summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorSimon Josefsson <simon@josefsson.org>2010-04-14 15:33:15 +0200
committerSimon Josefsson <simon@josefsson.org>2010-04-14 15:33:15 +0200
commit66d0a122fcaa10b963420ac316585ed5bbace2a1 (patch)
treeb7501134797484146f1382d276ec94205ddce587
parent3965579aaf5ae277b388414e7d7829196ec78fbf (diff)
downloadgnutls-66d0a122fcaa10b963420ac316585ed5bbace2a1.tar.gz
More indentation.
-rw-r--r--cfg.mk2
-rw-r--r--doc/examples/examples.h12
-rw-r--r--guile/src/errors.h6
-rw-r--r--guile/src/utils.h18
-rw-r--r--lib/auth_cert.h6
-rw-r--r--lib/auth_dh_common.h9
-rw-r--r--lib/crypto.h11
-rw-r--r--lib/ext_oprfi.h6
-rw-r--r--lib/ext_safe_renegotiation.h9
-rw-r--r--lib/ext_session_ticket.h3
-rw-r--r--lib/ext_signature.h24
-rw-r--r--lib/gnutls_algorithms.h12
-rw-r--r--lib/gnutls_cipher_int.h34
-rw-r--r--lib/gnutls_compress.h4
-rw-r--r--lib/gnutls_cryptodev.h4
-rw-r--r--lib/gnutls_errors.h11
-rw-r--r--lib/gnutls_extensions.h2
-rw-r--r--lib/gnutls_hash_int.h55
-rw-r--r--lib/gnutls_int.h45
-rw-r--r--lib/gnutls_mpi.h20
-rw-r--r--lib/gnutls_pk.h20
-rw-r--r--lib/gnutls_sig.h29
-rw-r--r--lib/gnutls_srp.h10
-rw-r--r--lib/gnutls_state.h3
-rw-r--r--lib/gnutls_str.h14
-rw-r--r--lib/gnutls_supplemental.h6
-rw-r--r--lib/includes/gnutls/crypto.h119
-rw-r--r--lib/includes/gnutls/gnutls.h.in782
-rw-r--r--lib/includes/gnutls/openpgp.h185
-rw-r--r--lib/includes/gnutls/pkcs12.h15
-rw-r--r--lib/includes/gnutls/x509.h96
-rw-r--r--lib/opencdk/context.h73
-rw-r--r--lib/opencdk/filters.h58
-rw-r--r--lib/opencdk/keydb.h41
-rw-r--r--lib/opencdk/main.h97
-rw-r--r--lib/opencdk/opencdk.h1363
-rw-r--r--lib/opencdk/packet.h21
-rw-r--r--lib/opencdk/stream.h37
-rw-r--r--lib/opencdk/types.h6
-rw-r--r--lib/openpgp/gnutls_openpgp.h3
-rw-r--r--lib/openpgp/openpgp_int.h28
-rw-r--r--lib/x509/pbkdf2-sha1.h5
-rw-r--r--lib/x509/x509_int.h114
-rw-r--r--libextra/includes/gnutls/extra.h24
-rw-r--r--libextra/includes/gnutls/openssl.h5
-rw-r--r--src/certtool-cfg.h10
-rw-r--r--src/certtool-common.h51
-rw-r--r--src/common.h3
48 files changed, 1814 insertions, 1697 deletions
diff --git a/cfg.mk b/cfg.mk
index 7b6c9b2ec3..7fe32ae7ca 100644
--- a/cfg.mk
+++ b/cfg.mk
@@ -23,7 +23,7 @@ WFLAGS ?= --enable-gcc-warnings
ADDFLAGS ?=
CFGFLAGS ?= --enable-gtk-doc $(ADDFLAGS) $(WFLAGS)
-INDENT_SOURCES = `find . -name \*.c|grep -v -e ^./lib/gl -e ^./gl -e ^./src/cfg -e -gaa.c -e asn1_tab.c`
+INDENT_SOURCES = `find . -name \*.[ch] -o -name gnutls.h.in | grep -v -e ^./build-aux/ -e ^./lib/minitasn1/ -e ^./lib/build-aux/ -e ^./lib/gl/ -e ^./gl/ -e ^./libextra/gl/ -e ^./src/cfg/ -e -gaa.[ch] -e asn1_tab.c`
ifeq ($(.DEFAULT_GOAL),abort-due-to-no-makefile)
.DEFAULT_GOAL := bootstrap
diff --git a/doc/examples/examples.h b/doc/examples/examples.h
index 0667dc44be..1b1f79b8e3 100644
--- a/doc/examples/examples.h
+++ b/doc/examples/examples.h
@@ -1,21 +1,17 @@
#ifndef EXAMPLES_H
# define EXAMPLES_H
-void
-check_alert (gnutls_session_t session, int ret);
+void check_alert (gnutls_session_t session, int ret);
int
write_pkcs12 (const gnutls_datum_t * cert,
const gnutls_datum_t * pkcs8_key, const char *password);
-void
-verify_certificate (gnutls_session_t session, const char *hostname);
+void verify_certificate (gnutls_session_t session, const char *hostname);
-int
-print_info (gnutls_session_t session);
+int print_info (gnutls_session_t session);
-void
-print_x509_certificate_info (gnutls_session_t session);
+void print_x509_certificate_info (gnutls_session_t session);
void
verify_certificate_chain (gnutls_session_t session,
diff --git a/guile/src/errors.h b/guile/src/errors.h
index fd5740eece..00c5969105 100644
--- a/guile/src/errors.h
+++ b/guile/src/errors.h
@@ -22,8 +22,10 @@
#include "utils.h"
-SCM_API void scm_gnutls_error (int, const char *) NO_RETURN;
-SCM_API void scm_init_gnutls_error (void);
+SCM_API void
+scm_gnutls_error (int, const char *)
+ NO_RETURN;
+ SCM_API void scm_init_gnutls_error (void);
#endif
diff --git a/guile/src/utils.h b/guile/src/utils.h
index 4dd20a8b48..0122b46527 100644
--- a/guile/src/utils.h
+++ b/guile/src/utils.h
@@ -21,8 +21,8 @@
/* Common utilities. */
#include <libguile.h>
-
+
/* Compiler twiddling. */
#ifdef __GNUC__
@@ -35,8 +35,8 @@
#define EXPECT_TRUE(_expr) EXPECT ((_expr), 1)
#define EXPECT_FALSE(_expr) EXPECT ((_expr), 0)
-
+
/* Arrays as byte vectors. */
extern const char scm_gnutls_array_error_message[];
@@ -44,8 +44,8 @@ extern const char scm_gnutls_array_error_message[];
/* Initialize C_HANDLE and C_LEN and return the contiguous C array
corresponding to ARRAY. */
static inline const char *
-scm_gnutls_get_array (SCM array, scm_t_array_handle *c_handle, size_t *c_len,
- const char *func_name)
+scm_gnutls_get_array (SCM array, scm_t_array_handle * c_handle,
+ size_t * c_len, const char *func_name)
{
const char *c_array = NULL;
const scm_t_array_dim *c_dims;
@@ -74,9 +74,8 @@ scm_gnutls_get_array (SCM array, scm_t_array_handle *c_handle, size_t *c_len,
/* Initialize C_HANDLE and C_LEN and return the contiguous C array
corresponding to ARRAY. The returned array can be written to. */
static inline char *
-scm_gnutls_get_writable_array (SCM array, scm_t_array_handle *c_handle,
- size_t *c_len,
- const char *func_name)
+scm_gnutls_get_writable_array (SCM array, scm_t_array_handle * c_handle,
+ size_t * c_len, const char *func_name)
{
char *c_array = NULL;
const scm_t_array_dim *c_dims;
@@ -96,16 +95,17 @@ scm_gnutls_get_writable_array (SCM array, scm_t_array_handle *c_handle,
c_elem_size = scm_array_handle_uniform_element_size (c_handle);
*c_len = c_elem_size * (c_dims->ubnd - c_dims->lbnd + 1);
- c_array = (char *) scm_array_handle_uniform_writable_elements (c_handle);
+ c_array =
+ (char *) scm_array_handle_uniform_writable_elements (c_handle);
}
return (c_array);
}
#define scm_gnutls_release_array scm_array_handle_release
+
-
/* Type conversion. */
/* Return a list corresponding to the key usage values ORed in C_USAGE. */
diff --git a/lib/auth_cert.h b/lib/auth_cert.h
index 40c2ce8271..de22a87b5a 100644
--- a/lib/auth_cert.h
+++ b/lib/auth_cert.h
@@ -159,8 +159,8 @@ gnutls_rsa_params_t _gnutls_certificate_get_rsa_params (gnutls_rsa_params_t
gnutls_session_t);
int _gnutls_get_auth_info_gcert (gnutls_cert * gcert,
- gnutls_certificate_type_t type,
- cert_auth_info_t info,
- int flags /* OR of ConvFlags */ );
+ gnutls_certificate_type_t type,
+ cert_auth_info_t info,
+ int flags /* OR of ConvFlags */ );
#endif
diff --git a/lib/auth_dh_common.h b/lib/auth_dh_common.h
index 57d17ffa4a..fecc7177ca 100644
--- a/lib/auth_dh_common.h
+++ b/lib/auth_dh_common.h
@@ -40,10 +40,9 @@ int _gnutls_gen_dh_common_client_kx (gnutls_session_t, opaque **);
int _gnutls_proc_dh_common_client_kx (gnutls_session_t session,
opaque * data, size_t _data_size,
bigint_t p, bigint_t g);
-int _gnutls_dh_common_print_server_kx (gnutls_session_t, bigint_t g, bigint_t p,
- opaque ** data, int psk);
-int _gnutls_proc_dh_common_server_kx (gnutls_session_t session,
- opaque * data, size_t _data_size,
- int psk);
+int _gnutls_dh_common_print_server_kx (gnutls_session_t, bigint_t g,
+ bigint_t p, opaque ** data, int psk);
+int _gnutls_proc_dh_common_server_kx (gnutls_session_t session, opaque * data,
+ size_t _data_size, int psk);
#endif
diff --git a/lib/crypto.h b/lib/crypto.h
index ae4e9c221b..b5c8828b06 100644
--- a/lib/crypto.h
+++ b/lib/crypto.h
@@ -25,9 +25,12 @@
#ifndef CRYPTO_H
# define CRYPTO_H
-const gnutls_crypto_cipher_st *_gnutls_get_crypto_cipher( gnutls_cipher_algorithm_t algo);
-const gnutls_crypto_digest_st *_gnutls_get_crypto_digest( gnutls_digest_algorithm_t algo);
-const gnutls_crypto_mac_st *_gnutls_get_crypto_mac( gnutls_mac_algorithm_t algo);
-void _gnutls_crypto_deregister(void);
+const gnutls_crypto_cipher_st
+ * _gnutls_get_crypto_cipher (gnutls_cipher_algorithm_t algo);
+const gnutls_crypto_digest_st
+ * _gnutls_get_crypto_digest (gnutls_digest_algorithm_t algo);
+const gnutls_crypto_mac_st *_gnutls_get_crypto_mac (gnutls_mac_algorithm_t
+ algo);
+void _gnutls_crypto_deregister (void);
#endif /* CRYPTO_H */
diff --git a/lib/ext_oprfi.h b/lib/ext_oprfi.h
index 479efa3429..8802d47119 100644
--- a/lib/ext_oprfi.h
+++ b/lib/ext_oprfi.h
@@ -25,9 +25,7 @@
#include <gnutls_int.h>
int _gnutls_oprfi_recv_params (gnutls_session_t state,
- const opaque * data,
- size_t data_size);
+ const opaque * data, size_t data_size);
int _gnutls_oprfi_send_params (gnutls_session_t state,
- opaque * data,
- size_t data_size);
+ opaque * data, size_t data_size);
diff --git a/lib/ext_safe_renegotiation.h b/lib/ext_safe_renegotiation.h
index b70e4817d6..0042606618 100644
--- a/lib/ext_safe_renegotiation.h
+++ b/lib/ext_safe_renegotiation.h
@@ -25,9 +25,10 @@
#ifndef EXT_SAFE_RENEGOTIATION_H
# define EXT_SAFE_RENEGOTIATION_H
-int _gnutls_safe_renegotiation_recv_params (gnutls_session_t state,
- const opaque * data, size_t data_size);
-int _gnutls_safe_renegotiation_send_params (gnutls_session_t state,
- opaque * data, size_t);
+int _gnutls_safe_renegotiation_recv_params (gnutls_session_t state,
+ const opaque * data,
+ size_t data_size);
+int _gnutls_safe_renegotiation_send_params (gnutls_session_t state,
+ opaque * data, size_t);
#endif /* EXT_SAFE_RENEGOTIATION_H */
diff --git a/lib/ext_session_ticket.h b/lib/ext_session_ticket.h
index 49ca7f43bd..265fad6ee7 100644
--- a/lib/ext_session_ticket.h
+++ b/lib/ext_session_ticket.h
@@ -25,7 +25,8 @@
#ifdef ENABLE_SESSION_TICKET
int _gnutls_session_ticket_recv_params (gnutls_session_t session,
- const opaque * data, size_t data_size);
+ const opaque * data,
+ size_t data_size);
int _gnutls_session_ticket_send_params (gnutls_session_t session,
opaque * data, size_t data_size);
diff --git a/lib/ext_signature.h b/lib/ext_signature.h
index 7123637e7f..43c8ac7ec5 100644
--- a/lib/ext_signature.h
+++ b/lib/ext_signature.h
@@ -26,13 +26,21 @@
/* signature algorithms extension
*/
int _gnutls_signature_algorithm_recv_params (gnutls_session_t session,
- const opaque * data, size_t data_size);
-int _gnutls_signature_algorithm_send_params (gnutls_session_t session, opaque * data,
- size_t);
+ const opaque * data,
+ size_t data_size);
+int _gnutls_signature_algorithm_send_params (gnutls_session_t session,
+ opaque * data, size_t);
int _gnutls_session_sign_algo_requested (gnutls_session_t session,
- gnutls_sign_algorithm_t sig);
-gnutls_sign_algorithm_t _gnutls_session_get_sign_algo (gnutls_session_t session, gnutls_pk_algorithm_t pk, gnutls_digest_algorithm_t *hash);
-int _gnutls_sign_algorithm_parse_data(gnutls_session_t session, const opaque* data, size_t data_size);
-int _gnutls_sign_algorithm_write_params(gnutls_session_t session, opaque *data, size_t max_data_size);
+ gnutls_sign_algorithm_t sig);
+gnutls_sign_algorithm_t _gnutls_session_get_sign_algo (gnutls_session_t
+ session,
+ gnutls_pk_algorithm_t
+ pk,
+ gnutls_digest_algorithm_t
+ * hash);
+int _gnutls_sign_algorithm_parse_data (gnutls_session_t session,
+ const opaque * data, size_t data_size);
+int _gnutls_sign_algorithm_write_params (gnutls_session_t session,
+ opaque * data, size_t max_data_size);
int _gnutls_session_sign_algo_enabled (gnutls_session_t session,
- gnutls_sign_algorithm_t sig);
+ gnutls_sign_algorithm_t sig);
diff --git a/lib/gnutls_algorithms.h b/lib/gnutls_algorithms.h
index 2a0f76c9d4..ed103ba742 100644
--- a/lib/gnutls_algorithms.h
+++ b/lib/gnutls_algorithms.h
@@ -68,8 +68,10 @@ gnutls_kx_algorithm_t _gnutls_cipher_suite_get_kx_algo (const cipher_suite_st
gnutls_mac_algorithm_t _gnutls_cipher_suite_get_mac_algo (const
cipher_suite_st *
algorithm);
-gnutls_protocol_t _gnutls_cipher_suite_is_version_supported (const cipher_suite_st *
- algorithm, gnutls_protocol_t);
+gnutls_protocol_t _gnutls_cipher_suite_is_version_supported (const
+ cipher_suite_st *
+ algorithm,
+ gnutls_protocol_t);
cipher_suite_st _gnutls_cipher_suite_get_suite_name (cipher_suite_st *
algorithm);
@@ -109,9 +111,11 @@ gnutls_sign_algorithm_t _gnutls_x509_pk_to_sign (gnutls_pk_algorithm_t pk,
gnutls_pk_algorithm_t _gnutls_x509_sign_to_pk (gnutls_sign_algorithm_t sign);
const char *_gnutls_x509_sign_to_oid (gnutls_pk_algorithm_t,
gnutls_mac_algorithm_t mac);
-gnutls_sign_algorithm_t _gnutls_tls_aid_to_sign (const sign_algorithm_st* aid);
+gnutls_sign_algorithm_t _gnutls_tls_aid_to_sign (const sign_algorithm_st *
+ aid);
sign_algorithm_st _gnutls_sign_to_tls_aid (gnutls_sign_algorithm_t sign);
-gnutls_mac_algorithm_t _gnutls_sign_get_hash_algorithm (gnutls_sign_algorithm_t);
+gnutls_mac_algorithm_t
+_gnutls_sign_get_hash_algorithm (gnutls_sign_algorithm_t);
gnutls_pk_algorithm_t _gnutls_sign_get_pk_algorithm (gnutls_sign_algorithm_t);
int _gnutls_mac_priority (gnutls_session_t session,
diff --git a/lib/gnutls_cipher_int.h b/lib/gnutls_cipher_int.h
index 55abc09590..d032e0c3c6 100644
--- a/lib/gnutls_cipher_int.h
+++ b/lib/gnutls_cipher_int.h
@@ -31,25 +31,29 @@
extern int crypto_cipher_prio;
extern gnutls_crypto_cipher_st _gnutls_cipher_ops;
-typedef struct {
- const gnutls_crypto_single_cipher_st* cc;
- void* ctx;
+typedef struct
+{
+ const gnutls_crypto_single_cipher_st *cc;
+ void *ctx;
} reg_hd;
-typedef struct {
- int registered; /* true or false(0) */
- union {
- void* gc; /* when not registered */
- reg_hd rh; /* when registered */
- } hd;
+typedef struct
+{
+ int registered; /* true or false(0) */
+ union
+ {
+ void *gc; /* when not registered */
+ reg_hd rh; /* when registered */
+ } hd;
} cipher_hd_st;
-int _gnutls_cipher_init (cipher_hd_st*, gnutls_cipher_algorithm_t cipher,
- const gnutls_datum_t * key,
- const gnutls_datum_t * iv);
-int _gnutls_cipher_encrypt (const cipher_hd_st *handle, void *text, int textlen);
-int _gnutls_cipher_decrypt (const cipher_hd_st *handle, void *ciphertext,
+int _gnutls_cipher_init (cipher_hd_st *, gnutls_cipher_algorithm_t cipher,
+ const gnutls_datum_t * key,
+ const gnutls_datum_t * iv);
+int _gnutls_cipher_encrypt (const cipher_hd_st * handle, void *text,
+ int textlen);
+int _gnutls_cipher_decrypt (const cipher_hd_st * handle, void *ciphertext,
int ciphertextlen);
-void _gnutls_cipher_deinit (cipher_hd_st* handle);
+void _gnutls_cipher_deinit (cipher_hd_st * handle);
#endif /* GNUTLS_CIPHER_INT */
diff --git a/lib/gnutls_compress.h b/lib/gnutls_compress.h
index 35cfcabb44..96df2897d1 100644
--- a/lib/gnutls_compress.h
+++ b/lib/gnutls_compress.h
@@ -27,10 +27,10 @@
int _gnutls_m_plaintext2compressed (gnutls_session_t session,
gnutls_datum_t * compressed,
- const gnutls_datum_t *plaintext);
+ const gnutls_datum_t * plaintext);
int _gnutls_m_compressed2plaintext (gnutls_session_t session,
gnutls_datum_t * plain,
- const gnutls_datum_t* compressed);
+ const gnutls_datum_t * compressed);
/* Algorithm handling. */
int _gnutls_supported_compression_methods (gnutls_session_t session,
diff --git a/lib/gnutls_cryptodev.h b/lib/gnutls_cryptodev.h
index c655479ee4..ff9ce4878a 100644
--- a/lib/gnutls_cryptodev.h
+++ b/lib/gnutls_cryptodev.h
@@ -1,2 +1,2 @@
-void _gnutls_cryptodev_deinit(void);
-int _gnutls_cryptodev_init(void);
+void _gnutls_cryptodev_deinit (void);
+int _gnutls_cryptodev_init (void);
diff --git a/lib/gnutls_errors.h b/lib/gnutls_errors.h
index 9dd9a399a7..6c288eed50 100644
--- a/lib/gnutls_errors.h
+++ b/lib/gnutls_errors.h
@@ -42,14 +42,15 @@
#endif
int _gnutls_asn2err (int asn_err);
-void _gnutls_log (int, const char *fmt, ...)
+void
+_gnutls_log (int, const char *fmt, ...)
#ifdef __GNUC__
-__attribute__ ((format (printf, 2, 3)));
+ __attribute__ ((format (printf, 2, 3)));
#else
-;
+ ;
#endif
-void _gnutls_mpi_log (const char *prefix, bigint_t a);
+ void _gnutls_mpi_log (const char *prefix, bigint_t a);
#ifdef C99_MACROS
#define LEVEL(l, ...) if (_gnutls_log_level >= l || _gnutls_log_level > 9) \
@@ -78,7 +79,7 @@ void _gnutls_mpi_log (const char *prefix, bigint_t a);
# define _gnutls_write_log _gnutls_null_log
# define _gnutls_x509_log _gnutls_null_log
-void _gnutls_null_log (void *, ...);
+ void _gnutls_null_log (void *, ...);
#endif /* C99_MACROS */
diff --git a/lib/gnutls_extensions.h b/lib/gnutls_extensions.h
index 3a4d532589..3e5a773ca3 100644
--- a/lib/gnutls_extensions.h
+++ b/lib/gnutls_extensions.h
@@ -25,7 +25,7 @@
int _gnutls_parse_extensions (gnutls_session_t session,
gnutls_ext_parse_type_t parse_type,
- const opaque *data, int data_size);
+ const opaque * data, int data_size);
int _gnutls_gen_extensions (gnutls_session_t session, opaque * data,
size_t data_size, gnutls_ext_parse_type_t);
int _gnutls_ext_init (void);
diff --git a/lib/gnutls_hash_int.h b/lib/gnutls_hash_int.h
index 0df696745e..874fa86cb0 100644
--- a/lib/gnutls_hash_int.h
+++ b/lib/gnutls_hash_int.h
@@ -38,17 +38,19 @@ extern gnutls_crypto_mac_st _gnutls_mac_ops;
extern int crypto_digest_prio;
extern gnutls_crypto_digest_st _gnutls_digest_ops;
-typedef struct {
- const gnutls_crypto_mac_st* cc;
- void* ctx;
+typedef struct
+{
+ const gnutls_crypto_mac_st *cc;
+ void *ctx;
} digest_reg_hd;
typedef struct
{
- int registered; /* true or false(0) */
- union {
- void* gc; /* when not registered */
- digest_reg_hd rh; /* when registered */
+ int registered; /* true or false(0) */
+ union
+ {
+ void *gc; /* when not registered */
+ digest_reg_hd rh; /* when registered */
} hd;
gnutls_mac_algorithm_t algorithm;
const void *key;
@@ -57,33 +59,32 @@ typedef struct
} digest_hd_st;
/* basic functions */
-int _gnutls_hmac_init (digest_hd_st*, gnutls_mac_algorithm_t algorithm,
- const void *key, int keylen);
+int _gnutls_hmac_init (digest_hd_st *, gnutls_mac_algorithm_t algorithm,
+ const void *key, int keylen);
int _gnutls_hmac_get_algo_len (gnutls_mac_algorithm_t algorithm);
-int _gnutls_hmac (digest_hd_st* handle, const void *text,
- size_t textlen);
+int _gnutls_hmac (digest_hd_st * handle, const void *text, size_t textlen);
-int _gnutls_hmac_fast( gnutls_mac_algorithm_t algorithm, const void* key, int keylen,
- const void* text, size_t textlen, void* digest);
+int _gnutls_hmac_fast (gnutls_mac_algorithm_t algorithm, const void *key,
+ int keylen, const void *text, size_t textlen,
+ void *digest);
-void _gnutls_hmac_deinit (digest_hd_st* handle, void *digest);
-void _gnutls_hmac_output (digest_hd_st* handle, void *digest);
+void _gnutls_hmac_deinit (digest_hd_st * handle, void *digest);
+void _gnutls_hmac_output (digest_hd_st * handle, void *digest);
-int _gnutls_hash_init (digest_hd_st*, gnutls_digest_algorithm_t algorithm);
+int _gnutls_hash_init (digest_hd_st *, gnutls_digest_algorithm_t algorithm);
int _gnutls_hash_get_algo_len (gnutls_digest_algorithm_t algorithm);
-int _gnutls_hash (digest_hd_st* handle, const void *text,
- size_t textlen);
-void _gnutls_hash_deinit (digest_hd_st* handle, void *digest);
-void _gnutls_hash_output (digest_hd_st* handle, void *digest);
+int _gnutls_hash (digest_hd_st * handle, const void *text, size_t textlen);
+void _gnutls_hash_deinit (digest_hd_st * handle, void *digest);
+void _gnutls_hash_output (digest_hd_st * handle, void *digest);
int
_gnutls_hash_fast (gnutls_digest_algorithm_t algorithm,
- const void *text, size_t textlen, void *digest);
-
+ const void *text, size_t textlen, void *digest);
+
/* help functions */
-int _gnutls_mac_init_ssl3 (digest_hd_st*, gnutls_mac_algorithm_t algorithm, void *key,
- int keylen);
-void _gnutls_mac_deinit_ssl3 (digest_hd_st* handle, void *digest);
+int _gnutls_mac_init_ssl3 (digest_hd_st *, gnutls_mac_algorithm_t algorithm,
+ void *key, int keylen);
+void _gnutls_mac_deinit_ssl3 (digest_hd_st * handle, void *digest);
int _gnutls_ssl3_generate_random (void *secret, int secret_len,
void *rnd, int random_len, int bytes,
@@ -92,9 +93,9 @@ int _gnutls_ssl3_hash_md5 (const void *first, int first_len,
const void *second, int second_len,
int ret_len, opaque * ret);
-void _gnutls_mac_deinit_ssl3_handshake (digest_hd_st* handle, void *digest,
+void _gnutls_mac_deinit_ssl3_handshake (digest_hd_st * handle, void *digest,
opaque * key, uint32_t key_size);
-int _gnutls_hash_copy (digest_hd_st* dst_handle, digest_hd_st * src_handle);
+int _gnutls_hash_copy (digest_hd_st * dst_handle, digest_hd_st * src_handle);
#endif /* GNUTLS_HASH_INT_H */
diff --git a/lib/gnutls_int.h b/lib/gnutls_int.h
index b8b8bbd275..b1c1261f35 100644
--- a/lib/gnutls_int.h
+++ b/lib/gnutls_int.h
@@ -179,7 +179,7 @@ typedef enum extensions_t
GNUTLS_EXTENSION_SIGNATURE_ALGORITHMS = 13,
GNUTLS_EXTENSION_SESSION_TICKET = 35,
GNUTLS_EXTENSION_INNER_APPLICATION = 37703,
- GNUTLS_EXTENSION_SAFE_RENEGOTIATION = 65281, /* aka: 0xff01 */
+ GNUTLS_EXTENSION_SAFE_RENEGOTIATION = 65281, /* aka: 0xff01 */
} extensions_t;
typedef enum
@@ -205,7 +205,7 @@ typedef enum content_type_t
typedef enum
{
- HANDSHAKE_MAC_TYPE_10=1,
+ HANDSHAKE_MAC_TYPE_10 = 1,
HANDSHAKE_MAC_TYPE_12
} handshake_mac_type_t;
@@ -284,7 +284,7 @@ typedef struct
typedef struct
{
uint8_t hash_algorithm;
- uint8_t sign_algorithm; /* pk algorithm actually */
+ uint8_t sign_algorithm; /* pk algorithm actually */
} sign_algorithm_st;
/* This structure holds parameters got from TLS extension
@@ -302,13 +302,14 @@ typedef struct
#define MAX_SERVER_NAME_EXTENSIONS 3
#define MAX_SIGNATURE_ALGORITHMS 16
-struct gnutls_session_ticket_key_st {
+struct gnutls_session_ticket_key_st
+{
opaque key_name[SESSION_TICKET_KEY_NAME_SIZE];
opaque key[SESSION_TICKET_KEY_SIZE];
opaque mac_secret[SESSION_TICKET_MAC_SECRET_SIZE];
};
-#define MAX_VERIFY_DATA_SIZE 36 /* in SSL 3.0, 12 in TLS 1.0 */
+#define MAX_VERIFY_DATA_SIZE 36 /* in SSL 3.0, 12 in TLS 1.0 */
/* If you want the extension data to be kept across resuming sessions
* then modify CPY_EXTENSIONS in gnutls_constate.c
@@ -345,11 +346,11 @@ typedef struct
uint16_t oprfi_server_len;
/* Safe renegotiation. */
- uint8_t client_verify_data[MAX_VERIFY_DATA_SIZE];
+ uint8_t client_verify_data[MAX_VERIFY_DATA_SIZE];
size_t client_verify_data_len;
uint8_t server_verify_data[MAX_VERIFY_DATA_SIZE];
size_t server_verify_data_len;
- uint8_t ri_extension_data[MAX_VERIFY_DATA_SIZE*2]; /* max signal is 72 bytes in s->c sslv3 */
+ uint8_t ri_extension_data[MAX_VERIFY_DATA_SIZE * 2]; /* max signal is 72 bytes in s->c sslv3 */
size_t ri_extension_data_len;
} tls_ext_st;
@@ -387,7 +388,7 @@ typedef struct
gnutls_cipher_algorithm_t write_bulk_cipher_algorithm;
gnutls_mac_algorithm_t write_mac_algorithm;
gnutls_compression_method_t write_compression_algorithm;
- handshake_mac_type_t handshake_mac_handle_type; /* one of HANDSHAKE_TYPE_10 and HANDSHAKE_TYPE_12 */
+ handshake_mac_type_t handshake_mac_handle_type; /* one of HANDSHAKE_TYPE_10 and HANDSHAKE_TYPE_12 */
/* this is the ciphersuite we are going to use
* moved here from internals in order to be restored
@@ -507,19 +508,19 @@ typedef struct
gnutls_buffer handshake_hash_buffer; /* used to keep the last received handshake
* message */
union
+ {
+ struct
+ {
+ digest_hd_st sha; /* hash of the handshake messages */
+ digest_hd_st md5; /* hash of the handshake messages */
+ } tls10;
+ struct
{
- struct
- {
- digest_hd_st sha; /* hash of the handshake messages */
- digest_hd_st md5; /* hash of the handshake messages */
- } tls10;
- struct
- {
- digest_hd_st sha1; /* hash of the handshake messages for TLS 1.2+ */
- digest_hd_st sha256; /* hash of the handshake messages for TLS 1.2+ */
- } tls12;
- } handshake_mac_handle;
