-               FIELD_TOOLONG error in reply to a length with the high
-               bit set, RFC 4120 says we have to close the TCP
-               stream.  */
+            /*
+             * Finished sending.  We should go back to reading, though if we
+             * sent a FIELD_TOOLONG error in reply to a length with the high
+             * bit set, RFC 4120 says we have to close the TCP stream.
+             */
             isForcedClose = 0;
             goto kill_tcp_connection;
         }
     } else if (selflags & SSF_READ) {
-        /* Read message length and data into one big buffer, already
-           allocated at connect time.  If we have a complete message,
-           we stop reading, so we should only be here if there is no
-           data in the buffer, or only an incomplete message.  */
+        /*
+         * Read message length and data into one big buffer, already allocated
+         * at connect time.  If we have a complete message, we stop reading, so
+         * we should only be here if there is no data in the buffer, or only an
+         * incomplete message.
+         */
         size_t len;
         ssize_t nread;
         if (conn->u.tcp.offset < 4) {
-            /* msglen has not been computed */
-            /* XXX Doing at least two reads here, letting the kernel
-               worry about buffering.  It'll be faster when we add
-               code to manage the buffer here.  */
+            /* msglen has not been computed.  XXX Doing at least two reads
+             * here, letting the kernel worry about buffering. */
             len = 4 - conn->u.tcp.offset;
             nread = SOCKET_READ(conn->fd,
                                 conn->u.tcp.buffer + conn->u.tcp.offset, len);
@@ -1731,15 +1758,16 @@
                 conn->u.tcp.msglen = load_32_be(p);
                 if (conn->u.tcp.msglen > conn->u.tcp.bufsiz - 4) {
                     krb5_error_code err;
-                    /* message too big */
-                    krb5_klog_syslog(LOG_ERR, "TCP client %s wants %lu bytes, cap is %lu",
-                                     conn->u.tcp.addrbuf, (unsigned long) conn->u.tcp.msglen,
+                    /* Message too big. */
+                    krb5_klog_syslog(LOG_ERR, "TCP client %s wants %lu bytes, "
+                                     "cap is %lu", conn->u.tcp.addrbuf,
+                                     (unsigned long) conn->u.tcp.msglen,
                                      (unsigned long) conn->u.tcp.bufsiz - 4);
                     /* XXX Should return an error.  */
                     err = make_toolong_error (handle, &conn->u.tcp.response);
                     if (err) {
-                        krb5_klog_syslog(LOG_ERR,
-                                         "error constructing KRB_ERR_FIELD_TOOLONG error! %s",
+                        krb5_klog_syslog(LOG_ERR, "error constructing "
+                                         "KRB_ERR_FIELD_TOOLONG error! %s",
                                          error_message(err));
                         goto kill_tcp_connection;
                     }
@@ -1747,7 +1775,7 @@
                 }
             }
         } else {
-            /* msglen known */
+            /* msglen known. */
             krb5_data request;
             krb5_error_code err;
             struct sockaddr_storage local_saddr;
@@ -1757,22 +1785,20 @@
             len = conn->u.tcp.msglen - (conn->u.tcp.offset - 4);
             nread = SOCKET_READ(conn->fd,
                                 conn->u.tcp.buffer + conn->u.tcp.offset, len);
-            if (nread < 0)
-                /* error */
+            if (nread < 0)      /* error */
                 goto kill_tcp_connection;
-            if (nread == 0)
-                /* eof */
+            if (nread == 0)     /* eof */
                 goto kill_tcp_connection;
             conn->u.tcp.offset += nread;
             if (conn->u.tcp.offset < conn->u.tcp.msglen + 4)
                 return;
-            /* have a complete message, and exactly one message */
+            /* Have a complete message, and exactly one message. */
             request.length = conn->u.tcp.msglen;
             request.data = conn->u.tcp.buffer + 4;
 
-            if (getsockname(conn->fd, ss2sa(&local_saddr), &local_saddrlen) == 0) {
+            if (getsockname(conn->fd, ss2sa(&local_saddr),
+                            &local_saddrlen) == 0)
                 local_saddrp = ss2sa(&local_saddr);
-            }
 
             err = dispatch(handle, local_saddrp, &conn->u.tcp.faddr,
                            &request, &conn->u.tcp.response, 1);
@@ -1793,14 +1819,15 @@
     kill_tcp_or_rpc_connection(handle, conn, isForcedClose);
 }
 
-static void service_conn(void *handle,
-                         struct connection *conn, const char *prog,
-                         int selflags)
+static void
+service_conn(void *handle, struct connection *conn, const char *prog,
+             int selflags)
 {
     conn->service(handle, conn, prog, selflags);
 }
 
