[xmlsec] remove spaces from eols
- From: Aleksey Sanin <aleksey src gnome org>
- To: commits-list gnome org
- Cc:
- Subject: [xmlsec] remove spaces from eols
- Date: Sat, 24 Apr 2010 23:29:23 +0000 (UTC)
commit 6db367dcb8112afb94855adf27e2dc271b0a5cdc
Author: Aleksey Sanin <aleksey aleksey com>
Date: Sat Apr 24 15:02:57 2010 -0700
remove spaces from eols
include/xmlsec/mscrypto/crypto.h | 12 ++++----
src/mscrypto/certkeys.c | 38 +++++++++++++-------------
src/mscrypto/ciphers.c | 12 ++++----
src/mscrypto/crypto.c | 54 ++++++++++++++++++------------------
src/mscrypto/digests.c | 52 +++++++++++++++++-----------------
src/mscrypto/signatures.c | 56 +++++++++++++++++++-------------------
6 files changed, 112 insertions(+), 112 deletions(-)
---
diff --git a/include/xmlsec/mscrypto/crypto.h b/include/xmlsec/mscrypto/crypto.h
index 56d6863..d5a86da 100644
--- a/include/xmlsec/mscrypto/crypto.h
+++ b/include/xmlsec/mscrypto/crypto.h
@@ -164,7 +164,7 @@ XMLSEC_CRYPTO_EXPORT xmlSecTransformId xmlSecMSCryptoTransformRsaSha1GetKlass(vo
/**
* xmlSecMSCryptoTransformRsaSha256Id:
- *
+ *
* The RSA-SHA256 signature transform klass.
*/
@@ -174,7 +174,7 @@ XMLSEC_CRYPTO_EXPORT xmlSecTransformId xmlSecMSCryptoTransformRsaSha256GetKlass(
/**
* xmlSecMSCryptoTransformRsaSha384Id:
- *
+ *
* The RSA-SHA384 signature transform klass.
*/
@@ -184,7 +184,7 @@ XMLSEC_CRYPTO_EXPORT xmlSecTransformId xmlSecMSCryptoTransformRsaSha384GetKlass(
/**
* xmlSecMSCryptoTransformRsaSha512Id:
- *
+ *
* The RSA-SHA512 signature transform klass.
*/
@@ -239,7 +239,7 @@ XMLSEC_CRYPTO_EXPORT xmlSecTransformId xmlSecMSCryptoTransformSha1GetKlass(void)
/**
* xmlSecMSCryptoTransformSha256Id:
- *
+ *
* The SHA256 digest transform klass.
*/
#define xmlSecMSCryptoTransformSha256Id \
@@ -256,7 +256,7 @@ XMLSEC_CRYPTO_EXPORT xmlSecTransformId xmlSecMSCryptoTransformSha256GetKlass(voi
/**
* xmlSecMSCryptoTransformSha384Id:
- *
+ *
* The SHA384 digest transform klass.
*/
#define xmlSecMSCryptoTransformSha384Id \
@@ -273,7 +273,7 @@ XMLSEC_CRYPTO_EXPORT xmlSecTransformId xmlSecMSCryptoTransformSha384GetKlass(voi
/**
* xmlSecMSCryptoTransformSha512Id:
- *
+ *
* The SHA512 digest transform klass.
*/
#define xmlSecMSCryptoTransformSha512Id \
diff --git a/src/mscrypto/certkeys.c b/src/mscrypto/certkeys.c
index b76519e..af9eade 100644
--- a/src/mscrypto/certkeys.c
+++ b/src/mscrypto/certkeys.c
@@ -608,7 +608,7 @@ xmlSecMSCryptoKeyDataGetCert(xmlSecKeyDataPtr data) {
/**
* xmlSecMSCryptoKeyDataGetMSCryptoProvider:
- * @data: the key data
+ * @data: the key data
*
* Gets crypto provider handle
*
@@ -629,7 +629,7 @@ xmlSecMSCryptoKeyDataGetMSCryptoProvider(xmlSecKeyDataPtr data) {
/**
* xmlSecMSCryptoKeyDataGetMSCryptoKeySpec:
- * @data: the key data
+ * @data: the key data
*
* Gets key spec info.
