aboutsummaryrefslogtreecommitdiff
path: root/src/daemon/https/tls/auth_cert.c
diff options
context:
space:
mode:
authorlv-426 <oxcafebaby@yahoo.com>2008-08-11 03:40:22 +0000
committerlv-426 <oxcafebaby@yahoo.com>2008-08-11 03:40:22 +0000
commit1c893a971fa8d04ada6c66aa9ebf525b03ed4426 (patch)
tree7a4b22d2bd11a55aa2bd2bc01495572dd260e7d6 /src/daemon/https/tls/auth_cert.c
parent41886bcf92e8e6b943c9f0697a75f4a380952f52 (diff)
downloadlibmicrohttpd-1c893a971fa8d04ada6c66aa9ebf525b03ed4426.tar.gz
libmicrohttpd-1c893a971fa8d04ada6c66aa9ebf525b03ed4426.zip
gnutls code cleanup
symbol refactoring
Diffstat (limited to 'src/daemon/https/tls/auth_cert.c')
-rw-r--r--src/daemon/https/tls/auth_cert.c192
1 files changed, 96 insertions, 96 deletions
diff --git a/src/daemon/https/tls/auth_cert.c b/src/daemon/https/tls/auth_cert.c
index c5c5d9f5..7fea2569 100644
--- a/src/daemon/https/tls/auth_cert.c
+++ b/src/daemon/https/tls/auth_cert.c
@@ -187,7 +187,7 @@ _gnutls_cert_get_issuer_dn (gnutls_cert * cert, gnutls_datum_t * odn)
187 * CAs and sign algorithms supported by the peer server. 187 * CAs and sign algorithms supported by the peer server.
188 */ 188 */
189static int 189static int
190_find_x509_cert (const gnutls_certificate_credentials_t cred, 190_find_x509_cert (const mhd_gtls_cert_credentials_t cred,
191 opaque * _data, size_t _data_size, 191 opaque * _data, size_t _data_size,
192 const gnutls_pk_algorithm_t * pk_algos, 192 const gnutls_pk_algorithm_t * pk_algos,
193 int pk_algos_length, int *indx) 193 int pk_algos_length, int *indx)
@@ -205,7 +205,7 @@ _find_x509_cert (const gnutls_certificate_credentials_t cred,
205 { 205 {
206 206
207 DECR_LENGTH_RET (data_size, 2, 0); 207 DECR_LENGTH_RET (data_size, 2, 0);
208 size = _gnutls_read_uint16 (data); 208 size = mhd_gtls_read_uint16 (data);
209 DECR_LENGTH_RET (data_size, size, 0); 209 DECR_LENGTH_RET (data_size, size, 0);
210 data += 2; 210 data += 2;
211 211
@@ -258,7 +258,7 @@ _find_x509_cert (const gnutls_certificate_credentials_t cred,
258/* Locates the most appropriate openpgp cert 258/* Locates the most appropriate openpgp cert
259 */ 259 */
260static int 260static int
261_find_openpgp_cert (const gnutls_certificate_credentials_t cred, 261_find_openpgp_cert (const mhd_gtls_cert_credentials_t cred,
262 gnutls_pk_algorithm_t * pk_algos, 262 gnutls_pk_algorithm_t * pk_algos,
263 int pk_algos_length, int *indx) 263 int pk_algos_length, int *indx)
264{ 264{
@@ -294,7 +294,7 @@ _find_openpgp_cert (const gnutls_certificate_credentials_t cred,
294 * certificate request packet. 294 * certificate request packet.
295 */ 295 */
296static int 296static int
297get_issuers_num (gnutls_session_t session, opaque * data, ssize_t data_size) 297get_issuers_num (mhd_gtls_session_t session, opaque * data, ssize_t data_size)
298{ 298{
299 int issuers_dn_len = 0, result; 299 int issuers_dn_len = 0, result;
300 unsigned size; 300 unsigned size;
@@ -314,7 +314,7 @@ get_issuers_num (gnutls_session_t session, opaque * data, ssize_t data_size)
314 */ 314 */
315 result = GNUTLS_E_UNEXPECTED_PACKET_LENGTH; 315 result = GNUTLS_E_UNEXPECTED_PACKET_LENGTH;
316 DECR_LENGTH_COM (data_size, 2, goto error); 316 DECR_LENGTH_COM (data_size, 2, goto error);
317 size = _gnutls_read_uint16 (data); 317 size = mhd_gtls_read_uint16 (data);
318 318
319 result = GNUTLS_E_UNEXPECTED_PACKET_LENGTH; 319 result = GNUTLS_E_UNEXPECTED_PACKET_LENGTH;
320 DECR_LENGTH_COM (data_size, size, goto error); 320 DECR_LENGTH_COM (data_size, size, goto error);
@@ -343,7 +343,7 @@ error:
343 * packet. 343 * packet.
344 */ 344 */
345static int 345static int
346get_issuers (gnutls_session_t session, 346get_issuers (mhd_gtls_session_t session,
347 gnutls_datum_t * issuers_dn, int issuers_len, 347 gnutls_datum_t * issuers_dn, int issuers_len,
348 opaque * data, size_t data_size) 348 opaque * data, size_t data_size)
349{ 349{
@@ -367,7 +367,7 @@ get_issuers (gnutls_session_t session,
367 */ 367 */
368 data_size -= 2; 368 data_size -= 2;
369 369
370 size = _gnutls_read_uint16 (data); 370 size = mhd_gtls_read_uint16 (data);
371 371
372 data += 2; 372 data += 2;
373 373
@@ -384,7 +384,7 @@ get_issuers (gnutls_session_t session,
384/* Calls the client get callback. 384/* Calls the client get callback.
