summaryrefslogtreecommitdiff
path: root/librabbitmq/amqp_polarssl.c
diff options
context:
space:
mode:
authorAlan Antonuk <alan.antonuk@gmail.com>2013-04-11 10:53:59 -0700
committerAlan Antonuk <alan.antonuk@gmail.com>2013-04-17 09:56:29 -0700
commita2a91f532b7e648b2468acad39ae7169ac020d0a (patch)
tree78010b44a0e00011cc17787d144abc7dc358c560 /librabbitmq/amqp_polarssl.c
parent317a56cfffb05e72713bfa8a8e7236b7c39ddb8d (diff)
downloadrabbitmq-c-github-ask-a2a91f532b7e648b2468acad39ae7169ac020d0a.tar.gz
Fix code formatting to match the rest of the lib
Diffstat (limited to 'librabbitmq/amqp_polarssl.c')
-rw-r--r--librabbitmq/amqp_polarssl.c400
1 files changed, 200 insertions, 200 deletions
diff --git a/librabbitmq/amqp_polarssl.c b/librabbitmq/amqp_polarssl.c
index 027ee47..b89f602 100644
--- a/librabbitmq/amqp_polarssl.c
+++ b/librabbitmq/amqp_polarssl.c
@@ -34,271 +34,271 @@
#include <stdlib.h>
struct amqp_ssl_socket_t {
- int sockfd;
- entropy_context *entropy;
- ctr_drbg_context *ctr_drbg;
- x509_cert *cacert;
- rsa_context *key;
- x509_cert *cert;
- ssl_context *ssl;
- ssl_session *session;
- char *buffer;
- size_t length;
+ int sockfd;
+ entropy_context *entropy;
+ ctr_drbg_context *ctr_drbg;
+ x509_cert *cacert;
+ rsa_context *key;
+ x509_cert *cert;
+ ssl_context *ssl;
+ ssl_session *session;
+ char *buffer;
+ size_t length;
};
static ssize_t
amqp_ssl_socket_send(void *base,
- const void *buf,
- size_t len,
- AMQP_UNUSED int flags)
+ const void *buf,
+ size_t len,
+ AMQP_UNUSED int flags)
{
- struct amqp_ssl_socket_t *self = (struct amqp_ssl_socket_t *)base;
- return ssl_write(self->ssl, buf, len);
+ struct amqp_ssl_socket_t *self = (struct amqp_ssl_socket_t *)base;
+ return ssl_write(self->ssl, buf, len);
}
static ssize_t
amqp_ssl_socket_writev(void *base,
- const struct iovec *iov,
- int iovcnt)
+ const struct iovec *iov,
+ int iovcnt)
{
- struct amqp_ssl_socket_t *self = (struct amqp_ssl_socket_t *)base;
- ssize_t written = -1;
- char *bufferp;
- size_t bytes;
- int i;
- bytes = 0;
- for (i = 0; i < iovcnt; ++i) {
- bytes += iov[i].iov_len;
- }
- if (self->length < bytes) {
- free(self->buffer);
- self->buffer = malloc(bytes);
- if (!self->buffer) {
- self->length = 0;
- goto exit;
- }
- self->length = bytes;
- }
- bufferp = self->buffer;
- for (i = 0; i < iovcnt; ++i) {
- memcpy(bufferp, iov[i].iov_base, iov[i].iov_len);
- bufferp += iov[i].iov_len;
- }
- written = ssl_write(self->ssl, (const unsigned char *)self->buffer,
- bytes);
+ struct amqp_ssl_socket_t *self = (struct amqp_ssl_socket_t *)base;
+ ssize_t written = -1;
+ char *bufferp;
+ size_t bytes;
+ int i;
+ bytes = 0;
+ for (i = 0; i < iovcnt; ++i) {
+ bytes += iov[i].iov_len;
+ }
+ if (self->length < bytes) {
+ free(self->buffer);
+ self->buffer = malloc(bytes);
+ if (!self->buffer) {
+ self->length = 0;
+ goto exit;
+ }
+ self->length = bytes;
+ }
+ bufferp = self->buffer;
+ for (i = 0; i < iovcnt; ++i) {
+ memcpy(bufferp, iov[i].iov_base, iov[i].iov_len);
+ bufferp += iov[i].iov_len;
+ }
+ written = ssl_write(self->ssl, (const unsigned char *)self->buffer,
