diff options
author | lv-426 <oxcafebaby@yahoo.com> | 2008-08-11 03:40:22 +0000 |
---|---|---|
committer | lv-426 <oxcafebaby@yahoo.com> | 2008-08-11 03:40:22 +0000 |
commit | 1c893a971fa8d04ada6c66aa9ebf525b03ed4426 (patch) | |
tree | 7a4b22d2bd11a55aa2bd2bc01495572dd260e7d6 /src/daemon/https/tls/auth_cert.c | |
parent | 41886bcf92e8e6b943c9f0697a75f4a380952f52 (diff) | |
download | libmicrohttpd-1c893a971fa8d04ada6c66aa9ebf525b03ed4426.tar.gz libmicrohttpd-1c893a971fa8d04ada6c66aa9ebf525b03ed4426.zip |
gnutls code cleanup
symbol refactoring
Diffstat (limited to 'src/daemon/https/tls/auth_cert.c')
-rw-r--r-- | src/daemon/https/tls/auth_cert.c | 192 |
1 files changed, 96 insertions, 96 deletions
diff --git a/src/daemon/https/tls/auth_cert.c b/src/daemon/https/tls/auth_cert.c index c5c5d9f5..7fea2569 100644 --- a/src/daemon/https/tls/auth_cert.c +++ b/src/daemon/https/tls/auth_cert.c | |||
@@ -187,7 +187,7 @@ _gnutls_cert_get_issuer_dn (gnutls_cert * cert, gnutls_datum_t * odn) | |||
187 | * CAs and sign algorithms supported by the peer server. | 187 | * CAs and sign algorithms supported by the peer server. |
188 | */ | 188 | */ |
189 | static int | 189 | static int |
190 | _find_x509_cert (const gnutls_certificate_credentials_t cred, | 190 | _find_x509_cert (const mhd_gtls_cert_credentials_t cred, |
191 | opaque * _data, size_t _data_size, | 191 | opaque * _data, size_t _data_size, |
192 | const gnutls_pk_algorithm_t * pk_algos, | 192 | const gnutls_pk_algorithm_t * pk_algos, |
193 | int pk_algos_length, int *indx) | 193 | int pk_algos_length, int *indx) |
@@ -205,7 +205,7 @@ _find_x509_cert (const gnutls_certificate_credentials_t cred, | |||
205 | { | 205 | { |
206 | 206 | ||
207 | DECR_LENGTH_RET (data_size, 2, 0); | 207 | DECR_LENGTH_RET (data_size, 2, 0); |
208 | size = _gnutls_read_uint16 (data); | 208 | size = mhd_gtls_read_uint16 (data); |
209 | DECR_LENGTH_RET (data_size, size, 0); | 209 | DECR_LENGTH_RET (data_size, size, 0); |
210 | data += 2; | 210 | data += 2; |
211 | 211 | ||
@@ -258,7 +258,7 @@ _find_x509_cert (const gnutls_certificate_credentials_t cred, | |||
258 | /* Locates the most appropriate openpgp cert | 258 | /* Locates the most appropriate openpgp cert |
259 | */ | 259 | */ |
260 | static int | 260 | static int |
261 | _find_openpgp_cert (const gnutls_certificate_credentials_t cred, | 261 | _find_openpgp_cert (const mhd_gtls_cert_credentials_t cred, |
262 | gnutls_pk_algorithm_t * pk_algos, | 262 | gnutls_pk_algorithm_t * pk_algos, |
263 | int pk_algos_length, int *indx) | 263 | int pk_algos_length, int *indx) |
264 | { | 264 | { |
@@ -294,7 +294,7 @@ _find_openpgp_cert (const gnutls_certificate_credentials_t cred, | |||
294 | * certificate request packet. | 294 | * certificate request packet. |
295 | */ | 295 | */ |
296 | static int | 296 | static int |
297 | get_issuers_num (gnutls_session_t session, opaque * data, ssize_t data_size) | 297 | get_issuers_num (mhd_gtls_session_t session, opaque * data, ssize_t data_size) |
298 | { | 298 | { |
299 | int issuers_dn_len = 0, result; | 299 | int issuers_dn_len = 0, result; |
300 | unsigned size; | 300 | unsigned size; |
@@ -314,7 +314,7 @@ get_issuers_num (gnutls_session_t session, opaque * data, ssize_t data_size) | |||
314 | */ | 314 | */ |
315 | result = GNUTLS_E_UNEXPECTED_PACKET_LENGTH; | 315 | result = GNUTLS_E_UNEXPECTED_PACKET_LENGTH; |
316 | DECR_LENGTH_COM (data_size, 2, goto error); | 316 | DECR_LENGTH_COM (data_size, 2, goto error); |
317 | size = _gnutls_read_uint16 (data); | 317 | size = mhd_gtls_read_uint16 (data); |
318 | 318 | ||
319 | result = GNUTLS_E_UNEXPECTED_PACKET_LENGTH; | 319 | result = GNUTLS_E_UNEXPECTED_PACKET_LENGTH; |
320 | DECR_LENGTH_COM (data_size, size, goto error); | 320 | DECR_LENGTH_COM (data_size, size, goto error); |
@@ -343,7 +343,7 @@ error: | |||
343 | * packet. | 343 | * packet. |
344 | */ | 344 | */ |
345 | static int | 345 | static int |
346 | get_issuers (gnutls_session_t session, | 346 | get_issuers (mhd_gtls_session_t session, |
347 | gnutls_datum_t * issuers_dn, int issuers_len, | 347 | gnutls_datum_t * issuers_dn, int issuers_len, |
348 | opaque * data, size_t data_size) | 348 | opaque * data, size_t data_size) |
349 | { | 349 | { |
@@ -367,7 +367,7 @@ get_issuers (gnutls_session_t session, | |||
367 | */ | 367 | */ |
368 | data_size -= 2; | 368 | data_size -= 2; |
369 | 369 | ||
370 | size = _gnutls_read_uint16 (data); | 370 | size = mhd_gtls_read_uint16 (data); |
371 | 371 | ||
372 | data += 2; | 372 | data += 2; |
373 | 373 | ||
@@ -384,7 +384,7 @@ get_issuers (gnutls_session_t session, | |||
384 | /* Calls the client get callback. | 384 | /* Calls the client get callback. |
385 | */ | 385 | */ |
386 | static int | 386 | static int |
387 | call_get_cert_callback (gnutls_session_t session, | 387 | call_get_cert_callback (mhd_gtls_session_t session, |
