[xmlsec] remove spaces from eols



commit 6db367dcb8112afb94855adf27e2dc271b0a5cdc
Author: Aleksey Sanin <aleksey aleksey com>
Date:   Sat Apr 24 15:02:57 2010 -0700

    remove spaces from eols

 include/xmlsec/mscrypto/crypto.h |   12 ++++----
 src/mscrypto/certkeys.c          |   38 +++++++++++++-------------
 src/mscrypto/ciphers.c           |   12 ++++----
 src/mscrypto/crypto.c            |   54 ++++++++++++++++++------------------
 src/mscrypto/digests.c           |   52 +++++++++++++++++-----------------
 src/mscrypto/signatures.c        |   56 +++++++++++++++++++-------------------
 6 files changed, 112 insertions(+), 112 deletions(-)
---
diff --git a/include/xmlsec/mscrypto/crypto.h b/include/xmlsec/mscrypto/crypto.h
index 56d6863..d5a86da 100644
--- a/include/xmlsec/mscrypto/crypto.h
+++ b/include/xmlsec/mscrypto/crypto.h
@@ -164,7 +164,7 @@ XMLSEC_CRYPTO_EXPORT xmlSecTransformId xmlSecMSCryptoTransformRsaSha1GetKlass(vo
 
 /**
  * xmlSecMSCryptoTransformRsaSha256Id:
- * 
+ *
  * The RSA-SHA256 signature transform klass.
  */
 
@@ -174,7 +174,7 @@ XMLSEC_CRYPTO_EXPORT xmlSecTransformId xmlSecMSCryptoTransformRsaSha256GetKlass(
 
 /**
  * xmlSecMSCryptoTransformRsaSha384Id:
- * 
+ *
  * The RSA-SHA384 signature transform klass.
  */
 
@@ -184,7 +184,7 @@ XMLSEC_CRYPTO_EXPORT xmlSecTransformId xmlSecMSCryptoTransformRsaSha384GetKlass(
 
 /**
  * xmlSecMSCryptoTransformRsaSha512Id:
- * 
+ *
  * The RSA-SHA512 signature transform klass.
  */
 
@@ -239,7 +239,7 @@ XMLSEC_CRYPTO_EXPORT xmlSecTransformId xmlSecMSCryptoTransformSha1GetKlass(void)
 
 /**
  * xmlSecMSCryptoTransformSha256Id:
- * 
+ *
  * The SHA256 digest transform klass.
  */
 #define xmlSecMSCryptoTransformSha256Id \
@@ -256,7 +256,7 @@ XMLSEC_CRYPTO_EXPORT xmlSecTransformId xmlSecMSCryptoTransformSha256GetKlass(voi
 
 /**
  * xmlSecMSCryptoTransformSha384Id:
- * 
+ *
  * The SHA384 digest transform klass.
  */
 #define xmlSecMSCryptoTransformSha384Id \
@@ -273,7 +273,7 @@ XMLSEC_CRYPTO_EXPORT xmlSecTransformId xmlSecMSCryptoTransformSha384GetKlass(voi
 
 /**
  * xmlSecMSCryptoTransformSha512Id:
- * 
+ *
  * The SHA512 digest transform klass.
  */
 #define xmlSecMSCryptoTransformSha512Id \
diff --git a/src/mscrypto/certkeys.c b/src/mscrypto/certkeys.c
index b76519e..af9eade 100644
--- a/src/mscrypto/certkeys.c
+++ b/src/mscrypto/certkeys.c
@@ -608,7 +608,7 @@ xmlSecMSCryptoKeyDataGetCert(xmlSecKeyDataPtr data) {
 
 /**
  * xmlSecMSCryptoKeyDataGetMSCryptoProvider:
- * @data:              the key data 
+ * @data:              the key data
  *
  * Gets crypto provider handle
  *
@@ -629,7 +629,7 @@ xmlSecMSCryptoKeyDataGetMSCryptoProvider(xmlSecKeyDataPtr data) {
 