*
@@ -997,16 +997,16 @@ static xmlSecKeyDataKlass xmlSecMSCryptoKeyDataRsaKlass = {
NULL, /* void* reserved1; */
};
-/* Ordered list of providers to search for algorithm implementation using
+/* Ordered list of providers to search for algorithm implementation using
* xmlSecMSCryptoFindProvider() function
- *
- * MUST END with { NULL, 0 } !!!
+ *
+ * MUST END with { NULL, 0 } !!!
*/
static xmlSecMSCryptoProviderInfo xmlSecMSCryptoProviderInfo_Rsa[] = {
- { XMLSEC_CRYPTO_MS_ENH_RSA_AES_PROV, PROV_RSA_AES},
- { XMLSEC_CRYPTO_MS_ENH_RSA_AES_PROV_PROTOTYPE, PROV_RSA_AES },
- { MS_STRONG_PROV, PROV_RSA_FULL },
- { MS_ENHANCED_PROV, PROV_RSA_FULL },
+ { XMLSEC_CRYPTO_MS_ENH_RSA_AES_PROV, PROV_RSA_AES},
+ { XMLSEC_CRYPTO_MS_ENH_RSA_AES_PROV_PROTOTYPE, PROV_RSA_AES },
+ { MS_STRONG_PROV, PROV_RSA_FULL },
+ { MS_ENHANCED_PROV, PROV_RSA_FULL },
{ NULL, 0 }
};
@@ -1229,7 +1229,7 @@ xmlSecMSCryptoKeyDataRsaXmlRead(xmlSecKeyDataId id, xmlSecKeyPtr key,
XMLSEC_ERRORS_NO_MESSAGE);
goto done;
}
-
+
if (!CryptImportKey(hProv, xmlSecBufferGetData(&blob), xmlSecBufferGetSize(&blob), 0, 0, &hKey)) {
xmlSecError(XMLSEC_ERRORS_HERE,
xmlSecErrorsSafeString(xmlSecKeyDataKlassGetName(id)),
@@ -1698,13 +1698,13 @@ static xmlSecKeyDataKlass xmlSecMSCryptoKeyDataDsaKlass = {
NULL, /* void* reserved1; */
};
-/* Ordered list of providers to search for algorithm implementation using
+/* Ordered list of providers to search for algorithm implementation using
* xmlSecMSCryptoFindProvider() function
- *
- * MUST END with { NULL, 0 } !!!
+ *
+ * MUST END with { NULL, 0 } !!!
*/
static xmlSecMSCryptoProviderInfo xmlSecMSCryptoProviderInfo_Dss[] = {
- { MS_DEF_DSS_PROV, PROV_DSS },
+ { MS_DEF_DSS_PROV, PROV_DSS },
{ NULL, 0 }
};
@@ -2530,14 +2530,14 @@ static xmlSecKeyDataKlass xmlSecMSCryptoKeyDataGost2001Klass = {
NULL, /* void* reserved1; */
};
-/* Ordered list of providers to search for algorithm implementation using
+/* Ordered list of providers to search for algorithm implementation using
* xmlSecMSCryptoFindProvider() function
- *
- * MUST END with { NULL, 0 } !!!
+ *
+ * MUST END with { NULL, 0 } !!!
