summaryrefslogtreecommitdiff
path: root/lib/auth/cert.h
diff options
context:
space:
mode:
Diffstat (limited to 'lib/auth/cert.h')
-rw-r--r--lib/auth/cert.h54
1 files changed, 29 insertions, 25 deletions
diff --git a/lib/auth/cert.h b/lib/auth/cert.h
index 29b7220f7b..d571526c3f 100644
--- a/lib/auth/cert.h
+++ b/lib/auth/cert.h
@@ -22,17 +22,17 @@
*/
#ifndef GNUTLS_LIB_AUTH_CERT_H
-#define GNUTLS_LIB_AUTH_CERT_H
+# define GNUTLS_LIB_AUTH_CERT_H
-#include "auth.h"
-#include <auth/dh_common.h>
-#include <x509/x509_int.h>
-#include <gnutls/abstract.h>
-#include <gnutls/compat.h>
-#include <str_array.h>
-#include "abstract_int.h"
+# include "auth.h"
+# include <auth/dh_common.h>
+# include <x509/x509_int.h>
+# include <gnutls/abstract.h>
+# include <gnutls/compat.h>
+# include <str_array.h>
+# include "abstract_int.h"
-#define MAX_OCSP_RESPONSES 8
+# define MAX_OCSP_RESPONSES 8
/* We use the structure below to hold a certificate chain
* with corresponding public/private key pair. This structure will
@@ -46,7 +46,7 @@ typedef struct {
gnutls_str_array_t names; /* the names in the first certificate */
gnutls_status_request_ocsp_func ocsp_func;
- void *ocsp_func_ptr; /* corresponding OCSP response function + ptr */
+ void *ocsp_func_ptr; /* corresponding OCSP response function + ptr */
gnutls_ocsp_data_st ocsp_data[MAX_OCSP_RESPONSES];
unsigned int ocsp_data_length;
@@ -60,8 +60,8 @@ typedef struct {
*/
typedef struct gnutls_certificate_credentials_st {
gnutls_dh_params_t dh_params;
- unsigned deinit_dh_params; /* if the internal values are set */
- gnutls_sec_param_t dh_sec_param; /* used in RFC7919 negotiation */
+ unsigned deinit_dh_params; /* if the internal values are set */
+ gnutls_sec_param_t dh_sec_param; /* used in RFC7919 negotiation */
/* this callback is used to retrieve the DH or RSA
* parameters.
@@ -80,7 +80,7 @@ typedef struct gnutls_certificate_credentials_st {
/* X509 specific stuff */
gnutls_x509_trust_list_t tlist;
- unsigned flags; /* gnutls_certificate_flags */
+ unsigned flags; /* gnutls_certificate_flags */
unsigned int verify_flags; /* flags to be used at
* certificate verification.
*/
@@ -89,7 +89,7 @@ typedef struct gnutls_certificate_credentials_st {
/* It's a mess here. However we need to keep the old 3 functions
* for compatibility */
- gnutls_certificate_retrieve_function *legacy_cert_cb1; /* deprecated */
+ gnutls_certificate_retrieve_function *legacy_cert_cb1; /* deprecated */
gnutls_certificate_retrieve_function2 *legacy_cert_cb2;
gnutls_certificate_retrieve_function3 *get_cert_callback3;
@@ -101,7 +101,7 @@ typedef struct gnutls_certificate_credentials_st {
/* OCSP */
gnutls_status_request_ocsp_func glob_ocsp_func;
- void *glob_ocsp_func_ptr; /* corresponding OCSP response function */
+ void *glob_ocsp_func_ptr; /* corresponding OCSP response function */
/* This is only used by server to indicate whether this
* credentials can be used for signing in TLS 1.3. */
@@ -148,12 +148,15 @@ int _gnutls_get_selected_cert(gnutls_session_t session,
int
_gnutls_select_client_cert(gnutls_session_t session,
const uint8_t * _data, size_t _data_size,
- gnutls_pk_algorithm_t * pk_algos, int pk_algos_length);
+ gnutls_pk_algorithm_t * pk_algos,
+ int pk_algos_length);
-int _gnutls_pcert_to_auth_info(cert_auth_info_t info, gnutls_pcert_st * certs, size_t ncerts);
+int _gnutls_pcert_to_auth_info(cert_auth_info_t info, gnutls_pcert_st * certs,
+ size_t ncerts);
int
-_gnutls_select_server_cert(gnutls_session_t session, const gnutls_cipher_suite_entry_st *cs);
+_gnutls_select_server_cert(gnutls_session_t session,
+ const gnutls_cipher_suite_entry_st * cs);
void _gnutls_selected_certs_deinit(gnutls_session_t session);
int _gnutls_get_auth_info_pcert(gnutls_pcert_st * gcert,
@@ -170,20 +173,21 @@ int _gnutls_gen_dhe_signature(gnutls_session_t session,
gnutls_buffer_st * data, uint8_t * plain,
unsigned plain_size);
int _gnutls_proc_dhe_signature(gnutls_session_t session, uint8_t * data,
- size_t _data_size,
- gnutls_datum_t * vparams);
+ size_t _data_size, gnutls_datum_t * vparams);
-int _gnutls_gen_rawpk_crt(gnutls_session_t session, gnutls_buffer_st* data);
+int _gnutls_gen_rawpk_crt(gnutls_session_t session, gnutls_buffer_st * data);
int _gnutls_proc_rawpk_crt(gnutls_session_t session,
- uint8_t * data, size_t data_size);
+ uint8_t * data, size_t data_size);
-inline static unsigned get_key_usage(gnutls_session_t session, gnutls_pubkey_t pubkey)
+inline static unsigned get_key_usage(gnutls_session_t session,
+ gnutls_pubkey_t pubkey)
{
if (unlikely(session->internals.priorities &&
- session->internals.priorities->allow_server_key_usage_violation))
+ session->internals.
+ priorities->allow_server_key_usage_violation))
return 0;
else
return pubkey->key_usage;
}
-#endif /* GNUTLS_LIB_AUTH_CERT_H */
+#endif /* GNUTLS_LIB_AUTH_CERT_H */