Module Name:    src
Committed By:   mbalmer
Date:           Sat Oct 12 07:49:40 UTC 2013

Modified Files:
        src/libexec/httpd: Makefile bozohttpd.c bozohttpd.h

Log Message:
remove trailing whitespace


To generate a diff of this commit:
cvs rdiff -u -r1.14 -r1.15 src/libexec/httpd/Makefile
cvs rdiff -u -r1.41 -r1.42 src/libexec/httpd/bozohttpd.c
cvs rdiff -u -r1.28 -r1.29 src/libexec/httpd/bozohttpd.h

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/libexec/httpd/Makefile
diff -u src/libexec/httpd/Makefile:1.14 src/libexec/httpd/Makefile:1.15
--- src/libexec/httpd/Makefile:1.14	Thu Jul 11 08:51:09 2013
+++ src/libexec/httpd/Makefile	Sat Oct 12 07:49:40 2013
@@ -1,4 +1,4 @@
-#	$NetBSD: Makefile,v 1.14 2013/07/11 08:51:09 mrg Exp $
+#	$NetBSD: Makefile,v 1.15 2013/10/12 07:49:40 mbalmer Exp $
 #
 #	$eterna: Makefile,v 1.30 2010/07/11 00:34:27 mrg Exp $
 #
@@ -48,7 +48,7 @@ COPTS+=	-DNO_SSL_SUPPORT
 # Build release things.
 #
 NROFF?=		nroff
-  
+
 PREHTMLFROB=	sed \
 		    -e 's/&/\&/' \
 		    -e 's/</\&lt;/' \
@@ -64,7 +64,7 @@ TXTFROB=	col -b
 
 bozohttpd.8.html: bozohttpd.8
 	$(PREHTMLFROB) $> | $(NROFF) -mdoc2html | $(HTMLFROB) > $@
-  
+
 bozohttpd.8.txt: bozohttpd.8
 	$(NROFF) -mdoc -Tascii $> | $(TXTFROB) > $@
 

Index: src/libexec/httpd/bozohttpd.c
diff -u src/libexec/httpd/bozohttpd.c:1.41 src/libexec/httpd/bozohttpd.c:1.42
--- src/libexec/httpd/bozohttpd.c:1.41	Thu Jul 11 07:46:37 2013
+++ src/libexec/httpd/bozohttpd.c	Sat Oct 12 07:49:40 2013
@@ -1,4 +1,4 @@
-/*	$NetBSD: bozohttpd.c,v 1.41 2013/07/11 07:46:37 mrg Exp $	*/
+/*	$NetBSD: bozohttpd.c,v 1.42 2013/10/12 07:49:40 mbalmer Exp $	*/
 
 /*	$eterna: bozohttpd.c,v 1.178 2011/11/18 09:21:15 mrg Exp $	*/
 
@@ -99,7 +99,7 @@
  *	- 14.9: we aren't a cache.
  *
  *	- 14.15: content-md5 would be nice...
- *	
+ *
  *	- 14.24/14.26/14.27: be nice to support this...
  *
  *	- 14.44: not sure about this Vary: header.  ignore it for now.
@@ -867,7 +867,7 @@ bozo_escape_rfc3986(bozohttpd_t *httpd, 
 		buflen = len * 3 + 1;
 		buf = bozorealloc(httpd, buf, buflen);
 	}
-	
+
 	if (url == NULL) {
 		buf[0] = 0;
 		return buf;
@@ -958,7 +958,7 @@ handle_redirect(bozo_httpreq_t *request,
 	char portbuf[20];
 	const char *hostname = BOZOHOST(httpd, request);
 	int query = 0;
-	
+
 	if (url == NULL) {
 		if (asprintf(&urlbuf, "/%s/", request->hr_file) < 0)
 			bozo_err(httpd, 1, "asprintf");
@@ -981,7 +981,7 @@ handle_redirect(bozo_httpreq_t *request,
 		bozo_warn(httpd, "redirecting %s%s%s", hostname, portbuf, url);
 	debug((httpd, DEBUG_FAT, "redirecting %s", url));
 	bozo_printf(httpd, "%s 301 Document Moved\r\n", request->hr_proto);
-	if (request->hr_proto != httpd->consts.http_09) 
+	if (request->hr_proto != httpd->consts.http_09)
 		bozo_print_header(request, NULL, "text/html", NULL);
 	if (request->hr_proto != httpd->consts.http_09) {
 		bozo_printf(httpd, "Location: http://";);
@@ -1230,7 +1230,7 @@ fix_url_percent(bozo_httpreq_t *request)
 					"percent hack was %2f (/)");
 			goto copy_rest;
 		}
-			
+
 		buf[0] = *++s;
 		buf[1] = *++s;
 		buf[2] = '\0';
@@ -1267,7 +1267,7 @@ copy_rest:
  *	- punt if it doesn't start with /
  *	- check httpd->untrustedref / referrer
  *	- look for "http://myname/"; and deal with it.
- *	- maybe call bozo_process_cgi() 
+ *	- maybe call bozo_process_cgi()
  *	- check for ~user and call bozo_user_transform() if so
  *	- if the length > 1, check for trailing slash.  if so,
  *	  add the index.html file
@@ -1307,8 +1307,8 @@ transform_request(bozo_httpreq_t *reques
 
