Fix indentation levels

Reviewed-By: Alexander Bokovoy <abokovoy@redhat.com>
Reviewed-By: Christian Heimes <cheimes@redhat.com>
This commit is contained in:
Alexander Bokovoy 2018-07-10 18:05:19 +03:00 committed by Christian Heimes
parent e913fdc8aa
commit 38204856fd

View File

@ -286,8 +286,8 @@ free_and_error:
* slapi_pblock_destroy(pb) * slapi_pblock_destroy(pb)
*/ */
static int pwd_get_values(const Slapi_Entry *ent, const char *attrname, static int pwd_get_values(const Slapi_Entry *ent, const char *attrname,
Slapi_ValueSet** results, char** actual_type_name, Slapi_ValueSet** results, char** actual_type_name,
int *buffer_flags) int *buffer_flags)
{ {
int flags=0; int flags=0;
int type_name_disposition = 0; int type_name_disposition = 0;
@ -560,7 +560,7 @@ int ipapwd_CheckPolicy(struct ipapwd_data *data)
LOG_TRACE("No password policy, use defaults"); LOG_TRACE("No password policy, use defaults");
} }
break; break;
case IPA_CHANGETYPE_ADMIN: case IPA_CHANGETYPE_ADMIN:
/* The expiration date needs to be older than the current time /* The expiration date needs to be older than the current time
* otherwise the KDC may not immediately register the password * otherwise the KDC may not immediately register the password
* as expired. The last password change needs to match the * as expired. The last password change needs to match the
@ -636,7 +636,7 @@ int ipapwd_CheckPolicy(struct ipapwd_data *data)
} }
/* Searches the dn in directory, /* Searches the dn in directory,
* If found : fills in slapi_entry structure and returns 0 * If found : fills in slapi_entry structure and returns 0
* If NOT found : returns the search result as LDAP_NO_SUCH_OBJECT * If NOT found : returns the search result as LDAP_NO_SUCH_OBJECT
*/ */
int ipapwd_getEntry(const char *dn, Slapi_Entry **e2, char **attrlist) int ipapwd_getEntry(const char *dn, Slapi_Entry **e2, char **attrlist)
@ -795,22 +795,21 @@ int ipapwd_SetPassword(struct ipapwd_krbcfg *krbcfg,
slapi_mods_add_mod_values(smods, LDAP_MOD_REPLACE, slapi_mods_add_mod_values(smods, LDAP_MOD_REPLACE,
"krbPrincipalKey", svals); "krbPrincipalKey", svals);
/* krbLastPwdChange is used to tell whether a host entry has a /* krbLastPwdChange is used to tell whether a host entry has a
* keytab so don't set it on hosts. * keytab so don't set it on hosts. */
*/
if (!is_host) { if (!is_host) {
/* change Last Password Change field with the current date */ /* change Last Password Change field with the current date */
ret = ipapwd_setdate(data->target, smods, "krbLastPwdChange", ret = ipapwd_setdate(data->target, smods, "krbLastPwdChange",
data->timeNow, false); data->timeNow, false);
if (ret != LDAP_SUCCESS) if (ret != LDAP_SUCCESS)
goto free_and_return; goto free_and_return;
/* set Password Expiration date */ /* set Password Expiration date */
ret = ipapwd_setdate(data->target, smods, "krbPasswordExpiration", ret = ipapwd_setdate(data->target, smods, "krbPasswordExpiration",
data->expireTime, (data->expireTime == 0)); data->expireTime, (data->expireTime == 0));
if (ret != LDAP_SUCCESS) if (ret != LDAP_SUCCESS)
goto free_and_return; goto free_and_return;
} }
} }
if (nt && is_smb) { if (nt && is_smb) {