[xmlsec] fixup tabs->spaces



commit 3e341317b3f53231a85ad577fcee7b91092dc393
Author: Aleksey Sanin <aleksey aleksey com>
Date:   Wed Jun 4 10:03:19 2014 -0700

    fixup tabs->spaces

 include/xmlsec/openssl/crypto.h |    2 +-
 src/gcrypt/asn1.c               |    4 +-
 src/mscrypto/x509vfy.c          |    2 +-
 src/nss/x509vfy.c               |    8 +++---
 src/openssl/digests.c           |   17 ++++++-------
 src/openssl/evp.c               |   22 +++++++++---------
 src/openssl/kt_rsa.c            |   14 ++++++------
 src/openssl/signatures.c        |    9 +++----
 src/openssl/x509vfy.c           |   46 +++++++++++++++++++-------------------
 src/parser.c                    |    2 +-
 src/xpath.c                     |   14 ++++++------
 src/xslt.c                      |    2 +-
 12 files changed, 70 insertions(+), 72 deletions(-)
---
diff --git a/include/xmlsec/openssl/crypto.h b/include/xmlsec/openssl/crypto.h
index aec5fb3..b2fbea9 100644
--- a/include/xmlsec/openssl/crypto.h
+++ b/include/xmlsec/openssl/crypto.h
@@ -308,7 +308,7 @@ XMLSEC_CRYPTO_EXPORT xmlSecTransformId xmlSecOpenSSLTransformGost2001GostR3411_9
  * The GOSTR3411_94 signature transform klass.
  */
 #define xmlSecOpenSSLTransformGostR3411_94Id \
-       xmlSecOpenSSLTransformGostR3411_94GetKlass()
+               xmlSecOpenSSLTransformGostR3411_94GetKlass()
 XMLSEC_CRYPTO_EXPORT xmlSecTransformId xmlSecOpenSSLTransformGostR3411_94GetKlass(void);
 
 #endif /* XMLSEC_NO_GOST */
diff --git a/src/gcrypt/asn1.c b/src/gcrypt/asn1.c
index 9a2b5cf..f718139 100644
--- a/src/gcrypt/asn1.c
+++ b/src/gcrypt/asn1.c
@@ -304,11 +304,11 @@ xmlSecGCryptParseDer(const xmlSecByte * der, xmlSecSize derlen,
         case 3:
             /* Public RSA */
             type = xmlSecGCryptDerKeyTypePublicRsa;
-           break;
+            break;
         case 5:
             /* Public DSA */
             type = xmlSecGCryptDerKeyTypePublicDsa;
-           break;
+            break;
         case 6:
             /* Private DSA */
             type = xmlSecGCryptDerKeyTypePrivateDsa;
diff --git a/src/mscrypto/x509vfy.c b/src/mscrypto/x509vfy.c
index 16b63db..6541a6c 100644
--- a/src/mscrypto/x509vfy.c
+++ b/src/mscrypto/x509vfy.c
@@ -1183,7 +1183,7 @@ xmlSecMSCryptoX509GetCertName(const xmlChar * name) {
                     "xmlSecMSCryptoConvertUtf8ToTstr",
                     XMLSEC_ERRORS_R_XMLSEC_FAILED,
                     XMLSEC_ERRORS_NO_MESSAGE);
-       xmlFree(name2);
+        xmlFree(name2);
         return(NULL);
     }
 