- int handshake_mac_handle_init; /* 1 when the previous union and type were initialized */
+ digest_hd_st sha1; /* hash of the handshake messages for TLS 1.2+ */
+ digest_hd_st sha256; /* hash of the handshake messages for TLS 1.2+ */
+ } tls12;
+ } handshake_mac_handle;
+ int handshake_mac_handle_init; /* 1 when the previous union and type were initialized */
gnutls_buffer handshake_data_buffer; /* this is a buffer that holds the current handshake message */
gnutls_buffer ia_data_buffer; /* holds inner application data (TLS/IA) */
@@ -557,7 +558,7 @@ typedef struct
/* sockets internals */
int lowat;
-
+
/* These buffers are used in the handshake
* protocol only. freed using _gnutls_handshake_io_buffer_clear();
*/
@@ -637,7 +638,7 @@ typedef struct
gnutls_db_retr_func db_retrieve_func;
gnutls_db_remove_func db_remove_func;
void *db_ptr;
-
+
/* post client hello callback (server side only)
*/
gnutls_handshake_post_client_hello_func user_hello_func;
diff --git a/lib/gnutls_mpi.h b/lib/gnutls_mpi.h
index cd3d05af31..97be326bd6 100644
--- a/lib/gnutls_mpi.h
+++ b/lib/gnutls_mpi.h
@@ -33,11 +33,12 @@
extern int crypto_bigint_prio;
extern gnutls_crypto_bigint_st _gnutls_mpi_ops;
-bigint_t _gnutls_mpi_randomize( bigint_t, unsigned int bits, gnutls_rnd_level_t level);
+bigint_t _gnutls_mpi_randomize (bigint_t, unsigned int bits,
+ gnutls_rnd_level_t level);
#define _gnutls_mpi_new(x) _gnutls_mpi_ops.bigint_new(x)
#define _gnutls_mpi_cmp(x,y) _gnutls_mpi_ops.bigint_cmp(x,y)
-#define _gnutls_mpi_cmp_ui(x,y) _gnutls_mpi_ops.bigint_cmp_ui(x,y)
+#define _gnutls_mpi_cmp_ui(x,y) _gnutls_mpi_ops.bigint_cmp_ui(x,y)
#define _gnutls_mpi_mod(x,y) _gnutls_mpi_ops.bigint_mod(x,y)
#define _gnutls_mpi_set(x,y) _gnutls_mpi_ops.bigint_set(x,y)
#define _gnutls_mpi_set_ui(x,y) _gnutls_mpi_ops.bigint_set_ui(x,y)
@@ -62,13 +63,16 @@ bigint_t _gnutls_mpi_randomize( bigint_t, unsigned int bits, gnutls_rnd_level_t
void _gnutls_mpi_release (bigint_t * x);
-int _gnutls_mpi_scan (bigint_t * ret_mpi, const void * buffer, size_t nbytes);
-int _gnutls_mpi_scan_nz (bigint_t * ret_mpi, const void * buffer, size_t nbytes);
-int _gnutls_mpi_scan_pgp (bigint_t * ret_mpi, const void * buffer, size_t nbytes);
+int _gnutls_mpi_scan (bigint_t * ret_mpi, const void *buffer, size_t nbytes);
+int _gnutls_mpi_scan_nz (bigint_t * ret_mpi, const void *buffer,
+ size_t nbytes);
+int _gnutls_mpi_scan_pgp (bigint_t * ret_mpi, const void *buffer,
+ size_t nbytes);
-int _gnutls_mpi_dprint_lz ( const bigint_t a, gnutls_datum_t * dest);
-int _gnutls_mpi_dprint ( const bigint_t a, gnutls_datum_t * dest);
-int _gnutls_mpi_dprint_size (const bigint_t a, gnutls_datum_t * dest, size_t size);
+int _gnutls_mpi_dprint_lz (const bigint_t a, gnutls_datum_t * dest);
+int _gnutls_mpi_dprint (const bigint_t a, gnutls_datum_t * dest);
+int _gnutls_mpi_dprint_size (const bigint_t a, gnutls_datum_t * dest,
+ size_t size);
#define _gnutls_mpi_generate_group( gg, bits) _gnutls_mpi_ops.bigint_generate_group( gg, bits)
diff --git a/lib/gnutls_pk.h b/lib/gnutls_pk.h
index 0a0f7c0fb1..765be997b6 100644
--- a/lib/gnutls_pk.h
+++ b/lib/gnutls_pk.h
@@ -35,16 +35,21 @@ extern gnutls_crypto_pk_st _gnutls_pk_ops;
#define _gnutls_pk_verify( algo, data, sig, params) _gnutls_pk_ops.verify( algo, data, sig, params)
inline static int
-_gnutls_pk_fixup( gnutls_pk_algorithm_t algo, gnutls_direction_t direction, gnutls_pk_params_st* params)
+_gnutls_pk_fixup (gnutls_pk_algorithm_t algo, gnutls_direction_t direction,
+ gnutls_pk_params_st * params)
{
- if (_gnutls_pk_ops.pk_fixup_private_params) return _gnutls_pk_ops.pk_fixup_private_params(algo, direction, params);
- return 0;
+ if (_gnutls_pk_ops.pk_fixup_private_params)
+ return _gnutls_pk_ops.pk_fixup_private_params (algo, direction, params);
+ return 0;
}
-int _gnutls_pk_params_copy( gnutls_pk_params_st* dst, bigint_t* params, int params_len);
+int _gnutls_pk_params_copy (gnutls_pk_params_st * dst, bigint_t * params,
+ int params_len);
-int _gnutls_rsa_generate_params (bigint_t * resarr, unsigned int *resarr_len, int bits);
-int _gnutls_dsa_generate_params (bigint_t * resarr, unsigned int *resarr_len, int bits);
+int _gnutls_rsa_generate_params (bigint_t * resarr, unsigned int *resarr_len,
+ int bits);
+int _gnutls_dsa_generate_params (bigint_t * resarr, unsigned int *resarr_len,
+ int bits);
/* The internal PK interface */
int _gnutls_pkcs1_rsa_encrypt (gnutls_datum_t * ciphertext,
@@ -69,6 +74,7 @@ int
_gnutls_encode_ber_rs (gnutls_datum_t * sig_value, bigint_t r, bigint_t s);
int
-_gnutls_decode_ber_rs (const gnutls_datum_t * sig_value, bigint_t * r, bigint_t * s);
+_gnutls_decode_ber_rs (const gnutls_datum_t * sig_value, bigint_t * r,
+ bigint_t * s);
#endif /* GNUTLS_PK_H */
diff --git a/lib/gnutls_sig.h b/lib/gnutls_sig.h
index a19f2366a3..a87f14c058 100644
--- a/lib/gnutls_sig.h
+++ b/lib/gnutls_sig.h
@@ -27,26 +27,27 @@
# define GNUTLS_SIG_H
int _gnutls_handshake_sign_cert_vrfy (gnutls_session_t session,
- gnutls_cert * cert,
- gnutls_privkey * pkey,
- gnutls_datum_t * signature);
+ gnutls_cert * cert,
+ gnutls_privkey * pkey,
+ gnutls_datum_t * signature);
int _gnutls_handshake_sign_data (gnutls_session_t session,
- gnutls_cert * cert,
- gnutls_privkey * pkey,
- gnutls_datum_t * params,
- gnutls_datum_t * signature,
- gnutls_sign_algorithm_t * algo);
+ gnutls_cert * cert,
+ gnutls_privkey * pkey,
+ gnutls_datum_t * params,
+ gnutls_datum_t * signature,
+ gnutls_sign_algorithm_t * algo);
int _gnutls_handshake_verify_cert_vrfy (gnutls_session_t session,
- gnutls_cert * cert, gnutls_datum_t * signature,
- gnutls_sign_algorithm_t);
+ gnutls_cert * cert,
+ gnutls_datum_t * signature,
+ gnutls_sign_algorithm_t);
int _gnutls_handshake_verify_data (gnutls_session_t session,
- gnutls_cert * cert,
- const gnutls_datum_t * params,
- gnutls_datum_t * signature,
- gnutls_sign_algorithm_t algo);
+ gnutls_cert * cert,
+ const gnutls_datum_t * params,
+ gnutls_datum_t * signature,
+ gnutls_sign_algorithm_t algo);
int _gnutls_sign (gnutls_pk_algorithm_t algo,
bigint_t * params, int params_size,
diff --git a/lib/gnutls_srp.h b/lib/gnutls_srp.h
index 0c12d41ec2..54b57f1f95 100644
--- a/lib/gnutls_srp.h
+++ b/lib/gnutls_srp.h
@@ -27,12 +27,14 @@
int _gnutls_srp_gx (opaque * text, size_t textsize, opaque ** result,
bigint_t g, bigint_t prime, gnutls_alloc_function);
-bigint_t _gnutls_calc_srp_B (bigint_t * ret_b, bigint_t g, bigint_t n, bigint_t v);
+bigint_t _gnutls_calc_srp_B (bigint_t * ret_b, bigint_t g, bigint_t n,
+ bigint_t v);
bigint_t _gnutls_calc_srp_u (bigint_t A, bigint_t B, bigint_t N);
-bigint_t _gnutls_calc_srp_S1 (bigint_t A, bigint_t b, bigint_t u, bigint_t v, bigint_t n);
+bigint_t _gnutls_calc_srp_S1 (bigint_t A, bigint_t b, bigint_t u, bigint_t v,
+ bigint_t n);
bigint_t _gnutls_calc_srp_A (bigint_t * a, bigint_t g, bigint_t n);
-bigint_t _gnutls_calc_srp_S2 (bigint_t B, bigint_t g, bigint_t x, bigint_t a, bigint_t u,
- bigint_t n);
+bigint_t _gnutls_calc_srp_S2 (bigint_t B, bigint_t g, bigint_t x, bigint_t a,
+ bigint_t u, bigint_t n);
int _gnutls_calc_srp_x (char *username, char *password, opaque * salt,
size_t salt_size, size_t * size, void *digest);
int _gnutls_srp_gn (opaque ** ret_g, opaque ** ret_n, int bits);
diff --git a/lib/gnutls_state.h b/lib/gnutls_state.h
index 0b85ca41e3..bc69bd34c8 100644
--- a/lib/gnutls_state.h
+++ b/lib/gnutls_state.h
@@ -45,7 +45,8 @@ int _gnutls_session_cert_type_supported (gnutls_session_t,
int _gnutls_dh_set_secret_bits (gnutls_session_t session, unsigned bits);
int _gnutls_dh_set_peer_public (gnutls_session_t session, bigint_t public);
-int _gnutls_dh_set_group (gnutls_session_t session, bigint_t gen, bigint_t prime);
+int _gnutls_dh_set_group (gnutls_session_t session, bigint_t gen,
+ bigint_t prime);
int _gnutls_dh_get_allowed_prime_bits (gnutls_session_t session);
void _gnutls_handshake_internal_state_clear (gnutls_session_t);
diff --git a/lib/gnutls_str.h b/lib/gnutls_str.h
index 32ee16cf33..9888ea3b3c 100644
--- a/lib/gnutls_str.h
+++ b/lib/gnutls_str.h
@@ -35,10 +35,10 @@ void _gnutls_str_cat (char *dest, size_t dest_tot_size, const char *src);
typedef struct
{
- opaque *allocd; /* pointer to allocated data */
- opaque *data; /* API: pointer to data to copy from */
+ opaque *allocd; /* pointer to allocated data */
+ opaque *data; /* API: pointer to data to copy from */
size_t max_length;
- size_t length; /* API: current length */
+ size_t length; /* API: current length */
gnutls_realloc_function realloc_func;
gnutls_alloc_function alloc_func;
gnutls_free_function free_func;
@@ -53,8 +53,9 @@ int _gnutls_string_append_str (gnutls_string *, const char *str);
int _gnutls_string_append_data (gnutls_string *, const void *data,
size_t data_size);
-void _gnutls_string_get_data( gnutls_string *, void*, size_t *size);
-void _gnutls_string_get_datum( gnutls_string *, gnutls_datum_t *, size_t max_size);
+void _gnutls_string_get_data (gnutls_string *, void *, size_t * size);
+void _gnutls_string_get_datum (gnutls_string *, gnutls_datum_t *,
+ size_t max_size);
#ifndef __attribute__
/* This feature is available in gcc versions 2.5 and later. */
@@ -80,7 +81,8 @@ char *_gnutls_bin2hex (const void *old, size_t oldlen, char *buffer,
int _gnutls_hex2bin (const opaque * hex_data, int hex_size, opaque * bin_data,
size_t * bin_size);
-int _gnutls_hostname_compare (const char *certname, size_t certnamesize, const char *hostname);
+int _gnutls_hostname_compare (const char *certname, size_t certnamesize,
+ const char *hostname);
#define MAX_CN 256
#endif
diff --git a/lib/gnutls_supplemental.h b/lib/gnutls_supplemental.h
index 67e4673026..4a70f14be6 100644
--- a/lib/gnutls_supplemental.h
+++ b/lib/gnutls_supplemental.h
@@ -25,7 +25,5 @@
#include <gnutls_int.h>
int _gnutls_parse_supplemental (gnutls_session_t session,
- const uint8_t *data,
- int data_size);
-int _gnutls_gen_supplemental (gnutls_session_t session,
- gnutls_buffer *buf);
+ const uint8_t * data, int data_size);
+int _gnutls_gen_supplemental (gnutls_session_t session, gnutls_buffer * buf);
diff --git a/lib/includes/gnutls/crypto.h b/lib/includes/gnutls/crypto.h
index 46fba9b0fe..7e0b65d427 100644
--- a/lib/includes/gnutls/crypto.h
+++ b/lib/includes/gnutls/crypto.h
@@ -25,40 +25,42 @@
#ifndef GNUTLS_CRYPTO_H
# define GNUTLS_CRYPTO_H
-typedef struct cipher_hd_st* gnutls_cipher_hd_t;
+typedef struct cipher_hd_st *gnutls_cipher_hd_t;
-int gnutls_cipher_init (gnutls_cipher_hd_t *handle,
+int gnutls_cipher_init (gnutls_cipher_hd_t * handle,
gnutls_cipher_algorithm_t cipher,
const gnutls_datum_t * key,
const gnutls_datum_t * iv);
int gnutls_cipher_encrypt (const gnutls_cipher_hd_t handle,
void *text, int textlen);
int gnutls_cipher_decrypt (const gnutls_cipher_hd_t handle,
- void *ciphertext,
- int ciphertextlen);
+ void *ciphertext, int ciphertextlen);
void gnutls_cipher_deinit (gnutls_cipher_hd_t handle);
int gnutls_cipher_get_block_size (gnutls_cipher_algorithm_t algorithm);
-typedef struct hash_hd_st* gnutls_hash_hd_t;
-typedef struct hmac_hd_st* gnutls_hmac_hd_t;
+typedef struct hash_hd_st *gnutls_hash_hd_t;
+typedef struct hmac_hd_st *gnutls_hmac_hd_t;
-int gnutls_hmac_init (gnutls_hmac_hd_t * dig, gnutls_digest_algorithm_t algorithm,
- const void *key, int keylen);
+int gnutls_hmac_init (gnutls_hmac_hd_t * dig,
+ gnutls_digest_algorithm_t algorithm, const void *key,
+ int keylen);
int gnutls_hmac (gnutls_hmac_hd_t handle, const void *text, size_t textlen);
void gnutls_hmac_output (gnutls_hmac_hd_t handle, void *digest);
void gnutls_hmac_deinit (gnutls_hmac_hd_t handle, void *digest);
-int gnutls_hmac_get_len( gnutls_mac_algorithm_t algorithm);
-int gnutls_hmac_fast( gnutls_mac_algorithm_t algorithm, const void* key, int keylen,
- const void* text, size_t textlen, void* digest);
+int gnutls_hmac_get_len (gnutls_mac_algorithm_t algorithm);
+int gnutls_hmac_fast (gnutls_mac_algorithm_t algorithm, const void *key,
+ int keylen, const void *text, size_t textlen,
+ void *digest);
-int gnutls_hash_init (gnutls_hash_hd_t * dig, gnutls_digest_algorithm_t algorithm);
+int gnutls_hash_init (gnutls_hash_hd_t * dig,
+ gnutls_digest_algorithm_t algorithm);
int gnutls_hash (gnutls_hash_hd_t handle, const void *text, size_t textlen);
void gnutls_hash_output (gnutls_hash_hd_t handle, void *digest);
void gnutls_hash_deinit (gnutls_hash_hd_t handle, void *digest);
-int gnutls_hash_get_len( gnutls_digest_algorithm_t algorithm);
+int gnutls_hash_get_len (gnutls_digest_algorithm_t algorithm);
int gnutls_hash_fast (gnutls_digest_algorithm_t algorithm,
- const void *text, size_t textlen, void *digest);
+ const void *text, size_t textlen, void *digest);
/* register ciphers */
@@ -104,11 +106,11 @@ typedef gnutls_crypto_mac_st gnutls_crypto_digest_st;
* Enumeration of random quality levels.
*/
typedef enum gnutls_rnd_level
- {
- GNUTLS_RND_NONCE = 0,
- GNUTLS_RND_RANDOM = 1,
- GNUTLS_RND_KEY = 2
- } gnutls_rnd_level_t;
+{
+ GNUTLS_RND_NONCE = 0,
+ GNUTLS_RND_RANDOM = 1,
+ GNUTLS_RND_KEY = 2
+} gnutls_rnd_level_t;
/**
* gnutls_pk_flag_t:
@@ -117,9 +119,9 @@ typedef enum gnutls_rnd_level
* Enumeration of public-key flag.
*/
typedef enum
- {
- GNUTLS_PK_FLAG_NONE = 0
- } gnutls_pk_flag_t;
+{
+ GNUTLS_PK_FLAG_NONE = 0
+} gnutls_pk_flag_t;
typedef struct gnutls_crypto_rnd
{
@@ -165,38 +167,38 @@ typedef struct gnutls_crypto_bigint
/* as bigint_cmp */
int (*bigint_cmp_ui) (const bigint_t m1, unsigned long m2);
/* ret = a % b */
- bigint_t (*bigint_mod) (const bigint_t a, const bigint_t b);
+ bigint_t (*bigint_mod) (const bigint_t a, const bigint_t b);
/* a = b -> ret == a */
- bigint_t (*bigint_set) (bigint_t a, const bigint_t b);
+ bigint_t (*bigint_set) (bigint_t a, const bigint_t b);
/* a = b -> ret == a */
- bigint_t (*bigint_set_ui) (bigint_t a, unsigned long b);
+ bigint_t (*bigint_set_ui) (bigint_t a, unsigned long b);
unsigned int (*bigint_get_nbits) (const bigint_t a);
/* w = b ^ e mod m */
- bigint_t (*bigint_powm) (bigint_t w, const bigint_t b,
- const bigint_t e, const bigint_t m);
+ bigint_t (*bigint_powm) (bigint_t w, const bigint_t b,
+ const bigint_t e, const bigint_t m);
/* w = a + b mod m */
- bigint_t (*bigint_addm) (bigint_t w, const bigint_t a,
- const bigint_t b, const bigint_t m);
+ bigint_t (*bigint_addm) (bigint_t w, const bigint_t a,
+ const bigint_t b, const bigint_t m);
/* w = a - b mod m */
- bigint_t (*bigint_subm) (bigint_t w, const bigint_t a, const bigint_t b,
- const bigint_t m);
+ bigint_t (*bigint_subm) (bigint_t w, const bigint_t a, const bigint_t b,
+ const bigint_t m);
/* w = a * b mod m */
- bigint_t (*bigint_mulm) (bigint_t w, const bigint_t a, const bigint_t b,
- const bigint_t m);
+ bigint_t (*bigint_mulm) (bigint_t w, const bigint_t a, const bigint_t b,
+ const bigint_t m);
/* w = a + b */ bigint_t (*bigint_add) (bigint_t w, const bigint_t a,
const bigint_t b);
/* w = a - b */ bigint_t (*bigint_sub) (bigint_t w, const bigint_t a,
const bigint_t b);
/* w = a * b */
- bigint_t (*bigint_mul) (bigint_t w, const bigint_t a, const bigint_t b);
+ bigint_t (*bigint_mul) (bigint_t w, const bigint_t a, const bigint_t b);
/* w = a + b */
- bigint_t (*bigint_add_ui) (bigint_t w, const bigint_t a, unsigned long b);
+ bigint_t (*bigint_add_ui) (bigint_t w, const bigint_t a, unsigned long b);
/* w = a - b */
- bigint_t (*bigint_sub_ui) (bigint_t w, const bigint_t a, unsigned long b);
+ bigint_t (*bigint_sub_ui) (bigint_t w, const bigint_t a, unsigned long b);
/* w = a * b */
- bigint_t (*bigint_mul_ui) (bigint_t w, const bigint_t a, unsigned long b);
+ bigint_t (*bigint_mul_ui) (bigint_t w, const bigint_t a, unsigned long b);
/* q = a / b */
- bigint_t (*bigint_div) (bigint_t q, const bigint_t a, const bigint_t b);
+ bigint_t (*bigint_div) (bigint_t q, const bigint_t a, const bigint_t b);
/* 0 if prime */
int (*bigint_prime_check) (const bigint_t pp);
int (*bigint_generate_group) (gnutls_group_st * gg, unsigned int bits);
@@ -206,8 +208,8 @@ typedef struct gnutls_crypto_bigint
* GNUTLS_E_SHORT_MEMORY_BUFFER if buf_size is not sufficient to
* store this integer, and updates the buf_size;
*/
- bigint_t (*bigint_scan) (const void *buf, size_t buf_size,
- gnutls_bigint_format_t format);
+ bigint_t (*bigint_scan) (const void *buf, size_t buf_size,
+ gnutls_bigint_format_t format);
int (*bigint_print) (const bigint_t a, void *buf, size_t * buf_size,
gnutls_bigint_format_t format);
} gnutls_crypto_bigint_st;
@@ -252,10 +254,10 @@ void gnutls_pk_params_init (gnutls_pk_params_st * p);
* Enumeration of different directions.
*/
typedef enum
- {
- GNUTLS_IMPORT = 0,
- GNUTLS_EXPORT = 1
- } gnutls_direction_t;
+{
+ GNUTLS_IMPORT = 0,
+ GNUTLS_EXPORT = 1
+} gnutls_direction_t;
/* Public key algorithms */
typedef struct gnutls_crypto_pk
@@ -264,17 +266,17 @@ typedef struct gnutls_crypto_pk
* parameters, depending on the operation */
int (*encrypt) (gnutls_pk_algorithm_t, gnutls_datum_t * ciphertext,
const gnutls_datum_t * plaintext,
- const gnutls_pk_params_st *public);
+ const gnutls_pk_params_st * public);
int (*decrypt) (gnutls_pk_algorithm_t, gnutls_datum_t * plaintext,
const gnutls_datum_t * ciphertext,
- const gnutls_pk_params_st *private);
+ const gnutls_pk_params_st * private);
int (*sign) (gnutls_pk_algorithm_t, gnutls_datum_t * signature,
const gnutls_datum_t * data,
- const gnutls_pk_params_st *private);
+ const gnutls_pk_params_st * private);
int (*verify) (gnutls_pk_algorithm_t, const gnutls_datum_t * data,
const gnutls_datum_t * signature,
- const gnutls_pk_params_st *public);
+ const gnutls_pk_params_st * public);
int (*generate) (gnutls_pk_algorithm_t, unsigned int nbits,
gnutls_pk_params_st *);
@@ -299,15 +301,22 @@ typedef struct gnutls_crypto_pk
gnutls_crypto_single_digest_register2(algo, prio, \
GNUTLS_CRYPTO_API_VERSION, st)
-int gnutls_crypto_single_cipher_register2 (gnutls_cipher_algorithm_t algorithm,
- int priority, int version,
- const gnutls_crypto_single_cipher_st *s);
+int gnutls_crypto_single_cipher_register2 (gnutls_cipher_algorithm_t
+ algorithm, int priority,
+ int version,
+ const
+ gnutls_crypto_single_cipher_st *
+ s);
int gnutls_crypto_single_mac_register2 (gnutls_mac_algorithm_t algorithm,
int priority, int version,
- const gnutls_crypto_single_mac_st * s);
-int gnutls_crypto_single_digest_register2 (gnutls_digest_algorithm_t algorithm,
- int priority, int version,
- const gnutls_crypto_single_digest_st *s);
+ const gnutls_crypto_single_mac_st *
+ s);
+int gnutls_crypto_single_digest_register2 (gnutls_digest_algorithm_t
+ algorithm, int priority,
+ int version,
+ const
+ gnutls_crypto_single_digest_st *
+ s);
# define gnutls_crypto_cipher_register(prio, st) \
gnutls_crypto_cipher_register2 (prio, GNUTLS_CRYPTO_API_VERSION, st)
diff --git a/lib/includes/gnutls/gnutls.h.in b/lib/includes/gnutls/gnutls.h.in
index 1db753410d..19a804474b 100644
--- a/lib/includes/gnutls/gnutls.h.in
+++ b/lib/includes/gnutls/gnutls.h.in
@@ -42,14 +42,14 @@
/* Get ssize_t. */
#ifndef HAVE_SSIZE_T
# define HAVE_SSIZE_T
-@DEFINE_SSIZE_T@
+@ DEFINE_SSIZE_T @
#endif
/* Get time_t. */
#include <time.h>
#include <gnutls/compat.h>
-
#ifdef __cplusplus
-extern "C" {
+extern "C"
+{
#endif
#define GNUTLS_VERSION "@VERSION@"
@@ -92,32 +92,32 @@ extern "C" {
* Enumeration of different symmetric encryption algorithms.
*/
typedef enum gnutls_cipher_algorithm
- {
- GNUTLS_CIPHER_UNKNOWN = 0,
- GNUTLS_CIPHER_NULL = 1,
- GNUTLS_CIPHER_ARCFOUR_128 = 2,
- GNUTLS_CIPHER_3DES_CBC = 3,
- GNUTLS_CIPHER_AES_128_CBC = 4,
- GNUTLS_CIPHER_AES_256_CBC = 5,
- GNUTLS_CIPHER_ARCFOUR_40 = 6,
- GNUTLS_CIPHER_CAMELLIA_128_CBC = 7,
- GNUTLS_CIPHER_CAMELLIA_256_CBC = 8,
- GNUTLS_CIPHER_RC2_40_CBC = 90,
- GNUTLS_CIPHER_DES_CBC = 91,
- GNUTLS_CIPHER_AES_192_CBC = 92,
-
- /* used only for PGP internals. Ignored in TLS/SSL
- */
- GNUTLS_CIPHER_IDEA_PGP_CFB = 200,
- GNUTLS_CIPHER_3DES_PGP_CFB = 201,
- GNUTLS_CIPHER_CAST5_PGP_CFB = 202,
- GNUTLS_CIPHER_BLOWFISH_PGP_CFB = 203,
- GNUTLS_CIPHER_SAFER_SK128_PGP_CFB = 204,
- GNUTLS_CIPHER_AES128_PGP_CFB = 205,
- GNUTLS_CIPHER_AES192_PGP_CFB = 206,
- GNUTLS_CIPHER_AES256_PGP_CFB = 207,
- GNUTLS_CIPHER_TWOFISH_PGP_CFB = 208
- } gnutls_cipher_algorithm_t;
+ {
+ GNUTLS_CIPHER_UNKNOWN = 0,
+ GNUTLS_CIPHER_NULL = 1,
+ GNUTLS_CIPHER_ARCFOUR_128 = 2,
+ GNUTLS_CIPHER_3DES_CBC = 3,
+ GNUTLS_CIPHER_AES_128_CBC = 4,
+ GNUTLS_CIPHER_AES_256_CBC = 5,
+ GNUTLS_CIPHER_ARCFOUR_40 = 6,
+ GNUTLS_CIPHER_CAMELLIA_128_CBC = 7,
+ GNUTLS_CIPHER_CAMELLIA_256_CBC = 8,
+ GNUTLS_CIPHER_RC2_40_CBC = 90,
+ GNUTLS_CIPHER_DES_CBC = 91,
+ GNUTLS_CIPHER_AES_192_CBC = 92,
+
+ /* used only for PGP internals. Ignored in TLS/SSL
+ */
+ GNUTLS_CIPHER_IDEA_PGP_CFB = 200,
+ GNUTLS_CIPHER_3DES_PGP_CFB = 201,
+ GNUTLS_CIPHER_CAST5_PGP_CFB = 202,
+ GNUTLS_CIPHER_BLOWFISH_PGP_CFB = 203,
+ GNUTLS_CIPHER_SAFER_SK128_PGP_CFB = 204,
+ GNUTLS_CIPHER_AES128_PGP_CFB = 205,
+ GNUTLS_CIPHER_AES192_PGP_CFB = 206,
+ GNUTLS_CIPHER_AES256_PGP_CFB = 207,
+ GNUTLS_CIPHER_TWOFISH_PGP_CFB = 208
+ } gnutls_cipher_algorithm_t;
/**
* gnutls_kx_algorithm_t:
@@ -136,19 +136,19 @@ extern "C" {
* Enumeration of different key exchange algorithms.
*/
typedef enum
- {
- GNUTLS_KX_UNKNOWN = 0,
- GNUTLS_KX_RSA = 1,
- GNUTLS_KX_DHE_DSS = 2,
- GNUTLS_KX_DHE_RSA = 3,
- GNUTLS_KX_ANON_DH = 4,
- GNUTLS_KX_SRP = 5,
- GNUTLS_KX_RSA_EXPORT = 6,
- GNUTLS_KX_SRP_RSA = 7,
- GNUTLS_KX_SRP_DSS = 8,
- GNUTLS_KX_PSK = 9,
- GNUTLS_KX_DHE_PSK = 10
- } gnutls_kx_algorithm_t;
+ {
+ GNUTLS_KX_UNKNOWN = 0,
+ GNUTLS_KX_RSA = 1,
+ GNUTLS_KX_DHE_DSS = 2,
+ GNUTLS_KX_DHE_RSA = 3,
+ GNUTLS_KX_ANON_DH = 4,
+ GNUTLS_KX_SRP = 5,
+ GNUTLS_KX_RSA_EXPORT = 6,
+ GNUTLS_KX_SRP_RSA = 7,
+ GNUTLS_KX_SRP_DSS = 8,
+ GNUTLS_KX_PSK = 9,
+ GNUTLS_KX_DHE_PSK = 10
+ } gnutls_kx_algorithm_t;
/**
* gnutls_params_type_t:
@@ -158,10 +158,10 @@ extern "C" {
* Enumeration of different TLS session parameter types.
*/
typedef enum
- {
- GNUTLS_PARAMS_RSA_EXPORT = 1,
- GNUTLS_PARAMS_DH = 2
- } gnutls_params_type_t;
+ {
+ GNUTLS_PARAMS_RSA_EXPORT = 1,
+ GNUTLS_PARAMS_DH = 2
+ } gnutls_params_type_t;
/**
* gnutls_credentials_type_t:
@@ -174,13 +174,13 @@ extern "C" {
* Enumeration of different credential types.
*/
typedef enum
- {
- GNUTLS_CRD_CERTIFICATE = 1,
- GNUTLS_CRD_ANON,
- GNUTLS_CRD_SRP,
- GNUTLS_CRD_PSK,
- GNUTLS_CRD_IA
- } gnutls_credentials_type_t;
+ {
+ GNUTLS_CRD_CERTIFICATE = 1,
+ GNUTLS_CRD_ANON,
+ GNUTLS_CRD_SRP,
+ GNUTLS_CRD_PSK,
+ GNUTLS_CRD_IA
+ } gnutls_credentials_type_t;
#define GNUTLS_MAC_SHA GNUTLS_MAC_SHA1
#define GNUTLS_DIG_SHA GNUTLS_DIG_SHA1
@@ -202,20 +202,20 @@ extern "C" {
* algorithms.
*/
typedef enum
- {
- GNUTLS_MAC_UNKNOWN = 0,
- GNUTLS_MAC_NULL = 1,
- GNUTLS_MAC_MD5 = 2,
- GNUTLS_MAC_SHA1 = 3,
- GNUTLS_MAC_RMD160 = 4,
- GNUTLS_MAC_MD2 = 5,
- GNUTLS_MAC_SHA256 = 6,
- GNUTLS_MAC_SHA384 = 7,
- GNUTLS_MAC_SHA512 = 8,
- GNUTLS_MAC_SHA224 = 9
+ {
+ GNUTLS_MAC_UNKNOWN = 0,
+ GNUTLS_MAC_NULL = 1,
+ GNUTLS_MAC_MD5 = 2,
+ GNUTLS_MAC_SHA1 = 3,
+ GNUTLS_MAC_RMD160 = 4,
+ GNUTLS_MAC_MD2 = 5,
+ GNUTLS_MAC_SHA256 = 6,
+ GNUTLS_MAC_SHA384 = 7,
+ GNUTLS_MAC_SHA512 = 8,
+ GNUTLS_MAC_SHA224 = 9
/* If you add anything here, make sure you align with
- gnutls_digest_algorithm_t. */
- } gnutls_mac_algorithm_t;
+ gnutls_digest_algorithm_t. */
+ } gnutls_mac_algorithm_t;
/**
* gnutls_digest_algorithm_t:
@@ -233,20 +233,20 @@ extern "C" {
* Enumeration of different digest (hash) algorithms.
