Fix formatting: remove trailing spaces, #endif with comments (> 10 lines)
This commit is contained in:
parent
525f87559f
commit
9af723cee7
75 changed files with 316 additions and 302 deletions
|
@ -39,15 +39,15 @@
|
|||
|
||||
#include <string.h>
|
||||
|
||||
/**
|
||||
/**
|
||||
* \addtogroup asn1_module
|
||||
* \{
|
||||
* \{
|
||||
*/
|
||||
|
||||
|
||||
/**
|
||||
* \name ASN1 Error codes
|
||||
* These error codes are OR'ed to X509 error codes for
|
||||
* higher error granularity.
|
||||
* higher error granularity.
|
||||
* ASN1 is a standard to specify data structures.
|
||||
* \{
|
||||
*/
|
||||
|
@ -274,7 +274,7 @@ int asn1_get_sequence_of( unsigned char **p,
|
|||
int asn1_get_mpi( unsigned char **p,
|
||||
const unsigned char *end,
|
||||
mpi *X );
|
||||
#endif
|
||||
#endif /* POLARSSL_BIGNUM_C */
|
||||
|
||||
/**
|
||||
* \brief Retrieve an AlgorithmIdentifier ASN.1 sequence.
|
||||
|
|
|
@ -85,7 +85,7 @@ int asn1_write_raw_buffer( unsigned char **p, unsigned char *start,
|
|||
* \return the length written or a negative error code
|
||||
*/
|
||||
int asn1_write_mpi( unsigned char **p, unsigned char *start, mpi *X );
|
||||
#endif
|
||||
#endif /* POLARSSL_BIGNUM_C */
|
||||
|
||||
/**
|
||||
* \brief Write a NULL tag (ASN1_NULL) with zero data in ASN.1 format
|
||||
|
|
|
@ -51,7 +51,7 @@ typedef UINT32 uint32_t;
|
|||
typedef UINT64 uint64_t;
|
||||
#else
|
||||
#include <inttypes.h>
|
||||
#endif
|
||||
#endif /* _MSC_VER && !EFIX64 && !EFI32 */
|
||||
|
||||
#define POLARSSL_ERR_MPI_FILE_IO_ERROR -0x0002 /**< An error occurred while reading from or writing to a file. */
|
||||
#define POLARSSL_ERR_MPI_BAD_INPUT_DATA -0x0004 /**< Bad input parameters to function. */
|
||||
|
@ -644,7 +644,7 @@ int mpi_mod_int( t_uint *r, const mpi *A, t_sint b );
|
|||
/**
|
||||
* \brief Sliding-window exponentiation: X = A^E mod N
|
||||
*
|
||||
* \param X Destination MPI
|
||||
* \param X Destination MPI
|
||||
* \param A Left-hand MPI
|
||||
* \param E Exponent MPI
|
||||
* \param N Modular MPI
|
||||
|
|
|
@ -329,7 +329,7 @@
|
|||
);
|
||||
|
||||
|
||||
#else
|
||||
#else /* __MACH__ && __APPLE__ */
|
||||
|
||||
#define MULADDC_INIT \
|
||||
asm( \
|
||||
|
@ -369,7 +369,7 @@
|
|||
: "r3", "r4", "r5", "r6", "r7", "r8", "r9" \
|
||||
);
|
||||
|
||||
#endif
|
||||
#endif /* __MACH__ && __APPLE__ */
|
||||
|
||||
#else /* PPC32 */
|
||||
|
||||
|
@ -413,7 +413,7 @@
|
|||
: "r3", "r4", "r5", "r6", "r7", "r8", "r9" \
|
||||
);
|
||||
|
||||
#else
|
||||
#else /* __MACH__ && __APPLE__ */
|
||||
|
||||
#define MULADDC_INIT \
|
||||
asm( \
|
||||
|
@ -453,7 +453,7 @@
|
|||
: "r3", "r4", "r5", "r6", "r7", "r8", "r9" \
|
||||
);
|
||||
|
||||
#endif
|
||||
#endif /* __MACH__ && __APPLE__ */
|
||||
|
||||
