summaryrefslogtreecommitdiff
path: root/lib/auth/srp_rsa.c
diff options
context:
space:
mode:
Diffstat (limited to 'lib/auth/srp_rsa.c')
-rw-r--r--lib/auth/srp_rsa.c42
1 files changed, 21 insertions, 21 deletions
diff --git a/lib/auth/srp_rsa.c b/lib/auth/srp_rsa.c
index 2627189e62..13b2664608 100644
--- a/lib/auth/srp_rsa.c
+++ b/lib/auth/srp_rsa.c
@@ -24,20 +24,20 @@
#ifdef ENABLE_SRP
-#include "errors.h"
-#include <auth/srp_passwd.h>
-#include "auth.h"
-#include "auth.h"
-#include "srp.h"
-#include "debug.h"
-#include "num.h"
-#include <auth/srp_kx.h>
-#include <str.h>
-#include <auth/cert.h>
-#include <datum.h>
-#include <tls-sig.h>
-#include <x509.h>
-#include <algorithms.h>
+# include "errors.h"
+# include <auth/srp_passwd.h>
+# include "auth.h"
+# include "auth.h"
+# include "srp.h"
+# include "debug.h"
+# include "num.h"
+# include <auth/srp_kx.h>
+# include <str.h>
+# include <auth/cert.h>
+# include <datum.h>
+# include <tls-sig.h>
+# include <x509.h>
+# include <algorithms.h>
static int gen_srp_cert_server_kx(gnutls_session_t, gnutls_buffer_st *);
static int proc_srp_cert_server_kx(gnutls_session_t, uint8_t *, size_t);
@@ -100,7 +100,7 @@ gen_srp_cert_server_kx(gnutls_session_t session, gnutls_buffer_st * data)
return ret;
ddata.data = &data->data[init_pos];
- ddata.size = data->length-init_pos;
+ ddata.size = data->length - init_pos;
cred = (gnutls_certificate_credentials_t)
_gnutls_get_cred(session, GNUTLS_CRD_CERTIFICATE);
@@ -112,8 +112,7 @@ gen_srp_cert_server_kx(gnutls_session_t session, gnutls_buffer_st * data)
/* find the appropriate certificate */
if ((ret =
_gnutls_get_selected_cert(session, &apr_cert_list,
- &apr_cert_list_length,
- &apr_pkey)) < 0) {
+ &apr_cert_list_length, &apr_pkey)) < 0) {
gnutls_assert();
return ret;
}
@@ -163,7 +162,7 @@ gen_srp_cert_server_kx(gnutls_session_t session, gnutls_buffer_st * data)
ret = data->length - init_pos;
- cleanup:
+ cleanup:
_gnutls_free_datum(&signature);
return ret;
}
@@ -200,7 +199,8 @@ proc_srp_cert_server_kx(gnutls_session_t session, uint8_t * data,
return GNUTLS_E_INSUFFICIENT_CREDENTIALS;
}
- vflags = cred->verify_flags | session->internals.additional_verify_flags;
+ vflags =
+ cred->verify_flags | session->internals.additional_verify_flags;
info = _gnutls_get_auth_info(session, GNUTLS_CRD_CERTIFICATE);
if (info == NULL || info->ncerts == 0) {
@@ -241,7 +241,8 @@ proc_srp_cert_server_kx(gnutls_session_t session, uint8_t * data,
ret =
_gnutls_get_auth_info_pcert(&peer_cert,
- session->security_parameters.server_ctype, info);
+ session->
+ security_parameters.server_ctype, info);
if (ret < 0) {
gnutls_assert();
@@ -261,5 +262,4 @@ proc_srp_cert_server_kx(gnutls_session_t session, uint8_t * data,
return 0;
}
-
#endif /* ENABLE_SRP */