aboutsummaryrefslogtreecommitdiffstats
path: root/g10/pkclist.c
diff options
context:
space:
mode:
Diffstat (limited to 'g10/pkclist.c')
-rw-r--r--g10/pkclist.c132
1 files changed, 66 insertions, 66 deletions
diff --git a/g10/pkclist.c b/g10/pkclist.c
index ba36a0ca1..626250ff6 100644
--- a/g10/pkclist.c
+++ b/g10/pkclist.c
@@ -47,7 +47,7 @@ send_status_inv_recp (int reason, const char *name)
snprintf (buf, sizeof buf, "%d ", reason);
write_status_text_and_buffer (STATUS_INV_RECP, buf,
- name, strlen (name),
+ name, strlen (name),
-1);
}
@@ -170,7 +170,7 @@ show_revocation_reason( PKT_public_key *pk, int mode )
* mode: 0 = standard
* 1 = Without key info and additional menu option 'm'
* this does also add an option to set the key to ultimately trusted.
- * Returns:
+ * Returns:
* -2 = nothing changed - caller should show some additional info
* -1 = quit operation
* 0 = nothing changed
@@ -206,7 +206,7 @@ do_edit_ownertrust (PKT_public_key *pk, int mode,
uppercase. Below you will find the matching strings which
should be translated accordingly and the letter changed to
match the one in the answer string.
-
+
i = please show me more information
m = back to the main menu
s = skip this key
@@ -214,9 +214,9 @@ do_edit_ownertrust (PKT_public_key *pk, int mode,
*/
const char *ans = _("iImMqQsS");
- if( !did_help )
+ if( !did_help )
{
- if( !mode )
+ if( !mode )
{
KBNODE keyblock, un;
@@ -243,7 +243,7 @@ do_edit_ownertrust (PKT_public_key *pk, int mode,
if (un->pkt->pkt.user_id->is_primary
&& !un->pkt->pkt.user_id->attrib_data )
continue;
-
+
if((opt.verify_options&VERIFY_SHOW_PHOTOS)
&& un->pkt->pkt.user_id->attrib_data)
show_photos (un->pkt->pkt.user_id->attribs,
@@ -255,7 +255,7 @@ do_edit_ownertrust (PKT_public_key *pk, int mode,
tty_printf(_(" aka \"%s\"\n"),p);
}
-
+
print_fingerprint (pk, 2);
tty_printf("\n");
release_kbnode (keyblock);
@@ -313,7 +313,7 @@ do_edit_ownertrust (PKT_public_key *pk, int mode,
did_help = 0;
else if( *p && p[1] )
;
- else if( !p[1] && ((*p >= '0'+min_num) && *p <= (mode?'5':'4')) )
+ else if( !p[1] && ((*p >= '0'+min_num) && *p <= (mode?'5':'4')) )
{
unsigned int trust;
switch( *p )
@@ -339,14 +339,14 @@ do_edit_ownertrust (PKT_public_key *pk, int mode,
}
#if 0
/* not yet implemented */
- else if( *p == ans[0] || *p == ans[1] )
+ else if( *p == ans[0] || *p == ans[1] )
{
tty_printf(_("Certificates leading to an ultimately trusted key:\n"));
show = 1;
break;
}
#endif
- else if( mode && (*p == ans[2] || *p == ans[3] || *p == CONTROL_D ) )
+ else if( mode && (*p == ans[2] || *p == ans[3] || *p == CONTROL_D ) )
{
break ; /* back to the menu */
}
@@ -365,9 +365,9 @@ do_edit_ownertrust (PKT_public_key *pk, int mode,
return show? -2: quit? -1 : changed;
}
-/*
+/*
* Display a menu to change the ownertrust of the key PK (which should
- * be a primary key).
+ * be a primary key).