385 */ 385 */
386static int 386static int
387call_get_cert_callback (gnutls_session_t session, 387call_get_cert_callback (mhd_gtls_session_t session,
388 gnutls_datum_t * issuers_dn, 388 gnutls_datum_t * issuers_dn,
389 int issuers_dn_length, 389 int issuers_dn_length,
390 gnutls_pk_algorithm_t * pk_algos, int pk_algos_length) 390 gnutls_pk_algorithm_t * pk_algos, int pk_algos_length)
@@ -395,10 +395,10 @@ call_get_cert_callback (gnutls_session_t session,
395 gnutls_retr_st st; 395 gnutls_retr_st st;
396 int ret; 396 int ret;
397 gnutls_certificate_type_t type = gnutls_certificate_type_get (session); 397 gnutls_certificate_type_t type = gnutls_certificate_type_get (session);
398 gnutls_certificate_credentials_t cred; 398 mhd_gtls_cert_credentials_t cred;
399 399
400 cred = (gnutls_certificate_credentials_t) 400 cred = (mhd_gtls_cert_credentials_t)
401 _gnutls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL); 401 mhd_gtls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL);
402 if (cred == NULL) 402 if (cred == NULL)
403 { 403 {
404 gnutls_assert (); 404 gnutls_assert ();
@@ -457,7 +457,7 @@ call_get_cert_callback (gnutls_session_t session,
457 457
458 } 458 }
459 459
460 _gnutls_selected_certs_set (session, local_certs, 460 mhd_gtls_selected_certs_set (session, local_certs,
461 (local_certs != NULL) ? st.ncerts : 0, 461 (local_certs != NULL) ? st.ncerts : 0,
462 local_key, 1); 462 local_key, 1);
463 463
@@ -504,20 +504,20 @@ cleanup:
504 * algorithm (only in automatic mode). 504 * algorithm (only in automatic mode).
505 */ 505 */
506static int 506static int
507_select_client_cert (gnutls_session_t session, 507_select_client_cert (mhd_gtls_session_t session,
508 opaque * _data, size_t _data_size, 508 opaque * _data, size_t _data_size,
509 gnutls_pk_algorithm_t * pk_algos, int pk_algos_length) 509 gnutls_pk_algorithm_t * pk_algos, int pk_algos_length)
510{ 510{
511 int result; 511 int result;
512 int indx = -1; 512 int indx = -1;
513 gnutls_certificate_credentials_t cred; 513 mhd_gtls_cert_credentials_t cred;
514 opaque *data = _data; 514 opaque *data = _data;
515 ssize_t data_size = _data_size; 515 ssize_t data_size = _data_size;
516 int issuers_dn_length; 516 int issuers_dn_length;
517 gnutls_datum_t *issuers_dn = NULL; 517 gnutls_datum_t *issuers_dn = NULL;
518 518
519 cred = (gnutls_certificate_credentials_t) 519 cred = (mhd_gtls_cert_credentials_t)
520 _gnutls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL); 520 mhd_gtls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL);
521 if (cred == NULL) 521 if (cred == NULL)
522 { 522 {
523 gnutls_assert (); 523 gnutls_assert ();
@@ -590,14 +590,14 @@ _select_client_cert (gnutls_session_t session,
590 590
591 if (indx >= 0) 591 if (indx >= 0)
592 { 592 {
593 _gnutls_selected_certs_set (session, 593 mhd_gtls_selected_certs_set (session,
594 &cred->cert_list[indx][0], 594 &cred->cert_list[indx][0],
595 cred->cert_list_length[indx], 595 cred->cert_list_length[indx],
596 &cred->pkey[indx], 0); 596 &cred->pkey[indx], 0);
597 } 597 }
598 else 598 else
599 { 599 {
600 _gnutls_selected_certs_set (session, NULL, 0, NULL, 0); 600 mhd_gtls_selected_certs_set (session, NULL, 0, NULL, 0);
601 } 601 }
602 602
603 result = 0; 603 result = 0;
@@ -613,7 +613,7 @@ cleanup:
613 */ 613 */
614 614
615int 615int
616_gnutls_gen_x509_crt (gnutls_session_t session, opaque ** data) 616_gnutls_gen_x509_crt (mhd_gtls_session_t session, opaque ** data)
617{ 617{
618 int ret, i; 618 int ret, i;
619 opaque *pdata; 619 opaque *pdata;
@@ -624,7 +624,7 @@ _gnutls_gen_x509_crt (gnutls_session_t session, opaque ** data)
624 /* find the appropriate certificate 624 /* find the appropriate certificate
625 */ 625 */
626 if ((ret = 626 if ((ret =
627 _gnutls_get_selected_cert (session, &apr_cert_list, 627 mhd_gtls_get_selected_cert (session, &apr_cert_list,
628 &apr_cert_list_length, &apr_pkey)) < 0) 628 &apr_cert_list_length, &apr_pkey)) < 0)
629 { 629 {
630 gnutls_assert (); 630 gnutls_assert ();
@@ -656,11 +656,11 @@ _gnutls_gen_x509_crt (gnutls_session_t session, opaque ** data)
656 gnutls_assert (); 656 gnutls_assert ();
657 return GNUTLS_E_MEMORY_ERROR; 657 return GNUTLS_E_MEMORY_ERROR;
658 } 658 }
659 _gnutls_write_uint24 (ret - 3, pdata); 659 mhd_gtls_write_uint24 (ret - 3, pdata);