#endif /* PPC32 */
|
||||
#endif /* PPC64 */
|
||||
|
|
|
@ -72,7 +72,7 @@ camellia_context;
|
|||
* \param ctx CAMELLIA context to be initialized
|
||||
* \param key encryption key
|
||||
* \param keysize must be 128, 192 or 256
|
||||
*
|
||||
*
|
||||
* \return 0 if successful, or POLARSSL_ERR_CAMELLIA_INVALID_KEY_LENGTH
|
||||
*/
|
||||
int camellia_setkey_enc( camellia_context *ctx, const unsigned char *key, unsigned int keysize );
|
||||
|
@ -83,7 +83,7 @@ int camellia_setkey_enc( camellia_context *ctx, const unsigned char *key, unsign
|
|||
* \param ctx CAMELLIA context to be initialized
|
||||
* \param key decryption key
|
||||
* \param keysize must be 128, 192 or 256
|
||||
*
|
||||
*
|
||||
* \return 0 if successful, or POLARSSL_ERR_CAMELLIA_INVALID_KEY_LENGTH
|
||||
*/
|
||||
int camellia_setkey_dec( camellia_context *ctx, const unsigned char *key, unsigned int keysize );
|
||||
|
@ -95,7 +95,7 @@ int camellia_setkey_dec( camellia_context *ctx, const unsigned char *key, unsign
|
|||
* \param mode CAMELLIA_ENCRYPT or CAMELLIA_DECRYPT
|
||||
* \param input 16-byte input block
|
||||
* \param output 16-byte output block
|
||||
*
|
||||
*
|
||||
* \return 0 if successful
|
||||
*/
|
||||
int camellia_crypt_ecb( camellia_context *ctx,
|
||||
|
@ -115,7 +115,7 @@ int camellia_crypt_ecb( camellia_context *ctx,
|
|||
* \param iv initialization vector (updated after use)
|
||||
* \param input buffer holding the input data
|
||||
* \param output buffer holding the output data
|
||||
*
|
||||
*
|
||||
* \return 0 if successful, or POLARSSL_ERR_CAMELLIA_INVALID_INPUT_LENGTH
|
||||
*/
|
||||
int camellia_crypt_cbc( camellia_context *ctx,
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
/**
|
||||
* \file cipher.h
|
||||
*
|
||||
*
|
||||
* \brief Generic cipher wrapper.
|
||||
*
|
||||
* \author Adriaan de Jong <dejong@fox-it.com>
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
/**
|
||||
* \file cipher_wrap.h
|
||||
*
|
||||
*
|
||||
* \brief Cipher wrappers.
|
||||
*
|
||||
* \author Adriaan de Jong <dejong@fox-it.com>
|
||||
|
|
|
@ -171,7 +171,7 @@ static inline int sha4_self_test( int verbose ) {
|
|||
#warning "rsa_pkcs1_verify() prototype changed. Manual change required if used"
|
||||
#warning "rsa_pkcs1_decrypt() prototype changed. Manual change required if used"
|
||||
#endif
|
||||
#endif
|
||||
#endif /* POLARSSL_RSA_C */
|
||||
|
||||
#if defined(POLARSSL_DHM_C)
|
||||
#if defined(SHOW_PROTOTYPE_CHANGE_WARNINGS)
|
||||
|
|
|
@ -108,7 +108,7 @@ ctr_drbg_context;
|
|||
|
||||
/**
|
||||
* \brief CTR_DRBG initialization
|
||||
*
|
||||
*
|
||||
* Note: Personalization data can be provided in addition to the more generic
|
||||
* entropy source to make this instantiation as unique as possible.
