mbedtls.c: re-indent to better match curl standards
This commit is contained in:
parent
c62d7944cf
commit
c276aefee3
@ -129,16 +129,16 @@ static void mbedtls_debug(void *context, int level, const char *line)
|
|||||||
*/
|
*/
|
||||||
const mbedtls_x509_crt_profile mbedtls_x509_crt_profile_fr =
|
const mbedtls_x509_crt_profile mbedtls_x509_crt_profile_fr =
|
||||||
{
|
{
|
||||||
/* Hashes from SHA-1 and above */
|
/* Hashes from SHA-1 and above */
|
||||||
MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA1 ) |
|
MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA1 ) |
|
||||||
MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_RIPEMD160 ) |
|
MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_RIPEMD160 ) |
|
||||||
MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA224 ) |
|
MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA224 ) |
|
||||||
MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA256 ) |
|
MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA256 ) |
|
||||||
MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA384 ) |
|
MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA384 ) |
|
||||||
MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA512 ),
|
MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA512 ),
|
||||||
0xFFFFFFF, /* Any PK alg */
|
0xFFFFFFF, /* Any PK alg */
|
||||||
0xFFFFFFF, /* Any curve */
|
0xFFFFFFF, /* Any curve */
|
||||||
1024, /* RSA min key len */
|
1024, /* RSA min key len */
|
||||||
};
|
};
|
||||||
|
|
||||||
/* See https://tls.mbed.org/discussions/generic/
|
/* See https://tls.mbed.org/discussions/generic/
|
||||||
@ -155,7 +155,7 @@ static Curl_send mbedtls_send;
|
|||||||
|
|
||||||
static CURLcode
|
static CURLcode
|
||||||
mbedtls_connect_step1(struct connectdata *conn,
|
mbedtls_connect_step1(struct connectdata *conn,
|
||||||
int sockindex)
|
int sockindex)
|
||||||
{
|
{
|
||||||
struct SessionHandle *data = conn->data;
|
struct SessionHandle *data = conn->data;
|
||||||
struct ssl_connect_data* connssl = &conn->ssl[sockindex];
|
struct ssl_connect_data* connssl = &conn->ssl[sockindex];
|
||||||
@ -288,7 +288,7 @@ mbedtls_connect_step1(struct connectdata *conn,
|
|||||||
|
|
||||||
if(data->set.str[STRING_SSL_CRLFILE]) {
|
if(data->set.str[STRING_SSL_CRLFILE]) {
|
||||||
ret = mbedtls_x509_crl_parse_file(&connssl->crl,
|
ret = mbedtls_x509_crl_parse_file(&connssl->crl,
|
||||||
data->set.str[STRING_SSL_CRLFILE]);
|
data->set.str[STRING_SSL_CRLFILE]);
|
||||||
|
|
||||||
if(ret) {
|
if(ret) {
|
||||||
#ifdef MBEDTLS_ERROR_C
|
#ifdef MBEDTLS_ERROR_C
|
||||||
@ -350,11 +350,11 @@ mbedtls_connect_step1(struct connectdata *conn,
|
|||||||
mbedtls_ssl_conf_authmode(&connssl->config, MBEDTLS_SSL_VERIFY_OPTIONAL);
|
mbedtls_ssl_conf_authmode(&connssl->config, MBEDTLS_SSL_VERIFY_OPTIONAL);
|
||||||
|
|
||||||
mbedtls_ssl_conf_rng(&connssl->config, mbedtls_ctr_drbg_random,
|
mbedtls_ssl_conf_rng(&connssl->config, mbedtls_ctr_drbg_random,
|
||||||
&connssl->ctr_drbg);
|
&connssl->ctr_drbg);
|
||||||
mbedtls_ssl_set_bio(&connssl->ssl, &conn->sock[sockindex],
|
mbedtls_ssl_set_bio(&connssl->ssl, &conn->sock[sockindex],
|
||||||
mbedtls_net_send,
|
mbedtls_net_send,
|
||||||
mbedtls_net_recv,
|
mbedtls_net_recv,
