summaryrefslogtreecommitdiffstats
path: root/lib/libssl/src/ssl/kssl.c
diff options
context:
space:
mode:
Diffstat (limited to 'lib/libssl/src/ssl/kssl.c')
-rw-r--r--lib/libssl/src/ssl/kssl.c97
1 files changed, 49 insertions, 48 deletions
diff --git a/lib/libssl/src/ssl/kssl.c b/lib/libssl/src/ssl/kssl.c
index a0beabe7536..b71753c1912 100644
--- a/lib/libssl/src/ssl/kssl.c
+++ b/lib/libssl/src/ssl/kssl.c
@@ -9,7 +9,7 @@
* are met:
*
* 1. Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
+ * notice, this list of conditions and the following disclaimer.
*
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in
@@ -145,7 +145,7 @@ kssl_map_enc(krb5_enctype enctype)
** "62 xx 30 yy" (APPLICATION-2, SEQUENCE), where xx-yy =~ 2, and
** xx and yy are possibly multi-byte length fields.
*/
-static int
+static int
kssl_test_confound(unsigned char *p)
{
int len = 2;
@@ -194,7 +194,7 @@ kssl_test_confound(unsigned char *p)
break;
}
- return (xx - len == yy) ? 1: 0;
+ return (xx - len == yy) ? 1 : 0;
}
/* Allocate, fill, and return cksumlens array of checksum lengths.
@@ -203,7 +203,7 @@ kssl_test_confound(unsigned char *p)
**
** The krb5_cksumarray[] was an internal variable that has since been
** replaced by a more general method for storing the data. It should
-** not be used. Instead we use real API calls and make a guess for
+** not be used. Instead we use real API calls and make a guess for
** what the highest assigned CKSUMTYPE_ constant is. As of 1.2.2
** it is 0x000c (CKSUMTYPE_HMAC_SHA1_DES3). So we will use 0x0010.
*/
@@ -258,7 +258,7 @@ kssl_skip_confound(krb5_enctype etype, unsigned char *a)
static size_t *cksumlens = NULL;
unsigned char *test_auth;
- conlen = (etype) ? 8: 0;
+ conlen = (etype) ? 8 : 0;
if (!cksumlens && !(cksumlens = populate_cksumlens()))
return NULL;
@@ -342,7 +342,7 @@ print_krb5_keyblock(char *label, krb5_keyblock *keyblk)
}
#ifdef KRB5_HEIMDAL
printf("%s\n\t[et%d:%d]: ", label, keyblk->keytype,
- keyblk->keyvalue->length);
+ keyblk->keyvalue->length);
for (i = 0; i < (int)keyblk->keyvalue->length; i++) {
printf("%02x",(unsigned char *)(keyblk->keyvalue->contents)[i]);
}
@@ -369,7 +369,7 @@ print_krb5_princ(char *label, krb5_principal_data *princ)
if (princ == NULL)
return;
for (ui = 0; ui < (int)princ->realm.length; ui++)
- putchar(princ->realm.data[ui]);
+ putchar(princ->realm.data[ui]);
printf(" (nametype %d) has %d strings:\n", princ->type, princ->length);
for (i = 0; i < (int)princ->length; i++) {
printf("\t%d [%d]: ", i, princ->data[i].length);
@@ -420,7 +420,7 @@ kssl_cget_tkt(
}
if ((krb5rc = krb5_init_context(&krb5context)) != 0) {
- (void) snprintf(kssl_err->text,KSSL_ERR_MAX,
+ (void) snprintf(kssl_err->text, KSSL_ERR_MAX,
"krb5_init_context() fails: %d\n", krb5rc);
kssl_err->reason = SSL_R_KRB5_C_INIT;
goto err;
@@ -428,12 +428,12 @@ kssl_cget_tkt(
if ((krb5rc = krb5_sname_to_principal(krb5context,
kssl_ctx->service_host,
- (kssl_ctx->service_name)? kssl_ctx->service_name: KRB5SVC,
- KRB5_NT_SRV_HST, &krb5creds.server)) != 0) {
- (void) snprintf(kssl_err->text,KSSL_ERR_MAX,
+ (kssl_ctx->service_name) ? kssl_ctx->service_name : KRB5SVC,
+ KRB5_NT_SRV_HST, &krb5creds.server)) != 0) {
+ (void) snprintf(kssl_err->text, KSSL_ERR_MAX,
"krb5_sname_to_principal() fails for %s/%s\n",
- kssl_ctx->service_host,
- (kssl_ctx->service_name)? kssl_ctx->service_name: KRB5SVC);
+ kssl_ctx->service_host, (kssl_ctx->service_name) ?