+ bytes);
exit:
- return written;
+ return written;
}
static ssize_t
amqp_ssl_socket_recv(void *base,
- void *buf,
- size_t len,
- AMQP_UNUSED int flags)
+ void *buf,
+ size_t len,
+ AMQP_UNUSED int flags)
{
- struct amqp_ssl_socket_t *self = (struct amqp_ssl_socket_t *)base;
- return ssl_read(self->ssl, buf, len);
+ struct amqp_ssl_socket_t *self = (struct amqp_ssl_socket_t *)base;
+ return ssl_read(self->ssl, buf, len);
}
static int
amqp_ssl_socket_open(void *base, const char *host, int port)
{
- struct amqp_ssl_socket_t *self = (struct amqp_ssl_socket_t *)base;
- int status = net_connect(&self->sockfd, host, port);
- if (status) {
- return -1;
- }
- if (self->cacert) {
- ssl_set_ca_chain(self->ssl, self->cacert, NULL, host);
- }
- ssl_set_bio(self->ssl, net_recv, &self->sockfd,
- net_send, &self->sockfd);
- if (self->key && self->cert) {
- ssl_set_own_cert(self->ssl, self->cert, self->key);
- }
- while (0 != (status = ssl_handshake(self->ssl))) {
- switch (status) {
- case POLARSSL_ERR_NET_WANT_READ:
- case POLARSSL_ERR_NET_WANT_WRITE:
- continue;
- default:
- break;
- }
- }
- return status;
+ struct amqp_ssl_socket_t *self = (struct amqp_ssl_socket_t *)base;
+ int status = net_connect(&self->sockfd, host, port);
+ if (status) {
+ return -1;
+ }
+ if (self->cacert) {
+ ssl_set_ca_chain(self->ssl, self->cacert, NULL, host);
+ }
+ ssl_set_bio(self->ssl, net_recv, &self->sockfd,
+ net_send, &self->sockfd);
+ if (self->key && self->cert) {
+ ssl_set_own_cert(self->ssl, self->cert, self->key);
+ }
+ while (0 != (status = ssl_handshake(self->ssl))) {
+ switch (status) {
+ case POLARSSL_ERR_NET_WANT_READ:
+ case POLARSSL_ERR_NET_WANT_WRITE:
+ continue;
+ default:
+ break;
+ }
+ }
+ return status;
}
static int
amqp_ssl_socket_close(void *base)
{
- int status = -1;
- struct amqp_ssl_socket_t *self = (struct amqp_ssl_socket_t *)base;
- if (self) {
- free(self->entropy);
- free(self->ctr_drbg);
- x509_free(self->cacert);
- free(self->cacert);
- rsa_free(self->key);
- free(self->key);
- x509_free(self->cert);
- free(self->cert);
- ssl_free(self->ssl);
- free(self->ssl);
- free(self->session);
- free(self->buffer);
- if (self->sockfd >= 0) {
- net_close(self->sockfd);
- status = 0;
- }
- free(self);
- }
- return status;
+ int status = -1;
+ struct amqp_ssl_socket_t *self = (struct amqp_ssl_socket_t *)base;
+ if (self) {
+ free(self->entropy);
+ free(self->ctr_drbg);
+ x509_free(self->cacert);
+ free(self->cacert);
+ rsa_free(self->key);
+ free(self->key);
+ x509_free(self->cert);
+ free(self->cert);
+ ssl_free(self->ssl);
+ free(self->ssl);
+ free(self->session);
+ free(self->buffer);
+ if (self->sockfd >= 0) {
+ net_close(self->sockfd);
+ status = 0;
+ }
+ free(self);
+ }
+ return status;
}
static int
amqp_ssl_socket_error(AMQP_UNUSED void *user_data)
{
- return -1;
+ return -1;
}
static int
amqp_ssl_socket_get_sockfd(void *base)
{
- struct amqp_ssl_socket_t *self = (struct amqp_ssl_socket_t *)base;
- return self->sockfd;
+ struct amqp_ssl_socket_t *self = (struct amqp_ssl_socket_t *)base;
