summaryrefslogtreecommitdiff
path: root/lib/auth_anon.c
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@gnutls.org>2004-06-07 10:05:43 +0000
committerNikos Mavrogiannopoulos <nmav@gnutls.org>2004-06-07 10:05:43 +0000
commit802e1ede038010ddab31225f4b8a7e8d74f3b987 (patch)
treef9f07d2fb57da9843ac6b79e06e9266301b7e8b7 /lib/auth_anon.c
parente0781d87ea58ff1ac1b6439d60510a8a26ea9f54 (diff)
downloadgnutls-802e1ede038010ddab31225f4b8a7e8d74f3b987.tar.gz
changed indentation to 4 spaces instead of tabs.
Diffstat (limited to 'lib/auth_anon.c')
-rw-r--r--lib/auth_anon.c197
1 files changed, 102 insertions, 95 deletions
diff --git a/lib/auth_anon.c b/lib/auth_anon.c
index 4eb120307f..6d2feecd5b 100644
--- a/lib/auth_anon.c
+++ b/lib/auth_anon.c
@@ -38,118 +38,125 @@
#include <gnutls_state.h>
#include <auth_dh_common.h>
-static int gen_anon_server_kx( gnutls_session, opaque**);
-static int proc_anon_client_kx( gnutls_session, opaque*, size_t);
-static int proc_anon_server_kx( gnutls_session, opaque*, size_t);
+static int gen_anon_server_kx(gnutls_session, opaque **);
+static int proc_anon_client_kx(gnutls_session, opaque *, size_t);
+static int proc_anon_server_kx(gnutls_session, opaque *, size_t);
const mod_auth_st anon_auth_struct = {
- "ANON",
- NULL,
- NULL,
- gen_anon_server_kx,
- _gnutls_gen_dh_common_client_kx, /* this can be shared */
- NULL,
- NULL,
-
- NULL,
- NULL, /* certificate */
- proc_anon_server_kx,
- proc_anon_client_kx,
- NULL,
- NULL
+ "ANON",
+ NULL,
+ NULL,
+ gen_anon_server_kx,
+ _gnutls_gen_dh_common_client_kx, /* this can be shared */
+ NULL,
+ NULL,
+
+ NULL,
+ NULL, /* certificate */
+ proc_anon_server_kx,
+ proc_anon_client_kx,
+ NULL,
+ NULL
};
-static int gen_anon_server_kx( gnutls_session session, opaque** data) {
- mpi_t g, p;
- const mpi_t *mpis;
- int ret;
- gnutls_dh_params dh_params;
- const gnutls_anon_server_credentials cred;
-
- cred = _gnutls_get_cred(session->key, GNUTLS_CRD_ANON, NULL);
- if (cred == NULL) {
- gnutls_assert();
- return GNUTLS_E_INSUFFICIENT_CREDENTIALS;
- }
-
- dh_params = _gnutls_anon_get_dh_params( cred, session);
- mpis = _gnutls_get_dh_params( dh_params);
- if (mpis == NULL) {
- gnutls_assert();
- return GNUTLS_E_NO_TEMPORARY_DH_PARAMS;
- }
-
- p = mpis[0];
- g = mpis[1];
-
- if ( (ret=_gnutls_auth_info_set( session, GNUTLS_CRD_ANON, sizeof( anon_server_auth_info_st), 1)) < 0)
- {
- gnutls_assert();
- return ret;
- }
-
- _gnutls_dh_set_group( session, g, p);
-
- ret = _gnutls_dh_common_print_server_kx( session, g, p, data);
- if (ret < 0) {
- gnutls_assert();
- }
-
+static int gen_anon_server_kx(gnutls_session session, opaque ** data)
+{
+ mpi_t g, p;
+ const mpi_t *mpis;
+ int ret;
+ gnutls_dh_params dh_params;
+ const gnutls_anon_server_credentials cred;
+
+ cred = _gnutls_get_cred(session->key, GNUTLS_CRD_ANON, NULL);
+ if (cred == NULL) {
+ gnutls_assert();
+ return GNUTLS_E_INSUFFICIENT_CREDENTIALS;