 /**
  * xmlSecMSCryptoKeyDataGetMSCryptoKeySpec:
- * @data:              the key data 
+ * @data:              the key data
  *
  * Gets key spec info.
  *
@@ -997,16 +997,16 @@ static xmlSecKeyDataKlass xmlSecMSCryptoKeyDataRsaKlass = {
     NULL,                                       /* void* reserved1; */
 };
 
-/* Ordered list of providers to search for algorithm implementation using 
+/* Ordered list of providers to search for algorithm implementation using
  * xmlSecMSCryptoFindProvider() function
- * 
- * MUST END with { NULL, 0 } !!! 
+ *
+ * MUST END with { NULL, 0 } !!!
  */
 static xmlSecMSCryptoProviderInfo xmlSecMSCryptoProviderInfo_Rsa[] = {
-    { XMLSEC_CRYPTO_MS_ENH_RSA_AES_PROV,    PROV_RSA_AES},      
-    { XMLSEC_CRYPTO_MS_ENH_RSA_AES_PROV_PROTOTYPE,       PROV_RSA_AES },    
-    { MS_STRONG_PROV,               PROV_RSA_FULL }, 
-    { MS_ENHANCED_PROV,             PROV_RSA_FULL }, 
+    { XMLSEC_CRYPTO_MS_ENH_RSA_AES_PROV,    PROV_RSA_AES},
+    { XMLSEC_CRYPTO_MS_ENH_RSA_AES_PROV_PROTOTYPE,       PROV_RSA_AES },
+    { MS_STRONG_PROV,               PROV_RSA_FULL },
+    { MS_ENHANCED_PROV,             PROV_RSA_FULL },
     { NULL, 0 }
 };
 
@@ -1229,7 +1229,7 @@ xmlSecMSCryptoKeyDataRsaXmlRead(xmlSecKeyDataId id, xmlSecKeyPtr key,
                     XMLSEC_ERRORS_NO_MESSAGE);
         goto done;
     }
-    
+
     if (!CryptImportKey(hProv, xmlSecBufferGetData(&blob), xmlSecBufferGetSize(&blob), 0, 0, &hKey)) {
         xmlSecError(XMLSEC_ERRORS_HERE,
                     xmlSecErrorsSafeString(xmlSecKeyDataKlassGetName(id)),
@@ -1698,13 +1698,13 @@ static xmlSecKeyDataKlass xmlSecMSCryptoKeyDataDsaKlass = {
     NULL,                               /* void* reserved1; */
 };
 
-/* Ordered list of providers to search for algorithm implementation using 
+/* Ordered list of providers to search for algorithm implementation using
  * xmlSecMSCryptoFindProvider() function
- * 
- * MUST END with { NULL, 0 } !!! 
+ *
+ * MUST END with { NULL, 0 } !!!
  */
 static xmlSecMSCryptoProviderInfo xmlSecMSCryptoProviderInfo_Dss[] = {
-    { MS_DEF_DSS_PROV,              PROV_DSS }, 
+    { MS_DEF_DSS_PROV,              PROV_DSS },
     { NULL, 0 }
 };
 
@@ -2530,14 +2530,14 @@ static xmlSecKeyDataKlass xmlSecMSCryptoKeyDataGost2001Klass = {
     NULL,                               /* void* reserved1; */
 };
 
-/* Ordered list of providers to search for algorithm implementation using 
+/* Ordered list of providers to search for algorithm implementation using
  * xmlSecMSCryptoFindProvider() function
- * 
- * MUST END with { NULL, 0 } !!! 
+ *
+ * MUST END with { NULL, 0 } !!!
  */
 static xmlSecMSCryptoProviderInfo xmlSecMSCryptoProviderInfo_Gost[] = {
-    { MAGPRO_CSP,                   PROV_MAGPRO_GOST }, 
-    { CRYPTOPRO_CSP,                PROV_CRYPTOPRO_GOST }, 
+    { MAGPRO_CSP,                   PROV_MAGPRO_GOST },
+    { CRYPTOPRO_CSP,                PROV_CRYPTOPRO_GOST },
     { NULL, 0 }
 };
 
diff --git a/src/mscrypto/ciphers.c b/src/mscrypto/ciphers.c
index 948d496..f6e8297 100644
--- a/src/mscrypto/ciphers.c
+++ b/src/mscrypto/ciphers.c
@@ -467,22 +467,22 @@ static int      xmlSecMSCryptoBlockCipherCheckId        (xmlSecTransformPtr tran
 
