diff options
Diffstat (limited to 'lib/x509/output.c')
-rw-r--r-- | lib/x509/output.c | 1006 |
1 files changed, 432 insertions, 574 deletions
diff --git a/lib/x509/output.c b/lib/x509/output.c index 182155fda6..a984652115 100644 --- a/lib/x509/output.c +++ b/lib/x509/output.c @@ -36,11 +36,11 @@ #define addf _gnutls_buffer_append_printf #define adds _gnutls_buffer_append_str -#define NON_NULL(x) (((x)!=NULL)?((char*)(x)):"") -#define ERROR_STR (char*) "(error)" +#define NON_NULL(x) (((x) != NULL) ? ((char *)(x)) : "") +#define ERROR_STR (char *)"(error)" -static void print_idn_name(gnutls_buffer_st * str, const char *prefix, - const char *type, gnutls_datum_t * name) +static void print_idn_name(gnutls_buffer_st *str, const char *prefix, + const char *type, gnutls_datum_t *name) { unsigned printable = 1; unsigned is_printed = 0; @@ -57,9 +57,8 @@ static void print_idn_name(gnutls_buffer_st * str, const char *prefix, is_printed = 1; } else if (name->data != NULL) { if (strstr((char *)name->data, "xn--") != NULL) { - ret = - gnutls_idna_reverse_map((char *)name->data, - name->size, &out, 0); + ret = gnutls_idna_reverse_map((char *)name->data, + name->size, &out, 0); if (ret >= 0) { addf(str, _("%s%s: %.*s (%s)\n"), prefix, type, name->size, NON_NULL(name->data), @@ -76,8 +75,8 @@ static void print_idn_name(gnutls_buffer_st * str, const char *prefix, } } -static void print_idn_email(gnutls_buffer_st * str, const char *prefix, - const char *type, gnutls_datum_t * name) +static void print_idn_email(gnutls_buffer_st *str, const char *prefix, + const char *type, gnutls_datum_t *name) { unsigned printable = 1; unsigned is_printed = 0; @@ -94,9 +93,8 @@ static void print_idn_email(gnutls_buffer_st * str, const char *prefix, is_printed = 1; } else if (name->data != NULL) { if (strstr((char *)name->data, "xn--") != NULL) { - ret = - _gnutls_idna_email_reverse_map((char *)name->data, - name->size, &out); + ret = _gnutls_idna_email_reverse_map((char *)name->data, + name->size, &out); if (ret >= 0) { addf(str, _("%s%s: %.*s (%s)\n"), prefix, type, name->size, NON_NULL(name->data), @@ -113,23 +111,20 @@ static void print_idn_email(gnutls_buffer_st * str, const char *prefix, } } -static void -print_name(gnutls_buffer_st * str, const char *prefix, unsigned type, - gnutls_datum_t * name, unsigned ip_is_cidr) +static void print_name(gnutls_buffer_st *str, const char *prefix, unsigned type, + gnutls_datum_t *name, unsigned ip_is_cidr) { char *sname = (char *)name->data; char str_ip[64]; const char *p; - if ((type == GNUTLS_SAN_DNSNAME || type == GNUTLS_SAN_OTHERNAME_XMPP - || type == GNUTLS_SAN_OTHERNAME_KRB5PRINCIPAL - || type == GNUTLS_SAN_OTHERNAME_MSUSERPRINCIPAL - || type == GNUTLS_SAN_RFC822NAME - || type == GNUTLS_SAN_URI) && sname != NULL - && strlen(sname) != name->size) { - adds(str, - _("warning: SAN contains an embedded NUL, " - "replacing with '!'\n")); + if ((type == GNUTLS_SAN_DNSNAME || type == GNUTLS_SAN_OTHERNAME_XMPP || + type == GNUTLS_SAN_OTHERNAME_KRB5PRINCIPAL || + type == GNUTLS_SAN_OTHERNAME_MSUSERPRINCIPAL || + type == GNUTLS_SAN_RFC822NAME || type == GNUTLS_SAN_URI) && + sname != NULL && strlen(sname) != name->size) { + adds(str, _("warning: SAN contains an embedded NUL, " + "replacing with '!'\n")); while (strlen(sname) < name->size) name->data[strlen(sname)] = '!'; } @@ -311,7 +306,7 @@ static char *crl_get_sign_name(gnutls_x509_crl_t crl, int *algo) return gnutls_strdup(oid); } -static void print_proxy(gnutls_buffer_st * str, gnutls_datum_t * der) +static void print_proxy(gnutls_buffer_st *str, gnutls_datum_t *der) { int pathlen; char *policyLanguage; @@ -346,8 +341,8 @@ static void print_proxy(gnutls_buffer_st * str, gnutls_datum_t * der) gnutls_free(policyLanguage); } -static void print_nc(gnutls_buffer_st * str, const char *prefix, - gnutls_datum_t * der) +static void print_nc(gnutls_buffer_st *str, const char *prefix, + gnutls_datum_t *der) { gnutls_x509_name_constraints_t nc; int ret; @@ -367,9 +362,8 @@ static void print_nc(gnutls_buffer_st * str, const char *prefix, snprintf(new_prefix, sizeof(new_prefix), "%s\t\t\t\t", prefix); do { - ret = - gnutls_x509_name_constraints_get_permitted(nc, idx++, &type, - &name); + ret = gnutls_x509_name_constraints_get_permitted(nc, idx++, + &type, &name); if (ret >= 0) { if (idx == 1) @@ -381,9 +375,8 @@ static void print_nc(gnutls_buffer_st * str, const char *prefix, idx = 0; do { - ret = - gnutls_x509_name_constraints_get_excluded(nc, idx++, &type, - &name); + ret = gnutls_x509_name_constraints_get_excluded(nc, idx++, + &type, &name); if (ret >= 0) { if (idx == 1) @@ -393,11 +386,11 @@ static void print_nc(gnutls_buffer_st * str, const char *prefix, } } while (ret == 0); - cleanup: +cleanup: gnutls_x509_name_constraints_deinit(nc); } -static void print_aia(gnutls_buffer_st * str, const gnutls_datum_t * der) +static void print_aia(gnutls_buffer_st *str, const gnutls_datum_t *der) { int err; int seq; @@ -439,11 +432,11 @@ static void print_aia(gnutls_buffer_st * str, const gnutls_datum_t * der) print_name(str, "", san_type, &san, 0); } - cleanup: +cleanup: gnutls_x509_aia_deinit(aia); } -static void print_ski(gnutls_buffer_st * str, gnutls_datum_t * der) +static void print_ski(gnutls_buffer_st *str, gnutls_datum_t *der) { gnutls_datum_t id = { NULL, 0 }; int err; @@ -462,7 +455,7 @@ static void print_ski(gnutls_buffer_st * str, gnutls_datum_t * der) gnutls_free(id.data); } -static void print_time(gnutls_buffer_st * str, time_t timestamp) +static void print_time(gnutls_buffer_st *str, time_t timestamp) { char s[42]; size_t max = sizeof(s); @@ -479,7 +472,7 @@ static void print_time(gnutls_buffer_st * str, time_t timestamp) addf(str, "%s\n", s); } -static void print_scts(gnutls_buffer_st * str, const gnutls_datum_t * der, +static void print_scts(gnutls_buffer_st *str, const gnutls_datum_t *der, const char *prefix) { int retval; @@ -518,9 +511,8 @@ static void print_scts(gnutls_buffer_st * str, const gnutls_datum_t * der, continue; } - retval = gnutls_x509_ct_sct_get(scts, i, - ×tamp, - &logid, &sigalg, &sig); + retval = gnutls_x509_ct_sct_get(scts, i, ×tamp, &logid, + &sigalg, &sig); if (retval < 0) { addf(str, "error: could not get SCT info: %s\n", gnutls_strerror(retval)); @@ -533,10 +525,11 @@ static void print_scts(gnutls_buffer_st * str, const gnutls_datum_t * der, addf(str, "\n"); addf(str, _("%s\t\t\t\tTime: "), prefix); print_time(str, timestamp); - addf(str, _("%s\t\t\t\tExtensions: none\n"), /* there are no extensions defined for v1 */ + addf(str, + _("%s\t\t\t\tExtensions: none\n"), /* there are no extensions defined for v1 */ prefix); - addf(str, _("%s\t\t\t\tSignature algorithm: %s\n"), - prefix, gnutls_sign_get_name(sigalg)); + addf(str, _("%s\t\t\t\tSignature algorithm: %s\n"), prefix, + gnutls_sign_get_name(sigalg)); addf(str, _("%s\t\t\t\tSignature: "), prefix); _gnutls_buffer_hexprint(str, sig.data, sig.size); addf(str, "\n"); @@ -547,7 +540,7 @@ static void print_scts(gnutls_buffer_st * str, const gnutls_datum_t * der, logid.data = NULL; } - cleanup: +cleanup: _gnutls_free_datum(&sig); _gnutls_free_datum(&logid); gnutls_x509_ext_ct_scts_deinit(scts); @@ -561,16 +554,14 @@ typedef union { gnutls_x509_crq_t crq; } cert_type_t; -static void print_aki_gn_serial(gnutls_buffer_st * str, gnutls_x509_aki_t aki) +static void print_aki_gn_serial(gnutls_buffer_st *str, gnutls_x509_aki_t