+ return self->sockfd;
}
static const struct amqp_socket_class_t amqp_ssl_socket_class = {
- amqp_ssl_socket_writev, /* writev */
- amqp_ssl_socket_send, /* send */
- amqp_ssl_socket_recv, /* recv */
- amqp_ssl_socket_open, /* open */
- amqp_ssl_socket_close, /* close */
- amqp_ssl_socket_error, /* error */
- amqp_ssl_socket_get_sockfd /* get_sockfd */
+ amqp_ssl_socket_writev, /* writev */
+ amqp_ssl_socket_send, /* send */
+ amqp_ssl_socket_recv, /* recv */
+ amqp_ssl_socket_open, /* open */
+ amqp_ssl_socket_close, /* close */
+ amqp_ssl_socket_error, /* error */
+ amqp_ssl_socket_get_sockfd /* get_sockfd */
};
amqp_socket_t *
amqp_ssl_socket_new(void)
{
- struct amqp_ssl_socket_t *self = calloc(1, sizeof(*self));
- int status;
- if (!self) {
- goto error;
- }
- self->entropy = calloc(1, sizeof(*self->entropy));
- if (!self->entropy) {
- goto error;
- }
- self->sockfd = -1;
- entropy_init(self->entropy);
- self->ctr_drbg = calloc(1, sizeof(*self->ctr_drbg));
- if (!self->ctr_drbg) {
- goto error;
- }
- status = ctr_drbg_init(self->ctr_drbg, entropy_func, self->entropy,
- NULL, 0);
- if (status) {
- goto error;
- }
- self->ssl = calloc(1, sizeof(*self->ssl));
- if (!self->ssl) {
- goto error;
- }
- status = ssl_init(self->ssl);
- if (status) {
- goto error;
- }
- ssl_set_endpoint(self->ssl, SSL_IS_CLIENT);
- ssl_set_rng(self->ssl, ctr_drbg_random, self->ctr_drbg);
- ssl_set_ciphersuites(self->ssl, ssl_default_ciphersuites);
- ssl_set_authmode(self->ssl, SSL_VERIFY_REQUIRED);
- self->session = calloc(1, sizeof(*self->session));
- if (!self->session) {
- goto error;
- }
- ssl_set_session(self->ssl, 0, 0, self->session);
- return (amqp_socket_t *)self;
+ struct amqp_ssl_socket_t *self = calloc(1, sizeof(*self));
+ int status;
+ if (!self) {
+ goto error;
+ }
+ self->entropy = calloc(1, sizeof(*self->entropy));
+ if (!self->entropy) {
+ goto error;
+ }
+ self->sockfd = -1;
+ entropy_init(self->entropy);
+ self->ctr_drbg = calloc(1, sizeof(*self->ctr_drbg));
+ if (!self->ctr_drbg) {
+ goto error;
+ }
+ status = ctr_drbg_init(self->ctr_drbg, entropy_func, self->entropy,
+ NULL, 0);
+ if (status) {
+ goto error;
+ }
+ self->ssl = calloc(1, sizeof(*self->ssl));
+ if (!self->ssl) {
+ goto error;
+ }
+ status = ssl_init(self->ssl);
+ if (status) {
+ goto error;
+ }
+ ssl_set_endpoint(self->ssl, SSL_IS_CLIENT);
+ ssl_set_rng(self->ssl, ctr_drbg_random, self->ctr_drbg);
+ ssl_set_ciphersuites(self->ssl, ssl_default_ciphersuites);
+ ssl_set_authmode(self->ssl, SSL_VERIFY_REQUIRED);
+ self->session = calloc(1, sizeof(*self->session));
+ if (!self->session) {
+ goto error;
+ }
+ ssl_set_session(self->ssl, 0, 0, self->session);
+ return (amqp_socket_t *)self;
error:
- amqp_socket_close((amqp_socket_t *)self);
- return NULL;
+ amqp_socket_close((amqp_socket_t *)self);
+ return NULL;
}
int
amqp_ssl_socket_set_cacert(amqp_socket_t *base,
- const char *cacert)
+ const char *cacert)
{
- int status;
- struct amqp_ssl_socket_t *self;
- if (base->klass != &amqp_ssl_socket_class) {