|
||||||
NULL /* rev_timeout() */);
|
NULL /* rev_timeout() */);
|
||||||
|
|
||||||
mbedtls_ssl_conf_ciphersuites(&connssl->config,
|
mbedtls_ssl_conf_ciphersuites(&connssl->config,
|
||||||
mbedtls_ssl_list_ciphersuites());
|
mbedtls_ssl_list_ciphersuites());
|
||||||
@ -364,23 +364,23 @@ mbedtls_connect_step1(struct connectdata *conn,
|
|||||||
}
|
}
|
||||||
|
|
||||||
mbedtls_ssl_set_session(&connssl->ssl,
|
mbedtls_ssl_set_session(&connssl->ssl,
|
||||||
&connssl->ssn);
|
&connssl->ssn);
|
||||||
|
|
||||||
mbedtls_ssl_conf_ca_chain(&connssl->config,
|
mbedtls_ssl_conf_ca_chain(&connssl->config,
|
||||||
&connssl->cacert,
|
&connssl->cacert,
|
||||||
&connssl->crl);
|
&connssl->crl);
|
||||||
|
|
||||||
if(data->set.str[STRING_KEY]) {
|
if(data->set.str[STRING_KEY]) {
|
||||||
mbedtls_ssl_conf_own_cert(&connssl->config,
|
mbedtls_ssl_conf_own_cert(&connssl->config,
|
||||||
&connssl->clicert, &connssl->pk);
|
&connssl->clicert, &connssl->pk);
|
||||||
}
|
}
|
||||||
if(!Curl_inet_pton(AF_INET, conn->host.name, &addr) &&
|
if(!Curl_inet_pton(AF_INET, conn->host.name, &addr) &&
|
||||||
#ifdef ENABLE_IPV6
|
#ifdef ENABLE_IPV6
|
||||||
!Curl_inet_pton(AF_INET6, conn->host.name, &addr) &&
|
!Curl_inet_pton(AF_INET6, conn->host.name, &addr) &&
|
||||||
#endif
|
#endif
|
||||||
sni && mbedtls_ssl_set_hostname(&connssl->ssl, conn->host.name)) {
|
sni && mbedtls_ssl_set_hostname(&connssl->ssl, conn->host.name)) {
|
||||||
infof(data, "WARNING: failed to configure "
|
infof(data, "WARNING: failed to configure "
|
||||||
"server name indication (SNI) TLS extension\n");
|
"server name indication (SNI) TLS extension\n");
|
||||||
}
|
}
|
||||||
|
|
||||||
#ifdef HAS_ALPN
|
#ifdef HAS_ALPN
|
||||||
@ -415,7 +415,7 @@ mbedtls_connect_step1(struct connectdata *conn,
|
|||||||
|
|
||||||
static CURLcode
|
static CURLcode
|
||||||
mbedtls_connect_step2(struct connectdata *conn,
|
mbedtls_connect_step2(struct connectdata *conn,
|
||||||
int sockindex)
|
int sockindex)
|
||||||
{
|
{
|
||||||
int ret;
|
int ret;
|
||||||
struct SessionHandle *data = conn->data;
|
struct SessionHandle *data = conn->data;
|
||||||
@ -557,10 +557,10 @@ mbedtls_connect_step2(struct connectdata *conn,
|
|||||||
}
|
}
|
||||||
else
|
else
|
||||||
#endif
|
#endif
|
||||||
if(!strncmp(next_protocol, ALPN_HTTP_1_1, ALPN_HTTP_1_1_LENGTH) &&
|
if(!strncmp(next_protocol, ALPN_HTTP_1_1, ALPN_HTTP_1_1_LENGTH) &&
|
||||||
!next_protocol[ALPN_HTTP_1_1_LENGTH]) {
|
!next_protocol[ALPN_HTTP_1_1_LENGTH]) {
|
||||||
conn->negnpn = CURL_HTTP_VERSION_1_1;
|
conn->negnpn = CURL_HTTP_VERSION_1_1;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
infof(data, "ALPN, server did not agree to a protocol\n");
|
infof(data, "ALPN, server did not agree to a protocol\n");
|
||||||
@ -576,7 +576,7 @@ mbedtls_connect_step2(struct connectdata *conn,
|
|||||||
|
|
||||||
static CURLcode
|
static CURLcode
|
||||||
mbedtls_connect_step3(struct connectdata *conn,
|
mbedtls_connect_step3(struct connectdata *conn,
|
||||||
int sockindex)
|
int sockindex)
|
||||||
{
|
{
|
||||||
CURLcode retcode = CURLE_OK;
|
CURLcode retcode = CURLE_OK;
|
||||||
struct ssl_connect_data *connssl = &conn->ssl[sockindex];
|
struct ssl_connect_data *connssl = &conn->ssl[sockindex];
