summaryrefslogtreecommitdiff
path: root/lib/x509/pkcs12_bag.c
diff options
context:
space:
mode:
Diffstat (limited to 'lib/x509/pkcs12_bag.c')
-rw-r--r--lib/x509/pkcs12_bag.c59
1 files changed, 24 insertions, 35 deletions
diff --git a/lib/x509/pkcs12_bag.c b/lib/x509/pkcs12_bag.c
index 51a506e01e..012d92f8d4 100644
--- a/lib/x509/pkcs12_bag.c
+++ b/lib/x509/pkcs12_bag.c
@@ -67,7 +67,6 @@ static inline void _pkcs12_bag_free_data(gnutls_pkcs12_bag_t bag)
}
-
/**
* gnutls_pkcs12_bag_deinit:
* @bag: A pointer to the type to be initialized
@@ -93,8 +92,7 @@ void gnutls_pkcs12_bag_deinit(gnutls_pkcs12_bag_t bag)
*
* Returns: On error a negative error value or one of the #gnutls_pkcs12_bag_type_t enumerations.
**/
-int
-gnutls_pkcs12_bag_get_type(gnutls_pkcs12_bag_t bag, unsigned indx)
+int gnutls_pkcs12_bag_get_type(gnutls_pkcs12_bag_t bag, unsigned indx)
{
if (bag == NULL) {
gnutls_assert();
@@ -253,14 +251,12 @@ _pkcs12_decode_crt_bag(gnutls_pkcs12_bag_type_t type,
return 0;
-
- cleanup:
+ cleanup:
asn1_delete_structure(&c2);
return ret;
}
-
int
_pkcs12_encode_crt_bag(gnutls_pkcs12_bag_type_t type,
const gnutls_datum_t * raw, gnutls_datum_t * out)
@@ -328,9 +324,7 @@ _pkcs12_encode_crt_bag(gnutls_pkcs12_bag_type_t type,
goto cleanup;
}
- ret =
- asn1_write_value(c2, "secretTypeId", RANDOM_NONCE_OID,
- 1);
+ ret = asn1_write_value(c2, "secretTypeId", RANDOM_NONCE_OID, 1);
if (ret != ASN1_SUCCESS) {
gnutls_assert();
ret = _gnutls_asn2err(ret);
@@ -363,14 +357,12 @@ _pkcs12_encode_crt_bag(gnutls_pkcs12_bag_type_t type,
return 0;
-
- cleanup:
+ cleanup:
asn1_delete_structure(&c2);
return ret;
}
-
/**
* gnutls_pkcs12_bag_set_data:
* @bag: The bag
@@ -440,8 +432,7 @@ gnutls_pkcs12_bag_set_data(gnutls_pkcs12_bag_t bag,
* Returns: the index of the added bag on success, or a negative
* value on failure.
**/
-int
-gnutls_pkcs12_bag_set_crt(gnutls_pkcs12_bag_t bag, gnutls_x509_crt_t crt)
+int gnutls_pkcs12_bag_set_crt(gnutls_pkcs12_bag_t bag, gnutls_x509_crt_t crt)
{
int ret;
gnutls_datum_t data;
@@ -457,8 +448,7 @@ gnutls_pkcs12_bag_set_crt(gnutls_pkcs12_bag_t bag, gnutls_x509_crt_t crt)
return ret;
}
- ret =
- gnutls_pkcs12_bag_set_data(bag, GNUTLS_BAG_CERTIFICATE, &data);
+ ret = gnutls_pkcs12_bag_set_data(bag, GNUTLS_BAG_CERTIFICATE, &data);
_gnutls_free_datum(&data);
@@ -476,13 +466,11 @@ gnutls_pkcs12_bag_set_crt(gnutls_pkcs12_bag_t bag, gnutls_x509_crt_t crt)
* Returns: the index of the added bag on success, or a negative error code
* on failure.