|
||||
*
|
||||
|
@ -163,7 +163,7 @@ void ctr_drbg_set_reseed_interval( ctr_drbg_context *ctx,
|
|||
|
||||
/**
|
||||
* \brief CTR_DRBG reseeding (extracts data from entropy source)
|
||||
*
|
||||
*
|
||||
* \param ctx CTR_DRBG context
|
||||
* \param additional Additional data to add to state (Can be NULL)
|
||||
* \param len Length of additional data
|
||||
|
@ -245,7 +245,7 @@ int ctr_drbg_write_seed_file( ctr_drbg_context *ctx, const char *path );
|
|||
* POLARSSL_ERR_CTR_DRBG_INPUT_TOO_BIG
|
||||
*/
|
||||
int ctr_drbg_update_seed_file( ctr_drbg_context *ctx, const char *path );
|
||||
#endif
|
||||
#endif /* POLARSSL_FS_IO */
|
||||
|
||||
/**
|
||||
* \brief Checkup routine
|
||||
|
|
|
@ -81,7 +81,7 @@
|
|||
debug_print_crt( ssl, level, __FILE__, __LINE__, text, crt );
|
||||
#endif
|
||||
|
||||
#else
|
||||
#else /* POLARSSL_DEBUG_C */
|
||||
|
||||
#define SSL_DEBUG_MSG( level, args ) do { } while( 0 )
|
||||
#define SSL_DEBUG_RET( level, text, ret ) do { } while( 0 )
|
||||
|
@ -90,7 +90,7 @@
|
|||
#define SSL_DEBUG_ECP( level, text, X ) do { } while( 0 )
|
||||
#define SSL_DEBUG_CRT( level, text, crt ) do { } while( 0 )
|
||||
|
||||
#endif
|
||||
#endif /* POLARSSL_DEBUG_C */
|
||||
|
||||
#ifdef __cplusplus
|
||||
extern "C" {
|
||||
|
|
|
@ -285,4 +285,4 @@ int dhm_self_test( int verbose );
|
|||
}
|
||||
#endif
|
||||
|
||||
#endif
|
||||
#endif /* dhm.h */
|
||||
|
|
|
@ -212,4 +212,4 @@ int ecdh_self_test( int verbose );
|
|||
}
|
||||
#endif
|
||||
|
||||
#endif
|
||||
#endif /* ecdh.h */
|
||||
|
|
|
@ -90,7 +90,7 @@ int ecdsa_sign( ecp_group *grp, mpi *r, mpi *s,
|
|||
int ecdsa_sign_det( ecp_group *grp, mpi *r, mpi *s,
|
||||
const mpi *d, const unsigned char *buf, size_t blen,
|
||||
md_type_t md_alg );
|
||||
#endif
|
||||
#endif /* POLARSSL_ECDSA_DETERMINISTIC */
|
||||
|
||||
/**
|
||||
* \brief Verify ECDSA signature of a previously hashed message
|
||||
|
@ -163,7 +163,7 @@ int ecdsa_write_signature_det( ecdsa_context *ctx,
|
|||
const unsigned char *hash, size_t hlen,
|
||||
unsigned char *sig, size_t *slen,
|
||||
md_type_t md_alg );
|
||||
#endif
|
||||
#endif /* POLARSSL_ECDSA_DETERMINISTIC */
|
||||
|
||||
/**
|
||||
* \brief Read and verify an ECDSA signature
|
||||
|
@ -233,4 +233,4 @@ int ecdsa_self_test( int verbose );
|
|||
}
|
||||
#endif
|
||||
|
||||
#endif
|
||||
#endif /* ecdsa.h */
|
||||
|
|
|
@ -648,4 +648,4 @@ int ecp_self_test( int verbose );
|
|||
}
|
||||
#endif
|
||||
|
||||
#endif
|
||||
#endif /* ecp.h */
|
||||
|
|
|
@ -191,7 +191,7 @@ int entropy_func( void *data, unsigned char *output, size_t len );
|
|||
/**
|
||||
* \brief Add data to the accumulator manually
|
||||
* (Thread-safe if POLARSSL_THREADING_C is enabled)
|
||||
*
|
||||
*
|
||||
* \param ctx Entropy context
|
||||
* \param data Data to add
|
||||
* \param len Length of data
|
||||
|
@ -227,7 +227,7 @@ int entropy_write_seed_file( entropy_context *ctx, const char *path );
|
|||
* POLARSSL_ERR_ENTROPY_SOURCE_FAILED
|
||||
*/
|
||||
int entropy_update_seed_file( entropy_context *ctx, const char *path );
|
||||
#endif
|
||||
#endif /* POLARSSL_FS_IO */
|
||||
|
||||
#ifdef __cplusplus
|
||||
}
|
||||
|
|
|
@ -265,7 +265,7 @@ int hmac_drbg_write_seed_file( hmac_drbg_context *ctx, const char *path );
|
|||
* POLARSSL_ERR_HMAC_DRBG_INPUT_TOO_BIG
|
||||
*/
|
||||
int hmac_drbg_update_seed_file( hmac_drbg_context *ctx, const char *path );
|
||||
#endif
|
||||
#endif /* POLARSSL_FS_IO */
|
||||
|
||||
|
||||
#if defined(POLARSSL_SELF_TEST)
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
/**
|
||||
* \file md.h
|
||||
*
|
||||
*
|
||||
* \brief Generic message digest wrapper
|
||||
*
|
||||
* \author Adriaan de Jong <dejong@fox-it.com>
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
/**
|
||||
* \file md_wrap.h
|
||||
*
|
||||
*
|
||||
* \brief Message digest wrappers.