*/
typedef enum
- {
- GNUTLS_DIG_UNKNOWN = GNUTLS_MAC_UNKNOWN,
- GNUTLS_DIG_NULL = GNUTLS_MAC_NULL,
- GNUTLS_DIG_MD5 = GNUTLS_MAC_MD5,
- GNUTLS_DIG_SHA1 = GNUTLS_MAC_SHA1,
- GNUTLS_DIG_RMD160 = GNUTLS_MAC_RMD160,
- GNUTLS_DIG_MD2 = GNUTLS_MAC_MD2,
- GNUTLS_DIG_SHA256 = GNUTLS_MAC_SHA256,
- GNUTLS_DIG_SHA384 = GNUTLS_MAC_SHA384,
- GNUTLS_DIG_SHA512 = GNUTLS_MAC_SHA512,
- GNUTLS_DIG_SHA224 = GNUTLS_MAC_SHA224,
- /* If you add anything here, make sure you align with
- gnutls_mac_algorithm_t. */
- } gnutls_digest_algorithm_t;
+ {
+ GNUTLS_DIG_UNKNOWN = GNUTLS_MAC_UNKNOWN,
+ GNUTLS_DIG_NULL = GNUTLS_MAC_NULL,
+ GNUTLS_DIG_MD5 = GNUTLS_MAC_MD5,
+ GNUTLS_DIG_SHA1 = GNUTLS_MAC_SHA1,
+ GNUTLS_DIG_RMD160 = GNUTLS_MAC_RMD160,
+ GNUTLS_DIG_MD2 = GNUTLS_MAC_MD2,
+ GNUTLS_DIG_SHA256 = GNUTLS_MAC_SHA256,
+ GNUTLS_DIG_SHA384 = GNUTLS_MAC_SHA384,
+ GNUTLS_DIG_SHA512 = GNUTLS_MAC_SHA512,
+ GNUTLS_DIG_SHA224 = GNUTLS_MAC_SHA224,
+ /* If you add anything here, make sure you align with
+ gnutls_mac_algorithm_t. */
+ } gnutls_digest_algorithm_t;
/* exported for other gnutls headers. This is the maximum number of
* algorithms (ciphers, kx or macs).
@@ -264,15 +264,15 @@ extern "C" {
* Enumeration of different TLS compression methods.
*/
typedef enum
- {
- GNUTLS_COMP_UNKNOWN = 0,
- GNUTLS_COMP_NULL = 1,
- GNUTLS_COMP_DEFLATE = 2,
- GNUTLS_COMP_ZLIB = GNUTLS_COMP_DEFLATE,
- GNUTLS_COMP_LZO = 3 /* only available if gnutls-extra has
- been initialized
- */
- } gnutls_compression_method_t;
+ {
+ GNUTLS_COMP_UNKNOWN = 0,
+ GNUTLS_COMP_NULL = 1,
+ GNUTLS_COMP_DEFLATE = 2,
+ GNUTLS_COMP_ZLIB = GNUTLS_COMP_DEFLATE,
+ GNUTLS_COMP_LZO = 3 /* only available if gnutls-extra has
+ been initialized
+ */
+ } gnutls_compression_method_t;
/**
* gnutls_connection_end_t:
@@ -282,10 +282,10 @@ extern "C" {
* Enumeration of different TLS connection end types.
*/
typedef enum
- {
- GNUTLS_SERVER = 1,
- GNUTLS_CLIENT
- } gnutls_connection_end_t;
+ {
+ GNUTLS_SERVER = 1,
+ GNUTLS_CLIENT
+ } gnutls_connection_end_t;
/**
* gnutls_alert_level_t:
@@ -295,10 +295,10 @@ extern "C" {
* Enumeration of different TLS alert severities.
*/
typedef enum
- {
- GNUTLS_AL_WARNING = 1,
- GNUTLS_AL_FATAL
- } gnutls_alert_level_t;
+ {
+ GNUTLS_AL_WARNING = 1,
+ GNUTLS_AL_FATAL
+ } gnutls_alert_level_t;
/**
* gnutls_alert_description_t:
@@ -342,38 +342,38 @@ extern "C" {
* Enumeration of different TLS alerts.
*/
typedef enum
- {
- GNUTLS_A_CLOSE_NOTIFY,
- GNUTLS_A_UNEXPECTED_MESSAGE = 10,
- GNUTLS_A_BAD_RECORD_MAC = 20,
- GNUTLS_A_DECRYPTION_FAILED,
- GNUTLS_A_RECORD_OVERFLOW,
- GNUTLS_A_DECOMPRESSION_FAILURE = 30,
- GNUTLS_A_HANDSHAKE_FAILURE = 40,
- GNUTLS_A_SSL3_NO_CERTIFICATE = 41,
- GNUTLS_A_BAD_CERTIFICATE = 42,
- GNUTLS_A_UNSUPPORTED_CERTIFICATE,
- GNUTLS_A_CERTIFICATE_REVOKED,
- GNUTLS_A_CERTIFICATE_EXPIRED,
- GNUTLS_A_CERTIFICATE_UNKNOWN,
- GNUTLS_A_ILLEGAL_PARAMETER,
- GNUTLS_A_UNKNOWN_CA,
- GNUTLS_A_ACCESS_DENIED,
- GNUTLS_A_DECODE_ERROR = 50,
- GNUTLS_A_DECRYPT_ERROR,
- GNUTLS_A_EXPORT_RESTRICTION = 60,
- GNUTLS_A_PROTOCOL_VERSION = 70,
- GNUTLS_A_INSUFFICIENT_SECURITY,
- GNUTLS_A_INTERNAL_ERROR = 80,
- GNUTLS_A_USER_CANCELED = 90,
- GNUTLS_A_NO_RENEGOTIATION = 100,
- GNUTLS_A_UNSUPPORTED_EXTENSION = 110,
- GNUTLS_A_CERTIFICATE_UNOBTAINABLE = 111,
- GNUTLS_A_UNRECOGNIZED_NAME = 112,
- GNUTLS_A_UNKNOWN_PSK_IDENTITY = 115,
- GNUTLS_A_INNER_APPLICATION_FAILURE = 208,
- GNUTLS_A_INNER_APPLICATION_VERIFICATION = 209
- } gnutls_alert_description_t;
+ {
+ GNUTLS_A_CLOSE_NOTIFY,
+ GNUTLS_A_UNEXPECTED_MESSAGE = 10,
+ GNUTLS_A_BAD_RECORD_MAC = 20,
+ GNUTLS_A_DECRYPTION_FAILED,
+ GNUTLS_A_RECORD_OVERFLOW,
+ GNUTLS_A_DECOMPRESSION_FAILURE = 30,
+ GNUTLS_A_HANDSHAKE_FAILURE = 40,
+ GNUTLS_A_SSL3_NO_CERTIFICATE = 41,
+ GNUTLS_A_BAD_CERTIFICATE = 42,
+ GNUTLS_A_UNSUPPORTED_CERTIFICATE,
+ GNUTLS_A_CERTIFICATE_REVOKED,
+ GNUTLS_A_CERTIFICATE_EXPIRED,
+ GNUTLS_A_CERTIFICATE_UNKNOWN,
+ GNUTLS_A_ILLEGAL_PARAMETER,
+ GNUTLS_A_UNKNOWN_CA,
+ GNUTLS_A_ACCESS_DENIED,
+ GNUTLS_A_DECODE_ERROR = 50,
+ GNUTLS_A_DECRYPT_ERROR,
+ GNUTLS_A_EXPORT_RESTRICTION = 60,
+ GNUTLS_A_PROTOCOL_VERSION = 70,
+ GNUTLS_A_INSUFFICIENT_SECURITY,
+ GNUTLS_A_INTERNAL_ERROR = 80,
+ GNUTLS_A_USER_CANCELED = 90,
+ GNUTLS_A_NO_RENEGOTIATION = 100,
+ GNUTLS_A_UNSUPPORTED_EXTENSION = 110,
+ GNUTLS_A_CERTIFICATE_UNOBTAINABLE = 111,
+ GNUTLS_A_UNRECOGNIZED_NAME = 112,
+ GNUTLS_A_UNKNOWN_PSK_IDENTITY = 115,
+ GNUTLS_A_INNER_APPLICATION_FAILURE = 208,
+ GNUTLS_A_INNER_APPLICATION_VERIFICATION = 209
+ } gnutls_alert_description_t;
/**
* gnutls_handshake_description_t:
@@ -393,20 +393,20 @@ extern "C" {
* Enumeration of different TLS handshake packets.
*/
typedef enum
- {
- GNUTLS_HANDSHAKE_HELLO_REQUEST = 0,
- GNUTLS_HANDSHAKE_CLIENT_HELLO = 1,
- GNUTLS_HANDSHAKE_SERVER_HELLO = 2,
- GNUTLS_HANDSHAKE_NEW_SESSION_TICKET = 4,
- GNUTLS_HANDSHAKE_CERTIFICATE_PKT = 11,
- GNUTLS_HANDSHAKE_SERVER_KEY_EXCHANGE = 12,
- GNUTLS_HANDSHAKE_CERTIFICATE_REQUEST = 13,
- GNUTLS_HANDSHAKE_SERVER_HELLO_DONE = 14,
- GNUTLS_HANDSHAKE_CERTIFICATE_VERIFY = 15,
- GNUTLS_HANDSHAKE_CLIENT_KEY_EXCHANGE = 16,
- GNUTLS_HANDSHAKE_FINISHED = 20,
- GNUTLS_HANDSHAKE_SUPPLEMENTAL = 23
- } gnutls_handshake_description_t;
+ {
+ GNUTLS_HANDSHAKE_HELLO_REQUEST = 0,
+ GNUTLS_HANDSHAKE_CLIENT_HELLO = 1,
+ GNUTLS_HANDSHAKE_SERVER_HELLO = 2,
+ GNUTLS_HANDSHAKE_NEW_SESSION_TICKET = 4,
+ GNUTLS_HANDSHAKE_CERTIFICATE_PKT = 11,
+ GNUTLS_HANDSHAKE_SERVER_KEY_EXCHANGE = 12,
+ GNUTLS_HANDSHAKE_CERTIFICATE_REQUEST = 13,
+ GNUTLS_HANDSHAKE_SERVER_HELLO_DONE = 14,
+ GNUTLS_HANDSHAKE_CERTIFICATE_VERIFY = 15,
+ GNUTLS_HANDSHAKE_CLIENT_KEY_EXCHANGE = 16,
+ GNUTLS_HANDSHAKE_FINISHED = 20,
+ GNUTLS_HANDSHAKE_SUPPLEMENTAL = 23
+ } gnutls_handshake_description_t;
/**
* gnutls_certificate_status_t:
@@ -428,15 +428,15 @@ extern "C" {
* certificate verification.
*/
typedef enum
- {
- GNUTLS_CERT_INVALID = 2,
- GNUTLS_CERT_REVOKED = 32,
- GNUTLS_CERT_SIGNER_NOT_FOUND = 64,
- GNUTLS_CERT_SIGNER_NOT_CA = 128,
- GNUTLS_CERT_INSECURE_ALGORITHM = 256,
- GNUTLS_CERT_NOT_ACTIVATED = 512,
- GNUTLS_CERT_EXPIRED = 1024
- } gnutls_certificate_status_t;
+ {
+ GNUTLS_CERT_INVALID = 2,
+ GNUTLS_CERT_REVOKED = 32,
+ GNUTLS_CERT_SIGNER_NOT_FOUND = 64,
+ GNUTLS_CERT_SIGNER_NOT_CA = 128,
+ GNUTLS_CERT_INSECURE_ALGORITHM = 256,
+ GNUTLS_CERT_NOT_ACTIVATED = 512,
+ GNUTLS_CERT_EXPIRED = 1024
+ } gnutls_certificate_status_t;
/**
* gnutls_certificate_request_t:
@@ -447,11 +447,11 @@ extern "C" {
* Enumeration of certificate request types.
*/
typedef enum
- {
- GNUTLS_CERT_IGNORE = 0,
- GNUTLS_CERT_REQUEST = 1,
- GNUTLS_CERT_REQUIRE = 2
- } gnutls_certificate_request_t;
+ {
+ GNUTLS_CERT_IGNORE = 0,
+ GNUTLS_CERT_REQUEST = 1,
+ GNUTLS_CERT_REQUIRE = 2
+ } gnutls_certificate_request_t;
/**
* gnutls_openpgp_crt_status_t:
@@ -461,10 +461,10 @@ extern "C" {
* Enumeration of ways to send OpenPGP certificate.
*/
typedef enum
- {
- GNUTLS_OPENPGP_CERT = 0,
- GNUTLS_OPENPGP_CERT_FINGERPRINT = 1
- } gnutls_openpgp_crt_status_t;
+ {
+ GNUTLS_OPENPGP_CERT = 0,
+ GNUTLS_OPENPGP_CERT_FINGERPRINT = 1
+ } gnutls_openpgp_crt_status_t;
/**
* gnutls_close_request_t:
@@ -474,10 +474,10 @@ extern "C" {
* Enumeration of how TLS session should be terminated. See gnutls_bye().
*/
typedef enum
- {
- GNUTLS_SHUT_RDWR = 0,
- GNUTLS_SHUT_WR = 1
- } gnutls_close_request_t;
+ {
+ GNUTLS_SHUT_RDWR = 0,
+ GNUTLS_SHUT_WR = 1
+ } gnutls_close_request_t;
/**
* gnutls_protocol_t:
@@ -492,15 +492,15 @@ extern "C" {
* Enumeration of different SSL/TLS protocol versions.
*/
typedef enum
- {
- GNUTLS_SSL3 = 1,
- GNUTLS_TLS1_0 = 2,
- GNUTLS_TLS1 = GNUTLS_TLS1_0,
- GNUTLS_TLS1_1 = 3,
- GNUTLS_TLS1_2 = 4,
- GNUTLS_VERSION_MAX = GNUTLS_TLS1_2,
- GNUTLS_VERSION_UNKNOWN = 0xff
- } gnutls_protocol_t;
+ {
+ GNUTLS_SSL3 = 1,
+ GNUTLS_TLS1_0 = 2,
+ GNUTLS_TLS1 = GNUTLS_TLS1_0,
+ GNUTLS_TLS1_1 = 3,
+ GNUTLS_TLS1_2 = 4,
+ GNUTLS_VERSION_MAX = GNUTLS_TLS1_2,
+ GNUTLS_VERSION_UNKNOWN = 0xff
+ } gnutls_protocol_t;
/**
* gnutls_certificate_type_t:
@@ -511,11 +511,11 @@ extern "C" {
* Enumeration of different certificate types.
*/
typedef enum
- {
- GNUTLS_CRT_UNKNOWN = 0,
- GNUTLS_CRT_X509 = 1,
- GNUTLS_CRT_OPENPGP = 2
- } gnutls_certificate_type_t;
+ {
+ GNUTLS_CRT_UNKNOWN = 0,
+ GNUTLS_CRT_X509 = 1,
+ GNUTLS_CRT_OPENPGP = 2
+ } gnutls_certificate_type_t;
/**
* gnutls_x509_crt_fmt_t:
@@ -525,10 +525,10 @@ extern "C" {
* Enumeration of different certificate encoding formats.
*/
typedef enum
- {
- GNUTLS_X509_FMT_DER = 0,
- GNUTLS_X509_FMT_PEM = 1
- } gnutls_x509_crt_fmt_t;
+ {
+ GNUTLS_X509_FMT_DER = 0,
+ GNUTLS_X509_FMT_PEM = 1
+ } gnutls_x509_crt_fmt_t;
/**
* gnutls_certificate_print_formats_t:
@@ -539,11 +539,11 @@ extern "C" {
* Enumeration of different certificate printing variants.
*/
typedef enum gnutls_certificate_print_formats
- {
- GNUTLS_CRT_PRINT_FULL = 0,
- GNUTLS_CRT_PRINT_ONELINE = 1,
- GNUTLS_CRT_PRINT_UNSIGNED_FULL = 2
- } gnutls_certificate_print_formats_t;
+ {
+ GNUTLS_CRT_PRINT_FULL = 0,
+ GNUTLS_CRT_PRINT_ONELINE = 1,
+ GNUTLS_CRT_PRINT_UNSIGNED_FULL = 2
+ } gnutls_certificate_print_formats_t;
/**
* gnutls_pk_algorithm_t:
@@ -580,23 +580,22 @@ extern "C" {
* Enumeration of different digital signature algorithms.
*/
typedef enum
- {
- GNUTLS_SIGN_UNKNOWN = 0,
- GNUTLS_SIGN_RSA_SHA1 = 1,
- GNUTLS_SIGN_RSA_SHA = GNUTLS_SIGN_RSA_SHA1,
- GNUTLS_SIGN_DSA_SHA1 = 2,
- GNUTLS_SIGN_DSA_SHA = GNUTLS_SIGN_DSA_SHA1,
- GNUTLS_SIGN_RSA_MD5 = 3,
- GNUTLS_SIGN_RSA_MD2 = 4,
- GNUTLS_SIGN_RSA_RMD160 = 5,
- GNUTLS_SIGN_RSA_SHA256 = 6,
- GNUTLS_SIGN_RSA_SHA384 = 7,
- GNUTLS_SIGN_RSA_SHA512 = 8,
- GNUTLS_SIGN_RSA_SHA224 = 9
- } gnutls_sign_algorithm_t;
-
- const char *
- gnutls_sign_algorithm_get_name (gnutls_sign_algorithm_t sign);
+ {
+ GNUTLS_SIGN_UNKNOWN = 0,
+ GNUTLS_SIGN_RSA_SHA1 = 1,
+ GNUTLS_SIGN_RSA_SHA = GNUTLS_SIGN_RSA_SHA1,
+ GNUTLS_SIGN_DSA_SHA1 = 2,
+ GNUTLS_SIGN_DSA_SHA = GNUTLS_SIGN_DSA_SHA1,
+ GNUTLS_SIGN_RSA_MD5 = 3,
+ GNUTLS_SIGN_RSA_MD2 = 4,
+ GNUTLS_SIGN_RSA_RMD160 = 5,
+ GNUTLS_SIGN_RSA_SHA256 = 6,
+ GNUTLS_SIGN_RSA_SHA384 = 7,
+ GNUTLS_SIGN_RSA_SHA512 = 8,
+ GNUTLS_SIGN_RSA_SHA224 = 9
+ } gnutls_sign_algorithm_t;
+
+ const char *gnutls_sign_algorithm_get_name (gnutls_sign_algorithm_t sign);
/* If you want to change this, then also change the define in
* gnutls_int.h, and recompile.
@@ -660,13 +659,13 @@ extern "C" {
gnutls_cipher_algorithm_t gnutls_cipher_get (gnutls_session_t session);
gnutls_kx_algorithm_t gnutls_kx_get (gnutls_session_t session);
gnutls_mac_algorithm_t gnutls_mac_get (gnutls_session_t session);
- gnutls_compression_method_t
- gnutls_compression_get (gnutls_session_t session);
- gnutls_certificate_type_t
- gnutls_certificate_type_get (gnutls_session_t session);
+ gnutls_compression_method_t
+ gnutls_compression_get (gnutls_session_t session);
+ gnutls_certificate_type_t
+ gnutls_certificate_type_get (gnutls_session_t session);
int gnutls_sign_algorithm_get_requested (gnutls_session_t session,
size_t indx,
- gnutls_sign_algorithm_t *algo);
+ gnutls_sign_algorithm_t * algo);
size_t gnutls_cipher_get_key_size (gnutls_cipher_algorithm_t algorithm);
size_t gnutls_mac_get_key_size (gnutls_mac_algorithm_t algorithm);
@@ -674,20 +673,20 @@ extern "C" {
/* the name of the specified algorithms */
const char *gnutls_cipher_get_name (gnutls_cipher_algorithm_t algorithm);
const char *gnutls_mac_get_name (gnutls_mac_algorithm_t algorithm);
- const char *
- gnutls_compression_get_name (gnutls_compression_method_t algorithm);
+ const char *gnutls_compression_get_name (gnutls_compression_method_t
+ algorithm);
const char *gnutls_kx_get_name (gnutls_kx_algorithm_t algorithm);
- const char *
- gnutls_certificate_type_get_name (gnutls_certificate_type_t type);
+ const char *gnutls_certificate_type_get_name (gnutls_certificate_type_t
+ type);
const char *gnutls_pk_get_name (gnutls_pk_algorithm_t algorithm);
const char *gnutls_sign_get_name (gnutls_sign_algorithm_t algorithm);
- gnutls_mac_algorithm_t gnutls_mac_get_id (const char* name);
- gnutls_compression_method_t gnutls_compression_get_id (const char* name);
- gnutls_cipher_algorithm_t gnutls_cipher_get_id (const char* name);
- gnutls_kx_algorithm_t gnutls_kx_get_id (const char* name);
- gnutls_protocol_t gnutls_protocol_get_id (const char* name);
- gnutls_certificate_type_t gnutls_certificate_type_get_id (const char* name);
+ gnutls_mac_algorithm_t gnutls_mac_get_id (const char *name);
+ gnutls_compression_method_t gnutls_compression_get_id (const char *name);
+ gnutls_cipher_algorithm_t gnutls_cipher_get_id (const char *name);
+ gnutls_kx_algorithm_t gnutls_kx_get_id (const char *name);
+ gnutls_protocol_t gnutls_protocol_get_id (const char *name);
+ gnutls_certificate_type_t gnutls_certificate_type_get_id (const char *name);
gnutls_pk_algorithm_t gnutls_pk_get_id (const char *name);
gnutls_sign_algorithm_t gnutls_sign_get_id (const char *name);
@@ -702,10 +701,10 @@ extern "C" {
const gnutls_sign_algorithm_t *gnutls_sign_list (void);
const char *gnutls_cipher_suite_info (size_t idx,
char *cs_id,
- gnutls_kx_algorithm_t *kx,
- gnutls_cipher_algorithm_t *cipher,
- gnutls_mac_algorithm_t *mac,
- gnutls_protocol_t *version);
+ gnutls_kx_algorithm_t * kx,
+ gnutls_cipher_algorithm_t * cipher,
+ gnutls_mac_algorithm_t * mac,
+ gnutls_protocol_t * version);
/* error functions */
int gnutls_error_is_fatal (int error);
@@ -719,10 +718,10 @@ extern "C" {
*/
void gnutls_handshake_set_private_extensions (gnutls_session_t session,
int allow);
- gnutls_handshake_description_t
- gnutls_handshake_get_last_out (gnutls_session_t session);
- gnutls_handshake_description_t
- gnutls_handshake_get_last_in (gnutls_session_t session);
+ gnutls_handshake_description_t
+ gnutls_handshake_get_last_out (gnutls_session_t session);
+ gnutls_handshake_description_t
+ gnutls_handshake_get_last_in (gnutls_session_t session);
/* Record layer functions.
*/
@@ -777,13 +776,13 @@ extern "C" {
* is called.
*/
typedef enum
- {
- GNUTLS_EXT_ANY = 0,
- GNUTLS_EXT_APPLICATION = 1,
- GNUTLS_EXT_TLS = 2,
- GNUTLS_EXT_MANDATORY = 3,
- GNUTLS_EXT_NONE = 4,
- } gnutls_ext_parse_type_t;
+ {
+ GNUTLS_EXT_ANY = 0,
+ GNUTLS_EXT_APPLICATION = 1,
+ GNUTLS_EXT_TLS = 2,
+ GNUTLS_EXT_MANDATORY = 3,
+ GNUTLS_EXT_NONE = 4,
+ } gnutls_ext_parse_type_t;
int gnutls_ext_register (int type,
const char *name,
@@ -798,9 +797,9 @@ extern "C" {
* Enumeration of different server name types.
*/
typedef enum
- {
- GNUTLS_NAME_DNS = 1
- } gnutls_server_name_type_t;
+ {
+ GNUTLS_NAME_DNS = 1
+ } gnutls_server_name_type_t;
int gnutls_server_name_set (gnutls_session_t session,
gnutls_server_name_type_t type,
@@ -811,7 +810,8 @@ extern "C" {
unsigned int *type, unsigned int indx);
/* Safe renegotiation */
- void gnutls_safe_negotiation_set_initial (gnutls_session_t session, int value);
+ void gnutls_safe_negotiation_set_initial (gnutls_session_t session,
+ int value);
void gnutls_safe_renegotiation_set (gnutls_session_t session, int value);
@@ -822,9 +822,8 @@ extern "C" {
*/
void
- gnutls_oprfi_enable_client (gnutls_session_t session,
- size_t len,
- unsigned char *data);
+ gnutls_oprfi_enable_client (gnutls_session_t session,
+ size_t len, unsigned char *data);
typedef int (*gnutls_oprfi_callback_func) (gnutls_session_t session,
void *userdata,
@@ -833,9 +832,9 @@ extern "C" {
unsigned char *out_oprfi);
void
- gnutls_oprfi_enable_server (gnutls_session_t session,
- gnutls_oprfi_callback_func cb,
- void *userdata);
+ gnutls_oprfi_enable_server (gnutls_session_t session,
+ gnutls_oprfi_callback_func cb,
+ void *userdata);
/**
* gnutls_supplemental_data_format_type_t:
@@ -844,18 +843,19 @@ extern "C" {
* Enumeration of different supplemental data types (RFC 4680).
*/
typedef enum
- {
- GNUTLS_SUPPLEMENTAL_USER_MAPPING_DATA = 0
- } gnutls_supplemental_data_format_type_t;
+ {
+ GNUTLS_SUPPLEMENTAL_USER_MAPPING_DATA = 0
+ } gnutls_supplemental_data_format_type_t;
- const char *
- gnutls_supplemental_get_name (gnutls_supplemental_data_format_type_t type);
+ const char
+ *gnutls_supplemental_get_name (gnutls_supplemental_data_format_type_t
+ type);
/* SessionTicket, RFC 5077. */
- int gnutls_session_ticket_key_generate (gnutls_datum_t *key);
+ int gnutls_session_ticket_key_generate (gnutls_datum_t * key);
int gnutls_session_ticket_enable_client (gnutls_session_t session);
int gnutls_session_ticket_enable_server (gnutls_session_t session,
- const gnutls_datum_t *key);
+ const gnutls_datum_t * key);
/* functions to set priority of cipher suites
*/
@@ -871,16 +871,15 @@ extern "C" {
/* if you just want some defaults, use the following.
*/
- int gnutls_priority_init (gnutls_priority_t *priority_cache,
- const char *priorities,
- const char** err_pos);
+ int gnutls_priority_init (gnutls_priority_t * priority_cache,
+ const char *priorities, const char **err_pos);
void gnutls_priority_deinit (gnutls_priority_t priority_cache);
int gnutls_priority_set (gnutls_session_t session,
gnutls_priority_t priority);
int gnutls_priority_set_direct (gnutls_session_t session,
const char *priorities,
- const char** err_pos);
+ const char **err_pos);
/* for compatibility
*/
@@ -888,10 +887,12 @@ extern "C" {
int gnutls_set_default_export_priority (gnutls_session_t session);
/* Returns the name of a cipher suite */
- const char *
- gnutls_cipher_suite_get_name (gnutls_kx_algorithm_t kx_algorithm,
- gnutls_cipher_algorithm_t cipher_algorithm,
- gnutls_mac_algorithm_t mac_algorithm);
+ const char *gnutls_cipher_suite_get_name (gnutls_kx_algorithm_t
+ kx_algorithm,
+ gnutls_cipher_algorithm_t
+ cipher_algorithm,
+ gnutls_mac_algorithm_t
+ mac_algorithm);
/* get the currently used protocol version */
gnutls_protocol_t gnutls_protocol_get_version (gnutls_session_t session);
@@ -927,8 +928,8 @@ extern "C" {
const void *finished,
size_t len);
void
- gnutls_session_set_finished_function (gnutls_session_t session,
- gnutls_finished_callback_func func);
+ gnutls_session_set_finished_function (gnutls_session_t session,
+ gnutls_finished_callback_func func);
/* checks if this session is a resumed one
*/
@@ -953,10 +954,11 @@ extern "C" {
int gnutls_db_check_entry (gnutls_session_t session,
gnutls_datum_t session_entry);
- typedef int (*gnutls_handshake_post_client_hello_func)(gnutls_session_t);
+ typedef int (*gnutls_handshake_post_client_hello_func) (gnutls_session_t);
void
- gnutls_handshake_set_post_client_hello_function(gnutls_session_t session,
- gnutls_handshake_post_client_hello_func func);
+ gnutls_handshake_set_post_client_hello_function (gnutls_session_t session,
+ gnutls_handshake_post_client_hello_func
+ func);
void gnutls_handshake_set_max_packet_length (gnutls_session_t session,
size_t max);
@@ -990,28 +992,34 @@ extern "C" {
typedef struct gnutls_anon_client_credentials_st
*gnutls_anon_client_credentials_t;
- void gnutls_anon_free_server_credentials (gnutls_anon_server_credentials_t sc);
- int gnutls_anon_allocate_server_credentials (gnutls_anon_server_credentials_t * sc);
+ void gnutls_anon_free_server_credentials (gnutls_anon_server_credentials_t
+ sc);
+ int
+ gnutls_anon_allocate_server_credentials (gnutls_anon_server_credentials_t
+ * sc);
void gnutls_anon_set_server_dh_params (gnutls_anon_server_credentials_t res,
gnutls_dh_params_t dh_params);
void
- gnutls_anon_set_server_params_function (gnutls_anon_server_credentials_t res,
- gnutls_params_function * func);
+ gnutls_anon_set_server_params_function (gnutls_anon_server_credentials_t
+ res,
+ gnutls_params_function * func);
void
- gnutls_anon_free_client_credentials (gnutls_anon_client_credentials_t sc);
+ gnutls_anon_free_client_credentials (gnutls_anon_client_credentials_t sc);
int
- gnutls_anon_allocate_client_credentials (gnutls_anon_client_credentials_t * sc);
+ gnutls_anon_allocate_client_credentials (gnutls_anon_client_credentials_t
+ * sc);
/* CERTFILE is an x509 certificate in PEM form.
* KEYFILE is a pkcs-1 private key in PEM form (for RSA keys).
*/
void
- gnutls_certificate_free_credentials (gnutls_certificate_credentials_t sc);
+ gnutls_certificate_free_credentials (gnutls_certificate_credentials_t sc);
int
- gnutls_certificate_allocate_credentials (gnutls_certificate_credentials_t *res);
+ gnutls_certificate_allocate_credentials (gnutls_certificate_credentials_t
+ * res);
void gnutls_certificate_free_keys (gnutls_certificate_credentials_t sc);
void gnutls_certificate_free_cas (gnutls_certificate_credentials_t sc);
@@ -1021,54 +1029,50 @@ extern "C" {
void gnutls_certificate_set_dh_params (gnutls_certificate_credentials_t res,
gnutls_dh_params_t dh_params);
void
- gnutls_certificate_set_rsa_export_params (gnutls_certificate_credentials_t res,
- gnutls_rsa_params_t rsa_params);
- void
- gnutls_certificate_set_verify_flags (gnutls_certificate_credentials_t res,
- unsigned int flags);
- void
- gnutls_certificate_set_verify_limits (gnutls_certificate_credentials_t res,
- unsigned int max_bits,
- unsigned int max_depth);
+ gnutls_certificate_set_rsa_export_params (gnutls_certificate_credentials_t
+ res,
+ gnutls_rsa_params_t rsa_params);
+ void gnutls_certificate_set_verify_flags (gnutls_certificate_credentials_t
+ res, unsigned int flags);
+ void gnutls_certificate_set_verify_limits (gnutls_certificate_credentials_t
+ res, unsigned int max_bits,
+ unsigned int max_depth);
int
- gnutls_certificate_set_x509_trust_file (gnutls_certificate_credentials_t res,
- const char *cafile,
- gnutls_x509_crt_fmt_t type);
- int
- gnutls_certificate_set_x509_trust_mem (gnutls_certificate_credentials_t res,
- const gnutls_datum_t * ca,
- gnutls_x509_crt_fmt_t type);
+ gnutls_certificate_set_x509_trust_file (gnutls_certificate_credentials_t
+ res, const char *cafile,
+ gnutls_x509_crt_fmt_t type);
+ int gnutls_certificate_set_x509_trust_mem (gnutls_certificate_credentials_t
+ res, const gnutls_datum_t * ca,
+ gnutls_x509_crt_fmt_t type);
int
- gnutls_certificate_set_x509_crl_file (gnutls_certificate_credentials_t res,
- const char *crlfile,
- gnutls_x509_crt_fmt_t type);
- int
- gnutls_certificate_set_x509_crl_mem (gnutls_certificate_credentials_t res,
- const gnutls_datum_t * CRL,
- gnutls_x509_crt_fmt_t type);
+ gnutls_certificate_set_x509_crl_file (gnutls_certificate_credentials_t
+ res, const char *crlfile,
+ gnutls_x509_crt_fmt_t type);
+ int gnutls_certificate_set_x509_crl_mem (gnutls_certificate_credentials_t
+ res, const gnutls_datum_t * CRL,
+ gnutls_x509_crt_fmt_t type);
int
- gnutls_certificate_set_x509_key_file (gnutls_certificate_credentials_t res,
- const char *certfile,
- const char *keyfile,
- gnutls_x509_crt_fmt_t type);
- int
- gnutls_certificate_set_x509_key_mem (gnutls_certificate_credentials_t res,
- const gnutls_datum_t * cert,
- const gnutls_datum_t * key,
- gnutls_x509_crt_fmt_t type);
+ gnutls_certificate_set_x509_key_file (gnutls_certificate_credentials_t
+ res, const char *certfile,
+ const char *keyfile,
+ gnutls_x509_crt_fmt_t type);
+ int gnutls_certificate_set_x509_key_mem (gnutls_certificate_credentials_t
+ res, const gnutls_datum_t * cert,
+ const gnutls_datum_t * key,
+ gnutls_x509_crt_fmt_t type);
void gnutls_certificate_send_x509_rdn_sequence (gnutls_session_t session,
int status);
int gnutls_certificate_set_x509_simple_pkcs12_file
- (gnutls_certificate_credentials_t res, const char *pkcs12file,
- gnutls_x509_crt_fmt_t type, const char *password);
+ (gnutls_certificate_credentials_t res, const char *pkcs12file,
+ gnutls_x509_crt_fmt_t type, const char *password);
int gnutls_certificate_set_x509_simple_pkcs12_mem
- (gnutls_certificate_credentials_t res, const gnutls_datum_t *p12blob,
- gnutls_x509_crt_fmt_t type, const char *password);
+ (gnutls_certificate_credentials_t res, const gnutls_datum_t * p12blob,
+ gnutls_x509_crt_fmt_t type, const char *password);
/* New functions to allow setting already parsed X.509 stuff.
