summaryrefslogtreecommitdiff
path: root/usr.bin/ssh/ssh.c
diff options
context:
space:
mode:
authorDamien Miller <djm@cvs.openbsd.org>2013-10-14 23:31:02 +0000
committerDamien Miller <djm@cvs.openbsd.org>2013-10-14 23:31:02 +0000
commit4bf84b56e533100ca57e87fd866af979cd8d171c (patch)
tree52188409700224ded1577da10a2c448eb1070b45 /usr.bin/ssh/ssh.c
parent1aa18165978d737c9da06424089af5edb464588f (diff)
whitespace at EOL; pointed out by markus@
Diffstat (limited to 'usr.bin/ssh/ssh.c')
-rw-r--r--usr.bin/ssh/ssh.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/usr.bin/ssh/ssh.c b/usr.bin/ssh/ssh.c
index e77b38f3fc5..58f657d2bcb 100644
--- a/usr.bin/ssh/ssh.c
+++ b/usr.bin/ssh/ssh.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: ssh.c,v 1.383 2013/10/14 23:28:23 djm Exp $ */
+/* $OpenBSD: ssh.c,v 1.384 2013/10/14 23:31:01 djm Exp $ */
/*
* Author: Tatu Ylonen <ylo@cs.hut.fi>
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -775,7 +775,7 @@ main(int ac, char **av)
/* Open a connection to the remote host. */
if (ssh_connect(host, &hostaddr, options.port,
options.address_family, options.connection_attempts, &timeout_ms,
- options.tcp_keep_alive,
+ options.tcp_keep_alive,
original_effective_uid == 0 && options.use_privileged_port,
options.proxy_command) != 0)
exit(255);
@@ -1027,7 +1027,7 @@ ssh_init_stdio_forwarding(void)
if (stdio_forward_host == NULL)
return;
- if (!compat20)
+ if (!compat20)
fatal("stdio forwarding require Protocol 2");
debug3("%s: %s:%d", __func__, stdio_forward_host, stdio_forward_port);
@@ -1199,7 +1199,7 @@ ssh_session(void)
char *proto, *data;
/* Get reasonable local authentication information. */
client_x11_get_proto(display, options.xauth_location,
- options.forward_x11_trusted,
+ options.forward_x11_trusted,
options.forward_x11_timeout,
&proto, &data);
/* Request forwarding with authentication spoofing. */