aki) { gnutls_datum_t san, other_oid, serial; unsigned int alt_type; int err; - err = - gnutls_x509_aki_get_cert_issuer(aki, - 0, &alt_type, &san, &other_oid, - &serial); + err = gnutls_x509_aki_get_cert_issuer(aki, 0, &alt_type, &san, + &other_oid, &serial); if (err == GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE) { return; } else if (err < 0) { @@ -586,7 +577,7 @@ static void print_aki_gn_serial(gnutls_buffer_st * str, gnutls_x509_aki_t aki) adds(str, "\n"); } -static void print_aki(gnutls_buffer_st * str, gnutls_datum_t * der) +static void print_aki(gnutls_buffer_st *str, gnutls_datum_t *der) { int err; gnutls_x509_aki_t aki; @@ -623,13 +614,12 @@ static void print_aki(gnutls_buffer_st * str, gnutls_datum_t * der) _gnutls_buffer_hexprint(str, id.data, id.size); adds(str, "\n"); - cleanup: +cleanup: gnutls_x509_aki_deinit(aki); } -static void -print_key_usage2(gnutls_buffer_st * str, const char *prefix, - unsigned int key_usage) +static void print_key_usage2(gnutls_buffer_st *str, const char *prefix, + unsigned int key_usage) { if (key_usage & GNUTLS_KEY_DIGITAL_SIGNATURE) addf(str, _("%sDigital signature.\n"), prefix); @@ -651,9 +641,8 @@ print_key_usage2(gnutls_buffer_st * str, const char *prefix, addf(str, _("%sKey decipher only.\n"), prefix); } -static void -print_key_usage(gnutls_buffer_st * str, const char *prefix, - gnutls_datum_t * der) +static void print_key_usage(gnutls_buffer_st *str, const char *prefix, + gnutls_datum_t *der) { unsigned int key_usage; int err; @@ -667,9 +656,9 @@ print_key_usage(gnutls_buffer_st * str, const char *prefix, print_key_usage2(str, prefix, key_usage); } -static void -print_private_key_usage_period(gnutls_buffer_st * str, const char *prefix, - gnutls_datum_t * der) +static void print_private_key_usage_period(gnutls_buffer_st *str, + const char *prefix, + gnutls_datum_t *der) { time_t activation, expiration; int err; @@ -677,9 +666,8 @@ print_private_key_usage_period(gnutls_buffer_st * str, const char *prefix, struct tm t; size_t max; - err = - gnutls_x509_ext_import_private_key_usage_period(der, &activation, - &expiration); + err = gnutls_x509_ext_import_private_key_usage_period(der, &activation, + &expiration); if (err < 0) { addf(str, "error: get_private_key_usage_period: %s\n", gnutls_strerror(err)); @@ -701,10 +689,9 @@ print_private_key_usage_period(gnutls_buffer_st * str, const char *prefix, addf(str, "error: strftime (%ld)\n", (unsigned long)expiration); else addf(str, _("\t\t\tNot After: %s\n"), s); - } -static void print_crldist(gnutls_buffer_st * str, gnutls_datum_t * der) +static void print_crldist(gnutls_buffer_st *str, gnutls_datum_t *der) { int err; int indx; @@ -727,9 +714,8 @@ static void print_crldist(gnutls_buffer_st * str, gnutls_datum_t * der) } for (indx = 0;; indx++) { - err = - gnutls_x509_crl_dist_points_get(dp, indx, &type, &dist, - &flags); + err = gnutls_x509_crl_dist_points_get(dp, indx, &type, &dist, + &flags); if (err == GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE) goto cleanup; else if (err < 0) { @@ -740,13 +726,12 @@ static void print_crldist(gnutls_buffer_st * str, gnutls_datum_t * der) print_name(str, "\t\t\t", type, &dist, 0); } - cleanup: +cleanup: gnutls_x509_crl_dist_points_deinit(dp); } -static void -print_key_purpose(gnutls_buffer_st * str, const char *prefix, - gnutls_datum_t * der) +static void print_key_purpose(gnutls_buffer_st *str, const char *prefix, + gnutls_datum_t *der) { int indx; gnutls_datum_t oid; @@ -800,12 +785,12 @@ print_key_purpose(gnutls_buffer_st * str, const char *prefix, else addf(str, "%s\t\t\t%s\n", prefix, p); } - cleanup: +cleanup: gnutls_x509_key_purpose_deinit(purposes); } -static void -print_basic(gnutls_buffer_st * str, const char *prefix, gnutls_datum_t * der) +static void print_basic(gnutls_buffer_st *str, const char *prefix, + gnutls_datum_t *der) { int pathlen; unsigned ca; @@ -826,12 +811,12 @@ print_basic(gnutls_buffer_st * str, const char *prefix, gnutls_datum_t * der) prefix); if (pathlen >= 0) - addf(str, _("%s\t\t\tPath Length Constraint: %d\n"), - prefix, pathlen); + addf(str, _("%s\t\t\tPath Length Constraint: %d\n"), prefix, + pathlen); } -static void -print_altname(gnutls_buffer_st * str, const char *prefix, gnutls_datum_t * der) +static void print_altname(gnutls_buffer_st *str, const char *prefix, + gnutls_datum_t *der) { unsigned int altname_idx; gnutls_subject_alt_names_t names; @@ -857,13 +842,12 @@ print_altname(gnutls_buffer_st * str, const char *prefix, gnutls_datum_t * der) } for (altname_idx = 0;; altname_idx++) { - err = gnutls_subject_alt_names_get(names, altname_idx, - &type, &san, &othername); + err = gnutls_subject_alt_names_get(names, altname_idx, &type, + &san, &othername); if (err == GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE) break; else if (err < 0) { - addf(str, - "error: gnutls_subject_alt_names_get: %s\n", + addf(str, "error: gnutls_subject_alt_names_get: %s\n", gnutls_strerror(err)); break; } @@ -872,10 +856,8 @@ print_altname(gnutls_buffer_st * str, const char *prefix, gnutls_datum_t * der) unsigned vtype; gnutls_datum_t virt; - err = gnutls_x509_othername_to_virtual((char *) - othername.data, - &san, &vtype, - &virt); + err = gnutls_x509_othername_to_virtual( + (char *)othername.data, &san, &vtype, &virt); if (err >= 0) { snprintf(pfx, sizeof(pfx), "%s\t\t\t", prefix); print_name(str, pfx, vtype, &virt, 0); @@ -883,10 +865,8 @@ print_altname(gnutls_buffer_st * str, const char *prefix, gnutls_datum_t * der) continue; } - addf(str, - _("%s\t\t\totherName OID: %.*s\n"), - prefix, (int)othername.size, - (char *)othername.data); + addf(str, _("%s\t\t\totherName OID: %.*s\n"), prefix, + (int)othername.size, (char *)othername.data); addf(str, _("%s\t\t\totherName DER: "), prefix); _gnutls_buffer_hexprint(str, san.data, san.size); addf(str, _("\n%s\t\t\totherName ASCII: "), prefix); @@ -894,18 +874,17 @@ print_altname(gnutls_buffer_st * str, const char *prefix, gnutls_datum_t * der) san.size); addf(str, "\n"); } else { - snprintf(pfx, sizeof(pfx), "%s\t\t\t", prefix); print_name(str, pfx, type, &san, 0); } } - cleanup: +cleanup: gnutls_subject_alt_names_deinit(names); } -static void -guiddump(gnutls_buffer_st * str, const char *data, size_t len, const char *spc) +static void guiddump(gnutls_buffer_st *str, const char *data, size_t len, + const char *spc) { size_t j; @@ -932,18 +911,18 @@ guiddump(gnutls_buffer_st * str, const char *data, size_t len, const char *spc) addf(str, "}\n"); } -static void -print_unique_ids(gnutls_buffer_st * str, const gnutls_x509_crt_t cert) +static void print_unique_ids(gnutls_buffer_st *str, + const gnutls_x509_crt_t cert) { int result; - char buf[256]; /* if its longer, we won't bother to print it */ + char buf[256]; /* if its longer, we won't bother to print it */ size_t buf_size = 256; result = gnutls_x509_crt_get_issuer_unique_id(cert, buf, &buf_size); if (result >= 0) { addf(str, ("\tIssuer Unique ID:\n")); _gnutls_buffer_hexdump(str, buf, buf_size, "\t\t\t"); - if (buf_size == 16) { /* this could be a GUID */ + if (buf_size == 16) { /* this could be a GUID */ guiddump(str, buf, buf_size, "\t\t\t"); } } @@ -953,14 +932,14 @@ print_unique_ids(gnutls_buffer_st * str, const gnutls_x509_crt_t cert) if (result >= 0) { addf(str, ("\tSubject Unique ID:\n")); _gnutls_buffer_hexdump(str, buf, buf_size, "\t\t\t"); - if (buf_size == 16) { /* this could be a GUID */ + if (buf_size == 16) { /* this could be a GUID */ guiddump(str, buf, buf_size, "\t\t\t"); } } } -static void print_tlsfeatures(gnutls_buffer_st * str, const char *prefix, - const gnutls_datum_t * der) +static void print_tlsfeatures(gnutls_buffer_st *str, const char *prefix, + const gnutls_datum_t *der) { int err; int seq; @@ -995,19 +974,18 @@ static void print_tlsfeatures(gnutls_buffer_st * str, const char *prefix, addf(str, "%s\t\t\t%s(%u)\n", prefix, name, feature); } - cleanup: +cleanup: gnutls_x509_tlsfeatures_deinit(features); } -static void print_subject_sign_tool(gnutls_buffer_st * str, const char *prefix, - const gnutls_datum_t * der) +static void print_subject_sign_tool(gnutls_buffer_st *str, const char *prefix, + const gnutls_datum_t *der) { int ret; gnutls_datum_t tmp = { NULL, 0 }; - ret = - _gnutls_x509_decode_string(ASN1_ETYPE_UTF8_STRING, der->data, - der->size, &tmp, 0); + ret = _gnutls_x509_decode_string(ASN1_ETYPE_UTF8_STRING, der->data, + der->size, &tmp, 0); if (ret < 0) { addf(str, _("%s\t\t\tASCII: "), prefix); _gnutls_buffer_asciiprint(str, (char *)der->data, der->size); @@ -1024,17 +1002,17 @@ static void print_subject_sign_tool(gnutls_buffer_st * str, const char *prefix, _gnutls_free_datum(&tmp); } -static void print_issuer_sign_tool(gnutls_buffer_st * str, const char *prefix, - const gnutls_datum_t * der) +static void print_issuer_sign_tool(gnutls_buffer_st *str, const char *prefix, + const gnutls_datum_t *der) { int ret; asn1_node tmpasn = NULL; char asn1_err[ASN1_MAX_ERROR_DESCRIPTION_SIZE] = ""; gnutls_datum_t tmp; - if (asn1_create_element - (_gnutls_get_gnutls_asn(), "GNUTLS.IssuerSignTool", - &tmpasn) != ASN1_SUCCESS) { + if (asn1_create_element(_gnutls_get_gnutls_asn(), + "GNUTLS.IssuerSignTool", + &tmpasn) != ASN1_SUCCESS) { gnutls_assert(); goto hexdump; } @@ -1086,7 +1064,7 @@ static void print_issuer_sign_tool(gnutls_buffer_st * str, const char *prefix, return; - hexdump: +hexdump: asn1_delete_structure(&tmpasn); addf(str, _("%s\t\t\tASCII: "), prefix); @@ -1098,7 +1076,10 @@ static void print_issuer_sign_tool(gnutls_buffer_st * str, const char *prefix, adds(str, "\n"); } -#define ENTRY(oid, name) {oid, sizeof(oid)-1, name, sizeof(name)-1, NULL, 0} +#define ENTRY(oid, name) \ + { \ + oid, sizeof(oid) - 1, name, sizeof(name) - 1, NULL, 0 \ + } static const struct oid_to_string cp_oid2str[] = { ENTRY("2.5.29.32.0", "anyPolicy"), @@ -1116,7 +1097,7 @@ static const struct oid_to_string cp_oid2str[] = { ENTRY("1.2.643.100.113.5", "Russian security class KB2"), ENTRY("1.2.643.100.113.6", "Russian security class KA1"), - {NULL, 0, NULL, 0}, + { NULL, 0, NULL, 0 }, }; struct ext_indexes_st { @@ -1132,9 +1113,9 @@ struct ext_indexes_st { int tlsfeatures; }; -static void print_extension(gnutls_buffer_st * str, const char *prefix, +static void print_extension(gnutls_buffer_st *str, const char *prefix, struct ext_indexes_st *idx, const char *oid, - unsigned critical, gnutls_datum_t * der) + unsigned critical, gnutls_datum_t *der) { int err; unsigned j; @@ -1145,8 +1126,8 @@ static void print_extension(gnutls_buffer_st * str, const char *prefix, addf(str, "warning: more than one basic constraint\n"); } - addf(str, _("%s\t\tBasic Constraints (%s):\n"), - prefix, critical ? _("critical") : _("not critical")); + addf(str, _("%s\t\tBasic Constraints (%s):\n"), prefix, + critical ? _("critical") : _("not critical")); print_basic(str, prefix, der); idx->basic++; @@ -1156,9 +1137,8 @@ static void print_extension(gnutls_buffer_st * str, const char *prefix, addf(str, "warning: more than one SKI extension\n"); } - addf(str, - _("%s\t\tSubject Key Identifier (%s):\n"), - prefix, critical ? _("critical") : _("not critical")); + addf(str, _("%s\t\tSubject Key Identifier (%s):\n"), prefix, + critical ? _("critical") : _("not critical")); print_ski(str, der); @@ -1172,16 +1152,14 @@ static void print_extension(gnutls_buffer_st * str, const char *prefix, err = gnutls_x509_policies_init(&policies); if (err < 0) { - addf(str, - "error: certificate policies: %s\n", + addf(str, "error: certificate policies: %s\n", gnutls_strerror(err)); return; } err = gnutls_x509_ext_import_policies(der, policies, 0); if (err < 0) { - addf(str, - "error: certificate policies import: %s\n", + addf(str, "error: certificate policies import: %s\n", gnutls_strerror(err)); gnutls_x509_policies_deinit(policies); return; @@ -1193,18 +1171,16 @@ static void print_extension(gnutls_buffer_st * str, const char *prefix, break; if (err < 0) { - addf(str, - "error: certificate policy: %s\n", + addf(str, "error: certificate policy: %s\n", gnutls_strerror(err)); break; } if (x == 0) - addf(str, - "%s\t\tCertificate Policies (%s):\n", + addf(str, "%s\t\tCertificate Policies (%s):\n", prefix, critical ? _("critical") : - _("not critical")); + _("not critical")); entry = _gnutls_oid_get_entry(cp_oid2str, policy.oid); if (entry != NULL && entry->name_desc != NULL) @@ -1221,8 +1197,8 @@ static void print_extension(gnutls_buffer_st * str, const char *prefix, name = "Note"; else name = "Unknown qualifier"; - addf(str, "%s\t\t\t\t%s: %s\n", - prefix, name, policy.qualifier[j].data); + addf(str, "%s\t\t\t\t%s: %s\n", prefix, name, + policy.qualifier[j].data); } } gnutls_x509_policies_deinit(policies); @@ -1237,20 +1213,17 @@ static void print_extension(gnutls_buffer_st * str, const char *prefix, return; } - addf(str, - "%s\t\tInhibit anyPolicy skip certs: %u (%s)\n", + addf(str, "%s\t\tInhibit anyPolicy skip certs: %u (%s)\n", prefix, skipcerts, critical ? _("critical") : _("not critical")); } else if (strcmp(oid, "2.5.29.35") == 0) { - if (idx->aki) { addf(str, "warning: more than one AKI extension\n"); } - addf(str, - _("%s\t\tAuthority Key Identifier (%s):\n"), - prefix, critical ? _("critical") : _("not critical")); + addf(str, _("%s\t\tAuthority Key Identifier (%s):\n"), prefix, + critical ? _("critical") : _("not critical")); print_aki(str, der); @@ -1274,9 +1247,8 @@ static void print_extension(gnutls_buffer_st * str, const char *prefix, "warning: more than one private key usage period extension\n"); } - addf(str, - _("%s\t\tPrivate Key Usage Period (%s):\n"), - prefix, critical ? _("critical") : _("not critical")); + addf(str, _("%s\t\tPrivate Key Usage Period (%s):\n"), prefix, + critical ? _("critical") : _("not critical")); print_private_key_usage_period(str, prefix, der); @@ -1297,9 +1269,8 @@ static void print_extension(gnutls_buffer_st * str, const char *prefix, addf(str, "warning: more than one SKI extension\n"); } - addf(str, - _("%s\t\tSubject Alternative Name (%s):\n"), - prefix, critical ? _("critical") : _("not critical")); + addf(str, _("%s\t\tSubject Alternative Name (%s):\n"), prefix, + critical ? _("critical") : _("not critical")); print_altname(str, prefix, der); idx->san++; } else if (strcmp(oid, "2.5.29.18") == 0) { @@ -1308,9 +1279,8 @@ static void print_extension(gnutls_buffer_st * str, const char *prefix, "warning: more than one Issuer AltName extension\n"); } - addf(str, - _("%s\t\tIssuer Alternative Name (%s):\n"), - prefix, critical ? _("critical") : _("not critical")); + addf(str, _("%s\t\tIssuer Alternative Name (%s):\n"), prefix, + critical ? _("critical") : _("not critical")); print_altname(str, prefix, der); @@ -1321,9 +1291,8 @@ static void print_extension(gnutls_buffer_st * str, const char *prefix, "warning: more than one CRL distribution