388 | gnutls_datum_t * issuers_dn, | 388 | gnutls_datum_t * issuers_dn, |
389 | int issuers_dn_length, | 389 | int issuers_dn_length, |
390 | gnutls_pk_algorithm_t * pk_algos, int pk_algos_length) | 390 | gnutls_pk_algorithm_t * pk_algos, int pk_algos_length) |
@@ -395,10 +395,10 @@ call_get_cert_callback (gnutls_session_t session, | |||
395 | gnutls_retr_st st; | 395 | gnutls_retr_st st; |
396 | int ret; | 396 | int ret; |
397 | gnutls_certificate_type_t type = gnutls_certificate_type_get (session); | 397 | gnutls_certificate_type_t type = gnutls_certificate_type_get (session); |
398 | gnutls_certificate_credentials_t cred; | 398 | mhd_gtls_cert_credentials_t cred; |
399 | 399 | ||
400 | cred = (gnutls_certificate_credentials_t) | 400 | cred = (mhd_gtls_cert_credentials_t) |
401 | _gnutls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL); | 401 | mhd_gtls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL); |
402 | if (cred == NULL) | 402 | if (cred == NULL) |
403 | { | 403 | { |
404 | gnutls_assert (); | 404 | gnutls_assert (); |
@@ -457,7 +457,7 @@ call_get_cert_callback (gnutls_session_t session, | |||
457 | 457 | ||
458 | } | 458 | } |
459 | 459 | ||
460 | _gnutls_selected_certs_set (session, local_certs, | 460 | mhd_gtls_selected_certs_set (session, local_certs, |
461 | (local_certs != NULL) ? st.ncerts : 0, | 461 | (local_certs != NULL) ? st.ncerts : 0, |
462 | local_key, 1); | 462 | local_key, 1); |
463 | 463 | ||
@@ -504,20 +504,20 @@ cleanup: | |||
504 | * algorithm (only in automatic mode). | 504 | * algorithm (only in automatic mode). |
505 | */ | 505 | */ |
506 | static int | 506 | static int |
507 | _select_client_cert (gnutls_session_t session, | 507 | _select_client_cert (mhd_gtls_session_t session, |
508 | opaque * _data, size_t _data_size, | 508 | opaque * _data, size_t _data_size, |
509 | gnutls_pk_algorithm_t * pk_algos, int pk_algos_length) | 509 | gnutls_pk_algorithm_t * pk_algos, int pk_algos_length) |
510 | { | 510 | { |
511 | int result; | 511 | int result; |
512 | int indx = -1; | 512 | int indx = -1; |
513 | gnutls_certificate_credentials_t cred; | 513 | mhd_gtls_cert_credentials_t cred; |
514 | opaque *data = _data; | 514 | opaque *data = _data; |
515 | ssize_t data_size = _data_size; | 515 | ssize_t data_size = _data_size; |
516 | int issuers_dn_length; | 516 | int issuers_dn_length; |
517 | gnutls_datum_t *issuers_dn = NULL; | 517 | gnutls_datum_t *issuers_dn = NULL; |
518 | 518 | ||
519 | cred = (gnutls_certificate_credentials_t) | 519 | cred = (mhd_gtls_cert_credentials_t) |
520 | _gnutls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL); | 520 | mhd_gtls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL); |
521 | if (cred == NULL) | 521 | if (cred == NULL) |
522 | { | 522 | { |
523 | gnutls_assert (); | 523 | gnutls_assert (); |
@@ -590,14 +590,14 @@ _select_client_cert (gnutls_session_t session, | |||
590 | 590 | ||
591 | if (indx >= 0) | 591 | if (indx >= 0) |
592 | { | 592 | { |
593 | _gnutls_selected_certs_set (session, | 593 | mhd_gtls_selected_certs_set (session, |
594 | &cred->cert_list[indx][0], | 594 | &cred->cert_list[indx][0], |
595 | cred->cert_list_length[indx], | 595 | cred->cert_list_length[indx], |
596 | &cred->pkey[indx], 0); | 596 | &cred->pkey[indx], 0); |
597 | } | 597 | } |
598 | else | 598 | else |
599 | { | 599 | { |
600 | _gnutls_selected_certs_set (session, NULL, 0, NULL, 0); | 600 | mhd_gtls_selected_certs_set (session, NULL, 0, NULL, 0); |
601 | } | 601 | } |
602 | 602 | ||
603 | result = 0; | 603 | result = 0; |
@@ -613,7 +613,7 @@ cleanup: | |||
613 | */ | 613 | */ |
614 | 614 | ||
615 | int | 615 | int |
616 | _gnutls_gen_x509_crt (gnutls_session_t session, opaque ** data) | 616 | _gnutls_gen_x509_crt (mhd_gtls_session_t session, opaque ** data) |
617 | { | 617 | { |
618 | int ret, i; | 618 | int ret, i; |
619 | opaque *pdata; | 619 | opaque *pdata; |
@@ -624,7 +624,7 @@ _gnutls_gen_x509_crt (gnutls_session_t session, opaque ** data) | |||
624 | /* find the appropriate certificate | 624 | /* find the appropriate certificate |
625 | */ | 625 | */ |
626 | if ((ret = | 626 | if ((ret = |
627 | _gnutls_get_selected_cert (session, &apr_cert_list, | 627 | mhd_gtls_get_selected_cert (session, &apr_cert_list, |
628 | &apr_cert_list_length, &apr_pkey)) < 0) | 628 | &apr_cert_list_length, &apr_pkey)) < 0) |
629 | { | 629 | { |
630 | gnutls_assert (); | 630 | gnutls_assert (); |
@@ -656,11 +656,11 @@ _gnutls_gen_x509_crt (gnutls_session_t session, opaque ** data) | |||
656 | gnutls_assert (); | 656 | gnutls_assert (); |
657 | return GNUTLS_E_MEMORY_ERROR; | 657 | return GNUTLS_E_MEMORY_ERROR; |
658 | } | 658 | } |
659 | _gnutls_write_uint24 (ret - 3, pdata); | 659 | mhd_gtls_write_uint24 (ret - 3, pdata); |
660 | pdata += 3; | 660 | pdata += 3; |
661 | for (i = 0; i < apr_cert_list_length; i++) | 661 | for (i = 0; i < apr_cert_list_length; i++) |
