summaryrefslogtreecommitdiff
path: root/tests/keygen.c
diff options
context:
space:
mode:
authorWerner Koch <wk@gnupg.org>2011-02-04 20:21:45 +0100
committerWerner Koch <wk@gnupg.org>2011-02-04 20:21:45 +0100
commit4f048514ecae879fa4bb7b8522baf801229be522 (patch)
treed798c8527b68e83e4419c14d7c6dd47f2abdfd9e /tests/keygen.c
parent9d00b28e0d04361fe9ccf02983bea781b5701c1d (diff)
downloadlibgcrypt-4f048514ecae879fa4bb7b8522baf801229be522.tar.gz
Nuked almost all trailing whitespace.
Check and install the standard git pre-commit hook.
Diffstat (limited to 'tests/keygen.c')
-rw-r--r--tests/keygen.c19
1 files changed, 9 insertions, 10 deletions
diff --git a/tests/keygen.c b/tests/keygen.c
index f5d5610c..3774624e 100644
--- a/tests/keygen.c
+++ b/tests/keygen.c
@@ -95,7 +95,7 @@ check_generated_rsa_key (gcry_sexp_t key, unsigned long expected_e)
if (verbose)
print_mpi ("e", e);
}
- else if ( gcry_mpi_cmp_ui (e, expected_e))
+ else if ( gcry_mpi_cmp_ui (e, expected_e))
{
print_mpi ("e", e);
fail ("public exponent is not %lu\n", expected_e);
@@ -104,7 +104,7 @@ check_generated_rsa_key (gcry_sexp_t key, unsigned long expected_e)
gcry_mpi_release (e);
gcry_sexp_release (pkey);
}
-
+
skey = gcry_sexp_find_token (key, "private-key", 0);
if (!skey)
fail ("private part missing in return value\n");
@@ -131,7 +131,7 @@ check_rsa_keys (void)
fprintf (stderr, "creating 5 1024 bit DSA keys\n");
for (i=0; i < 5; i++)
{
- rc = gcry_sexp_new (&keyparm,
+ rc = gcry_sexp_new (&keyparm,
"(genkey\n"
" (dsa\n"
" (nbits 4:1024)\n"
@@ -149,7 +149,7 @@ check_rsa_keys (void)
if (verbose)
fprintf (stderr, "creating 1536 bit DSA key\n");
- rc = gcry_sexp_new (&keyparm,
+ rc = gcry_sexp_new (&keyparm,
"(genkey\n"
" (dsa\n"
" (nbits 4:1536)\n"
@@ -173,7 +173,7 @@ check_rsa_keys (void)
if (verbose)
fprintf (stderr, "creating 1024 bit RSA key\n");
- rc = gcry_sexp_new (&keyparm,
+ rc = gcry_sexp_new (&keyparm,
"(genkey\n"
" (rsa\n"
" (nbits 4:1024)\n"
@@ -191,7 +191,7 @@ check_rsa_keys (void)
if (verbose)
fprintf (stderr, "creating 512 bit RSA key with e=257\n");
- rc = gcry_sexp_new (&keyparm,
+ rc = gcry_sexp_new (&keyparm,
"(genkey\n"
" (rsa\n"
" (nbits 3:512)\n"
@@ -209,7 +209,7 @@ check_rsa_keys (void)
if (verbose)
fprintf (stderr, "creating 512 bit RSA key with default e\n");
- rc = gcry_sexp_new (&keyparm,
+ rc = gcry_sexp_new (&keyparm,
"(genkey\n"
" (rsa\n"
" (nbits 3:512)\n"
@@ -275,7 +275,7 @@ progress_cb (void *cb_data, const char *what, int printchar,
(void)what;
(void)current;
(void)total;
-
+
if (printchar == '\n')
fputs ( "<LF>", stdout);
else
@@ -305,7 +305,6 @@ main (int argc, char **argv)
check_rsa_keys ();
check_nonce ();
-
+
return error_count? 1:0;
}
-