 
 
-/* Ordered list of providers to search for algorithm implementation using 
+/* Ordered list of providers to search for algorithm implementation using
  * xmlSecMSCryptoFindProvider() function
- * 
- * MUST END with { NULL, 0 } !!! 
+ *
+ * MUST END with { NULL, 0 } !!!
  */
 #ifndef XMLSEC_NO_DES
 static xmlSecMSCryptoProviderInfo xmlSecMSCryptoProviderInfo_Des[] = {
-    { MS_STRONG_PROV,               PROV_RSA_FULL }, 
-    { MS_ENHANCED_PROV,             PROV_RSA_FULL }, 
+    { MS_STRONG_PROV,               PROV_RSA_FULL },
+    { MS_ENHANCED_PROV,             PROV_RSA_FULL },
     { NULL, 0 }
 };
 #endif /* XMLSEC_NO_DES */
 
 #ifndef XMLSEC_NO_AES
 static xmlSecMSCryptoProviderInfo xmlSecMSCryptoProviderInfo_Aes[] = {
-    { XMLSEC_CRYPTO_MS_ENH_RSA_AES_PROV,    PROV_RSA_AES},      
+    { XMLSEC_CRYPTO_MS_ENH_RSA_AES_PROV,    PROV_RSA_AES},
     { XMLSEC_CRYPTO_MS_ENH_RSA_AES_PROV_PROTOTYPE,       PROV_RSA_AES },
     { NULL, 0 }
 };
diff --git a/src/mscrypto/crypto.c b/src/mscrypto/crypto.c
index 82e46dc..62e2530 100644
--- a/src/mscrypto/crypto.c
+++ b/src/mscrypto/crypto.c
@@ -132,13 +132,13 @@ xmlSecCryptoGetFunctions_mscrypto(void) {
 #ifndef XMLSEC_NO_SHA1
     gXmlSecMSCryptoFunctions->transformSha1GetKlass             = xmlSecMSCryptoTransformSha1GetKlass;
 #endif /* XMLSEC_NO_SHA1 */
-#ifndef XMLSEC_NO_SHA256    
+#ifndef XMLSEC_NO_SHA256
     gXmlSecMSCryptoFunctions->transformSha256GetKlass          = xmlSecMSCryptoTransformSha256GetKlass;
 #endif /* XMLSEC_NO_SHA256 */
-#ifndef XMLSEC_NO_SHA384    
+#ifndef XMLSEC_NO_SHA384
     gXmlSecMSCryptoFunctions->transformSha384GetKlass          = xmlSecMSCryptoTransformSha384GetKlass;
 #endif /* XMLSEC_NO_SHA384 */
-#ifndef XMLSEC_NO_SHA512    
+#ifndef XMLSEC_NO_SHA512
     gXmlSecMSCryptoFunctions->transformSha512GetKlass          = xmlSecMSCryptoTransformSha512GetKlass;
 #endif /* XMLSEC_NO_SHA512 */
 
@@ -456,11 +456,11 @@ xmlSecMSCryptoConvertLocaleToUnicode(const char* str) {
  *
  * Returns: provider handle on success or NULL for error.
  */
-HCRYPTPROV 
-xmlSecMSCryptoFindProvider(const xmlSecMSCryptoProviderInfo * providers, 
-                           LPCTSTR pszContainer, 
-                           DWORD dwFlags, 
-                           BOOL bUseXmlSecContainer) 
+HCRYPTPROV
+xmlSecMSCryptoFindProvider(const xmlSecMSCryptoProviderInfo * providers,
+                           LPCTSTR pszContainer,
+                           DWORD dwFlags,
+                           BOOL bUseXmlSecContainer)
 {
     HCRYPTPROV res = 0;
     DWORD dwLastError;
@@ -468,18 +468,18 @@ xmlSecMSCryptoFindProvider(const xmlSecMSCryptoProviderInfo * providers,
     int ii;
 