+ kssl_ctx->service_name : KRB5SVC);
kssl_err->reason = SSL_R_KRB5_C_INIT;
goto err;
}
@@ -445,12 +445,11 @@ kssl_cget_tkt(
}
if ((krb5rc = krb5_cc_get_principal(krb5context, krb5ccdef,
- &krb5creds.client)) != 0)
- {
+ &krb5creds.client)) != 0) {
kssl_err_set(kssl_err, SSL_R_KRB5_C_CC_PRINC,
- "krb5_cc_get_principal() fails.\n");
+ "krb5_cc_get_principal() fails.\n");
goto err;
- }
+ }
if ((krb5rc = krb5_get_credentials(krb5context, 0, krb5ccdef,
&krb5creds, &krb5credsp)) != 0) {
@@ -494,12 +493,12 @@ kssl_cget_tkt(
ap_req = (KRB5_APREQBODY *) d2i_KRB5_APREQ(NULL, &p, arlen);
if (ap_req) {
authenp->length = i2d_KRB5_ENCDATA(
- ap_req->authenticator, NULL);
+ ap_req->authenticator, NULL);
if (authenp->length &&
(authenp->data = malloc(authenp->length))) {
unsigned char *adp = (unsigned char *)authenp->data;
authenp->length = i2d_KRB5_ENCDATA(
- ap_req->authenticator, &adp);
+ ap_req->authenticator, &adp);
}
}
@@ -522,7 +521,7 @@ kssl_cget_tkt(
else
krb5rc = 0;
- err:
+err:
#ifdef KSSL_DEBUG
kssl_ctx_show(kssl_ctx);
#endif /* KSSL_DEBUG */
@@ -557,7 +556,7 @@ kssl_TKT2tkt(
/* OUT */ krb5_ticket **krb5ticket,
/* OUT */ KSSL_ERR *kssl_err )
{
- krb5_error_code krb5rc = KRB5KRB_ERR_GENERIC;
+ krb5_error_code krb5rc = KRB5KRB_ERR_GENERIC;
krb5_ticket *new5ticket = NULL;
ASN1_GENERALSTRING *gstr_svc, *gstr_host;
@@ -609,8 +608,8 @@ kssl_TKT2tkt(
return KRB5KRB_ERR_GENERIC;
} else {
memcpy(new5ticket->enc_part.ciphertext.data,
- asn1ticket->encdata->cipher->data,
- asn1ticket->encdata->cipher->length);
+ asn1ticket->encdata->cipher->data,
+ asn1ticket->encdata->cipher->length);
}
*krb5ticket = new5ticket;
@@ -632,8 +631,8 @@ kssl_sget_tkt(
/* OUT */ krb5_ticket_times *ttimes,
/* OUT */ KSSL_ERR *kssl_err )
{
- krb5_error_code krb5rc = KRB5KRB_ERR_GENERIC;
- static krb5_context krb5context = NULL;
+ krb5_error_code krb5rc = KRB5KRB_ERR_GENERIC;
+ static krb5_context krb5context = NULL;
static krb5_auth_context krb5auth_context = NULL;
krb5_ticket *krb5ticket = NULL;
KRB5_TKTBODY *asn1ticket = NULL;
@@ -641,7 +640,7 @@ kssl_sget_tkt(
krb5_keytab krb5keytab = NULL;
krb5_keytab_entry kt_entry;
krb5_principal krb5server;
- krb5_rcache rcache = NULL;
+ krb5_rcache rcache = NULL;
kssl_err_set(kssl_err, 0, "");
@@ -788,13 +787,13 @@ kssl_sget_tkt(
krb5_address **paddr = krb5ticket->enc_part2->caddrs;
printf("Decrypted ticket fields:\n");
printf("\tflags: %X, transit-type: %X",
- krb5ticket->enc_part2->flags,
- krb5ticket->enc_part2->transited.tr_type);
+ krb5ticket->enc_part2->flags,
+ krb5ticket->enc_part2->transited.tr_type);
print_krb5_data("\ttransit-data: ",
- &(krb5ticket->enc_part2->transited.tr_contents));
+ &(krb5ticket->enc_part2->transited.tr_contents));
printf("\tcaddrs: %p, authdata: %p\n",
- krb5ticket->enc_part2->caddrs,
- krb5ticket->enc_part2->authorization_data);
+ krb5ticket->enc_part2->caddrs,
+ krb5ticket->enc_part2->authorization_data);
if (paddr) {
printf("\tcaddrs:\n");
for (i = 0; paddr[i] != NULL; i++) {
@@ -805,9 +804,9 @@ kssl_sget_tkt(
}
}
printf("\tstart/auth/end times: %d / %d / %d\n",
- krb5ticket->enc_part2->times.starttime,
- krb5ticket->enc_part2->times.authtime,
- krb5ticket->enc_part2->times.endtime);
+ krb5ticket->enc_part2->times.starttime,
+ krb5ticket->enc_part2->times.authtime,
+ krb5ticket->enc_part2->times.endtime);
}
#endif /* KSSL_DEBUG */
}
@@ -841,7 +840,7 @@ kssl_sget_tkt(
ttimes->endtime = krb5ticket->enc_part2->times.endtime;
ttimes->renew_till = krb5ticket->enc_part2->times.renew_till;
- err:
+err:
#ifdef KSSL_DEBUG
kssl_ctx_show(kssl_ctx);
#endif /* KSSL_DEBUG */
@@ -1126,7 +1125,7 @@ kssl_keytab_is_available(KSSL_CTX *kssl_ctx)
krb5_kt_free_entry(krb5context, &entry);
rc = 1;
- exit:
+exit:
if (krb5keytab)
krb5_kt_close(krb5context, krb5keytab);
if (princ)
@@ -1175,7 +1174,7 @@ kssl_tgt_is_available(KSSL_CTX *kssl_ctx)
rc = 1;
- err:
+err:
#ifdef KSSL_DEBUG
kssl_ctx_show(kssl_ctx);
#endif /* KSSL_DEBUG */
@@ -1214,7 +1213,8 @@ kssl_krb5_free_data_contents(krb5_context context, krb5_data *data)