660 pdata += 3; 660 pdata += 3;
661 for (i = 0; i < apr_cert_list_length; i++) 661 for (i = 0; i < apr_cert_list_length; i++)
662 { 662 {
663 _gnutls_write_datum24 (pdata, apr_cert_list[i].raw); 663 mhd_gtls_write_datum24 (pdata, apr_cert_list[i].raw);
664 pdata += (3 + apr_cert_list[i].raw.size); 664 pdata += (3 + apr_cert_list[i].raw.size);
665 } 665 }
666 666
@@ -671,7 +671,7 @@ enum PGPKeyDescriptorType
671{ PGP_KEY_FINGERPRINT, PGP_KEY }; 671{ PGP_KEY_FINGERPRINT, PGP_KEY };
672 672
673int 673int
674_gnutls_gen_openpgp_certificate (gnutls_session_t session, opaque ** data) 674_gnutls_gen_openpgp_certificate (mhd_gtls_session_t session, opaque ** data)
675{ 675{
676 int ret; 676 int ret;
677 opaque *pdata; 677 opaque *pdata;
@@ -681,7 +681,7 @@ _gnutls_gen_openpgp_certificate (gnutls_session_t session, opaque ** data)
681 681
682 /* find the appropriate certificate */ 682 /* find the appropriate certificate */
683 if ((ret = 683 if ((ret =
684 _gnutls_get_selected_cert (session, &apr_cert_list, 684 mhd_gtls_get_selected_cert (session, &apr_cert_list,
685 &apr_cert_list_length, &apr_pkey)) < 0) 685 &apr_cert_list_length, &apr_pkey)) < 0)
686 { 686 {
687 gnutls_assert (); 687 gnutls_assert ();
@@ -702,7 +702,7 @@ _gnutls_gen_openpgp_certificate (gnutls_session_t session, opaque ** data)
702 return GNUTLS_E_MEMORY_ERROR; 702 return GNUTLS_E_MEMORY_ERROR;
703 } 703 }
704 704
705 _gnutls_write_uint24 (ret - 3, pdata); 705 mhd_gtls_write_uint24 (ret - 3, pdata);
706 pdata += 3; 706 pdata += 3;
707 707
708 *pdata = PGP_KEY; /* whole key */ 708 *pdata = PGP_KEY; /* whole key */
@@ -710,17 +710,17 @@ _gnutls_gen_openpgp_certificate (gnutls_session_t session, opaque ** data)
710 710
711 if (apr_cert_list_length > 0) 711 if (apr_cert_list_length > 0)
712 { 712 {
713 _gnutls_write_datum24 (pdata, apr_cert_list[0].raw); 713 mhd_gtls_write_datum24 (pdata, apr_cert_list[0].raw);
714 pdata += (3 + apr_cert_list[0].raw.size); 714 pdata += (3 + apr_cert_list[0].raw.size);
715 } 715 }
716 else /* empty - no certificate */ 716 else /* empty - no certificate */
717 _gnutls_write_uint24 (0, pdata); 717 mhd_gtls_write_uint24 (0, pdata);
718 718
719 return ret; 719 return ret;
720} 720}
721 721
722int 722int
723_gnutls_gen_openpgp_certificate_fpr (gnutls_session_t session, opaque ** data) 723_gnutls_gen_openpgp_certificate_fpr (mhd_gtls_session_t session, opaque ** data)
724{ 724{
725 int ret, packet_size; 725 int ret, packet_size;
726 size_t fpr_size; 726 size_t fpr_size;
@@ -731,7 +731,7 @@ _gnutls_gen_openpgp_certificate_fpr (gnutls_session_t session, opaque ** data)
731 731
732 /* find the appropriate certificate */ 732 /* find the appropriate certificate */
733 if ((ret = 733 if ((ret =
734 _gnutls_get_selected_cert (session, &apr_cert_list, 734 mhd_gtls_get_selected_cert (session, &apr_cert_list,
735 &apr_cert_list_length, &apr_pkey)) < 0) 735 &apr_cert_list_length, &apr_pkey)) < 0)
736 { 736 {
737 gnutls_assert (); 737 gnutls_assert ();
@@ -756,7 +756,7 @@ _gnutls_gen_openpgp_certificate_fpr (gnutls_session_t session, opaque ** data)
756 return GNUTLS_E_MEMORY_ERROR; 756 return GNUTLS_E_MEMORY_ERROR;
757 } 757 }
758 758
759 _gnutls_write_uint24 (packet_size - 3, pdata); 759 mhd_gtls_write_uint24 (packet_size - 3, pdata);
760 pdata += 3; 760 pdata += 3;
761 761
762 *pdata = PGP_KEY_FINGERPRINT; /* key fingerprint */ 762 *pdata = PGP_KEY_FINGERPRINT; /* key fingerprint */
@@ -787,12 +787,12 @@ _gnutls_gen_openpgp_certificate_fpr (gnutls_session_t session, opaque ** data)
787 787
788 788
789int 789int
790_gnutls_gen_cert_client_certificate (gnutls_session_t session, opaque ** data) 790mhd_gtls_gen_cert_client_certificate (mhd_gtls_session_t session, opaque ** data)
791{ 791{
792 switch (session->security_parameters.cert_type) 792 switch (session->security_parameters.cert_type)
793 { 793 {
794 case MHD_GNUTLS_CRT_OPENPGP: 794 case MHD_GNUTLS_CRT_OPENPGP:
795 if (_gnutls_openpgp_send_fingerprint (session) == 0) 795 if (mhd_gtls_openpgp_send_fingerprint (session) == 0)
796 return _gnutls_gen_openpgp_certificate (session, data); 796 return _gnutls_gen_openpgp_certificate (session, data);
797 else 797 else
798 return _gnutls_gen_openpgp_certificate_fpr (session, data); 798 return _gnutls_gen_openpgp_certificate_fpr (session, data);
