summaryrefslogtreecommitdiff
path: root/lib/priority.c
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@gnutls.org>2018-10-30 19:46:09 +0100
committerNikos Mavrogiannopoulos <nmav@redhat.com>2018-11-01 13:12:01 +0100
commit0639f63a72a9b6ad26af87e539f1938940243f5a (patch)
tree72077c73c6675731a6b412523b659d311ca43b55 /lib/priority.c
parentc7cabc18e193d556583d4adb1905d79602d0f8b0 (diff)
downloadgnutls-0639f63a72a9b6ad26af87e539f1938940243f5a.tar.gz
gnutls_priority_init: fixed indentation according to project rules
Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
Diffstat (limited to 'lib/priority.c')
-rw-r--r--lib/priority.c47
1 files changed, 25 insertions, 22 deletions
diff --git a/lib/priority.c b/lib/priority.c
index 33d164f214..013e71bf74 100644
--- a/lib/priority.c
+++ b/lib/priority.c
@@ -1775,36 +1775,39 @@ gnutls_priority_init(gnutls_priority_t * priority_cache,
else
goto error;
}
- } else if (strncasecmp
- (&broken_list[i][1], "CTYPE-", 6) == 0) { // Certificate types
- if (strncasecmp(&broken_list[i][1], "CTYPE-ALL", 9) == 0)
- { // Symmetric cert types, all types allowed
- bulk_fn(&(*priority_cache)->client_ctype, cert_type_priority_all);
- bulk_fn(&(*priority_cache)->server_ctype, cert_type_priority_all);
- } else if (strncasecmp(&broken_list[i][1], "CTYPE-CLI-", 10) == 0)
- { // Client certificate types
- if (strncasecmp(&broken_list[i][1], "CTYPE-CLI-ALL", 13) == 0)
- { // All client cert types allowed
- bulk_fn(&(*priority_cache)->client_ctype, cert_type_priority_all);
+ } else if (strncasecmp(&broken_list[i][1], "CTYPE-", 6) == 0) {
+ // Certificate types
+ if (strncasecmp(&broken_list[i][1], "CTYPE-ALL", 9) == 0) {
+ // Symmetric cert types, all types allowed
+ bulk_fn(&(*priority_cache)->client_ctype,
+ cert_type_priority_all);
+ bulk_fn(&(*priority_cache)->server_ctype,
+ cert_type_priority_all);
+ } else if (strncasecmp(&broken_list[i][1], "CTYPE-CLI-", 10) == 0) {
+ // Client certificate types
+ if (strncasecmp(&broken_list[i][1], "CTYPE-CLI-ALL", 13) == 0) {
+ // All client cert types allowed
+ bulk_fn(&(*priority_cache)->client_ctype,
+ cert_type_priority_all);
} else if ((algo = gnutls_certificate_type_get_id
- (&broken_list[i][11])) != GNUTLS_CRT_UNKNOWN)
- { // Specific client cert type allowed
+ (&broken_list[i][11])) != GNUTLS_CRT_UNKNOWN) {
+ // Specific client cert type allowed
fn(&(*priority_cache)->client_ctype, algo);
} else goto error;
- } else if (strncasecmp(&broken_list[i][1], "CTYPE-SRV-", 10) == 0)
- { // Server certificate types
- if (strncasecmp(&broken_list[i][1], "CTYPE-SRV-ALL", 13) == 0)
- { // All server cert types allowed
- bulk_fn(&(*priority_cache)->server_ctype, cert_type_priority_all);
+ } else if (strncasecmp(&broken_list[i][1], "CTYPE-SRV-", 10) == 0) {
+ // Server certificate types
+ if (strncasecmp(&broken_list[i][1], "CTYPE-SRV-ALL", 13) == 0) {
+ // All server cert types allowed
+ bulk_fn(&(*priority_cache)->server_ctype,
+ cert_type_priority_all);
} else if ((algo = gnutls_certificate_type_get_id
- (&broken_list[i][11])) != GNUTLS_CRT_UNKNOWN)
- { // Specific server cert type allowed
+ (&broken_list[i][11])) != GNUTLS_CRT_UNKNOWN) {
+ // Specific server cert type allowed
fn(&(*priority_cache)->server_ctype, algo);
} else goto error;
} else { // Symmetric certificate type
if ((algo = gnutls_certificate_type_get_id
- (&broken_list[i][7])) != GNUTLS_CRT_UNKNOWN)
- {
+ (&broken_list[i][7])) != GNUTLS_CRT_UNKNOWN) {
fn(&(*priority_cache)->client_ctype, algo);
fn(&(*priority_cache)->server_ctype, algo);
} else goto error;