diff --git a/src/nss/x509vfy.c b/src/nss/x509vfy.c
index 54edff9..3afd05c 100644
--- a/src/nss/x509vfy.c
+++ b/src/nss/x509vfy.c
@@ -243,8 +243,8 @@ xmlSecNssX509StoreVerify(xmlSecKeyDataStorePtr store, CERTCertList* certs,
                         XMLSEC_ERRORS_R_CERT_HAS_EXPIRED,
                         "cert with subject name %s has expired",
                         (cert != NULL) ? cert->subjectName : "(NULL)"
-                       );
-                       break;
+            );
+            break;
         case SEC_ERROR_REVOKED_CERTIFICATE:
             xmlSecError(XMLSEC_ERRORS_HERE,
                         xmlSecErrorsSafeString(xmlSecKeyDataStoreGetName(store)),
@@ -252,8 +252,8 @@ xmlSecNssX509StoreVerify(xmlSecKeyDataStorePtr store, CERTCertList* certs,
                         XMLSEC_ERRORS_R_CERT_REVOKED,
                         "cert with subject name %s has been revoked",
                         (cert != NULL) ? cert->subjectName : "(NULL)"
-                       );
-                       break;
+            );
+            break;
         default:
             xmlSecError(XMLSEC_ERRORS_HERE,
                         xmlSecErrorsSafeString(xmlSecKeyDataStoreGetName(store)),
diff --git a/src/openssl/digests.c b/src/openssl/digests.c
index fa26fa6..b103035 100644
--- a/src/openssl/digests.c
+++ b/src/openssl/digests.c
@@ -174,15 +174,14 @@ xmlSecOpenSSLEvpDigestInitialize(xmlSecTransformPtr transform) {
 #ifndef XMLSEC_NO_GOST
     if(xmlSecTransformCheckId(transform, xmlSecOpenSSLTransformGostR3411_94Id)) {
         ctx->digest = EVP_get_digestbyname("md_gost94");
-                               if (!ctx->digest)
-                               {
-        xmlSecError(XMLSEC_ERRORS_HERE,
-                    xmlSecErrorsSafeString(xmlSecTransformGetName(transform)),
-                    NULL,
-                    XMLSEC_ERRORS_R_INVALID_TRANSFORM,
-                    XMLSEC_ERRORS_NO_MESSAGE);
-        return(-1);
-                               }
+               if (!ctx->digest) {
+                       xmlSecError(XMLSEC_ERRORS_HERE,
+                                       xmlSecErrorsSafeString(xmlSecTransformGetName(transform)),
+                                       NULL,
+                                       XMLSEC_ERRORS_R_INVALID_TRANSFORM,
+                                       XMLSEC_ERRORS_NO_MESSAGE);
+                       return(-1);
+               }
     } else
 #endif /* XMLSEC_NO_GOST*/
 
diff --git a/src/openssl/evp.c b/src/openssl/evp.c
index e042f26..464a5a3 100644
--- a/src/openssl/evp.c
+++ b/src/openssl/evp.c
@@ -1060,8 +1060,8 @@ static xmlSecKeyDataKlass xmlSecOpenSSLKeyDataEcdsaKlass = {
     NULL,                                       /* xmlSecKeyDataGetIdentifier getIdentifier; */
 
     /* read/write */
-    NULL,                                      /* xmlSecKeyDataXmlReadMethod xmlRead; */
-    NULL,                                      /* xmlSecKeyDataXmlWriteMethod xmlWrite; */
+    NULL,                                       /* xmlSecKeyDataXmlReadMethod xmlRead; */
+    NULL,                                       /* xmlSecKeyDataXmlWriteMethod xmlWrite; */
     NULL,                                       /* xmlSecKeyDataBinReadMethod binRead; */
     NULL,                                       /* xmlSecKeyDataBinWriteMethod binWrite; */
 
@@ -1887,17 +1887,17 @@ static xmlSecKeyDataKlass xmlSecOpenSSLKeyDataGost2001Klass = {
     /* get info */
     xmlSecOpenSSLKeyDataGost2001GetType,       /* xmlSecKeyDataGetTypeMethod getType; */
     xmlSecOpenSSLKeyDataGost2001GetSize,       /* xmlSecKeyDataGetSizeMethod getSize; */
-    NULL,                               /* xmlSecKeyDataGetIdentifier getIdentifier; */
+    NULL,                                      /* xmlSecKeyDataGetIdentifier getIdentifier; */
 
     /* read/write */
-    NULL,       /* xmlSecKeyDataXmlReadMethod xmlRead; */
-    NULL,       /* xmlSecKeyDataXmlWriteMethod xmlWrite; */
-    NULL,                               /* xmlSecKeyDataBinReadMethod binRead; */
-    NULL,                               /* xmlSecKeyDataBinWriteMethod binWrite; */
+    NULL,                                      /* xmlSecKeyDataXmlReadMethod xmlRead; */
+    NULL,                                      /* xmlSecKeyDataXmlWriteMethod xmlWrite; */
+    NULL,                                      /* xmlSecKeyDataBinReadMethod binRead; */
+    NULL,                                      /* xmlSecKeyDataBinWriteMethod binWrite; */
 
     /* debug */
     xmlSecOpenSSLKeyDataGost2001DebugDump,     /* xmlSecKeyDataDebugDumpMethod debugDump; */
-    xmlSecOpenSSLKeyDataGost2001DebugXmlDump,/* xmlSecKeyDataDebugDumpMethod debugXmlDump; */
+    xmlSecOpenSSLKeyDataGost2001DebugXmlDump,  /* xmlSecKeyDataDebugDumpMethod debugXmlDump; */
 