*/
@@ -1096,15 +1100,18 @@ extern "C" {
int crl_list_size);
void gnutls_certificate_get_x509_cas (gnutls_certificate_credentials_t sc,
- gnutls_x509_crt_t **x509_ca_list,
- unsigned int* ncas);
+ gnutls_x509_crt_t ** x509_ca_list,
+ unsigned int *ncas);
void gnutls_certificate_get_x509_crls (gnutls_certificate_credentials_t sc,
- gnutls_x509_crl_t **x509_crl_list,
- unsigned int* ncrls);
+ gnutls_x509_crl_t ** x509_crl_list,
+ unsigned int *ncrls);
- void gnutls_certificate_get_openpgp_keyring (gnutls_certificate_credentials_t sc,
- gnutls_openpgp_keyring_t *keyring);
+ void
+ gnutls_certificate_get_openpgp_keyring (gnutls_certificate_credentials_t
+ sc,
+ gnutls_openpgp_keyring_t *
+ keyring);
/* global state functions
*/
@@ -1118,11 +1125,11 @@ extern "C" {
typedef void *(*gnutls_realloc_function) (void *, size_t);
void
- gnutls_global_set_mem_functions (gnutls_alloc_function alloc_func,
- gnutls_alloc_function secure_alloc_func,
- gnutls_is_secure_function is_secure_func,
- gnutls_realloc_function realloc_func,
- gnutls_free_function free_func);
+ gnutls_global_set_mem_functions (gnutls_alloc_function alloc_func,
+ gnutls_alloc_function secure_alloc_func,
+ gnutls_is_secure_function is_secure_func,
+ gnutls_realloc_function realloc_func,
+ gnutls_free_function free_func);
/* For use in callbacks */
extern gnutls_alloc_function gnutls_malloc;
@@ -1222,7 +1229,7 @@ extern "C" {
void *gnutls_session_get_ptr (gnutls_session_t session);
void gnutls_openpgp_send_cert (gnutls_session_t session,
- gnutls_openpgp_crt_status_t status);
+ gnutls_openpgp_crt_status_t status);
/* fingerprint
* Actually this function returns the hash of the given data.
@@ -1241,22 +1248,22 @@ extern "C" {
*gnutls_srp_client_credentials_t;
void
- gnutls_srp_free_client_credentials (gnutls_srp_client_credentials_t sc);
- int
- gnutls_srp_allocate_client_credentials (gnutls_srp_client_credentials_t * sc);
+ gnutls_srp_free_client_credentials (gnutls_srp_client_credentials_t sc);
int
- gnutls_srp_set_client_credentials (gnutls_srp_client_credentials_t res,
- const char *username,
- const char *password);
+ gnutls_srp_allocate_client_credentials (gnutls_srp_client_credentials_t *
+ sc);
+ int gnutls_srp_set_client_credentials (gnutls_srp_client_credentials_t res,
+ const char *username,
+ const char *password);
void
- gnutls_srp_free_server_credentials (gnutls_srp_server_credentials_t sc);
- int
- gnutls_srp_allocate_server_credentials (gnutls_srp_server_credentials_t *sc);
+ gnutls_srp_free_server_credentials (gnutls_srp_server_credentials_t sc);
int
- gnutls_srp_set_server_credentials_file (gnutls_srp_server_credentials_t res,
- const char *password_file,
- const char *password_conf_file);
+ gnutls_srp_allocate_server_credentials (gnutls_srp_server_credentials_t *
+ sc);
+ int gnutls_srp_set_server_credentials_file (gnutls_srp_server_credentials_t
+ res, const char *password_file,
+ const char *password_conf_file);
const char *gnutls_srp_server_get_username (gnutls_session_t session);
@@ -1326,31 +1333,32 @@ extern "C" {
* Enumeration of different PSK key flags.
*/
typedef enum gnutls_psk_key_flags
- {
- GNUTLS_PSK_KEY_RAW = 0,
- GNUTLS_PSK_KEY_HEX
- } gnutls_psk_key_flags;
+ {
+ GNUTLS_PSK_KEY_RAW = 0,
+ GNUTLS_PSK_KEY_HEX
+ } gnutls_psk_key_flags;
void
- gnutls_psk_free_client_credentials (gnutls_psk_client_credentials_t sc);
+ gnutls_psk_free_client_credentials (gnutls_psk_client_credentials_t sc);
int
- gnutls_psk_allocate_client_credentials (gnutls_psk_client_credentials_t * sc);
+ gnutls_psk_allocate_client_credentials (gnutls_psk_client_credentials_t *
+ sc);
int gnutls_psk_set_client_credentials (gnutls_psk_client_credentials_t res,
const char *username,
const gnutls_datum_t * key,
gnutls_psk_key_flags format);
void
- gnutls_psk_free_server_credentials (gnutls_psk_server_credentials_t sc);
+ gnutls_psk_free_server_credentials (gnutls_psk_server_credentials_t sc);
int
- gnutls_psk_allocate_server_credentials (gnutls_psk_server_credentials_t * sc);
- int
- gnutls_psk_set_server_credentials_file (gnutls_psk_server_credentials_t res,
- const char *password_file);
+ gnutls_psk_allocate_server_credentials (gnutls_psk_server_credentials_t *
+ sc);
+ int gnutls_psk_set_server_credentials_file (gnutls_psk_server_credentials_t
+ res, const char *password_file);
int
- gnutls_psk_set_server_credentials_hint (gnutls_psk_server_credentials_t res,
- const char *hint);
+ gnutls_psk_set_server_credentials_hint (gnutls_psk_server_credentials_t
+ res, const char *hint);
const char *gnutls_psk_server_get_username (gnutls_session_t session);
const char *gnutls_psk_client_get_hint (gnutls_session_t session);
@@ -1359,9 +1367,9 @@ extern "C" {
const char *username,
gnutls_datum_t * key);
void
- gnutls_psk_set_server_credentials_function
- (gnutls_psk_server_credentials_t cred,
- gnutls_psk_server_credentials_function * func);
+ gnutls_psk_set_server_credentials_function
+ (gnutls_psk_server_credentials_t cred,
+ gnutls_psk_server_credentials_function * func);
typedef int gnutls_psk_client_credentials_function (gnutls_session_t,
char **username,
@@ -1377,17 +1385,18 @@ extern "C" {
size_t * result_size);
void
- gnutls_psk_set_server_dh_params (gnutls_psk_server_credentials_t res,
- gnutls_dh_params_t dh_params);
+ gnutls_psk_set_server_dh_params (gnutls_psk_server_credentials_t res,
+ gnutls_dh_params_t dh_params);
void
- gnutls_psk_set_server_params_function (gnutls_psk_server_credentials_t res,
- gnutls_params_function * func);
+ gnutls_psk_set_server_params_function (gnutls_psk_server_credentials_t
+ res,
+ gnutls_params_function * func);
int gnutls_psk_netconf_derive_key (const char *password,
const char *psk_identity,
const char *psk_identity_hint,
- gnutls_datum_t *output_key);
+ gnutls_datum_t * output_key);
/**
* gnutls_x509_subject_alt_name_t:
@@ -1403,18 +1412,18 @@ extern "C" {
* Enumeration of different subject alternative names types.
*/
typedef enum gnutls_x509_subject_alt_name_t
- {
- GNUTLS_SAN_DNSNAME = 1,
- GNUTLS_SAN_RFC822NAME = 2,
- GNUTLS_SAN_URI = 3,
- GNUTLS_SAN_IPADDRESS = 4,
- GNUTLS_SAN_OTHERNAME = 5,
- GNUTLS_SAN_DN = 6,
- /* The following are "virtual" subject alternative name types, in
- that they are represented by an otherName value and an OID.
- Used by gnutls_x509_crt_get_subject_alt_othername_oid(). */
- GNUTLS_SAN_OTHERNAME_XMPP = 1000
- } gnutls_x509_subject_alt_name_t;
+ {
+ GNUTLS_SAN_DNSNAME = 1,
+ GNUTLS_SAN_RFC822NAME = 2,
+ GNUTLS_SAN_URI = 3,
+ GNUTLS_SAN_IPADDRESS = 4,
+ GNUTLS_SAN_OTHERNAME = 5,
+ GNUTLS_SAN_DN = 6,
+ /* The following are "virtual" subject alternative name types, in
+ that they are represented by an otherName value and an OID.
+ Used by gnutls_x509_crt_get_subject_alt_othername_oid(). */
+ GNUTLS_SAN_OTHERNAME_XMPP = 1000
+ } gnutls_x509_subject_alt_name_t;
struct gnutls_openpgp_crt_int;
typedef struct gnutls_openpgp_crt_int *gnutls_openpgp_crt_t;
@@ -1455,7 +1464,7 @@ extern "C" {
typedef int gnutls_certificate_server_retrieve_function (gnutls_session_t,
gnutls_retr_st *);
- typedef int gnutls_certificate_verify_function( gnutls_session_t);
+ typedef int gnutls_certificate_verify_function (gnutls_session_t);
/* Functions that allow auth_info_t structures handling
@@ -1496,11 +1505,9 @@ extern "C" {
gnutls_datum_t * signature);
void gnutls_sign_callback_set (gnutls_session_t session,
- gnutls_sign_func sign_func,
- void *userdata);
- gnutls_sign_func
- gnutls_sign_callback_get (gnutls_session_t session,
- void **userdata);
+ gnutls_sign_func sign_func, void *userdata);
+ gnutls_sign_func
+ gnutls_sign_callback_get (gnutls_session_t session, void **userdata);
/* These are set on the credentials structure.
*/
@@ -1511,20 +1518,24 @@ extern "C" {
(gnutls_certificate_credentials_t cred,
gnutls_certificate_server_retrieve_function * func);
- void gnutls_certificate_set_verify_function(
- gnutls_certificate_credentials_t cred, gnutls_certificate_verify_function * func);
+ void
+ gnutls_certificate_set_verify_function (gnutls_certificate_credentials_t
+ cred,
+ gnutls_certificate_verify_function
+ * func);
void
- gnutls_certificate_server_set_request (gnutls_session_t session,
- gnutls_certificate_request_t req);
+ gnutls_certificate_server_set_request (gnutls_session_t session,
+ gnutls_certificate_request_t req);
/* get data from the session
*/
- const gnutls_datum_t *
- gnutls_certificate_get_peers (gnutls_session_t session,
- unsigned int *list_size);
- const gnutls_datum_t *
- gnutls_certificate_get_ours (gnutls_session_t session);
+ const gnutls_datum_t *gnutls_certificate_get_peers (gnutls_session_t
+ session,
+ unsigned int
+ *list_size);
+ const gnutls_datum_t *gnutls_certificate_get_ours (gnutls_session_t
+ session);
time_t gnutls_certificate_activation_time_peers (gnutls_session_t session);
time_t gnutls_certificate_expiration_time_peers (gnutls_session_t session);
@@ -1565,15 +1576,16 @@ extern "C" {
#define GNUTLS_KEY_DECIPHER_ONLY 32768
void
- gnutls_certificate_set_params_function (gnutls_certificate_credentials_t res,
- gnutls_params_function * func);
+ gnutls_certificate_set_params_function (gnutls_certificate_credentials_t
+ res,
+ gnutls_params_function * func);
void gnutls_anon_set_params_function (gnutls_anon_server_credentials_t res,
gnutls_params_function * func);
void gnutls_psk_set_params_function (gnutls_psk_server_credentials_t res,
gnutls_params_function * func);
- int gnutls_hex2bin (const char * hex_data, size_t hex_size,
- char * bin_data, size_t * bin_size);
+ int gnutls_hex2bin (const char *hex_data, size_t hex_size,
+ char *bin_data, size_t * bin_size);
/* Gnutls error codes. The mapping to a TLS alert is also shown in
* comments.
diff --git a/lib/includes/gnutls/openpgp.h b/lib/includes/gnutls/openpgp.h
index f6c18f2ec4..ba8f1545a2 100644
--- a/lib/includes/gnutls/openpgp.h
+++ b/lib/includes/gnutls/openpgp.h
@@ -48,10 +48,10 @@ extern "C"
* Enumeration of different OpenPGP key formats.
*/
typedef enum gnutls_openpgp_crt_fmt
- {
- GNUTLS_OPENPGP_FMT_RAW,
- GNUTLS_OPENPGP_FMT_BASE64
- } gnutls_openpgp_crt_fmt_t;
+ {
+ GNUTLS_OPENPGP_FMT_RAW,
+ GNUTLS_OPENPGP_FMT_BASE64
+ } gnutls_openpgp_crt_fmt_t;
typedef unsigned char gnutls_openpgp_keyid_t[8];
@@ -89,9 +89,9 @@ extern "C"
int gnutls_openpgp_crt_get_name (gnutls_openpgp_crt_t key,
int idx, char *buf, size_t * sizeof_buf);
- gnutls_pk_algorithm_t
- gnutls_openpgp_crt_get_pk_algorithm (gnutls_openpgp_crt_t key,
- unsigned int *bits);
+ gnutls_pk_algorithm_t
+ gnutls_openpgp_crt_get_pk_algorithm (gnutls_openpgp_crt_t key,
+ unsigned int *bits);
int gnutls_openpgp_crt_get_version (gnutls_openpgp_crt_t key);
@@ -111,15 +111,15 @@ extern "C"
const gnutls_openpgp_keyid_t keyid);
int gnutls_openpgp_crt_get_subkey_revoked_status (gnutls_openpgp_crt_t key,
unsigned int idx);
- gnutls_pk_algorithm_t
- gnutls_openpgp_crt_get_subkey_pk_algorithm (gnutls_openpgp_crt_t key,
- unsigned int idx,
- unsigned int *bits);
- time_t gnutls_openpgp_crt_get_subkey_creation_time (gnutls_openpgp_crt_t key,
- unsigned int idx);
- time_t
- gnutls_openpgp_crt_get_subkey_expiration_time (gnutls_openpgp_crt_t key,
- unsigned int idx);
+ gnutls_pk_algorithm_t
+ gnutls_openpgp_crt_get_subkey_pk_algorithm (gnutls_openpgp_crt_t key,
+ unsigned int idx,
+ unsigned int *bits);
+ time_t gnutls_openpgp_crt_get_subkey_creation_time (gnutls_openpgp_crt_t
+ key, unsigned int idx);
+ time_t gnutls_openpgp_crt_get_subkey_expiration_time (gnutls_openpgp_crt_t
+ key,
+ unsigned int idx);
int gnutls_openpgp_crt_get_subkey_id (gnutls_openpgp_crt_t key,
unsigned int idx,
gnutls_openpgp_keyid_t keyid);
@@ -149,16 +149,17 @@ extern "C"
int gnutls_openpgp_crt_get_preferred_key_id (gnutls_openpgp_crt_t key,
gnutls_openpgp_keyid_t keyid);
int
- gnutls_openpgp_crt_set_preferred_key_id (gnutls_openpgp_crt_t key,
- const gnutls_openpgp_keyid_t keyid);
+ gnutls_openpgp_crt_set_preferred_key_id (gnutls_openpgp_crt_t key,
+ const gnutls_openpgp_keyid_t
+ keyid);
/* privkey stuff.
*/
int gnutls_openpgp_privkey_init (gnutls_openpgp_privkey_t * key);
void gnutls_openpgp_privkey_deinit (gnutls_openpgp_privkey_t key);
- gnutls_pk_algorithm_t
- gnutls_openpgp_privkey_get_pk_algorithm (gnutls_openpgp_privkey_t key,
- unsigned int *bits);
+ gnutls_pk_algorithm_t
+ gnutls_openpgp_privkey_get_pk_algorithm (gnutls_openpgp_privkey_t key,
+ unsigned int *bits);
int gnutls_openpgp_privkey_import (gnutls_openpgp_privkey_t key,
const gnutls_datum_t * data,
gnutls_openpgp_crt_fmt_t format,
@@ -170,56 +171,57 @@ extern "C"
int gnutls_openpgp_privkey_get_fingerprint (gnutls_openpgp_privkey_t key,
void *fpr, size_t * fprlen);
int
- gnutls_openpgp_privkey_get_subkey_fingerprint (gnutls_openpgp_privkey_t key,
- unsigned int idx,
- void *fpr,
- size_t * fprlen);
+ gnutls_openpgp_privkey_get_subkey_fingerprint (gnutls_openpgp_privkey_t
+ key, unsigned int idx,
+ void *fpr,
+ size_t * fprlen);
int gnutls_openpgp_privkey_get_key_id (gnutls_openpgp_privkey_t key,
gnutls_openpgp_keyid_t keyid);
int gnutls_openpgp_privkey_get_subkey_count (gnutls_openpgp_privkey_t key);
int gnutls_openpgp_privkey_get_subkey_idx (gnutls_openpgp_privkey_t key,
- const gnutls_openpgp_keyid_t keyid);
+ const gnutls_openpgp_keyid_t
+ keyid);
int
- gnutls_openpgp_privkey_get_subkey_revoked_status (gnutls_openpgp_privkey_t key,
- unsigned int idx);
+ gnutls_openpgp_privkey_get_subkey_revoked_status (gnutls_openpgp_privkey_t
+ key, unsigned int idx);
- int gnutls_openpgp_privkey_get_revoked_status (gnutls_openpgp_privkey_t key);
+ int gnutls_openpgp_privkey_get_revoked_status (gnutls_openpgp_privkey_t
+ key);
- gnutls_pk_algorithm_t
- gnutls_openpgp_privkey_get_subkey_pk_algorithm (gnutls_openpgp_privkey_t key,
- unsigned int idx,
- unsigned int *bits);
+ gnutls_pk_algorithm_t
+ gnutls_openpgp_privkey_get_subkey_pk_algorithm (gnutls_openpgp_privkey_t
+ key, unsigned int idx,
+ unsigned int *bits);
- time_t
- gnutls_openpgp_privkey_get_subkey_expiration_time (gnutls_openpgp_privkey_t key,
- unsigned int idx);
+ time_t
+ gnutls_openpgp_privkey_get_subkey_expiration_time
+ (gnutls_openpgp_privkey_t key, unsigned int idx);
int gnutls_openpgp_privkey_get_subkey_id (gnutls_openpgp_privkey_t key,
unsigned int idx,
gnutls_openpgp_keyid_t keyid);
- time_t
- gnutls_openpgp_privkey_get_subkey_creation_time (gnutls_openpgp_privkey_t key,
- unsigned int idx);
+ time_t
+ gnutls_openpgp_privkey_get_subkey_creation_time (gnutls_openpgp_privkey_t
+ key, unsigned int idx);
int
- gnutls_openpgp_privkey_export_subkey_dsa_raw (gnutls_openpgp_privkey_t pkey,
- unsigned int idx,
- gnutls_datum_t * p,
- gnutls_datum_t * q,
- gnutls_datum_t * g,
- gnutls_datum_t * y,
- gnutls_datum_t * x);
- int
- gnutls_openpgp_privkey_export_subkey_rsa_raw (gnutls_openpgp_privkey_t pkey,
- unsigned int idx,
- gnutls_datum_t * m,
- gnutls_datum_t * e,
- gnutls_datum_t * d,
- gnutls_datum_t * p,
- gnutls_datum_t * q,
- gnutls_datum_t * u);
+ gnutls_openpgp_privkey_export_subkey_dsa_raw (gnutls_openpgp_privkey_t
+ pkey, unsigned int idx,
+ gnutls_datum_t * p,
+ gnutls_datum_t * q,
+ gnutls_datum_t * g,
+ gnutls_datum_t * y,
+ gnutls_datum_t * x);
+ int gnutls_openpgp_privkey_export_subkey_rsa_raw (gnutls_openpgp_privkey_t
+ pkey, unsigned int idx,
+ gnutls_datum_t * m,
+ gnutls_datum_t * e,
+ gnutls_datum_t * d,
+ gnutls_datum_t * p,
+ gnutls_datum_t * q,
+ gnutls_datum_t * u);
int gnutls_openpgp_privkey_export_dsa_raw (gnutls_openpgp_privkey_t pkey,
gnutls_datum_t * p,
@@ -243,11 +245,13 @@ extern "C"
size_t * output_data_size);
int
- gnutls_openpgp_privkey_set_preferred_key_id (gnutls_openpgp_privkey_t key,
- const gnutls_openpgp_keyid_t keyid);
- int
- gnutls_openpgp_privkey_get_preferred_key_id (gnutls_openpgp_privkey_t key,
- gnutls_openpgp_keyid_t keyid);
+ gnutls_openpgp_privkey_set_preferred_key_id (gnutls_openpgp_privkey_t key,
+ const gnutls_openpgp_keyid_t
+ keyid);
+ int gnutls_openpgp_privkey_get_preferred_key_id (gnutls_openpgp_privkey_t
+ key,
+ gnutls_openpgp_keyid_t
+ keyid);
int gnutls_openpgp_crt_get_auth_subkey (gnutls_openpgp_crt_t crt,
gnutls_openpgp_keyid_t keyid,
@@ -306,51 +310,52 @@ extern "C"
gnutls_datum_t * key);
void
- gnutls_openpgp_set_recv_key_function (gnutls_session_t session,
- gnutls_openpgp_recv_key_func func);
+ gnutls_openpgp_set_recv_key_function (gnutls_session_t session,
+ gnutls_openpgp_recv_key_func func);
/* certificate authentication stuff.
*/
- int gnutls_certificate_set_openpgp_key (gnutls_certificate_credentials_t res,
- gnutls_openpgp_crt_t key,
+ int gnutls_certificate_set_openpgp_key (gnutls_certificate_credentials_t
+ res, gnutls_openpgp_crt_t key,
gnutls_openpgp_privkey_t pkey);
int
- gnutls_certificate_set_openpgp_key_file (gnutls_certificate_credentials_t res,
- const char *certfile,
- const char *keyfile,
- gnutls_openpgp_crt_fmt_t format);
- int
- gnutls_certificate_set_openpgp_key_mem (gnutls_certificate_credentials_t res,
- const gnutls_datum_t * cert,
- const gnutls_datum_t * key,
- gnutls_openpgp_crt_fmt_t format);
+ gnutls_certificate_set_openpgp_key_file (gnutls_certificate_credentials_t
+ res, const char *certfile,
+ const char *keyfile,
+ gnutls_openpgp_crt_fmt_t format);
+ int gnutls_certificate_set_openpgp_key_mem (gnutls_certificate_credentials_t
+ res,
+ const gnutls_datum_t * cert,
+ const gnutls_datum_t * key,
+ gnutls_openpgp_crt_fmt_t
+ format);
int
- gnutls_certificate_set_openpgp_key_file2 (gnutls_certificate_credentials_t res,
- const char *certfile,
- const char *keyfile,
- const char *subkey_id,
- gnutls_openpgp_crt_fmt_t format);
+ gnutls_certificate_set_openpgp_key_file2 (gnutls_certificate_credentials_t
+ res, const char *certfile,
+ const char *keyfile,
+ const char *subkey_id,
+ gnutls_openpgp_crt_fmt_t
+ format);
int
- gnutls_certificate_set_openpgp_key_mem2 (gnutls_certificate_credentials_t res,
- const gnutls_datum_t * cert,
- const gnutls_datum_t * key,
- const char *subkey_id,
- gnutls_openpgp_crt_fmt_t format);
+ gnutls_certificate_set_openpgp_key_mem2 (gnutls_certificate_credentials_t
+ res, const gnutls_datum_t * cert,
+ const gnutls_datum_t * key,
+ const char *subkey_id,
+ gnutls_openpgp_crt_fmt_t format);
int
- gnutls_certificate_set_openpgp_keyring_mem (gnutls_certificate_credentials_t c,
- const unsigned char *data,
- size_t dlen,
- gnutls_openpgp_crt_fmt_t format);
+ gnutls_certificate_set_openpgp_keyring_mem
+ (gnutls_certificate_credentials_t c, const unsigned char *data,
+ size_t dlen, gnutls_openpgp_crt_fmt_t format);
int
- gnutls_certificate_set_openpgp_keyring_file (gnutls_certificate_credentials_t c,
- const char *file,
- gnutls_openpgp_crt_fmt_t format);
+ gnutls_certificate_set_openpgp_keyring_file
+ (gnutls_certificate_credentials_t c, const char *file,
+ gnutls_openpgp_crt_fmt_t format);
# ifdef __cplusplus
}
diff --git a/lib/includes/gnutls/pkcs12.h b/lib/includes/gnutls/pkcs12.h
index 8867224056..9652ac169a 100644
--- a/lib/includes/gnutls/pkcs12.h
+++ b/lib/includes/gnutls/pkcs12.h
@@ -81,18 +81,17 @@ extern "C"
GNUTLS_BAG_PKCS8_KEY = 2,
GNUTLS_BAG_CERTIFICATE = 3,
GNUTLS_BAG_CRL = 4,
- GNUTLS_BAG_SECRET = 5, /* Secret data. Underspecified in pkcs-12,
- * gnutls extension. We use the PKCS-9
- * random nonce ID 1.2.840.113549.1.9.25.3
- * to store randomly generated keys.
- */
+ GNUTLS_BAG_SECRET = 5, /* Secret data. Underspecified in pkcs-12,
+ * gnutls extension. We use the PKCS-9
+ * random nonce ID 1.2.840.113549.1.9.25.3
+ * to store randomly generated keys.
+ */
GNUTLS_BAG_ENCRYPTED = 10,
GNUTLS_BAG_UNKNOWN = 20
} gnutls_pkcs12_bag_type_t;
- gnutls_pkcs12_bag_type_t
- gnutls_pkcs12_bag_get_type (gnutls_pkcs12_bag_t bag,
- int indx);
+ gnutls_pkcs12_bag_type_t
+ gnutls_pkcs12_bag_get_type (gnutls_pkcs12_bag_t bag, int indx);
int gnutls_pkcs12_bag_get_data (gnutls_pkcs12_bag_t bag, int indx,
gnutls_datum_t * data);
int gnutls_pkcs12_bag_set_data (gnutls_pkcs12_bag_t bag,
diff --git a/lib/includes/gnutls/x509.h b/lib/includes/gnutls/x509.h
index 6c536e0b64..5733813f15 100644
--- a/lib/includes/gnutls/x509.h
+++ b/lib/includes/gnutls/x509.h
@@ -95,9 +95,9 @@ extern "C"
* Enumeration of different certificate import flags.
*/
typedef enum gnutls_certificate_import_flags
- {
- GNUTLS_X509_CRT_LIST_IMPORT_FAIL_IF_EXCEED = 1
- } gnutls_certificate_import_flags;
+ {
+ GNUTLS_X509_CRT_LIST_IMPORT_FAIL_IF_EXCEED = 1
+ } gnutls_certificate_import_flags;
int gnutls_x509_crt_init (gnutls_x509_crt_t * cert);
void gnutls_x509_crt_deinit (gnutls_x509_crt_t cert);
@@ -166,13 +166,13 @@ extern "C"
unsigned int *reason_flags,
unsigned int *critical);
int gnutls_x509_crt_set_crl_dist_points2 (gnutls_x509_crt_t crt,
- gnutls_x509_subject_alt_name_t type,
- const void *data,
+ gnutls_x509_subject_alt_name_t
+ type, const void *data,
unsigned int data_size,
unsigned int reason_flags);
int gnutls_x509_crt_set_crl_dist_points (gnutls_x509_crt_t crt,
- gnutls_x509_subject_alt_name_t type,
- const void *data_string,
+ gnutls_x509_subject_alt_name_t
+ type, const void *data_string,
unsigned int reason_flags);
int gnutls_x509_crt_cpy_crl_dist_points (gnutls_x509_crt_t dst,
gnutls_x509_crt_t src);
@@ -207,19 +207,19 @@ extern "C"
size_t * ret_size);
int gnutls_x509_crt_get_issuer_alt_name (gnutls_x509_crt_t cert,
+ unsigned int seq, void *ret,
+ size_t * ret_size,
+ unsigned int *critical);
+ int gnutls_x509_crt_get_issuer_alt_name2 (gnutls_x509_crt_t cert,
unsigned int seq, void *ret,
size_t * ret_size,
+ unsigned int *ret_type,
unsigned int *critical);
- int gnutls_x509_crt_get_issuer_alt_name2 (gnutls_x509_crt_t cert,
- unsigned int seq, void *ret,
- size_t * ret_size,
- unsigned int *ret_type,
- unsigned int *critical);
int gnutls_x509_crt_get_issuer_alt_othername_oid (gnutls_x509_crt_t cert,
- unsigned int seq,
- void *ret,
- size_t * ret_size);
+ unsigned int seq,
+ void *ret,
+ size_t * ret_size);
int gnutls_x509_crt_get_ca_status (gnutls_x509_crt_t cert,
unsigned int *critical);
@@ -287,18 +287,17 @@ extern "C"
unsigned int ca,
int pathLenConstraint);
int gnutls_x509_crt_set_subject_alternative_name (gnutls_x509_crt_t crt,
- gnutls_x509_subject_alt_name_t type,
+ gnutls_x509_subject_alt_name_t
+ type,
const char *data_string);
int gnutls_x509_crt_set_subject_alt_name (gnutls_x509_crt_t crt,
- gnutls_x509_subject_alt_name_t type,
- const void *data,
+ gnutls_x509_subject_alt_name_t
+ type, const void *data,
unsigned int data_size,
unsigned int flags);
- int gnutls_x509_crt_sign (gnutls_x509_crt_t crt,
- gnutls_x509_crt_t issuer,
+ int gnutls_x509_crt_sign (gnutls_x509_crt_t crt, gnutls_x509_crt_t issuer,
gnutls_x509_privkey_t issuer_key);
- int gnutls_x509_crt_sign2 (gnutls_x509_crt_t crt,
- gnutls_x509_crt_t issuer,
+ int gnutls_x509_crt_sign2 (gnutls_x509_crt_t crt, gnutls_x509_crt_t issuer,
gnutls_x509_privkey_t issuer_key,
gnutls_digest_algorithm_t dig,
unsigned int flags);
@@ -528,16 +527,16 @@ extern "C"
* Enumeration of different certificate verify flags.
*/
typedef enum gnutls_certificate_verify_flags
- {
- GNUTLS_VERIFY_DISABLE_CA_SIGN = 1,
- GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT = 2,
- GNUTLS_VERIFY_DO_NOT_ALLOW_SAME = 4,
- GNUTLS_VERIFY_ALLOW_ANY_X509_V1_CA_CRT = 8,
- GNUTLS_VERIFY_ALLOW_SIGN_RSA_MD2 = 16,
- GNUTLS_VERIFY_ALLOW_SIGN_RSA_MD5 = 32,
- GNUTLS_VERIFY_DISABLE_TIME_CHECKS = 64,
- GNUTLS_VERIFY_DISABLE_TRUSTED_TIME_CHECKS = 128,
- } gnutls_certificate_verify_flags;
+ {
+ GNUTLS_VERIFY_DISABLE_CA_SIGN = 1,
+ GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT = 2,
+ GNUTLS_VERIFY_DO_NOT_ALLOW_SAME = 4,
+ GNUTLS_VERIFY_ALLOW_ANY_X509_V1_CA_CRT = 8,
+ GNUTLS_VERIFY_ALLOW_SIGN_RSA_MD2 = 16,
+ GNUTLS_VERIFY_ALLOW_SIGN_RSA_MD5 = 32,
+ GNUTLS_VERIFY_DISABLE_TIME_CHECKS = 64,
+ GNUTLS_VERIFY_DISABLE_TRUSTED_TIME_CHECKS = 128,
+ } gnutls_certificate_verify_flags;
int gnutls_x509_crt_check_issuer (gnutls_x509_crt_t cert,
gnutls_x509_crt_t issuer);
@@ -599,20 +598,20 @@ extern "C"
* Enumeration of different PKCS encryption flags.
