diff options
author | Alan Antonuk <alan.antonuk@gmail.com> | 2013-04-11 10:53:59 -0700 |
---|---|---|
committer | Alan Antonuk <alan.antonuk@gmail.com> | 2013-04-17 09:56:29 -0700 |
commit | a2a91f532b7e648b2468acad39ae7169ac020d0a (patch) | |
tree | 78010b44a0e00011cc17787d144abc7dc358c560 /librabbitmq/amqp_polarssl.c | |
parent | 317a56cfffb05e72713bfa8a8e7236b7c39ddb8d (diff) | |
download | rabbitmq-c-github-ask-a2a91f532b7e648b2468acad39ae7169ac020d0a.tar.gz |
Fix code formatting to match the rest of the lib
Diffstat (limited to 'librabbitmq/amqp_polarssl.c')
-rw-r--r-- | librabbitmq/amqp_polarssl.c | 400 |
1 files changed, 200 insertions, 200 deletions
diff --git a/librabbitmq/amqp_polarssl.c b/librabbitmq/amqp_polarssl.c index 027ee47..b89f602 100644 --- a/librabbitmq/amqp_polarssl.c +++ b/librabbitmq/amqp_polarssl.c @@ -34,271 +34,271 @@ #include <stdlib.h> struct amqp_ssl_socket_t { - int sockfd; - entropy_context *entropy; - ctr_drbg_context *ctr_drbg; - x509_cert *cacert; - rsa_context *key; - x509_cert *cert; - ssl_context *ssl; - ssl_session *session; - char *buffer; - size_t length; + int sockfd; + entropy_context *entropy; + ctr_drbg_context *ctr_drbg; + x509_cert *cacert; + rsa_context *key; + x509_cert *cert; + ssl_context *ssl; + ssl_session *session; + char *buffer; + size_t length; }; static ssize_t amqp_ssl_socket_send(void *base, - const void *buf, - size_t len, - AMQP_UNUSED int flags) + const void *buf, + size_t len, + AMQP_UNUSED int flags) { - struct amqp_ssl_socket_t *self = (struct amqp_ssl_socket_t *)base; - return ssl_write(self->ssl, buf, len); + struct amqp_ssl_socket_t *self = (struct amqp_ssl_socket_t *)base; + return ssl_write(self->ssl, buf, len); } static ssize_t amqp_ssl_socket_writev(void *base, - const struct iovec *iov, - int iovcnt) + const struct iovec *iov, + int iovcnt) { - struct amqp_ssl_socket_t *self = (struct amqp_ssl_socket_t *)base; - ssize_t written = -1; - char *bufferp; - size_t bytes; - int i; - bytes = 0; - for (i = 0; i < iovcnt; ++i) { - bytes += iov[i].iov_len; - } - if (self->length < bytes) { - free(self->buffer); - self->buffer = malloc(bytes); - if (!self->buffer) { - self->length = 0; - goto exit; - } - self->length = bytes; - } - bufferp = self->buffer; - for (i = 0; i < iovcnt; ++i) { - memcpy(bufferp, iov[i].iov_base, iov[i].iov_len); - bufferp += iov[i].iov_len; - } - written = ssl_write(self->ssl, (const unsigned char *)self->buffer, - bytes); + struct amqp_ssl_socket_t *self = (struct amqp_ssl_socket_t *)base; + ssize_t written = -1; + char *bufferp; + size_t bytes; + int i; + bytes = 0; + for (i = 0; i < iovcnt; ++i) { + bytes += iov[i].iov_len; + } + if (self->length < bytes) { + free(self->buffer); + self->buffer = malloc(bytes); + if (!self->buffer) { + self->length = 0; + goto exit; + } + self->length = bytes; + } + bufferp = self->buffer; + for (i = 0; i < iovcnt; ++i) { + memcpy(bufferp, iov[i].iov_base, iov[i].iov_len); + bufferp += iov[i].iov_len; + } + written = ssl_write(self->ssl, (const unsigned char *)self->buffer, + bytes); exit: - return written; + return written; } static ssize_t amqp_ssl_socket_recv(void *base, - void *buf, - size_t len, - AMQP_UNUSED int flags) + void *buf, + size_t len, + AMQP_UNUSED int flags) { - struct amqp_ssl_socket_t *self = (struct amqp_ssl_socket_t *)base; - return ssl_read(self->ssl, buf, len); + struct amqp_ssl_socket_t *self = (struct amqp_ssl_socket_t *)base; + return ssl_read(self->ssl, buf, len); } static int amqp_ssl_socket_open(void *base, const char *host, int port) { - struct amqp_ssl_socket_t *self = (struct amqp_ssl_socket_t *)base; - int status = net_connect(&self->sockfd, host, port); - if (status) { - return -1; - } - if (self->cacert) { - ssl_set_ca_chain(self->ssl, self->cacert, NULL, host); - } - ssl_set_bio(self->ssl, net_recv, &self->sockfd, - net_send, &self->sockfd); - if (self->key && self->cert) { - ssl_set_own_cert(self->ssl, self->cert, self->key); - } - while (0 != (status = ssl_handshake(self->ssl))) { - switch (status) { - case