diff options
author | Zoltan Fridrich <zfridric@redhat.com> | 2023-01-27 15:03:53 +0100 |
---|---|---|
committer | Zoltan Fridrich <zfridric@redhat.com> | 2023-01-27 15:11:28 +0100 |
commit | 50e0c39fc9b8e0ae493f42a3046db5e70f8ea044 (patch) | |
tree | 36d6eb0dde4d81527a07017d6df7d1dd4b7e436e /lib/x509/sign.c | |
parent | 21288eb0ce9d27f00c4f8ac8048b22f4003f65ac (diff) | |
download | gnutls-50e0c39fc9b8e0ae493f42a3046db5e70f8ea044.tar.gz |
Indent code
Co-authored-by: Simon Josefsson <simon@josefsson.org>
Signed-off-by: Zoltan Fridrich <zfridric@redhat.com>
Diffstat (limited to 'lib/x509/sign.c')
-rw-r--r-- | lib/x509/sign.c | 25 |
1 files changed, 13 insertions, 12 deletions
diff --git a/lib/x509/sign.c b/lib/x509/sign.c index 303e9f2f91..8cb99b9ec1 100644 --- a/lib/x509/sign.c +++ b/lib/x509/sign.c @@ -43,16 +43,15 @@ * of the TBS and sign it on the fly. */ int -_gnutls_x509_get_tbs(asn1_node cert, const char *tbs_name, - gnutls_datum_t * tbs) +_gnutls_x509_get_tbs(asn1_node cert, const char *tbs_name, gnutls_datum_t * tbs) { return _gnutls_x509_der_encode(cert, tbs_name, tbs, 0); } int _gnutls_x509_crt_get_spki_params(gnutls_x509_crt_t crt, - const gnutls_x509_spki_st *key_params, - gnutls_x509_spki_st *params) + const gnutls_x509_spki_st * key_params, + gnutls_x509_spki_st * params) { int result; gnutls_x509_spki_st crt_params; @@ -74,7 +73,8 @@ _gnutls_x509_crt_get_spki_params(gnutls_x509_crt_t crt, gnutls_assert(); return GNUTLS_E_CERTIFICATE_ERROR; } - } else if (key_params->pk != GNUTLS_PK_RSA && key_params->pk != GNUTLS_PK_UNKNOWN) { + } else if (key_params->pk != GNUTLS_PK_RSA + && key_params->pk != GNUTLS_PK_UNKNOWN) { gnutls_assert(); return GNUTLS_E_CERTIFICATE_ERROR; } @@ -102,8 +102,7 @@ int _gnutls_x509_pkix_sign(asn1_node src, const char *src_name, gnutls_digest_algorithm_t dig, unsigned int flags, - gnutls_x509_crt_t issuer, - gnutls_privkey_t issuer_key) + gnutls_x509_crt_t issuer, gnutls_privkey_t issuer_key) { int result; gnutls_datum_t signature; @@ -130,7 +129,7 @@ _gnutls_x509_pkix_sign(asn1_node src, const char *src_name, } result = _gnutls_privkey_update_spki_params(issuer_key, pk, dig, flags, - ¶ms); + ¶ms); if (result < 0) { gnutls_assert(); return result; @@ -142,8 +141,7 @@ _gnutls_x509_pkix_sign(asn1_node src, const char *src_name, _gnutls_str_cat(name, sizeof(name), ".issuer"); result = - asn1_copy_node(src, name, issuer->cert, - "tbsCertificate.subject"); + asn1_copy_node(src, name, issuer->cert, "tbsCertificate.subject"); if (result != ASN1_SUCCESS) { gnutls_assert(); return _gnutls_asn2err(result); @@ -156,7 +154,8 @@ _gnutls_x509_pkix_sign(asn1_node src, const char *src_name, se = _gnutls_pk_to_sign_entry(params.pk, dig); if (se == NULL) - return gnutls_assert_val(GNUTLS_E_UNSUPPORTED_SIGNATURE_ALGORITHM); + return + gnutls_assert_val(GNUTLS_E_UNSUPPORTED_SIGNATURE_ALGORITHM); _gnutls_debug_log("signing structure using %s\n", se->name); @@ -178,7 +177,9 @@ _gnutls_x509_pkix_sign(asn1_node src, const char *src_name, FIX_SIGN_PARAMS(params, flags, dig); if (_gnutls_pk_is_not_prehashed(params.pk)) { - result = privkey_sign_raw_data(issuer_key, se, &tbs, &signature, ¶ms); + result = + privkey_sign_raw_data(issuer_key, se, &tbs, &signature, + ¶ms); } else { result = privkey_sign_and_hash_data(issuer_key, se, &tbs, &signature, ¶ms); |