*/
static xmlSecMSCryptoProviderInfo xmlSecMSCryptoProviderInfo_Gost[] = {
- { MAGPRO_CSP, PROV_MAGPRO_GOST },
- { CRYPTOPRO_CSP, PROV_CRYPTOPRO_GOST },
+ { MAGPRO_CSP, PROV_MAGPRO_GOST },
+ { CRYPTOPRO_CSP, PROV_CRYPTOPRO_GOST },
{ NULL, 0 }
};
diff --git a/src/mscrypto/ciphers.c b/src/mscrypto/ciphers.c
index 948d496..f6e8297 100644
--- a/src/mscrypto/ciphers.c
+++ b/src/mscrypto/ciphers.c
@@ -467,22 +467,22 @@ static int xmlSecMSCryptoBlockCipherCheckId (xmlSecTransformPtr tran
-/* Ordered list of providers to search for algorithm implementation using
+/* Ordered list of providers to search for algorithm implementation using
* xmlSecMSCryptoFindProvider() function
- *
- * MUST END with { NULL, 0 } !!!
+ *
+ * MUST END with { NULL, 0 } !!!
*/
#ifndef XMLSEC_NO_DES
static xmlSecMSCryptoProviderInfo xmlSecMSCryptoProviderInfo_Des[] = {
- { MS_STRONG_PROV, PROV_RSA_FULL },
- { MS_ENHANCED_PROV, PROV_RSA_FULL },
+ { MS_STRONG_PROV, PROV_RSA_FULL },
+ { MS_ENHANCED_PROV, PROV_RSA_FULL },
{ NULL, 0 }
};
#endif /* XMLSEC_NO_DES */
#ifndef XMLSEC_NO_AES
static xmlSecMSCryptoProviderInfo xmlSecMSCryptoProviderInfo_Aes[] = {
- { XMLSEC_CRYPTO_MS_ENH_RSA_AES_PROV, PROV_RSA_AES},
+ { XMLSEC_CRYPTO_MS_ENH_RSA_AES_PROV, PROV_RSA_AES},
{ XMLSEC_CRYPTO_MS_ENH_RSA_AES_PROV_PROTOTYPE, PROV_RSA_AES },
{ NULL, 0 }
};
diff --git a/src/mscrypto/crypto.c b/src/mscrypto/crypto.c
index 82e46dc..62e2530 100644
--- a/src/mscrypto/crypto.c
+++ b/src/mscrypto/crypto.c
@@ -132,13 +132,13 @@ xmlSecCryptoGetFunctions_mscrypto(void) {
#ifndef XMLSEC_NO_SHA1
gXmlSecMSCryptoFunctions->transformSha1GetKlass = xmlSecMSCryptoTransformSha1GetKlass;
#endif /* XMLSEC_NO_SHA1 */
-#ifndef XMLSEC_NO_SHA256
+#ifndef XMLSEC_NO_SHA256
gXmlSecMSCryptoFunctions->transformSha256GetKlass = xmlSecMSCryptoTransformSha256GetKlass;
#endif /* XMLSEC_NO_SHA256 */
-#ifndef XMLSEC_NO_SHA384
+#ifndef XMLSEC_NO_SHA384
gXmlSecMSCryptoFunctions->transformSha384GetKlass = xmlSecMSCryptoTransformSha384GetKlass;
#endif /* XMLSEC_NO_SHA384 */
-#ifndef XMLSEC_NO_SHA512
+#ifndef XMLSEC_NO_SHA512
gXmlSecMSCryptoFunctions->transformSha512GetKlass = xmlSecMSCryptoTransformSha512GetKlass;
#endif /* XMLSEC_NO_SHA512 */
@@ -456,11 +456,11 @@ xmlSecMSCryptoConvertLocaleToUnicode(const char* str) {
*
* Returns: provider handle on success or NULL for error.
