diff options
author | Simon Josefsson <simon@josefsson.org> | 2008-07-02 15:24:05 +0200 |
---|---|---|
committer | Simon Josefsson <simon@josefsson.org> | 2008-07-02 15:24:05 +0200 |
commit | bade988016aa5d2936c6bdf53570125181cfe2f9 (patch) | |
tree | 65948be9cd75ccfb8fd2a6c26ad15caed4119cc5 /lib/auth_rsa.c | |
parent | 36f07088e2979bf28e52fec4992d3da04e73eb6c (diff) | |
download | gnutls-bade988016aa5d2936c6bdf53570125181cfe2f9.tar.gz |
Indent code.
Diffstat (limited to 'lib/auth_rsa.c')
-rw-r--r-- | lib/auth_rsa.c | 20 |
1 files changed, 12 insertions, 8 deletions
diff --git a/lib/auth_rsa.c b/lib/auth_rsa.c index b84dcb306e..bc89d1ecee 100644 --- a/lib/auth_rsa.c +++ b/lib/auth_rsa.c @@ -87,8 +87,8 @@ _gnutls_get_public_rsa_params (gnutls_session_t session, ret = _gnutls_get_auth_info_gcert (&peer_cert, - session->security_parameters.cert_type, - info, CERT_ONLY_PUBKEY | CERT_NO_COPY); + session->security_parameters.cert_type, + info, CERT_ONLY_PUBKEY | CERT_NO_COPY); if (ret < 0) { @@ -99,7 +99,8 @@ _gnutls_get_public_rsa_params (gnutls_session_t session, /* EXPORT case: */ if (_gnutls_cipher_suite_get_kx_algo - (&session->security_parameters.current_cipher_suite) == GNUTLS_KX_RSA_EXPORT + (&session->security_parameters.current_cipher_suite) == + GNUTLS_KX_RSA_EXPORT && _gnutls_mpi_get_nbits (peer_cert.params[0]) > 512) { @@ -168,8 +169,8 @@ _gnutls_get_private_rsa_params (gnutls_session_t session, } bits = - _gnutls_mpi_get_nbits (session->internals.selected_cert_list[0]. - params[0]); + _gnutls_mpi_get_nbits (session->internals. + selected_cert_list[0].params[0]); if (_gnutls_cipher_suite_get_kx_algo (&session->security_parameters.current_cipher_suite) @@ -290,7 +291,9 @@ _gnutls_proc_rsa_client_kx (gnutls_session_t session, opaque * data, /* we do not need strong random numbers here. */ - ret = _gnutls_rnd (RND_NONCE, session->key->key.data, session->key->key.size); + ret = + _gnutls_rnd (RND_NONCE, session->key->key.data, + session->key->key.size); if (ret < 0) { gnutls_assert (); @@ -345,8 +348,9 @@ _gnutls_gen_rsa_client_kx (gnutls_session_t session, opaque ** data) return GNUTLS_E_MEMORY_ERROR; } - ret = _gnutls_rnd( RND_RANDOM, session->key->key.data, session->key->key.size); - if ( ret < 0) + ret = + _gnutls_rnd (RND_RANDOM, session->key->key.data, session->key->key.size); + if (ret < 0) { gnutls_assert (); return ret; |