Welcome to mirror list, hosted at ThFree Co, Russian Federation.

cygwin.com/git/newlib-cygwin.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorChristopher Faylor <me@cgf.cx>2008-11-26 20:21:04 +0300
committerChristopher Faylor <me@cgf.cx>2008-11-26 20:21:04 +0300
commit025c1fac6ee41d7814af7d114791dbf4c22ed617 (patch)
tree40ed7d77fb6578653e57e1f4693dbe594c13218a /winsup/cygwin/syscalls.cc
parentf43f75a09db3935effc2f56ecd47b55e3b7c9300 (diff)
Remove unneeded whitespace.
* fhandler_fifo.cc (fhandler_fifo::open): Rework to cause errno to be set to ENXIO when opening a fifo write/nonblocking. * environ.cc (ucreqenv): Rename to ucenv. Move code from old ucenv here and conditionalize it on create_upcaseenv. (ucenv): Delete. (environ_init): Fix compiler warning by moving create_upcaseenv test to ucenv. Don't bother checking for child_proc_info when calling ucenv since it is assumed to be NULL at the point where the function is called. * path.cc (symlink_worker): Turn off MS-DOS path warnings when dealing with devices since the device handler passes in a translated MS-DOS path. * sec_auth.cc (lsaprivkeyauth): Avoid variable initialization which causes a compiler error. * fhandler_netdrive.cc: Update copyright.
Diffstat (limited to 'winsup/cygwin/syscalls.cc')
-rw-r--r--winsup/cygwin/syscalls.cc16
1 files changed, 8 insertions, 8 deletions
diff --git a/winsup/cygwin/syscalls.cc b/winsup/cygwin/syscalls.cc
index 4590c37a8..5b632f03d 100644
--- a/winsup/cygwin/syscalls.cc
+++ b/winsup/cygwin/syscalls.cc
@@ -2504,7 +2504,7 @@ seteuid32 (__uid32_t uid)
the privileged user instead of using the orignal token. This can have
unfortunate side effects. The created token has different group
memberships, different user rights, and misses possible network
- credentials.
+ credentials.
Therefore we try this shortcut now. When switching back to the
privileged user, we probably always want a correct (aka original)
user token for this privileged user, not only in sshd. */
@@ -2537,7 +2537,7 @@ seteuid32 (__uid32_t uid)
{
new_token = lsaprivkeyauth (pw_new);
if (new_token)
- {
+ {
/* We have to verify this token since settings in /etc/group
might render it unusable im terms of group membership. */
if (!verify_token (new_token, usersid, groups))
@@ -2547,7 +2547,7 @@ seteuid32 (__uid32_t uid)
}
}
if (!new_token)
- {
+ {
debug_printf ("lsaprivkeyauth failed, try lsaauth.");
if (!(new_token = lsaauth (usersid, groups, pw_new)))
{
@@ -3619,7 +3619,7 @@ gen_full_path_at (char *path_ret, int dirfd, const char *pathname,
if (dirfd == AT_FDCWD)
p = stpcpy (path_ret, cygheap->cwd.posix);
else
- {
+ {
cygheap_fdget cfd (dirfd);
if (cfd < 0)
return -1;
@@ -3631,7 +3631,7 @@ gen_full_path_at (char *path_ret, int dirfd, const char *pathname,
p = stpcpy (path_ret, cfd->get_name ());
}
if (!p)
- {
+ {
set_errno (ENOTDIR);
return -1;
}
@@ -3655,7 +3655,7 @@ openat (int dirfd, const char *pathname, int flags, ...)
char *path = tp.c_get ();
if (gen_full_path_at (path, dirfd, pathname))
return -1;
-
+
va_list ap;
mode_t mode;
@@ -3680,11 +3680,11 @@ faccessat (int dirfd, const char *pathname, int mode, int flags)
if (flags & ~(F_OK|R_OK|W_OK|X_OK))
set_errno (EINVAL);
else
- {
+ {
fhandler_base *fh = build_fh_name (path, NULL,
(flags & AT_SYMLINK_NOFOLLOW)
? PC_SYM_NOFOLLOW : PC_SYM_FOLLOW,
- stat_suffixes);
+ stat_suffixes);
if (fh)
{
res = fh->fhaccess (mode);