point\n"); } - addf(str, - _("%s\t\tCRL Distribution points (%s):\n"), - prefix, critical ? _("critical") : _("not critical")); + addf(str, _("%s\t\tCRL Distribution points (%s):\n"), prefix, + critical ? _("critical") : _("not critical")); print_crldist(str, der); idx->crldist++; @@ -1332,23 +1301,22 @@ static void print_extension(gnutls_buffer_st * str, const char *prefix, addf(str, "warning: more than one proxy extension\n"); } - addf(str, - _ - ("%s\t\tProxy Certificate Information (%s):\n"), + addf(str, _("%s\t\tProxy Certificate Information (%s):\n"), prefix, critical ? _("critical") : _("not critical")); print_proxy(str, der); idx->proxy++; } else if (strcmp(oid, "1.3.6.1.5.5.7.1.1") == 0) { - addf(str, _("%s\t\tAuthority Information " - "Access (%s):\n"), prefix, - critical ? _("critical") : _("not critical")); + addf(str, + _("%s\t\tAuthority Information " + "Access (%s):\n"), + prefix, critical ? _("critical") : _("not critical")); print_aia(str, der); } else if (strcmp(oid, GNUTLS_X509EXT_OID_CT_SCT_V1) == 0) { - addf(str, _("%s\t\tCT Precertificate SCTs (%s):\n"), - prefix, critical ? _("critical") : _("not critical")); + addf(str, _("%s\t\tCT Precertificate SCTs (%s):\n"), prefix, + critical ? _("critical") : _("not critical")); print_scts(str, der, prefix); } else if (strcmp(oid, "2.5.29.30") == 0) { @@ -1368,32 +1336,31 @@ static void print_extension(gnutls_buffer_st * str, const char *prefix, "warning: more than one tlsfeatures extension\n"); } - addf(str, _("%s\t\tTLS Features (%s):\n"), - prefix, critical ? _("critical") : _("not critical")); + addf(str, _("%s\t\tTLS Features (%s):\n"), prefix, + critical ? _("critical") : _("not critical")); print_tlsfeatures(str, prefix, der); idx->tlsfeatures++; } else if (strcmp(oid, "1.2.643.100.111") == 0) { - addf(str, _("%s\t\tSubject Signing Tool(%s):\n"), - prefix, critical ? _("critical") : _("not critical")); + addf(str, _("%s\t\tSubject Signing Tool(%s):\n"), prefix, + critical ? _("critical") : _("not critical")); print_subject_sign_tool(str, prefix, der); } else if (strcmp(oid, "1.2.643.100.112") == 0) { - addf(str, _("%s\t\tIssuer Signing Tool(%s):\n"), - prefix, critical ? _("critical") : _("not critical")); + addf(str, _("%s\t\tIssuer Signing Tool(%s):\n"), prefix, + critical ? _("critical") : _("not critical")); print_issuer_sign_tool(str, prefix, der); } else if (strcmp(oid, "2.5.4.3") == 0) { int ret; gnutls_datum_t tmp = { NULL, 0 }; - addf(str, _("%s\t\tCommon Name (%s):\n"), - prefix, critical ? _("critical") : _("not critical")); + addf(str, _("%s\t\tCommon Name (%s):\n"), prefix, + critical ? _("critical") : _("not critical")); - ret = - _gnutls_x509_decode_string(ASN1_ETYPE_PRINTABLE_STRING, - der->data, der->size, &tmp, 0); + ret = _gnutls_x509_decode_string(ASN1_ETYPE_PRINTABLE_STRING, + der->data, der->size, &tmp, 0); if (ret < 0) { addf(str, "error: x509_decode_string: %s\n", gnutls_strerror(ret)); @@ -1402,8 +1369,8 @@ static void print_extension(gnutls_buffer_st * str, const char *prefix, gnutls_free(tmp.data); } } else { - addf(str, _("%s\t\tUnknown extension %s (%s):\n"), - prefix, oid, critical ? _("critical") : _("not critical")); + addf(str, _("%s\t\tUnknown extension %s (%s):\n"), prefix, oid, + critical ? _("critical") : _("not critical")); addf(str, _("%s\t\t\tASCII: "), prefix); _gnutls_buffer_asciiprint(str, (char *)der->data, der->size); @@ -1415,9 +1382,8 @@ static void print_extension(gnutls_buffer_st * str, const char *prefix, } } -static void -print_extensions(gnutls_buffer_st * str, const char *prefix, int type, - cert_type_t cert) +static void print_extensions(gnutls_buffer_st *str, const char *prefix, + int type, cert_type_t cert) { unsigned i; int err; @@ -1432,18 +1398,12 @@ print_extensions(gnutls_buffer_st * str, const char *prefix, int type, unsigned int critical; if (type == TYPE_CRT) - err = - gnutls_x509_crt_get_extension_info(cert.crt, i, - oid, - &sizeof_oid, - &critical); + err = gnutls_x509_crt_get_extension_info( + cert.crt, i, oid, &sizeof_oid, &critical); else if (type == TYPE_CRQ) - err = - gnutls_x509_crq_get_extension_info(cert.crq, i, - oid, - &sizeof_oid, - &critical); + err = gnutls_x509_crq_get_extension_info( + cert.crq, i, oid, &sizeof_oid, &critical); else { gnutls_assert(); return; @@ -1461,13 +1421,11 @@ print_extensions(gnutls_buffer_st * str, const char *prefix, int type, addf(str, _("%s\tExtensions:\n"), prefix); if (type == TYPE_CRT) - err = - gnutls_x509_crt_get_extension_data2(cert.crt, i, - &der); + err = gnutls_x509_crt_get_extension_data2(cert.crt, i, + &der); else - err = - gnutls_x509_crq_get_extension_data2(cert.crq, i, - &der); + err = gnutls_x509_crq_get_extension_data2(cert.crq, i, + &der); if (err < 0) { der.data = NULL; @@ -1479,7 +1437,7 @@ print_extensions(gnutls_buffer_st * str, const char *prefix, int type, } } -static void reverse_datum(gnutls_datum_t * d) +static void reverse_datum(gnutls_datum_t *d) { unsigned int i; unsigned char c; @@ -1491,10 +1449,9 @@ static void reverse_datum(gnutls_datum_t * d) } } -static void -print_pubkey(gnutls_buffer_st * str, const char *key_name, - gnutls_pubkey_t pubkey, gnutls_x509_spki_st * spki, - gnutls_certificate_print_formats_t format) +static void print_pubkey(gnutls_buffer_st *str, const char *key_name, + gnutls_pubkey_t pubkey, gnutls_x509_spki_st *spki, + gnutls_certificate_print_formats_t format) { int err; const char *name; @@ -1517,8 +1474,8 @@ print_pubkey(gnutls_buffer_st * str, const char *key_name, addf(str, _("\t%sPublic Key Algorithm: %s\n"), key_name, name); addf(str, _("\tAlgorithm Security Level: %s (%d bits)\n"), - gnutls_sec_param_get_name(gnutls_pk_bits_to_sec_param - (err, bits)), bits); + gnutls_sec_param_get_name(gnutls_pk_bits_to_sec_param(err, bits)), + bits); if (spki && pk == GNUTLS_PK_RSA_PSS && spki->pk == pk) { addf(str, _("\t\tParameters:\n")); @@ -1529,223 +1486,173 @@ print_pubkey(gnutls_buffer_st * str, const char *key_name, switch (pk) { case GNUTLS_PK_RSA: - case GNUTLS_PK_RSA_PSS: - { - gnutls_datum_t m, e; + case GNUTLS_PK_RSA_PSS: { + gnutls_datum_t m, e; - err = gnutls_pubkey_get_pk_rsa_raw(pubkey, &m, &e); - if (err < 0) - addf(str, "error: get_pk_rsa_raw: %s\n", - gnutls_strerror(err)); - else { - if (format == GNUTLS_CRT_PRINT_FULL_NUMBERS) { - addf(str, - _("\t\tModulus (bits %d): "), - bits); - _gnutls_buffer_hexprint(str, - m.data, m.size); - adds(str, "\n"); - addf(str, - _("\t\tExponent (bits %d): "), - e.size * 8); - _gnutls_buffer_hexprint(str, - e.data, e.size); - adds(str, "\n"); - } else { - addf(str, - _("\t\tModulus (bits %d):\n"), - bits); - _gnutls_buffer_hexdump(str, m.data, - m.size, - "\t\t\t"); - addf(str, - _ - ("\t\tExponent (bits %d):\n"), - e.size * 8); - _gnutls_buffer_hexdump(str, e.data, - e.size, - "\t\t\t"); - } - - gnutls_free(m.data); - gnutls_free(e.data); + err = gnutls_pubkey_get_pk_rsa_raw(pubkey, &m, &e); + if (err < 0) + addf(str, "error: get_pk_rsa_raw: %s\n", + gnutls_strerror(err)); + else { + if (format == GNUTLS_CRT_PRINT_FULL_NUMBERS) { + addf(str, _("\t\tModulus (bits %d): "), bits); + _gnutls_buffer_hexprint(str, m.data, m.size); + adds(str, "\n"); + addf(str, _("\t\tExponent (bits %d): "), + e.size * 8); + _gnutls_buffer_hexprint(str, e.data, e.size); + adds(str, "\n"); + } else { + addf(str, _("\t\tModulus (bits %d):\n"), bits); + _gnutls_buffer_hexdump(str, m.data, m.size, + "\t\t\t"); + addf(str, _("\t\tExponent (bits %d):\n"), + e.size * 8); + _gnutls_buffer_hexdump(str, e.data, e.size, + "\t\t\t"); } + gnutls_free(m.data); + gnutls_free(e.data); } - break; + + } break; case GNUTLS_PK_EDDSA_ED25519: case GNUTLS_PK_EDDSA_ED448: case GNUTLS_PK_ECDH_X25519: case GNUTLS_PK_ECDH_X448: - case GNUTLS_PK_ECDSA: - { - gnutls_datum_t x, y; - gnutls_ecc_curve_t curve; + case GNUTLS_PK_ECDSA: { + gnutls_datum_t x, y; + gnutls_ecc_curve_t curve; - err = - gnutls_pubkey_get_pk_ecc_raw(pubkey, &curve, - &x, &y); - if (err < 0) { - addf(str, "error: get_pk_ecc_raw: %s\n", - gnutls_strerror(err)); - } else { - addf(str, _("\t\tCurve:\t%s\n"), - gnutls_ecc_curve_get_name(curve)); - if (format == GNUTLS_CRT_PRINT_FULL_NUMBERS) { - adds(str, _("\t\tX: ")); - _gnutls_buffer_hexprint(str, - x.data, x.size); + err = gnutls_pubkey_get_pk_ecc_raw(pubkey, &curve, &x, &y); + if (err < 0) { + addf(str, "error: get_pk_ecc_raw: %s\n", + gnutls_strerror(err)); + } else { + addf(str, _("\t\tCurve:\t%s\n"), + gnutls_ecc_curve_get_name(curve)); + if (format == GNUTLS_CRT_PRINT_FULL_NUMBERS) { + adds(str, _("\t\tX: ")); + _gnutls_buffer_hexprint(str, x.data, x.size); + adds(str, "\n"); + if (y.size > 0) { + adds(str, _("\t\tY: ")); + _gnutls_buffer_hexprint(str, y.data, + y.size); adds(str, "\n"); - if (y.size > 0) { - adds(str, _("\t\tY: ")); - _gnutls_buffer_hexprint(str, - y.data, - y.size); - adds(str, "\n"); - } - } else { - adds(str, _("\t\tX:\n")); - _gnutls_buffer_hexdump(str, x.data, - x.size, - "\t\t\t"); - if (y.size > 0) { - adds(str, _("\t\tY:\n")); - _gnutls_buffer_hexdump(str, - y.data, - y.size, - "\t\t\t"); - } } - - gnutls_free(x.data); - gnutls_free(y.data); - - } - } - break; - case GNUTLS_PK_DSA: - { - gnutls_datum_t p, q, g, y; - - err = - gnutls_pubkey_get_pk_dsa_raw(pubkey, &p, &q, - &g, &y); - if (err < 0) - addf(str, "error: get_pk_dsa_raw: %s\n", - gnutls_strerror(err)); - else { - if (format == GNUTLS_CRT_PRINT_FULL_NUMBERS) { - addf(str, - _ - ("\t\tPublic key (bits %d): "), - bits); - _gnutls_buffer_hexprint(str, - y.data, y.size); - adds(str, "\n"); - adds(str, _("\t\tP: ")); - _gnutls_buffer_hexprint(str, - p.data, p.size); - adds(str, "\n"); - adds(str, _("\t\tQ: ")); - _gnutls_buffer_hexprint(str, - q.data, q.size); - adds(str, "\n"); - adds(str, _("\t\tG: ")); - _gnutls_buffer_hexprint(str, - g.data, g.size); - adds(str, "\n"); - } else { - addf(str, - _ - ("\t\tPublic key (bits %d):\n"), - bits); - _gnutls_buffer_hexdump(str, y.data, - y.size, - "\t\t\t"); - adds(str, _("\t\tP:\n")); - _gnutls_buffer_hexdump(str, p.data, - p.size, - "\t\t\t"); - adds(str, _("\t\tQ:\n")); - _gnutls_buffer_hexdump(str, q.data, - q.size, - "\t\t\t"); - adds(str, _("\t\tG:\n")); - _gnutls_buffer_hexdump(str, g.data, - g.size, - "\t\t\t"); + } else { + adds(str, _("\t\tX:\n")); + _gnutls_buffer_hexdump(str, x.data, x.size, + "\t\t\t"); + if (y.size > 0) { + adds(str, _("\t\tY:\n")); + _gnutls_buffer_hexdump( + str, y.data, y.size, "\t\t\t"); } + } - gnutls_free(p.data); - gnutls_free(q.data); - gnutls_free(g.data); - gnutls_free(y.data); + gnutls_free(x.data); + gnutls_free(y.data); + } + } break; + case GNUTLS_PK_DSA: { + gnutls_datum_t p, q, g, y; + err = gnutls_pubkey_get_pk_dsa_raw(pubkey, &p, &q, &g, &y); + if (err < 0) + addf(str, "error: get_pk_dsa_raw: %s\n", + gnutls_strerror(err)); + else { + if (format == GNUTLS_CRT_PRINT_FULL_NUMBERS) { + addf(str, _("\t\tPublic key (bits %d): "), + bits); + _gnutls_buffer_hexprint(str, y.data, y.size); + adds(str, "\n"); + adds(str, _("\t\tP: ")); + _gnutls_buffer_hexprint(str, p.data, p.size); + adds(str, "\n"); + adds(str, _("\t\tQ: ")); + _gnutls_buffer_hexprint(str, q.data, q.size); + adds(str, "\n"); + adds(str, _("\t\tG: ")); + _gnutls_buffer_hexprint(str, g.data, g.size); + adds(str, "\n"); + } else { + addf(str, _("\t\tPublic key (bits %d):\n"), + bits); + _gnutls_buffer_hexdump(str, y.data, y.size, + "\t\t\t"); + adds(str, _("\t\tP:\n")); + _gnutls_buffer_hexdump(str, p.data, p.size, + "\t\t\t"); + adds(str, _("\t\tQ:\n")); + _gnutls_buffer_hexdump(str, q.data, q.size, + "\t\t\t"); + adds(str, _("\t\tG:\n")); + _gnutls_buffer_hexdump(str, g.data, g.size, + "\t\t\t"); } + + gnutls_free(p.data); + gnutls_free(q.data); + gnutls_free(g.data); + gnutls_free(y.data); } - break; + } break; case GNUTLS_PK_GOST_01: case GNUTLS_PK_GOST_12_256: - case GNUTLS_PK_GOST_12_512: - { - gnutls_datum_t x, y; - gnutls_ecc_curve_t curve; - gnutls_digest_algorithm_t digest; - gnutls_gost_paramset_t param; - - err = - gnutls_pubkey_export_gost_raw2(pubkey, &curve, - &digest, - ¶m, &x, &y, 0); - if (err < 0) - addf(str, "error: get_pk_gost_raw: %s\n", - gnutls_strerror(err)); - else { - addf(str, _("\t\tCurve:\t%s\n"), - gnutls_ecc_curve_get_name(curve)); - addf(str, _("\t\tDigest:\t%s\n"), - gnutls_digest_get_name(digest)); - addf(str, _("\t\tParamSet: %s\n"), - gnutls_gost_paramset_get_name(param)); - reverse_datum(&x); - reverse_datum(&y); - if (format == GNUTLS_CRT_PRINT_FULL_NUMBERS) { - adds(str, _("\t\tX: ")); - _gnutls_buffer_hexprint(str, - x.data, x.size); - adds(str, "\n"); - adds(str, _("\t\tY: ")); - _gnutls_buffer_hexprint(str, - y.data, y.size); - adds(str, "\n"); - } else { - adds(str, _("\t\tX:\n")); - _gnutls_buffer_hexdump(str, x.data, - x.size, - "\t\t\t"); - adds(str, _("\t\tY:\n")); - _gnutls_buffer_hexdump(str, y.data, - y.size, - "\t\t\t"); - } - - gnutls_free(x.data); - gnutls_free(y.data); + case GNUTLS_PK_GOST_12_512: { + gnutls_datum_t x, y; + gnutls_ecc_curve_t curve; + gnutls_digest_algorithm_t digest; + gnutls_gost_paramset_t param; + err = gnutls_pubkey_export_gost_raw2(pubkey, &curve, &digest, + ¶m, &x, &y, 0); + if (err < 0) + addf(str, "error: get_pk_gost_raw: %s\n", + gnutls_strerror(err)); + else { + addf(str, _("\t\tCurve:\t%s\n"), + gnutls_ecc_curve_get_name(curve)); + addf(str, _("\t\tDigest:\t%s\n"), + gnutls_digest_get_name(digest)); + addf(str, _("\t\tParamSet: %s\n"), + gnutls_gost_paramset_get_name(param)); + reverse_datum(&x); + reverse_datum(&y); + if (format == GNUTLS_CRT_PRINT_FULL_NUMBERS) { + adds(str, _("\t\tX: ")); + _gnutls_buffer_hexprint(str, x.data, x.size); + adds(str, "\n"); + adds(str, _("\t\tY: ")); + _gnutls_buffer_hexprint(str, y.data, y.size); + adds(str, "\n"); + } else { + adds(str, _("\t\tX:\n")); + _gnutls_buffer_hexdump(str, x.data, x.size, + "\t\t\t"); + adds(str, _("\t\tY:\n")); + _gnutls_buffer_hexdump(str, y.data, y.size, + "\t\t\t"); } + + gnutls_free(x.data); + gnutls_free(y.data); } - break; + } break; default: break; } } -static int -print_crt_sig_params(gnutls_buffer_st * str, gnutls_x509_crt_t crt, - gnutls_certificate_print_formats_t format) +static int print_crt_sig_params(gnutls_buffer_st *str, gnutls_x509_crt_t crt, + gnutls_certificate_print_formats_t format) { int ret; gnutls_pk_algorithm_t pk; @@ -1755,9 +1662,8 @@ print_crt_sig_params(gnutls_buffer_st * str, gnutls_x509_crt_t crt, sign = gnutls_x509_crt_get_signature_algorithm(crt); pk = gnutls_sign_get_pk_algorithm(sign); if (pk == GNUTLS_PK_RSA_PSS) { - ret = _gnutls_x509_read_sign_params(crt->cert, - "signatureAlgorithm", - ¶ms); + ret = _gnutls_x509_read_sign_params( + crt->cert, "signatureAlgorithm", ¶ms); if (ret < 0) { addf(str, "error: read_pss_params: %s\n", gnutls_strerror(ret)); @@ -1768,7 +1674,7 @@ print_crt_sig_params(gnutls_buffer_st * str, gnutls_x509_crt_t crt, return 0; } -static