+ }
+
+ dh_params = _gnutls_anon_get_dh_params(cred, session);
+ mpis = _gnutls_get_dh_params(dh_params);
+ if (mpis == NULL) {
+ gnutls_assert();
+ return GNUTLS_E_NO_TEMPORARY_DH_PARAMS;
+ }
+
+ p = mpis[0];
+ g = mpis[1];
+
+ if ((ret =
+ _gnutls_auth_info_set(session, GNUTLS_CRD_ANON,
+ sizeof(anon_server_auth_info_st), 1)) < 0) {
+ gnutls_assert();
return ret;
+ }
+
+ _gnutls_dh_set_group(session, g, p);
+
+ ret = _gnutls_dh_common_print_server_kx(session, g, p, data);
+ if (ret < 0) {
+ gnutls_assert();
+ }
+
+ return ret;
}
-static int proc_anon_client_kx( gnutls_session session, opaque* data, size_t _data_size)
+static int proc_anon_client_kx(gnutls_session session, opaque * data,
+ size_t _data_size)
{
-const gnutls_anon_server_credentials cred;
-int bits;
-int ret;
-mpi_t p, g;
-gnutls_dh_params dh_params;
-const mpi_t *mpis;
-
- bits = _gnutls_dh_get_allowed_prime_bits( session);
-
- cred = _gnutls_get_cred(session->key, GNUTLS_CRD_ANON, NULL);
- if (cred == NULL) {
- gnutls_assert();
- return GNUTLS_E_INSUFFICIENT_CREDENTIALS;
- }
-
- dh_params = _gnutls_anon_get_dh_params( cred, session);
- mpis = _gnutls_get_dh_params( dh_params);
- if (mpis == NULL) {
- gnutls_assert();
- return GNUTLS_E_NO_TEMPORARY_DH_PARAMS;
- }
-
- p = mpis[0];
- g = mpis[1];
-
- ret = _gnutls_proc_dh_common_client_kx( session, data, _data_size, g, p);
+ const gnutls_anon_server_credentials cred;
+ int bits;
+ int ret;
+ mpi_t p, g;
+ gnutls_dh_params dh_params;
+ const mpi_t *mpis;
- return ret;
+ bits = _gnutls_dh_get_allowed_prime_bits(session);
+
+ cred = _gnutls_get_cred(session->key, GNUTLS_CRD_ANON, NULL);
+ if (cred == NULL) {
+ gnutls_assert();
+ return GNUTLS_E_INSUFFICIENT_CREDENTIALS;
+ }
+
+ dh_params = _gnutls_anon_get_dh_params(cred, session);
+ mpis = _gnutls_get_dh_params(dh_params);
+ if (mpis == NULL) {
+ gnutls_assert();
+ return GNUTLS_E_NO_TEMPORARY_DH_PARAMS;
+ }
+
+ p = mpis[0];
+ g = mpis[1];
+
+ ret =
+ _gnutls_proc_dh_common_client_kx(session, data, _data_size, g, p);
+
+ return ret;
}
-int proc_anon_server_kx( gnutls_session session, opaque* data, size_t _data_size)
+int proc_anon_server_kx(gnutls_session session, opaque * data,
+ size_t _data_size)
{
-int ret;
+ int ret;
- /* set auth_info */
- if ( (ret=_gnutls_auth_info_set( session, GNUTLS_CRD_ANON, sizeof( anon_client_auth_info_st), 1)) < 0) {
- gnutls_assert();
- return ret;
- }
+ /* set auth_info */
+ if ((ret =
+ _gnutls_auth_info_set(session, GNUTLS_CRD_ANON,
+ sizeof(anon_client_auth_info_st), 1)) < 0) {
+ gnutls_assert();
+ return ret;
+ }
- ret = _gnutls_proc_dh_common_server_kx( session, data, _data_size);
- if (ret < 0) {
- gnutls_assert();
- return ret;
- }
+ ret = _gnutls_proc_dh_common_server_kx(session, data, _data_size);
+ if (ret < 0) {
+ gnutls_assert();
+ return ret;
+ }
- return 0;
+ return 0;
}
-#endif /* ENABLE_ANON */
+#endif /* ENABLE_ANON */