summaryrefslogtreecommitdiff
path: root/lib/cert-cred-rawpk.c
diff options
context:
space:
mode:
Diffstat (limited to 'lib/cert-cred-rawpk.c')
-rw-r--r--lib/cert-cred-rawpk.c73
1 files changed, 28 insertions, 45 deletions
diff --git a/lib/cert-cred-rawpk.c b/lib/cert-cred-rawpk.c
index dd0dcc2f29..56da4630a3 100644
--- a/lib/cert-cred-rawpk.c
+++ b/lib/cert-cred-rawpk.c
@@ -82,15 +82,11 @@
*
* Since: 3.6.6
**/
-int gnutls_certificate_set_rawpk_key_mem(gnutls_certificate_credentials_t cred,
- const gnutls_datum_t * spki,
- const gnutls_datum_t * pkey,
- gnutls_x509_crt_fmt_t format,
- const char *pass,
- unsigned int key_usage,
- const char **names,
- unsigned int names_length,
- unsigned int flags)
+int gnutls_certificate_set_rawpk_key_mem(
+ gnutls_certificate_credentials_t cred, const gnutls_datum_t *spki,
+ const gnutls_datum_t *pkey, gnutls_x509_crt_fmt_t format,
+ const char *pass, unsigned int key_usage, const char **names,
+ unsigned int names_length, unsigned int flags)
{
int ret;
gnutls_privkey_t privkey;
@@ -104,8 +100,8 @@ int gnutls_certificate_set_rawpk_key_mem(gnutls_certificate_credentials_t cred,
/* Import our private key. This function does all the necessary
* inits, checks and imports. */
- ret = _gnutls_read_key_mem(cred, pkey->data, pkey->size,
- format, pass, flags, &privkey);
+ ret = _gnutls_read_key_mem(cred, pkey->data, pkey->size, format, pass,
+ flags, &privkey);
if (ret < 0) {
return gnutls_assert_val(ret);
}
@@ -130,9 +126,8 @@ int gnutls_certificate_set_rawpk_key_mem(gnutls_certificate_credentials_t cred,
if (names != NULL && names_length > 0) {
for (i = 0; i < names_length; i++) {
- ret =
- _gnutls_str_array_append_idna(&str_names, names[i],
- strlen(names[i]));
+ ret = _gnutls_str_array_append_idna(
+ &str_names, names[i], strlen(names[i]));
if (ret < 0) {
gnutls_privkey_deinit(privkey);
_gnutls_str_array_clear(&str_names);
@@ -144,9 +139,8 @@ int gnutls_certificate_set_rawpk_key_mem(gnutls_certificate_credentials_t cred,
/* Now that we have converted the key material to our internal structures
* we can now add them to the credentials structure */
- ret =
- _gnutls_certificate_credential_append_keypair(cred, privkey,
- str_names, pcert, 1);
+ ret = _gnutls_certificate_credential_append_keypair(
+ cred, privkey, str_names, pcert, 1);
// Check for errors
if (ret < 0) {
gnutls_privkey_deinit(privkey);
@@ -223,16 +217,11 @@ int gnutls_certificate_set_rawpk_key_mem(gnutls_certificate_credentials_t cred,
*
* Since: 3.6.6
*/
-int gnutls_certificate_set_rawpk_key_file(gnutls_certificate_credentials_t cred,
- const char *rawpkfile,
- const char *privkeyfile,
- gnutls_x509_crt_fmt_t format,
- const char *pass,
- unsigned int key_usage,
- const char **names,
- unsigned int names_length,
- unsigned int privkey_flags,
- unsigned int pkcs11_flags)
+int gnutls_certificate_set_rawpk_key_file(
+ gnutls_certificate_credentials_t cred, const char *rawpkfile,
+ const char *privkeyfile, gnutls_x509_crt_fmt_t format, const char *pass,
+ unsigned int key_usage, const char **names, unsigned int names_length,
+ unsigned int privkey_flags, unsigned int pkcs11_flags)
{
int ret;
gnutls_privkey_t privkey;
@@ -247,9 +236,8 @@ int gnutls_certificate_set_rawpk_key_file(gnutls_certificate_credentials_t cred,
/* Import our private key. This function does all the necessary
* inits, checks and imports. */
- ret =
- _gnutls_read_key_file(cred, privkeyfile, format, pass,
- privkey_flags, &privkey);
+ ret = _gnutls_read_key_file(cred, privkeyfile, format, pass,
+ privkey_flags, &privkey);
if (ret < 0) {
return gnutls_assert_val(ret);
}
@@ -265,7 +253,6 @@ int gnutls_certificate_set_rawpk_key_file(gnutls_certificate_credentials_t cred,
* or from a regular file.
*/
if (gnutls_url_is_supported(rawpkfile)) {
-
ret = gnutls_pubkey_init(&pubkey);
if (ret < 0) {
gnutls_privkey_deinit(privkey);
@@ -290,26 +277,25 @@ int gnutls_certificate_set_rawpk_key_file(gnutls_certificate_credentials_t cred,
}
} else {
- gnutls_datum_t rawpubkey; // to hold rawpk data from file
+ gnutls_datum_t rawpubkey; // to hold rawpk data from file
size_t key_size;
/* Read our raw public-key into memory from file */
- rawpubkey.data = (void *)read_file(rawpkfile,
- RF_BINARY | RF_SENSITIVE,
- &key_size);
+ rawpubkey.data = (void *)read_file(
+ rawpkfile, RF_BINARY | RF_SENSITIVE, &key_size);
if (rawpubkey.data == NULL) {
gnutls_privkey_deinit(privkey);
return gnutls_assert_val(GNUTLS_E_FILE_ERROR);
}
- rawpubkey.size = key_size; // Implicit type casting
+ rawpubkey.size = key_size; // Implicit type casting
/* We now convert our raw public key that we've loaded into memory to
* a parsed certificate (pcert) structure. Note that rawpubkey will
* be copied into pcert. Therefore we can directly cleanup rawpubkey.
*/
- ret = gnutls_pcert_import_rawpk_raw(pcert, &rawpubkey,
- format, key_usage, 0);
+ ret = gnutls_pcert_import_rawpk_raw(pcert, &rawpubkey, format,
+ key_usage, 0);
zeroize_key(rawpubkey.data, rawpubkey.size);
free(rawpubkey.data);
@@ -320,7 +306,6 @@ int gnutls_certificate_set_rawpk_key_file(gnutls_certificate_credentials_t cred,
return gnutls_assert_val(ret);
}
-
}
/* Process the names, if any */
@@ -328,9 +313,8 @@ int gnutls_certificate_set_rawpk_key_file(gnutls_certificate_credentials_t cred,
if (names != NULL && names_length > 0) {
for (i = 0; i < names_length; i++) {
- ret =
- _gnutls_str_array_append_idna(&str_names, names[i],
- strlen(names[i]));
+ ret = _gnutls_str_array_append_idna(
+ &str_names, names[i], strlen(names[i]));
if (ret < 0) {
gnutls_privkey_deinit(privkey);
_gnutls_str_array_clear(&str_names);
@@ -342,9 +326,8 @@ int gnutls_certificate_set_rawpk_key_file(gnutls_certificate_credentials_t cred,
/* Now that we have converted the key material to our internal structures
* we can now add them to the credentials structure */
- ret =
- _gnutls_certificate_credential_append_keypair(cred, privkey,
- str_names, pcert, 1);
+ ret = _gnutls_certificate_credential_append_keypair(
+ cred, privkey, str_names, pcert, 1);
if (ret < 0) {
gnutls_privkey_deinit(privkey);
gnutls_pcert_deinit(pcert);