POLARSSL_ERR_NET_WANT_READ: - case POLARSSL_ERR_NET_WANT_WRITE: - continue; - default: - break; - } - } - return status; + struct amqp_ssl_socket_t *self = (struct amqp_ssl_socket_t *)base; + int status = net_connect(&self->sockfd, host, port); + if (status) { + return -1; + } + if (self->cacert) { + ssl_set_ca_chain(self->ssl, self->cacert, NULL, host); + } + ssl_set_bio(self->ssl, net_recv, &self->sockfd, + net_send, &self->sockfd); + if (self->key && self->cert) { + ssl_set_own_cert(self->ssl, self->cert, self->key); + } + while (0 != (status = ssl_handshake(self->ssl))) { + switch (status) { + case POLARSSL_ERR_NET_WANT_READ: + case POLARSSL_ERR_NET_WANT_WRITE: + continue; + default: + break; + } + } + return status; } static int amqp_ssl_socket_close(void *base) { - int status = -1; - struct amqp_ssl_socket_t *self = (struct amqp_ssl_socket_t *)base; - if (self) { - free(self->entropy); - free(self->ctr_drbg); - x509_free(self->cacert); - free(self->cacert); - rsa_free(self->key); - free(self->key); - x509_free(self->cert); - free(self->cert); - ssl_free(self->ssl); - free(self->ssl); - free(self->session); - free(self->buffer); - if (self->sockfd >= 0) { - net_close(self->sockfd); - status = 0; - } - free(self); - } - return status; + int status = -1; + struct amqp_ssl_socket_t *self = (struct amqp_ssl_socket_t *)base; + if (self) { + free(self->entropy); + free(self->ctr_drbg); + x509_free(self->cacert); + free(self->cacert); + rsa_free(self->key); + free(self->key); + x509_free(self->cert); + free(self->cert); + ssl_free(self->ssl); + free(self->ssl); + free(self->session); + free(self->buffer); + if (self->sockfd >= 0) { + net_close(self->sockfd); + status = 0; + } + free(self); + } + return status; } static int amqp_ssl_socket_error(AMQP_UNUSED void *user_data) { - return -1; + return -1; } static int amqp_ssl_socket_get_sockfd(void *base) { - struct amqp_ssl_socket_t *self = (struct amqp_ssl_socket_t *)base; - return self->sockfd; + struct amqp_ssl_socket_t *self = (struct amqp_ssl_socket_t *)base; + return self->sockfd; } static const struct amqp_socket_class_t amqp_ssl_socket_class = { - amqp_ssl_socket_writev, /* writev */ - amqp_ssl_socket_send, /* send */ - amqp_ssl_socket_recv, /* recv */ - amqp_ssl_socket_open, /* open */ - amqp_ssl_socket_close, /* close */ - amqp_ssl_socket_error, /* error */ - amqp_ssl_socket_get_sockfd /* get_sockfd */ + amqp_ssl_socket_writev, /* writev */ + amqp_ssl_socket_send, /* send */ + amqp_ssl_socket_recv, /* recv */ + amqp_ssl_socket_open, /* open */ + amqp_ssl_socket_close, /* close */ + amqp_ssl_socket_error, /* error */ + amqp_ssl_socket_get_sockfd /* get_sockfd */ }; amqp_socket_t * amqp_ssl_socket_new(void) { - struct amqp_ssl_socket_t *self = calloc(1, sizeof(*self)); - int status; - if (!self) { - goto error; - } - self->entropy = calloc(1, sizeof(*self->entropy)); - if (!self->entropy) { - goto error; - } - self->sockfd = -1; - entropy_init(self->entropy); - self->ctr_drbg = calloc(1, sizeof(*self->ctr_drbg)); - if (!self->ctr_drbg) { - goto error; - } - status = ctr_drbg_init(self->ctr_drbg, entropy_func, self->entropy, - NULL, 0); - if (status) { - goto error; - } - self->ssl = calloc(1, sizeof(*self->ssl)); - if (!self->ssl) { - goto error; - } - status = ssl_init(self->ssl); - if (status) { - goto error; - } - ssl_set_endpoint(self->ssl, SSL_IS_CLIENT); - ssl_set_rng(self->ssl, ctr_drbg_random, self->ctr_drbg); - ssl_set_ciphersuites(self->ssl, ssl_default_ciphersuites); - ssl_set_authmode(self->ssl, SSL_VERIFY_REQUIRED); - self->session = calloc(1, sizeof(*self->session)); - if (!self->session) { - goto error; - } - ssl_set_session(self->ssl, 0, 0, self->session); - return (amqp_socket_t *)self; + struct amqp_ssl_socket_t *self = calloc(1, sizeof(*self)); + int status; + if (!self) { + goto error; + } + self->entropy = calloc(1, sizeof(*self->entropy)); + if (!self->entropy) { + goto error; + } + self->sockfd = -1; + entropy_init(self->entropy); + self->ctr_drbg = calloc(1, sizeof(*self->ctr_drbg)); + if (!self->ctr_drbg) { + goto