- amqp_abort("<%p> is not of type amqp_ssl_socket_t", base);
- }
- self = (struct amqp_ssl_socket_t *)base;
- self->cacert = calloc(1, sizeof(*self->cacert));
- if (!self->cacert) {
- return -1;
- }
- status = x509parse_crtfile(self->cacert, cacert);
- if (status) {
- return -1;
- }
- return 0;
+ int status;
+ struct amqp_ssl_socket_t *self;
+ if (base->klass != &amqp_ssl_socket_class) {
+ amqp_abort("<%p> is not of type amqp_ssl_socket_t", base);
+ }
+ self = (struct amqp_ssl_socket_t *)base;
+ self->cacert = calloc(1, sizeof(*self->cacert));
+ if (!self->cacert) {
+ return -1;
+ }
+ status = x509parse_crtfile(self->cacert, cacert);
+ if (status) {
+ return -1;
+ }
+ return 0;
}
int
amqp_ssl_socket_set_key(amqp_socket_t *base,
- const char *cert,
- const char *key)
+ const char *cert,
+ const char *key)
{
- int status;
- struct amqp_ssl_socket_t *self;
- if (base->klass != &amqp_ssl_socket_class) {
- amqp_abort("<%p> is not of type amqp_ssl_socket_t", base);
- }
- self = (struct amqp_ssl_socket_t *)base;
- self->key = calloc(1, sizeof(*self->key));
- if (!self->key) {
- return -1;
- }
- status = x509parse_keyfile(self->key, key, NULL);
- if (status) {
- return -1;
- }
- self->cert = calloc(1, sizeof(*self->cert));
- if (!self->cert) {
- return -1;
- }
- status = x509parse_crtfile(self->cert, cert);
- if (status) {
- return -1;
- }
- return 0;
+ int status;
+ struct amqp_ssl_socket_t *self;
+ if (base->klass != &amqp_ssl_socket_class) {
+ amqp_abort("<%p> is not of type amqp_ssl_socket_t", base);
+ }
+ self = (struct amqp_ssl_socket_t *)base;
+ self->key = calloc(1, sizeof(*self->key));
+ if (!self->key) {
+ return -1;
+ }
+ status = x509parse_keyfile(self->key, key, NULL);
+ if (status) {
+ return -1;
+ }
+ self->cert = calloc(1, sizeof(*self->cert));
+ if (!self->cert) {
+ return -1;
+ }
+ status = x509parse_crtfile(self->cert, cert);
+ if (status) {
+ return -1;
+ }
+ return 0;
}
int
amqp_ssl_socket_set_key_buffer(AMQP_UNUSED amqp_socket_t *base,
- AMQP_UNUSED const char *cert,
- AMQP_UNUSED const void *key,
- AMQP_UNUSED size_t n)
+ AMQP_UNUSED const char *cert,
+ AMQP_UNUSED const void *key,
+ AMQP_UNUSED size_t n)
{
- amqp_abort("%s is not implemented for PolarSSL", __func__);
- return -1;
+ amqp_abort("%s is not implemented for PolarSSL", __func__);
+ return -1;
}
void
amqp_ssl_socket_set_verify(amqp_socket_t *base,
- amqp_boolean_t verify)
+ amqp_boolean_t verify)
{
- struct amqp_ssl_socket_t *self;
- if (base->klass != &amqp_ssl_socket_class) {
- amqp_abort("<%p> is not of type amqp_ssl_socket_t", base);
- }
- self = (struct amqp_ssl_socket_t *)base;
- if (verify) {
- ssl_set_authmode(self->ssl, SSL_VERIFY_REQUIRED);
- } else {
- ssl_set_authmode(self->ssl, SSL_VERIFY_NONE);
- }
+ struct amqp_ssl_socket_t *self;
+ if (base->klass != &amqp_ssl_socket_class) {
+ amqp_abort("<%p> is not of type amqp_ssl_socket_t", base);
+ }
+ self = (struct amqp_ssl_socket_t *)base;
+ if (verify) {
+ ssl_set_authmode(self->ssl, SSL_VERIFY_REQUIRED);
+ } else {
+ ssl_set_authmode(self->ssl, SSL_VERIFY_NONE);
+ }
}
void