|
||||
*
|
||||
* \author Adriaan de Jong <dejong@fox-it.com>
|
||||
|
|
|
@ -98,7 +98,7 @@ inline rsa_context* d2i_RSA_PUBKEY( void *ignore, unsigned char **bufptr,
|
|||
|
||||
memset( rsa, 0, sizeof( rsa_context ) );
|
||||
|
||||
if( ( len == 94 &&
|
||||
if( ( len == 94 &&
|
||||
mpi_read_binary( &rsa->N, &buffer[ 25], 64 ) == 0 &&
|
||||
mpi_read_binary( &rsa->E, &buffer[ 91], 3 ) == 0 ) ||
|
||||
( len == 162 &&
|
||||
|
|
|
@ -148,7 +148,7 @@ static inline int ssl_pkcs11_decrypt( void *ctx, int mode, size_t *olen,
|
|||
output_max_len );
|
||||
}
|
||||
|
||||
static inline int ssl_pkcs11_sign( void *ctx,
|
||||
static inline int ssl_pkcs11_sign( void *ctx,
|
||||
int (*f_rng)(void *, unsigned char *, size_t), void *p_rng,
|
||||
int mode, md_type_t md_alg, unsigned int hashlen,
|
||||
const unsigned char *hash, unsigned char *sig )
|
||||
|
|
|
@ -86,10 +86,10 @@ extern void (*polarssl_free)( void *ptr );
|
|||
*/
|
||||
int platform_set_malloc_free( void * (*malloc_func)( size_t ),
|
||||
void (*free_func)( void * ) );
|
||||
#else
|
||||
#else /* POLARSSL_PLATFORM_ENTROPY */
|
||||
#define polarssl_malloc malloc
|
||||
#define polarssl_free free
|
||||
#endif
|
||||
#endif /* POLARSSL_PLATFORM_ENTROPY */
|
||||
|
||||
/*
|
||||
* The function pointers for printf
|
||||
|
@ -105,9 +105,9 @@ extern int (*polarssl_printf)( const char *format, ... );
|
|||
* \return 0
|
||||
*/
|
||||
int platform_set_printf( int (*printf_func)( const char *, ... ) );
|
||||
#else
|
||||
#else /* POLARSSL_PLATFORM_PRINTF_ALT */
|
||||
#define polarssl_printf printf
|
||||
#endif
|
||||
#endif /* POLARSSL_PLATFORM_PRINTF_ALT */
|
||||
|
||||
/*
|
||||
* The function pointers for fprintf
|
||||
|
|
|
@ -168,10 +168,10 @@
|
|||
#else
|
||||
#if defined(POLARSSL_SSL_PROTO_TLS1_2)
|
||||
#define SSL_MIN_MINOR_VERSION SSL_MINOR_VERSION_3
|
||||
#endif
|
||||
#endif
|
||||
#endif
|
||||
#endif
|
||||
#endif /* POLARSSL_SSL_PROTO_TLS1_2 */
|
||||
#endif /* POLARSSL_SSL_PROTO_TLS1_1 */
|
||||
#endif /* POLARSSL_SSL_PROTO_TLS1 */
|
||||
#endif /* POLARSSL_SSL_PROTO_SSL3 */
|
||||
|
||||
/* Determine maximum supported version */
|
||||
#define SSL_MAX_MAJOR_VERSION SSL_MAJOR_VERSION_3
|
||||
|
@ -187,10 +187,10 @@
|
|||
#else
|
||||
#if defined(POLARSSL_SSL_PROTO_SSL3)
|
||||
#define SSL_MAX_MINOR_VERSION SSL_MINOR_VERSION_0
|
||||
#endif
|
||||
#endif
|
||||
#endif
|
||||
#endif
|
||||
#endif /* POLARSSL_SSL_PROTO_SSL3 */
|
||||
#endif /* POLARSSL_SSL_PROTO_TLS1 */
|
||||
#endif /* POLARSSL_SSL_PROTO_TLS1_1 */
