diff options
author | jbj <devnull@localhost> | 2001-10-13 22:01:38 +0000 |
---|---|---|
committer | jbj <devnull@localhost> | 2001-10-13 22:01:38 +0000 |
commit | 4b67d7621c20e1f2c5aa1ebdf7bb26eb3a6ae0d5 (patch) | |
tree | e9f6fa3bae9cc045fdd4f716ac747c1cad5e103e /rpmio/rpmpgp.c | |
parent | 525f4cb8b1317120c36a75f47f796d285f69078c (diff) | |
download | librpm-tizen-4b67d7621c20e1f2c5aa1ebdf7bb26eb3a6ae0d5.tar.gz librpm-tizen-4b67d7621c20e1f2c5aa1ebdf7bb26eb3a6ae0d5.tar.bz2 librpm-tizen-4b67d7621c20e1f2c5aa1ebdf7bb26eb3a6ae0d5.zip |
More lclint annotations.
CVS patchset: 5105
CVS date: 2001/10/13 22:01:38
Diffstat (limited to 'rpmio/rpmpgp.c')
-rw-r--r-- | rpmio/rpmpgp.c | 64 |
1 files changed, 32 insertions, 32 deletions
diff --git a/rpmio/rpmpgp.c b/rpmio/rpmpgp.c index be36fe8c8..06e5bc25c 100644 --- a/rpmio/rpmpgp.c +++ b/rpmio/rpmpgp.c @@ -339,9 +339,9 @@ int pgpPrtPktSigV3(pgpPkt pkt, const byte *h, unsigned int hlen) mp32nsethex(&_dig->c, pgpMpiHex(p)); if (_debug && _print) printf("\t m**d = "), mp32println(_dig->c.size, _dig->c.data); - break; + /*@switchbreak@*/ break; default: - break; + /*@switchbreak@*/ break; } } pgpPrtStr("", pgpSigRSA[i]); @@ -353,12 +353,12 @@ printf("\t m**d = "), mp32println(_dig->c.size, _dig->c.data); switch (i) { case 0: /* r */ pgpHexSet(pgpSigDSA[i], 160, &_dig->r, p); - break; + /*@switchbreak@*/ break; case 1: /* s */ pgpHexSet(pgpSigDSA[i], 160, &_dig->s, p); - break; + /*@switchbreak@*/ break; default: - break; + /*@switchbreak@*/ break; } } pgpPrtStr("", pgpSigDSA[i]); @@ -390,22 +390,22 @@ int pgpPrtSubType(const byte *h, unsigned int hlen) for (i = 1; i < plen; i++) pgpPrtVal(" ", pgpSymkeyTbl, p[i]); pgpPrtNL(); - break; + /*@switchbreak@*/ break; case PGPSUBTYPE_PREFER_HASH: /* preferred hash algorithms */ for (i = 1; i < plen; i++) pgpPrtVal(" ", pgpHashTbl, p[i]); pgpPrtNL(); - break; + /*@switchbreak@*/ break; case PGPSUBTYPE_PREFER_COMPRESS:/* preferred compression algorithms */ for (i = 1; i < plen; i++) pgpPrtVal(" ", pgpCompressionTbl, p[i]); pgpPrtNL(); - break; + /*@switchbreak@*/ break; case PGPSUBTYPE_KEYSERVER_PREFERS:/* key server preferences */ for (i = 1; i < plen; i++) pgpPrtVal(" ", pgpKeyServerPrefsTbl, p[i]); pgpPrtNL(); - break; + /*@switchbreak@*/ break; case PGPSUBTYPE_SIG_CREATE_TIME: case PGPSUBTYPE_SIG_EXPIRE_TIME: case PGPSUBTYPE_KEY_EXPIRE_TIME: @@ -416,7 +416,7 @@ int pgpPrtSubType(const byte *h, unsigned int hlen) } else pgpPrtHex("", p+1, plen-1); pgpPrtNL(); - break; + /*@switchbreak@*/ break; case PGPSUBTYPE_ISSUER_KEYID: /* issuer key ID */ case PGPSUBTYPE_EXPORTABLE_CERT: @@ -446,7 +446,7 @@ int pgpPrtSubType(const byte *h, unsigned int hlen) default: pgpPrtHex("", p+1, plen-1); pgpPrtNL(); - break; + /*@switchbreak@*/ break; } p += plen; hlen -= plen; @@ -513,9 +513,9 @@ fprintf(stderr, " unhash[%u] -- %s\n", plen, pgpHexStr(p, plen)); mp32nsethex(&_dig->c, pgpMpiHex(p)); if (_debug && _print) printf("\t m**d = "), mp32println(_dig->c.size, _dig->c.data); - break; + /*@switchbreak@*/ break; default: - break; + /*@switchbreak@*/ break; } } pgpPrtStr("", pgpSigRSA[i]); @@ -527,12 +527,12 @@ printf("\t m**d = "), mp32println(_dig->c.size, _dig->c.data); switch (i) { case 0: /* r */ pgpHexSet(pgpSigDSA[i], 160, &_dig->r, p); - break; + /*@switchbreak@*/ break; case 1: /* s */ pgpHexSet(pgpSigDSA[i], 160, &_dig->s, p); - break; + /*@switchbreak@*/ break; default: - break; + /*@switchbreak@*/ break; } } pgpPrtStr("", pgpSigDSA[i]); @@ -636,14 +636,14 @@ int pgpPrtKeyV3(pgpPkt pkt, const byte *h, unsigned int hlen) mp32bsethex(&_dig->rsa_pk.n, pgpMpiHex(p)); if (_debug && _print) printf("\t n = "), mp32println(_dig->rsa_pk.n.size, _dig->rsa_pk.n.modl); - break; + /*@switchbreak@*/ break; case 1: /* e */ mp32nsethex(&_dig->rsa_pk.e, pgpMpiHex(p)); if (_debug && _print) printf("\t e = "), mp32println(_dig->rsa_pk.e.size, _dig->rsa_pk.e.data); - break; + /*@switchbreak@*/ break; default: - break; + /*@switchbreak@*/ break; } } pgpPrtStr("", pgpPublicRSA[i]); @@ -655,24 +655,24 @@ printf("\t e = "), mp32println(_dig->rsa_pk.e.size, _dig->rsa_pk.e.data); mp32bsethex(&_dig->p, pgpMpiHex(p)); if (_debug && _print) printf("\t p = "), mp32println(_dig->p.size, _dig->p.modl); - break; + /*@switchbreak@*/ break; case 1: /* q */ mp32bsethex(&_dig->q, pgpMpiHex(p)); if (_debug && _print) printf("\t q = "), mp32println(_dig->q.size, _dig->q.modl); - break; + /*@switchbreak@*/ break; case 2: /* g */ mp32nsethex(&_dig->g, pgpMpiHex(p)); if (_debug && _print) printf("\t g = "), mp32println(_dig->g.size, _dig->g.data); - break; + /*@switchbreak@*/ break; case 3: /* y */ mp32nsethex(&_dig->y, pgpMpiHex(p)); if (_debug && _print) printf("\t y = "), mp32println(_dig->y.size, _dig->y.data); - break; + /*@switchbreak@*/ break; default: - break; + /*@switchbreak@*/ break; } } pgpPrtStr("", pgpPublicDSA[i]); @@ -718,14 +718,14 @@ int pgpPrtKeyV4(pgpPkt pkt, const byte *h, unsigned int hlen) mp32bsethex(&_dig->rsa_pk.n, pgpMpiHex(p)); if (_debug && _print) printf("\t n = "), mp32println(_dig->rsa_pk.n.size, _dig->rsa_pk.n.modl); - break; + /*@switchbreak@*/ break; case 1: /* e */ mp32nsethex(&_dig->rsa_pk.e, pgpMpiHex(p)); if (_debug && _print) printf("\t e = "), mp32println(_dig->rsa_pk.e.size, _dig->rsa_pk.e.data); - break; + /*@switchbreak@*/ break; default: - break; + /*@switchbreak@*/ break; } } pgpPrtStr("", pgpPublicRSA[i]); @@ -737,24 +737,24 @@ printf("\t e = "), mp32println(_dig->rsa_pk.e.size, _dig->rsa_pk.e.data); mp32bsethex(&_dig->p, pgpMpiHex(p)); if (_debug && _print) printf("\t p = "), mp32println(_dig->p.size, _dig->p.modl); - break; + /*@switchbreak@*/ break; case 1: /* q */ mp32bsethex(&_dig->q, pgpMpiHex(p)); if (_debug && _print) printf("\t q = "), mp32println(_dig->q.size, _dig->q.modl); - break; + /*@switchbreak@*/ break; case 2: /* g */ mp32nsethex(&_dig->g, pgpMpiHex(p)); if (_debug && _print) printf("\t g = "), mp32println(_dig->g.size, _dig->g.data); - break; + /*@switchbreak@*/ break; case 3: /* y */ mp32nsethex(&_dig->y, pgpMpiHex(p)); if (_debug && _print) printf("\t y = "), mp32println(_dig->y.size, _dig->y.data); - break; + /*@switchbreak@*/ break; default: - break; + /*@switchbreak@*/ break; } } pgpPrtStr("", pgpPublicDSA[i]); |