* For mode values see do_edit_ownertrust ()
*/
int
@@ -424,7 +424,7 @@ do_we_trust( PKT_public_key *pk, unsigned int trustlevel )
log_error ("invalid trustlevel %u returned from validation layer\n",
trustlevel);
/* fall thru */
- case TRUST_UNKNOWN:
+ case TRUST_UNKNOWN:
case TRUST_UNDEFINED:
log_info(_("%s: There is no assurance this key belongs"
" to the named user\n"),keystr_from_pk(pk));
@@ -474,12 +474,12 @@ do_we_trust_pre( PKT_public_key *pk, unsigned int trustlevel )
tty_printf("\n");
-
+
if (is_status_enabled ())
{
u32 kid[2];
char *hint_str;
-
+
keyid_from_pk (pk, kid);
hint_str = get_long_user_id_string ( kid );
write_status_text ( STATUS_USERID_HINT, hint_str );
@@ -511,7 +511,7 @@ check_signatures_trust( PKT_signature *sig )
int rc=0;
rc = get_pubkey( pk, sig->keyid );
- if (rc)
+ if (rc)
{ /* this should not happen */
log_error("Ooops; the key vanished - can't check the trust\n");
rc = G10ERR_NO_PUBKEY;
@@ -533,7 +533,7 @@ check_signatures_trust( PKT_signature *sig )
trustlevel = get_validity (pk, NULL);
- if ( (trustlevel & TRUST_FLAG_REVOKED) )
+ if ( (trustlevel & TRUST_FLAG_REVOKED) )
{
write_status( STATUS_KEYREVOKED );
if(pk->flags.revoked == 2)
@@ -544,13 +544,13 @@ check_signatures_trust( PKT_signature *sig )
log_info(_(" This could mean that the signature is forged.\n"));
show_revocation_reason( pk, 0 );
}
- else if ((trustlevel & TRUST_FLAG_SUB_REVOKED) )
+ else if ((trustlevel & TRUST_FLAG_SUB_REVOKED) )
{
write_status( STATUS_KEYREVOKED );
log_info(_("WARNING: This subkey has been revoked by its owner!\n"));
show_revocation_reason( pk, 0 );
}
-
+
if ((trustlevel & TRUST_FLAG_DISABLED))
log_info (_("Note: This key has been disabled.\n"));
@@ -583,9 +583,9 @@ check_signatures_trust( PKT_signature *sig )
"does not match DNS entry\n"), sig->pka_info->email);
}
- switch ( (trustlevel & TRUST_MASK) )
+ switch ( (trustlevel & TRUST_MASK) )
{
- case TRUST_UNKNOWN:
+ case TRUST_UNKNOWN:
case TRUST_UNDEFINED:
case TRUST_MARGINAL:
if (okay && opt.verify_options&VERIFY_PKA_TRUST_INCREASE)
@@ -607,18 +607,18 @@ check_signatures_trust( PKT_signature *sig )
}
/* Now let the user know what up with the trustlevel. */
- switch ( (trustlevel & TRUST_MASK) )
+ switch ( (trustlevel & TRUST_MASK) )
{
case TRUST_EXPIRED:
log_info(_("Note: This key has expired!\n"));
print_fingerprint (pk, 1);
break;
-
+
default:
log_error ("invalid trustlevel %u returned from validation layer\n",
trustlevel);
/* fall thru */
- case TRUST_UNKNOWN:
+ case TRUST_UNKNOWN:
case TRUST_UNDEFINED:
write_status( STATUS_TRUST_UNDEFINED );
log_info(_("WARNING: This key is not certified with"
@@ -670,7 +670,7 @@ void
release_pk_list (pk_list_t pk_list)
{
PK_LIST pk_rover;
-
+
for ( ; pk_list; pk_list = pk_rover)
{
pk_rover = pk_list->next;
@@ -778,7 +778,7 @@ expand_group(strlist_t input)
of the key. USE the requested usage and a set MARK_HIDDEN will mark
the key in the updated list as a hidden recipient. */
gpg_error_t
-find_and_check_key (ctrl_t ctrl, const char *name, unsigned int use,
+find_and_check_key (ctrl_t ctrl, const char *name, unsigned int use,
int mark_hidden, pk_list_t *pk_list_addr)
{
int rc;
@@ -815,7 +815,7 @@ find_and_check_key (ctrl_t ctrl, const char *name, unsigned int use,
/* Key found and usable. Check validity. */
trustlevel = get_validity (pk, pk->user_id);
- if ( (trustlevel & TRUST_FLAG_DISABLED) )
+ if ( (trustlevel & TRUST_FLAG_DISABLED) )
{
/* Key has been disabled. */
send_status_inv_recp (0, name);
@@ -824,7 +824,7 @@ find_and_check_key (ctrl_t ctrl, const char *name, unsigned int use,
return G10ERR_UNU_PUBKEY;
}