*/
typedef enum gnutls_pkcs_encrypt_flags_t
- {
- GNUTLS_PKCS_PLAIN = 1,
- GNUTLS_PKCS8_PLAIN = GNUTLS_PKCS_PLAIN,
- GNUTLS_PKCS_USE_PKCS12_3DES = 2,
- GNUTLS_PKCS8_USE_PKCS12_3DES = GNUTLS_PKCS_USE_PKCS12_3DES,
- GNUTLS_PKCS_USE_PKCS12_ARCFOUR = 4,
- GNUTLS_PKCS8_USE_PKCS12_ARCFOUR = GNUTLS_PKCS_USE_PKCS12_ARCFOUR,
- GNUTLS_PKCS_USE_PKCS12_RC2_40 = 8,
- GNUTLS_PKCS8_USE_PKCS12_RC2_40 = GNUTLS_PKCS_USE_PKCS12_RC2_40,
- GNUTLS_PKCS_USE_PBES2_3DES = 16,
- GNUTLS_PKCS_USE_PBES2_AES_128 = 32,
- GNUTLS_PKCS_USE_PBES2_AES_192 = 64,
- GNUTLS_PKCS_USE_PBES2_AES_256 = 128,
- } gnutls_pkcs_encrypt_flags_t;
+ {
+ GNUTLS_PKCS_PLAIN = 1,
+ GNUTLS_PKCS8_PLAIN = GNUTLS_PKCS_PLAIN,
+ GNUTLS_PKCS_USE_PKCS12_3DES = 2,
+ GNUTLS_PKCS8_USE_PKCS12_3DES = GNUTLS_PKCS_USE_PKCS12_3DES,
+ GNUTLS_PKCS_USE_PKCS12_ARCFOUR = 4,
+ GNUTLS_PKCS8_USE_PKCS12_ARCFOUR = GNUTLS_PKCS_USE_PKCS12_ARCFOUR,
+ GNUTLS_PKCS_USE_PKCS12_RC2_40 = 8,
+ GNUTLS_PKCS8_USE_PKCS12_RC2_40 = GNUTLS_PKCS_USE_PKCS12_RC2_40,
+ GNUTLS_PKCS_USE_PBES2_3DES = 16,
+ GNUTLS_PKCS_USE_PBES2_AES_128 = 32,
+ GNUTLS_PKCS_USE_PBES2_AES_192 = 64,
+ GNUTLS_PKCS_USE_PBES2_AES_256 = 128,
+ } gnutls_pkcs_encrypt_flags_t;
int gnutls_x509_privkey_init (gnutls_x509_privkey_t * key);
void gnutls_x509_privkey_deinit (gnutls_x509_privkey_t key);
@@ -697,8 +696,9 @@ extern "C"
const gnutls_datum_t * hash,
const gnutls_datum_t * signature);
- int gnutls_x509_crt_get_verify_algorithm(gnutls_x509_crt_t crt,
- const gnutls_datum_t * signature, gnutls_digest_algorithm_t *hash);
+ int gnutls_x509_crt_get_verify_algorithm (gnutls_x509_crt_t crt,
+ const gnutls_datum_t * signature,
+ gnutls_digest_algorithm_t * hash);
int gnutls_x509_privkey_sign_hash (gnutls_x509_privkey_t key,
const gnutls_datum_t * hash,
diff --git a/lib/opencdk/context.h b/lib/opencdk/context.h
index 101b06098c..0b4aee293d 100644
--- a/lib/opencdk/context.h
+++ b/lib/opencdk/context.h
@@ -27,20 +27,23 @@
#include "types.h"
-struct cdk_listkey_s {
+struct cdk_listkey_s
+{
unsigned init:1;
cdk_stream_t inp;
cdk_keydb_hd_t db;
int type;
- union {
+ union
+ {
char *patt;
- cdk_strlist_t fpatt;
+ cdk_strlist_t fpatt;
} u;
- cdk_strlist_t t;
+ cdk_strlist_t t;
};
-struct cdk_s2k_s {
+struct cdk_s2k_s
+{
int mode;
byte hash_algo;
byte salt[8];
@@ -48,18 +51,22 @@ struct cdk_s2k_s {
};
-struct cdk_ctx_s {
+struct cdk_ctx_s
+{
int cipher_algo;
int digest_algo;
- struct {
+ struct
+ {
int algo;
int level;
} compress;
- struct {
+ struct
+ {
int mode;
int digest_algo;
} _s2k;
- struct {
+ struct
+ {
unsigned blockmode:1;
unsigned armor:1;
unsigned textmode:1;
@@ -68,61 +75,71 @@ struct cdk_ctx_s {
unsigned overwrite;
unsigned force_digest:1;
} opt;
- struct {
+ struct
+ {
cdk_verify_result_t verify;
} result;
- struct {
+ struct
+ {
cdk_pkt_seckey_t sk;
unsigned on:1;
} cache;
- struct {
+ struct
+ {
cdk_keydb_hd_t sec;
cdk_keydb_hd_t pub;
unsigned int close_db:1;
} db;
char *(*passphrase_cb) (void *opaque, const char *prompt);
- void * passphrase_cb_value;
+ void *passphrase_cb_value;
};
-struct cdk_prefitem_s {
+struct cdk_prefitem_s
+{
byte type;
byte value;
};
-struct cdk_desig_revoker_s {
- struct cdk_desig_revoker_s * next;
+struct cdk_desig_revoker_s
+{
+ struct cdk_desig_revoker_s *next;
byte r_class;
byte algid;
byte fpr[KEY_FPR_LEN];
};
-struct cdk_subpkt_s {
- struct cdk_subpkt_s * next;
+struct cdk_subpkt_s
+{
+ struct cdk_subpkt_s *next;
u32 size;
byte type;
- byte *d;
+ byte *d;
};
-struct cdk_keylist_s {
- struct cdk_keylist_s * next;
- union {
+struct cdk_keylist_s
+{
+ struct cdk_keylist_s *next;
+ union
+ {
cdk_pkt_pubkey_t pk;
cdk_pkt_seckey_t sk;
} key;
int version;
- int type;
+ int type;
};
-struct cdk_dek_s {
+struct cdk_dek_s
+{
int algo;
int keylen;
int use_mdc;
- byte key[32]; /* 256-bit */
+ byte key[32]; /* 256-bit */
};
-struct cdk_strlist_s {
- struct cdk_strlist_s * next;
- char *d;
+struct cdk_strlist_s
+{
+ struct cdk_strlist_s *next;
+ char *d;
};
#endif /* CDK_CONTEXT_H */
diff --git a/lib/opencdk/filters.h b/lib/opencdk/filters.h
index d09a067695..d948d1436f 100644
--- a/lib/opencdk/filters.h
+++ b/lib/opencdk/filters.h
@@ -24,18 +24,21 @@
#ifndef CDK_FILTERS_H
#define CDK_FILTERS_H
-enum {
- STREAMCTL_READ = 0,
- STREAMCTL_WRITE = 1,
- STREAMCTL_FREE = 2
+enum
+{
+ STREAMCTL_READ = 0,
+ STREAMCTL_WRITE = 1,
+ STREAMCTL_FREE = 2
};
-typedef struct {
+typedef struct
+{
cipher_hd_st hd;
digest_hd_st mdc;
int mdc_method;
u32 datalen;
- struct {
+ struct
+ {
size_t on;
off_t size;
off_t nleft;
@@ -43,62 +46,65 @@ typedef struct {
cdk_stream_t s;
} cipher_filter_t;
-typedef struct {
+typedef struct
+{
int digest_algo;
digest_hd_st md;
int md_initialized;
} md_filter_t;
-typedef struct {
- const char *le; /* line endings */
+typedef struct
+{
+ const char *le; /* line endings */
const char *hdrlines;
u32 crc;
int crc_okay;
int idx, idx2;
} armor_filter_t;
-typedef struct {
+typedef struct
+{
cdk_lit_format_t mode;
- char *orig_filename; /* This original name of the input file. */
+ char *orig_filename; /* This original name of the input file. */
char *filename;
digest_hd_st md;
int md_initialized;
- struct {
+ struct
+ {
size_t on;
off_t size;
} blkmode;
} literal_filter_t;
-typedef struct {
+typedef struct
+{
size_t inbufsize;
byte inbuf[8192];
size_t outbufsize;
byte outbuf[8192];
- int algo; /* compress algo */
+ int algo; /* compress algo */
int level;
} compress_filter_t;
-typedef struct {
- const char * lf;
+typedef struct
+{
+ const char *lf;
} text_filter_t;
/*-- armor.c -*/
-int _cdk_filter_armor( void * opaque, int ctl, FILE * in, FILE * out );
+int _cdk_filter_armor (void *opaque, int ctl, FILE * in, FILE * out);
/*-- cipher.c --*/
-cdk_error_t _cdk_filter_hash( void * opaque, int ctl, FILE * in, FILE * out );
-cdk_error_t _cdk_filter_cipher( void * opaque, int ctl,
- FILE * in, FILE * out );
+cdk_error_t _cdk_filter_hash (void *opaque, int ctl, FILE * in, FILE * out);
+cdk_error_t _cdk_filter_cipher (void *opaque, int ctl, FILE * in, FILE * out);
/*-- literal.c --*/
-int _cdk_filter_literal( void * opaque, int ctl, FILE * in, FILE * out );
-int _cdk_filter_text( void * opaque, int ctl, FILE * in, FILE * out );
+int _cdk_filter_literal (void *opaque, int ctl, FILE * in, FILE * out);
+int _cdk_filter_text (void *opaque, int ctl, FILE * in, FILE * out);
/*-- compress.c --*/
-cdk_error_t _cdk_filter_compress( void * opaque, int ctl,
- FILE * in, FILE * out );
+cdk_error_t _cdk_filter_compress (void *opaque, int ctl,
+ FILE * in, FILE * out);
#endif /* CDK_FILTERS_H */
-
-
diff --git a/lib/opencdk/keydb.h b/lib/opencdk/keydb.h
index da043880dd..fb2bf4903f 100644
--- a/lib/opencdk/keydb.h
+++ b/lib/opencdk/keydb.h
@@ -1,5 +1,5 @@
/* Internal key index structure. */
-struct key_idx_s
+struct key_idx_s
{
off_t offset;
u32 keyid[2];
@@ -8,7 +8,7 @@ struct key_idx_s
typedef struct key_idx_s *key_idx_t;
/* Internal key cache to associate a key with an file offset. */
-struct key_table_s
+struct key_table_s
{
struct key_table_s *next;
off_t offset;
@@ -17,35 +17,36 @@ typedef struct key_table_s *key_table_t;
typedef struct cdk_keydb_search_s
{
- off_t off; /* last file offset */
- union
- {
- char *pattern; /* A search is performed by pattern. */
- u32 keyid[2]; /* A search by keyid. */
- byte fpr[KEY_FPR_LEN]; /* A search by fingerprint. */
- } u;
+ off_t off; /* last file offset */
+ union
+ {
+ char *pattern; /* A search is performed by pattern. */
+ u32 keyid[2]; /* A search by keyid. */
+ byte fpr[KEY_FPR_LEN]; /* A search by fingerprint. */
+ } u;
int type;
struct key_table_s *cache;
size_t ncache;
- unsigned int no_cache:1; /* disable the index cache. */
+ unsigned int no_cache:1; /* disable the index cache. */
cdk_stream_t idx;
- char *idx_name; /* name of the index file or NULL. */
+ char *idx_name; /* name of the index file or NULL. */
} cdk_keydb_search_s;
/* Internal key database handle. */
-struct cdk_keydb_hd_s
+struct cdk_keydb_hd_s
{
- int type; /* type of the key db handle. */
- int fp_ref; /* 1=means it is a reference and shall not be closed. */
+ int type; /* type of the key db handle. */
+ int fp_ref; /* 1=means it is a reference and shall not be closed. */
cdk_stream_t fp;
- char *name; /* name of the underlying file or NULL. */
- unsigned int secret:1; /* contain secret keys. */
- unsigned int isopen:1; /* the underlying stream is opened. */
-
+ char *name; /* name of the underlying file or NULL. */
+ unsigned int secret:1; /* contain secret keys. */
+ unsigned int isopen:1; /* the underlying stream is opened. */
+
/* structure to store some stats about the keydb. */
- struct {
- size_t new_keys; /* amount of new keys that were imported. */
+ struct
+ {
+ size_t new_keys; /* amount of new keys that were imported. */
} stats;
};
diff --git a/lib/opencdk/main.h b/lib/opencdk/main.h
index 0a76dc6dbb..fe324fedc8 100644
--- a/lib/opencdk/main.h
+++ b/lib/opencdk/main.h
@@ -40,14 +40,14 @@
#define map_gnutls_error _cdk_map_gnutls_error
-cdk_error_t map_gnutls_error(int err);
+cdk_error_t map_gnutls_error (int err);
/* The general size of a buffer for the variou modules. */
#define BUFSIZE 8192
/* This is the default block size for the partial length packet mode. */
#define DEF_BLOCKSIZE 8192
-#define DEF_BLOCKBITS 13 /* 2^13 = 8192 */
+#define DEF_BLOCKBITS 13 /* 2^13 = 8192 */
/* For now SHA-1 is used to create fingerprint for keys.
But if this will ever change, it is a good idea to
@@ -89,16 +89,16 @@ cdk_error_t map_gnutls_error(int err);
} } while (0)
/*-- armor.c --*/
-const char * _cdk_armor_get_lineend (void);
-
+const char *_cdk_armor_get_lineend (void);
+
/*-- main.c --*/
-char * _cdk_passphrase_get (cdk_ctx_t hd, const char *prompt);
+char *_cdk_passphrase_get (cdk_ctx_t hd, const char *prompt);
/*-- misc.c --*/
-int _cdk_check_args( int overwrite, const char * in, const char * out );
+int _cdk_check_args (int overwrite, const char *in, const char *out);
u32 _cdk_buftou32 (const byte * buf);
void _cdk_u32tobuf (u32 u, byte * buf);
-const char *_cdk_memistr (const char * buf, size_t buflen, const char * sub);
+const char *_cdk_memistr (const char *buf, size_t buflen, const char *sub);
FILE *_cdk_tmpfile (void);
/* Helper to provide case insentensive strstr version. */
@@ -109,74 +109,75 @@ FILE *_cdk_tmpfile (void);
cdk_error_t _cdk_proc_packets (cdk_ctx_t hd, cdk_stream_t inp,
cdk_stream_t data,
const char *output, cdk_stream_t outstream,
- digest_hd_st*md);
+ digest_hd_st * md);
cdk_error_t _cdk_pkt_write2 (cdk_stream_t out, int pkttype, void *pktctx);
/*-- pubkey.c --*/
u32 _cdk_pkt_get_keyid (cdk_packet_t pkt, u32 * keyid);
-cdk_error_t _cdk_pkt_get_fingerprint (cdk_packet_t pkt, byte *fpr);
+cdk_error_t _cdk_pkt_get_fingerprint (cdk_packet_t pkt, byte * fpr);
int _cdk_pk_algo_usage (int algo);
int _cdk_pk_test_algo (int algo, unsigned int usage);
int _cdk_sk_get_csum (cdk_pkt_seckey_t sk);
/*-- new-packet.c --*/
-byte * _cdk_subpkt_get_array (cdk_subpkt_t s, int count, size_t * r_nbytes);
+byte *_cdk_subpkt_get_array (cdk_subpkt_t s, int count, size_t * r_nbytes);
cdk_error_t _cdk_subpkt_copy (cdk_subpkt_t * r_dst, cdk_subpkt_t src);
void _cdk_pkt_detach_free (cdk_packet_t pkt, int *r_pkttype, void **ctx);
/*-- sig-check.c --*/
cdk_error_t _cdk_sig_check (cdk_pkt_pubkey_t pk, cdk_pkt_signature_t sig,
- digest_hd_st*digest, int * r_expired);
-cdk_error_t _cdk_hash_sig_data (cdk_pkt_signature_t sig, digest_hd_st*hd);
-cdk_error_t _cdk_hash_userid (cdk_pkt_userid_t uid, int sig_version, digest_hd_st*md);
-cdk_error_t _cdk_hash_pubkey (cdk_pkt_pubkey_t pk, digest_hd_st *md,
+ digest_hd_st * digest, int *r_expired);
+cdk_error_t _cdk_hash_sig_data (cdk_pkt_signature_t sig, digest_hd_st * hd);
+cdk_error_t _cdk_hash_userid (cdk_pkt_userid_t uid, int sig_version,
+ digest_hd_st * md);
+cdk_error_t _cdk_hash_pubkey (cdk_pkt_pubkey_t pk, digest_hd_st * md,
int use_fpr);
-cdk_error_t _cdk_pk_check_sig (cdk_keydb_hd_t hd,
- cdk_kbnode_t knode,
- cdk_kbnode_t snode, int *is_selfsig, char** ret_uid);
+cdk_error_t _cdk_pk_check_sig (cdk_keydb_hd_t hd, cdk_kbnode_t knode,
+ cdk_kbnode_t snode, int *is_selfsig,
+ char **ret_uid);
/*-- kbnode.c --*/
void _cdk_kbnode_add (cdk_kbnode_t root, cdk_kbnode_t node);
void _cdk_kbnode_clone (cdk_kbnode_t node);
/*-- sesskey.c --*/
-cdk_error_t _cdk_digest_encode_pkcs1 (byte **r_md, size_t *r_mdlen,
+cdk_error_t _cdk_digest_encode_pkcs1 (byte ** r_md, size_t * r_mdlen,
int pk_algo,
const byte * md,
int digest_algo, unsigned nbits);
cdk_error_t _cdk_sk_unprotect_auto (cdk_ctx_t hd, cdk_pkt_seckey_t sk);
/*-- keydb.c --*/
-int _cdk_keydb_is_secret (cdk_keydb_hd_t db);
-cdk_error_t _cdk_keydb_get_pk_byusage (cdk_keydb_hd_t hd, const char * name,
- cdk_pkt_pubkey_t * ret_pk, int usage);
-cdk_error_t _cdk_keydb_get_sk_byusage (cdk_keydb_hd_t hd, const char * name,
- cdk_pkt_seckey_t * ret_sk, int usage);
-cdk_error_t _cdk_keydb_check_userid (cdk_keydb_hd_t hd, u32 * keyid,
- const char * id);
+int _cdk_keydb_is_secret (cdk_keydb_hd_t db);
+cdk_error_t _cdk_keydb_get_pk_byusage (cdk_keydb_hd_t hd, const char *name,
+ cdk_pkt_pubkey_t * ret_pk, int usage);
+cdk_error_t _cdk_keydb_get_sk_byusage (cdk_keydb_hd_t hd, const char *name,
+ cdk_pkt_seckey_t * ret_sk, int usage);
+cdk_error_t _cdk_keydb_check_userid (cdk_keydb_hd_t hd, u32 * keyid,
+ const char *id);
/*-- sign.c --*/
int _cdk_sig_hash_for (cdk_pkt_pubkey_t pk);
-void _cdk_trim_string (char * s, int canon);
+void _cdk_trim_string (char *s, int canon);
cdk_error_t _cdk_sig_create (cdk_pkt_pubkey_t pk, cdk_pkt_signature_t sig);
cdk_error_t _cdk_sig_complete (cdk_pkt_signature_t sig, cdk_pkt_seckey_t sk,
- digest_hd_st *hd);
+ digest_hd_st * hd);
/*-- stream.c --*/
-void _cdk_stream_set_compress_algo (cdk_stream_t s, int algo);
-cdk_error_t _cdk_stream_open_mode (const char *file, const char *mode,
- cdk_stream_t *ret_s);
-void * _cdk_stream_get_opaque( cdk_stream_t s, int fid );
-const char * _cdk_stream_get_fname( cdk_stream_t s );
-FILE * _cdk_stream_get_fp( cdk_stream_t s );
-int _cdk_stream_gets( cdk_stream_t s, char * buf, size_t count );
-cdk_error_t _cdk_stream_append( const char * file, cdk_stream_t * ret_s );
-int _cdk_stream_get_errno( cdk_stream_t s );
-cdk_error_t _cdk_stream_set_blockmode( cdk_stream_t s, size_t nbytes );
-int _cdk_stream_get_blockmode( cdk_stream_t s );
-int _cdk_stream_puts( cdk_stream_t s, const char * buf );
-cdk_error_t _cdk_stream_fpopen (FILE * fp, unsigned write_mode,
- cdk_stream_t *ret_out);
+void _cdk_stream_set_compress_algo (cdk_stream_t s, int algo);
+cdk_error_t _cdk_stream_open_mode (const char *file, const char *mode,
+ cdk_stream_t * ret_s);
+void *_cdk_stream_get_opaque (cdk_stream_t s, int fid);
+const char *_cdk_stream_get_fname (cdk_stream_t s);
+FILE *_cdk_stream_get_fp (cdk_stream_t s);
+int _cdk_stream_gets (cdk_stream_t s, char *buf, size_t count);
+cdk_error_t _cdk_stream_append (const char *file, cdk_stream_t * ret_s);
+int _cdk_stream_get_errno (cdk_stream_t s);
+cdk_error_t _cdk_stream_set_blockmode (cdk_stream_t s, size_t nbytes);
+int _cdk_stream_get_blockmode (cdk_stream_t s);
+int _cdk_stream_puts (cdk_stream_t s, const char *buf);
+cdk_error_t _cdk_stream_fpopen (FILE * fp, unsigned write_mode,
+ cdk_stream_t * ret_out);
/*-- verify.c --*/
void _cdk_result_verify_free (cdk_verify_result_t res);
@@ -184,19 +185,19 @@ cdk_verify_result_t _cdk_result_verify_new (void);
/*-- read-packet.c --*/
-size_t _cdk_pkt_read_len (FILE * inp, size_t *ret_partial);
+size_t _cdk_pkt_read_len (FILE * inp, size_t * ret_partial);
/*-- write-packet.c --*/
-cdk_error_t _cdk_pkt_write_fp( FILE * out, cdk_packet_t pkt );
+cdk_error_t _cdk_pkt_write_fp (FILE * out, cdk_packet_t pkt);
/*-- seskey.c --*/
-cdk_error_t _cdk_s2k_copy (cdk_s2k_t *r_dst, cdk_s2k_t src);
+cdk_error_t _cdk_s2k_copy (cdk_s2k_t * r_dst, cdk_s2k_t src);
#define _cdk_pub_algo_to_pgp(algo) (algo)
#define _pgp_pub_algo_to_cdk(algo) (algo)
-int _gnutls_hash_algo_to_pgp(int algo);
-int _pgp_hash_algo_to_gnutls(int algo);
-int _gnutls_cipher_to_pgp(int cipher);
-int _pgp_cipher_to_gnutls(int cipher);
+int _gnutls_hash_algo_to_pgp (int algo);
+int _pgp_hash_algo_to_gnutls (int algo);
+int _gnutls_cipher_to_pgp (int cipher);
+int _pgp_cipher_to_gnutls (int cipher);
#endif /* CDK_MAIN_H */
diff --git a/lib/opencdk/opencdk.h b/lib/opencdk/opencdk.h
index 23b1471329..d7bd415b60 100644
--- a/lib/opencdk/opencdk.h
+++ b/lib/opencdk/opencdk.h
@@ -43,335 +43,336 @@
#define OPENCDK_VERSION_PATCH 6
#ifdef __cplusplus
-extern "C" {
+extern "C"
+{
#endif
/* General contexts */
/* 'Session' handle to support the various options and run-time
information. */
-struct cdk_ctx_s;
-typedef struct cdk_ctx_s *cdk_ctx_t;
+ struct cdk_ctx_s;
+ typedef struct cdk_ctx_s *cdk_ctx_t;
/* A generic context to store list of strings. */
-struct cdk_strlist_s;
-typedef struct cdk_strlist_s *cdk_strlist_t;
+ struct cdk_strlist_s;
+ typedef struct cdk_strlist_s *cdk_strlist_t;
/* Context used to list keys of a keyring. */
-struct cdk_listkey_s;
-typedef struct cdk_listkey_s *cdk_listkey_t;
+ struct cdk_listkey_s;
+ typedef struct cdk_listkey_s *cdk_listkey_t;
/* Opaque String to Key (S2K) handle. */
-struct cdk_s2k_s;
-typedef struct cdk_s2k_s *cdk_s2k_t;
+ struct cdk_s2k_s;
+ typedef struct cdk_s2k_s *cdk_s2k_t;
/* Abstract I/O object, a stream, which is used for most operations. */
-struct cdk_stream_s;
-typedef struct cdk_stream_s *cdk_stream_t;
+ struct cdk_stream_s;
+ typedef struct cdk_stream_s *cdk_stream_t;
/* Opaque handle for the user ID preferences. */
-struct cdk_prefitem_s;
-typedef struct cdk_prefitem_s *cdk_prefitem_t;
+ struct cdk_prefitem_s;
+ typedef struct cdk_prefitem_s *cdk_prefitem_t;
/* Node to store a single key node packet. */
-struct cdk_kbnode_s;
-typedef struct cdk_kbnode_s *cdk_kbnode_t;
+ struct cdk_kbnode_s;
+ typedef struct cdk_kbnode_s *cdk_kbnode_t;
/* Key database handle. */
-struct cdk_keydb_hd_s;
-typedef struct cdk_keydb_hd_s *cdk_keydb_hd_t;
+ struct cdk_keydb_hd_s;
+ typedef struct cdk_keydb_hd_s *cdk_keydb_hd_t;
-struct cdk_keydb_search_s;
-typedef struct cdk_keydb_search_s *cdk_keydb_search_t;
+ struct cdk_keydb_search_s;
+ typedef struct cdk_keydb_search_s *cdk_keydb_search_t;
/* Context to store a list of recipient keys. */
-struct cdk_keylist_s;
-typedef struct cdk_keylist_s *cdk_keylist_t;
+ struct cdk_keylist_s;
+ typedef struct cdk_keylist_s *cdk_keylist_t;
/* Context to encapsulate a single sub packet of a signature. */
-struct cdk_subpkt_s;
-typedef struct cdk_subpkt_s *cdk_subpkt_t;
+ struct cdk_subpkt_s;
+ typedef struct cdk_subpkt_s *cdk_subpkt_t;
/* Context used to generate key pairs. */
-struct cdk_keygen_ctx_s;
-typedef struct cdk_keygen_ctx_s *cdk_keygen_ctx_t;
+ struct cdk_keygen_ctx_s;
+ typedef struct cdk_keygen_ctx_s *cdk_keygen_ctx_t;
/* Handle for a single designated revoker. */
-struct cdk_desig_revoker_s;
-typedef struct cdk_desig_revoker_s *cdk_desig_revoker_t;
+ struct cdk_desig_revoker_s;
+ typedef struct cdk_desig_revoker_s *cdk_desig_revoker_t;
/* Alias for backward compatibility. */
-typedef bigint_t cdk_mpi_t;
+ typedef bigint_t cdk_mpi_t;
/* All valid error constants. */
-typedef enum
-{
- CDK_EOF = -1,
- CDK_Success = 0,
- CDK_General_Error = 1,
- CDK_File_Error = 2,
- CDK_Bad_Sig = 3,
- CDK_Inv_Packet = 4,
- CDK_Inv_Algo = 5,
- CDK_Not_Implemented = 6,
- CDK_Armor_Error = 8,
- CDK_Armor_CRC_Error = 9,
- CDK_MPI_Error = 10,
- CDK_Inv_Value = 11,
- CDK_Error_No_Key = 12,
- CDK_Chksum_Error = 13,
- CDK_Time_Conflict = 14,
- CDK_Zlib_Error = 15,
- CDK_Weak_Key = 16,
- CDK_Out_Of_Core = 17,
- CDK_Wrong_Seckey = 18,
- CDK_Bad_MDC = 19,
- CDK_Inv_Mode = 20,
- CDK_Error_No_Keyring = 21,
- CDK_Wrong_Format = 22,
- CDK_Inv_Packet_Ver = 23,
- CDK_Too_Short = 24,
- CDK_Unusable_Key = 25,
- CDK_No_Data = 26,
- CDK_No_Passphrase = 27,
- CDK_Network_Error = 28
-} cdk_error_t;
-
-
-enum cdk_control_flags
-{
- CDK_CTLF_SET = 0, /* Value to set an option */
- CDK_CTLF_GET = 1, /* Value to get an option */
- CDK_CTL_DIGEST = 10, /* Option to set the digest algorithm. */
- CDK_CTL_ARMOR = 12, /* Option to enable armor output. */
- CDK_CTL_COMPRESS = 13, /* Option to enable compression. */
- CDK_CTL_COMPAT = 14, /* Option to switch in compat mode. */
- CDK_CTL_OVERWRITE = 15, /* Option to enable file overwritting. */
- CDK_CTL_S2K = 16, /* Option to set S2K values. */
- CDK_CTL_FORCE_DIGEST = 19, /* Force the use of a digest algorithm. */
- CDK_CTL_BLOCKMODE_ON = 20 /* Enable partial body lengths */
-};
+ typedef enum
+ {
+ CDK_EOF = -1,
+ CDK_Success = 0,