void print_pk_name(gnutls_buffer_st * str, gnutls_x509_crt_t crt) +static void print_pk_name(gnutls_buffer_st *str, gnutls_x509_crt_t crt) { const char *p; char *name = get_pk_name(crt, NULL); @@ -1781,9 +1687,8 @@ static void print_pk_name(gnutls_buffer_st * str, gnutls_x509_crt_t crt) gnutls_free(name); } -static int -print_crt_pubkey(gnutls_buffer_st * str, gnutls_x509_crt_t crt, - gnutls_certificate_print_formats_t format) +static int print_crt_pubkey(gnutls_buffer_st *str, gnutls_x509_crt_t crt, + gnutls_certificate_print_formats_t format) { gnutls_pubkey_t pubkey = NULL; gnutls_x509_spki_st params; @@ -1800,7 +1705,7 @@ print_crt_pubkey(gnutls_buffer_st * str, gnutls_x509_crt_t crt, } if (pk == GNUTLS_PK_UNKNOWN) { - print_pk_name(str, crt); /* print basic info only */ + print_pk_name(str, crt); /* print basic info only */ return 0; } @@ -1813,7 +1718,7 @@ print_crt_pubkey(gnutls_buffer_st * str, gnutls_x509_crt_t crt, if (ret != GNUTLS_E_UNIMPLEMENTED_FEATURE) addf(str, "error importing public key: %s\n", gnutls_strerror(ret)); - print_pk_name(str, crt); /* print basic info only */ + print_pk_name(str, crt); /* print basic info only */ ret = 0; goto cleanup; } @@ -1821,15 +1726,14 @@ print_crt_pubkey(gnutls_buffer_st * str, gnutls_x509_crt_t crt, print_pubkey(str, _("Subject "), pubkey, ¶ms, format); ret = 0; - cleanup: +cleanup: gnutls_pubkey_deinit(pubkey); return ret; } -static void -print_cert(gnutls_buffer_st * str, gnutls_x509_crt_t cert, - gnutls_certificate_print_formats_t format) +static void print_cert(gnutls_buffer_st *str, gnutls_x509_crt_t cert, + gnutls_certificate_print_formats_t format) { /* Version. */ { @@ -1890,8 +1794,8 @@ print_cert(gnutls_buffer_st * str, gnutls_x509_crt_t cert, if (gmtime_r(&tim, &t) == NULL) addf(str, "error: gmtime_r (%ld)\n", (unsigned long)tim); - else if (strftime - (s, max, "%a %b %d %H:%M:%S UTC %Y", &t) == 0) + else if (strftime(s, max, "%a %b %d %H:%M:%S UTC %Y", + &t) == 0) addf(str, "error: strftime (%ld)\n", (unsigned long)tim); else @@ -1909,8 +1813,8 @@ print_cert(gnutls_buffer_st * str, gnutls_x509_crt_t cert, if (gmtime_r(&tim, &t) == NULL) addf(str, "error: gmtime_r (%ld)\n", (unsigned long)tim); - else if (strftime - (s, max, "%a %b %d %H:%M:%S UTC %Y", &t) == 0) + else if (strftime(s, max, "%a %b %d %H:%M:%S UTC %Y", + &t) == 0) addf(str, "error: strftime (%ld)\n", (unsigned long)tim); else @@ -1968,13 +1872,11 @@ print_cert(gnutls_buffer_st * str, gnutls_x509_crt_t cert, print_crt_sig_params(str, cert, format); - if (err != GNUTLS_SIGN_UNKNOWN - && gnutls_sign_is_secure2(err, - GNUTLS_SIGN_FLAG_SECURE_FOR_CERTS) - == 0) { - adds(str, - _("warning: signed using a broken signature " - "algorithm that can be forged.\n")); + if (err != GNUTLS_SIGN_UNKNOWN && + gnutls_sign_is_secure2( + err, GNUTLS_SIGN_FLAG_SECURE_FOR_CERTS) == 0) { + adds(str, _("warning: signed using a broken signature " + "algorithm that can be forged.\n")); } err = gnutls_x509_crt_get_signature(cert, buffer, &size); @@ -2006,7 +1908,7 @@ print_cert(gnutls_buffer_st * str, gnutls_x509_crt_t cert, } } -static void print_fingerprint(gnutls_buffer_st * str, gnutls_x509_crt_t cert) +static void print_fingerprint(gnutls_buffer_st *str, gnutls_x509_crt_t cert) { int err; char buffer[MAX_HASH_SIZE]; @@ -2014,9 +1916,8 @@ static void print_fingerprint(gnutls_buffer_st * str, gnutls_x509_crt_t cert) adds(str, _("\tFingerprint:\n")); - err = - gnutls_x509_crt_get_fingerprint(cert, GNUTLS_DIG_SHA1, buffer, - &size); + err = gnutls_x509_crt_get_fingerprint(cert, GNUTLS_DIG_SHA1, buffer, + &size); if (err < 0) { addf(str, "error: get_fingerprint: %s\n", gnutls_strerror(err)); return; @@ -2027,9 +1928,8 @@ static void print_fingerprint(gnutls_buffer_st * str, gnutls_x509_crt_t cert) adds(str, "\n"); size = sizeof(buffer); - err = - gnutls_x509_crt_get_fingerprint(cert, GNUTLS_DIG_SHA256, buffer, - &size); + err = gnutls_x509_crt_get_fingerprint(cert, GNUTLS_DIG_SHA256, buffer, + &size); if (err < 0) { addf(str, "error: get_fingerprint: %s\n", gnutls_strerror(err)); return; @@ -2041,8 +1941,8 @@ static void print_fingerprint(gnutls_buffer_st * str, gnutls_x509_crt_t cert) typedef int get_id_func(void *obj, unsigned, unsigned char *, size_t *); -static void print_obj_id(gnutls_buffer_st * str, const char *prefix, void *obj, - get_id_func * get_id) +static void print_obj_id(gnutls_buffer_st *str, const char *prefix, void *obj, + get_id_func *get_id) { unsigned char sha1_buffer[MAX_HASH_SIZE]; unsigned char sha2_buffer[MAX_HASH_SIZE]; @@ -2051,7 +1951,7 @@ static void print_obj_id(gnutls_buffer_st * str, const char *prefix, void *obj, sha1_size = sizeof(sha1_buffer); err = get_id(obj, GNUTLS_KEYID_USE_SHA1, sha1_buffer, &sha1_size); - if (err == GNUTLS_E_UNIMPLEMENTED_FEATURE) /* unsupported algo */ + if (err == GNUTLS_E_UNIMPLEMENTED_FEATURE) /* unsupported algo */ return; if (err < 0) { @@ -2062,7 +1962,7 @@ static void print_obj_id(gnutls_buffer_st * str, const char *prefix, void *obj, sha2_size = sizeof(sha2_buffer); err = get_id(obj, GNUTLS_KEYID_USE_SHA256, sha2_buffer, &sha2_size); - if (err == GNUTLS_E_UNIMPLEMENTED_FEATURE) /* unsupported algo */ + if (err == GNUTLS_E_UNIMPLEMENTED_FEATURE) /* unsupported algo */ return; if (err < 0) { @@ -2084,7 +1984,7 @@ static void print_obj_id(gnutls_buffer_st * str, const char *prefix, void *obj, return; } -static void print_keyid(gnutls_buffer_st * str, gnutls_x509_crt_t cert) +static void print_keyid(gnutls_buffer_st *str, gnutls_x509_crt_t cert) { int err; const char *name; @@ -2097,7 +1997,7 @@ static void print_keyid(gnutls_buffer_st * str, gnutls_x509_crt_t cert) return; print_obj_id(str, "\t", cert, - (get_id_func *) gnutls_x509_crt_get_key_id); + (get_id_func *)gnutls_x509_crt_get_key_id); if (IS_EC(err)) { gnutls_ecc_curve_t curve; @@ -2111,9 +2011,8 @@ static void print_keyid(gnutls_buffer_st * str, gnutls_x509_crt_t cert) } else if (IS_GOSTEC(err)) { gnutls_ecc_curve_t curve; - err = - gnutls_x509_crt_get_pk_gost_raw(cert, &curve, NULL, NULL, - NULL, NULL); + err = gnutls_x509_crt_get_pk_gost_raw(cert, &curve, NULL, NULL, + NULL, NULL); if (err < 0) return; @@ -2127,16 +2026,14 @@ static void print_keyid(gnutls_buffer_st * str, gnutls_x509_crt_t cert) return; sha1_size = sizeof(sha1_buffer); - err = - gnutls_x509_crt_get_key_id(cert, GNUTLS_KEYID_USE_SHA1, sha1_buffer, - &sha1_size); - if (err == GNUTLS_E_UNIMPLEMENTED_FEATURE) /* unsupported algo */ + err = gnutls_x509_crt_get_key_id(cert, GNUTLS_KEYID_USE_SHA1, + sha1_buffer, &sha1_size); + if (err == GNUTLS_E_UNIMPLEMENTED_FEATURE) /* unsupported algo */ return; } -static void -print_other(gnutls_buffer_st * str, gnutls_x509_crt_t cert, - gnutls_certificate_print_formats_t format) +static void print_other(gnutls_buffer_st *str, gnutls_x509_crt_t cert, + gnutls_certificate_print_formats_t format) { if (format != GNUTLS_CRT_PRINT_UNSIGNED_FULL) { print_fingerprint(str, cert); @@ -2144,7 +2041,7 @@ print_other(gnutls_buffer_st * str, gnutls_x509_crt_t cert, print_keyid(str, cert); } -static void print_oneline(gnutls_buffer_st * str, gnutls_x509_crt_t cert) +static void print_oneline(gnutls_buffer_st *str, gnutls_x509_crt_t cert) { int err; @@ -2215,10 +2112,9 @@ static void print_oneline(gnutls_buffer_st * str, gnutls_x509_crt_t cert) else p = name; - if (err != GNUTLS_SIGN_UNKNOWN - && gnutls_sign_is_secure2(err, - GNUTLS_SIGN_FLAG_SECURE_FOR_CERTS) - == 