aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorWerner Koch <[email protected]>2017-07-19 08:12:00 +0000
committerWerner Koch <[email protected]>2017-07-19 08:12:00 +0000
commitaababe237d0fdabd986f45a49a507cfcfc95bfb8 (patch)
tree62ffca29ee0405e159b63c44f1540acd9d4f4f51
parentgpg: Fix memory leak. (diff)
downloadgnupg-aababe237d0fdabd986f45a49a507cfcfc95bfb8.tar.gz
gnupg-aababe237d0fdabd986f45a49a507cfcfc95bfb8.zip
indent: Fix indentation of an if block.
--
-rw-r--r--g10/keylist.c36
1 files changed, 18 insertions, 18 deletions
diff --git a/g10/keylist.c b/g10/keylist.c
index 27283087a..93901424c 100644
--- a/g10/keylist.c
+++ b/g10/keylist.c
@@ -133,7 +133,7 @@ print_seckey_info (PKT_secret_key *sk)
nbits_from_sk (sk),
pubkey_letter (sk->pubkey_algo),
keystr(keyid), datestr_from_sk (sk), p);
-
+
xfree (p);
}
@@ -177,13 +177,13 @@ print_card_key_info (FILE *fp, KBNODE keyblock)
KBNODE node;
int i;
- for (node = keyblock; node; node = node->next )
+ for (node = keyblock; node; node = node->next )
{
if (node->pkt->pkttype == PKT_SECRET_KEY
|| (node->pkt->pkttype == PKT_SECRET_SUBKEY) )
{
PKT_secret_key *sk = node->pkt->pkt.secret_key;
-
+
tty_fprintf (fp, "%s%c %4u%c/%s ",
node->pkt->pkttype == PKT_SECRET_KEY? "sec":"ssb",
(sk->protect.s2k.mode==1001)?'#':
@@ -197,10 +197,10 @@ print_card_key_info (FILE *fp, KBNODE keyblock)
if (sk->is_protected && sk->protect.s2k.mode == 1002)
{
tty_fprintf (fp, "\n ");
- tty_fprintf (fp, _("card-no: "));
+ tty_fprintf (fp, _("card-no: "));
if (sk->protect.ivlen == 16
&& !memcmp (sk->protect.iv, "\xD2\x76\x00\x01\x24\x01", 6))
- {
+ {
/* This is an OpenPGP card. */
for (i=8; i < 14; i++)
{
@@ -446,7 +446,7 @@ list_all( int secret )
merge_keys_and_selfsig( keyblock );
list_keyblock( keyblock, secret, opt.fingerprint,
opt.check_sigs?&stats:NULL);
- release_kbnode( keyblock );
+ release_kbnode( keyblock );
keyblock = NULL;
} while (!(rc = keydb_search_next (hd)));
if( rc && rc != -1 )
@@ -580,7 +580,7 @@ print_capabilities (PKT_public_key *pk, PKT_secret_key *sk, KBNODE keyblock)
int enc=0, sign=0, cert=0, auth=0, disabled=0;
for (k=keyblock; k; k = k->next ) {
- if ( k->pkt->pkttype == PKT_PUBLIC_KEY
+ if ( k->pkt->pkttype == PKT_PUBLIC_KEY
|| k->pkt->pkttype == PKT_PUBLIC_SUBKEY ) {
pk = k->pkt->pkt.public_key;
@@ -602,7 +602,7 @@ print_capabilities (PKT_public_key *pk, PKT_secret_key *sk, KBNODE keyblock)
auth = 1;
}
}
- else if ( k->pkt->pkttype == PKT_SECRET_KEY
+ else if ( k->pkt->pkttype == PKT_SECRET_KEY
|| k->pkt->pkttype == PKT_SECRET_SUBKEY ) {
sk = k->pkt->pkt.secret_key;
if ( sk->is_valid && !sk->is_revoked && !sk->has_expired