*/
-HCRYPTPROV
-xmlSecMSCryptoFindProvider(const xmlSecMSCryptoProviderInfo * providers,
- LPCTSTR pszContainer,
- DWORD dwFlags,
- BOOL bUseXmlSecContainer)
+HCRYPTPROV
+xmlSecMSCryptoFindProvider(const xmlSecMSCryptoProviderInfo * providers,
+ LPCTSTR pszContainer,
+ DWORD dwFlags,
+ BOOL bUseXmlSecContainer)
{
HCRYPTPROV res = 0;
DWORD dwLastError;
@@ -468,18 +468,18 @@ xmlSecMSCryptoFindProvider(const xmlSecMSCryptoProviderInfo * providers,
int ii;
xmlSecAssert2(providers != NULL, 0);
-
+
for(ii = 0; (res == 0) && (providers[ii].providerName != NULL) && (providers[ii].providerType != 0); ++ii) {
/* first try */
- ret = CryptAcquireContext(&res,
- pszContainer,
- providers[ii].providerName,
- providers[ii].providerType,
+ ret = CryptAcquireContext(&res,
+ pszContainer,
+ providers[ii].providerName,
+ providers[ii].providerType,
dwFlags);
if((ret == TRUE) && (res != 0)) {
return (res);
- }
-
+ }
+
/* check errors */
dwLastError = GetLastError();
switch(dwLastError) {
@@ -490,10 +490,10 @@ xmlSecMSCryptoFindProvider(const xmlSecMSCryptoProviderInfo * providers,
* This is also referenced in
* http://www.microsoft.com/mind/0697/crypto.asp (inituser)
*/
- ret = CryptAcquireContext(&res,
- pszContainer,
- providers[ii].providerName,
- providers[ii].providerType,
+ ret = CryptAcquireContext(&res,
+ pszContainer,
+ providers[ii].providerName,
+ providers[ii].providerType,
CRYPT_NEWKEYSET | dwFlags);
if((ret == TRUE) && (res != 0)) {
return (res);
@@ -503,23 +503,23 @@ xmlSecMSCryptoFindProvider(const xmlSecMSCryptoProviderInfo * providers,
case NTE_EXISTS:
/* If we can, try our container */
if(bUseXmlSecContainer == TRUE) {
- ret = CryptAcquireContext(&res,
- XMLSEC_CONTAINER_NAME,
- providers[ii].providerName,
- providers[ii].providerType,
+ ret = CryptAcquireContext(&res,
+ XMLSEC_CONTAINER_NAME,
+ providers[ii].providerName,
+ providers[ii].providerType,
CRYPT_NEWKEYSET | dwFlags);
if((ret == TRUE) && (res != 0)) {
- /* ALEKSEY TODO - NEED TO DELETE ALL THE TEMP CONTEXTS ON SHUTDOWN
+ /* ALEKSEY TODO - NEED TO DELETE ALL THE TEMP CONTEXTS ON SHUTDOWN
CryptAcquireContext(&tmp, XMLSEC_CONTAINER_NAME,
- providers[ii].providerName,
- providers[ii].providerType,
+ providers[ii].providerName,
+ providers[ii].providerType,
CRYPT_DELETEKEYSET);
*/
return (res);
}
- }
+ }
break;
default:
diff --git a/src/mscrypto/digests.c b/src/mscrypto/digests.c
index b237b69..d476a0d 100644
--- a/src/mscrypto/digests.c
+++ b/src/mscrypto/digests.c
@@ -60,22 +60,22 @@ static int xmlSecMSCryptoDigestExecute (xmlSecTransformPtr transform,
static int xmlSecMSCryptoDigestCheckId (xmlSecTransformPtr transform);
-/* Ordered list of providers to search for algorithm implementation using
+/* Ordered list of providers to search for algorithm implementation using
* xmlSecMSCryptoFindProvider() function
- *
- * MUST END with { NULL, 0 } !!!
+ *
+ * MUST END with { NULL, 0 } !!!