** return NULL on failure.
*/
static struct tm *
-k_gmtime(ASN1_GENERALIZEDTIME *gtime, struct tm *k_tm) {
+k_gmtime(ASN1_GENERALIZEDTIME *gtime, struct tm *k_tm)
+{
char c, *p;
if (!k_tm)
@@ -1294,7 +1294,7 @@ get_rc_clockskew(krb5_context context)
** See Also: (Kerberos source)/krb5/lib/krb5/krb/valid_times.c
** 20010420 VRS
*/
-krb5_error_code
+krb5_error_code
kssl_validate_times(krb5_timestamp atime, krb5_ticket_times *ttimes)
{
krb5_deltat skew;
@@ -1333,7 +1333,7 @@ kssl_validate_times(krb5_timestamp atime, krb5_ticket_times *ttimes)
/* Decode and decrypt given DER-encoded authenticator, then pass
** authenticator ctime back in *atimep (or 0 if time unavailable).
-** Returns krb5_error_code and kssl_err on error. A NULL
+** Returns krb5_error_code and kssl_err on error. A NULL
** authenticator (authentp->length == 0) is not considered an error.
** Note that kssl_check_authent() makes use of the KRB5 session key;
** you must call kssl_sget_tkt() to get the key before calling this routine.
@@ -1345,7 +1345,7 @@ kssl_check_authent(
/* OUT */ krb5_timestamp *atimep,
/* OUT */ KSSL_ERR *kssl_err )
{
- krb5_error_code krb5rc = 0;
+ krb5_error_code krb5rc = 0;
KRB5_ENCDATA *dec_authent = NULL;
KRB5_AUTHENTBODY *auth = NULL;
krb5_enctype enctype;
@@ -1394,7 +1394,7 @@ kssl_check_authent(
p = (unsigned char *)authentp->data;
if ((dec_authent = d2i_KRB5_ENCDATA(NULL, &p,
- (long)authentp->length)) == NULL) {
+ (long)authentp->length)) == NULL) {
kssl_err_set(kssl_err, SSL_R_KRB5_S_INIT,
"Error decoding authenticator.\n");
krb5rc = KRB5KRB_AP_ERR_BAD_INTEGRITY;
@@ -1481,7 +1481,8 @@ kssl_check_authent(
printf("kssl_check_authent: returns %d for client time ", *atimep);
if (auth && auth->ctime && auth->ctime->length && auth->ctime->data)
printf("%.*s\n", auth->ctime->length, auth->ctime->data);
- else printf("NULL\n");
+ else
+ printf("NULL\n");
#endif /* KSSL_DEBUG */
err:
@@ -1511,11 +1512,11 @@ kssl_build_principal_2(
{
krb5_data *p_data = NULL;
krb5_principal new_p = NULL;
- char *new_r = NULL;
+ char *new_r = NULL;
if ((p_data = (krb5_data *)calloc(2, sizeof(krb5_data))) == NULL ||
- (new_p = (krb5_principal)calloc(1, sizeof(krb5_principal_data)))
- == NULL)
+ (new_p = (krb5_principal)calloc(1, sizeof(krb5_principal_data))) ==
+ NULL)
goto err;
new_p->length = 2;
new_p->data = p_data;
@@ -1535,7 +1536,7 @@ kssl_build_principal_2(
goto err;
memcpy(new_p->data[1].data, host, hlen);
new_p->data[1].length = hlen;
-
+
krb5_princ_type(context, new_p) = KRB5_NT_UNKNOWN;
*princ = new_p;
return 0;
@@ -1556,7 +1557,7 @@ void
SSL_set0_kssl_ctx(SSL *s, KSSL_CTX *kctx)
{
s->kssl_ctx = kctx;
-}
+}
KSSL_CTX *
SSL_get0_kssl_ctx(SSL *s)