@@ -807,7 +807,7 @@ _gnutls_gen_cert_client_certificate (gnutls_session_t session, opaque ** data)
807} 807}
808 808
809int 809int
810_gnutls_gen_cert_server_certificate (gnutls_session_t session, opaque ** data) 810mhd_gtls_gen_cert_server_certificate (mhd_gtls_session_t session, opaque ** data)
811{ 811{
812 switch (session->security_parameters.cert_type) 812 switch (session->security_parameters.cert_type)
813 { 813 {
@@ -824,23 +824,23 @@ _gnutls_gen_cert_server_certificate (gnutls_session_t session, opaque ** data)
824/* Process server certificate 824/* Process server certificate
825 */ 825 */
826 826
827#define CLEAR_CERTS for(x=0;x<peer_certificate_list_size;x++) _gnutls_gcert_deinit(&peer_certificate_list[x]) 827#define CLEAR_CERTS for(x=0;x<peer_certificate_list_size;x++) mhd_gtls_gcert_deinit(&peer_certificate_list[x])
828int 828int
829_gnutls_proc_x509_server_certificate (gnutls_session_t session, 829_gnutls_proc_x509_server_certificate (mhd_gtls_session_t session,
830 opaque * data, size_t data_size) 830 opaque * data, size_t data_size)
831{ 831{
832 int size, len, ret; 832 int size, len, ret;
833 opaque *p = data; 833 opaque *p = data;
834 cert_auth_info_t info; 834 cert_auth_info_t info;
835 gnutls_certificate_credentials_t cred; 835 mhd_gtls_cert_credentials_t cred;
836 ssize_t dsize = data_size; 836 ssize_t dsize = data_size;
837 int i, j, x; 837 int i, j, x;
838 gnutls_cert *peer_certificate_list; 838 gnutls_cert *peer_certificate_list;
839 int peer_certificate_list_size = 0; 839 int peer_certificate_list_size = 0;
840 gnutls_datum_t tmp; 840 gnutls_datum_t tmp;
841 841
842 cred = (gnutls_certificate_credentials_t) 842 cred = (mhd_gtls_cert_credentials_t)
843 _gnutls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL); 843 mhd_gtls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL);
844 if (cred == NULL) 844 if (cred == NULL)
845 { 845 {
846 gnutls_assert (); 846 gnutls_assert ();
@@ -849,14 +849,14 @@ _gnutls_proc_x509_server_certificate (gnutls_session_t session,
849 849
850 850
851 if ((ret = 851 if ((ret =
852 _gnutls_auth_info_set (session, MHD_GNUTLS_CRD_CERTIFICATE, 852 mhd_gtls_auth_info_set (session, MHD_GNUTLS_CRD_CERTIFICATE,
853 sizeof (cert_auth_info_st), 1)) < 0) 853 sizeof (cert_auth_info_st), 1)) < 0)
854 { 854 {
855 gnutls_assert (); 855 gnutls_assert ();
856 return ret; 856 return ret;
857 } 857 }
858 858
859 info = _gnutls_get_auth_info (session); 859 info = mhd_gtls_get_auth_info (session);
860 860
861 if (data == NULL || data_size == 0) 861 if (data == NULL || data_size == 0)
862 { 862 {
@@ -866,7 +866,7 @@ _gnutls_proc_x509_server_certificate (gnutls_session_t session,
866 } 866 }
867 867
868 DECR_LEN (dsize, 3); 868 DECR_LEN (dsize, 3);
869 size = _gnutls_read_uint24 (p); 869 size = mhd_gtls_read_uint24 (p);
870 p += 3; 870 p += 3;
871 871
872 /* some implementations send 0B 00 00 06 00 00 03 00 00 00 872 /* some implementations send 0B 00 00 06 00 00 03 00 00 00
@@ -883,7 +883,7 @@ _gnutls_proc_x509_server_certificate (gnutls_session_t session,
883 while (i > 0) 883 while (i > 0)
884 { 884 {
885 DECR_LEN (dsize, 3); 885 DECR_LEN (dsize, 3);
886 len = _gnutls_read_uint24 (p); 886 len = mhd_gtls_read_uint24 (p);
887 p += 3; 887 p += 3;
888 DECR_LEN (dsize, len); 888 DECR_LEN (dsize, len);
889 peer_certificate_list_size++; 889 peer_certificate_list_size++;
@@ -921,14 +921,14 @@ _gnutls_proc_x509_server_certificate (gnutls_session_t session,
921 921
922 for (j = 0; j < peer_certificate_list_size; j++) 922 for (j = 0; j < peer_certificate_list_size; j++)
923 { 923 {
924 len = _gnutls_read_uint24 (p); 924 len = mhd_gtls_read_uint24 (p);
925 p += 3; 925 p += 3;
926 926
927 tmp.size = len; 927 tmp.size = len;
928 tmp.data = p; 928 tmp.data = p;
929 929
930 if ((ret = 930 if ((ret =
931 _gnutls_x509_raw_cert_to_gcert (&peer_certificate_list 931 mhd_gtls_x509_raw_cert_to_gcert (&peer_certificate_list
932 [j], &tmp, 932 [j], &tmp,
933 CERT_ONLY_EXTENSIONS)) < 0) 933 CERT_ONLY_EXTENSIONS)) < 0)
934 { 934 {
@@ -966,23 +966,23 @@ cleanup:
966 966
967} 967}
968 968
969#define CLEAR_CERTS for(x=0;x<peer_certificate_list_size;x++) _gnutls_gcert_deinit(&peer_certificate_list[x]) 969#define CLEAR_CERTS for(x=0;x<peer_certificate_list_size;x++) mhd_gtls_gcert_deinit(&peer_certificate_list[x])
