summaryrefslogtreecommitdiff
path: root/lib/x509/sign.c
diff options
context:
space:
mode:
authorZoltan Fridrich <zfridric@redhat.com>2023-01-27 15:03:53 +0100
committerZoltan Fridrich <zfridric@redhat.com>2023-01-27 15:11:28 +0100
commit50e0c39fc9b8e0ae493f42a3046db5e70f8ea044 (patch)
tree36d6eb0dde4d81527a07017d6df7d1dd4b7e436e /lib/x509/sign.c
parent21288eb0ce9d27f00c4f8ac8048b22f4003f65ac (diff)
downloadgnutls-50e0c39fc9b8e0ae493f42a3046db5e70f8ea044.tar.gz
Indent code
Co-authored-by: Simon Josefsson <simon@josefsson.org> Signed-off-by: Zoltan Fridrich <zfridric@redhat.com>
Diffstat (limited to 'lib/x509/sign.c')
-rw-r--r--lib/x509/sign.c25
1 files changed, 13 insertions, 12 deletions
diff --git a/lib/x509/sign.c b/lib/x509/sign.c
index 303e9f2f91..8cb99b9ec1 100644
--- a/lib/x509/sign.c
+++ b/lib/x509/sign.c
@@ -43,16 +43,15 @@
* of the TBS and sign it on the fly.
*/
int
-_gnutls_x509_get_tbs(asn1_node cert, const char *tbs_name,
- gnutls_datum_t * tbs)
+_gnutls_x509_get_tbs(asn1_node cert, const char *tbs_name, gnutls_datum_t * tbs)
{
return _gnutls_x509_der_encode(cert, tbs_name, tbs, 0);
}
int
_gnutls_x509_crt_get_spki_params(gnutls_x509_crt_t crt,
- const gnutls_x509_spki_st *key_params,
- gnutls_x509_spki_st *params)
+ const gnutls_x509_spki_st * key_params,
+ gnutls_x509_spki_st * params)
{
int result;
gnutls_x509_spki_st crt_params;
@@ -74,7 +73,8 @@ _gnutls_x509_crt_get_spki_params(gnutls_x509_crt_t crt,
gnutls_assert();
return GNUTLS_E_CERTIFICATE_ERROR;
}
- } else if (key_params->pk != GNUTLS_PK_RSA && key_params->pk != GNUTLS_PK_UNKNOWN) {
+ } else if (key_params->pk != GNUTLS_PK_RSA
+ && key_params->pk != GNUTLS_PK_UNKNOWN) {
gnutls_assert();
return GNUTLS_E_CERTIFICATE_ERROR;
}
@@ -102,8 +102,7 @@ int
_gnutls_x509_pkix_sign(asn1_node src, const char *src_name,
gnutls_digest_algorithm_t dig,
unsigned int flags,
- gnutls_x509_crt_t issuer,
- gnutls_privkey_t issuer_key)
+ gnutls_x509_crt_t issuer, gnutls_privkey_t issuer_key)
{
int result;
gnutls_datum_t signature;
@@ -130,7 +129,7 @@ _gnutls_x509_pkix_sign(asn1_node src, const char *src_name,
}
result = _gnutls_privkey_update_spki_params(issuer_key, pk, dig, flags,
- &params);
+ &params);
if (result < 0) {
gnutls_assert();
return result;
@@ -142,8 +141,7 @@ _gnutls_x509_pkix_sign(asn1_node src, const char *src_name,
_gnutls_str_cat(name, sizeof(name), ".issuer");
result =
- asn1_copy_node(src, name, issuer->cert,
- "tbsCertificate.subject");
+ asn1_copy_node(src, name, issuer->cert, "tbsCertificate.subject");
if (result != ASN1_SUCCESS) {
gnutls_assert();
return _gnutls_asn2err(result);
@@ -156,7 +154,8 @@ _gnutls_x509_pkix_sign(asn1_node src, const char *src_name,
se = _gnutls_pk_to_sign_entry(params.pk, dig);
if (se == NULL)
- return gnutls_assert_val(GNUTLS_E_UNSUPPORTED_SIGNATURE_ALGORITHM);
+ return
+ gnutls_assert_val(GNUTLS_E_UNSUPPORTED_SIGNATURE_ALGORITHM);
_gnutls_debug_log("signing structure using %s\n", se->name);
@@ -178,7 +177,9 @@ _gnutls_x509_pkix_sign(asn1_node src, const char *src_name,
FIX_SIGN_PARAMS(params, flags, dig);
if (_gnutls_pk_is_not_prehashed(params.pk)) {
- result = privkey_sign_raw_data(issuer_key, se, &tbs, &signature, &params);
+ result =
+ privkey_sign_raw_data(issuer_key, se, &tbs, &signature,
+ &params);
} else {
result = privkey_sign_and_hash_data(issuer_key, se,
&tbs, &signature, &params);