0) + if (err != GNUTLS_SIGN_UNKNOWN && + gnutls_sign_is_secure2( + err, GNUTLS_SIGN_FLAG_SECURE_FOR_CERTS) == 0) addf(str, _("signed using %s (broken!), "), p); else addf(str, _("signed using %s, "), p); @@ -2238,8 +2134,8 @@ static void print_oneline(gnutls_buffer_st * str, gnutls_x509_crt_t cert) if (gmtime_r(&tim, &t) == NULL) addf(str, "unknown activation (%ld), ", (unsigned long)tim); - else if (strftime - (s, max, "%Y-%m-%d %H:%M:%S UTC", &t) == 0) + else if (strftime(s, max, "%Y-%m-%d %H:%M:%S UTC", + &t) == 0) addf(str, "failed activation (%ld), ", (unsigned long)tim); else @@ -2255,8 +2151,8 @@ static void print_oneline(gnutls_buffer_st * str, gnutls_x509_crt_t cert) if (gmtime_r(&tim, &t) == NULL) addf(str, "unknown expiry (%ld), ", (unsigned long)tim); - else if (strftime - (s, max, "%Y-%m-%d %H:%M:%S UTC", &t) == 0) + else if (strftime(s, max, "%Y-%m-%d %H:%M:%S UTC", + &t) == 0) addf(str, "failed expiry (%ld), ", (unsigned long)tim); else @@ -2268,15 +2164,14 @@ static void print_oneline(gnutls_buffer_st * str, gnutls_x509_crt_t cert) int pathlen; char *policyLanguage; - err = gnutls_x509_crt_get_proxy(cert, NULL, - &pathlen, &policyLanguage, - NULL, NULL); + err = gnutls_x509_crt_get_proxy(cert, NULL, &pathlen, + &policyLanguage, NULL, NULL); if (err == 0) { addf(str, "proxy certificate (policy="); if (strcmp(policyLanguage, "1.3.6.1.5.5.7.21.1") == 0) addf(str, "id-ppl-inheritALL"); - else if (strcmp - (policyLanguage, "1.3.6.1.5.5.7.21.2") == 0) + else if (strcmp(policyLanguage, "1.3.6.1.5.5.7.21.2") == + 0) addf(str, "id-ppl-independent"); else addf(str, "%s", policyLanguage); @@ -2300,7 +2195,6 @@ static void print_oneline(gnutls_buffer_st * str, gnutls_x509_crt_t cert) adds(str, "\""); } } - } /** @@ -2322,10 +2216,9 @@ static void print_oneline(gnutls_buffer_st * str, gnutls_x509_crt_t cert) * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a * negative error value. **/ -int -gnutls_x509_crt_print(gnutls_x509_crt_t cert, - gnutls_certificate_print_formats_t format, - gnutls_datum_t * out) +int gnutls_x509_crt_print(gnutls_x509_crt_t cert, + gnutls_certificate_print_formats_t format, + gnutls_datum_t *out) { gnutls_buffer_st str; int ret; @@ -2351,9 +2244,8 @@ gnutls_x509_crt_print(gnutls_x509_crt_t cert, } else { _gnutls_buffer_init(&str); - _gnutls_buffer_append_str(&str, - _ - ("X.509 Certificate Information:\n")); + _gnutls_buffer_append_str( + &str, _("X.509 Certificate Information:\n")); print_cert(&str, cert, format); @@ -2365,8 +2257,8 @@ gnutls_x509_crt_print(gnutls_x509_crt_t cert, } } -static void -print_crl(gnutls_buffer_st * str, gnutls_x509_crl_t crl, int notsigned) +static void print_crl(gnutls_buffer_st *str, gnutls_x509_crl_t crl, + int notsigned) { /* Version. */ { @@ -2410,8 +2302,8 @@ print_crl(gnutls_buffer_st * str, gnutls_x509_crl_t crl, int notsigned) if (gmtime_r(&tim, &t) == NULL) addf(str, "error: gmtime_r (%ld)\n", (unsigned long)tim); - else if (strftime - (s, max, "%a %b %d %H:%M:%S UTC %Y", &t) == 0) + else if (strftime(s, max, "%a %b %d %H:%M:%S UTC %Y", + &t) == 0) addf(str, "error: strftime (%ld)\n", (unsigned long)tim); else @@ -2429,8 +2321,8 @@ print_crl(gnutls_buffer_st * str, gnutls_x509_crl_t crl, int notsigned) else if (gmtime_r(&tim, &t) == NULL) addf(str, "error: gmtime_r (%ld)\n", (unsigned long)tim); - else if (strftime - (s, max, "%a %b %d %H:%M:%S UTC %Y", &t) == 0) + else if (strftime(s, max, "%a %b %d %H:%M:%S UTC %Y", + &t) == 0) addf(str, "error: strftime (%ld)\n", (unsigned long)tim); else @@ -2450,15 +2342,12 @@ print_crl(gnutls_buffer_st * str, gnutls_x509_crl_t crl, int notsigned) size_t sizeof_oid = sizeof(oid); unsigned int critical; - err = gnutls_x509_crl_get_extension_info(crl, i, - oid, - &sizeof_oid, - &critical); + err = gnutls_x509_crl_get_extension_info( + crl, i, oid, &sizeof_oid, &critical); if (err == GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE) break; if (err < 0) { - addf(str, - "error: get_extension_info: %s\n", + addf(str, "error: get_extension_info: %s\n", gnutls_strerror(err)); break; } @@ -2475,18 +2364,15 @@ print_crl(gnutls_buffer_st * str, gnutls_x509_crl_t crl, int notsigned) "warning: more than one CRL number\n"); } - err = - gnutls_x509_crl_get_number(crl, nr, - &nr_size, - &critical); + err = gnutls_x509_crl_get_number( + crl, nr, &nr_size, &critical); addf(str, _("\t\tCRL Number (%s): "), critical ? _("critical") : - _("not critical")); + _("not critical")); if (err < 0) - addf(str, - "error: get_number: %s\n", + addf(str, "error: get_number: %s\n", gnutls_strerror(err)); else { _gnutls_buffer_hexprint(str, nr, @@ -2504,14 +2390,12 @@ print_crl(gnutls_buffer_st * str, gnutls_x509_crl_t crl, int notsigned) } addf(str, - _ - ("\t\tAuthority Key Identifier (%s):\n"), + _("\t\tAuthority Key Identifier (%s):\n"), critical ? _("critical") : - _("not critical")); + _("not critical")); - err = - gnutls_x509_crl_get_extension_data2(crl, i, - &der); + err = gnutls_x509_crl_get_extension_data2( + crl, i, &der); if (err < 0) { addf(str, "error: get_extension_data2: %s\n", @@ -2525,16 +2409,13 @@ print_crl(gnutls_buffer_st * str, gnutls_x509_crl_t crl, int notsigned) } else { gnutls_datum_t der; - addf(str, - _("\t\tUnknown extension %s (%s):\n"), + addf(str, _("\t\tUnknown extension %s (%s):\n"), oid, critical ? _("critical") : - _("not critical")); + _("not critical")); - err = - gnutls_x509_crl_get_extension_data2(crl, - i, - &der); + err = gnutls_x509_crl_get_extension_data2( + crl, i, &der); if (err < 0) { addf(str, "error: get_extension_data2: %s\n", @@ -2574,9 +2455,8 @@ print_crl(gnutls_buffer_st * str, gnutls_x509_crl_t crl, int notsigned) int err; time_t tim; - err = - gnutls_x509_crl_iter_crt_serial(crl, &iter, serial, - &serial_size, &tim); + err = gnutls_x509_crl_iter_crt_serial( + crl, &iter, serial, &serial_size, &tim); if (err < 0) { addf(str, "error: iter_crt_serial: %s\n", gnutls_strerror(err)); @@ -2592,14 +2472,12 @@ print_crl(gnutls_buffer_st * str, gnutls_x509_crl_t crl, int notsigned) adds(str, "\n"); if (gmtime_r(&tim, &t) == NULL) - addf(str, - "error: gmtime_r (%ld)\n", + addf(str, "error: gmtime_r (%ld)\n", (unsigned long)tim); - else if (strftime - (s, max, - "%a %b %d %H:%M:%S UTC %Y", &t) == 0) - addf(str, - "error: strftime (%ld)\n", + else if (strftime(s, max, + "%a %b %d %H:%M:%S UTC %Y", + &t) == 0) + addf(str, "error: strftime (%ld)\n", (unsigned long)tim); else addf(str, _("\t\tRevoked at: %s\n"), s); @@ -2625,13 +2503,11 @@ print_crl(gnutls_buffer_st * str, gnutls_x509_crl_t crl, int notsigned) addf(str, _("\tSignature Algorithm: %s\n"), p); gnutls_free(name); - if (err != GNUTLS_SIGN_UNKNOWN - && gnutls_sign_is_secure2(err, - GNUTLS_SIGN_FLAG_SECURE_FOR_CERTS) - == 0) { - adds(str, - _("warning: signed using a broken signature " - "algorithm that can be forged.\n")); + if (err != GNUTLS_SIGN_UNKNOWN && + gnutls_sign_is_secure2( + err, GNUTLS_SIGN_FLAG_SECURE_FOR_CERTS) == 0) { + adds(str, _("warning: signed using a broken signature " + "algorithm that can be forged.