662 | { | 662 | { |
663 | _gnutls_write_datum24 (pdata, apr_cert_list[i].raw); | 663 | mhd_gtls_write_datum24 (pdata, apr_cert_list[i].raw); |
664 | pdata += (3 + apr_cert_list[i].raw.size); | 664 | pdata += (3 + apr_cert_list[i].raw.size); |
665 | } | 665 | } |
666 | 666 | ||
@@ -671,7 +671,7 @@ enum PGPKeyDescriptorType | |||
671 | { PGP_KEY_FINGERPRINT, PGP_KEY }; | 671 | { PGP_KEY_FINGERPRINT, PGP_KEY }; |
672 | 672 | ||
673 | int | 673 | int |
674 | _gnutls_gen_openpgp_certificate (gnutls_session_t session, opaque ** data) | 674 | _gnutls_gen_openpgp_certificate (mhd_gtls_session_t session, opaque ** data) |
675 | { | 675 | { |
676 | int ret; | 676 | int ret; |
677 | opaque *pdata; | 677 | opaque *pdata; |
@@ -681,7 +681,7 @@ _gnutls_gen_openpgp_certificate (gnutls_session_t session, opaque ** data) | |||
681 | 681 | ||
682 | /* find the appropriate certificate */ | 682 | /* find the appropriate certificate */ |
683 | if ((ret = | 683 | if ((ret = |
684 | _gnutls_get_selected_cert (session, &apr_cert_list, | 684 | mhd_gtls_get_selected_cert (session, &apr_cert_list, |
685 | &apr_cert_list_length, &apr_pkey)) < 0) | 685 | &apr_cert_list_length, &apr_pkey)) < 0) |
686 | { | 686 | { |
687 | gnutls_assert (); | 687 | gnutls_assert (); |
@@ -702,7 +702,7 @@ _gnutls_gen_openpgp_certificate (gnutls_session_t session, opaque ** data) | |||
702 | return GNUTLS_E_MEMORY_ERROR; | 702 | return GNUTLS_E_MEMORY_ERROR; |
703 | } | 703 | } |
704 | 704 | ||
705 | _gnutls_write_uint24 (ret - 3, pdata); | 705 | mhd_gtls_write_uint24 (ret - 3, pdata); |
706 | pdata += 3; | 706 | pdata += 3; |
707 | 707 | ||
708 | *pdata = PGP_KEY; /* whole key */ | 708 | *pdata = PGP_KEY; /* whole key */ |
@@ -710,17 +710,17 @@ _gnutls_gen_openpgp_certificate (gnutls_session_t session, opaque ** data) | |||
710 | 710 | ||
711 | if (apr_cert_list_length > 0) | 711 | if (apr_cert_list_length > 0) |
712 | { | 712 | { |
713 | _gnutls_write_datum24 (pdata, apr_cert_list[0].raw); | 713 | mhd_gtls_write_datum24 (pdata, apr_cert_list[0].raw); |
714 | pdata += (3 + apr_cert_list[0].raw.size); | 714 | pdata += (3 + apr_cert_list[0].raw.size); |
715 | } | 715 | } |
716 | else /* empty - no certificate */ | 716 | else /* empty - no certificate */ |
717 | _gnutls_write_uint24 (0, pdata); | 717 | mhd_gtls_write_uint24 (0, pdata); |
718 | 718 | ||
719 | return ret; | 719 | return ret; |
720 | } | 720 | } |
721 | 721 | ||
722 | int | 722 | int |
723 | _gnutls_gen_openpgp_certificate_fpr (gnutls_session_t session, opaque ** data) | 723 | _gnutls_gen_openpgp_certificate_fpr (mhd_gtls_session_t session, opaque ** data) |
724 | { | 724 | { |
725 | int ret, packet_size; | 725 | int ret, packet_size; |
726 | size_t fpr_size; | 726 | size_t fpr_size; |
@@ -731,7 +731,7 @@ _gnutls_gen_openpgp_certificate_fpr (gnutls_session_t session, opaque ** data) | |||
731 | 731 | ||
732 | /* find the appropriate certificate */ | 732 | /* find the appropriate certificate */ |
733 | if ((ret = | 733 | if ((ret = |
734 | _gnutls_get_selected_cert (session, &apr_cert_list, | 734 | mhd_gtls_get_selected_cert (session, &apr_cert_list, |
735 | &apr_cert_list_length, &apr_pkey)) < 0) | 735 | &apr_cert_list_length, &apr_pkey)) < 0) |
736 | { | 736 | { |
737 | gnutls_assert (); | 737 | gnutls_assert (); |
@@ -756,7 +756,7 @@ _gnutls_gen_openpgp_certificate_fpr (gnutls_session_t session, opaque ** data) | |||
756 | return GNUTLS_E_MEMORY_ERROR; | 756 | return GNUTLS_E_MEMORY_ERROR; |
757 | } | 757 | } |
758 | 758 | ||
759 | _gnutls_write_uint24 (packet_size - 3, pdata); | 759 | mhd_gtls_write_uint24 (packet_size - 3, pdata); |
760 | pdata += 3; | 760 | pdata += 3; |
761 | 761 | ||
762 | *pdata = PGP_KEY_FINGERPRINT; /* key fingerprint */ | 762 | *pdata = PGP_KEY_FINGERPRINT; /* key fingerprint */ |
@@ -787,12 +787,12 @@ _gnutls_gen_openpgp_certificate_fpr (gnutls_session_t session, opaque ** data) | |||
787 | 787 | ||
788 | 788 | ||
789 | int | 789 | int |
790 | _gnutls_gen_cert_client_certificate (gnutls_session_t session, opaque ** data) | 790 | mhd_gtls_gen_cert_client_certificate (mhd_gtls_session_t session, opaque ** data) |
791 | { | 791 | { |
792 | switch (session->security_parameters.cert_type) | 792 | switch (session->security_parameters.cert_type) |
793 | { | 793 | { |
794 | case MHD_GNUTLS_CRT_OPENPGP: | 794 | case MHD_GNUTLS_CRT_OPENPGP: |
795 | if (_gnutls_openpgp_send_fingerprint (session) == 0) | 795 | if (mhd_gtls_openpgp_send_fingerprint (session) == 0) |
796 | return _gnutls_gen_openpgp_certificate (session, data); | 796 | return _gnutls_gen_openpgp_certificate (session, data); |
797 | else | 797 | else |
798 | return _gnutls_gen_openpgp_certificate_fpr (session, data); | 798 | return _gnutls_gen_openpgp_certificate_fpr (session, data); |
@@ -807,7 +807,7 @@ _gnutls_gen_cert_client_certificate (gnutls_session_t session, opaque ** data) | |||