     /* reserved for the future */
     NULL,                               /* void* reserved0; */
@@ -1941,9 +1941,9 @@ xmlSecOpenSSLKeyDataGost2001Finalize(xmlSecKeyDataPtr data) {
 
 static xmlSecKeyDataType
 xmlSecOpenSSLKeyDataGost2001GetType(xmlSecKeyDataPtr data) {
-       /* Now I don't know how to find whether we have both private and public key 
-       or the public only*/
-       return(xmlSecKeyDataTypePublic | xmlSecKeyDataTypePrivate);
+    /* Now I don't know how to find whether we have both private and public key 
+    or the public only*/
+    return(xmlSecKeyDataTypePublic | xmlSecKeyDataTypePrivate);
 }
 
 static xmlSecSize
diff --git a/src/openssl/kt_rsa.c b/src/openssl/kt_rsa.c
index 1238ff0..8c022d5 100644
--- a/src/openssl/kt_rsa.c
+++ b/src/openssl/kt_rsa.c
@@ -845,13 +845,13 @@ xmlSecOpenSSLRsaOaepProcess(xmlSecTransformPtr transform, xmlSecTransformCtxPtr
         }
         outSize = ret;
     } else {
-       xmlSecError(XMLSEC_ERRORS_HERE,
-                                       xmlSecErrorsSafeString(xmlSecTransformGetName(transform)),
-                                       "",
-                                       XMLSEC_ERRORS_R_XMLSEC_FAILED,
-                                       "Unexpected trasnform operation: %d; paramsSize: %d",
-                                       (int)transform->operation, (int)paramsSize);
-               return(-1);
+        xmlSecError(XMLSEC_ERRORS_HERE,
+                    xmlSecErrorsSafeString(xmlSecTransformGetName(transform)),
+                    "",
+                    XMLSEC_ERRORS_R_XMLSEC_FAILED,
+                    "Unexpected trasnform operation: %d; paramsSize: %d",
+                    (int)transform->operation, (int)paramsSize);
+        return(-1);
     }
 
     ret = xmlSecBufferSetSize(out, outSize);
diff --git a/src/openssl/signatures.c b/src/openssl/signatures.c
index 7e3dbc7..6751ba0 100644
--- a/src/openssl/signatures.c
+++ b/src/openssl/signatures.c
@@ -345,15 +345,14 @@ xmlSecOpenSSLEvpSignatureInitialize(xmlSecTransformPtr transform) {
     if(xmlSecTransformCheckId(transform, xmlSecOpenSSLTransformGost2001GostR3411_94Id)) {
         ctx->keyId          = xmlSecOpenSSLKeyDataGost2001Id;
         ctx->digest = EVP_get_digestbyname("md_gost94");
-                               if (!ctx->digest)
-                               {
-        xmlSecError(XMLSEC_ERRORS_HERE,
+        if (!ctx->digest) {
+               xmlSecError(XMLSEC_ERRORS_HERE,
                     xmlSecErrorsSafeString(xmlSecTransformGetName(transform)),
                     NULL,
                     XMLSEC_ERRORS_R_INVALID_TRANSFORM,
                     XMLSEC_ERRORS_NO_MESSAGE);
-        return(-1);
-                               }
+               return(-1);
+        }
     } else
 #endif /* XMLSEC_NO_GOST*/
 
diff --git a/src/openssl/x509vfy.c b/src/openssl/x509vfy.c
index 06ee566..370694d 100644
--- a/src/openssl/x509vfy.c
+++ b/src/openssl/x509vfy.c
@@ -294,29 +294,29 @@ xmlSecOpenSSLX509StoreVerify(xmlSecKeyDataStorePtr store, XMLSEC_STACK_OF_X509*
 