+ CDK_General_Error = 1,
+ CDK_File_Error = 2,
+ CDK_Bad_Sig = 3,
+ CDK_Inv_Packet = 4,
+ CDK_Inv_Algo = 5,
+ CDK_Not_Implemented = 6,
+ CDK_Armor_Error = 8,
+ CDK_Armor_CRC_Error = 9,
+ CDK_MPI_Error = 10,
+ CDK_Inv_Value = 11,
+ CDK_Error_No_Key = 12,
+ CDK_Chksum_Error = 13,
+ CDK_Time_Conflict = 14,
+ CDK_Zlib_Error = 15,
+ CDK_Weak_Key = 16,
+ CDK_Out_Of_Core = 17,
+ CDK_Wrong_Seckey = 18,
+ CDK_Bad_MDC = 19,
+ CDK_Inv_Mode = 20,
+ CDK_Error_No_Keyring = 21,
+ CDK_Wrong_Format = 22,
+ CDK_Inv_Packet_Ver = 23,
+ CDK_Too_Short = 24,
+ CDK_Unusable_Key = 25,
+ CDK_No_Data = 26,
+ CDK_No_Passphrase = 27,
+ CDK_Network_Error = 28
+ } cdk_error_t;
+
+
+ enum cdk_control_flags
+ {
+ CDK_CTLF_SET = 0, /* Value to set an option */
+ CDK_CTLF_GET = 1, /* Value to get an option */
+ CDK_CTL_DIGEST = 10, /* Option to set the digest algorithm. */
+ CDK_CTL_ARMOR = 12, /* Option to enable armor output. */
+ CDK_CTL_COMPRESS = 13, /* Option to enable compression. */
+ CDK_CTL_COMPAT = 14, /* Option to switch in compat mode. */
+ CDK_CTL_OVERWRITE = 15, /* Option to enable file overwritting. */
+ CDK_CTL_S2K = 16, /* Option to set S2K values. */
+ CDK_CTL_FORCE_DIGEST = 19, /* Force the use of a digest algorithm. */
+ CDK_CTL_BLOCKMODE_ON = 20 /* Enable partial body lengths */
+ };
/* Specifies all valid log levels. */
-enum cdk_log_level_t
-{
- CDK_LOG_NONE = 0, /* No log message will be shown. */
- CDK_LOG_INFO = 1,
- CDK_LOG_DEBUG = 2,
- CDK_LOG_DEBUG_PKT = 3
-};
+ enum cdk_log_level_t
+ {
+ CDK_LOG_NONE = 0, /* No log message will be shown. */
+ CDK_LOG_INFO = 1,
+ CDK_LOG_DEBUG = 2,
+ CDK_LOG_DEBUG_PKT = 3
+ };
/* All valid compression algorithms in OpenPGP */
-enum cdk_compress_algo_t
-{
- CDK_COMPRESS_NONE = 0,
- CDK_COMPRESS_ZIP = 1,
- CDK_COMPRESS_ZLIB = 2,
- CDK_COMPRESS_BZIP2 = 3 /* Not supported in this version */
-};
+ enum cdk_compress_algo_t
+ {
+ CDK_COMPRESS_NONE = 0,
+ CDK_COMPRESS_ZIP = 1,
+ CDK_COMPRESS_ZLIB = 2,
+ CDK_COMPRESS_BZIP2 = 3 /* Not supported in this version */
+ };
/* All valid public key algorithms valid in OpenPGP */
-enum cdk_pubkey_algo_t
-{
- CDK_PK_UNKNOWN = 0,
- CDK_PK_RSA = 1,
- CDK_PK_RSA_E = 2, /* RSA-E and RSA-S are deprecated use RSA instead */
- CDK_PK_RSA_S = 3, /* and use the key flags in the self signatures. */
- CDK_PK_ELG_E = 16,
- CDK_PK_DSA = 17
-};
+ enum cdk_pubkey_algo_t
+ {
+ CDK_PK_UNKNOWN = 0,
+ CDK_PK_RSA = 1,
+ CDK_PK_RSA_E = 2, /* RSA-E and RSA-S are deprecated use RSA instead */
+ CDK_PK_RSA_S = 3, /* and use the key flags in the self signatures. */
+ CDK_PK_ELG_E = 16,
+ CDK_PK_DSA = 17
+ };
/* The valid 'String-To-Key' modes */
-enum cdk_s2k_type_t
-{
- CDK_S2K_SIMPLE = 0,
- CDK_S2K_SALTED = 1,
- CDK_S2K_ITERSALTED = 3,
- CDK_S2K_GNU_EXT = 101
- /* GNU extensions: refer to DETAILS from GnuPG:
- http://cvs.gnupg.org/cgi-bin/viewcvs.cgi/trunk/doc/DETAILS?root=GnuPG
- */
-};
+ enum cdk_s2k_type_t
+ {
+ CDK_S2K_SIMPLE = 0,
+ CDK_S2K_SALTED = 1,
+ CDK_S2K_ITERSALTED = 3,
+ CDK_S2K_GNU_EXT = 101
+ /* GNU extensions: refer to DETAILS from GnuPG:
+ http://cvs.gnupg.org/cgi-bin/viewcvs.cgi/trunk/doc/DETAILS?root=GnuPG
+ */
+ };
/* The different kind of user ID preferences. */
-enum cdk_pref_type_t
-{
- CDK_PREFTYPE_NONE = 0,
- CDK_PREFTYPE_SYM = 1, /* Symmetric ciphers */
- CDK_PREFTYPE_HASH = 2, /* Message digests */
- CDK_PREFTYPE_ZIP = 3 /* Compression algorithms */
-};
+ enum cdk_pref_type_t
+ {
+ CDK_PREFTYPE_NONE = 0,
+ CDK_PREFTYPE_SYM = 1, /* Symmetric ciphers */
+ CDK_PREFTYPE_HASH = 2, /* Message digests */
+ CDK_PREFTYPE_ZIP = 3 /* Compression algorithms */
+ };
/* All valid sub packet types. */
-enum cdk_sig_subpacket_t
-{
- CDK_SIGSUBPKT_NONE = 0,
- CDK_SIGSUBPKT_SIG_CREATED = 2,
- CDK_SIGSUBPKT_SIG_EXPIRE = 3,
- CDK_SIGSUBPKT_EXPORTABLE = 4,
- CDK_SIGSUBPKT_TRUST = 5,
- CDK_SIGSUBPKT_REGEXP = 6,
- CDK_SIGSUBPKT_REVOCABLE = 7,
- CDK_SIGSUBPKT_KEY_EXPIRE = 9,
- CDK_SIGSUBPKT_PREFS_SYM = 11,
- CDK_SIGSUBPKT_REV_KEY = 12,
- CDK_SIGSUBPKT_ISSUER = 16,
- CDK_SIGSUBPKT_NOTATION = 20,
- CDK_SIGSUBPKT_PREFS_HASH = 21,
- CDK_SIGSUBPKT_PREFS_ZIP = 22,
- CDK_SIGSUBPKT_KS_FLAGS = 23,
- CDK_SIGSUBPKT_PREF_KS = 24,
- CDK_SIGSUBPKT_PRIMARY_UID = 25,
- CDK_SIGSUBPKT_POLICY = 26,
- CDK_SIGSUBPKT_KEY_FLAGS = 27,
- CDK_SIGSUBPKT_SIGNERS_UID = 28,
- CDK_SIGSUBPKT_REVOC_REASON = 29,
- CDK_SIGSUBPKT_FEATURES = 30
-};
+ enum cdk_sig_subpacket_t
+ {
+ CDK_SIGSUBPKT_NONE = 0,
+ CDK_SIGSUBPKT_SIG_CREATED = 2,
+ CDK_SIGSUBPKT_SIG_EXPIRE = 3,
+ CDK_SIGSUBPKT_EXPORTABLE = 4,
+ CDK_SIGSUBPKT_TRUST = 5,
+ CDK_SIGSUBPKT_REGEXP = 6,
+ CDK_SIGSUBPKT_REVOCABLE = 7,
+ CDK_SIGSUBPKT_KEY_EXPIRE = 9,
+ CDK_SIGSUBPKT_PREFS_SYM = 11,
+ CDK_SIGSUBPKT_REV_KEY = 12,
+ CDK_SIGSUBPKT_ISSUER = 16,
+ CDK_SIGSUBPKT_NOTATION = 20,
+ CDK_SIGSUBPKT_PREFS_HASH = 21,
+ CDK_SIGSUBPKT_PREFS_ZIP = 22,
+ CDK_SIGSUBPKT_KS_FLAGS = 23,
+ CDK_SIGSUBPKT_PREF_KS = 24,
+ CDK_SIGSUBPKT_PRIMARY_UID = 25,
+ CDK_SIGSUBPKT_POLICY = 26,
+ CDK_SIGSUBPKT_KEY_FLAGS = 27,
+ CDK_SIGSUBPKT_SIGNERS_UID = 28,
+ CDK_SIGSUBPKT_REVOC_REASON = 29,
+ CDK_SIGSUBPKT_FEATURES = 30
+ };
/* All valid armor types. */
-enum cdk_armor_type_t
-{
- CDK_ARMOR_MESSAGE = 0,
- CDK_ARMOR_PUBKEY = 1,
- CDK_ARMOR_SECKEY = 2,
- CDK_ARMOR_SIGNATURE = 3,
- CDK_ARMOR_CLEARSIG = 4
-};
-
-enum cdk_keydb_flag_t
-{
- /* Valid database search modes */
- CDK_DBSEARCH_EXACT = 1, /* Exact string search */
- CDK_DBSEARCH_SUBSTR = 2, /* Sub string search */
- CDK_DBSEARCH_SHORT_KEYID = 3, /* 32-bit keyid search */
- CDK_DBSEARCH_KEYID = 4, /* 64-bit keyid search */
- CDK_DBSEARCH_FPR = 5, /* 160-bit fingerprint search */
- CDK_DBSEARCH_NEXT = 6, /* Enumerate all keys */
- CDK_DBSEARCH_AUTO = 7, /* Try to classify the string */
- /* Valid database types */
- CDK_DBTYPE_PK_KEYRING = 100, /* A file with one or more public keys */
- CDK_DBTYPE_SK_KEYRING = 101, /* A file with one or more secret keys */
- CDK_DBTYPE_DATA = 102, /* A buffer with at least one public key */
- CDK_DBTYPE_STREAM = 103 /* A stream is used to read keys from */
-};
+ enum cdk_armor_type_t
+ {
+ CDK_ARMOR_MESSAGE = 0,
+ CDK_ARMOR_PUBKEY = 1,
+ CDK_ARMOR_SECKEY = 2,
+ CDK_ARMOR_SIGNATURE = 3,
+ CDK_ARMOR_CLEARSIG = 4
+ };
+
+ enum cdk_keydb_flag_t
+ {
+ /* Valid database search modes */
+ CDK_DBSEARCH_EXACT = 1, /* Exact string search */
+ CDK_DBSEARCH_SUBSTR = 2, /* Sub string search */
+ CDK_DBSEARCH_SHORT_KEYID = 3, /* 32-bit keyid search */
+ CDK_DBSEARCH_KEYID = 4, /* 64-bit keyid search */
+ CDK_DBSEARCH_FPR = 5, /* 160-bit fingerprint search */
+ CDK_DBSEARCH_NEXT = 6, /* Enumerate all keys */
+ CDK_DBSEARCH_AUTO = 7, /* Try to classify the string */
+ /* Valid database types */
+ CDK_DBTYPE_PK_KEYRING = 100, /* A file with one or more public keys */
+ CDK_DBTYPE_SK_KEYRING = 101, /* A file with one or more secret keys */
+ CDK_DBTYPE_DATA = 102, /* A buffer with at least one public key */
+ CDK_DBTYPE_STREAM = 103 /* A stream is used to read keys from */
+ };
/* All valid modes for cdk_data_transform() */
-enum cdk_crypto_mode_t
-{
- CDK_CRYPTYPE_NONE = 0,
- CDK_CRYPTYPE_ENCRYPT = 1,
- CDK_CRYPTYPE_DECRYPT = 2,
- CDK_CRYPTYPE_SIGN = 3,
- CDK_CRYPTYPE_VERIFY = 4,
- CDK_CRYPTYPE_EXPORT = 5,
- CDK_CRYPTYPE_IMPORT = 6
-};
+ enum cdk_crypto_mode_t
+ {
+ CDK_CRYPTYPE_NONE = 0,
+ CDK_CRYPTYPE_ENCRYPT = 1,
+ CDK_CRYPTYPE_DECRYPT = 2,
+ CDK_CRYPTYPE_SIGN = 3,
+ CDK_CRYPTYPE_VERIFY = 4,
+ CDK_CRYPTYPE_EXPORT = 5,
+ CDK_CRYPTYPE_IMPORT = 6
+ };
#define CDK_KEY_USG_ENCR (CDK_KEY_USG_COMM_ENCR | CDK_KEY_USG_STORAGE_ENCR)
#define CDK_KEY_USG_SIGN (CDK_KEY_USG_DATA_SIGN | CDK_KEY_USG_CERT_SIGN)
/* A list of valid public key usages. */
-enum cdk_key_usage_t
-{
- CDK_KEY_USG_CERT_SIGN = 1,
- CDK_KEY_USG_DATA_SIGN = 2,
- CDK_KEY_USG_COMM_ENCR = 4,
- CDK_KEY_USG_STORAGE_ENCR = 8,
- CDK_KEY_USG_SPLIT_KEY = 16,
- CDK_KEY_USG_AUTH = 32,
- CDK_KEY_USG_SHARED_KEY = 128
-};
+ enum cdk_key_usage_t
+ {
+ CDK_KEY_USG_CERT_SIGN = 1,
+ CDK_KEY_USG_DATA_SIGN = 2,
+ CDK_KEY_USG_COMM_ENCR = 4,
+ CDK_KEY_USG_STORAGE_ENCR = 8,
+ CDK_KEY_USG_SPLIT_KEY = 16,
+ CDK_KEY_USG_AUTH = 32,
+ CDK_KEY_USG_SHARED_KEY = 128
+ };
/* Valid flags for keys. */
-enum cdk_key_flag_t
-{
- CDK_KEY_VALID = 0,
- CDK_KEY_INVALID = 1, /* Missing or wrong self signature */
- CDK_KEY_EXPIRED = 2, /* Key is expired. */
- CDK_KEY_REVOKED = 4, /* Key has been revoked. */
- CDK_KEY_NOSIGNER = 8
-};
+ enum cdk_key_flag_t
+ {
+ CDK_KEY_VALID = 0,
+ CDK_KEY_INVALID = 1, /* Missing or wrong self signature */
+ CDK_KEY_EXPIRED = 2, /* Key is expired. */
+ CDK_KEY_REVOKED = 4, /* Key has been revoked. */
+ CDK_KEY_NOSIGNER = 8
+ };
/* Trust values and flags for keys and user IDs */
-enum cdk_trust_flag_t
-{
- CDK_TRUST_UNKNOWN = 0,
- CDK_TRUST_EXPIRED = 1,
- CDK_TRUST_UNDEFINED = 2,
- CDK_TRUST_NEVER = 3,
- CDK_TRUST_MARGINAL = 4,
- CDK_TRUST_FULLY = 5,
- CDK_TRUST_ULTIMATE = 6,
- /* trust flags */
- CDK_TFLAG_REVOKED = 32,
- CDK_TFLAG_SUB_REVOKED = 64,
- CDK_TFLAG_DISABLED = 128
-};
+ enum cdk_trust_flag_t
+ {
+ CDK_TRUST_UNKNOWN = 0,
+ CDK_TRUST_EXPIRED = 1,
+ CDK_TRUST_UNDEFINED = 2,
+ CDK_TRUST_NEVER = 3,
+ CDK_TRUST_MARGINAL = 4,
+ CDK_TRUST_FULLY = 5,
+ CDK_TRUST_ULTIMATE = 6,
+ /* trust flags */
+ CDK_TFLAG_REVOKED = 32,
+ CDK_TFLAG_SUB_REVOKED = 64,
+ CDK_TFLAG_DISABLED = 128
+ };
/* Signature states and the signature modes. */
-enum cdk_signature_stat_t
-{
- /* Signature status */
- CDK_SIGSTAT_NONE = 0,
- CDK_SIGSTAT_GOOD = 1,
- CDK_SIGSTAT_BAD = 2,
- CDK_SIGSTAT_NOKEY = 3,
- CDK_SIGSTAT_VALID = 4, /* True if made with a valid key. */
- /* FIXME: We need indicators for revoked/expires signatures. */
+ enum cdk_signature_stat_t
+ {
+ /* Signature status */
+ CDK_SIGSTAT_NONE = 0,
+ CDK_SIGSTAT_GOOD = 1,
+ CDK_SIGSTAT_BAD = 2,
+ CDK_SIGSTAT_NOKEY = 3,
+ CDK_SIGSTAT_VALID = 4, /* True if made with a valid key. */
+ /* FIXME: We need indicators for revoked/expires signatures. */
- /* Signature modes */
- CDK_SIGMODE_NORMAL = 100,
- CDK_SIGMODE_DETACHED = 101,
- CDK_SIGMODE_CLEAR = 102
-};
+ /* Signature modes */
+ CDK_SIGMODE_NORMAL = 100,
+ CDK_SIGMODE_DETACHED = 101,
+ CDK_SIGMODE_CLEAR = 102
+ };
/* Key flags. */
-typedef enum
-{
- CDK_FLAG_KEY_REVOKED = 256,
- CDK_FLAG_KEY_EXPIRED = 512,
- CDK_FLAG_SIG_EXPIRED = 1024
-} cdk_key_flags_t;
+ typedef enum
+ {
+ CDK_FLAG_KEY_REVOKED = 256,
+ CDK_FLAG_KEY_EXPIRED = 512,
+ CDK_FLAG_SIG_EXPIRED = 1024
+ } cdk_key_flags_t;
/* Possible format for the literal data. */
-typedef enum
-{
- CDK_LITFMT_BINARY = 0,
- CDK_LITFMT_TEXT = 1,
- CDK_LITFMT_UNICODE = 2
-} cdk_lit_format_t;
+ typedef enum
+ {
+ CDK_LITFMT_BINARY = 0,
+ CDK_LITFMT_TEXT = 1,
+ CDK_LITFMT_UNICODE = 2
+ } cdk_lit_format_t;
/* Valid OpenPGP packet types and their IDs */
-typedef enum
-{
- CDK_PKT_RESERVED = 0,
- CDK_PKT_PUBKEY_ENC = 1,
- CDK_PKT_SIGNATURE = 2,
- CDK_PKT_ONEPASS_SIG = 4,
- CDK_PKT_SECRET_KEY = 5,
- CDK_PKT_PUBLIC_KEY = 6,
- CDK_PKT_SECRET_SUBKEY = 7,
- CDK_PKT_COMPRESSED = 8,
- CDK_PKT_MARKER = 10,
- CDK_PKT_LITERAL = 11,
- CDK_PKT_RING_TRUST = 12,
- CDK_PKT_USER_ID = 13,
- CDK_PKT_PUBLIC_SUBKEY = 14,
- CDK_PKT_OLD_COMMENT = 16,
- CDK_PKT_ATTRIBUTE = 17,
- CDK_PKT_MDC = 19
-} cdk_packet_type_t;
+ typedef enum
+ {
+ CDK_PKT_RESERVED = 0,
+ CDK_PKT_PUBKEY_ENC = 1,
+ CDK_PKT_SIGNATURE = 2,
+ CDK_PKT_ONEPASS_SIG = 4,
+ CDK_PKT_SECRET_KEY = 5,
+ CDK_PKT_PUBLIC_KEY = 6,
+ CDK_PKT_SECRET_SUBKEY = 7,
+ CDK_PKT_COMPRESSED = 8,
+ CDK_PKT_MARKER = 10,
+ CDK_PKT_LITERAL = 11,
+ CDK_PKT_RING_TRUST = 12,
+ CDK_PKT_USER_ID = 13,
+ CDK_PKT_PUBLIC_SUBKEY = 14,
+ CDK_PKT_OLD_COMMENT = 16,
+ CDK_PKT_ATTRIBUTE = 17,
+ CDK_PKT_MDC = 19
+ } cdk_packet_type_t;
/* Define the maximal number of multiprecion integers for
a public key. */
@@ -388,218 +389,218 @@ typedef enum
|| ((pkttype)==CDK_PKT_ENCRYPTED))
-struct cdk_pkt_signature_s
-{
- unsigned char version;
- unsigned char sig_class;
- unsigned int timestamp;
- unsigned int expiredate;
- unsigned int keyid[2];
- unsigned char pubkey_algo;
- unsigned char digest_algo;
- unsigned char digest_start[2];
- unsigned short hashed_size;
- cdk_subpkt_t hashed;
- unsigned short unhashed_size;
- cdk_subpkt_t unhashed;
- bigint_t mpi[MAX_CDK_DATA_PARTS];
- cdk_desig_revoker_t revkeys;
- struct
+ struct cdk_pkt_signature_s
{
- unsigned exportable:1;
- unsigned revocable:1;
- unsigned policy_url:1;
- unsigned notation:1;
- unsigned expired:1;
- unsigned checked:1;
- unsigned valid:1;
- unsigned missing_key:1;
- } flags;
- unsigned int key[2]; /* only valid for key signatures */
-};
-typedef struct cdk_pkt_signature_s *cdk_pkt_signature_t;
-
-
-struct cdk_pkt_userid_s
-{
- unsigned int len;
- unsigned is_primary:1;
- unsigned is_revoked:1;
- unsigned mdc_feature:1;
- cdk_prefitem_t prefs;
- size_t prefs_size;
- unsigned char *attrib_img; /* Tag 17 if not null */
- size_t attrib_len;
- cdk_pkt_signature_t selfsig;
- char *name;
-};
-typedef struct cdk_pkt_userid_s *cdk_pkt_userid_t;
-
-
-struct cdk_pkt_pubkey_s
-{
- unsigned char version;
- unsigned char pubkey_algo;
- unsigned char fpr[20];
- unsigned int keyid[2];
- unsigned int main_keyid[2];
- unsigned int timestamp;
- unsigned int expiredate;
- bigint_t mpi[MAX_CDK_PK_PARTS];
- unsigned is_revoked:1;
- unsigned is_invalid:1;
- unsigned has_expired:1;
- int pubkey_usage;
- cdk_pkt_userid_t uid;
- cdk_prefitem_t prefs;
- size_t prefs_size;
- cdk_desig_revoker_t revkeys;
-};
-typedef struct cdk_pkt_pubkey_s *cdk_pkt_pubkey_t;
+ unsigned char version;
+ unsigned char sig_class;
+ unsigned int timestamp;
+ unsigned int expiredate;
+ unsigned int keyid[2];
+ unsigned char pubkey_algo;
+ unsigned char digest_algo;
+ unsigned char digest_start[2];
+ unsigned short hashed_size;
+ cdk_subpkt_t hashed;
+ unsigned short unhashed_size;
+ cdk_subpkt_t unhashed;
+ bigint_t mpi[MAX_CDK_DATA_PARTS];
+ cdk_desig_revoker_t revkeys;
+ struct
+ {
+ unsigned exportable:1;
+ unsigned revocable:1;
+ unsigned policy_url:1;
+ unsigned notation:1;
+ unsigned expired:1;
+ unsigned checked:1;
+ unsigned valid:1;
+ unsigned missing_key:1;
+ } flags;
+ unsigned int key[2]; /* only valid for key signatures */
+ };
+ typedef struct cdk_pkt_signature_s *cdk_pkt_signature_t;
+
+
+ struct cdk_pkt_userid_s
+ {
+ unsigned int len;
+ unsigned is_primary:1;
+ unsigned is_revoked:1;
+ unsigned mdc_feature:1;
+ cdk_prefitem_t prefs;
+ size_t prefs_size;
+ unsigned char *attrib_img; /* Tag 17 if not null */
+ size_t attrib_len;
+ cdk_pkt_signature_t selfsig;
+ char *name;
+ };
+ typedef struct cdk_pkt_userid_s *cdk_pkt_userid_t;
+
+
+ struct cdk_pkt_pubkey_s
+ {
+ unsigned char version;
+ unsigned char pubkey_algo;
+ unsigned char fpr[20];
+ unsigned int keyid[2];
+ unsigned int main_keyid[2];
+ unsigned int timestamp;
+ unsigned int expiredate;
+ bigint_t mpi[MAX_CDK_PK_PARTS];
+ unsigned is_revoked:1;
+ unsigned is_invalid:1;
+ unsigned has_expired:1;
+ int pubkey_usage;
+ cdk_pkt_userid_t uid;
+ cdk_prefitem_t prefs;
+ size_t prefs_size;
+ cdk_desig_revoker_t revkeys;
+ };
+ typedef struct cdk_pkt_pubkey_s *cdk_pkt_pubkey_t;
/* Alias to define a generic public key context. */
-typedef cdk_pkt_pubkey_t cdk_pubkey_t;
+ typedef cdk_pkt_pubkey_t cdk_pubkey_t;
-struct cdk_pkt_seckey_s
-{
- cdk_pkt_pubkey_t pk;
- unsigned int expiredate;
- int version;
- int pubkey_algo;
- unsigned int keyid[2];
- unsigned int main_keyid[2];
- unsigned char s2k_usage;
- struct
+ struct cdk_pkt_seckey_s
{
- unsigned char algo;
- unsigned char sha1chk; /* SHA1 is used instead of a 16 bit checksum */
- cdk_s2k_t s2k;
- unsigned char iv[16];
- unsigned char ivlen;
- } protect;
- unsigned short csum;
- bigint_t mpi[MAX_CDK_PK_PARTS];
- unsigned char *encdata;
- size_t enclen;
- unsigned char is_protected;
- unsigned is_primary:1;
- unsigned has_expired:1;
- unsigned is_revoked:1;
-};
-typedef struct cdk_pkt_seckey_s *cdk_pkt_seckey_t;
+ cdk_pkt_pubkey_t pk;
+ unsigned int expiredate;
+ int version;
+ int pubkey_algo;
+ unsigned int keyid[2];
+ unsigned int main_keyid[2];
+ unsigned char s2k_usage;
+ struct
+ {
+ unsigned char algo;
+ unsigned char sha1chk; /* SHA1 is used instead of a 16 bit checksum */
+ cdk_s2k_t s2k;
+ unsigned char iv[16];
+ unsigned char ivlen;
+ } protect;
+ unsigned short csum;
+ bigint_t mpi[MAX_CDK_PK_PARTS];
+ unsigned char *encdata;
+ size_t enclen;
+ unsigned char is_protected;
+ unsigned is_primary:1;
+ unsigned has_expired:1;
+ unsigned is_revoked:1;
+ };
+ typedef struct cdk_pkt_seckey_s *cdk_pkt_seckey_t;
/* Alias to define a generic secret key context. */
-typedef cdk_pkt_seckey_t cdk_seckey_t;
+ typedef cdk_pkt_seckey_t cdk_seckey_t;
-struct cdk_pkt_onepass_sig_s
-{
- unsigned char version;
- unsigned int keyid[2];
- unsigned char sig_class;
- unsigned char digest_algo;
- unsigned char pubkey_algo;
- unsigned char last;
-};
-typedef struct cdk_pkt_onepass_sig_s *cdk_pkt_onepass_sig_t;
+ struct cdk_pkt_onepass_sig_s
+ {
+ unsigned char version;
+ unsigned int keyid[2];
+ unsigned char sig_class;
+ unsigned char digest_algo;
+ unsigned char pubkey_algo;
+ unsigned char last;
+ };
+ typedef struct cdk_pkt_onepass_sig_s *cdk_pkt_onepass_sig_t;
-struct cdk_pkt_pubkey_enc_s
-{
- unsigned char version;
- unsigned int keyid[2];
- int throw_keyid;
- unsigned char pubkey_algo;
- bigint_t mpi[MAX_CDK_DATA_PARTS];
-};
-typedef struct cdk_pkt_pubkey_enc_s *cdk_pkt_pubkey_enc_t;
-
-struct cdk_pkt_encrypted_s
-{
- unsigned int len;
- int extralen;
- unsigned char mdc_method;
- cdk_stream_t buf;
-};
-typedef struct cdk_pkt_encrypted_s *cdk_pkt_encrypted_t;
+ struct cdk_pkt_pubkey_enc_s
+ {
+ unsigned char version;
+ unsigned int keyid[2];
+ int throw_keyid;
+ unsigned char pubkey_algo;
+ bigint_t mpi[MAX_CDK_DATA_PARTS];
+ };
+ typedef struct cdk_pkt_pubkey_enc_s *cdk_pkt_pubkey_enc_t;
+
+ struct cdk_pkt_encrypted_s
+ {
+ unsigned int len;
+ int extralen;
+ unsigned char mdc_method;
+ cdk_stream_t buf;
+ };
+ typedef struct cdk_pkt_encrypted_s *cdk_pkt_encrypted_t;
-struct cdk_pkt_mdc_s
-{
- unsigned char hash[20];
-};
-typedef struct cdk_pkt_mdc_s *cdk_pkt_mdc_t;
+ struct cdk_pkt_mdc_s
+ {
+ unsigned char hash[20];
+ };
+ typedef struct cdk_pkt_mdc_s *cdk_pkt_mdc_t;
-struct cdk_pkt_literal_s
-{
- unsigned int len;
- cdk_stream_t buf;
- int mode;
- unsigned int timestamp;
- int namelen;
- char *name;
-};
-typedef struct cdk_pkt_literal_s *cdk_pkt_literal_t;
+ struct cdk_pkt_literal_s
+ {
+ unsigned int len;
+ cdk_stream_t buf;
+ int mode;
+ unsigned int timestamp;
+ int namelen;
+ char *name;
+ };
+ typedef struct cdk_pkt_literal_s *cdk_pkt_literal_t;
-struct cdk_pkt_compressed_s
-{
- unsigned int len;
- int algorithm;
- cdk_stream_t buf;
-};
-typedef struct cdk_pkt_compressed_s *cdk_pkt_compressed_t;
+ struct cdk_pkt_compressed_s
+ {
+ unsigned int len;
+ int algorithm;
+ cdk_stream_t buf;
+ };
+ typedef struct cdk_pkt_compressed_s *cdk_pkt_compressed_t;
/* Structure which represents a single OpenPGP packet. */
-struct cdk_packet_s
-{
- size_t pktlen; /* real packet length */
- size_t pktsize; /* length with all headers */
- int old_ctb; /* 1 if RFC1991 mode is used */
- cdk_packet_type_t pkttype;
- union
+ struct cdk_packet_s
{
- cdk_pkt_mdc_t mdc;
- cdk_pkt_userid_t user_id;
- cdk_pkt_pubkey_t public_key;
- cdk_pkt_seckey_t secret_key;
- cdk_pkt_signature_t signature;
- cdk_pkt_pubkey_enc_t pubkey_enc;
- cdk_pkt_compressed_t compressed;
- cdk_pkt_encrypted_t encrypted;
- cdk_pkt_literal_t literal;
- cdk_pkt_onepass_sig_t onepass_sig;
- } pkt;
-};
-typedef struct cdk_packet_s *cdk_packet_t;
+ size_t pktlen; /* real packet length */
+ size_t pktsize; /* length with all headers */
+ int old_ctb; /* 1 if RFC1991 mode is used */
+ cdk_packet_type_t pkttype;
+ union
+ {
+ cdk_pkt_mdc_t mdc;
+ cdk_pkt_userid_t user_id;
+ cdk_pkt_pubkey_t public_key;
+ cdk_pkt_seckey_t secret_key;
+ cdk_pkt_signature_t signature;
+ cdk_pkt_pubkey_enc_t pubkey_enc;
+ cdk_pkt_compressed_t compressed;
+ cdk_pkt_encrypted_t encrypted;
+ cdk_pkt_literal_t literal;
+ cdk_pkt_onepass_sig_t onepass_sig;
+ } pkt;
+ };
+ typedef struct cdk_packet_s *cdk_packet_t;
/* Session handle routines */
-cdk_error_t cdk_handle_new (cdk_ctx_t * r_ctx);
-void cdk_handle_free (cdk_ctx_t c);
+ cdk_error_t cdk_handle_new (cdk_ctx_t * r_ctx);
+ void cdk_handle_free (cdk_ctx_t c);
/* Set the key database handle for the given session handle.
The type of the key db handle (public or secret) decides
which session key db handle to use. */
-void cdk_handle_set_keydb (cdk_ctx_t hd, cdk_keydb_hd_t db);
+ void cdk_handle_set_keydb (cdk_ctx_t hd, cdk_keydb_hd_t db);
/* Convenient function to avoid to open a key db first.
The user can directly use the file name, the rest is
done internally. */
-cdk_error_t cdk_handle_set_keyring (cdk_ctx_t hd, int type,
- const char *kringname);
+ cdk_error_t cdk_handle_set_keyring (cdk_ctx_t hd, int type,
+ const char *kringname);
/* Return keydb handle stored in the session handle. */
-cdk_keydb_hd_t cdk_handle_get_keydb (cdk_ctx_t hd, int type);
-int cdk_handle_control (cdk_ctx_t hd, int action, int cmd, ...);
+ cdk_keydb_hd_t cdk_handle_get_keydb (cdk_ctx_t hd, int type);
+ int cdk_handle_control (cdk_ctx_t hd, int action, int cmd, ...);
/* Set a passphrase callback for the given session handle. */
-void cdk_handle_set_passphrase_cb (cdk_ctx_t hd,
- char *(*cb) (void *opa,
- const char *prompt),
- void *cb_value);
+ void cdk_handle_set_passphrase_cb (cdk_ctx_t hd,
+ char *(*cb) (void *opa,
+ const char *prompt),
+ void *cb_value);
/* shortcuts for some controls */
@@ -627,60 +628,62 @@ void cdk_handle_set_passphrase_cb (cdk_ctx_t hd,
/* This context holds all information of the verification process. */
-struct cdk_verify_result_s
-{
- int sig_ver; /* Version of the signature. */
- int sig_status; /* The status (GOOD, BAD) of the signature */
- int sig_flags; /* May contain expired or revoked flags */
- unsigned int keyid[2]; /* The issuer key ID */
- unsigned int created; /* Timestamp when the sig was created. */
- unsigned int expires;
- int pubkey_algo;
- int digest_algo;
- char *user_id; /* NULL or user ID which issued the signature. */
- char *policy_url; /* If set, the policy the sig was created under. */
- size_t sig_len; /* Size of the signature data inbits. */
- unsigned char *sig_data; /* Raw signature data. */
-};
-typedef struct cdk_verify_result_s *cdk_verify_result_t;
+ struct cdk_verify_result_s
+ {
+ int sig_ver; /* Version of the signature. */
+ int sig_status; /* The status (GOOD, BAD) of the signature */
+ int sig_flags; /* May contain expired or revoked flags */
+ unsigned int keyid[2]; /* The issuer key ID */
+ unsigned int created; /* Timestamp when the sig was created. */
+ unsigned int expires;
+ int pubkey_algo;
+ int digest_algo;
+ char *user_id; /* NULL or user ID which issued the signature. */
+ char *policy_url; /* If set, the policy the sig was created under. */
+ size_t sig_len; /* Size of the signature data inbits. */
+ unsigned char *sig_data; /* Raw signature data. */
+ };
+ typedef struct cdk_verify_result_s *cdk_verify_result_t;
/* Return the verify result. Do not free the data. */
-cdk_verify_result_t cdk_handle_verify_get_result (cdk_ctx_t hd);
+ cdk_verify_result_t cdk_handle_verify_get_result (cdk_ctx_t hd);
/* Raw packet routines. */
/* Allocate a new packet or a new packet with the given packet type. */
-cdk_error_t cdk_pkt_new (cdk_packet_t * r_pkt);
-cdk_error_t cdk_pkt_alloc (cdk_packet_t * r_pkt, cdk_packet_type_t pkttype);
+ cdk_error_t cdk_pkt_new (cdk_packet_t * r_pkt);
+ cdk_error_t cdk_pkt_alloc (cdk_packet_t * r_pkt, cdk_packet_type_t pkttype);
/* Only release the contents of the packet but not @PKT itself. */
-void cdk_pkt_free (cdk_packet_t pkt);
+ void cdk_pkt_free (cdk_packet_t pkt);
/* Release the packet contents and the packet structure @PKT itself. */
-void cdk_pkt_release (cdk_packet_t pkt);
+ void cdk_pkt_release (cdk_packet_t pkt);
/* Read or write the given output from or to the stream. */
-cdk_error_t cdk_pkt_read (cdk_stream_t inp, cdk_packet_t pkt);
-cdk_error_t cdk_pkt_write (cdk_stream_t out, cdk_packet_t pkt);
+ cdk_error_t cdk_pkt_read (cdk_stream_t inp, cdk_packet_t pkt);
+ cdk_error_t cdk_pkt_write (cdk_stream_t out, cdk_packet_t pkt);
/* Sub packet routines */
-cdk_subpkt_t cdk_subpkt_new (size_t size);
-void cdk_subpkt_free (cdk_subpkt_t ctx);
-cdk_subpkt_t cdk_subpkt_find (cdk_subpkt_t ctx, size_t type);
-cdk_subpkt_t cdk_subpkt_find_next (cdk_subpkt_t root, size_t type);
-size_t cdk_subpkt_type_count (cdk_subpkt_t ctx, size_t type);
-cdk_subpkt_t cdk_subpkt_find_nth (cdk_subpkt_t ctx, size_t type,
- size_t index);
-cdk_error_t cdk_subpkt_add (cdk_subpkt_t root, cdk_subpkt_t node);
-const unsigned char *cdk_subpkt_get_data (cdk_subpkt_t ctx,
- size_t * r_type, size_t * r_nbytes);
-void cdk_subpkt_init (cdk_subpkt_t node, size_t type,
- const void *buf, size_t buflen);
+ cdk_subpkt_t cdk_subpkt_new (size_t size);
+ void cdk_subpkt_free (cdk_subpkt_t ctx);
+ cdk_subpkt_t cdk_subpkt_find (cdk_subpkt_t ctx, size_t type);
+ cdk_subpkt_t cdk_subpkt_find_next (cdk_subpkt_t root, size_t type);
+ size_t cdk_subpkt_type_count (cdk_subpkt_t ctx, size_t type);
+ cdk_subpkt_t cdk_subpkt_find_nth (cdk_subpkt_t ctx, size_t type,
+ size_t index);
+ cdk_error_t cdk_subpkt_add (cdk_subpkt_t root, cdk_subpkt_t node);
+ const unsigned char *cdk_subpkt_get_data (cdk_subpkt_t ctx,
+ size_t * r_type,
+ size_t * r_nbytes);
+ void cdk_subpkt_init (cdk_subpkt_t node, size_t type, const void *buf,
+ size_t buflen);
/* Designated Revoker routines */
-const unsigned char *cdk_key_desig_revoker_walk (cdk_desig_revoker_t root,
- cdk_desig_revoker_t * ctx,
- int *r_class, int *r_algid);
+ const unsigned char *cdk_key_desig_revoker_walk (cdk_desig_revoker_t root,
+ cdk_desig_revoker_t * ctx,
+ int *r_class,
+ int *r_algid);
#define is_RSA(a) ((a) == CDK_PK_RSA \
|| (a) == CDK_PK_RSA_E \
@@ -690,23 +693,23 @@ const unsigned char *cdk_key_desig_revoker_walk (cdk_desig_revoker_t root,
/* Encrypt the given session key @SK with the public key @PK
and write the contents into the packet @PKE. */
-cdk_error_t cdk_pk_encrypt (cdk_pubkey_t pk, cdk_pkt_pubkey_enc_t pke,
- bigint_t sk);
+ cdk_error_t cdk_pk_encrypt (cdk_pubkey_t pk, cdk_pkt_pubkey_enc_t pke,
+ bigint_t sk);
/* Decrypt the given encrypted session key in @PKE with the secret key
@SK and store it in @R_SK. */
-cdk_error_t cdk_pk_decrypt (cdk_seckey_t sk, cdk_pkt_pubkey_enc_t pke,
- bigint_t * r_sk);
+ cdk_error_t cdk_pk_decrypt (cdk_seckey_t sk, cdk_pkt_pubkey_enc_t pke,
+ bigint_t * r_sk);
/* Sign the given message digest @MD with the secret key @SK and
store the signature in the packet @SIG. */
-cdk_error_t cdk_pk_sign (cdk_seckey_t sk, cdk_pkt_signature_t sig,
- const unsigned char *md);
+ cdk_error_t cdk_pk_sign (cdk_seckey_t sk, cdk_pkt_signature_t sig,
+ const unsigned char *md);
/* Verify the given signature in @SIG with the public key @PK
and compare it against the message digest @MD. */
-cdk_error_t cdk_pk_verify (cdk_pubkey_t pk, cdk_pkt_signature_t sig,
- const unsigned char *md);
+ cdk_error_t cdk_pk_verify (cdk_pubkey_t pk, cdk_pkt_signature_t sig,
+ const unsigned char *md);
/* Use cdk_pk_get_npkey() and cdk_pk_get_nskey to find out how much
multiprecision integers a key consists of. */
@@ -714,350 +717,360 @@ cdk_error_t cdk_pk_verify (cdk_pubkey_t pk, cdk_pkt_signature_t sig,
/* Return a multi precision integer of the public key with the index @IDX
in the buffer @BUF. @R_NWRITTEN will contain the length in octets.
Optional @R_NBITS may contain the size in bits. */
-cdk_error_t cdk_pk_get_mpi (cdk_pubkey_t pk, size_t idx,
- unsigned char *buf, size_t buflen,
- size_t * r_nwritten, size_t * r_nbits);
+ cdk_error_t cdk_pk_get_mpi (cdk_pubkey_t pk, size_t idx,
+ unsigned char *buf, size_t buflen,
+ size_t * r_nwritten, size_t * r_nbits);
/* Same as the function above but of the secret key. */
-cdk_error_t cdk_sk_get_mpi (cdk_seckey_t sk, size_t idx,
- unsigned char *buf, size_t buflen,
- size_t * r_nwritten, size_t * r_nbits);
+ cdk_error_t cdk_sk_get_mpi (cdk_seckey_t sk, size_t idx,
+ unsigned char *buf, size_t buflen,
+ size_t * r_nwritten, size_t * r_nbits);
/* Helper to get the exact number of multi precision integers
for the given object. */
-int cdk_pk_get_nbits (cdk_pubkey_t pk);
-int cdk_pk_get_npkey (int algo);
-int cdk_pk_get_nskey (int algo);
-int cdk_pk_get_nsig (int algo);
-int cdk_pk_get_nenc (int algo);
+ int cdk_pk_get_nbits (cdk_pubkey_t pk);
+ int cdk_pk_get_npkey (int algo);
+ int cdk_pk_get_nskey (int algo);
+ int cdk_pk_get_nsig (int algo);
+ int cdk_pk_get_nenc (int algo);
/* Fingerprint and key ID routines. */
/* Calculate the fingerprint of the given public key.
the FPR parameter must be at least 20 octets to hold the SHA1 hash. */
-cdk_error_t cdk_pk_get_fingerprint (cdk_pubkey_t pk, unsigned char *fpr);
+ cdk_error_t cdk_pk_get_fingerprint (cdk_pubkey_t pk, unsigned char *fpr);
/* Same as above, but with additional sanity checks of the buffer size. */
-cdk_error_t cdk_pk_to_fingerprint (cdk_pubkey_t pk,
- unsigned char *fpr, size_t fprlen,
- size_t * r_nout);
+ cdk_error_t cdk_pk_to_fingerprint (cdk_pubkey_t pk,
+ unsigned char *fpr, size_t fprlen,
+ size_t * r_nout);
/* Derive the keyid from the fingerprint. This is only possible for
modern, version 4 keys. */
-unsigned int cdk_pk_fingerprint_get_keyid (const unsigned char *fpr,
- size_t fprlen,
- unsigned int *keyid);
+ unsigned int cdk_pk_fingerprint_get_keyid (const unsigned char *fpr,
+ size_t fprlen,
+ unsigned int *keyid);
/* Various functions to get the keyid from the specific packet type. */
-unsigned int cdk_pk_get_keyid (cdk_pubkey_t pk, unsigned int *keyid);
-unsigned int cdk_sk_get_keyid (cdk_seckey_t sk, unsigned int *keyid);
-unsigned int cdk_sig_get_keyid (cdk_pkt_signature_t sig, unsigned int *keyid);
+ unsigned int cdk_pk_get_keyid (cdk_pubkey_t pk, unsigned int *keyid);
+ unsigned int cdk_sk_get_keyid (cdk_seckey_t sk, unsigned int *keyid);
+ unsigned int cdk_sig_get_keyid (cdk_pkt_signature_t sig,
+ unsigned int *keyid);
/* Key release functions. */
-void cdk_pk_release (cdk_pubkey_t pk);
-void cdk_sk_release (cdk_seckey_t sk);
+ void cdk_pk_release (cdk_pubkey_t pk);
+ void cdk_sk_release (cdk_seckey_t sk);
/* Create a public key with the data from the secret key @SK. */
-cdk_error_t cdk_pk_from_secret_key (cdk_seckey_t sk, cdk_pubkey_t * ret_pk);
+ cdk_error_t cdk_pk_from_secret_key (cdk_seckey_t sk, cdk_pubkey_t * ret_pk);
/* Sexp conversion of keys. */
-cdk_error_t cdk_pubkey_to_sexp (cdk_pubkey_t pk, char **sexp, size_t * len);
-cdk_error_t cdk_seckey_to_sexp (cdk_seckey_t sk, char **sexp, size_t * len);
+ cdk_error_t cdk_pubkey_to_sexp (cdk_pubkey_t pk, char **sexp, size_t * len);
+ cdk_error_t cdk_seckey_to_sexp (cdk_seckey_t sk, char **sexp, size_t * len);
/* String to Key routines. */
-cdk_error_t cdk_s2k_new (cdk_s2k_t * ret_s2k, int mode, int digest_algo,
- const unsigned char *salt);
-void cdk_s2k_free (cdk_s2k_t s2k);
+ cdk_error_t cdk_s2k_new (cdk_s2k_t * ret_s2k, int mode, int digest_algo,
+ const unsigned char *salt);
+ void cdk_s2k_free (cdk_s2k_t s2k);
-cdk_error_t cdk_file_armor (cdk_ctx_t hd, const char *file,
- const char *output);
-cdk_error_t cdk_file_dearmor (const char *file, const char *output);
-int cdk_armor_filter_use (cdk_stream_t inp);
+ cdk_error_t cdk_file_armor (cdk_ctx_t hd, const char *file,
+ const char *output);
+ cdk_error_t cdk_file_dearmor (const char *file, const char *output);
+ int cdk_armor_filter_use (cdk_stream_t inp);
/* Protect the inbuf with ASCII armor of the specified type.
If @outbuf and @outlen are NULL, the function returns the calculated
size of the base64 encoded data in @nwritten. */
-cdk_error_t cdk_armor_encode_buffer (const unsigned char *inbuf, size_t inlen,
- char *outbuf, size_t outlen,
- size_t * nwritten, int type);
+ cdk_error_t cdk_armor_encode_buffer (const unsigned char *inbuf,
+ size_t inlen, char *outbuf,
+ size_t outlen, size_t * nwritten,
+ int type);
/* This context contain user callbacks for different stream operations.
Some of these callbacks might be NULL to indicate that the callback
is not used. */
-struct cdk_stream_cbs_s
-{
- cdk_error_t (*open) (void *);
- cdk_error_t (*release) (void *);
- int (*read) (void *, void *buf, size_t);
- int (*write) (void *, const void *buf, size_t);
- int (*seek) (void *, off_t);
-};
-typedef struct cdk_stream_cbs_s *cdk_stream_cbs_t;
+ struct cdk_stream_cbs_s
+ {
+ cdk_error_t (*open) (void *);
+ cdk_error_t (*release) (void *);
+ int (*read) (void *, void *buf, size_t);
+ int (*write) (void *, const void *buf, size_t);
+ int (*seek) (void *, off_t);
+ };
+ typedef struct cdk_stream_cbs_s *cdk_stream_cbs_t;
-int cdk_stream_is_compressed (cdk_stream_t s);
+ int cdk_stream_is_compressed (cdk_stream_t s);
/* Return a stream object which is associated to a socket. */
-cdk_error_t cdk_stream_sockopen (const char *host, unsigned short port,
- cdk_stream_t * ret_out);
+ cdk_error_t cdk_stream_sockopen (const char *host, unsigned short port,
+ cdk_stream_t * ret_out);
/* Return a stream object which is associated to an existing file. */
-cdk_error_t cdk_stream_open (const char *file, cdk_stream_t * ret_s);
+ cdk_error_t cdk_stream_open (const char *file, cdk_stream_t * ret_s);
/* Return a stream object which is associated to a file which will
be created when the stream is closed. */
-cdk_error_t cdk_stream_new (const char *file, cdk_stream_t * ret_s);
+ cdk_error_t cdk_stream_new (const char *file, cdk_stream_t * ret_s);
/* Return a stream object with custom callback functions for the
various core operations. */
-cdk_error_t cdk_stream_new_from_cbs (cdk_stream_cbs_t cbs, void *opa,
- cdk_stream_t * ret_s);
-cdk_error_t cdk_stream_create (const char *file, cdk_stream_t * ret_s);
-cdk_error_t cdk_stream_tmp_new (cdk_stream_t * r_out);
-cdk_error_t cdk_stream_tmp_from_mem (const void *buf, size_t buflen,
- cdk_stream_t * r_out);
-void cdk_stream_tmp_set_mode (cdk_stream_t s, int val);
-cdk_error_t cdk_stream_flush (cdk_stream_t s);
-cdk_error_t cdk_stream_enable_cache (cdk_stream_t s, int val);
-cdk_error_t cdk_stream_filter_disable (cdk_stream_t s, int type);
-cdk_error_t cdk_stream_close (cdk_stream_t s);
-off_t cdk_stream_get_length (cdk_stream_t s);
-int cdk_stream_read (cdk_stream_t s, void *buf, size_t count);
-int cdk_stream_write (cdk_stream_t s, const void *buf, size_t count);
-int cdk_stream_putc (cdk_stream_t s, int c);
-int cdk_stream_getc (cdk_stream_t s);
-int cdk_stream_eof (cdk_stream_t s);
-off_t cdk_stream_tell (cdk_stream_t s);
-cdk_error_t cdk_stream_seek (cdk_stream_t s, off_t offset);
-cdk_error_t cdk_stream_set_armor_flag (cdk_stream_t s, int type);
+ cdk_error_t cdk_stream_new_from_cbs (cdk_stream_cbs_t cbs, void *opa,
+ cdk_stream_t * ret_s);
+ cdk_error_t cdk_stream_create (const char *file, cdk_stream_t * ret_s);
+ cdk_error_t cdk_stream_tmp_new (cdk_stream_t * r_out);
+ cdk_error_t cdk_stream_tmp_from_mem (const void *buf, size_t buflen,
+ cdk_stream_t * r_out);
+ void cdk_stream_tmp_set_mode (cdk_stream_t s, int val);
+ cdk_error_t cdk_stream_flush (cdk_stream_t s);
+ cdk_error_t cdk_stream_enable_cache (cdk_stream_t s, int val);
+ cdk_error_t cdk_stream_filter_disable (cdk_stream_t s, int type);
+ cdk_error_t cdk_stream_close (cdk_stream_t s);
+ off_t cdk_stream_get_length (cdk_stream_t s);
+ int cdk_stream_read (cdk_stream_t s, void *buf, size_t count);
+ int cdk_stream_write (cdk_stream_t s, const void *buf, size_t count);
+ int cdk_stream_putc (cdk_stream_t s, int c);
+ int cdk_stream_getc (cdk_stream_t s);
+ int cdk_stream_eof (cdk_stream_t s);
+ off_t cdk_stream_tell (cdk_stream_t s);
+ cdk_error_t cdk_stream_seek (cdk_stream_t s, off_t offset);
+ cdk_error_t cdk_stream_set_armor_flag (cdk_stream_t s, int type);
/* Push the literal filter for the given stream. */
-cdk_error_t cdk_stream_set_literal_flag (cdk_stream_t s,
- cdk_lit_format_t mode,
- const char *fname);
-
-cdk_error_t cdk_stream_set_compress_flag (cdk_stream_t s, int algo,
- int level);
-cdk_error_t cdk_stream_set_hash_flag (cdk_stream_t s, int algo);
-cdk_error_t cdk_stream_set_text_flag (cdk_stream_t s, const char *lf);
-cdk_error_t cdk_stream_kick_off (cdk_stream_t inp, cdk_stream_t out);
-cdk_error_t cdk_stream_mmap (cdk_stream_t s, unsigned char **ret_buf,
- size_t * ret_buflen);
-cdk_error_t cdk_stream_mmap_part (cdk_stream_t s, off_t off, size_t len,
- unsigned char **ret_buf,
- size_t * ret_buflen);
+ cdk_error_t cdk_stream_set_literal_flag (cdk_stream_t s,
+ cdk_lit_format_t mode,
+ const char *fname);
+
+ cdk_error_t cdk_stream_set_compress_flag (cdk_stream_t s, int algo,
+ int level);
+ cdk_error_t cdk_stream_set_hash_flag (cdk_stream_t s, int algo);
+ cdk_error_t cdk_stream_set_text_flag (cdk_stream_t s, const char *lf);
+ cdk_error_t cdk_stream_kick_off (cdk_stream_t inp, cdk_stream_t out);
+ cdk_error_t cdk_stream_mmap (cdk_stream_t s, unsigned char **ret_buf,
+ size_t * ret_buflen);
+ cdk_error_t cdk_stream_mmap_part (cdk_stream_t s, off_t off, size_t len,
+ unsigned char **ret_buf,
+ size_t * ret_buflen);
/* Read from the stream but restore the file pointer after reading
the requested amount of bytes. */
-int cdk_stream_peek (cdk_stream_t inp, unsigned char *buf, size_t buflen);
+ int cdk_stream_peek (cdk_stream_t inp, unsigned char *buf, size_t buflen);
/* A wrapper around the various new_from_XXX functions. Because
the function does not support all combinations, the dedicated
functions should be preferred. */
-cdk_error_t cdk_keydb_new (cdk_keydb_hd_t * r_hd, int type, void *data,
- size_t count);
+ cdk_error_t cdk_keydb_new (cdk_keydb_hd_t * r_hd, int type, void *data,
+ size_t count);
/* Create a new key db handle from a memory buffer. */
-cdk_error_t cdk_keydb_new_from_mem (cdk_keydb_hd_t * r_hd, int secret,
- const void *data, size_t datlen);
+ cdk_error_t cdk_keydb_new_from_mem (cdk_keydb_hd_t * r_hd, int secret,
+ const void *data, size_t datlen);
/* Create a new key db which uses an existing file. */
-cdk_error_t cdk_keydb_new_from_file (cdk_keydb_hd_t * r_hd, int secret,
- const char *fname);
+ cdk_error_t cdk_keydb_new_from_file (cdk_keydb_hd_t * r_hd, int secret,
+ const char *fname);
/* Uses a stream as the key db input. For searching it is important
that the seek function is supported on the stream. Furthermore,
the stream is not closed in cdk_keydb_free(). The caller must do it. */
-cdk_error_t cdk_keydb_new_from_stream (cdk_keydb_hd_t * r_hd, int secret,
- cdk_stream_t in);
+ cdk_error_t cdk_keydb_new_from_stream (cdk_keydb_hd_t * r_hd, int secret,
+ cdk_stream_t in);
/* Check that a secret key with the given key ID is available. */
-cdk_error_t cdk_keydb_check_sk (cdk_keydb_hd_t hd, unsigned int *keyid);
+ cdk_error_t cdk_keydb_check_sk (cdk_keydb_hd_t hd, unsigned int *keyid);
/* Prepare the key db search. */
-cdk_error_t cdk_keydb_search_start (cdk_keydb_search_t * st,
- cdk_keydb_hd_t db, int type, void *desc);
+ cdk_error_t cdk_keydb_search_start (cdk_keydb_search_t * st,
+ cdk_keydb_hd_t db, int type,
+ void *desc);
-void cdk_keydb_search_release (cdk_keydb_search_t st);
+ void cdk_keydb_search_release (cdk_keydb_search_t st);
/* Return a key which matches a valid description given in
cdk_keydb_search_start(). */
-cdk_error_t cdk_keydb_search (cdk_keydb_search_t st, cdk_keydb_hd_t hd,
- cdk_kbnode_t * ret_key);
+ cdk_error_t cdk_keydb_search (cdk_keydb_search_t st, cdk_keydb_hd_t hd,
+ cdk_kbnode_t * ret_key);
/* Release the key db handle and all its resources. */
-void cdk_keydb_free (cdk_keydb_hd_t hd);
+ void cdk_keydb_free (cdk_keydb_hd_t hd);
/* The following functions will try to find a key in the given key
db handle either by keyid, by fingerprint or by some pattern. */
-cdk_error_t cdk_keydb_get_bykeyid (cdk_keydb_hd_t hd, unsigned int *keyid,
- cdk_kbnode_t * ret_pk);
-cdk_error_t cdk_keydb_get_byfpr (cdk_keydb_hd_t hd, const unsigned char *fpr,
- cdk_kbnode_t * ret_pk);
-cdk_error_t cdk_keydb_get_bypattern (cdk_keydb_hd_t hd, const char *patt,
+ cdk_error_t cdk_keydb_get_bykeyid (cdk_keydb_hd_t hd, unsigned int *keyid,
cdk_kbnode_t * ret_pk);
+ cdk_error_t cdk_keydb_get_byfpr (cdk_keydb_hd_t hd,
+ const unsigned char *fpr,
+ cdk_kbnode_t * ret_pk);
+ cdk_error_t cdk_keydb_get_bypattern (cdk_keydb_hd_t hd, const char *patt,
+ cdk_kbnode_t * ret_pk);
/* These function, in contrast to most other key db functions, only
return the public or secret key packet without the additional
signatures and user IDs. */
-cdk_error_t cdk_keydb_get_pk (cdk_keydb_hd_t khd, unsigned int *keyid,
- cdk_pubkey_t * ret_pk);
-cdk_error_t cdk_keydb_get_sk (cdk_keydb_hd_t khd, unsigned int *keyid,
- cdk_seckey_t * ret_sk);
+ cdk_error_t cdk_keydb_get_pk (cdk_keydb_hd_t khd, unsigned int *keyid,
+ cdk_pubkey_t * ret_pk);
+ cdk_error_t cdk_keydb_get_sk (cdk_keydb_hd_t khd, unsigned int *keyid,
+ cdk_seckey_t * ret_sk);
/* Try to read the next key block from the given input stream.
The key will be returned in @RET_KEY on success. */
-cdk_error_t cdk_keydb_get_keyblock (cdk_stream_t inp, cdk_kbnode_t * ret_key);
+ cdk_error_t cdk_keydb_get_keyblock (cdk_stream_t inp,
+ cdk_kbnode_t * ret_key);
/* Rebuild the key db index if possible. */
-cdk_error_t cdk_keydb_idx_rebuild (cdk_keydb_hd_t db, cdk_keydb_search_t dbs);
+ cdk_error_t cdk_keydb_idx_rebuild (cdk_keydb_hd_t db,
+ cdk_keydb_search_t dbs);
/* Export one or more keys from the given key db handle into
the stream @OUT. The export is done by substring search and
uses the string list @REMUSR for the pattern. */
-cdk_error_t cdk_keydb_export (cdk_keydb_hd_t hd, cdk_stream_t out,
- cdk_strlist_t remusr);
+ cdk_error_t cdk_keydb_export (cdk_keydb_hd_t hd, cdk_stream_t out,
+ cdk_strlist_t remusr);
/* Import the given key node @knode into the key db. */
-cdk_error_t cdk_keydb_import (cdk_keydb_hd_t hd, cdk_kbnode_t knode);
+ cdk_error_t cdk_keydb_import (cdk_keydb_hd_t hd, cdk_kbnode_t knode);
/* List or enumerate keys from a given key db handle. */
/* Start the key list process. Either use @PATT for a pattern search
or @FPATT for a list of pattern. */
-cdk_error_t cdk_listkey_start (cdk_listkey_t * r_ctx, cdk_keydb_hd_t db,
- const char *patt, cdk_strlist_t fpatt);
-void cdk_listkey_close (cdk_listkey_t ctx);
+ cdk_error_t cdk_listkey_start (cdk_listkey_t * r_ctx, cdk_keydb_hd_t db,
+ const char *patt, cdk_strlist_t fpatt);
+ void cdk_listkey_close (cdk_listkey_t ctx);
/* Return the next key which matches the pattern. */
-cdk_error_t cdk_listkey_next (cdk_listkey_t ctx, cdk_kbnode_t * ret_key);
-
-cdk_kbnode_t cdk_kbnode_new (cdk_packet_t pkt);
-cdk_error_t cdk_kbnode_read_from_mem (cdk_kbnode_t * ret_node,
- const unsigned char *buf,
- size_t buflen);
-cdk_error_t cdk_kbnode_write_to_mem (cdk_kbnode_t node,
- unsigned char *buf, size_t * r_nbytes);
-cdk_error_t cdk_kbnode_write_to_mem_alloc (cdk_kbnode_t node,
- unsigned char **r_buf,
- size_t * r_buflen);
-
-void cdk_kbnode_release (cdk_kbnode_t node);
-void cdk_kbnode_delete (cdk_kbnode_t node);
-void cdk_kbnode_insert (cdk_kbnode_t root, cdk_kbnode_t node,
- cdk_packet_type_t pkttype);
-int cdk_kbnode_commit (cdk_kbnode_t * root);
-void cdk_kbnode_remove (cdk_kbnode_t * root, cdk_kbnode_t node);
-void cdk_kbnode_move (cdk_kbnode_t * root, cdk_kbnode_t node,
- cdk_kbnode_t where);
-cdk_kbnode_t cdk_kbnode_walk (cdk_kbnode_t root, cdk_kbnode_t * ctx, int all);
-cdk_packet_t cdk_kbnode_find_packet (cdk_kbnode_t node,
+ cdk_error_t cdk_listkey_next (cdk_listkey_t ctx, cdk_kbnode_t * ret_key);
+
+ cdk_kbnode_t cdk_kbnode_new (cdk_packet_t pkt);
+ cdk_error_t cdk_kbnode_read_from_mem (cdk_kbnode_t * ret_node,
+ const unsigned char *buf,
+ size_t buflen);
+ cdk_error_t cdk_kbnode_write_to_mem (cdk_kbnode_t node,
+ unsigned char *buf, size_t * r_nbytes);
+ cdk_error_t cdk_kbnode_write_to_mem_alloc (cdk_kbnode_t node,
+ unsigned char **r_buf,
+ size_t * r_buflen);
+
+ void cdk_kbnode_release (cdk_kbnode_t node);
+ void cdk_kbnode_delete (cdk_kbnode_t node);
+ void cdk_kbnode_insert (cdk_kbnode_t root, cdk_kbnode_t node,
+ cdk_packet_type_t pkttype);
+ int cdk_kbnode_commit (cdk_kbnode_t * root);
+ void cdk_kbnode_remove (cdk_kbnode_t * root, cdk_kbnode_t node);
+ void cdk_kbnode_move (cdk_kbnode_t * root, cdk_kbnode_t node,
+ cdk_kbnode_t where);
+ cdk_kbnode_t cdk_kbnode_walk (cdk_kbnode_t root, cdk_kbnode_t * ctx,
+ int all);
+ cdk_packet_t cdk_kbnode_find_packet (cdk_kbnode_t node,
+ cdk_packet_type_t pkttype);
+ cdk_packet_t cdk_kbnode_get_packet (cdk_kbnode_t node);
+ cdk_kbnode_t cdk_kbnode_find (cdk_kbnode_t node, cdk_packet_type_t pkttype);
+ cdk_kbnode_t cdk_kbnode_find_prev (cdk_kbnode_t root, cdk_kbnode_t node,
cdk_packet_type_t pkttype);
-cdk_packet_t cdk_kbnode_get_packet (cdk_kbnode_t node);
-cdk_kbnode_t cdk_kbnode_find (cdk_kbnode_t node, cdk_packet_type_t pkttype);
-cdk_kbnode_t cdk_kbnode_find_prev (cdk_kbnode_t root, cdk_kbnode_t node,
- cdk_packet_type_t pkttype);
-cdk_kbnode_t cdk_kbnode_find_next (cdk_kbnode_t node,
- cdk_packet_type_t pkttype);
-cdk_error_t cdk_kbnode_hash (cdk_kbnode_t node, digest_hd_st * md, int is_v4,
- cdk_packet_type_t pkttype, int flags);
+ cdk_kbnode_t cdk_kbnode_find_next (cdk_kbnode_t node,
+ cdk_packet_type_t pkttype);
+ cdk_error_t cdk_kbnode_hash (cdk_kbnode_t node, digest_hd_st * md,
+ int is_v4, cdk_packet_type_t pkttype,
+ int flags);
/* Check each signature in the key node and return a summary of the
key status in @r_status. Values of cdk_key_flag_t are used. */
-cdk_error_t cdk_pk_check_sigs (cdk_kbnode_t knode, cdk_keydb_hd_t hd,
- int *r_status);
+ cdk_error_t cdk_pk_check_sigs (cdk_kbnode_t knode, cdk_keydb_hd_t hd,
+ int *r_status);
/* Check the self signature of the key to make sure it is valid. */
-cdk_error_t cdk_pk_check_self_sig (cdk_kbnode_t knode, int *r_status);
+ cdk_error_t cdk_pk_check_self_sig (cdk_kbnode_t knode, int *r_status);
/* Return a matching algorithm from the given public key list.
@PREFTYPE can be either sym-cipher/compress/digest. */
-int cdk_pklist_select_algo (cdk_keylist_t pkl, int preftype);
+ int cdk_pklist_select_algo (cdk_keylist_t pkl, int preftype);
/* Return 0 or 1 if the given key list is able to understand the
MDC feature. */
-int cdk_pklist_use_mdc (cdk_keylist_t pkl);
-cdk_error_t cdk_pklist_build (cdk_keylist_t * ret_pkl, cdk_keydb_hd_t hd,
- cdk_strlist_t remusr, int use);
-void cdk_pklist_release (cdk_keylist_t pkl);
+ int cdk_pklist_use_mdc (cdk_keylist_t pkl);
+ cdk_error_t cdk_pklist_build (cdk_keylist_t * ret_pkl, cdk_keydb_hd_t hd,
+ cdk_strlist_t remusr, int use);
+ void cdk_pklist_release (cdk_keylist_t pkl);
/* Secret key lists */
-cdk_error_t cdk_sklist_build (cdk_keylist_t * ret_skl,
- cdk_keydb_hd_t db, cdk_ctx_t hd,
- cdk_strlist_t locusr,
- int unlock, unsigned int use);
-void cdk_sklist_release (cdk_keylist_t skl);
-cdk_error_t cdk_sklist_write (cdk_keylist_t skl, cdk_stream_t outp,
- digest_hd_st * mdctx, int sigclass, int sigver);
-cdk_error_t cdk_sklist_write_onepass (cdk_keylist_t skl, cdk_stream_t outp,
- int sigclass, int mdalgo);
+ cdk_error_t cdk_sklist_build (cdk_keylist_t * ret_skl,
+ cdk_keydb_hd_t db, cdk_ctx_t hd,
+ cdk_strlist_t locusr,
+ int unlock, unsigned int use);
+ void cdk_sklist_release (cdk_keylist_t skl);
+ cdk_error_t cdk_sklist_write (cdk_keylist_t skl, cdk_stream_t outp,
+ digest_hd_st * mdctx, int sigclass,
+ int sigver);
+ cdk_error_t cdk_sklist_write_onepass (cdk_keylist_t skl, cdk_stream_t outp,
+ int sigclass, int mdalgo);
/* Encrypt the given stream @INP with the recipients given in @REMUSR.
If @REMUSR is NULL, symmetric encryption will be used. The output
will be written to @OUT. */
-cdk_error_t cdk_stream_encrypt (cdk_ctx_t hd, cdk_strlist_t remusr,
- cdk_stream_t inp, cdk_stream_t out);
+ cdk_error_t cdk_stream_encrypt (cdk_ctx_t hd, cdk_strlist_t remusr,
+ cdk_stream_t inp, cdk_stream_t out);
/* Decrypt the @INP stream into @OUT. */
-cdk_error_t cdk_stream_decrypt (cdk_ctx_t hd, cdk_stream_t inp,
- cdk_stream_t out);
+ cdk_error_t cdk_stream_decrypt (cdk_ctx_t hd, cdk_stream_t inp,
+ cdk_stream_t out);
/* Same as the function above but it works on files. */
-cdk_error_t cdk_file_encrypt (cdk_ctx_t hd, cdk_strlist_t remusr,
- const char *file, const char *output);
-cdk_error_t cdk_file_decrypt (cdk_ctx_t hd, const char *file,
- const char *output);
+ cdk_error_t cdk_file_encrypt (cdk_ctx_t hd, cdk_strlist_t remusr,
+ const char *file, const char *output);
+ cdk_error_t cdk_file_decrypt (cdk_ctx_t hd, const char *file,
+ const char *output);
/* Generic function to transform data. The mode can be either sign,
verify, encrypt, decrypt, import or export. The meanings of the
parameters are similar to the functions above.
@OUTBUF will contain the output and @OUTSIZE the length of it. */
-cdk_error_t cdk_data_transform (cdk_ctx_t hd, enum cdk_crypto_mode_t mode,
- cdk_strlist_t locusr, cdk_strlist_t remusr,
- const void *inbuf, size_t insize,
- unsigned char **outbuf, size_t * outsize,
- int modval);
+ cdk_error_t cdk_data_transform (cdk_ctx_t hd, enum cdk_crypto_mode_t mode,
+ cdk_strlist_t locusr, cdk_strlist_t remusr,
+ const void *inbuf, size_t insize,
+ unsigned char **outbuf, size_t * outsize,
+ int modval);
/* Sign the stream @INP. Optionally, the output will be encrypted
if @REMUSR is not NULL and the @ENCRYPTFLAG is set.
The output will be written to @OUT.
@LOCUSR contains one ore more pattern for the secret key(s) to use. */
-cdk_error_t cdk_stream_sign (cdk_ctx_t hd, cdk_stream_t inp, cdk_stream_t out,
- cdk_strlist_t locusr, cdk_strlist_t remusr,
- int encryptflag, int sigmode);
+ cdk_error_t cdk_stream_sign (cdk_ctx_t hd, cdk_stream_t inp,
+ cdk_stream_t out, cdk_strlist_t locusr,
+ cdk_strlist_t remusr, int encryptflag,
+ int sigmode);
/* Same as the function above but it works on files. */
-cdk_error_t cdk_file_sign (cdk_ctx_t hd, cdk_strlist_t locusr,
- cdk_strlist_t remusr,
- const char *file, const char *output,
- int sigmode, int encryptflag);
+ cdk_error_t cdk_file_sign (cdk_ctx_t hd, cdk_strlist_t locusr,
+ cdk_strlist_t remusr,
+ const char *file, const char *output,
+ int sigmode, int encryptflag);
-cdk_error_t cdk_stream_verify (cdk_ctx_t hd, cdk_stream_t inp,
- cdk_stream_t data, cdk_stream_t out);
+ cdk_error_t cdk_stream_verify (cdk_ctx_t hd, cdk_stream_t inp,
+ cdk_stream_t data, cdk_stream_t out);
/* Verify the given file @FILE. For a detached signature, @DATA_FILE
contains the actual file data and @FILE is only the signature.
If the @OUTPUT is not NULL, the plaintext will be written to this file. */
-cdk_error_t cdk_file_verify (cdk_ctx_t hd, const char *file,
- const char *data_file, const char *output);
-
-int cdk_trustdb_get_validity (cdk_stream_t inp, cdk_pkt_userid_t id,
- int *r_val);
-int cdk_trustdb_get_ownertrust (cdk_stream_t inp, cdk_pubkey_t pk,
- int *r_val, int *r_flags);
-
-void cdk_strlist_free (cdk_strlist_t sl);
-cdk_strlist_t cdk_strlist_add (cdk_strlist_t * list, const char *string);
-cdk_strlist_t cdk_strlist_next (cdk_strlist_t root, const char **r_str);
-const char *cdk_check_version (const char *req_version);
+ cdk_error_t cdk_file_verify (cdk_ctx_t hd, const char *file,
+ const char *data_file, const char *output);
+
+ int cdk_trustdb_get_validity (cdk_stream_t inp, cdk_pkt_userid_t id,
+ int *r_val);
+ int cdk_trustdb_get_ownertrust (cdk_stream_t inp, cdk_pubkey_t pk,
+ int *r_val, int *r_flags);
+
+ void cdk_strlist_free (cdk_strlist_t sl);
+ cdk_strlist_t cdk_strlist_add (cdk_strlist_t * list, const char *string);
+ cdk_strlist_t cdk_strlist_next (cdk_strlist_t root, const char **r_str);
+ const char *cdk_check_version (const char *req_version);
/* UTF8 */
-char *cdk_utf8_encode (const char *string);
-char *cdk_utf8_decode (const char *string, size_t length, int delim);
+ char *cdk_utf8_encode (const char *string);
+ char *cdk_utf8_decode (const char *string, size_t length, int delim);
#ifdef __cplusplus
}
#endif
-#endif /* OPENCDK_H */
+#endif /* OPENCDK_H */
diff --git a/lib/opencdk/packet.h b/lib/opencdk/packet.h
index 9120b22a62..aca38e06cb 100644
--- a/lib/opencdk/packet.h
+++ b/lib/opencdk/packet.h
@@ -25,7 +25,7 @@
#ifndef CDK_PACKET_H
#define CDK_PACKET_H
-struct cdk_kbnode_s
+struct cdk_kbnode_s
{
struct cdk_kbnode_s *next;
cdk_packet_t pkt;
@@ -34,15 +34,16 @@ struct cdk_kbnode_s
};
/*-- new-packet.c --*/
-void _cdk_free_mpibuf (size_t n, bigint_t *array);
+void _cdk_free_mpibuf (size_t n, bigint_t * array);
void _cdk_free_userid (cdk_pkt_userid_t uid);
-void _cdk_free_signature( cdk_pkt_signature_t sig );
-cdk_prefitem_t _cdk_copy_prefs( const cdk_prefitem_t prefs );
-cdk_error_t _cdk_copy_userid( cdk_pkt_userid_t *dst, cdk_pkt_userid_t src );
-cdk_error_t _cdk_copy_pubkey( cdk_pkt_pubkey_t* dst, cdk_pkt_pubkey_t src );
-cdk_error_t _cdk_copy_seckey( cdk_pkt_seckey_t* dst, cdk_pkt_seckey_t src );
-cdk_error_t _cdk_copy_pk_to_sk( cdk_pkt_pubkey_t pk, cdk_pkt_seckey_t sk );
-cdk_error_t _cdk_copy_signature( cdk_pkt_signature_t* dst, cdk_pkt_signature_t src );
-cdk_error_t _cdk_pubkey_compare( cdk_pkt_pubkey_t a, cdk_pkt_pubkey_t b );
+void _cdk_free_signature (cdk_pkt_signature_t sig);
+cdk_prefitem_t _cdk_copy_prefs (const cdk_prefitem_t prefs);
+cdk_error_t _cdk_copy_userid (cdk_pkt_userid_t * dst, cdk_pkt_userid_t src);
+cdk_error_t _cdk_copy_pubkey (cdk_pkt_pubkey_t * dst, cdk_pkt_pubkey_t src);
+cdk_error_t _cdk_copy_seckey (cdk_pkt_seckey_t * dst, cdk_pkt_seckey_t src);
+cdk_error_t _cdk_copy_pk_to_sk (cdk_pkt_pubkey_t pk, cdk_pkt_seckey_t sk);
+cdk_error_t _cdk_copy_signature (cdk_pkt_signature_t * dst,
+ cdk_pkt_signature_t src);
+cdk_error_t _cdk_pubkey_compare (cdk_pkt_pubkey_t a, cdk_pkt_pubkey_t b);
#endif /* CDK_PACKET_H */
diff --git a/lib/opencdk/stream.h b/lib/opencdk/stream.h
index f7883c5a19..491e330099 100644
--- a/lib/opencdk/stream.h
+++ b/lib/opencdk/stream.h
@@ -28,27 +28,30 @@
/* The default buffer size for the stream. */
#define STREAM_BUFSIZE 8192
-enum {
- fDUMMY = 0,
- fARMOR = 1,
- fCIPHER = 2,
- fLITERAL = 3,
- fCOMPRESS= 4,
- fHASH = 5,
- fTEXT = 6
+enum
+{
+ fDUMMY = 0,
+ fARMOR = 1,
+ fCIPHER = 2,
+ fLITERAL = 3,
+ fCOMPRESS = 4,
+ fHASH = 5,
+ fTEXT = 6
};
/* Type definition for the filter function. */
-typedef cdk_error_t (*filter_fnct_t) (void * opaque, int ctl, FILE * in, FILE * out);
+typedef cdk_error_t (*filter_fnct_t) (void *opaque, int ctl, FILE * in,
+ FILE * out);
/* The stream filter context structure. */
-struct stream_filter_s
+struct stream_filter_s
{
struct stream_filter_s *next;
filter_fnct_t fnct;
void *opaque;
FILE *tmp;
- union {
+ union
+ {
armor_filter_t afx;
cipher_filter_t cfx;
literal_filter_t pfx;
@@ -56,7 +59,8 @@ struct stream_filter_s
text_filter_t tfx;
md_filter_t mfx;
} u;
- struct {
+ struct
+ {
unsigned enabled:1;
unsigned rdonly:1;
unsigned error:1;
@@ -67,12 +71,14 @@ struct stream_filter_s
/* The stream context structure. */
-struct cdk_stream_s {
+struct cdk_stream_s
+{
struct stream_filter_s *filters;
int fmode;
int error;
size_t blkmode;
- struct {
+ struct
+ {
unsigned filtrated:1;
unsigned eof:1;
unsigned write:1;
@@ -81,7 +87,8 @@ struct cdk_stream_s {
unsigned no_filter:1;
unsigned compressed:3;
} flags;
- struct {
+ struct
+ {
unsigned char *buf;
unsigned on:1;
size_t size;
diff --git a/lib/opencdk/types.h b/lib/opencdk/types.h
index 5a225d9f7b..88dc0e2378 100644
--- a/lib/opencdk/types.h
+++ b/lib/opencdk/types.h
@@ -27,19 +27,19 @@
#ifndef HAVE_BYTE_TYPEDEF
# undef byte
- typedef unsigned char byte;
+typedef unsigned char byte;
# define HAVE_BYTE_TYPEDEF
#endif
#ifndef HAVE_U16_TYPEDEF
# undef u16
- typedef unsigned short u16;
+typedef unsigned short u16;
# define HAVE_U16_TYPEDEF
#endif
#ifndef HAVE_U32_TYPEDEF
# undef u32
- typedef unsigned int u32;
+typedef unsigned int u32;
# define HAVE_U32_TYPEDEF
#endif
diff --git a/lib/openpgp/gnutls_openpgp.h b/lib/openpgp/gnutls_openpgp.h
index 9f23f36ce2..36ab8539d3 100644
--- a/lib/openpgp/gnutls_openpgp.h
+++ b/lib/openpgp/gnutls_openpgp.h
@@ -25,7 +25,8 @@ int gnutls_openpgp_get_key (gnutls_datum_t * key,
/* internal */
int _gnutls_openpgp_raw_crt_to_gcert (gnutls_cert * cert,
- const gnutls_datum_t * raw, const gnutls_openpgp_keyid_t);
+ const gnutls_datum_t * raw,
+ const gnutls_openpgp_keyid_t);
int
_gnutls_openpgp_raw_privkey_to_gkey (gnutls_privkey * pkey,
diff --git a/lib/openpgp/openpgp_int.h b/lib/openpgp/openpgp_int.h
index 96b2a7889f..d5eb139cfb 100644
--- a/lib/openpgp/openpgp_int.h
+++ b/lib/openpgp/openpgp_int.h
@@ -39,34 +39,38 @@ typedef struct gnutls_openpgp_keyring_int
int _gnutls_map_cdk_rc (int rc);
int _gnutls_openpgp_export (cdk_kbnode_t node,
- gnutls_openpgp_crt_fmt_t format,
- void *output_data, size_t * output_data_size, int private);
+ gnutls_openpgp_crt_fmt_t format,
+ void *output_data, size_t * output_data_size,
+ int private);
int _gnutls_openpgp_crt_to_gcert (gnutls_cert * gcert,
gnutls_openpgp_crt_t cert);
int _gnutls_openpgp_privkey_to_gkey (gnutls_privkey * dest,
gnutls_openpgp_privkey_t src);
-cdk_packet_t _gnutls_get_valid_subkey(cdk_kbnode_t knode, int key_type);
+cdk_packet_t _gnutls_get_valid_subkey (cdk_kbnode_t knode, int key_type);
-unsigned int _gnutls_get_pgp_key_usage(unsigned int pgp_usage);
+unsigned int _gnutls_get_pgp_key_usage (unsigned int pgp_usage);
int
_gnutls_openpgp_crt_get_mpis (gnutls_openpgp_crt_t cert, uint32_t keyid[2],
- bigint_t * params, int *params_size);
+ bigint_t * params, int *params_size);
int
-_gnutls_openpgp_privkey_get_mpis (gnutls_openpgp_privkey_t pkey, uint32_t keyid[2],
- bigint_t * params, int *params_size);
+_gnutls_openpgp_privkey_get_mpis (gnutls_openpgp_privkey_t pkey,
+ uint32_t keyid[2], bigint_t * params,
+ int *params_size);
-cdk_packet_t _gnutls_openpgp_find_key( cdk_kbnode_t knode, uint32_t keyid[2], unsigned int priv);
+cdk_packet_t _gnutls_openpgp_find_key (cdk_kbnode_t knode, uint32_t keyid[2],
+ unsigned int priv);
-int _gnutls_read_pgp_mpi( cdk_packet_t pkt, unsigned int priv, size_t idx, bigint_t* m);
+int _gnutls_read_pgp_mpi (cdk_packet_t pkt, unsigned int priv, size_t idx,
+ bigint_t * m);
-int _gnutls_openpgp_find_subkey_idx( cdk_kbnode_t knode, uint32_t keyid[2],
- unsigned int priv);
+int _gnutls_openpgp_find_subkey_idx (cdk_kbnode_t knode, uint32_t keyid[2],
+ unsigned int priv);
-int _gnutls_openpgp_get_algo( int cdk_algo);
+int _gnutls_openpgp_get_algo (int cdk_algo);
#endif /* ENABLE_OPENPGP */
diff --git a/lib/x509/pbkdf2-sha1.h b/lib/x509/pbkdf2-sha1.h
index 55d6e7ad39..5f47c7fee2 100644
--- a/lib/x509/pbkdf2-sha1.h
+++ b/lib/x509/pbkdf2-sha1.h
@@ -1,4 +1,3 @@
int _gnutls_pbkdf2_sha1 (const char *P, size_t Plen,
- const char *S, size_t Slen,
- unsigned int c,
- char *DK, size_t dkLen);
+ const char *S, size_t Slen,
+ unsigned int c, char *DK, size_t dkLen);
diff --git a/lib/x509/x509_int.h b/lib/x509/x509_int.h
index cc734c6c67..68c2da038f 100644
--- a/lib/x509/x509_int.h
+++ b/lib/x509/x509_int.h
@@ -71,7 +71,7 @@ typedef struct gnutls_pkcs7_int
ASN1_TYPE pkcs7;
} gnutls_pkcs7_int;
-#define MAX_PRIV_PARAMS_SIZE GNUTLS_MAX_PK_PARAMS /* ok for RSA and DSA */
+#define MAX_PRIV_PARAMS_SIZE GNUTLS_MAX_PK_PARAMS /* ok for RSA and DSA */
/* parameters should not be larger than this limit */
#define DSA_PRIVATE_PARAMS 5
@@ -176,18 +176,18 @@ int _gnutls_x509_get_dn_oid (ASN1_TYPE asn1_struct,
int indx, void *_oid, size_t * sizeof_oid);
int _gnutls_parse_general_name (ASN1_TYPE src, const char *src_name,
- int seq, void *name, size_t * name_size,
- unsigned int *ret_type, int othername_oid);
-
+ int seq, void *name, size_t * name_size,
+ unsigned int *ret_type, int othername_oid);
+
/* dsa.c */
/* verify.c */
int gnutls_x509_crt_is_issuer (gnutls_x509_crt_t cert,
gnutls_x509_crt_t issuer);
-int _gnutls_x509_verify_algorithm(gnutls_mac_algorithm_t *hash,
- const gnutls_datum_t * signature,
- const gnutls_x509_crt_t crt);
+int _gnutls_x509_verify_algorithm (gnutls_mac_algorithm_t * hash,
+ const gnutls_datum_t * signature,
+ const gnutls_x509_crt_t crt);
int _gnutls_x509_verify_signature (const gnutls_datum_t * tbs,
const gnutls_datum_t * hash,
const gnutls_datum_t * signature,
@@ -197,22 +197,25 @@ int _gnutls_x509_privkey_verify_signature (const gnutls_datum_t * tbs,
gnutls_x509_privkey_t issuer);
/* privkey.h */
-ASN1_TYPE _gnutls_privkey_decode_pkcs1_rsa_key (const gnutls_datum_t *raw_key,
+ASN1_TYPE _gnutls_privkey_decode_pkcs1_rsa_key (const gnutls_datum_t *
+ raw_key,
gnutls_x509_privkey_t pkey);
int _gnutls_asn1_encode_dsa (ASN1_TYPE * c2, bigint_t * params);
/* extensions.c */
int _gnutls_x509_crl_get_extension (gnutls_x509_crl_t crl,
- const char *extension_id, int indx,
- gnutls_datum_t * ret, unsigned int *_critical);
+ const char *extension_id, int indx,
+ gnutls_datum_t * ret,
+ unsigned int *_critical);
int _gnutls_x509_crl_get_extension_oid (gnutls_x509_crl_t crl,
- int indx, void *oid, size_t * sizeof_oid);
+ int indx, void *oid,
+ size_t * sizeof_oid);
int _gnutls_x509_crl_set_extension (gnutls_x509_crl_t crl,
- const char *ext_id,
- const gnutls_datum_t * ext_data,
- unsigned int critical);
+ const char *ext_id,
+ const gnutls_datum_t * ext_data,
+ unsigned int critical);
int _gnutls_x509_crt_get_extension (gnutls_x509_crt_t cert,
const char *extension_id, int indx,
@@ -233,25 +236,27 @@ int _gnutls_x509_crt_set_extension (gnutls_x509_crt_t cert,
unsigned int critical);
int
-_gnutls_x509_ext_extract_number (opaque *number,
- size_t* nr_size,
- opaque * extnValue,
- int extnValueLen);
+_gnutls_x509_ext_extract_number (opaque * number,
+ size_t * nr_size,
+ opaque * extnValue, int extnValueLen);
int
-_gnutls_x509_ext_gen_number (const opaque* nuber, size_t nr_size, gnutls_datum_t * der_ext);
+_gnutls_x509_ext_gen_number (const opaque * nuber, size_t nr_size,
+ gnutls_datum_t * der_ext);
int _gnutls_x509_ext_gen_basicConstraints (int CA, int pathLenConstraint,
gnutls_datum_t * der_ext);
int _gnutls_x509_ext_gen_keyUsage (uint16_t usage, gnutls_datum_t * der_ext);
int _gnutls_x509_ext_gen_subject_alt_name (gnutls_x509_subject_alt_name_t
- type, const void* data, unsigned int data_size,
- gnutls_datum_t* prev_der_ext, gnutls_datum_t * der_ext);
-int
-_gnutls_x509_ext_gen_crl_dist_points (gnutls_x509_subject_alt_name_t
- type, const void *data, unsigned int data_size,
- unsigned int reason_flags,
- gnutls_datum_t * der_ext);
+ type, const void *data,
+ unsigned int data_size,
+ gnutls_datum_t * prev_der_ext,
+ gnutls_datum_t * der_ext);
+int _gnutls_x509_ext_gen_crl_dist_points (gnutls_x509_subject_alt_name_t type,
+ const void *data,
+ unsigned int data_size,
+ unsigned int reason_flags,
+ gnutls_datum_t * der_ext);
int _gnutls_x509_ext_gen_key_id (const void *id, size_t id_size,
gnutls_datum_t * der_data);
int _gnutls_x509_ext_gen_auth_key_id (const void *id, size_t id_size,
@@ -259,7 +264,7 @@ int _gnutls_x509_ext_gen_auth_key_id (const void *id, size_t id_size,
int _gnutls_x509_ext_extract_proxyCertInfo (int *pathLenConstraint,
char **policyLanguage,
char **policy,
- size_t *sizeof_policy,
+ size_t * sizeof_policy,
opaque * extnValue,
int extnValueLen);
int _gnutls_x509_ext_gen_proxyCertInfo (int pathLenConstraint,
@@ -270,13 +275,16 @@ int _gnutls_x509_ext_gen_proxyCertInfo (int pathLenConstraint,
/* mpi.c */
int _gnutls_x509_crq_get_mpis (gnutls_x509_crq_t cert,
- bigint_t * params, int *params_size);
-
+ bigint_t * params, int *params_size);
+
int _gnutls_x509_crt_get_mpis (gnutls_x509_crt_t cert,
bigint_t * params, int *params_size);
-int _gnutls_x509_read_rsa_params (opaque * der, int dersize, bigint_t * params);
-int _gnutls_x509_read_dsa_pubkey (opaque * der, int dersize, bigint_t * params);
-int _gnutls_x509_read_dsa_params (opaque * der, int dersize, bigint_t * params);
+int _gnutls_x509_read_rsa_params (opaque * der, int dersize,
+ bigint_t * params);
+int _gnutls_x509_read_dsa_pubkey (opaque * der, int dersize,
+ bigint_t * params);
+int _gnutls_x509_read_dsa_params (opaque * der, int dersize,
+ bigint_t * params);
int _gnutls_x509_write_rsa_params (bigint_t * params, int params_size,
gnutls_datum_t * der);
@@ -288,7 +296,7 @@ int _gnutls_x509_write_dsa_public_key (bigint_t * params, int params_size,
int _gnutls_x509_read_uint (ASN1_TYPE node, const char *value,
unsigned int *ret);
-int _gnutls_x509_read_der_int (opaque * der, int dersize, bigint_t* out);
+int _gnutls_x509_read_der_int (opaque * der, int dersize, bigint_t * out);
int _gnutls_x509_read_int (ASN1_TYPE node, const char *value,
bigint_t * ret_mpi);
@@ -299,8 +307,8 @@ int _gnutls_x509_write_uint32 (ASN1_TYPE node, const char *value,
int _gnutls_x509_write_sig_params (ASN1_TYPE dst, const char *dst_name,
gnutls_pk_algorithm_t pk_algorithm,
- gnutls_digest_algorithm_t, bigint_t * params,
- int params_size);
+ gnutls_digest_algorithm_t,
+ bigint_t * params, int params_size);
/* pkcs12.h */
#include <gnutls/pkcs12.h>
@@ -343,26 +351,26 @@ typedef struct gnutls_pkcs12_bag_int
int
_gnutls_pkcs12_string_to_key (unsigned int id, const opaque * salt,
- unsigned int salt_size, unsigned int iter,
- const char *pw, unsigned int req_keylen,
- opaque * keybuf);
+ unsigned int salt_size, unsigned int iter,
+ const char *pw, unsigned int req_keylen,
+ opaque * keybuf);
int _gnutls_pkcs7_decrypt_data (const gnutls_datum_t * data,
const char *password, gnutls_datum_t * dec);
typedef enum schema_id
- {
- PBES2_GENERIC, /* when the algorithm is unknown, temporal use when reading only */
- PBES2_3DES, /* the stuff in PKCS #5 */
- PBES2_AES_128,
- PBES2_AES_192,
- PBES2_AES_256,
- PKCS12_3DES_SHA1, /* the stuff in PKCS #12 */
- PKCS12_ARCFOUR_SHA1,
- PKCS12_RC2_40_SHA1
- } schema_id;
-
-int _gnutls_pkcs_flags_to_schema(unsigned int flags);
+{
+ PBES2_GENERIC, /* when the algorithm is unknown, temporal use when reading only */
+ PBES2_3DES, /* the stuff in PKCS #5 */
+ PBES2_AES_128,
+ PBES2_AES_192,
+ PBES2_AES_256,
+ PKCS12_3DES_SHA1, /* the stuff in PKCS #12 */
+ PKCS12_ARCFOUR_SHA1,
+ PKCS12_RC2_40_SHA1
+} schema_id;
+
+int _gnutls_pkcs_flags_to_schema (unsigned int flags);
int _gnutls_pkcs7_encrypt_data (schema_id schema,
const gnutls_datum_t * data,
const char *password, gnutls_datum_t * enc);
@@ -380,8 +388,8 @@ int _pkcs12_encode_crt_bag (gnutls_pkcs12_bag_type_t type,
/* crq */
int _gnutls_x509_crq_set_extension (gnutls_x509_crq_t crq,
- const char *ext_id,
- const gnutls_datum_t * ext_data,
- unsigned int critical);
+ const char *ext_id,
+ const gnutls_datum_t * ext_data,
+ unsigned int critical);
#endif
diff --git a/libextra/includes/gnutls/extra.h b/libextra/includes/gnutls/extra.h
index f43d324f56..2b2c1964c1 100644
--- a/libextra/includes/gnutls/extra.h
+++ b/libextra/includes/gnutls/extra.h
@@ -51,11 +51,11 @@ extern "C"
* Enumeration of different certificate encoding formats.
*/
typedef enum
- {
- GNUTLS_IA_APPLICATION_PAYLOAD = 0,
- GNUTLS_IA_INTERMEDIATE_PHASE_FINISHED = 1,
- GNUTLS_IA_FINAL_PHASE_FINISHED = 2
- } gnutls_ia_apptype_t;
+ {
+ GNUTLS_IA_APPLICATION_PAYLOAD = 0,
+ GNUTLS_IA_INTERMEDIATE_PHASE_FINISHED = 1,
+ GNUTLS_IA_FINAL_PHASE_FINISHED = 2
+ } gnutls_ia_apptype_t;
/* TLS/IA credential
*/
@@ -89,8 +89,8 @@ extern "C"
extern void
gnutls_ia_set_client_avp_ptr (gnutls_ia_client_credentials_t cred,
void *ptr);
- extern void *
- gnutls_ia_get_client_avp_ptr (gnutls_ia_client_credentials_t cred);
+ extern void *gnutls_ia_get_client_avp_ptr (gnutls_ia_client_credentials_t
+ cred);
/* Server TLS/IA credential functions. */
extern void
@@ -99,8 +99,8 @@ extern "C"
extern void
gnutls_ia_set_server_avp_ptr (gnutls_ia_server_credentials_t cred,
void *ptr);
- extern void *
- gnutls_ia_get_server_avp_ptr (gnutls_ia_server_credentials_t cred);
+ extern void *gnutls_ia_get_server_avp_ptr (gnutls_ia_server_credentials_t
+ cred);
/* TLS/IA handshake. */
extern int gnutls_ia_handshake_p (gnutls_session_t session);
@@ -112,8 +112,7 @@ extern "C"
gnutls_ia_permute_inner_secret (gnutls_session_t session,
size_t session_keys_size,
const char *session_keys);
- extern int gnutls_ia_endphase_send (gnutls_session_t session,
- int final_p);
+ extern int gnutls_ia_endphase_send (gnutls_session_t session, int final_p);
extern int gnutls_ia_verify_endphase (gnutls_session_t session,
const char *checksum);
@@ -125,8 +124,7 @@ extern "C"
/* Utility stuff. */
extern int gnutls_ia_generate_challenge (gnutls_session_t session,
- size_t buffer_size,
- char *buffer);
+ size_t buffer_size, char *buffer);
extern void gnutls_ia_extract_inner_secret (gnutls_session_t session,
char *buffer);
diff --git a/libextra/includes/gnutls/openssl.h b/libextra/includes/gnutls/openssl.h
index 668fa82148..1e67c7c23e 100644
--- a/libextra/includes/gnutls/openssl.h
+++ b/libextra/includes/gnutls/openssl.h
@@ -169,8 +169,9 @@ extern "C"
#define rbio gnutls_state
- typedef struct {
- void* handle;
+ typedef struct
+ {
+ void *handle;
} MD_CTX;
struct rsa_st;
diff --git a/src/certtool-cfg.h b/src/certtool-cfg.h
index b4deb1eb3d..e44183bb83 100644
--- a/src/certtool-cfg.h
+++ b/src/certtool-cfg.h
@@ -31,7 +31,7 @@ int get_days (void);
int get_ca_status (void);
int get_crl_number (void);
int get_path_len (void);
-int get_crq_extensions_status(void);
+int get_crq_extensions_status (void);
const char *get_pkcs12_key_name (void);
int get_tls_client_status (void);
int get_tls_server_status (void);
@@ -43,9 +43,9 @@ int get_crl_sign_status (void);
int get_cert_sign_status (void);
int get_encrypt_status (int server);
int get_sign_status (int server);
-void get_ip_addr_set (int type, void* crt);
-void get_dns_name_set (int type, void* crt);
-void get_email_set (int type, void* crt);
+void get_ip_addr_set (int type, void *crt);
+void get_dns_name_set (int type, void *crt);
+void get_email_set (int type, void *crt);
void get_cn_crq_set (gnutls_x509_crq_t crq);
@@ -56,4 +56,4 @@ void get_unit_crq_set (gnutls_x509_crq_t crq);
void get_organization_crq_set (gnutls_x509_crq_t crq);
void get_country_crq_set (gnutls_x509_crq_t crq);
void get_oid_crq_set (gnutls_x509_crq_t crq);
-const char *get_proxy_policy (char **policy, size_t *policylen);
+const char *get_proxy_policy (char **policy, size_t * policylen);
diff --git a/src/certtool-common.h b/src/certtool-common.h
index be2145c842..cb2e9ab1d7 100644
--- a/src/certtool-common.h
+++ b/src/certtool-common.h
@@ -1,30 +1,31 @@
-enum {
- ACTION_SELF_SIGNED,
- ACTION_GENERATE_PRIVKEY,
- ACTION_CERT_INFO,
- ACTION_GENERATE_REQUEST,
- ACTION_GENERATE_CERTIFICATE,
- ACTION_VERIFY_CHAIN,
- ACTION_PRIVKEY_INFO,
- ACTION_UPDATE_CERTIFICATE,
- ACTION_TO_PKCS12,
- ACTION_PKCS12_INFO,
- ACTION_GENERATE_DH,
- ACTION_GET_DH,
- ACTION_CRL_INFO,
- ACTION_P7_INFO,
- ACTION_GENERATE_CRL,
- ACTION_VERIFY_CRL,
- ACTION_SMIME_TO_P7,
- ACTION_GENERATE_PROXY,
- ACTION_GENERATE_PKCS8,
- ACTION_PGP_INFO,
- ACTION_PGP_PRIVKEY_INFO,
- ACTION_RING_INFO,
- ACTION_REQUEST
+enum
+{
+ ACTION_SELF_SIGNED,
+ ACTION_GENERATE_PRIVKEY,
+ ACTION_CERT_INFO,
+ ACTION_GENERATE_REQUEST,
+ ACTION_GENERATE_CERTIFICATE,
+ ACTION_VERIFY_CHAIN,
+ ACTION_PRIVKEY_INFO,
+ ACTION_UPDATE_CERTIFICATE,
+ ACTION_TO_PKCS12,
+ ACTION_PKCS12_INFO,
+ ACTION_GENERATE_DH,
+ ACTION_GET_DH,
+ ACTION_CRL_INFO,
+ ACTION_P7_INFO,
+ ACTION_GENERATE_CRL,
+ ACTION_VERIFY_CRL,
+ ACTION_SMIME_TO_P7,
+ ACTION_GENERATE_PROXY,
+ ACTION_GENERATE_PKCS8,
+ ACTION_PGP_INFO,
+ ACTION_PGP_PRIVKEY_INFO,
+ ACTION_RING_INFO,
+ ACTION_REQUEST
};
#define TYPE_CRT 1
#define TYPE_CRQ 2
-void certtool_version(void);
+void certtool_version (void);
diff --git a/src/common.h b/src/common.h
index d209655986..29a68a5e60 100644
--- a/src/common.h
+++ b/src/common.h
@@ -27,7 +27,8 @@
extern const char str_unknown[];
int print_info (gnutls_session_t state, const char *hostname, int insecure);
-void print_cert_info (gnutls_session_t state, const char *hostname, int insecure);
+void print_cert_info (gnutls_session_t state, const char *hostname,
+ int insecure);
void print_list (int verbose);
void parse_comp (char **comp, int ncomp, int *comp_priority);