*/
static xmlSecMSCryptoProviderInfo xmlSecMSCryptoProviderInfo_Sha[] = {
- { XMLSEC_CRYPTO_MS_ENH_RSA_AES_PROV, PROV_RSA_AES},
- { XMLSEC_CRYPTO_MS_ENH_RSA_AES_PROV_PROTOTYPE, PROV_RSA_AES },
- { MS_STRONG_PROV, PROV_RSA_FULL },
- { MS_ENHANCED_PROV, PROV_RSA_FULL },
+ { XMLSEC_CRYPTO_MS_ENH_RSA_AES_PROV, PROV_RSA_AES},
+ { XMLSEC_CRYPTO_MS_ENH_RSA_AES_PROV_PROTOTYPE, PROV_RSA_AES },
+ { MS_STRONG_PROV, PROV_RSA_FULL },
+ { MS_ENHANCED_PROV, PROV_RSA_FULL },
{ NULL, 0 }
};
static xmlSecMSCryptoProviderInfo xmlSecMSCryptoProviderInfo_Gost[] = {
- { MAGPRO_CSP, PROV_MAGPRO_GOST },
- { CRYPTOPRO_CSP, PROV_CRYPTOPRO_GOST },
+ { MAGPRO_CSP, PROV_MAGPRO_GOST },
+ { CRYPTOPRO_CSP, PROV_CRYPTOPRO_GOST },
{ NULL, 0 }
};
@@ -91,19 +91,19 @@ xmlSecMSCryptoDigestCheckId(xmlSecTransformPtr transform) {
if(xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformSha256Id)) {
return(1);
}
-#endif /* XMLSEC_NO_SHA256 */
+#endif /* XMLSEC_NO_SHA256 */
#ifndef XMLSEC_NO_SHA384
if(xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformSha384Id)) {
return(1);
}
-#endif /* XMLSEC_NO_SHA384 */
+#endif /* XMLSEC_NO_SHA384 */
#ifndef XMLSEC_NO_SHA512
if(xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformSha512Id)) {
return(1);
}
-#endif /* XMLSEC_NO_SHA512 */
+#endif /* XMLSEC_NO_SHA512 */
#ifndef XMLSEC_NO_GOST
if(xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformGostR3411_94Id)) {
@@ -138,21 +138,21 @@ xmlSecMSCryptoDigestInitialize(xmlSecTransformPtr transform) {
if(xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformSha256Id)) {
ctx->alg_id = CALG_SHA_256;
ctx->providers = xmlSecMSCryptoProviderInfo_Sha;
- } else
-#endif /* XMLSEC_NO_SHA256 */
+ } else
+#endif /* XMLSEC_NO_SHA256 */
#ifndef XMLSEC_NO_SHA384
if(xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformSha384Id)) {
ctx->alg_id = CALG_SHA_384;
ctx->providers = xmlSecMSCryptoProviderInfo_Sha;
- } else
-#endif /* XMLSEC_NO_SHA384 */
+ } else
+#endif /* XMLSEC_NO_SHA384 */
#ifndef XMLSEC_NO_SHA512
if(xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformSha512Id)) {
ctx->alg_id = CALG_SHA_512;
ctx->providers = xmlSecMSCryptoProviderInfo_Sha;
- } else
+ } else
#endif /* XMLSEC_NO_SHA512 */
#ifndef XMLSEC_NO_GOST
@@ -439,19 +439,19 @@ static xmlSecTransformKlass xmlSecMSCryptoSha256Klass = {
xmlSecTransformDefaultPopBin, /* xmlSecTransformPopBinMethod popBin; */
NULL, /* xmlSecTransformPushXmlMethod pushXml; */
NULL, /* xmlSecTransformPopXmlMethod popXml; */
- xmlSecMSCryptoDigestExecute, /* xmlSecTransformExecuteMethod execute; */
+ xmlSecMSCryptoDigestExecute, /* xmlSecTransformExecuteMethod execute; */
NULL, /* void* reserved0; */
NULL, /* void* reserved1; */
};
-/**
+/**
* xmlSecMSCryptoTransformSha256GetKlass:
*
* SHA-256 digest transform klass.
*
* Returns pointer to SHA-256 digest transform klass.