 #if !defined(XMLSEC_OPENSSL_096) && !defined(XMLSEC_OPENSSL_097)
             {
-                               X509_VERIFY_PARAM * vpm = NULL;
-                               unsigned long vpm_flags = 0;
-
-                               vpm = X509_VERIFY_PARAM_new();
-                               if(vpm == NULL) {
-                                       xmlSecError(XMLSEC_ERRORS_HERE,
-                                                               
xmlSecErrorsSafeString(xmlSecKeyDataStoreGetName(store)),
-                                                               "X509_VERIFY_PARAM_new",
-                                                               XMLSEC_ERRORS_R_CRYPTO_FAILED,
-                                                               XMLSEC_ERRORS_NO_MESSAGE);
-                                       goto done;
-                               }
-                               vpm_flags = vpm->flags;
-                               vpm_flags &= (~X509_V_FLAG_CRL_CHECK);
-
-                               if(keyInfoCtx->certsVerificationTime > 0) {
-                                       vpm_flags |= X509_V_FLAG_USE_CHECK_TIME;
-                                       X509_VERIFY_PARAM_set_time(vpm, keyInfoCtx->certsVerificationTime);
-                               }
-
-                               X509_VERIFY_PARAM_set_depth(vpm, 9);
-                               X509_VERIFY_PARAM_set_flags(vpm, vpm_flags);
-                               X509_STORE_CTX_set0_param(&xsc, vpm);
+                X509_VERIFY_PARAM * vpm = NULL;
+                unsigned long vpm_flags = 0;
+
+                vpm = X509_VERIFY_PARAM_new();
+                if(vpm == NULL) {
+                    xmlSecError(XMLSEC_ERRORS_HERE,
+                                xmlSecErrorsSafeString(xmlSecKeyDataStoreGetName(store)),
+                                "X509_VERIFY_PARAM_new",
+                                XMLSEC_ERRORS_R_CRYPTO_FAILED,
+                                XMLSEC_ERRORS_NO_MESSAGE);
+                    goto done;
+                }
+                vpm_flags = vpm->flags;
+                vpm_flags &= (~X509_V_FLAG_CRL_CHECK);
+
+                if(keyInfoCtx->certsVerificationTime > 0) {
+                    vpm_flags |= X509_V_FLAG_USE_CHECK_TIME;
+                    X509_VERIFY_PARAM_set_time(vpm, keyInfoCtx->certsVerificationTime);
+                }
+
+                X509_VERIFY_PARAM_set_depth(vpm, 9);
+                X509_VERIFY_PARAM_set_flags(vpm, vpm_flags);
+                X509_STORE_CTX_set0_param(&xsc, vpm);
             }
 #endif /* !defined(XMLSEC_OPENSSL_096) && !defined(XMLSEC_OPENSSL_097) */
 
diff --git a/src/parser.c b/src/parser.c
index 99ab234..dd902d4 100644
--- a/src/parser.c
+++ b/src/parser.c
@@ -159,7 +159,7 @@ xmlSecParserPushBin(xmlSecTransformPtr transform, const xmlSecByte* data,
         /* required for c14n! */
         ctx->parserCtx->loadsubset      = XML_DETECT_IDS | XML_COMPLETE_ATTRS;
         ctx->parserCtx->replaceEntities = 1;
-       ctx->parserCtx->options         = XML_PARSE_NONET;
+        ctx->parserCtx->options         = XML_PARSE_NONET;
 
         transform->status = xmlSecTransformStatusWorking;
     } else if(transform->status == xmlSecTransformStatusFinished) {
diff --git a/src/xpath.c b/src/xpath.c
index 34ce285..2c96192 100644
--- a/src/xpath.c
+++ b/src/xpath.c
@@ -285,17 +285,17 @@ xmlSecXPathDataExecute(xmlSecXPathDataPtr data, xmlDocPtr doc, xmlNodePtr hereNo
     to reserve NULL for our own purposes so we simply create an empty
     node set here */
     if(xpathObj->nodesetval == NULL) {
-       xpathObj->nodesetval = xmlXPathNodeSetCreate(NULL);
-       if(xpathObj->nodesetval == NULL) {
-               xmlXPathFreeObject(xpathObj);
-               xmlSecError(XMLSEC_ERRORS_HERE,
-                       NULL,
+       xpathObj->nodesetval = xmlXPathNodeSetCreate(NULL);
+       if(xpathObj->nodesetval == NULL) {
+               xmlXPathFreeObject(xpathObj);
+               xmlSecError(XMLSEC_ERRORS_HERE,
+                                       NULL,
                         "xmlXPathNodeSetCreate",
                         XMLSEC_ERRORS_R_XML_FAILED,
                         "expr=%s",
                         xmlSecErrorsSafeString(data->expr));
-               return(NULL);
-       }
+               return(NULL);
+       }
     }
 
     nodes = xmlSecNodeSetCreate(doc, xpathObj->nodesetval, data->nodeSetType);
diff --git a/src/xslt.c b/src/xslt.c
index 0353a25..0a010bd 100644
--- a/src/xslt.c
+++ b/src/xslt.c
@@ -584,7 +584,7 @@ xmlSecXsApplyStylesheet(xmlSecXsltCtxPtr ctx, xmlDocPtr doc) {
                     XMLSEC_ERRORS_R_XSLT_FAILED,
                     XMLSEC_ERRORS_NO_MESSAGE);
         goto done;
-    }      
+    }
 
     /* set security prefs  */
     ret = xsltSetCtxtSecurityPrefs(g_xslt_default_security_prefs, xsltCtx);


[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]