diff options
author | Guenter Knauf <fuankg@apache.org> | 2009-11-01 06:33:22 +0000 |
---|---|---|
committer | Guenter Knauf <fuankg@apache.org> | 2009-11-01 06:33:22 +0000 |
commit | fb6cd4ce862af9d227458c1524014387dd4b91cc (patch) | |
tree | ce51186937aaad0f0b017709c8d45e15d600ade3 /support/dbmmanage.in | |
parent | c09a39aac92b1fbe09b1d01bb6b33c2af40c287c (diff) | |
download | httpd-fb6cd4ce862af9d227458c1524014387dd4b91cc.tar.gz |
tab and trailing space police.
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@831644 13f79535-47bb-0310-9956-ffa450edef68
Diffstat (limited to 'support/dbmmanage.in')
-rw-r--r-- | support/dbmmanage.in | 46 |
1 files changed, 23 insertions, 23 deletions
diff --git a/support/dbmmanage.in b/support/dbmmanage.in index df78f503cb..2dd8c8679b 100644 --- a/support/dbmmanage.in +++ b/support/dbmmanage.in @@ -53,9 +53,9 @@ sub need_sha1_crypt { print STDERR <<SHAERR; dbmmanage SHA1 passwords require the interface or the module Digest::SHA1 available from CPAN: - + http://www.cpan.org/modules/by-module/Digest/Digest-MD5-2.12.tar.gz - + Please install Digest::SHA1 and try again, or use a different crypt option: SHAERR @@ -67,9 +67,9 @@ sub need_md5_crypt { if (!eval ('require "Crypt/PasswdMD5.pm";')) { print STDERR <<MD5ERR; dbmmanage MD5 passwords require the module Crypt::PasswdMD5 available from CPAN - + http://www.cpan.org/modules/by-module/Crypt/Crypt-PasswdMD5-1.1.tar.gz - + Please install Crypt::PasswdMD5 and try again, or use a different crypt option: MD5ERR @@ -111,7 +111,7 @@ if ($crypt_not_supported) { if (@ARGV[0] eq "-d") { shift @ARGV; if ($crypt_not_supported) { - print STDERR + print STDERR "Warning: Apache/$^O does not support crypt()ed passwords!\n\n"; } $crypt_method = "crypt"; @@ -125,7 +125,7 @@ if (@ARGV[0] eq "-m") { if (@ARGV[0] eq "-p") { shift @ARGV; if (!$crypt_not_supported) { - print STDERR + print STDERR "Warning: Apache/$^O does not support plaintext passwords!\n\n"; } $crypt_method = "plain"; @@ -152,7 +152,7 @@ $file =~ s/\.($chop)$//; my $is_update = $command eq "update"; my %DB = (); my @range = (); -my($mode, $flags) = $command =~ +my($mode, $flags) = $command =~ /^(?:view|check)$/ ? (0644, O_RDONLY) : (0644, O_RDWR|O_CREAT); tie (%DB, "AnyDBM_File", $file, $flags, $mode) || die "Can't tie $file: $!"; @@ -164,11 +164,11 @@ my $x; sub genseed { my $psf; if ($not_unix) { - srand (time ^ $$ or time ^ ($$ + ($$ << 15))); + srand (time ^ $$ or time ^ ($$ + ($$ << 15))); } else { - for (qw(-xlwwa -le)) { - `ps $_ 2>/dev/null`; + for (qw(-xlwwa -le)) { + `ps $_ 2>/dev/null`; $psf = $_, last unless $?; } srand (time ^ $$ ^ unpack("%L*", `ps $psf | gzip -f`)); @@ -177,14 +177,14 @@ sub genseed { $x = int scalar @range; } -sub randchar { +sub randchar { join '', map $range[rand $x], 1..shift||1; } sub saltpw_crypt { - genseed() unless @range; - return $newstyle_salt ? - join '', "_", randchar, "a..", randchar(4) : + genseed() unless @range; + return $newstyle_salt ? + join '', "_", randchar, "a..", randchar(4) : randchar(2); } @@ -195,7 +195,7 @@ sub cryptpw_crypt { } sub saltpw_md5 { - genseed() unless @range; + genseed() unless @range; randchar(8); } @@ -224,15 +224,15 @@ sub cryptpw { sub getpass { my $prompt = shift || "Enter password:"; - unless($not_unix) { - open STDIN, "/dev/tty" or warn "couldn't open /dev/tty $!\n"; - system "stty -echo;"; + unless($not_unix) { + open STDIN, "/dev/tty" or warn "couldn't open /dev/tty $!\n"; + system "stty -echo;"; } my($c,$pwd); print STDERR $prompt; while (($c = getc(STDIN)) ne '' and $c ne "\n" and $c ne "\r") { - $pwd .= $c; + $pwd .= $c; } system "stty echo" unless $not_unix; @@ -257,7 +257,7 @@ sub dbmc::update { sub dbmc::add { die "Can't use empty password!\n" unless $crypted_pwd; unless($is_update) { - die "Sorry, user `$key' already exists!\n" if $DB{$key}; + die "Sorry, user `$key' already exists!\n" if $DB{$key}; } $groups = '' if $groups eq '-'; $comment = '' if $comment eq '-'; @@ -299,14 +299,14 @@ sub dbmc::check { } else { $crypt_method = "plain"; } - print $crypt_method . (cryptpw($testpass, $chkpass) eq $chkpass + print $crypt_method . (cryptpw($testpass, $chkpass) eq $chkpass ? " password ok\n" : " password mismatch\n"); } sub dbmc::import { while(defined($_ = <STDIN>) and chomp) { - ($key,$crypted_pwd,$groups,$comment) = split /:/, $_, 4; - dbmc->add; + ($key,$crypted_pwd,$groups,$comment) = split /:/, $_, 4; + dbmc->add; } } |