|
||||
#endif /* POLARSSL_SSL_PROTO_TLS1_2 */
|
||||
|
||||
/* RFC 6066 section 4, see also mfl_code_to_length in ssl_tls.c
|
||||
* NONE must be zero so that memset()ing structure to zero works */
|
||||
|
@ -395,7 +395,7 @@ extern "C" {
|
|||
*/
|
||||
typedef int (*rsa_decrypt_func)( void *ctx, int mode, size_t *olen,
|
||||
const unsigned char *input, unsigned char *output,
|
||||
size_t output_max_len );
|
||||
size_t output_max_len );
|
||||
typedef int (*rsa_sign_func)( void *ctx,
|
||||
int (*f_rng)(void *, unsigned char *, size_t), void *p_rng,
|
||||
int mode, md_type_t md_alg, unsigned int hashlen,
|
||||
|
@ -545,7 +545,7 @@ struct _ssl_handshake_params
|
|||
#if defined(POLARSSL_SSL_SERVER_NAME_INDICATION)
|
||||
ssl_key_cert *sni_key_cert; /*!< key/cert list from SNI */
|
||||
#endif
|
||||
#endif
|
||||
#endif /* POLARSSL_X509_CRT_PARSE_C */
|
||||
|
||||
/*
|
||||
* Checksum contexts
|
||||
|
@ -814,7 +814,7 @@ extern int (*ssl_hw_record_reset)(ssl_context *ssl);
|
|||
extern int (*ssl_hw_record_write)(ssl_context *ssl);
|
||||
extern int (*ssl_hw_record_read)(ssl_context *ssl);
|
||||
extern int (*ssl_hw_record_finish)(ssl_context *ssl);
|
||||
#endif
|
||||
#endif /* POLARSSL_SSL_HW_RECORD_ACCEL */
|
||||
|
||||
/**
|
||||
* \brief Returns the list of ciphersuites supported by the SSL/TLS module.
|
||||
|
@ -1195,7 +1195,7 @@ int ssl_set_dh_param( ssl_context *ssl, const char *dhm_P, const char *dhm_G );
|
|||
* \return 0 if successful
|
||||
*/
|
||||
int ssl_set_dh_param_ctx( ssl_context *ssl, dhm_context *dhm_ctx );
|
||||
#endif
|
||||
#endif /* POLARSSL_DHM_C */
|
||||
|
||||
#if defined(POLARSSL_SSL_SET_CURVES)
|
||||
/**
|
||||
|
@ -1217,7 +1217,7 @@ int ssl_set_dh_param_ctx( ssl_context *ssl, dhm_context *dhm_ctx );
|
|||
* terminated by POLARSSL_ECP_DP_NONE.
|
||||
*/
|
||||
void ssl_set_curves( ssl_context *ssl, const ecp_group_id *curves );
|
||||
#endif
|
||||
#endif /* POLARSSL_SSL_SET_CURVES */
|
||||
|
||||
#if defined(POLARSSL_SSL_SERVER_NAME_INDICATION)
|
||||
/**
|
||||
|
@ -1395,7 +1395,7 @@ void ssl_set_renegotiation( ssl_context *ssl, int renegotiation );
|
|||
/**
|
||||
* \brief Prevent or allow legacy renegotiation.
|
||||
* (Default: SSL_LEGACY_NO_RENEGOTIATION)
|
||||
*
|
||||
*
|
||||
* SSL_LEGACY_NO_RENEGOTIATION allows connections to
|
||||
* be established even if the peer does not support
|
||||
* secure renegotiation, but does not allow renegotiation
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue