diff options
author | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2004-06-07 10:05:43 +0000 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2004-06-07 10:05:43 +0000 |
commit | 802e1ede038010ddab31225f4b8a7e8d74f3b987 (patch) | |
tree | f9f07d2fb57da9843ac6b79e06e9266301b7e8b7 /lib/auth_anon.c | |
parent | e0781d87ea58ff1ac1b6439d60510a8a26ea9f54 (diff) | |
download | gnutls-802e1ede038010ddab31225f4b8a7e8d74f3b987.tar.gz |
changed indentation to 4 spaces instead of tabs.
Diffstat (limited to 'lib/auth_anon.c')
-rw-r--r-- | lib/auth_anon.c | 197 |
1 files changed, 102 insertions, 95 deletions
diff --git a/lib/auth_anon.c b/lib/auth_anon.c index 4eb120307f..6d2feecd5b 100644 --- a/lib/auth_anon.c +++ b/lib/auth_anon.c @@ -38,118 +38,125 @@ #include <gnutls_state.h> #include <auth_dh_common.h> -static int gen_anon_server_kx( gnutls_session, opaque**); -static int proc_anon_client_kx( gnutls_session, opaque*, size_t); -static int proc_anon_server_kx( gnutls_session, opaque*, size_t); +static int gen_anon_server_kx(gnutls_session, opaque **); +static int proc_anon_client_kx(gnutls_session, opaque *, size_t); +static int proc_anon_server_kx(gnutls_session, opaque *, size_t); const mod_auth_st anon_auth_struct = { - "ANON", - NULL, - NULL, - gen_anon_server_kx, - _gnutls_gen_dh_common_client_kx, /* this can be shared */ - NULL, - NULL, - - NULL, - NULL, /* certificate */ - proc_anon_server_kx, - proc_anon_client_kx, - NULL, - NULL + "ANON", + NULL, + NULL, + gen_anon_server_kx, + _gnutls_gen_dh_common_client_kx, /* this can be shared */ + NULL, + NULL, + + NULL, + NULL, /* certificate */ + proc_anon_server_kx, + proc_anon_client_kx, + NULL, + NULL }; -static int gen_anon_server_kx( gnutls_session session, opaque** data) { - mpi_t g, p; - const mpi_t *mpis; - int ret; - gnutls_dh_params dh_params; - const gnutls_anon_server_credentials cred; - - cred = _gnutls_get_cred(session->key, GNUTLS_CRD_ANON, NULL); - if (cred == NULL) { - gnutls_assert(); - return GNUTLS_E_INSUFFICIENT_CREDENTIALS; - } - - dh_params = _gnutls_anon_get_dh_params( cred, session); - mpis = _gnutls_get_dh_params( dh_params); - if (mpis == NULL) { - gnutls_assert(); - return GNUTLS_E_NO_TEMPORARY_DH_PARAMS; - } - - p = mpis[0]; - g = mpis[1]; - - if ( (ret=_gnutls_auth_info_set( session, GNUTLS_CRD_ANON, sizeof( anon_server_auth_info_st), 1)) < 0) - { - gnutls_assert(); - return ret; - } - - _gnutls_dh_set_group( session, g, p); - - ret = _gnutls_dh_common_print_server_kx( session, g, p, data); - if (ret < 0) { - gnutls_assert(); - } - +static int gen_anon_server_kx(gnutls_session session, opaque ** data) +{ + mpi_t g, p; + const mpi_t *mpis; + int ret; + gnutls_dh_params dh_params; + const gnutls_anon_server_credentials cred; + + cred = _gnutls_get_cred(session->key, GNUTLS_CRD_ANON, NULL); + if (cred == NULL) { + gnutls_assert(); + return GNUTLS_E_INSUFFICIENT_CREDENTIALS; + } + + dh_params = _gnutls_anon_get_dh_params(cred, session); + mpis = _gnutls_get_dh_params(dh_params); + if (mpis == NULL) { + gnutls_assert(); + return GNUTLS_E_NO_TEMPORARY_DH_PARAMS; + } + + p = mpis[0]; + g = mpis[1]; + + if ((ret = + _gnutls_auth_info_set(session, GNUTLS_CRD_ANON, + sizeof(anon_server_auth_info_st), 1)) < 0) { + gnutls_assert(); return ret; + } + + _gnutls_dh_set_group(session, g, p); + + ret = _gnutls_dh_common_print_server_kx(session, g, p, data); + if (ret < 0) { + gnutls_assert(); + } + + return ret; } -static int proc_anon_client_kx( gnutls_session session, opaque* data, size_t _data_size) +static int proc_anon_client_kx(gnutls_session session, opaque * data, + size_t _data_size) { -const gnutls_anon_server_credentials cred; -int bits; -int ret; -mpi_t p, g; -gnutls_dh_params dh_params; -const mpi_t *mpis; - - bits = _gnutls_dh_get_allowed_prime_bits( session); - - cred = _gnutls_get_cred(session->key, GNUTLS_CRD_ANON, NULL); - if (cred == NULL) { - gnutls_assert(); - return GNUTLS_E_INSUFFICIENT_CREDENTIALS; - } - - dh_params = _gnutls_anon_get_dh_params( cred, session); - mpis = _gnutls_get_dh_params( dh_params); - if (mpis == NULL) { - gnutls_assert(); - return GNUTLS_E_NO_TEMPORARY_DH_PARAMS; - } - - p = mpis[0]; - g = mpis[1]; - - ret = _gnutls_proc_dh_common_client_kx( session, data, _data_size, g, p); + const gnutls_anon_server_credentials cred; + int bits; + int ret; + mpi_t p, g; + gnutls_dh_params dh_params; + const mpi_t *mpis; - return ret; + bits = _gnutls_dh_get_allowed_prime_bits(session); + + cred = _gnutls_get_cred(session->key, GNUTLS_CRD_ANON, NULL); + if (cred == NULL) { + gnutls_assert(); + return GNUTLS_E_INSUFFICIENT_CREDENTIALS; + } + + dh_params = _gnutls_anon_get_dh_params(cred, session); + mpis = _gnutls_get_dh_params(dh_params); + if (mpis == NULL) { + gnutls_assert(); + return GNUTLS_E_NO_TEMPORARY_DH_PARAMS; + } + + p = mpis[0]; + g = mpis[1]; + + ret = + _gnutls_proc_dh_common_client_kx(session, data, _data_size, g, p); + + return ret; } -int proc_anon_server_kx( gnutls_session session, opaque* data, size_t _data_size) +int proc_anon_server_kx(gnutls_session session, opaque * data, + size_t _data_size) { -int ret; + int ret; - /* set auth_info */ - if ( (ret=_gnutls_auth_info_set( session, GNUTLS_CRD_ANON, sizeof( anon_client_auth_info_st), 1)) < 0) { - gnutls_assert(); - return ret; - } + /* set auth_info */ + if ((ret = + _gnutls_auth_info_set(session, GNUTLS_CRD_ANON, + sizeof(anon_client_auth_info_st), 1)) < 0) { + gnutls_assert(); + return ret; + } - ret = _gnutls_proc_dh_common_server_kx( session, data, _data_size); - if (ret < 0) { - gnutls_assert(); - return ret; - } + ret = _gnutls_proc_dh_common_server_kx(session, data, _data_size); + if (ret < 0) { + gnutls_assert(); + return ret; + } - return 0; + return 0; } -#endif /* ENABLE_ANON */ +#endif /* ENABLE_ANON */ |