-static int getcurtime(struct timeval *tvp)
+static int
+getcurtime(struct timeval *tvp)
 {
 #ifdef _WIN32
     struct _timeb tb;
@@ -1814,16 +1841,15 @@
 }
 
 krb5_error_code
-listen_and_process(void *handle, const char *prog,
-                   void (*reset)(void))
+listen_and_process(void *handle, const char *prog, void (*reset)(void))
 {
-    int                 nfound;
+    int nfound;
     /* This struct contains 3 fd_set objects; on some platforms, they
        can be rather large.  Making this static avoids putting all
        that junk on the stack.  */
     static struct select_state sout;
-    int                 i, sret, netchanged = 0;
-    krb5_error_code     err;
+    int i, sret, netchanged = 0;
+    krb5_error_code err;
 
     if (conns == (struct connection **) NULL)
         return KDC5_NONET;
@@ -1836,12 +1862,11 @@
         }
 
         if (network_reconfiguration_needed) {
-            /* No point in re-logging what we've just logged.  */
+            /* No point in re-logging what we've just logged. */
             if (netchanged == 0)
                 krb5_klog_syslog(LOG_INFO, "network reconfiguration needed");
-            /* It might be tidier to add a timer-callback interface to
-               the control loop here, but for this one use, it's not a
-               big deal.  */
+            /* It might be tidier to add a timer-callback interface to the
+             * control loop, but for this one use, it's not a big deal. */
             err = getcurtime(&sstate.end_time);
             if (err) {
                 com_err(prog, err, "while getting the time");
@@ -1917,10 +1942,11 @@
                 svc_destroy(conn->u.rpc.transp);
         }
         DEL (connections, i);
-        /* There may also be per-connection data in the tcp structure
-           (tcp.buffer, tcp.response) that we're not freeing here.
-           That should only happen if we quit with a connection in
-           progress.  */
+        /*
+         * There may also be per-connection data in the tcp structure
+         * (tcp.buffer, tcp.response) that we're not freeing here.  That should
+         * only happen if we quit with a connection in progress.
+         */
         free(conn);
     }
 }
@@ -1935,8 +1961,9 @@
     FREE_SET_DATA(rpc_svc_data);
 }
 
-static void accept_rpc_connection(void *handle, struct connection *conn,
-                                  const char *prog, int selflags)
+static void
+accept_rpc_connection(void *handle, struct connection *conn, const char *prog,
+                      int selflags)
 {
     struct socksetup sockdata;
     fd_set fds;
@@ -1950,23 +1977,17 @@
     sockdata.prog = prog;
     sockdata.retval = 0;
 
-    /*
-     * Service the woken RPC listener descriptor.
-     */
+    /* Service the woken RPC listener descriptor. */
     FD_ZERO(&fds);
     FD_SET(conn->fd, &fds);
 
     svc_getreqset(&fds);
 
-    /*
-     * Scan svc_fdset for any new connections.
-     */
+    /* Scan svc_fdset for any new connections. */
     for (s = 0; s < FD_SETSIZE; s++) {
         /* sstate.rfds |= svc_fdset & ~(rpc_listenfds | sstate.rfds) */
-        if (FD_ISSET(s, &svc_fdset)
-            && !FD_ISSET(s, &rpc_listenfds)
-            && !FD_ISSET(s, &sstate.rfds))
-        {
+        if (FD_ISSET(s, &svc_fdset) && !FD_ISSET(s, &rpc_listenfds)
+            && !FD_ISSET(s, &sstate.rfds)) {
             struct connection *newconn;
             struct sockaddr_storage addr_s;
             struct sockaddr *addr = (struct sockaddr *)&addr_s;
@@ -1984,11 +2005,13 @@
 
             if (getpeername(s, addr, &addrlen) ||
                 getnameinfo(addr, addrlen,
-                            newconn->u.tcp.addrbuf, sizeof(newconn->u.tcp.addrbuf),
+                            newconn->u.tcp.addrbuf,
+                            sizeof(newconn->u.tcp.addrbuf),
                             tmpbuf, sizeof(tmpbuf),
-                            NI_NUMERICHOST | NI_NUMERICSERV))
-                strlcpy(newconn->u.tcp.addrbuf, "???", sizeof(newconn->u.tcp.addrbuf));
-            else {
+                            NI_NUMERICHOST | NI_NUMERICSERV)) {
+                strlcpy(newconn->u.tcp.addrbuf, "???",
+                        sizeof(newconn->u.tcp.addrbuf));
+            } else {
                 char *p, *end;
                 p = newconn->u.tcp.addrbuf;
                 end = p + sizeof(newconn->u.tcp.addrbuf);
@@ -1999,8 +2022,8 @@
                 }
             }
 #if 0
-            krb5_klog_syslog(LOG_INFO, "accepted RPC connection on socket %d from %s",
-                             s, newconn->u.tcp.addrbuf);
+            krb5_klog_syslog(LOG_INFO, "accepted RPC connection on socket %d "
+                             "from %s", s, newconn->u.tcp.addrbuf);
 #endif
 
             newconn->u.tcp.addr_s = addr_s;
@@ -2020,8 +2043,9 @@
     }
 }
 
-static void process_rpc_connection(void *handle, struct connection *conn,
-                                   const char *prog, int selflags)
+static void
+process_rpc_connection(void *handle, struct connection *conn, const char *prog,
+                       int selflags)
 {
     fd_set fds;
 




More information about the cvs-krb5 mailing list