- if ( !do_we_trust_pre (pk, trustlevel) )
+ if ( !do_we_trust_pre (pk, trustlevel) )
{
/* We don't trust this key. */
send_status_inv_recp (10, name);
@@ -832,10 +832,10 @@ find_and_check_key (ctrl_t ctrl, const char *name, unsigned int use,
return G10ERR_UNU_PUBKEY;
}
/* Note: do_we_trust may have changed the trustlevel. */
-
+
/* Skip the actual key if the key is already present in the
list. */
- if (!key_present_in_pk_list (*pk_list_addr, pk))
+ if (!key_present_in_pk_list (*pk_list_addr, pk))
{
log_info (_("%s: skipped: public key already present\n"), name);
free_public_key (pk);
@@ -843,7 +843,7 @@ find_and_check_key (ctrl_t ctrl, const char *name, unsigned int use,
else
{
pk_list_t r;
-
+
r = xtrymalloc (sizeof *r);
if (!r)
{
@@ -856,7 +856,7 @@ find_and_check_key (ctrl_t ctrl, const char *name, unsigned int use,
r->flags = mark_hidden? 1:0;
*pk_list_addr = r;
}
-
+
return 0;
}
@@ -901,7 +901,7 @@ build_pk_list (ctrl_t ctrl,
/* Check whether there are any recipients in the list and build the
* list of the encrypt-to ones (we always trust them). */
- for ( rov = remusr; rov; rov = rov->next )
+ for ( rov = remusr; rov; rov = rov->next )
{
if ( !(rov->flags & 1) )
{
@@ -920,7 +920,7 @@ build_pk_list (ctrl_t ctrl,
compliance_failure();
}
}
- else if ( (use & PUBKEY_USAGE_ENC) && !opt.no_encrypt_to )
+ else if ( (use & PUBKEY_USAGE_ENC) && !opt.no_encrypt_to )
{
/* Encryption has been requested and --encrypt-to has not
been disabled. Check this encrypt-to key. */
@@ -931,14 +931,14 @@ build_pk_list (ctrl_t ctrl,
we pass 1for the second last argument and 1 as the last
argument to disable AKL. */
if ( (rc = get_pubkey_byname (ctrl,
- NULL, pk, rov->d, NULL, NULL, 1, 1)) )
+ NULL, pk, rov->d, NULL, NULL, 1, 1)) )
{
free_public_key ( pk ); pk = NULL;
log_error (_("%s: skipped: %s\n"), rov->d, g10_errstr(rc) );
send_status_inv_recp (0, rov->d);
goto fail;
}
- else if ( !(rc=openpgp_pk_test_algo2 (pk->pubkey_algo, use)) )
+ else if ( !(rc=openpgp_pk_test_algo2 (pk->pubkey_algo, use)) )
{
/* Skip the actual key if the key is already present
* in the list. Add it to our list if not. */
@@ -970,7 +970,7 @@ build_pk_list (ctrl_t ctrl,
}
}
}
- else
+ else
{
/* The public key is not usable for encryption or not
available. */
@@ -984,8 +984,8 @@ build_pk_list (ctrl_t ctrl,
/* If we don't have any recipients yet and we are not in batch mode
drop into interactive selection mode. */
- if ( !any_recipients && !opt.batch )
- {
+ if ( !any_recipients && !opt.batch )
+ {
int have_def_rec;
char *answer = NULL;
strlist_t backlog = NULL;
@@ -997,7 +997,7 @@ build_pk_list (ctrl_t ctrl,
if ( !have_def_rec )
tty_printf(_("You did not specify a user ID. (you may use \"-r\")\n"));
- for (;;)
+ for (;;)
{
rc = 0;
xfree(answer);
@@ -1007,7 +1007,7 @@ build_pk_list (ctrl_t ctrl,
answer = def_rec;
def_rec = NULL;
}
- else if (backlog)
+ else if (backlog)
{
/* This is part of our trick to expand and display groups. */
answer = strlist_pop (&backlog);
@@ -1050,8 +1050,8 @@ build_pk_list (ctrl_t ctrl,
trim_spaces(answer);
cpr_kill_prompt();
}
-
- if ( !answer || !*answer )
+
+ if ( !answer || !*answer )
{
xfree(answer);
break; /* No more recipients entered - get out of loop. */
@@ -1071,12 +1071,12 @@ build_pk_list (ctrl_t ctrl,
rc = get_pubkey_byname (ctrl, NULL, pk, answer, NULL, NULL, 0, 0 );
if (rc)
tty_printf(_("No such user ID.\n"));
- else if ( !(rc=openpgp_pk_test_algo2 (pk->pubkey_algo, use)) )
+ else if ( !(rc=openpgp_pk_test_algo2 (pk->pubkey_algo, use)) )
{
if ( have_def_rec )
{
/* No validation for a default recipient. */
- if (!key_present_in_pk_list(pk_list, pk))