     xmlSecAssert2(providers != NULL, 0);
-    
+
     for(ii = 0; (res == 0) && (providers[ii].providerName != NULL) && (providers[ii].providerType != 0); ++ii) {
         /* first try */
-        ret = CryptAcquireContext(&res, 
-                    pszContainer, 
-                    providers[ii].providerName, 
-                    providers[ii].providerType, 
+        ret = CryptAcquireContext(&res,
+                    pszContainer,
+                    providers[ii].providerName,
+                    providers[ii].providerType,
                     dwFlags);
         if((ret == TRUE) && (res != 0)) {
             return (res);
-        } 
-            
+        }
+
         /* check errors */
         dwLastError = GetLastError();
         switch(dwLastError) {
@@ -490,10 +490,10 @@ xmlSecMSCryptoFindProvider(const xmlSecMSCryptoProviderInfo * providers,
              * This is also referenced in
              * http://www.microsoft.com/mind/0697/crypto.asp (inituser)
              */
-            ret = CryptAcquireContext(&res, 
-                        pszContainer, 
-                        providers[ii].providerName, 
-                        providers[ii].providerType, 
+            ret = CryptAcquireContext(&res,
+                        pszContainer,
+                        providers[ii].providerName,
+                        providers[ii].providerType,
                         CRYPT_NEWKEYSET | dwFlags);
             if((ret == TRUE) && (res != 0)) {
                 return (res);
@@ -503,23 +503,23 @@ xmlSecMSCryptoFindProvider(const xmlSecMSCryptoProviderInfo * providers,
         case NTE_EXISTS:
             /* If we can, try our container */
             if(bUseXmlSecContainer == TRUE) {
-                ret = CryptAcquireContext(&res, 
-                            XMLSEC_CONTAINER_NAME, 
-                            providers[ii].providerName, 
-                            providers[ii].providerType, 
+                ret = CryptAcquireContext(&res,
+                            XMLSEC_CONTAINER_NAME,
+                            providers[ii].providerName,
+                            providers[ii].providerType,
                             CRYPT_NEWKEYSET | dwFlags);
                 if((ret == TRUE) && (res != 0)) {
-                    /* ALEKSEY TODO - NEED TO DELETE ALL THE TEMP CONTEXTS ON SHUTDOWN 
+                    /* ALEKSEY TODO - NEED TO DELETE ALL THE TEMP CONTEXTS ON SHUTDOWN
 
                         CryptAcquireContext(&tmp, XMLSEC_CONTAINER_NAME,
-                            providers[ii].providerName, 
-                            providers[ii].providerType, 
+                            providers[ii].providerName,
+                            providers[ii].providerType,
                             CRYPT_DELETEKEYSET);
 
                      */
                     return (res);
                 }
-            }                    
+            }
             break;
 
         default:
diff --git a/src/mscrypto/digests.c b/src/mscrypto/digests.c
index b237b69..d476a0d 100644
--- a/src/mscrypto/digests.c
+++ b/src/mscrypto/digests.c
@@ -60,22 +60,22 @@ static int      xmlSecMSCryptoDigestExecute     (xmlSecTransformPtr transform,
 static int      xmlSecMSCryptoDigestCheckId     (xmlSecTransformPtr transform);
 
 
-/* Ordered list of providers to search for algorithm implementation using 
+/* Ordered list of providers to search for algorithm implementation using
  * xmlSecMSCryptoFindProvider() function
- * 
- * MUST END with { NULL, 0 } !!! 
+ *
+ * MUST END with { NULL, 0 } !!!
  */
 static xmlSecMSCryptoProviderInfo xmlSecMSCryptoProviderInfo_Sha[] = {
-    { XMLSEC_CRYPTO_MS_ENH_RSA_AES_PROV,    PROV_RSA_AES},      
-    { XMLSEC_CRYPTO_MS_ENH_RSA_AES_PROV_PROTOTYPE,       PROV_RSA_AES },    
-    { MS_STRONG_PROV,               PROV_RSA_FULL }, 
-    { MS_ENHANCED_PROV,             PROV_RSA_FULL }, 
+    { XMLSEC_CRYPTO_MS_ENH_RSA_AES_PROV,    PROV_RSA_AES},
+    { XMLSEC_CRYPTO_MS_ENH_RSA_AES_PROV_PROTOTYPE,       PROV_RSA_AES },
+    { MS_STRONG_PROV,               PROV_RSA_FULL },
+    { MS_ENHANCED_PROV,             PROV_RSA_FULL },
     { NULL, 0 }
 };
 