\n")); } err = gnutls_x509_crl_get_signature(crl, buffer, &size); @@ -2677,26 +2553,24 @@ print_crl(gnutls_buffer_st * str, gnutls_x509_crl_t crl, int notsigned) * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a * negative error value. **/ -int -gnutls_x509_crl_print(gnutls_x509_crl_t crl, - gnutls_certificate_print_formats_t format, - gnutls_datum_t * out) +int gnutls_x509_crl_print(gnutls_x509_crl_t crl, + gnutls_certificate_print_formats_t format, + gnutls_datum_t *out) { gnutls_buffer_st str; _gnutls_buffer_init(&str); - _gnutls_buffer_append_str - (&str, _("X.509 Certificate Revocation List Information:\n")); + _gnutls_buffer_append_str( + &str, _("X.509 Certificate Revocation List Information:\n")); print_crl(&str, crl, format == GNUTLS_CRT_PRINT_UNSIGNED_FULL); return _gnutls_buffer_to_datum(&str, out, 1); } -static int -print_crq_sig_params(gnutls_buffer_st * str, gnutls_x509_crq_t crt, - gnutls_certificate_print_formats_t format) +static int print_crq_sig_params(gnutls_buffer_st *str, gnutls_x509_crq_t crt, + gnutls_certificate_print_formats_t format) { int ret; gnutls_pk_algorithm_t pk; @@ -2706,9 +2580,8 @@ print_crq_sig_params(gnutls_buffer_st * str, gnutls_x509_crq_t crt, sign = gnutls_x509_crq_get_signature_algorithm(crt); pk = gnutls_sign_get_pk_algorithm(sign); if (pk == GNUTLS_PK_RSA_PSS) { - ret = _gnutls_x509_read_sign_params(crt->crq, - "signatureAlgorithm", - ¶ms); + ret = _gnutls_x509_read_sign_params( + crt->crq, "signatureAlgorithm", ¶ms); if (ret < 0) { addf(str, "error: read_pss_params: %s\n", gnutls_strerror(ret)); @@ -2719,9 +2592,8 @@ print_crq_sig_params(gnutls_buffer_st * str, gnutls_x509_crq_t crt, return 0; } -static int -print_crq_pubkey(gnutls_buffer_st * str, gnutls_x509_crq_t crq, - gnutls_certificate_print_formats_t format) +static int print_crq_pubkey(gnutls_buffer_st *str, gnutls_x509_crq_t crq, + gnutls_certificate_print_formats_t format) { gnutls_pubkey_t pubkey; gnutls_x509_spki_st params; @@ -2742,10 +2614,10 @@ print_crq_pubkey(gnutls_buffer_st * str, gnutls_x509_crq_t crq, print_pubkey(str, _("Subject "), pubkey, ¶ms, format); ret = 0; - cleanup: +cleanup: gnutls_pubkey_deinit(pubkey); - if (ret < 0) { /* print only name */ + if (ret < 0) { /* print only name */ const char *p; char *name = crq_get_pk_name(crq); if (name == NULL) @@ -2761,9 +2633,8 @@ print_crq_pubkey(gnutls_buffer_st * str, gnutls_x509_crq_t crq, return ret; } -static void -print_crq(gnutls_buffer_st * str, gnutls_x509_crq_t cert, - gnutls_certificate_print_formats_t format) +static void print_crq(gnutls_buffer_st *str, gnutls_x509_crq_t cert, + gnutls_certificate_print_formats_t format) { /* Version. */ { @@ -2821,15 +2692,12 @@ print_crq(gnutls_buffer_st * str, gnutls_x509_crq_t cert, char oid[MAX_OID_SIZE] = ""; size_t sizeof_oid = sizeof(oid); - err = - gnutls_x509_crq_get_attribute_info(cert, i, - oid, - &sizeof_oid); + err = gnutls_x509_crq_get_attribute_info(cert, i, oid, + &sizeof_oid); if (err == GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE) break; if (err < 0) { - addf(str, - "error: get_extension_info: %s\n", + addf(str, "error: get_extension_info: %s\n", gnutls_strerror(err)); break; } @@ -2858,11 +2726,10 @@ print_crq(gnutls_buffer_st * str, gnutls_x509_crq_t cert, "warning: more than one Challenge password attribute\n"); } - err = - gnutls_x509_crq_get_challenge_password - (cert, NULL, &size); - if (err < 0 - && err != GNUTLS_E_SHORT_MEMORY_BUFFER) { + err = gnutls_x509_crq_get_challenge_password( + cert, NULL, &size); + if (err < 0 && + err != GNUTLS_E_SHORT_MEMORY_BUFFER) { addf(str, "error: get_challenge_password: %s\n", gnutls_strerror(err)); @@ -2874,22 +2741,20 @@ print_crq(gnutls_buffer_st * str, gnutls_x509_crq_t cert, pass = gnutls_malloc(size); if (!pass) { addf(str, "error: malloc: %s\n", - gnutls_strerror - (GNUTLS_E_MEMORY_ERROR)); + gnutls_strerror( + GNUTLS_E_MEMORY_ERROR)); continue; } - err = - gnutls_x509_crq_get_challenge_password - (cert, pass, &size); + err = gnutls_x509_crq_get_challenge_password( + cert, pass, &size); if (err < 0) addf(str, "error: get_challenge_password: %s\n", gnutls_strerror(err)); else addf(str, - _ - ("\t\tChallenge password: %s\n"), + _("\t\tChallenge password: %s\n"), pass); gnutls_free(pass); @@ -2902,9 +2767,8 @@ print_crq(gnutls_buffer_st * str, gnutls_x509_crq_t cert, addf(str, _("\t\tUnknown attribute %s:\n"), oid); - err = - gnutls_x509_crq_get_attribute_data - (cert, i, NULL, &extlen); + err = gnutls_x509_crq_get_attribute_data( + cert, i, NULL, &extlen); if (err < 0) { addf(str, "error: get_attribute_data: %s\n", @@ -2915,14 +2779,13 @@ print_crq(gnutls_buffer_st * str, gnutls_x509_crq_t cert, buffer = gnutls_malloc(extlen); if (!buffer) { addf(str, "error: malloc: %s\n", - gnutls_strerror - (GNUTLS_E_MEMORY_ERROR)); + gnutls_strerror( + GNUTLS_E_MEMORY_ERROR)); continue; } - err = - gnutls_x509_crq_get_attribute_data - (cert, i, buffer, &extlen); + err = gnutls_x509_crq_get_attribute_data( + cert, i, buffer, &extlen); if (err < 0) { gnutls_free(buffer); addf(str, @@ -2945,7 +2808,7 @@ print_crq(gnutls_buffer_st * str, gnutls_x509_crq_t cert, } } -static void print_crq_other(gnutls_buffer_st * str, gnutls_x509_crq_t crq) +static void print_crq_other(gnutls_buffer_st *str, gnutls_x509_crq_t crq) { int ret; @@ -2954,8 +2817,7 @@ static void print_crq_other(gnutls_buffer_st * str, gnutls_x509_crq_t crq) if (ret < 0) return; - print_obj_id(str, "\t", crq, - (get_id_func *) gnutls_x509_crq_get_key_id); + print_obj_id(str, "\t", crq, (get_id_func *)gnutls_x509_crq_get_key_id); } /** @@ -2974,17 +2836,16 @@ static void print_crq_other(gnutls_buffer_st * str, gnutls_x509_crq_t crq) * * Since: 2.8.0 **/ -int -gnutls_x509_crq_print(gnutls_x509_crq_t crq, - gnutls_certificate_print_formats_t format, - gnutls_datum_t * out) +int gnutls_x509_crq_print(gnutls_x509_crq_t crq, + gnutls_certificate_print_formats_t format, + gnutls_datum_t *out) { gnutls_buffer_st str; _gnutls_buffer_init(&str); - _gnutls_buffer_append_str - (&str, _("PKCS #10 Certificate Request Information:\n")); + _gnutls_buffer_append_str( + &str, _("PKCS #10 Certificate Request Information:\n")); print_crq(&str, crq, format); @@ -2995,9 +2856,8 @@ gnutls_x509_crq_print(gnutls_x509_crq_t crq, return _gnutls_buffer_to_datum(&str, out, 1); } -static void -print_pubkey_other(gnutls_buffer_st * str, gnutls_pubkey_t pubkey, - gnutls_certificate_print_formats_t format) +static void print_pubkey_other(gnutls_buffer_st *str, gnutls_pubkey_t pubkey, + gnutls_certificate_print_formats_t format) { int ret; unsigned int usage; @@ -3019,7 +2879,7 @@ print_pubkey_other(gnutls_buffer_st * str, gnutls_pubkey_t pubkey, if (ret < 0) return; - print_obj_id(str, "", pubkey, (get_id_func *) gnutls_pubkey_get_key_id); + print_obj_id(str, "", pubkey, (get_id_func *)gnutls_pubkey_get_key_id); } /** @@ -3041,10 +2901,9 @@ print_pubkey_other(gnutls_buffer_st * str, gnutls_pubkey_t pubkey, * * Since: 3.1.5 **/ -int -gnutls_pubkey_print(gnutls_pubkey_t pubkey, - gnutls_certificate_print_formats_t format, - gnutls_datum_t * out) +int gnutls_pubkey_print(gnutls_pubkey_t pubkey, + gnutls_certificate_print_formats_t format, + gnutls_datum_t *out) { gnutls_buffer_st str; @@ -3073,10 +2932,9 @@ gnutls_pubkey_print(gnutls_pubkey_t pubkey, * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a * negative error value. **/ -int -gnutls_x509_ext_print(gnutls_x509_ext_st * exts, unsigned int exts_size, - gnutls_certificate_print_formats_t format, - gnutls_datum_t * out) +int gnutls_x509_ext_print(gnutls_x509_ext_st *exts, unsigned int exts_size, + gnutls_certificate_print_formats_t format, + gnutls_datum_t *out) { gnutls_buffer_st str; struct ext_indexes_st idx; |