970int 970int
971_gnutls_proc_openpgp_server_certificate (gnutls_session_t session, 971_gnutls_proc_openpgp_server_certificate (mhd_gtls_session_t session,
972 opaque * data, size_t data_size) 972 opaque * data, size_t data_size)
973{ 973{
974 int size, ret, len; 974 int size, ret, len;
975 opaque *p = data; 975 opaque *p = data;
976 cert_auth_info_t info; 976 cert_auth_info_t info;
977 gnutls_certificate_credentials_t cred; 977 mhd_gtls_cert_credentials_t cred;
978 ssize_t dsize = data_size; 978 ssize_t dsize = data_size;
979 int i, x; 979 int i, x;
980 gnutls_cert *peer_certificate_list = NULL; 980 gnutls_cert *peer_certificate_list = NULL;
981 int peer_certificate_list_size = 0; 981 int peer_certificate_list_size = 0;
982 gnutls_datum_t tmp, akey = { NULL, 0 }; 982 gnutls_datum_t tmp, akey = { NULL, 0 };
983 983
984 cred = (gnutls_certificate_credentials_t) 984 cred = (mhd_gtls_cert_credentials_t)
985 _gnutls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL); 985 mhd_gtls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL);
986 if (cred == NULL) 986 if (cred == NULL)
987 { 987 {
988 gnutls_assert (); 988 gnutls_assert ();
@@ -990,14 +990,14 @@ _gnutls_proc_openpgp_server_certificate (gnutls_session_t session,
990 } 990 }
991 991
992 if ((ret = 992 if ((ret =
993 _gnutls_auth_info_set (session, MHD_GNUTLS_CRD_CERTIFICATE, 993 mhd_gtls_auth_info_set (session, MHD_GNUTLS_CRD_CERTIFICATE,
994 sizeof (cert_auth_info_st), 1)) < 0) 994 sizeof (cert_auth_info_st), 1)) < 0)
995 { 995 {
996 gnutls_assert (); 996 gnutls_assert ();
997 return ret; 997 return ret;
998 } 998 }
999 999
1000 info = _gnutls_get_auth_info (session); 1000 info = mhd_gtls_get_auth_info (session);
1001 1001
1002 if (data == NULL || data_size == 0) 1002 if (data == NULL || data_size == 0)
1003 { 1003 {
@@ -1006,7 +1006,7 @@ _gnutls_proc_openpgp_server_certificate (gnutls_session_t session,
1006 } 1006 }
1007 1007
1008 DECR_LEN (dsize, 3); 1008 DECR_LEN (dsize, 3);
1009 size = _gnutls_read_uint24 (p); 1009 size = mhd_gtls_read_uint24 (p);
1010 p += 3; 1010 p += 3;
1011 1011
1012 if (size == 0) 1012 if (size == 0)
@@ -1060,7 +1060,7 @@ _gnutls_proc_openpgp_server_certificate (gnutls_session_t session,
1060 1060
1061 /* Read the actual certificate */ 1061 /* Read the actual certificate */
1062 DECR_LEN (dsize, 3); 1062 DECR_LEN (dsize, 3);
1063 len = _gnutls_read_uint24 (p); 1063 len = mhd_gtls_read_uint24 (p);
1064 p += 3; 1064 p += 3;
1065 1065
1066 if (len == 0) 1066 if (len == 0)
@@ -1147,7 +1147,7 @@ cleanup:
1147} 1147}
1148 1148
1149int 1149int
1150_gnutls_proc_cert_server_certificate (gnutls_session_t session, 1150mhd_gtls_proc_cert_server_certificate (mhd_gtls_session_t session,
1151 opaque * data, size_t data_size) 1151 opaque * data, size_t data_size)
1152{ 1152{
1153 switch (session->security_parameters.cert_type) 1153 switch (session->security_parameters.cert_type)
@@ -1185,21 +1185,21 @@ _gnutls_check_supported_sign_algo (CertificateSigType algo)
1185} 1185}
1186 1186
1187int 1187int
1188_gnutls_proc_cert_cert_req (gnutls_session_t session, opaque * data, 1188mhd_gtls_proc_cert_cert_req (mhd_gtls_session_t session, opaque * data,
1189 size_t data_size) 1189 size_t data_size)
1190{ 1190{
1191 int size, ret; 1191 int size, ret;
1192 opaque *p; 1192 opaque *p;
1193 gnutls_certificate_credentials_t cred; 1193 mhd_gtls_cert_credentials_t cred;
1194 cert_auth_info_t info; 1194 cert_auth_info_t info;
1195 ssize_t dsize; 1195 ssize_t dsize;
1196 int i, j; 1196 int i, j;
1197 gnutls_pk_algorithm_t pk_algos[MAX_SIGN_ALGOS]; 1197 gnutls_pk_algorithm_t pk_algos[MAX_SIGN_ALGOS];
1198 int pk_algos_length; 1198 int pk_algos_length;
1199 gnutls_protocol_t ver = gnutls_protocol_get_version (session); 1199 gnutls_protocol_t ver = MHD_gnutls_protocol_get_version (session);
1200 1200
1201 cred = (gnutls_certificate_credentials_t) 1201 cred = (mhd_gtls_cert_credentials_t)
1202 _gnutls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL); 1202 mhd_gtls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL);
1203 if (cred == NULL) 1203 if (cred == NULL)
1204 { 1204 {
1205 gnutls_assert (); 1205 gnutls_assert ();
