mirror of
https://github.com/ckolivas/lrzip.git
synced 2025-12-06 07:12:00 +01:00
remove trailing whitespace
This commit is contained in:
parent
223a1107ea
commit
3316dd5505
10
aes.c
10
aes.c
|
|
@ -61,10 +61,10 @@
|
|||
* Forward S-box & tables
|
||||
*/
|
||||
static unsigned char FSb[256];
|
||||
static unsigned long FT0[256];
|
||||
static unsigned long FT1[256];
|
||||
static unsigned long FT2[256];
|
||||
static unsigned long FT3[256];
|
||||
static unsigned long FT0[256];
|
||||
static unsigned long FT1[256];
|
||||
static unsigned long FT2[256];
|
||||
static unsigned long FT3[256];
|
||||
|
||||
/*
|
||||
* Reverse S-box & tables
|
||||
|
|
@ -501,7 +501,7 @@ int aes_crypt_cbc( aes_context *ctx,
|
|||
{
|
||||
if( padlock_xcryptcbc( ctx, mode, length, iv, input, output ) == 0 )
|
||||
return( 0 );
|
||||
|
||||
|
||||
// If padlock data misaligned, we just fall back to
|
||||
// unaccelerated mode
|
||||
//
|
||||
|
|
|
|||
|
|
@ -35,7 +35,7 @@ static bool liblrzip_setup_flags(Lrzip *lr)
|
|||
lr->control->flags |= FLAG_##X##_COMPRESS; \
|
||||
break
|
||||
|
||||
|
||||
|
||||
switch (lr->mode) {
|
||||
case LRZIP_MODE_DECOMPRESS:
|
||||
lr->control->flags |= FLAG_DECOMPRESS;
|
||||
|
|
@ -257,13 +257,13 @@ bool lrzip_file_add(Lrzip *lr, FILE *file)
|
|||
}
|
||||
|
||||
lr->infiles[lr->infile_idx++] = file;
|
||||
return true;
|
||||
return true;
|
||||
}
|
||||
|
||||
bool lrzip_file_del(Lrzip *lr, FILE *file)
|
||||
{
|
||||
size_t x;
|
||||
|
||||
|
||||
if ((!lr) || (!file)) return false;
|
||||
if (!lr->infile_buckets) return true;
|
||||
|
||||
|
|
@ -313,7 +313,7 @@ bool lrzip_filename_add(Lrzip *lr, const char *file)
|
|||
bool lrzip_filename_del(Lrzip *lr, const char *file)
|
||||
{
|
||||
size_t x;
|
||||
|
||||
|
||||
if ((!lr) || (!file) || (!file[0])) return false;
|
||||
if (!lr->infilename_buckets) return true;
|
||||
|
||||
|
|
|
|||
2
lrzip.c
2
lrzip.c
|
|
@ -1148,7 +1148,7 @@ bool compress_file(rzip_control *control)
|
|||
control->fd_out = fd_out;
|
||||
if (!STDIN)
|
||||
if (unlikely(!preserve_perms(control, fd_in, fd_out))) goto error;
|
||||
} else
|
||||
} else
|
||||
if (unlikely(!open_tmpoutbuf(control))) goto error;
|
||||
|
||||
/* Write zeroes to header at beginning of file */
|
||||
|
|
|
|||
2
rzip.c
2
rzip.c
|
|
@ -725,7 +725,7 @@ static bool mmap_stdin(rzip_control *control, uchar *buf, struct rzip_state *st)
|
|||
buf = (uchar *)mremap(buf, st->chunk_size, total, 0);
|
||||
st->mmap_size = st->chunk_size = total;
|
||||
} else {
|
||||
/* Empty file */
|
||||
/* Empty file */
|
||||
buf = (uchar *)mremap(buf, st->chunk_size, control->page_size, 0);
|
||||
st->mmap_size = control->page_size;
|
||||
st->chunk_size = 0;
|
||||
|
|
|
|||
8
stream.c
8
stream.c
|
|
@ -981,7 +981,7 @@ bool close_streamout_threads(rzip_control *control)
|
|||
free(threads);
|
||||
return false;
|
||||
}
|
||||
|
||||
|
||||
if (++close_thread == control->threads)
|
||||
close_thread = 0;
|
||||
}
|
||||
|
|
@ -1283,7 +1283,7 @@ static bool rewrite_encrypted(rzip_control *control, struct stream_info *sinfo,
|
|||
if (unlikely(write_buf(control, head, SALT_LEN)))
|
||||
failure_goto(("Failed to write_buf head in rewrite_encrypted\n"), error);
|
||||
if (unlikely(read_buf(control, sinfo->fd, buf, 25)))
|
||||
|
||||
|
||||
failure_goto(("Failed to read_buf buf in rewrite_encrypted\n"), error);
|
||||
|
||||
if (unlikely(!lrz_encrypt(control, buf, 25, head))) goto error;
|
||||
|
|
@ -1314,7 +1314,7 @@ static void *compthread(void *data)
|
|||
int write_len;
|
||||
|
||||
/* Make sure this thread doesn't already exist */
|
||||
|
||||
|
||||
free(data);
|
||||
cti = &cthread[i];
|
||||
ctis = cti->sinfo;
|
||||
|
|
@ -1501,7 +1501,7 @@ static bool clear_buffer(rzip_control *control, struct stream_info *sinfo, int s
|
|||
unlock_mutex(control, &cthread[i].mutex);
|
||||
return false;
|
||||
}
|
||||
|
||||
|
||||
|
||||
if (newbuf) {
|
||||
/* The stream buffer has been given to the thread, allocate a
|
||||
|
|
|
|||
2
util.c
2
util.c
|
|
@ -365,7 +365,7 @@ bool lrz_crypt(const rzip_control *control, uchar *buf, i64 len, const uchar *sa
|
|||
if (unlikely(aes_setkey_enc(&aes_ctx, key, 128)))
|
||||
failure_goto(("Failed to aes_setkey_enc in lrz_crypt\n"), error);
|
||||
aes_crypt_cbc(&aes_ctx, AES_ENCRYPT, N, iv, buf, buf);
|
||||
|
||||
|
||||
if (M) {
|
||||
memset(tmp0, 0, CBC_LEN);
|
||||
memcpy(tmp0, buf + N, M);
|
||||
|
|
|
|||
Loading…
Reference in a new issue