summaryrefslogtreecommitdiff
path: root/lib/auth/rsa.c
diff options
context:
space:
mode:
Diffstat (limited to 'lib/auth/rsa.c')
-rw-r--r--lib/auth/rsa.c30
1 files changed, 11 insertions, 19 deletions
diff --git a/lib/auth/rsa.c b/lib/auth/rsa.c
index 8108ee841d..62c86e470a 100644
--- a/lib/auth/rsa.c
+++ b/lib/auth/rsa.c
@@ -66,15 +66,16 @@ static
int check_key_usage_for_enc(gnutls_session_t session, unsigned key_usage)
{
if (key_usage != 0) {
- if (!(key_usage & GNUTLS_KEY_KEY_ENCIPHERMENT) && !(key_usage & GNUTLS_KEY_KEY_AGREEMENT)) {
+ if (!(key_usage & GNUTLS_KEY_KEY_ENCIPHERMENT)
+ && !(key_usage & GNUTLS_KEY_KEY_AGREEMENT)) {
gnutls_assert();
if (session->internals.allow_key_usage_violation == 0) {
_gnutls_audit_log(session,
- "Peer's certificate does not allow encryption. Key usage violation detected.\n");
+ "Peer's certificate does not allow encryption. Key usage violation detected.\n");
return GNUTLS_E_KEY_USAGE_VIOLATION;
} else {
_gnutls_audit_log(session,
- "Peer's certificate does not allow encryption. Key usage violation detected (ignored).\n");
+ "Peer's certificate does not allow encryption. Key usage violation detected (ignored).\n");
}
}
}
@@ -115,7 +116,6 @@ _gnutls_get_public_rsa_params(gnutls_session_t session,
gnutls_assert();
return GNUTLS_E_INTERNAL_ERROR;
}
-
// Get the negotiated server certificate type
cert_type = get_certificate_type(session, GNUTLS_CTYPE_SERVER);
@@ -145,15 +145,14 @@ _gnutls_get_public_rsa_params(gnutls_session_t session,
gnutls_pcert_deinit(&peer_cert);
return 0;
- cleanup2:
+ cleanup2:
gnutls_pcert_deinit(&peer_cert);
return ret;
}
static int
-proc_rsa_client_kx(gnutls_session_t session, uint8_t * data,
- size_t _data_size)
+proc_rsa_client_kx(gnutls_session_t session, uint8_t * data, size_t _data_size)
{
const char attack_error[] = "auth_rsa: Possible PKCS #1 attack\n";
gnutls_datum_t ciphertext;
@@ -233,7 +232,7 @@ proc_rsa_client_kx(gnutls_session_t session, uint8_t * data,
ok &= CONSTCHECK_EQUAL(session->key.key.data[0], ver_maj);
/* if check_ver_min then session->key.key.data[1] must equal ver_min */
ok &= CONSTCHECK_NOT_EQUAL(check_ver_min, 0) &
- CONSTCHECK_EQUAL(session->key.key.data[1], ver_min);
+ CONSTCHECK_EQUAL(session->key.key.data[1], ver_min);
if (ok) {
/* call logging function unconditionally so all branches are
@@ -253,13 +252,9 @@ proc_rsa_client_kx(gnutls_session_t session, uint8_t * data,
return 0;
}
-
-
/* return RSA(random) using the peers public key
*/
-int
-_gnutls_gen_rsa_client_kx(gnutls_session_t session,
- gnutls_buffer_st * data)
+int _gnutls_gen_rsa_client_kx(gnutls_session_t session, gnutls_buffer_st * data)
{
cert_auth_info_t auth = session->key.auth_info;
gnutls_datum_t sdata; /* data to send */
@@ -283,7 +278,7 @@ _gnutls_gen_rsa_client_kx(gnutls_session_t session,
}
ret = gnutls_rnd(GNUTLS_RND_RANDOM, session->key.key.data,
- session->key.key.size);
+ session->key.key.size);
if (ret < 0) {
gnutls_assert();
return ret;
@@ -317,19 +312,16 @@ _gnutls_gen_rsa_client_kx(gnutls_session_t session,
if (ret < 0)
return gnutls_assert_val(ret);
-
#ifdef ENABLE_SSL3
if (get_num_version(session) == GNUTLS_SSL3) {
/* SSL 3.0 */
- ret =
- _gnutls_buffer_append_data(data, sdata.data,
- sdata.size);
+ ret = _gnutls_buffer_append_data(data, sdata.data, sdata.size);
_gnutls_free_datum(&sdata);
return ret;
} else
#endif
- { /* TLS 1.x */
+ { /* TLS 1.x */
ret =
_gnutls_buffer_append_data_prefix(data, 16, sdata.data,
sdata.size);