@@ -1207,14 +1207,14 @@ _gnutls_proc_cert_cert_req (gnutls_session_t session, opaque * data,
1207 } 1207 }
1208 1208
1209 if ((ret = 1209 if ((ret =
1210 _gnutls_auth_info_set (session, MHD_GNUTLS_CRD_CERTIFICATE, 1210 mhd_gtls_auth_info_set (session, MHD_GNUTLS_CRD_CERTIFICATE,
1211 sizeof (cert_auth_info_st), 0)) < 0) 1211 sizeof (cert_auth_info_st), 0)) < 0)
1212 { 1212 {
1213 gnutls_assert (); 1213 gnutls_assert ();
1214 return ret; 1214 return ret;
1215 } 1215 }
1216 1216
1217 info = _gnutls_get_auth_info (session); 1217 info = mhd_gtls_get_auth_info (session);
1218 1218
1219 p = data; 1219 p = data;
1220 dsize = data_size; 1220 dsize = data_size;
@@ -1259,7 +1259,7 @@ _gnutls_proc_cert_cert_req (gnutls_session_t session, opaque * data,
1259 1259
1260 /* read the certificate authorities */ 1260 /* read the certificate authorities */
1261 DECR_LEN (dsize, 2); 1261 DECR_LEN (dsize, 2);
1262 size = _gnutls_read_uint16 (p); 1262 size = mhd_gtls_read_uint16 (p);
1263 p += 2; 1263 p += 2;
1264 1264
1265 if (session->security_parameters.cert_type == MHD_GNUTLS_CRT_OPENPGP 1265 if (session->security_parameters.cert_type == MHD_GNUTLS_CRT_OPENPGP
@@ -1290,7 +1290,7 @@ _gnutls_proc_cert_cert_req (gnutls_session_t session, opaque * data,
1290} 1290}
1291 1291
1292int 1292int
1293_gnutls_gen_cert_client_cert_vrfy (gnutls_session_t session, opaque ** data) 1293mhd_gtls_gen_cert_client_cert_vrfy (mhd_gtls_session_t session, opaque ** data)
1294{ 1294{
1295 int ret; 1295 int ret;
1296 gnutls_cert *apr_cert_list; 1296 gnutls_cert *apr_cert_list;
@@ -1302,7 +1302,7 @@ _gnutls_gen_cert_client_cert_vrfy (gnutls_session_t session, opaque ** data)
1302 1302
1303 /* find the appropriate certificate */ 1303 /* find the appropriate certificate */
1304 if ((ret = 1304 if ((ret =
1305 _gnutls_get_selected_cert (session, &apr_cert_list, 1305 mhd_gtls_get_selected_cert (session, &apr_cert_list,
1306 &apr_cert_list_length, &apr_pkey)) < 0) 1306 &apr_cert_list_length, &apr_pkey)) < 0)
1307 { 1307 {
1308 gnutls_assert (); 1308 gnutls_assert ();
@@ -1312,7 +1312,7 @@ _gnutls_gen_cert_client_cert_vrfy (gnutls_session_t session, opaque ** data)
1312 if (apr_cert_list_length > 0) 1312 if (apr_cert_list_length > 0)
1313 { 1313 {
1314 if ((ret = 1314 if ((ret =
1315 _gnutls_tls_sign_hdata (session, 1315 mhd_gtls_tls_sign_hdata (session,
1316 &apr_cert_list[0], 1316 &apr_cert_list[0],
1317 apr_pkey, &signature)) < 0) 1317 apr_pkey, &signature)) < 0)
1318 { 1318 {
@@ -1332,7 +1332,7 @@ _gnutls_gen_cert_client_cert_vrfy (gnutls_session_t session, opaque ** data)
1332 return GNUTLS_E_MEMORY_ERROR; 1332 return GNUTLS_E_MEMORY_ERROR;
1333 } 1333 }
1334 size = signature.size; 1334 size = signature.size;
1335 _gnutls_write_uint16 (size, *data); 1335 mhd_gtls_write_uint16 (size, *data);
1336 1336
1337 memcpy (&(*data)[2], signature.data, size); 1337 memcpy (&(*data)[2], signature.data, size);
1338 1338
@@ -1342,14 +1342,14 @@ _gnutls_gen_cert_client_cert_vrfy (gnutls_session_t session, opaque ** data)
1342} 1342}
1343 1343
1344int 1344int
1345_gnutls_proc_cert_client_cert_vrfy (gnutls_session_t session, 1345mhd_gtls_proc_cert_client_cert_vrfy (mhd_gtls_session_t session,
1346 opaque * data, size_t data_size) 1346 opaque * data, size_t data_size)
1347{ 1347{
1348 int size, ret; 1348 int size, ret;
1349 ssize_t dsize = data_size; 1349 ssize_t dsize = data_size;
1350 opaque *pdata = data; 1350 opaque *pdata = data;
1351 gnutls_datum_t sig; 1351 gnutls_datum_t sig;
1352 cert_auth_info_t info = _gnutls_get_auth_info (session); 1352 cert_auth_info_t info = mhd_gtls_get_auth_info (session);
1353 gnutls_cert peer_cert; 1353 gnutls_cert peer_cert;
1354 1354
1355 if (info == NULL || info->ncerts == 0) 1355 if (info == NULL || info->ncerts == 0)
@@ -1360,7 +1360,7 @@ _gnutls_proc_cert_client_cert_vrfy (gnutls_session_t session,
1360 } 1360 }
1361 1361
1362 DECR_LEN (dsize, 2); 1362 DECR_LEN (dsize, 2);
1363 size = _gnutls_read_uint16 (pdata); 1363 size = mhd_gtls_read_uint16 (pdata);
1364 pdata += 2; 1364 pdata += 2;
1365 1365
1366 DECR_LEN (dsize, size); 1366 DECR_LEN (dsize, size);
@@ -1368,7 +1368,7 @@ _gnutls_proc_cert_client_cert_vrfy (gnutls_session_t session,
1368 sig.data = pdata; 1368 sig.data = pdata;
1369 sig.size = size; 1369 sig.size = size;
1370 1370