*/
-xmlSecTransformId
+xmlSecTransformId
xmlSecMSCryptoTransformSha256GetKlass(void) {
return(&xmlSecMSCryptoSha256Klass);
}
@@ -483,19 +483,19 @@ static xmlSecTransformKlass xmlSecMSCryptoSha384Klass = {
xmlSecTransformDefaultPopBin, /* xmlSecTransformPopBinMethod popBin; */
NULL, /* xmlSecTransformPushXmlMethod pushXml; */
NULL, /* xmlSecTransformPopXmlMethod popXml; */
- xmlSecMSCryptoDigestExecute, /* xmlSecTransformExecuteMethod execute; */
+ xmlSecMSCryptoDigestExecute, /* xmlSecTransformExecuteMethod execute; */
NULL, /* void* reserved0; */
NULL, /* void* reserved1; */
};
-/**
+/**
* xmlSecMSCryptoTransformSha384GetKlass:
*
* SHA-384 digest transform klass.
*
* Returns pointer to SHA-384 digest transform klass.
*/
-xmlSecTransformId
+xmlSecTransformId
xmlSecMSCryptoTransformSha384GetKlass(void) {
return(&xmlSecMSCryptoSha384Klass);
}
@@ -527,19 +527,19 @@ static xmlSecTransformKlass xmlSecMSCryptoSha512Klass = {
xmlSecTransformDefaultPopBin, /* xmlSecTransformPopBinMethod popBin; */
NULL, /* xmlSecTransformPushXmlMethod pushXml; */
NULL, /* xmlSecTransformPopXmlMethod popXml; */
- xmlSecMSCryptoDigestExecute, /* xmlSecTransformExecuteMethod execute; */
+ xmlSecMSCryptoDigestExecute, /* xmlSecTransformExecuteMethod execute; */
NULL, /* void* reserved0; */
NULL, /* void* reserved1; */
};
-/**
+/**
* xmlSecMSCryptoTransformSha512GetKlass:
*
* SHA-512 digest transform klass.
*
* Returns pointer to SHA-512 digest transform klass.
*/
-xmlSecTransformId
+xmlSecTransformId
xmlSecMSCryptoTransformSha512GetKlass(void) {
return(&xmlSecMSCryptoSha512Klass);
}
diff --git a/src/mscrypto/signatures.c b/src/mscrypto/signatures.c
index a003e43..e542a13 100644
--- a/src/mscrypto/signatures.c
+++ b/src/mscrypto/signatures.c
@@ -130,26 +130,26 @@ static int xmlSecMSCryptoSignatureInitialize(xmlSecTransformPtr transform) {
ctx->keyId = xmlSecMSCryptoKeyDataRsaId;
} else
-#ifndef XMLSEC_NO_SHA256
+#ifndef XMLSEC_NO_SHA256
if(xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformRsaSha256Id)) {
ctx->digestAlgId = CALG_SHA_256;
ctx->keyId = xmlSecMSCryptoKeyDataRsaId;
} else
-#endif /* XMLSEC_NO_SHA256 */
+#endif /* XMLSEC_NO_SHA256 */
#ifndef XMLSEC_NO_SHA384
if(xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformRsaSha384Id)) {
ctx->digestAlgId = CALG_SHA_384;
ctx->keyId = xmlSecMSCryptoKeyDataRsaId;
} else
-#endif /* XMLSEC_NO_SHA384 */
+#endif /* XMLSEC_NO_SHA384 */
#ifndef XMLSEC_NO_SHA512
if(xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformRsaSha512Id)) {
ctx->digestAlgId = CALG_SHA_512;
ctx->keyId = xmlSecMSCryptoKeyDataRsaId;
} else
-#endif /* XMLSEC_NO_SHA512 */
+#endif /* XMLSEC_NO_SHA512 */
#endif /* XMLSEC_NO_RSA */
@@ -310,24 +310,24 @@ static int xmlSecMSCryptoSignatureVerify(xmlSecTransformPtr transform,
#ifndef XMLSEC_NO_RSA
if (xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformRsaSha1Id)) {
ConvertEndian(data, tmpBuf, dataSize);
- } else
+ } else
#ifndef XMLSEC_NO_SHA256
if (xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformRsaSha256Id)) {
ConvertEndian(data, tmpBuf, dataSize);
- } else
+ } else
#endif /* XMLSEC_NO_SHA256 */
#ifndef XMLSEC_NO_SHA384
