diff options
author | Werner Koch <wk@gnupg.org> | 2011-02-04 12:57:53 +0100 |
---|---|---|
committer | Werner Koch <wk@gnupg.org> | 2011-02-04 12:57:53 +0100 |
commit | b008274afdbe375b32a7e66dbd073e200f6f0587 (patch) | |
tree | 219e239d39cf06be3f03aa82fb572080ac163a15 /g10/gpgv.c | |
parent | Let autogen.sh check the git config (diff) | |
download | gnupg2-b008274afdbe375b32a7e66dbd073e200f6f0587.tar.xz gnupg2-b008274afdbe375b32a7e66dbd073e200f6f0587.zip |
Nuked almost all trailing white space.post-nuke-of-trailing-ws
We better do this once and for all instead of cluttering all future
commits with diffs of trailing white spaces. In the majority of cases
blank or single lines are affected and thus this change won't disturb
a git blame too much. For future commits the pre-commit scripts
checks that this won't happen again.
Diffstat (limited to 'g10/gpgv.c')
-rw-r--r-- | g10/gpgv.c | 63 |
1 files changed, 31 insertions, 32 deletions
diff --git a/g10/gpgv.c b/g10/gpgv.c index 569601e89..9f46ab39c 100644 --- a/g10/gpgv.c +++ b/g10/gpgv.c @@ -57,7 +57,7 @@ enum cmd_and_opt_values { oVerbose = 'v', oBatch = 500, oKeyring, - oIgnoreTimeConflict, + oIgnoreTimeConflict, oStatusFD, oLoggerFD, oHomedir, @@ -67,10 +67,10 @@ enum cmd_and_opt_values { static ARGPARSE_OPTS opts[] = { ARGPARSE_group (300, N_("@\nOptions:\n ")), - + ARGPARSE_s_n (oVerbose, "verbose", N_("verbose")), ARGPARSE_s_n (oQuiet, "quiet", N_("be somewhat more quiet")), - ARGPARSE_s_s (oKeyring, "keyring", + ARGPARSE_s_s (oKeyring, "keyring", N_("|FILE|take the keys from the keyring FILE")), ARGPARSE_s_n (oIgnoreTimeConflict, "ignore-time-conflict", N_("make timestamp conflicts only a warning")), @@ -92,7 +92,7 @@ make_libversion (const char *libname, const char *(*getfnc)(const char*)) { const char *s; char *result; - + s = getfnc (NULL); result = xmalloc (strlen (libname) + 1 + strlen (s) + 1); strcpy (stpcpy (stpcpy (result, libname), " "), s); @@ -143,14 +143,14 @@ main( int argc, char **argv ) strlist_t nrings = NULL; unsigned configlineno; ctrl_t ctrl; - + set_strusage (my_strusage); log_set_prefix ("gpgv", 1); - + /* Make sure that our subsystems are ready. */ i18n_init(); init_common_subsystems (&argc, &argv); - + gnupg_init_signals (0, NULL); opt.command_fd = -1; /* no command fd */ @@ -164,7 +164,7 @@ main( int argc, char **argv ) tty_no_terminal(1); tty_batchmode(1); disable_dotlock(); - + pargs.argc = &argc; pargs.argv = &argv; pargs.flags= 1; /* do not remove the args */ @@ -173,14 +173,14 @@ main( int argc, char **argv ) switch (pargs.r_opt) { case oQuiet: opt.quiet = 1; break; - case oVerbose: - opt.verbose++; + case oVerbose: + opt.verbose++; opt.list_sigs=1; gcry_control (GCRYCTL_SET_VERBOSITY, (int)opt.verbose); break; case oKeyring: append_to_strlist( &nrings, pargs.r.ret_str); break; case oStatusFD: set_status_fd( pargs.r.ret_int ); break; - case oLoggerFD: + case oLoggerFD: log_set_fd (translate_sys2libc_fd_int (pargs.r.ret_int, 1)); break; case oHomedir: opt.homedir = pargs.r.ret_str; break; @@ -188,7 +188,7 @@ main( int argc, char **argv ) default : pargs.err = ARGPARSE_PRINT_ERROR; break; } } - + if (log_get_errorcount (0)) g10_exit(2); @@ -200,14 +200,14 @@ main( int argc, char **argv ) keydb_add_resource ("trustedkeys" EXTSEP_S "gpg", 8); for (sl = nrings; sl; sl = sl->next) keydb_add_resource (sl->d, 8); - + FREE_STRLIST (nrings); ctrl = xcalloc (1, sizeof *ctrl); - + if ((rc = verify_signatures (ctrl, argc, argv))) log_error("verify signatures failed: %s\n", g10_errstr(rc) ); - + xfree (ctrl); /* cleanup */ @@ -225,7 +225,7 @@ g10_exit( int rc ) /* Stub: - * We have to override the trustcheck from pkclist.c becuase + * We have to override the trustcheck from pkclist.c becuase * this utility assumes that all keys in the keyring are trustworthy */ int @@ -237,7 +237,7 @@ check_signatures_trust( PKT_signature *sig ) void read_trust_options(byte *trust_model, ulong *created, ulong *nextcheck, - byte *marginals, byte *completes, byte *cert_depth) + byte *marginals, byte *completes, byte *cert_depth) { (void)trust_model; (void)created; @@ -247,7 +247,7 @@ read_trust_options(byte *trust_model, ulong *created, ulong *nextcheck, (void)cert_depth; } -/* Stub: +/* Stub: * We don't have the trustdb , so we have to provide some stub functions * instead */ @@ -260,7 +260,7 @@ cache_disabled_value(PKT_public_key *pk) } void -check_trustdb_stale(void) +check_trustdb_stale(void) { } @@ -319,7 +319,7 @@ struct keyserver_spec * keyserver_match (struct keyserver_spec *spec) { (void)spec; - return NULL; + return NULL; } int @@ -334,7 +334,7 @@ int keyserver_import_cert (const char *name) { (void)name; - return -1; + return -1; } int @@ -413,7 +413,7 @@ check_secret_key (PKT_public_key *pk, int n) } /* Stub: - * No secret key, so no passphrase needed + * No secret key, so no passphrase needed */ DEK * passphrase_to_dek (u32 *keyid, int pubkey_algo, @@ -441,7 +441,7 @@ passphrase_clear_cache (u32 *keyid, const char *cacheid, int algo) } struct keyserver_spec * -parse_preferred_keyserver(PKT_signature *sig) +parse_preferred_keyserver(PKT_signature *sig) { (void)sig; return NULL; @@ -458,14 +458,14 @@ parse_keyserver_uri (const char *uri, int require_scheme, return NULL; } -void +void free_keyserver_spec (struct keyserver_spec *keyserver) { (void)keyserver; } /* Stubs to avoid linking to photoid.c */ -void +void show_photos (const struct user_attribute *attrs, int count, PKT_public_key *pk) { (void)attrs; @@ -473,7 +473,7 @@ show_photos (const struct user_attribute *attrs, int count, PKT_public_key *pk) (void)pk; } -int +int parse_image_header (const struct user_attribute *attr, byte *type, u32 *len) { (void)attr; @@ -491,7 +491,7 @@ image_type_to_string (byte type, int string) } #ifdef ENABLE_CARD_SUPPORT -int +int agent_scd_getattr (const char *name, struct agent_card_info_s *info) { (void)name; @@ -501,19 +501,19 @@ agent_scd_getattr (const char *name, struct agent_card_info_s *info) #endif /* ENABLE_CARD_SUPPORT */ /* We do not do any locking, so use these stubs here */ -void +void disable_dotlock (void) { } -dotlock_t +dotlock_t create_dotlock (const char *file_to_lock) { (void)file_to_lock; return NULL; } -void +void destroy_dotlock (dotlock_t h) { (void)h; @@ -534,7 +534,7 @@ release_dotlock (dotlock_t h) return 0; } -void +void remove_lockfiles (void) { } @@ -563,4 +563,3 @@ agent_get_keyinfo (ctrl_t ctrl, const char *hexkeygrip, char **r_serialno) *r_serialno = NULL; return gpg_error (GPG_ERR_NO_SECKEY); } - |