 #define TOP_PAGE(x)	(strcmp((x), "/") == 0 || \
 			 strcmp((x) + 1, httpd->index_html) == 0 || \
-			 strcmp((x) + 1, "favicon.ico") == 0) 
-		
+			 strcmp((x) + 1, "favicon.ico") == 0)
+
 		debug((httpd, DEBUG_EXPLODING, "checking httpd->untrustedref"));
 		/*
 		 * first check that this path isn't allowed via .bzdirect file,
@@ -1403,7 +1403,7 @@ transform_request(bozo_httpreq_t *reques
 	 */
 
 	/*
-	 * stop traversing outside our domain 
+	 * stop traversing outside our domain
 	 *
 	 * XXX true security only comes from our parent using chroot(2)
 	 * before execve(2)'ing us.  or our own built in chroot(2) support.
@@ -1527,7 +1527,7 @@ bozo_process_request(bozo_httpreq_t *req
 			(void)bozo_http_error(httpd, 403, request,
 						"no permission to open file");
 		else if (errno == ENOENT) {
-			if (!bozo_dir_index(request, file, isindex)) 
+			if (!bozo_dir_index(request, file, isindex))
 				(void)bozo_http_error(httpd, 404, request,
 							"no file");
 		} else
@@ -1690,7 +1690,7 @@ debug__(bozohttpd_t *httpd, int level, c
 {
 	va_list	ap;
 	int savederrno;
-	
+
 	/* only log if the level is low enough */
 	if (httpd->debug < level)
 		return;

Index: src/libexec/httpd/bozohttpd.h
diff -u src/libexec/httpd/bozohttpd.h:1.28 src/libexec/httpd/bozohttpd.h:1.29
--- src/libexec/httpd/bozohttpd.h:1.28	Wed Sep  4 22:59:50 2013
+++ src/libexec/httpd/bozohttpd.h	Sat Oct 12 07:49:40 2013
@@ -1,4 +1,4 @@
-/*	$NetBSD: bozohttpd.h,v 1.28 2013/09/04 22:59:50 pooka Exp $	*/
+/*	$NetBSD: bozohttpd.h,v 1.29 2013/10/12 07:49:40 mbalmer Exp $	*/
 
 /*	$eterna: bozohttpd.h,v 1.39 2011/11/18 09:21:15 mrg Exp $	*/
 
@@ -121,7 +121,7 @@ typedef struct bozo_httpreq_t {
 					   to hr_httpd->virthostname) */
 	char	*hr_file;
 	char	*hr_oldfile;	/* if we added an index_html */
-	char	*hr_query;  
+	char	*hr_query;
 	const char *hr_proto;
 	const char *hr_content_type;
 	const char *hr_content_length;
@@ -184,7 +184,7 @@ typedef struct bozoprefs_t {
 void	debug__(bozohttpd_t *, int, const char *, ...) BOZO_PRINTFLIKE(3, 4);
 #define debug(x)	debug__ x
 #else
-#define	debug(x)	
+#define	debug(x)
 #endif /* NO_DEBUG */
 
 void	bozo_warn(bozohttpd_t *, const char *, ...)

Reply via email to