807 | } | 807 | } |
808 | 808 | ||
809 | int | 809 | int |
810 | _gnutls_gen_cert_server_certificate (gnutls_session_t session, opaque ** data) | 810 | mhd_gtls_gen_cert_server_certificate (mhd_gtls_session_t session, opaque ** data) |
811 | { | 811 | { |
812 | switch (session->security_parameters.cert_type) | 812 | switch (session->security_parameters.cert_type) |
813 | { | 813 | { |
@@ -824,23 +824,23 @@ _gnutls_gen_cert_server_certificate (gnutls_session_t session, opaque ** data) | |||
824 | /* Process server certificate | 824 | /* Process server certificate |
825 | */ | 825 | */ |
826 | 826 | ||
827 | #define CLEAR_CERTS for(x=0;x<peer_certificate_list_size;x++) _gnutls_gcert_deinit(&peer_certificate_list[x]) | 827 | #define CLEAR_CERTS for(x=0;x<peer_certificate_list_size;x++) mhd_gtls_gcert_deinit(&peer_certificate_list[x]) |
828 | int | 828 | int |
829 | _gnutls_proc_x509_server_certificate (gnutls_session_t session, | 829 | _gnutls_proc_x509_server_certificate (mhd_gtls_session_t session, |
830 | opaque * data, size_t data_size) | 830 | opaque * data, size_t data_size) |
831 | { | 831 | { |
832 | int size, len, ret; | 832 | int size, len, ret; |
833 | opaque *p = data; | 833 | opaque *p = data; |
834 | cert_auth_info_t info; | 834 | cert_auth_info_t info; |
835 | gnutls_certificate_credentials_t cred; | 835 | mhd_gtls_cert_credentials_t cred; |
836 | ssize_t dsize = data_size; | 836 | ssize_t dsize = data_size; |
837 | int i, j, x; | 837 | int i, j, x; |
838 | gnutls_cert *peer_certificate_list; | 838 | gnutls_cert *peer_certificate_list; |
839 | int peer_certificate_list_size = 0; | 839 | int peer_certificate_list_size = 0; |
840 | gnutls_datum_t tmp; | 840 | gnutls_datum_t tmp; |
841 | 841 | ||
842 | cred = (gnutls_certificate_credentials_t) | 842 | cred = (mhd_gtls_cert_credentials_t) |
843 | _gnutls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL); | 843 | mhd_gtls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL); |
844 | if (cred == NULL) | 844 | if (cred == NULL) |
845 | { | 845 | { |
846 | gnutls_assert (); | 846 | gnutls_assert (); |
@@ -849,14 +849,14 @@ _gnutls_proc_x509_server_certificate (gnutls_session_t session, | |||
849 | 849 | ||
850 | 850 | ||
851 | if ((ret = | 851 | if ((ret = |
852 | _gnutls_auth_info_set (session, MHD_GNUTLS_CRD_CERTIFICATE, | 852 | mhd_gtls_auth_info_set (session, MHD_GNUTLS_CRD_CERTIFICATE, |
853 | sizeof (cert_auth_info_st), 1)) < 0) | 853 | sizeof (cert_auth_info_st), 1)) < 0) |
854 | { | 854 | { |
855 | gnutls_assert (); | 855 | gnutls_assert (); |
856 | return ret; | 856 | return ret; |
857 | } | 857 | } |
858 | 858 | ||
859 | info = _gnutls_get_auth_info (session); | 859 | info = mhd_gtls_get_auth_info (session); |
860 | 860 | ||
861 | if (data == NULL || data_size == 0) | 861 | if (data == NULL || data_size == 0) |
862 | { | 862 | { |
@@ -866,7 +866,7 @@ _gnutls_proc_x509_server_certificate (gnutls_session_t session, | |||
866 | } | 866 | } |
867 | 867 | ||
868 | DECR_LEN (dsize, 3); | 868 | DECR_LEN (dsize, 3); |
869 | size = _gnutls_read_uint24 (p); | 869 | size = mhd_gtls_read_uint24 (p); |
870 | p += 3; | 870 | p += 3; |
871 | 871 | ||
872 | /* some implementations send 0B 00 00 06 00 00 03 00 00 00 | 872 | /* some implementations send 0B 00 00 06 00 00 03 00 00 00 |
@@ -883,7 +883,7 @@ _gnutls_proc_x509_server_certificate (gnutls_session_t session, | |||
883 | while (i > 0) | 883 | while (i > 0) |
884 | { | 884 | { |
885 | DECR_LEN (dsize, 3); | 885 | DECR_LEN (dsize, 3); |
886 | len = _gnutls_read_uint24 (p); | 886 | len = mhd_gtls_read_uint24 (p); |
887 | p += 3; | 887 | p += 3; |
888 | DECR_LEN (dsize, len); | 888 | DECR_LEN (dsize, len); |
889 | peer_certificate_list_size++; | 889 | peer_certificate_list_size++; |
@@ -921,14 +921,14 @@ _gnutls_proc_x509_server_certificate (gnutls_session_t session, | |||
921 | 921 | ||
922 | for (j = 0; j < peer_certificate_list_size; j++) | 922 | for (j = 0; j < peer_certificate_list_size; j++) |
923 | { | 923 | { |
924 | len = _gnutls_read_uint24 (p); | 924 | len = mhd_gtls_read_uint24 (p); |
925 | p += 3; | 925 | p += 3; |
926 | 926 | ||
927 | tmp.size = len; | 927 | tmp.size = len; |
928 | tmp.data = p; | 928 | tmp.data = p; |
929 | 929 | ||
930 | if ((ret = | 930 | if ((ret = |
931 | _gnutls_x509_raw_cert_to_gcert (&peer_certificate_list | 931 | mhd_gtls_x509_raw_cert_to_gcert (&peer_certificate_list |
932 | [j], &tmp, | 932 | [j], &tmp, |
933 | CERT_ONLY_EXTENSIONS)) < 0) | 933 | CERT_ONLY_EXTENSIONS)) < 0) |
934 | { | 934 | { |
@@ -966,23 +966,23 @@ cleanup: | |||
966 | 966 | ||
967 | } | 967 | } |
968 | 968 | ||
969 | #define CLEAR_CERTS for(x=0;x<peer_certificate_list_size;x++) _gnutls_gcert_deinit(&peer_certificate_list[x]) | 969 | #define CLEAR_CERTS for(x=0;x<peer_certificate_list_size;x++) mhd_gtls_gcert_deinit(&peer_certificate_list[x]) |