@@ -933,7 +933,7 @@ list_keyblock_print ( KBNODE keyblock, int secret, int fpr, void *opaque )
switch( rc ) {
case 0: sigrc = '!'; break;
case G10ERR_BAD_SIGN: stats->inv_sigs++; sigrc = '-'; break;
- case G10ERR_NO_PUBKEY:
+ case G10ERR_NO_PUBKEY:
case G10ERR_UNU_PUBKEY: stats->no_key++; continue;
default: stats->oth_err++; sigrc = '%'; break;
}
@@ -1077,7 +1077,7 @@ list_keyblock_colon( KBNODE keyblock, int secret, int fpr )
putchar ('r');
else if ( pk->has_expired )
putchar ('e');
- else if ( opt.fast_list_mode || opt.no_expensive_trust_checks )
+ else if ( opt.fast_list_mode || opt.no_expensive_trust_checks )
;
else {
trustletter = get_validity_info ( pk, NULL );
@@ -1093,7 +1093,7 @@ list_keyblock_colon( KBNODE keyblock, int secret, int fpr )
colon_strtime (pk->expiredate) );
if( !opt.fast_list_mode && !opt.no_expensive_trust_checks )
putchar( get_ownertrust_info(pk) );
- putchar(':');
+ putchar(':');
}
if (opt.fixed_list_mode) {
@@ -1131,7 +1131,7 @@ list_keyblock_colon( KBNODE keyblock, int secret, int fpr )
if(attrib_fp && node->pkt->pkt.user_id->attrib_data!=NULL)
dump_attribs(node->pkt->pkt.user_id,pk,sk);
/*
- * Fixme: We need a is_valid flag here too
+ * Fixme: We need a is_valid flag here too
*/
if( any ) {
char *str=uid->attrib_data?"uat":"uid";
@@ -1323,7 +1323,7 @@ list_keyblock_colon( KBNODE keyblock, int secret, int fpr )
switch( rc ) {
case 0: sigrc = '!'; break;
case G10ERR_BAD_SIGN: sigrc = '-'; break;
- case G10ERR_NO_PUBKEY:
+ case G10ERR_NO_PUBKEY:
case G10ERR_UNU_PUBKEY: sigrc = '?'; break;
default: sigrc = '%'; break;
}
@@ -1411,8 +1411,8 @@ do_reorder_keyblock (KBNODE keyblock,int attr)
node->pkt->pkt.user_id->is_primary ) {
primary = primary2 = node;
for (node=node->next; node; primary2=node, node = node->next ) {
- if( node->pkt->pkttype == PKT_USER_ID
- || node->pkt->pkttype == PKT_PUBLIC_SUBKEY
+ if( node->pkt->pkttype == PKT_USER_ID
+ || node->pkt->pkttype == PKT_PUBLIC_SUBKEY
|| node->pkt->pkttype == PKT_SECRET_SUBKEY ) {
break;
}
@@ -1534,7 +1534,7 @@ print_fingerprint (PKT_public_key *pk, PKT_secret_key *sk, int mode )
fp = stdout;
text = _(" Key fingerprint =");
}
-
+
if (sk)
fingerprint_from_sk (sk, array, &n);
else
@@ -1594,7 +1594,7 @@ print_card_serialno (PKT_secret_key *sk)
if (!sk)
return;
- if (!sk->is_protected || sk->protect.s2k.mode != 1002)
+ if (!sk->is_protected || sk->protect.s2k.mode != 1002)
return; /* Not a card. */
if (opt.with_colons)
return; /* Handled elsewhere. */
@@ -1631,7 +1631,7 @@ void set_attrib_fd(int fd)
if ( attrib_fp && attrib_fp != stdout && attrib_fp != stderr )
fclose (attrib_fp);
attrib_fp = NULL;
- if ( fd == -1 )
+ if ( fd == -1 )
return;
if( fd == 1 )