diff options
author | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2018-10-30 19:46:09 +0100 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@redhat.com> | 2018-11-01 13:12:01 +0100 |
commit | 0639f63a72a9b6ad26af87e539f1938940243f5a (patch) | |
tree | 72077c73c6675731a6b412523b659d311ca43b55 /lib | |
parent | c7cabc18e193d556583d4adb1905d79602d0f8b0 (diff) | |
download | gnutls-0639f63a72a9b6ad26af87e539f1938940243f5a.tar.gz |
gnutls_priority_init: fixed indentation according to project rules
Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
Diffstat (limited to 'lib')
-rw-r--r-- | lib/priority.c | 47 |
1 files changed, 25 insertions, 22 deletions
diff --git a/lib/priority.c b/lib/priority.c index 33d164f214..013e71bf74 100644 --- a/lib/priority.c +++ b/lib/priority.c @@ -1775,36 +1775,39 @@ gnutls_priority_init(gnutls_priority_t * priority_cache, else goto error; } - } else if (strncasecmp - (&broken_list[i][1], "CTYPE-", 6) == 0) { // Certificate types - if (strncasecmp(&broken_list[i][1], "CTYPE-ALL", 9) == 0) - { // Symmetric cert types, all types allowed - bulk_fn(&(*priority_cache)->client_ctype, cert_type_priority_all); - bulk_fn(&(*priority_cache)->server_ctype, cert_type_priority_all); - } else if (strncasecmp(&broken_list[i][1], "CTYPE-CLI-", 10) == 0) - { // Client certificate types - if (strncasecmp(&broken_list[i][1], "CTYPE-CLI-ALL", 13) == 0) - { // All client cert types allowed - bulk_fn(&(*priority_cache)->client_ctype, cert_type_priority_all); + } else if (strncasecmp(&broken_list[i][1], "CTYPE-", 6) == 0) { + // Certificate types + if (strncasecmp(&broken_list[i][1], "CTYPE-ALL", 9) == 0) { + // Symmetric cert types, all types allowed + bulk_fn(&(*priority_cache)->client_ctype, + cert_type_priority_all); + bulk_fn(&(*priority_cache)->server_ctype, + cert_type_priority_all); + } else if (strncasecmp(&broken_list[i][1], "CTYPE-CLI-", 10) == 0) { + // Client certificate types + if (strncasecmp(&broken_list[i][1], "CTYPE-CLI-ALL", 13) == 0) { + // All client cert types allowed + bulk_fn(&(*priority_cache)->client_ctype, + cert_type_priority_all); } else if ((algo = gnutls_certificate_type_get_id - (&broken_list[i][11])) != GNUTLS_CRT_UNKNOWN) - { // Specific client cert type allowed + (&broken_list[i][11])) != GNUTLS_CRT_UNKNOWN) { + // Specific client cert type allowed fn(&(*priority_cache)->client_ctype, algo); } else goto error; - } else if (strncasecmp(&broken_list[i][1], "CTYPE-SRV-", 10) == 0) - { // Server certificate types - if (strncasecmp(&broken_list[i][1], "CTYPE-SRV-ALL", 13) == 0) - { // All server cert types allowed - bulk_fn(&(*priority_cache)->server_ctype, cert_type_priority_all); + } else if (strncasecmp(&broken_list[i][1], "CTYPE-SRV-", 10) == 0) { + // Server certificate types + if (strncasecmp(&broken_list[i][1], "CTYPE-SRV-ALL", 13) == 0) { + // All server cert types allowed + bulk_fn(&(*priority_cache)->server_ctype, + cert_type_priority_all); } else if ((algo = gnutls_certificate_type_get_id - (&broken_list[i][11])) != GNUTLS_CRT_UNKNOWN) - { // Specific server cert type allowed + (&broken_list[i][11])) != GNUTLS_CRT_UNKNOWN) { + // Specific server cert type allowed fn(&(*priority_cache)->server_ctype, algo); } else goto error; } else { // Symmetric certificate type if ((algo = gnutls_certificate_type_get_id - (&broken_list[i][7])) != GNUTLS_CRT_UNKNOWN) - { + (&broken_list[i][7])) != GNUTLS_CRT_UNKNOWN) { fn(&(*priority_cache)->client_ctype, algo); fn(&(*priority_cache)->server_ctype, algo); } else goto error; |