970 | int | 970 | int |
971 | _gnutls_proc_openpgp_server_certificate (gnutls_session_t session, | 971 | _gnutls_proc_openpgp_server_certificate (mhd_gtls_session_t session, |
972 | opaque * data, size_t data_size) | 972 | opaque * data, size_t data_size) |
973 | { | 973 | { |
974 | int size, ret, len; | 974 | int size, ret, len; |
975 | opaque *p = data; | 975 | opaque *p = data; |
976 | cert_auth_info_t info; | 976 | cert_auth_info_t info; |
977 | gnutls_certificate_credentials_t cred; | 977 | mhd_gtls_cert_credentials_t cred; |
978 | ssize_t dsize = data_size; | 978 | ssize_t dsize = data_size; |
979 | int i, x; | 979 | int i, x; |
980 | gnutls_cert *peer_certificate_list = NULL; | 980 | gnutls_cert *peer_certificate_list = NULL; |
981 | int peer_certificate_list_size = 0; | 981 | int peer_certificate_list_size = 0; |
982 | gnutls_datum_t tmp, akey = { NULL, 0 }; | 982 | gnutls_datum_t tmp, akey = { NULL, 0 }; |
983 | 983 | ||
984 | cred = (gnutls_certificate_credentials_t) | 984 | cred = (mhd_gtls_cert_credentials_t) |
985 | _gnutls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL); | 985 | mhd_gtls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL); |
986 | if (cred == NULL) | 986 | if (cred == NULL) |
987 | { | 987 | { |
988 | gnutls_assert (); | 988 | gnutls_assert (); |
@@ -990,14 +990,14 @@ _gnutls_proc_openpgp_server_certificate (gnutls_session_t session, | |||
990 | } | 990 | } |
991 | 991 | ||
992 | if ((ret = | 992 | if ((ret = |
993 | _gnutls_auth_info_set (session, MHD_GNUTLS_CRD_CERTIFICATE, | 993 | mhd_gtls_auth_info_set (session, MHD_GNUTLS_CRD_CERTIFICATE, |
994 | sizeof (cert_auth_info_st), 1)) < 0) | 994 | sizeof (cert_auth_info_st), 1)) < 0) |
995 | { | 995 | { |
996 | gnutls_assert (); | 996 | gnutls_assert (); |
997 | return ret; | 997 | return ret; |
998 | } | 998 | } |
999 | 999 | ||
1000 | info = _gnutls_get_auth_info (session); | 1000 | info = mhd_gtls_get_auth_info (session); |
1001 | 1001 | ||
1002 | if (data == NULL || data_size == 0) | 1002 | if (data == NULL || data_size == 0) |
1003 | { | 1003 | { |
@@ -1006,7 +1006,7 @@ _gnutls_proc_openpgp_server_certificate (gnutls_session_t session, | |||
1006 | } | 1006 | } |
1007 | 1007 | ||
1008 | DECR_LEN (dsize, 3); | 1008 | DECR_LEN (dsize, 3); |
1009 | size = _gnutls_read_uint24 (p); | 1009 | size = mhd_gtls_read_uint24 (p); |
1010 | p += 3; | 1010 | p += 3; |
1011 | 1011 | ||
1012 | if (size == 0) | 1012 | if (size == 0) |
@@ -1060,7 +1060,7 @@ _gnutls_proc_openpgp_server_certificate (gnutls_session_t session, | |||
1060 | 1060 | ||
1061 | /* Read the actual certificate */ | 1061 | /* Read the actual certificate */ |
1062 | DECR_LEN (dsize, 3); | 1062 | DECR_LEN (dsize, 3); |
1063 | len = _gnutls_read_uint24 (p); | 1063 | len = mhd_gtls_read_uint24 (p); |
1064 | p += 3; | 1064 | p += 3; |
1065 | 1065 | ||
1066 | if (len == 0) | 1066 | if (len == 0) |
@@ -1147,7 +1147,7 @@ cleanup: | |||
1147 | } | 1147 | } |
1148 | 1148 | ||
1149 | int | 1149 | int |
1150 | _gnutls_proc_cert_server_certificate (gnutls_session_t session, | 1150 | mhd_gtls_proc_cert_server_certificate (mhd_gtls_session_t session, |
1151 | opaque * data, size_t data_size) | 1151 | opaque * data, size_t data_size) |
1152 | { | 1152 | { |
1153 | switch (session->security_parameters.cert_type) | 1153 | switch (session->security_parameters.cert_type) |
@@ -1185,21 +1185,21 @@ _gnutls_check_supported_sign_algo (CertificateSigType algo) | |||
1185 | } | 1185 | } |
1186 | 1186 | ||
1187 | int | 1187 | int |
1188 | _gnutls_proc_cert_cert_req (gnutls_session_t session, opaque * data, | 1188 | mhd_gtls_proc_cert_cert_req (mhd_gtls_session_t session, opaque * data, |
1189 | size_t data_size) | 1189 | size_t data_size) |
1190 | { | 1190 | { |
1191 | int size, ret; | 1191 | int size, ret; |
1192 | opaque *p; | 1192 | opaque *p; |
1193 | gnutls_certificate_credentials_t cred; | 1193 | mhd_gtls_cert_credentials_t cred; |
1194 | cert_auth_info_t info; | 1194 | cert_auth_info_t info; |
1195 | ssize_t dsize; | 1195 | ssize_t dsize; |
1196 | int i, j; | 1196 | int i, j; |
1197 | gnutls_pk_algorithm_t pk_algos[MAX_SIGN_ALGOS]; | 1197 | gnutls_pk_algorithm_t pk_algos[MAX_SIGN_ALGOS]; |
1198 | int pk_algos_length; | 1198 | int pk_algos_length; |
1199 | gnutls_protocol_t ver = gnutls_protocol_get_version (session); | 1199 | gnutls_protocol_t ver = MHD_gnutls_protocol_get_version (session); |
1200 | 1200 | ||
1201 | cred = (gnutls_certificate_credentials_t) | 1201 | cred = (mhd_gtls_cert_credentials_t) |
1202 | _gnutls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL); | 1202 | mhd_gtls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL); |
1203 | if (cred == NULL) | 1203 | if (cred == NULL) |
1204 | { | 1204 | { |
1205 | gnutls_assert (); | 1205 | gnutls_assert (); |
@@ -1207,14 +1207,14 @@ _gnutls_proc_cert_cert_req (gnutls_session_t session, opaque * data, | |||