error; + } + status = ctr_drbg_init(self->ctr_drbg, entropy_func, self->entropy, + NULL, 0); + if (status) { + goto error; + } + self->ssl = calloc(1, sizeof(*self->ssl)); + if (!self->ssl) { + goto error; + } + status = ssl_init(self->ssl); + if (status) { + goto error; + } + ssl_set_endpoint(self->ssl, SSL_IS_CLIENT); + ssl_set_rng(self->ssl, ctr_drbg_random, self->ctr_drbg); + ssl_set_ciphersuites(self->ssl, ssl_default_ciphersuites); + ssl_set_authmode(self->ssl, SSL_VERIFY_REQUIRED); + self->session = calloc(1, sizeof(*self->session)); + if (!self->session) { + goto error; + } + ssl_set_session(self->ssl, 0, 0, self->session); + return (amqp_socket_t *)self; error: - amqp_socket_close((amqp_socket_t *)self); - return NULL; + amqp_socket_close((amqp_socket_t *)self); + return NULL; } int amqp_ssl_socket_set_cacert(amqp_socket_t *base, - const char *cacert) + const char *cacert) { - int status; - struct amqp_ssl_socket_t *self; - if (base->klass != &amqp_ssl_socket_class) { - amqp_abort("<%p> is not of type amqp_ssl_socket_t", base); - } - self = (struct amqp_ssl_socket_t *)base; - self->cacert = calloc(1, sizeof(*self->cacert)); - if (!self->cacert) { - return -1; - } - status = x509parse_crtfile(self->cacert, cacert); - if (status) { - return -1; - } - return 0; + int status; + struct amqp_ssl_socket_t *self; + if (base->klass != &amqp_ssl_socket_class) { + amqp_abort("<%p> is not of type amqp_ssl_socket_t", base); + } + self = (struct amqp_ssl_socket_t *)base; + self->cacert = calloc(1, sizeof(*self->cacert)); + if (!self->cacert) { + return -1; + } + status = x509parse_crtfile(self->cacert, cacert); + if (status) { + return -1; + } + return 0; } int amqp_ssl_socket_set_key(amqp_socket_t *base, - const char *cert, - const char *key) + const char *cert, + const char *key) { - int status; - struct amqp_ssl_socket_t *self; - if (base->klass != &amqp_ssl_socket_class) { - amqp_abort("<%p> is not of type amqp_ssl_socket_t", base); - } - self = (struct amqp_ssl_socket_t *)base; - self->key = calloc(1, sizeof(*self->key)); - if (!self->key) { - return -1; - } - status = x509parse_keyfile(self->key, key, NULL); - if (status) { - return -1; - } - self->cert = calloc(1, sizeof(*self->cert)); - if (!self->cert) { - return -1; - } - status = x509parse_crtfile(self->cert, cert); - if (status) { - return -1; - } - return 0; + int status; + struct amqp_ssl_socket_t *self; + if (base->klass != &amqp_ssl_socket_class) { + amqp_abort("<%p> is not of type amqp_ssl_socket_t", base); + } + self = (struct amqp_ssl_socket_t *)base; + self->key = calloc(1, sizeof(*self->key)); + if (!self->key) { + return -1; + } + status = x509parse_keyfile(self->key, key, NULL); + if (status) { + return -1; + } + self->cert = calloc(1, sizeof(*self->cert)); + if (!self->cert) { + return -1; + } + status = x509parse_crtfile(self->cert, cert); + if (status) { + return -1; + } + return 0; } int amqp_ssl_socket_set_key_buffer(AMQP_UNUSED amqp_socket_t *base, - AMQP_UNUSED const char *cert, - AMQP_UNUSED const void *key, - AMQP_UNUSED size_t n) + AMQP_UNUSED const char *cert, + AMQP_UNUSED const void *key, + AMQP_UNUSED size_t n) { - amqp_abort("%s is not implemented for PolarSSL", __func__); - return -1; + amqp_abort("%s is not implemented for PolarSSL", __func__); + return -1; } void amqp_ssl_socket_set_verify(amqp_socket_t *base, - amqp_boolean_t verify) + amqp_boolean_t verify) { - struct amqp_ssl_socket_t *self; - if (base->klass != &amqp_ssl_socket_class) { - amqp_abort("<%p> is not of type amqp_ssl_socket_t", base); - } - self = (struct amqp_ssl_socket_t *)base; - if (verify) { - ssl_set_authmode(self->ssl, SSL_VERIFY_REQUIRED); - } else { - ssl_set_authmode(self->ssl, SSL_VERIFY_NONE); - } + struct amqp_ssl_socket_t *self; + if (base->klass != &amqp_ssl_socket_class) { + amqp_abort("<%p> is not of type amqp_ssl_socket_t", base); + } + self = (struct amqp_ssl_socket_t *)base; + if (verify) { + ssl_set_authmode(self->ssl, SSL_VERIFY_REQUIRED); + } else { + ssl_set_authmode(self->ssl, SSL_VERIFY_NONE); + } } void |