**/
-int
-gnutls_pkcs12_bag_set_crl(gnutls_pkcs12_bag_t bag, gnutls_x509_crl_t crl)
+int gnutls_pkcs12_bag_set_crl(gnutls_pkcs12_bag_t bag, gnutls_x509_crl_t crl)
{
int ret;
gnutls_datum_t data;
-
if (bag == NULL) {
gnutls_assert();
return GNUTLS_E_INVALID_REQUEST;
@@ -521,7 +509,6 @@ gnutls_pkcs12_bag_set_key_id(gnutls_pkcs12_bag_t bag, unsigned indx,
{
int ret;
-
if (bag == NULL) {
gnutls_assert();
return GNUTLS_E_INVALID_REQUEST;
@@ -608,7 +595,6 @@ gnutls_pkcs12_bag_get_friendly_name(gnutls_pkcs12_bag_t bag, unsigned indx,
return 0;
}
-
/**
* gnutls_pkcs12_bag_set_friendly_name:
* @bag: The bag
@@ -647,7 +633,6 @@ gnutls_pkcs12_bag_set_friendly_name(gnutls_pkcs12_bag_t bag, unsigned indx,
return 0;
}
-
/**
* gnutls_pkcs12_bag_decrypt:
* @bag: The bag
@@ -674,8 +659,7 @@ int gnutls_pkcs12_bag_decrypt(gnutls_pkcs12_bag_t bag, const char *pass)
return GNUTLS_E_INVALID_REQUEST;
}
- ret =
- _gnutls_pkcs7_decrypt_data(&bag->element[0].data, pass, &dec);
+ ret = _gnutls_pkcs7_decrypt_data(&bag->element[0].data, pass, &dec);
if (ret < 0) {
gnutls_assert();
@@ -779,7 +763,6 @@ gnutls_pkcs12_bag_encrypt(gnutls_pkcs12_bag_t bag, const char *pass,
bag->bag_elements = 1;
-
return 0;
}
@@ -805,8 +788,10 @@ gnutls_pkcs12_bag_encrypt(gnutls_pkcs12_bag_t bag, const char *pass,
* another negative error code in case of a failure. Zero on success.
**/
int
-gnutls_pkcs12_bag_enc_info(gnutls_pkcs12_bag_t bag, unsigned int *schema, unsigned int *cipher,
- void *salt, unsigned int *salt_size, unsigned int *iter_count, char **oid)
+gnutls_pkcs12_bag_enc_info(gnutls_pkcs12_bag_t bag, unsigned int *schema,
+ unsigned int *cipher, void *salt,
+ unsigned int *salt_size, unsigned int *iter_count,
+ char **oid)
{
int ret;
struct pbkdf2_params kdf;
@@ -822,8 +807,7 @@ gnutls_pkcs12_bag_enc_info(gnutls_pkcs12_bag_t bag, unsigned int *schema, unsign
return GNUTLS_E_INVALID_REQUEST;
}
- ret =
- _gnutls_pkcs7_data_enc_info(&bag->element[0].data, &p, &kdf, oid);
+ ret = _gnutls_pkcs7_data_enc_info(&bag->element[0].data, &p, &kdf, oid);
if (ret < 0) {
gnutls_assert();
@@ -837,7 +821,7 @@ gnutls_pkcs12_bag_enc_info(gnutls_pkcs12_bag_t bag, unsigned int *schema, unsign
*cipher = p->cipher;
if (iter_count)
- *iter_count = kdf.iter_count;
+ *iter_count = kdf.iter_count;
if (salt) {
if (*salt_size >= (unsigned)kdf.salt_size) {
@@ -851,7 +835,6 @@ gnutls_pkcs12_bag_enc_info(gnutls_pkcs12_bag_t bag, unsigned int *schema, unsign
if (salt_size)
*salt_size = kdf.salt_size;
-
return 0;
}
@@ -869,11 +852,12 @@ gnutls_pkcs12_bag_enc_info(gnutls_pkcs12_bag_t bag, unsigned int *schema, unsign
* value on failure.
**/
int
-gnutls_pkcs12_bag_set_privkey(gnutls_pkcs12_bag_t bag, gnutls_x509_privkey_t privkey,
+gnutls_pkcs12_bag_set_privkey(gnutls_pkcs12_bag_t bag,
+ gnutls_x509_privkey_t privkey,
const char *password, unsigned flags)
{
int ret;
- gnutls_datum_t data = {NULL, 0};
+ gnutls_datum_t data = { NULL, 0 };
if (bag == NULL) {
gnutls_assert();
@@ -886,13 +870,18 @@ gnutls_pkcs12_bag_set_privkey(gnutls_pkcs12_bag_t bag, gnutls_x509_privkey_t pri
return gnutls_assert_val(ret);
if (password == NULL) {
- ret = gnutls_pkcs12_bag_set_data(bag, GNUTLS_BAG_PKCS8_KEY, &data);
+ ret =
+ gnutls_pkcs12_bag_set_data(bag, GNUTLS_BAG_PKCS8_KEY,
+ &data);
if (ret < 0) {
gnutls_assert();
goto cleanup;
}
} else {
- ret = gnutls_pkcs12_bag_set_data(bag, GNUTLS_BAG_PKCS8_ENCRYPTED_KEY, &data);
+ ret =
+ gnutls_pkcs12_bag_set_data(bag,
+ GNUTLS_BAG_PKCS8_ENCRYPTED_KEY,
+ &data);
if (ret < 0) {
gnutls_assert();
goto cleanup;