1207 | } | 1207 | } |
1208 | 1208 | ||
1209 | if ((ret = | 1209 | if ((ret = |
1210 | _gnutls_auth_info_set (session, MHD_GNUTLS_CRD_CERTIFICATE, | 1210 | mhd_gtls_auth_info_set (session, MHD_GNUTLS_CRD_CERTIFICATE, |
1211 | sizeof (cert_auth_info_st), 0)) < 0) | 1211 | sizeof (cert_auth_info_st), 0)) < 0) |
1212 | { | 1212 | { |
1213 | gnutls_assert (); | 1213 | gnutls_assert (); |
1214 | return ret; | 1214 | return ret; |
1215 | } | 1215 | } |
1216 | 1216 | ||
1217 | info = _gnutls_get_auth_info (session); | 1217 | info = mhd_gtls_get_auth_info (session); |
1218 | 1218 | ||
1219 | p = data; | 1219 | p = data; |
1220 | dsize = data_size; | 1220 | dsize = data_size; |
@@ -1259,7 +1259,7 @@ _gnutls_proc_cert_cert_req (gnutls_session_t session, opaque * data, | |||
1259 | 1259 | ||
1260 | /* read the certificate authorities */ | 1260 | /* read the certificate authorities */ |
1261 | DECR_LEN (dsize, 2); | 1261 | DECR_LEN (dsize, 2); |
1262 | size = _gnutls_read_uint16 (p); | 1262 | size = mhd_gtls_read_uint16 (p); |
1263 | p += 2; | 1263 | p += 2; |
1264 | 1264 | ||
1265 | if (session->security_parameters.cert_type == MHD_GNUTLS_CRT_OPENPGP | 1265 | if (session->security_parameters.cert_type == MHD_GNUTLS_CRT_OPENPGP |
@@ -1290,7 +1290,7 @@ _gnutls_proc_cert_cert_req (gnutls_session_t session, opaque * data, | |||
1290 | } | 1290 | } |
1291 | 1291 | ||
1292 | int | 1292 | int |
1293 | _gnutls_gen_cert_client_cert_vrfy (gnutls_session_t session, opaque ** data) | 1293 | mhd_gtls_gen_cert_client_cert_vrfy (mhd_gtls_session_t session, opaque ** data) |
1294 | { | 1294 | { |
1295 | int ret; | 1295 | int ret; |
1296 | gnutls_cert *apr_cert_list; | 1296 | gnutls_cert *apr_cert_list; |
@@ -1302,7 +1302,7 @@ _gnutls_gen_cert_client_cert_vrfy (gnutls_session_t session, opaque ** data) | |||
1302 | 1302 | ||
1303 | /* find the appropriate certificate */ | 1303 | /* find the appropriate certificate */ |
1304 | if ((ret = | 1304 | if ((ret = |
1305 | _gnutls_get_selected_cert (session, &apr_cert_list, | 1305 | mhd_gtls_get_selected_cert (session, &apr_cert_list, |
1306 | &apr_cert_list_length, &apr_pkey)) < 0) | 1306 | &apr_cert_list_length, &apr_pkey)) < 0) |
1307 | { | 1307 | { |
1308 | gnutls_assert (); | 1308 | gnutls_assert (); |
@@ -1312,7 +1312,7 @@ _gnutls_gen_cert_client_cert_vrfy (gnutls_session_t session, opaque ** data) | |||
1312 | if (apr_cert_list_length > 0) | 1312 | if (apr_cert_list_length > 0) |
1313 | { | 1313 | { |
1314 | if ((ret = | 1314 | if ((ret = |
1315 | _gnutls_tls_sign_hdata (session, | 1315 | mhd_gtls_tls_sign_hdata (session, |
1316 | &apr_cert_list[0], | 1316 | &apr_cert_list[0], |
1317 | apr_pkey, &signature)) < 0) | 1317 | apr_pkey, &signature)) < 0) |
1318 | { | 1318 | { |
@@ -1332,7 +1332,7 @@ _gnutls_gen_cert_client_cert_vrfy (gnutls_session_t session, opaque ** data) | |||
1332 | return GNUTLS_E_MEMORY_ERROR; | 1332 | return GNUTLS_E_MEMORY_ERROR; |
1333 | } | 1333 | } |
1334 | size = signature.size; | 1334 | size = signature.size; |
1335 | _gnutls_write_uint16 (size, *data); | 1335 | mhd_gtls_write_uint16 (size, *data); |
1336 | 1336 | ||
1337 | memcpy (&(*data)[2], signature.data, size); | 1337 | memcpy (&(*data)[2], signature.data, size); |
1338 | 1338 | ||
@@ -1342,14 +1342,14 @@ _gnutls_gen_cert_client_cert_vrfy (gnutls_session_t session, opaque ** data) | |||
1342 | } | 1342 | } |
1343 | 1343 | ||
1344 | int | 1344 | int |
1345 | _gnutls_proc_cert_client_cert_vrfy (gnutls_session_t session, | 1345 | mhd_gtls_proc_cert_client_cert_vrfy (mhd_gtls_session_t session, |
1346 | opaque * data, size_t data_size) | 1346 | opaque * data, size_t data_size) |
1347 | { | 1347 | { |
1348 | int size, ret; | 1348 | int size, ret; |
1349 | ssize_t dsize = data_size; | 1349 | ssize_t dsize = data_size; |
1350 | opaque *pdata = data; | 1350 | opaque *pdata = data; |
1351 | gnutls_datum_t sig; | 1351 | gnutls_datum_t sig; |
1352 | cert_auth_info_t info = _gnutls_get_auth_info (session); | 1352 | cert_auth_info_t info = mhd_gtls_get_auth_info (session); |
1353 | gnutls_cert peer_cert; | 1353 | gnutls_cert peer_cert; |
1354 | 1354 | ||
1355 | if (info == NULL || info->ncerts == 0) | 1355 | if (info == NULL || info->ncerts == 0) |
@@ -1360,7 +1360,7 @@ _gnutls_proc_cert_client_cert_vrfy (gnutls_session_t session, | |||
1360 | } | 1360 | } |
1361 | 1361 | ||
1362 | DECR_LEN (dsize, 2); | 1362 | DECR_LEN (dsize, 2); |
1363 | size = _gnutls_read_uint16 (pdata); | 1363 | size = mhd_gtls_read_uint16 (pdata); |
1364 | pdata += 2; | 1364 | pdata += 2; |
1365 | 1365 | ||
1366 | DECR_LEN (dsize, size); | 1366 | DECR_LEN (dsize, size); |
@@ -1368,7 +1368,7 @@ _gnutls_proc_cert_client_cert_vrfy (gnutls_session_t session, | |||
1368 | sig.data = pdata; | 1368 | sig.data = pdata; |
1369 | sig.size = size; | 1369 | sig.size = size; |
1370 | 1370 | ||