 static xmlSecMSCryptoProviderInfo xmlSecMSCryptoProviderInfo_Gost[] = {
-    { MAGPRO_CSP,                   PROV_MAGPRO_GOST }, 
-    { CRYPTOPRO_CSP,                PROV_CRYPTOPRO_GOST }, 
+    { MAGPRO_CSP,                   PROV_MAGPRO_GOST },
+    { CRYPTOPRO_CSP,                PROV_CRYPTOPRO_GOST },
     { NULL, 0 }
 };
 
@@ -91,19 +91,19 @@ xmlSecMSCryptoDigestCheckId(xmlSecTransformPtr transform) {
     if(xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformSha256Id)) {
         return(1);
     }
-#endif /* XMLSEC_NO_SHA256 */    
+#endif /* XMLSEC_NO_SHA256 */
 
 #ifndef XMLSEC_NO_SHA384
     if(xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformSha384Id)) {
         return(1);
     }
-#endif /* XMLSEC_NO_SHA384 */    
+#endif /* XMLSEC_NO_SHA384 */
 
 #ifndef XMLSEC_NO_SHA512
     if(xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformSha512Id)) {
         return(1);
     }
-#endif /* XMLSEC_NO_SHA512 */    
+#endif /* XMLSEC_NO_SHA512 */
 
 #ifndef XMLSEC_NO_GOST
     if(xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformGostR3411_94Id)) {
@@ -138,21 +138,21 @@ xmlSecMSCryptoDigestInitialize(xmlSecTransformPtr transform) {
     if(xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformSha256Id)) {
         ctx->alg_id = CALG_SHA_256;
         ctx->providers = xmlSecMSCryptoProviderInfo_Sha;
-    } else 
-#endif /* XMLSEC_NO_SHA256 */    
+    } else
+#endif /* XMLSEC_NO_SHA256 */
 
 #ifndef XMLSEC_NO_SHA384
     if(xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformSha384Id)) {
         ctx->alg_id = CALG_SHA_384;
         ctx->providers = xmlSecMSCryptoProviderInfo_Sha;
-    } else 
-#endif /* XMLSEC_NO_SHA384 */    
+    } else
+#endif /* XMLSEC_NO_SHA384 */
 
 #ifndef XMLSEC_NO_SHA512
     if(xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformSha512Id)) {
         ctx->alg_id = CALG_SHA_512;
         ctx->providers = xmlSecMSCryptoProviderInfo_Sha;
-    } else 
+    } else
 #endif /* XMLSEC_NO_SHA512 */
 
 #ifndef XMLSEC_NO_GOST
@@ -439,19 +439,19 @@ static xmlSecTransformKlass xmlSecMSCryptoSha256Klass = {
     xmlSecTransformDefaultPopBin,              /* xmlSecTransformPopBinMethod popBin; */
     NULL,                                      /* xmlSecTransformPushXmlMethod pushXml; */
     NULL,                                      /* xmlSecTransformPopXmlMethod popXml; */
-    xmlSecMSCryptoDigestExecute,               /* xmlSecTransformExecuteMethod execute; */    
+    xmlSecMSCryptoDigestExecute,               /* xmlSecTransformExecuteMethod execute; */
     NULL,                                      /* void* reserved0; */
     NULL,                                      /* void* reserved1; */
 };
 