|
||||||
@ -604,7 +604,7 @@ mbedtls_connect_step3(struct connectdata *conn,
|
|||||||
sizeof(mbedtls_ssl_session));
|
sizeof(mbedtls_ssl_session));
|
||||||
|
|
||||||
retcode = Curl_ssl_addsessionid(conn, new_session,
|
retcode = Curl_ssl_addsessionid(conn, new_session,
|
||||||
sizeof(mbedtls_ssl_session));
|
sizeof(mbedtls_ssl_session));
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
retcode = CURLE_OUT_OF_MEMORY;
|
retcode = CURLE_OUT_OF_MEMORY;
|
||||||
@ -622,15 +622,15 @@ mbedtls_connect_step3(struct connectdata *conn,
|
|||||||
}
|
}
|
||||||
|
|
||||||
static ssize_t mbedtls_send(struct connectdata *conn,
|
static ssize_t mbedtls_send(struct connectdata *conn,
|
||||||
int sockindex,
|
int sockindex,
|
||||||
const void *mem,
|
const void *mem,
|
||||||
size_t len,
|
size_t len,
|
||||||
CURLcode *curlcode)
|
CURLcode *curlcode)
|
||||||
{
|
{
|
||||||
int ret = -1;
|
int ret = -1;
|
||||||
|
|
||||||
ret = mbedtls_ssl_write(&conn->ssl[sockindex].ssl,
|
ret = mbedtls_ssl_write(&conn->ssl[sockindex].ssl,
|
||||||
(unsigned char *)mem, len);
|
(unsigned char *)mem, len);
|
||||||
|
|
||||||
if(ret < 0) {
|
if(ret < 0) {
|
||||||
*curlcode = (ret == MBEDTLS_ERR_SSL_WANT_WRITE) ?
|
*curlcode = (ret == MBEDTLS_ERR_SSL_WANT_WRITE) ?
|
||||||
@ -661,10 +661,10 @@ void Curl_mbedtls_close(struct connectdata *conn, int sockindex)
|
|||||||
}
|
}
|
||||||
|
|
||||||
static ssize_t mbedtls_recv(struct connectdata *conn,
|
static ssize_t mbedtls_recv(struct connectdata *conn,
|
||||||
int num,
|
int num,
|
||||||
char *buf,
|
char *buf,
|
||||||
size_t buffersize,
|
size_t buffersize,
|
||||||
CURLcode *curlcode)
|
CURLcode *curlcode)
|
||||||
{
|
{
|
||||||
int ret = -1;
|
int ret = -1;
|
||||||
ssize_t len = -1;
|
ssize_t len = -1;
|
||||||
@ -701,9 +701,9 @@ size_t Curl_mbedtls_version(char *buffer, size_t size)
|
|||||||
|
|
||||||
static CURLcode
|
static CURLcode
|
||||||
mbedtls_connect_common(struct connectdata *conn,
|
mbedtls_connect_common(struct connectdata *conn,
|
||||||
int sockindex,
|
int sockindex,
|
||||||
bool nonblocking,
|
bool nonblocking,
|
||||||
bool *done)
|
bool *done)
|
||||||
{
|
{
|
||||||
CURLcode retcode;
|
CURLcode retcode;
|
||||||
struct SessionHandle *data = conn->data;
|
struct SessionHandle *data = conn->data;
|
||||||
@ -813,8 +813,8 @@ mbedtls_connect_common(struct connectdata *conn,
|
|||||||
|
|
||||||
CURLcode
|
CURLcode
|
||||||
Curl_mbedtls_connect_nonblocking(struct connectdata *conn,
|
Curl_mbedtls_connect_nonblocking(struct connectdata *conn,
|
||||||
int sockindex,
|
int sockindex,
|
||||||
bool *done)
|
bool *done)
|
||||||
{
|
{
|
||||||
return mbedtls_connect_common(conn, sockindex, TRUE, done);
|
return mbedtls_connect_common(conn, sockindex, TRUE, done);
|
||||||
}
|
}
|
||||||
@ -822,7 +822,7 @@ Curl_mbedtls_connect_nonblocking(struct connectdata *conn,
|
|||||||
|
|
||||||
CURLcode
|
CURLcode
|
||||||
Curl_mbedtls_connect(struct connectdata *conn,
|
Curl_mbedtls_connect(struct connectdata *conn,
|
||||||
int sockindex)
|
int sockindex)
|
||||||
{
|
{
|
||||||
CURLcode retcode;
|
CURLcode retcode;
|
||||||
bool done = FALSE;
|
bool done = FALSE;
|
||||||
|
Loading…
x
Reference in New Issue
Block a user