if (xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformRsaSha384Id)) {
ConvertEndian(data, tmpBuf, dataSize);
- } else
+ } else
#endif /* XMLSEC_NO_SHA384 */
#ifndef XMLSEC_NO_SHA512
if (xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformRsaSha512Id)) {
ConvertEndian(data, tmpBuf, dataSize);
- } else
+ } else
#endif /* XMLSEC_NO_SHA512 */
#endif /* XMLSEC_NO_RSA */
@@ -336,13 +336,13 @@ static int xmlSecMSCryptoSignatureVerify(xmlSecTransformPtr transform,
if (xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformDsaSha1Id) && (dataSize == 40)) {
ConvertEndian(data, tmpBuf, 20);
ConvertEndian(data + 20, tmpBuf + 20, 20);
- } else
+ } else
#endif /*endif XMLSEC_NO_DSA */
#ifndef XMLSEC_NO_GOST
if (xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformGost2001GostR3411_94Id)) {
ConvertEndian(data, tmpBuf, dataSize);
- } else
+ } else
#endif /* XMLSEC_NO_GOST*/
{
@@ -531,24 +531,24 @@ xmlSecMSCryptoSignatureExecute(xmlSecTransformPtr transform, int last, xmlSecTra
#ifndef XMLSEC_NO_RSA
if (xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformRsaSha1Id)) {
ConvertEndian(tmpBuf, outBuf, outSize);
- } else
+ } else
#ifndef XMLSEC_NO_SHA256
if (xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformRsaSha256Id)) {
ConvertEndian(tmpBuf, outBuf, outSize);
- } else
+ } else
#endif /* XMLSEC_NO_SHA256 */
#ifndef XMLSEC_NO_SHA384
if (xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformRsaSha384Id)) {
ConvertEndian(tmpBuf, outBuf, outSize);
- } else
+ } else
#endif /* XMLSEC_NO_SHA384 */
#ifndef XMLSEC_NO_SHA512
if (xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformRsaSha512Id)) {
ConvertEndian(tmpBuf, outBuf, outSize);
- } else
+ } else
#endif /* XMLSEC_NO_SHA512 */
@@ -558,13 +558,13 @@ xmlSecMSCryptoSignatureExecute(xmlSecTransformPtr transform, int last, xmlSecTra
if (xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformDsaSha1Id) && (outSize == 40)) {
ConvertEndian(tmpBuf, outBuf, 20);
ConvertEndian(tmpBuf + 20, outBuf + 20, 20);
- } else
+ } else
#endif /* XMLSEC_NO_DSA*/
#ifndef XMLSEC_NO_GOST
if (xmlSecTransformCheckId(transform, xmlSecMSCryptoTransformGost2001GostR3411_94Id)) {
ConvertEndian(tmpBuf, outBuf, outSize);
- } else
+ } else
#endif /* XMLSEC_NO_GOST*/
{
@@ -657,7 +657,7 @@ static xmlSecTransformKlass xmlSecMSCryptoRsaSha256Klass = {
xmlSecNameRsaSha256, /* const xmlChar* name; */
xmlSecHrefRsaSha256, /* const xmlChar* href; */
xmlSecTransformUsageSignatureMethod, /* xmlSecTransformUsage usage; */
-
+
xmlSecMSCryptoSignatureInitialize, /* xmlSecTransformInitializeMethod initialize; */
xmlSecMSCryptoSignatureFinalize, /* xmlSecTransformFinalizeMethod finalize; */
NULL, /* xmlSecTransformNodeReadMethod readNode; */
@@ -671,19 +671,19 @@ static xmlSecTransformKlass xmlSecMSCryptoRsaSha256Klass = {
NULL, /* xmlSecTransformPushXmlMethod pushXml; */
NULL, /* xmlSecTransformPopXmlMethod popXml; */
xmlSecMSCryptoSignatureExecute, /* xmlSecTransformExecuteMethod execute; */
-
+
NULL, /* void* reserved0; */
NULL, /* void* reserved1; */
};
/**
* xmlSecMSCryptoTransformRsaSha256GetKlass:
- *
+ *
* The RSA-SHA256 signature transform klass.
*
* Returns RSA-SHA256 signature transform klass.
*/
-xmlSecTransformId
+xmlSecTransformId
xmlSecMSCryptoTransformRsaSha256GetKlass(void) {
return(&xmlSecMSCryptoRsaSha256Klass);
}
@@ -703,7 +703,7 @@ static xmlSecTransformKlass xmlSecMSCryptoRsaSha384Klass = {
xmlSecNameRsaSha384, /* const xmlChar* name; */
xmlSecHrefRsaSha384, /* const xmlChar* href; */
xmlSecTransformUsageSignatureMethod, /* xmlSecTransformUsage usage; */
-
+
xmlSecMSCryptoSignatureInitialize, /* xmlSecTransformInitializeMethod initialize; */
xmlSecMSCryptoSignatureFinalize, /* xmlSecTransformFinalizeMethod finalize; */
NULL, /* xmlSecTransformNodeReadMethod readNode; */
@@ -717,19 +717,19 @@ static xmlSecTransformKlass xmlSecMSCryptoRsaSha384Klass = {
NULL, /* xmlSecTransformPushXmlMethod pushXml; */
NULL, /* xmlSecTransformPopXmlMethod popXml; */
xmlSecMSCryptoSignatureExecute, /* xmlSecTransformExecuteMethod execute; */
-
+
NULL, /* void* reserved0; */
NULL, /* void* reserved1; */
};
/**
* xmlSecMSCryptoTransformRsaSha384GetKlass:
- *
+ *
* The RSA-SHA384 signature transform klass.
*
* Returns RSA-SHA384 signature transform klass.
*/
-xmlSecTransformId
+xmlSecTransformId
xmlSecMSCryptoTransformRsaSha384GetKlass(void) {
return(&xmlSecMSCryptoRsaSha384Klass);
}
@@ -749,7 +749,7 @@ static xmlSecTransformKlass xmlSecMSCryptoRsaSha512Klass = {
xmlSecNameRsaSha512, /* const xmlChar* name; */
xmlSecHrefRsaSha512, /* const xmlChar* href; */
xmlSecTransformUsageSignatureMethod, /* xmlSecTransformUsage usage; */
-
+
xmlSecMSCryptoSignatureInitialize, /* xmlSecTransformInitializeMethod initialize; */
xmlSecMSCryptoSignatureFinalize, /* xmlSecTransformFinalizeMethod finalize; */
NULL, /* xmlSecTransformNodeReadMethod readNode; */
@@ -763,19 +763,19 @@ static xmlSecTransformKlass xmlSecMSCryptoRsaSha512Klass = {
NULL, /* xmlSecTransformPushXmlMethod pushXml; */
NULL, /* xmlSecTransformPopXmlMethod popXml; */
xmlSecMSCryptoSignatureExecute, /* xmlSecTransformExecuteMethod execute; */
-
+
NULL, /* void* reserved0; */
NULL, /* void* reserved1; */
};
/**
* xmlSecMSCryptoTransformRsaSha512GetKlass:
- *
+ *
* The RSA-SHA512 signature transform klass.
*
* Returns RSA-SHA512 signature transform klass.
*/
-xmlSecTransformId
+xmlSecTransformId
xmlSecMSCryptoTransformRsaSha512GetKlass(void) {
return(&xmlSecMSCryptoRsaSha512Klass);
}
[
Date Prev][
Date Next] [
Thread Prev][
Thread Next]
[
Thread Index]
[
Date Index]
[
Author Index]