-/** 
+/**
  * xmlSecMSCryptoTransformSha256GetKlass:
  *
  * SHA-256 digest transform klass.
  *
  * Returns pointer to SHA-256 digest transform klass.
  */
-xmlSecTransformId 
+xmlSecTransformId
 xmlSecMSCryptoTransformSha256GetKlass(void) {
     return(&xmlSecMSCryptoSha256Klass);
 }
@@ -483,19 +483,19 @@ static xmlSecTransformKlass xmlSecMSCryptoSha384Klass = {
     xmlSecTransformDefaultPopBin,              /* xmlSecTransformPopBinMethod popBin; */
     NULL,                                      /* xmlSecTransformPushXmlMethod pushXml; */
     NULL,                                      /* xmlSecTransformPopXmlMethod popXml; */
-    xmlSecMSCryptoDigestExecute,               /* xmlSecTransformExecuteMethod execute; */    
+    xmlSecMSCryptoDigestExecute,               /* xmlSecTransformExecuteMethod execute; */
     NULL,                                      /* void* reserved0; */
     NULL,                                      /* void* reserved1; */
 };
 
-/** 
+/**
  * xmlSecMSCryptoTransformSha384GetKlass:
  *
  * SHA-384 digest transform klass.
  *
  * Returns pointer to SHA-384 digest transform klass.
  */
-xmlSecTransformId 
+xmlSecTransformId
 xmlSecMSCryptoTransformSha384GetKlass(void) {
     return(&xmlSecMSCryptoSha384Klass);
 }
@@ -527,19 +527,19 @@ static xmlSecTransformKlass xmlSecMSCryptoSha512Klass = {
     xmlSecTransformDefaultPopBin,              /* xmlSecTransformPopBinMethod popBin; */
     NULL,                                      /* xmlSecTransformPushXmlMethod pushXml; */
     NULL,                                      /* xmlSecTransformPopXmlMethod popXml; */
-    xmlSecMSCryptoDigestExecute,               /* xmlSecTransformExecuteMethod execute; */    
+    xmlSecMSCryptoDigestExecute,               /* xmlSecTransformExecuteMethod execute; */
     NULL,                                      /* void* reserved0; */
     NULL,                                      /* void* reserved1; */
 };
 
-/** 
+/**
  * xmlSecMSCryptoTransformSha512GetKlass:
  *
  * SHA-512 digest transform klass.
  *
  * Returns pointer to SHA-512 digest transform klass.
  */
-xmlSecTransformId 
+xmlSecTransformId
 xmlSecMSCryptoTransformSha512GetKlass(void) {
     return(&xmlSecMSCryptoSha512Klass);
 }
diff --git a/src/mscrypto/signatures.c b/src/mscrypto/signatures.c
index a003e43..e542a13 100644
--- a/src/mscrypto/signatures.c
+++ b/src/mscrypto/signatures.c
@@ -130,26 +130,26 @@ static int xmlSecMSCryptoSignatureInitialize(xmlSecTransformPtr transform) {
         ctx->keyId          = xmlSecMSCryptoKeyDataRsaId;
     } else
 
-#ifndef XMLSEC_NO_SHA256 
+#ifndef XMLSEC_NO_SHA256
     if(xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformRsaSha256Id)) {
         ctx->digestAlgId    = CALG_SHA_256;
         ctx->keyId          = xmlSecMSCryptoKeyDataRsaId;
     } else
-#endif /* XMLSEC_NO_SHA256 */ 
+#endif /* XMLSEC_NO_SHA256 */
 
 #ifndef XMLSEC_NO_SHA384
     if(xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformRsaSha384Id)) {
         ctx->digestAlgId    = CALG_SHA_384;
         ctx->keyId          = xmlSecMSCryptoKeyDataRsaId;
     } else
-#endif /* XMLSEC_NO_SHA384 */ 
+#endif /* XMLSEC_NO_SHA384 */
 
 #ifndef XMLSEC_NO_SHA512
     if(xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformRsaSha512Id)) {
         ctx->digestAlgId    = CALG_SHA_512;
         ctx->keyId          = xmlSecMSCryptoKeyDataRsaId;
     } else
-#endif /* XMLSEC_NO_SHA512 */ 
+#endif /* XMLSEC_NO_SHA512 */
 
 #endif /* XMLSEC_NO_RSA */
 
@@ -310,24 +310,24 @@ static int xmlSecMSCryptoSignatureVerify(xmlSecTransformPtr transform,
 #ifndef XMLSEC_NO_RSA
     if (xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformRsaSha1Id)) {
         ConvertEndian(data, tmpBuf, dataSize);
-    } else 
+    } else
 
 #ifndef XMLSEC_NO_SHA256
     if (xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformRsaSha256Id)) {
         ConvertEndian(data, tmpBuf, dataSize);
-    } else 
+    } else
 #endif /* XMLSEC_NO_SHA256 */
 
 #ifndef XMLSEC_NO_SHA384
     if (xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformRsaSha384Id)) {
         ConvertEndian(data, tmpBuf, dataSize);
-    } else 
+    } else
 #endif /* XMLSEC_NO_SHA384 */
 
 #ifndef XMLSEC_NO_SHA512
     if (xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformRsaSha512Id)) {
         ConvertEndian(data, tmpBuf, dataSize);
-    } else 
+    } else
 #endif /* XMLSEC_NO_SHA512 */
 
 #endif /* XMLSEC_NO_RSA */
@@ -336,13 +336,13 @@ static int xmlSecMSCryptoSignatureVerify(xmlSecTransformPtr transform,
     if (xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformDsaSha1Id) && (dataSize == 40)) {
         ConvertEndian(data, tmpBuf, 20);
         ConvertEndian(data + 20, tmpBuf + 20, 20);
-    } else 
+    } else
 #endif /*endif XMLSEC_NO_DSA */
 
 #ifndef XMLSEC_NO_GOST
     if (xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformGost2001GostR3411_94Id)) {
         ConvertEndian(data, tmpBuf, dataSize);
-    } else 
+    } else
 #endif /* XMLSEC_NO_GOST*/
 
     {
@@ -531,24 +531,24 @@ xmlSecMSCryptoSignatureExecute(xmlSecTransformPtr transform, int last, xmlSecTra
 #ifndef XMLSEC_NO_RSA
             if (xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformRsaSha1Id)) {
                 ConvertEndian(tmpBuf, outBuf, outSize);
-            } else 
+            } else
 
 #ifndef XMLSEC_NO_SHA256
             if (xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformRsaSha256Id)) {
                 ConvertEndian(tmpBuf, outBuf, outSize);
-            } else 
+            } else
 #endif /* XMLSEC_NO_SHA256 */
 
 #ifndef XMLSEC_NO_SHA384
             if (xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformRsaSha384Id)) {
                 ConvertEndian(tmpBuf, outBuf, outSize);
-            } else 
+            } else
 #endif /* XMLSEC_NO_SHA384 */
 
 #ifndef XMLSEC_NO_SHA512
             if (xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformRsaSha512Id)) {
                 ConvertEndian(tmpBuf, outBuf, outSize);
-            } else 
+            } else
 #endif /* XMLSEC_NO_SHA512 */
 
 
@@ -558,13 +558,13 @@ xmlSecMSCryptoSignatureExecute(xmlSecTransformPtr transform, int last, xmlSecTra
             if (xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformDsaSha1Id) && (outSize == 40)) {
                 ConvertEndian(tmpBuf, outBuf, 20);
                 ConvertEndian(tmpBuf + 20, outBuf + 20, 20);
-            } else 
+            } else
 #endif /* XMLSEC_NO_DSA*/
 
 #ifndef XMLSEC_NO_GOST
             if (xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformGost2001GostR3411_94Id)) {
                 ConvertEndian(tmpBuf, outBuf, outSize);
-            } else 
+            } else
 #endif /* XMLSEC_NO_GOST*/
 
             {
@@ -657,7 +657,7 @@ static xmlSecTransformKlass xmlSecMSCryptoRsaSha256Klass = {
     xmlSecNameRsaSha256,                       /* const xmlChar* name; */
     xmlSecHrefRsaSha256,                       /* const xmlChar* href; */
     xmlSecTransformUsageSignatureMethod,       /* xmlSecTransformUsage usage; */
-    
+
     xmlSecMSCryptoSignatureInitialize,         /* xmlSecTransformInitializeMethod initialize; */
     xmlSecMSCryptoSignatureFinalize,           /* xmlSecTransformFinalizeMethod finalize; */
     NULL,                                      /* xmlSecTransformNodeReadMethod readNode; */
@@ -671,19 +671,19 @@ static xmlSecTransformKlass xmlSecMSCryptoRsaSha256Klass = {
     NULL,                                      /* xmlSecTransformPushXmlMethod pushXml; */
     NULL,                                      /* xmlSecTransformPopXmlMethod popXml; */
     xmlSecMSCryptoSignatureExecute,            /* xmlSecTransformExecuteMethod execute; */
-    
+
     NULL,                                      /* void* reserved0; */
     NULL,                                      /* void* reserved1; */
 };
 