+ if (!key_present_in_pk_list(pk_list, pk))
{
free_public_key (pk); pk = NULL;
log_info (_("skipped: public key "
@@ -1096,13 +1096,13 @@ build_pk_list (ctrl_t ctrl,
else
{ /* Check validity of this key. */
int trustlevel;
-
+
trustlevel = get_validity (pk, pk->user_id);
- if ( (trustlevel & TRUST_FLAG_DISABLED) )
+ if ( (trustlevel & TRUST_FLAG_DISABLED) )
{
tty_printf (_("Public key is disabled.\n") );
}
- else if ( do_we_trust_pre (pk, trustlevel) )
+ else if ( do_we_trust_pre (pk, trustlevel) )
{
/* Skip the actual key if the key is already
* present in the list */
@@ -1134,7 +1134,7 @@ build_pk_list (ctrl_t ctrl,
pk = NULL;
}
}
- else if ( !any_recipients && (def_rec = default_recipient()) )
+ else if ( !any_recipients && (def_rec = default_recipient()) )
{
/* We are in batch mode and have only a default recipient. */
pk = xmalloc_clear( sizeof *pk );
@@ -1145,7 +1145,7 @@ build_pk_list (ctrl_t ctrl,
rc = get_pubkey_byname (ctrl, NULL, pk, def_rec, NULL, NULL, 1, 1);
if (rc)
log_error(_("unknown default recipient \"%s\"\n"), def_rec );
- else if ( !(rc=openpgp_pk_test_algo2(pk->pubkey_algo, use)) )
+ else if ( !(rc=openpgp_pk_test_algo2(pk->pubkey_algo, use)) )
{
/* Mark any_recipients here since the default recipient
would have been used if it wasn't already there. It
@@ -1155,7 +1155,7 @@ build_pk_list (ctrl_t ctrl,
if (!key_present_in_pk_list(pk_list, pk))
log_info (_("skipped: public key already set "
"as default recipient\n"));
- else
+ else
{
PK_LIST r = xmalloc( sizeof *r );
r->pk = pk; pk = NULL;
@@ -1171,11 +1171,11 @@ build_pk_list (ctrl_t ctrl,
}
xfree(def_rec); def_rec = NULL;
}
- else
+ else
{
/* General case: Check all keys. */
any_recipients = 0;
- for (; remusr; remusr = remusr->next )
+ for (; remusr; remusr = remusr->next )
{
if ( (remusr->flags & 1) )
continue; /* encrypt-to keys are already handled. */
@@ -1187,14 +1187,14 @@ build_pk_list (ctrl_t ctrl,
any_recipients = 1;
}
}
-
- if ( !rc && !any_recipients )
+
+ if ( !rc && !any_recipients )
{
log_error(_("no valid addressees\n"));
write_status_text (STATUS_NO_RECP, "0");
rc = G10ERR_NO_USER_ID;
}
-
+
fail:
if ( rc )
@@ -1233,7 +1233,7 @@ algo_available( preftype_t preftype, int algo, const union pref_hint *hint)
&& algo != CIPHER_ALGO_3DES
&& algo != CIPHER_ALGO_CAST5))
return 0;
-
+
if(PGP7 && (algo != CIPHER_ALGO_IDEA
&& algo != CIPHER_ALGO_3DES
&& algo != CIPHER_ALGO_CAST5
@@ -1439,7 +1439,7 @@ select_algo_from_prefs(PK_LIST pk_list, int preftype,
if(result==-1)
{
- unsigned int best=-1;
+ unsigned int best=-1;
/* At this point, we have not selected an algorithm due to a
special request or via personal prefs. Pick the highest
@@ -1497,11 +1497,11 @@ select_mdc_from_pklist (PK_LIST pk_list)
if ( !pk_list )
return 0;
-
- for (pkr = pk_list; pkr; pkr = pkr->next)
+
+ for (pkr = pk_list; pkr; pkr = pkr->next)
{
int mdc;
-
+
if (pkr->pk->user_id) /* selected by user ID */
mdc = pkr->pk->user_id->flags.mdc;
else
@@ -1518,8 +1518,8 @@ void
warn_missing_mdc_from_pklist (PK_LIST pk_list)
{
PK_LIST pkr;
-
- for (pkr = pk_list; pkr; pkr = pkr->next)
+
+ for (pkr = pk_list; pkr; pkr = pkr->next)
{
int mdc;
@@ -1537,8 +1537,8 @@ void
warn_missing_aes_from_pklist (PK_LIST pk_list)
{
PK_LIST pkr;
-
- for (pkr = pk_list; pkr; pkr = pkr->next)
+
+ for (pkr = pk_list; pkr; pkr = pkr->next)
{
const prefitem_t *prefs;
int i;
@@ -1548,7 +1548,7 @@ warn_missing_aes_from_pklist (PK_LIST pk_list)
if (prefs)
{
for (i=0; !gotit && prefs[i].type; i++ )
- if (prefs[i].type == PREFTYPE_SYM
+ if (prefs[i].type == PREFTYPE_SYM
&& prefs[i].value == CIPHER_ALGO_AES)
gotit++;
}