1371 ret = _gnutls_raw_cert_to_gcert (&peer_cert, 1371 ret = mhd_gtls_raw_cert_to_gcert (&peer_cert,
1372 session->security_parameters.cert_type, 1372 session->security_parameters.cert_type,
1373 &info->raw_certificate_list[0], 1373 &info->raw_certificate_list[0],
1374 CERT_NO_COPY); 1374 CERT_NO_COPY);
@@ -1379,33 +1379,33 @@ _gnutls_proc_cert_client_cert_vrfy (gnutls_session_t session,
1379 return ret; 1379 return ret;
1380 } 1380 }
1381 1381
1382 if ((ret = _gnutls_verify_sig_hdata (session, &peer_cert, &sig)) < 0) 1382 if ((ret = mhd_gtls_verify_sig_hdata (session, &peer_cert, &sig)) < 0)
1383 { 1383 {
1384 gnutls_assert (); 1384 gnutls_assert ();
1385 _gnutls_gcert_deinit (&peer_cert); 1385 mhd_gtls_gcert_deinit (&peer_cert);
1386 return ret; 1386 return ret;
1387 } 1387 }
1388 _gnutls_gcert_deinit (&peer_cert); 1388 mhd_gtls_gcert_deinit (&peer_cert);
1389 1389
1390 return 0; 1390 return 0;
1391} 1391}
1392 1392
1393#define CERTTYPE_SIZE 3 1393#define CERTTYPE_SIZE 3
1394int 1394int
1395_gnutls_gen_cert_server_cert_req (gnutls_session_t session, opaque ** data) 1395mhd_gtls_gen_cert_server_cert_req (mhd_gtls_session_t session, opaque ** data)
1396{ 1396{
1397 gnutls_certificate_credentials_t cred; 1397 mhd_gtls_cert_credentials_t cred;
1398 int size; 1398 int size;
1399 opaque *pdata; 1399 opaque *pdata;
1400 gnutls_protocol_t ver = gnutls_protocol_get_version (session); 1400 gnutls_protocol_t ver = MHD_gnutls_protocol_get_version (session);
1401 1401
1402 /* Now we need to generate the RDN sequence. This is 1402 /* Now we need to generate the RDN sequence. This is
1403 * already in the CERTIFICATE_CRED structure, to improve 1403 * already in the CERTIFICATE_CRED structure, to improve
1404 * performance. 1404 * performance.
1405 */ 1405 */
1406 1406
1407 cred = (gnutls_certificate_credentials_t) 1407 cred = (mhd_gtls_cert_credentials_t)
1408 _gnutls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL); 1408 mhd_gtls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL);
1409 if (cred == NULL) 1409 if (cred == NULL)
1410 { 1410 {
1411 gnutls_assert (); 1411 gnutls_assert ();
@@ -1449,12 +1449,12 @@ _gnutls_gen_cert_server_cert_req (gnutls_session_t session, opaque ** data)
1449 if (session->security_parameters.cert_type == MHD_GNUTLS_CRT_X509 && 1449 if (session->security_parameters.cert_type == MHD_GNUTLS_CRT_X509 &&
1450 session->internals.ignore_rdn_sequence == 0) 1450 session->internals.ignore_rdn_sequence == 0)
1451 { 1451 {
1452 _gnutls_write_datum16 (pdata, cred->x509_rdn_sequence); 1452 mhd_gtls_write_datum16 (pdata, cred->x509_rdn_sequence);
1453 /* pdata += cred->x509_rdn_sequence.size + 2; */ 1453 /* pdata += cred->x509_rdn_sequence.size + 2; */
1454 } 1454 }
1455 else 1455 else
1456 { 1456 {
1457 _gnutls_write_uint16 (0, pdata); 1457 mhd_gtls_write_uint16 (0, pdata);
1458 /* pdata+=2; */ 1458 /* pdata+=2; */
1459 } 1459 }
1460 1460
@@ -1470,7 +1470,7 @@ _gnutls_gen_cert_server_cert_req (gnutls_session_t session, opaque ** data)
1470 * 1470 *
1471 */ 1471 */
1472int 1472int
1473_gnutls_get_selected_cert (gnutls_session_t session, 1473mhd_gtls_get_selected_cert (mhd_gtls_session_t session,
1474 gnutls_cert ** apr_cert_list, 1474 gnutls_cert ** apr_cert_list,
1475 int *apr_cert_list_length, 1475 int *apr_cert_list_length,
1476 gnutls_privkey ** apr_pkey) 1476 gnutls_privkey ** apr_pkey)
@@ -1530,7 +1530,7 @@ alloc_and_load_x509_certs (gnutls_x509_crt_t * certs, unsigned ncerts)
1530 1530
1531 for (i = 0; i < ncerts; i++) 1531 for (i = 0; i < ncerts; i++)
1532 { 1532 {
1533 ret = _gnutls_x509_crt_to_gcert (&local_certs[i], certs[i], 0); 1533 ret = mhd_gtls_x509_crt_to_gcert (&local_certs[i], certs[i], 0);
1534 if (ret < 0) 1534 if (ret < 0)
1535 break; 1535 break;
1536 } 1536 }
@@ -1540,7 +1540,7 @@ alloc_and_load_x509_certs (gnutls_x509_crt_t * certs, unsigned ncerts)
1540 gnutls_assert (); 1540 gnutls_assert ();
1541 for (j = 0; j < i; j++) 1541 for (j = 0; j < i; j++)
1542 { 1542 {
1543 _gnutls_gcert_deinit (&local_certs[j]); 1543 mhd_gtls_gcert_deinit (&local_certs[j]);
1544 } 1544 }
1545 gnutls_free (local_certs); 1545 gnutls_free (local_certs);
1546 return NULL; 1546 return NULL;
@@ -1613,7 +1613,7 @@ alloc_and_load_pgp_certs (gnutls_openpgp_crt_t cert)
