summaryrefslogtreecommitdiff
path: root/extra/gnutls_openssl.c
diff options
context:
space:
mode:
Diffstat (limited to 'extra/gnutls_openssl.c')
-rw-r--r--extra/gnutls_openssl.c50
1 files changed, 16 insertions, 34 deletions
diff --git a/extra/gnutls_openssl.c b/extra/gnutls_openssl.c
index ba53733e1a..f61d09829a 100644
--- a/extra/gnutls_openssl.c
+++ b/extra/gnutls_openssl.c
@@ -33,7 +33,7 @@
* undefine it to avoid the conflict with openssl.h.
*/
#ifdef X509_NAME
-#undef X509_NAME
+# undef X509_NAME
#endif
#include <gnutls/openssl.h>
@@ -62,7 +62,6 @@ void OpenSSL_add_all_algorithms(void)
{
}
-
/* SSL_CTX structure handling */
SSL_CTX *SSL_CTX_new(SSL_METHOD * method)
@@ -89,10 +88,9 @@ int SSL_CTX_set_default_verify_paths(SSL_CTX * ctx)
return 0;
}
-int
-SSL_CTX_use_certificate_file(SSL_CTX * ctx, const char *certfile, int type)
+int SSL_CTX_use_certificate_file(SSL_CTX * ctx, const char *certfile, int type)
{
- ctx->certfile = (char *) calloc(1, strlen(certfile) + 1);
+ ctx->certfile = (char *)calloc(1, strlen(certfile) + 1);
if (!ctx->certfile)
return -1;
memcpy(ctx->certfile, certfile, strlen(certfile));
@@ -102,10 +100,9 @@ SSL_CTX_use_certificate_file(SSL_CTX * ctx, const char *certfile, int type)
return 1;
}
-int
-SSL_CTX_use_PrivateKey_file(SSL_CTX * ctx, const char *keyfile, int type)
+int SSL_CTX_use_PrivateKey_file(SSL_CTX * ctx, const char *keyfile, int type)
{
- ctx->keyfile = (char *) calloc(1, strlen(keyfile) + 1);
+ ctx->keyfile = (char *)calloc(1, strlen(keyfile) + 1);
if (!ctx->keyfile)
return -1;
memcpy(ctx->keyfile, keyfile, strlen(keyfile));
@@ -118,7 +115,7 @@ SSL_CTX_use_PrivateKey_file(SSL_CTX * ctx, const char *keyfile, int type)
void
SSL_CTX_set_verify(SSL_CTX * ctx, int verify_mode,
- int (*verify_callback) (int, X509_STORE_CTX *))
+ int (*verify_callback)(int, X509_STORE_CTX *))
{
ctx->verify_mode = verify_mode;
ctx->verify_callback = verify_callback;
@@ -145,7 +142,6 @@ int SSL_CTX_set_cipher_list(SSL_CTX * ctx, const char *list)
return 1;
}
-
/* SSL_CTX statistics */
long SSL_CTX_sess_number(SSL_CTX * ctx)
@@ -198,8 +194,6 @@ long SSL_CTX_sess_timeouts(SSL_CTX * ctx)
return 0;
}
-
-
/* SSL structure handling */
SSL *SSL_new(SSL_CTX * ctx)
@@ -267,8 +261,7 @@ int SSL_get_error(SSL * ssl, int ret)
int SSL_set_fd(SSL * ssl, int fd)
{
- gnutls_transport_set_ptr(ssl->gnutls_state,
- GNUTLS_INT_TO_POINTER(fd));
+ gnutls_transport_set_ptr(ssl->gnutls_state, GNUTLS_INT_TO_POINTER(fd));
return 1;
}
@@ -311,7 +304,7 @@ int SSL_pending(SSL * ssl)
void
SSL_set_verify(SSL * ssl, int verify_mode,
- int (*verify_callback) (int, X509_STORE_CTX *))
+ int (*verify_callback)(int, X509_STORE_CTX *))
{
ssl->verify_mode = verify_mode;
ssl->verify_callback = verify_callback;
@@ -480,7 +473,6 @@ int SSL_want(SSL * ssl)
return SSL_NOTHING;
}
-