 /**
  * xmlSecMSCryptoTransformRsaSha256GetKlass:
- * 
+ *
  * The RSA-SHA256 signature transform klass.
  *
  * Returns RSA-SHA256 signature transform klass.
  */
-xmlSecTransformId 
+xmlSecTransformId
 xmlSecMSCryptoTransformRsaSha256GetKlass(void) {
     return(&xmlSecMSCryptoRsaSha256Klass);
 }
@@ -703,7 +703,7 @@ static xmlSecTransformKlass xmlSecMSCryptoRsaSha384Klass = {
     xmlSecNameRsaSha384,                       /* const xmlChar* name; */
     xmlSecHrefRsaSha384,                       /* const xmlChar* href; */
     xmlSecTransformUsageSignatureMethod,       /* xmlSecTransformUsage usage; */
-    
+
     xmlSecMSCryptoSignatureInitialize,         /* xmlSecTransformInitializeMethod initialize; */
     xmlSecMSCryptoSignatureFinalize,           /* xmlSecTransformFinalizeMethod finalize; */
     NULL,                                      /* xmlSecTransformNodeReadMethod readNode; */
@@ -717,19 +717,19 @@ static xmlSecTransformKlass xmlSecMSCryptoRsaSha384Klass = {
     NULL,                                      /* xmlSecTransformPushXmlMethod pushXml; */
     NULL,                                      /* xmlSecTransformPopXmlMethod popXml; */
     xmlSecMSCryptoSignatureExecute,            /* xmlSecTransformExecuteMethod execute; */
-    
+
     NULL,                                      /* void* reserved0; */
     NULL,                                      /* void* reserved1; */
 };
 
 /**
  * xmlSecMSCryptoTransformRsaSha384GetKlass:
- * 
+ *
  * The RSA-SHA384 signature transform klass.
  *
  * Returns RSA-SHA384 signature transform klass.
  */
-xmlSecTransformId 
+xmlSecTransformId
 xmlSecMSCryptoTransformRsaSha384GetKlass(void) {
     return(&xmlSecMSCryptoRsaSha384Klass);
 }
@@ -749,7 +749,7 @@ static xmlSecTransformKlass xmlSecMSCryptoRsaSha512Klass = {
     xmlSecNameRsaSha512,                       /* const xmlChar* name; */
     xmlSecHrefRsaSha512,                       /* const xmlChar* href; */
     xmlSecTransformUsageSignatureMethod,       /* xmlSecTransformUsage usage; */
-    
+
     xmlSecMSCryptoSignatureInitialize,         /* xmlSecTransformInitializeMethod initialize; */
     xmlSecMSCryptoSignatureFinalize,           /* xmlSecTransformFinalizeMethod finalize; */
     NULL,                                      /* xmlSecTransformNodeReadMethod readNode; */
@@ -763,19 +763,19 @@ static xmlSecTransformKlass xmlSecMSCryptoRsaSha512Klass = {
     NULL,                                      /* xmlSecTransformPushXmlMethod pushXml; */
     NULL,                                      /* xmlSecTransformPopXmlMethod popXml; */
     xmlSecMSCryptoSignatureExecute,            /* xmlSecTransformExecuteMethod execute; */
-    
+
     NULL,                                      /* void* reserved0; */
     NULL,                                      /* void* reserved1; */
 };
 
 /**
  * xmlSecMSCryptoTransformRsaSha512GetKlass:
- * 
+ *
  * The RSA-SHA512 signature transform klass.
  *
  * Returns RSA-SHA512 signature transform klass.
  */
-xmlSecTransformId 
+xmlSecTransformId
 xmlSecMSCryptoTransformRsaSha512GetKlass(void) {
     return(&xmlSecMSCryptoRsaSha512Klass);
 }



[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]