1613 if (ret < 0) 1613 if (ret < 0)
1614 { 1614 {
1615 gnutls_assert (); 1615 gnutls_assert ();
1616 _gnutls_gcert_deinit (local_certs); 1616 mhd_gtls_gcert_deinit (local_certs);
1617 gnutls_free (local_certs); 1617 gnutls_free (local_certs);
1618 return NULL; 1618 return NULL;
1619 } 1619 }
@@ -1658,7 +1658,7 @@ alloc_and_load_pgp_key (const gnutls_openpgp_privkey_t key)
1658 1658
1659 1659
1660void 1660void
1661_gnutls_selected_certs_deinit (gnutls_session_t session) 1661mhd_gtls_selected_certs_deinit (mhd_gtls_session_t session)
1662{ 1662{
1663 if (session->internals.selected_need_free != 0) 1663 if (session->internals.selected_need_free != 0)
1664 { 1664 {
@@ -1666,13 +1666,13 @@ _gnutls_selected_certs_deinit (gnutls_session_t session)
1666 1666
1667 for (i = 0; i < session->internals.selected_cert_list_length; i++) 1667 for (i = 0; i < session->internals.selected_cert_list_length; i++)
1668 { 1668 {
1669 _gnutls_gcert_deinit (&session->internals.selected_cert_list[i]); 1669 mhd_gtls_gcert_deinit (&session->internals.selected_cert_list[i]);
1670 } 1670 }
1671 gnutls_free (session->internals.selected_cert_list); 1671 gnutls_free (session->internals.selected_cert_list);
1672 session->internals.selected_cert_list = NULL; 1672 session->internals.selected_cert_list = NULL;
1673 session->internals.selected_cert_list_length = 0; 1673 session->internals.selected_cert_list_length = 0;
1674 1674
1675 _gnutls_gkey_deinit (session->internals.selected_key); 1675 mhd_gtls_gkey_deinit (session->internals.selected_key);
1676 if (session->internals.selected_key) 1676 if (session->internals.selected_key)
1677 { 1677 {
1678 gnutls_free (session->internals.selected_key); 1678 gnutls_free (session->internals.selected_key);
@@ -1684,11 +1684,11 @@ _gnutls_selected_certs_deinit (gnutls_session_t session)
1684} 1684}
1685 1685
1686void 1686void
1687_gnutls_selected_certs_set (gnutls_session_t session, 1687mhd_gtls_selected_certs_set (mhd_gtls_session_t session,
1688 gnutls_cert * certs, int ncerts, 1688 gnutls_cert * certs, int ncerts,
1689 gnutls_privkey * key, int need_free) 1689 gnutls_privkey * key, int need_free)
1690{ 1690{
1691 _gnutls_selected_certs_deinit (session); 1691 mhd_gtls_selected_certs_deinit (session);
1692 1692
1693 session->internals.selected_cert_list = certs; 1693 session->internals.selected_cert_list = certs;
1694 session->internals.selected_cert_list_length = ncerts; 1694 session->internals.selected_cert_list_length = ncerts;
@@ -1709,15 +1709,15 @@ _gnutls_selected_certs_set (gnutls_session_t session,
1709 * 1709 *
1710 */ 1710 */
1711int 1711int
1712_gnutls_server_select_cert (gnutls_session_t session, 1712mhd_gtls_server_select_cert (mhd_gtls_session_t session,
1713 gnutls_pk_algorithm_t requested_algo) 1713 gnutls_pk_algorithm_t requested_algo)
1714{ 1714{
1715 unsigned i; 1715 unsigned i;
1716 int idx, ret; 1716 int idx, ret;
1717 gnutls_certificate_credentials_t cred; 1717 mhd_gtls_cert_credentials_t cred;
1718 1718
1719 cred = (gnutls_certificate_credentials_t) 1719 cred = (mhd_gtls_cert_credentials_t)
1720 _gnutls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL); 1720 mhd_gtls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL);
1721 if (cred == NULL) 1721 if (cred == NULL)
1722 { 1722 {
1723 gnutls_assert (); 1723 gnutls_assert ();
@@ -1759,7 +1759,7 @@ _gnutls_server_select_cert (gnutls_session_t session,
1759 */ 1759 */
1760 if (idx >= 0 && ret == 0) 1760 if (idx >= 0 && ret == 0)
1761 { 1761 {
1762 _gnutls_selected_certs_set (session, 1762 mhd_gtls_selected_certs_set (session,
1763 &cred->cert_list[idx][0], 1763 &cred->cert_list[idx][0],
1764 cred->cert_list_length[idx], 1764 cred->cert_list_length[idx],
1765 &cred->pkey[idx], 0); 1765 &cred->pkey[idx], 0);
@@ -1771,10 +1771,10 @@ _gnutls_server_select_cert (gnutls_session_t session,
1771 return ret; 1771 return ret;
1772} 1772}
1773 1773
1774/* Frees the rsa_info_st structure. 1774/* Frees the mhd_gtls_rsa_info_st structure.
1775 */ 1775 */
1776void 1776void
1777_gnutls_free_rsa_info (rsa_info_st * rsa) 1777mhd_gtls_free_rsa_info (rsa_info_st * rsa)
1778{ 1778{
1779 _gnutls_free_datum (&rsa->modulus); 1779 _gnutls_free_datum (&rsa->modulus);
1780 _gnutls_free_datum (&rsa->exponent); 1780 _gnutls_free_datum (&rsa->exponent);