/* SSL_METHOD functions */
SSL_METHOD *SSLv23_client_method(void)
@@ -490,8 +482,7 @@ SSL_METHOD *SSLv23_client_method(void)
if (!m)
return NULL;
- strcpy(m->priority_string,
- "NORMAL");
+ strcpy(m->priority_string, "NORMAL");
m->connend = GNUTLS_CLIENT;
@@ -505,8 +496,7 @@ SSL_METHOD *SSLv23_server_method(void)
if (!m)
return NULL;
- strcpy(m->priority_string,
- "NORMAL");
+ strcpy(m->priority_string, "NORMAL");
m->connend = GNUTLS_SERVER;
return m;
@@ -568,7 +558,6 @@ SSL_METHOD *TLSv1_server_method(void)
return m;
}
-
/* SSL_CIPHER functions */
SSL_CIPHER *SSL_get_current_cipher(SSL * ssl)
@@ -583,8 +572,7 @@ SSL_CIPHER *SSL_get_current_cipher(SSL * ssl)
ssl->ciphersuite.mac = gnutls_mac_get(ssl->gnutls_state);
ssl->ciphersuite.compression =
gnutls_compression_get(ssl->gnutls_state);
- ssl->ciphersuite.cert =
- gnutls_certificate_type_get(ssl->gnutls_state);
+ ssl->ciphersuite.cert = gnutls_certificate_type_get(ssl->gnutls_state);
return &(ssl->ciphersuite);
}
@@ -638,7 +626,7 @@ char *SSL_CIPHER_description(SSL_CIPHER * cipher, char *buf, int size)
tmpsize = size;
local_alloc = 0;
} else {
- tmpbuf = (char *) malloc(128);
+ tmpbuf = (char *)malloc(128);
tmpsize = 128;
local_alloc = 1;
}
@@ -650,13 +638,12 @@ char *SSL_CIPHER_description(SSL_CIPHER * cipher, char *buf, int size)
gnutls_mac_get_name(cipher->mac)) == -1) {
if (local_alloc)
free(tmpbuf);
- return (char *) "Buffer too small";
+ return (char *)"Buffer too small";
}
return tmpbuf;
}
-
/* X509 functions */
X509_NAME *X509_get_subject_name(const X509 * cert)
@@ -706,13 +693,11 @@ void X509_free(const X509 * cert)
/* only get certificates as const items */
}
-
/* BIO functions */
void BIO_get_fd(gnutls_session_t gnutls_state, int *fd)
{
- gnutls_transport_ptr_t tmp =
- gnutls_transport_get_ptr(gnutls_state);
+ gnutls_transport_ptr_t tmp = gnutls_transport_get_ptr(gnutls_state);
*fd = GNUTLS_POINTER_TO_INT(tmp);
}
@@ -729,7 +714,6 @@ BIO *BIO_new_socket(int sock, int close_flag)
return bio;
}
-
/* error handling */
unsigned long ERR_get_error(void)
@@ -747,7 +731,6 @@ const char *ERR_error_string(unsigned long e, char *buf)
return gnutls_strerror(-1 * e);
}
-
/* RAND functions */
int RAND_status(void)
@@ -792,13 +775,12 @@ int RAND_egd_bytes(const char *path, int bytes)
return bytes;
}
-
/* message digest functions */
void MD5_Init(MD5_CTX * ctx)
{
int ret;
- ret = gnutls_hash_init((void *) &ctx->handle, GNUTLS_DIG_MD5);
+ ret = gnutls_hash_init((void *)&ctx->handle, GNUTLS_DIG_MD5);
if (ret < 0)
abort();
}
@@ -827,7 +809,7 @@ unsigned char *MD5(const unsigned char *buf, unsigned long len,
void RIPEMD160_Init(RIPEMD160_CTX * ctx)
{
int ret;
- ret = gnutls_hash_init((void *) &ctx->handle, GNUTLS_DIG_RMD160);
+ ret = gnutls_hash_init((void *)&ctx->handle, GNUTLS_DIG_RMD160);
if (ret < 0)
abort();
}