aboutsummaryrefslogtreecommitdiff
path: root/src/lib/crypto/krb/verify_checksum.c
diff options
context:
space:
mode:
authorGreg Hudson <ghudson@mit.edu>2009-11-28 00:43:34 +0000
committerGreg Hudson <ghudson@mit.edu>2009-11-28 00:43:34 +0000
commit65577cf37ab5831e736dd5db8459c0927cd3e224 (patch)
tree49d60364bcfaa50cd849568b7313d92e1388d28c /src/lib/crypto/krb/verify_checksum.c
parent9fde1f049d4f2205a9cccdc82278d93e6eaad748 (diff)
downloadkrb5-65577cf37ab5831e736dd5db8459c0927cd3e224.zip
krb5-65577cf37ab5831e736dd5db8459c0927cd3e224.tar.gz
krb5-65577cf37ab5831e736dd5db8459c0927cd3e224.tar.bz2
Mark and reindent lib/crypto
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@23374 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/lib/crypto/krb/verify_checksum.c')
-rw-r--r--src/lib/crypto/krb/verify_checksum.c51
1 files changed, 26 insertions, 25 deletions
diff --git a/src/lib/crypto/krb/verify_checksum.c b/src/lib/crypto/krb/verify_checksum.c
index a4869eb..3664abd 100644
--- a/src/lib/crypto/krb/verify_checksum.c
+++ b/src/lib/crypto/krb/verify_checksum.c
@@ -1,3 +1,4 @@
+/* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */
/*
* Copyright (C) 1998 by the FundsXpress, INC.
*
@@ -29,8 +30,8 @@
krb5_error_code KRB5_CALLCONV
krb5_k_verify_checksum(krb5_context context, krb5_key key,
- krb5_keyusage usage, const krb5_data *data,
- const krb5_checksum *cksum, krb5_boolean *valid)
+ krb5_keyusage usage, const krb5_data *data,
+ const krb5_checksum *cksum, krb5_boolean *valid)
{
unsigned int i;
const struct krb5_cksumtypes *ctp;
@@ -41,11 +42,11 @@ krb5_k_verify_checksum(krb5_context context, krb5_key key,
krb5_checksum computed;
for (i=0; i<krb5int_cksumtypes_length; i++) {
- if (krb5int_cksumtypes_list[i].ctype == cksum->checksum_type)
- break;
+ if (krb5int_cksumtypes_list[i].ctype == cksum->checksum_type)
+ break;
}
if (i == krb5int_cksumtypes_length)
- return KRB5_BAD_ENCTYPE;
+ return KRB5_BAD_ENCTYPE;
ctp = &krb5int_cksumtypes_list[i];
indata.length = cksum->length;
@@ -53,36 +54,36 @@ krb5_k_verify_checksum(krb5_context context, krb5_key key,
/* If there's actually a verify function, call it. */
if (ctp->keyhash) {
- keyhash = ctp->keyhash;
+ keyhash = ctp->keyhash;
- if (keyhash->verify == NULL && keyhash->verify_iov != NULL) {
- krb5_crypto_iov iov[1];
+ if (keyhash->verify == NULL && keyhash->verify_iov != NULL) {
+ krb5_crypto_iov iov[1];
- iov[0].flags = KRB5_CRYPTO_TYPE_DATA;
- iov[0].data.data = data->data;
- iov[0].data.length = data->length;
+ iov[0].flags = KRB5_CRYPTO_TYPE_DATA;
+ iov[0].data.data = data->data;
+ iov[0].data.length = data->length;
- return (*keyhash->verify_iov)(key, usage, 0, iov, 1, &indata,
- valid);
- } else if (keyhash->verify != NULL) {
- return (*keyhash->verify)(key, usage, 0, data, &indata, valid);
- }
+ return (*keyhash->verify_iov)(key, usage, 0, iov, 1, &indata,
+ valid);
+ } else if (keyhash->verify != NULL) {
+ return (*keyhash->verify)(key, usage, 0, data, &indata, valid);
+ }
}
/* Otherwise, make the checksum again, and compare. */
ret = krb5_c_checksum_length(context, cksum->checksum_type, &hashsize);
if (ret)
- return ret;
+ return ret;
if (cksum->length != hashsize)
- return KRB5_BAD_MSIZE;
+ return KRB5_BAD_MSIZE;
computed.length = hashsize;
ret = krb5_k_make_checksum(context, cksum->checksum_type, key, usage,
- data, &computed);
+ data, &computed);
if (ret)
- return ret;
+ return ret;
*valid = (memcmp(computed.contents, cksum->contents, hashsize) == 0);
@@ -92,16 +93,16 @@ krb5_k_verify_checksum(krb5_context context, krb5_key key,
krb5_error_code KRB5_CALLCONV
krb5_c_verify_checksum(krb5_context context, const krb5_keyblock *keyblock,
- krb5_keyusage usage, const krb5_data *data,
- const krb5_checksum *cksum, krb5_boolean *valid)
+ krb5_keyusage usage, const krb5_data *data,
+ const krb5_checksum *cksum, krb5_boolean *valid)
{
krb5_key key = NULL;
krb5_error_code ret;
if (keyblock != NULL) {
- ret = krb5_k_create_key(context, keyblock, &key);
- if (ret != 0)
- return ret;
+ ret = krb5_k_create_key(context, keyblock, &key);
+ if (ret != 0)
+ return ret;
}
ret = krb5_k_verify_checksum(context, key, usage, data, cksum, valid);
krb5_k_free_key(context, key);