1371 | ret = _gnutls_raw_cert_to_gcert (&peer_cert, | 1371 | ret = mhd_gtls_raw_cert_to_gcert (&peer_cert, |
1372 | session->security_parameters.cert_type, | 1372 | session->security_parameters.cert_type, |
1373 | &info->raw_certificate_list[0], | 1373 | &info->raw_certificate_list[0], |
1374 | CERT_NO_COPY); | 1374 | CERT_NO_COPY); |
@@ -1379,33 +1379,33 @@ _gnutls_proc_cert_client_cert_vrfy (gnutls_session_t session, | |||
1379 | return ret; | 1379 | return ret; |
1380 | } | 1380 | } |
1381 | 1381 | ||
1382 | if ((ret = _gnutls_verify_sig_hdata (session, &peer_cert, &sig)) < 0) | 1382 | if ((ret = mhd_gtls_verify_sig_hdata (session, &peer_cert, &sig)) < 0) |
1383 | { | 1383 | { |
1384 | gnutls_assert (); | 1384 | gnutls_assert (); |
1385 | _gnutls_gcert_deinit (&peer_cert); | 1385 | mhd_gtls_gcert_deinit (&peer_cert); |
1386 | return ret; | 1386 | return ret; |
1387 | } | 1387 | } |
1388 | _gnutls_gcert_deinit (&peer_cert); | 1388 | mhd_gtls_gcert_deinit (&peer_cert); |
1389 | 1389 | ||
1390 | return 0; | 1390 | return 0; |
1391 | } | 1391 | } |
1392 | 1392 | ||
1393 | #define CERTTYPE_SIZE 3 | 1393 | #define CERTTYPE_SIZE 3 |
1394 | int | 1394 | int |
1395 | _gnutls_gen_cert_server_cert_req (gnutls_session_t session, opaque ** data) | 1395 | mhd_gtls_gen_cert_server_cert_req (mhd_gtls_session_t session, opaque ** data) |
1396 | { | 1396 | { |
1397 | gnutls_certificate_credentials_t cred; | 1397 | mhd_gtls_cert_credentials_t cred; |
1398 | int size; | 1398 | int size; |
1399 | opaque *pdata; | 1399 | opaque *pdata; |
1400 | gnutls_protocol_t ver = gnutls_protocol_get_version (session); | 1400 | gnutls_protocol_t ver = MHD_gnutls_protocol_get_version (session); |
1401 | 1401 | ||
1402 | /* Now we need to generate the RDN sequence. This is | 1402 | /* Now we need to generate the RDN sequence. This is |
1403 | * already in the CERTIFICATE_CRED structure, to improve | 1403 | * already in the CERTIFICATE_CRED structure, to improve |
1404 | * performance. | 1404 | * performance. |
1405 | */ | 1405 | */ |
1406 | 1406 | ||
1407 | cred = (gnutls_certificate_credentials_t) | 1407 | cred = (mhd_gtls_cert_credentials_t) |
1408 | _gnutls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL); | 1408 | mhd_gtls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL); |
1409 | if (cred == NULL) | 1409 | if (cred == NULL) |
1410 | { | 1410 | { |
1411 | gnutls_assert (); | 1411 | gnutls_assert (); |
@@ -1449,12 +1449,12 @@ _gnutls_gen_cert_server_cert_req (gnutls_session_t session, opaque ** data) | |||
1449 | if (session->security_parameters.cert_type == MHD_GNUTLS_CRT_X509 && | 1449 | if (session->security_parameters.cert_type == MHD_GNUTLS_CRT_X509 && |
1450 | session->internals.ignore_rdn_sequence == 0) | 1450 | session->internals.ignore_rdn_sequence == 0) |
1451 | { | 1451 | { |
1452 | _gnutls_write_datum16 (pdata, cred->x509_rdn_sequence); | 1452 | mhd_gtls_write_datum16 (pdata, cred->x509_rdn_sequence); |
1453 | /* pdata += cred->x509_rdn_sequence.size + 2; */ | 1453 | /* pdata += cred->x509_rdn_sequence.size + 2; */ |
1454 | } | 1454 | } |
1455 | else | 1455 | else |
1456 | { | 1456 | { |
1457 | _gnutls_write_uint16 (0, pdata); | 1457 | mhd_gtls_write_uint16 (0, pdata); |
1458 | /* pdata+=2; */ | 1458 | /* pdata+=2; */ |
1459 | } | 1459 | } |
1460 | 1460 | ||
@@ -1470,7 +1470,7 @@ _gnutls_gen_cert_server_cert_req (gnutls_session_t session, opaque ** data) | |||
1470 | * | 1470 | * |
1471 | */ | 1471 | */ |
1472 | int | 1472 | int |
1473 | _gnutls_get_selected_cert (gnutls_session_t session, | 1473 | mhd_gtls_get_selected_cert (mhd_gtls_session_t session, |
1474 | gnutls_cert ** apr_cert_list, | 1474 | gnutls_cert ** apr_cert_list, |
1475 | int *apr_cert_list_length, | 1475 | int *apr_cert_list_length, |
1476 | gnutls_privkey ** apr_pkey) | 1476 | gnutls_privkey ** apr_pkey) |
@@ -1530,7 +1530,7 @@ alloc_and_load_x509_certs (gnutls_x509_crt_t * certs, unsigned ncerts) | |||
1530 | 1530 | ||
1531 | for (i = 0; i < ncerts; i++) | 1531 | for (i = 0; i < ncerts; i++) |
1532 | { | 1532 | { |
1533 | ret = _gnutls_x509_crt_to_gcert (&local_certs[i], certs[i], 0); | 1533 | ret = mhd_gtls_x509_crt_to_gcert (&local_certs[i], certs[i], 0); |
1534 | if (ret < 0) | 1534 | if (ret < 0) |
1535 | break; | 1535 | break; |
1536 | } | 1536 | } |
@@ -1540,7 +1540,7 @@ alloc_and_load_x509_certs (gnutls_x509_crt_t * certs, unsigned ncerts) | |||
1540 | gnutls_assert (); | 1540 | gnutls_assert (); |
1541 | for (j = 0; j < i; j++) | 1541 | for (j = 0; j < i; j++) |
1542 | { | 1542 | { |
1543 | _gnutls_gcert_deinit (&local_certs[j]); | 1543 | mhd_gtls_gcert_deinit (&local_certs[j]); |
1544 | } | 1544 | } |
1545 | gnutls_free (local_certs); | 1545 | gnutls_free (local_certs); |
1546 | return NULL; | 1546 | return NULL; |
@@ -1613,7 +1613,7 @@ alloc_and_load_pgp_certs (gnutls_openpgp_crt_t cert) | |||
1613 | if (ret < 0) | 1613 | if (ret < 0) |
1614 | { | 1614 | { |
1615 | gnutls_assert (); | 1615 | gnutls_assert (); |
1616 | _gnutls_gcert_deinit (local_certs); | 1616 | mhd_gtls_gcert_deinit (local_certs); |
1617 | gnutls_free (local_certs); | 1617 | gnutls_free (local_certs); |
1618 | return NULL; | 1618 | return NULL; |
1619 | } | 1619 | } |
@@ -1658,7 +1658,7 @@ alloc_and_load_pgp_key (const gnutls_openpgp_privkey_t key) | |||
1658 | 1658 | ||
1659 | 1659 | ||
1660 | void | 1660 | void |
1661 | _gnutls_selected_certs_deinit (gnutls_session_t session) | 1661 | mhd_gtls_selected_certs_deinit (mhd_gtls_session_t session) |
1662 | { | 1662 | { |
1663 | if (session->internals.selected_need_free != 0) | 1663 | if (session->internals.selected_need_free != 0) |
1664 | { | 1664 | { |
@@ -1666,13 +1666,13 @@ _gnutls_selected_certs_deinit (gnutls_session_t session) | |||
1666 | 1666 | ||
1667 | for (i = 0; i < session->internals.selected_cert_list_length; i++) | 1667 | for (i = 0; i < session->internals.selected_cert_list_length; i++) |
1668 | { | 1668 | { |
1669 | _gnutls_gcert_deinit (&session->internals.selected_cert_list[i]); | 1669 | mhd_gtls_gcert_deinit (&session->internals.selected_cert_list[i]); |
1670 | } | 1670 | } |
1671 | gnutls_free (session->internals.selected_cert_list); | 1671 | gnutls_free (session->internals.selected_cert_list); |
1672 | session->internals.selected_cert_list = NULL; | 1672 | session->internals.selected_cert_list = NULL; |
1673 | session->internals.selected_cert_list_length = 0; | 1673 | session->internals.selected_cert_list_length = 0; |
1674 | 1674 | ||
1675 | _gnutls_gkey_deinit (session->internals.selected_key); | 1675 | mhd_gtls_gkey_deinit (session->internals.selected_key); |
1676 | if (session->internals.selected_key) | 1676 | if (session->internals.selected_key) |
1677 | { | 1677 | { |
1678 | gnutls_free (session->internals.selected_key); | 1678 | gnutls_free (session->internals.selected_key); |
@@ -1684,11 +1684,11 @@ _gnutls_selected_certs_deinit (gnutls_session_t session) | |||
1684 | } | 1684 | } |
1685 | 1685 | ||
1686 | void | 1686 | void |
1687 | _gnutls_selected_certs_set (gnutls_session_t session, | 1687 | mhd_gtls_selected_certs_set (mhd_gtls_session_t session, |
1688 | gnutls_cert * certs, int ncerts, | 1688 | gnutls_cert * certs, int ncerts, |
1689 | gnutls_privkey * key, int need_free) | 1689 | gnutls_privkey * key, int need_free) |
1690 | { | 1690 | { |
1691 | _gnutls_selected_certs_deinit (session); | 1691 | mhd_gtls_selected_certs_deinit (session); |
1692 | 1692 | ||
1693 | session->internals.selected_cert_list = certs; | 1693 | session->internals.selected_cert_list = certs; |
1694 | session->internals.selected_cert_list_length = ncerts; | 1694 | session->internals.selected_cert_list_length = ncerts; |
@@ -1709,15 +1709,15 @@ _gnutls_selected_certs_set (gnutls_session_t session, | |||
1709 | * | 1709 | * |
1710 | */ | 1710 | */ |
1711 | int | 1711 | int |
1712 | _gnutls_server_select_cert (gnutls_session_t session, | 1712 | mhd_gtls_server_select_cert (mhd_gtls_session_t session, |
1713 | gnutls_pk_algorithm_t requested_algo) | 1713 | gnutls_pk_algorithm_t requested_algo) |
1714 | { | 1714 | { |
1715 | unsigned i; | 1715 | unsigned i; |
1716 | int idx, ret; | 1716 | int idx, ret; |
1717 | gnutls_certificate_credentials_t cred; | 1717 | mhd_gtls_cert_credentials_t cred; |
1718 | 1718 | ||
1719 | cred = (gnutls_certificate_credentials_t) | 1719 | cred = (mhd_gtls_cert_credentials_t) |
1720 | _gnutls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL); | 1720 | mhd_gtls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL); |
1721 | if (cred == NULL) | 1721 | if (cred == NULL) |
1722 | { | 1722 | { |
1723 | gnutls_assert (); | 1723 | gnutls_assert (); |
@@ -1759,7 +1759,7 @@ _gnutls_server_select_cert (gnutls_session_t session, | |||
1759 | */ | 1759 | */ |
1760 | if (idx >= 0 && ret == 0) | 1760 | if (idx >= 0 && ret == 0) |
1761 | { | 1761 | { |
1762 | _gnutls_selected_certs_set (session, | 1762 | mhd_gtls_selected_certs_set (session, |
1763 | &cred->cert_list[idx][0], | 1763 | &cred->cert_list[idx][0], |
1764 | cred->cert_list_length[idx], | 1764 | cred->cert_list_length[idx], |
1765 | &cred->pkey[idx], 0); | 1765 | &cred->pkey[idx], 0); |
@@ -1771,10 +1771,10 @@ _gnutls_server_select_cert (gnutls_session_t session, | |||
1771 | return ret; | 1771 | return ret; |
1772 | } | 1772 | } |
1773 | 1773 | ||
1774 | /* Frees the rsa_info_st structure. | 1774 | /* Frees the mhd_gtls_rsa_info_st structure. |
1775 | */ | 1775 | */ |
1776 | void | 1776 | void |
1777 | _gnutls_free_rsa_info (rsa_info_st * rsa) | 1777 | mhd_gtls_free_rsa_info (rsa_info_st * rsa) |
1778 | { | 1778 | { |
1779 | _gnutls_free_datum (&rsa->modulus); | 1779 | _gnutls_free_datum (&rsa->modulus); |
1780 | _gnutls_free_datum (&rsa->exponent); | 1780 | _gnutls_free_datum (&rsa->exponent); |