svn rev #23106: trunk/src/lib/krb5/asn.1/
ghudson@MIT.EDU
ghudson at MIT.EDU
Fri Oct 30 23:52:01 EDT 2009
http://src.mit.edu/fisheye/changelog/krb5/?cs=23106
Commit By: ghudson
Log Message:
In lib/krb5/asn.1, ensure that function definition headers have
function names at the beginnings of lines.
Changed Files:
U trunk/src/lib/krb5/asn.1/asn1_decode.c
U trunk/src/lib/krb5/asn.1/asn1_encode.c
U trunk/src/lib/krb5/asn.1/asn1_get.c
U trunk/src/lib/krb5/asn.1/asn1_k_decode.c
U trunk/src/lib/krb5/asn.1/asn1_k_encode.c
U trunk/src/lib/krb5/asn.1/asn1_make.c
U trunk/src/lib/krb5/asn.1/asn1_misc.c
U trunk/src/lib/krb5/asn.1/krb5_encode.c
U trunk/src/lib/krb5/asn.1/ldap_key_seq.c
Modified: trunk/src/lib/krb5/asn.1/asn1_decode.c
===================================================================
--- trunk/src/lib/krb5/asn.1/asn1_decode.c 2009-10-31 03:50:54 UTC (rev 23105)
+++ trunk/src/lib/krb5/asn.1/asn1_decode.c 2009-10-31 03:52:01 UTC (rev 23106)
@@ -57,7 +57,8 @@
#define cleanup()\
return 0
-asn1_error_code asn1_decode_integer(asn1buf *buf, long int *val)
+asn1_error_code
+asn1_decode_integer(asn1buf *buf, long int *val)
{
setup();
asn1_octet o;
@@ -82,7 +83,8 @@
cleanup();
}
-asn1_error_code asn1_decode_unsigned_integer(asn1buf *buf, long unsigned int *val)
+asn1_error_code
+asn1_decode_unsigned_integer(asn1buf *buf, long unsigned int *val)
{
setup();
asn1_octet o;
@@ -116,7 +118,8 @@
* normal integer conversions do, i.e., would preserve bits on a
* two's-complement architecture.
*/
-asn1_error_code asn1_decode_maybe_unsigned(asn1buf *buf, unsigned long *val)
+asn1_error_code
+asn1_decode_maybe_unsigned(asn1buf *buf, unsigned long *val)
{
setup();
asn1_octet o;
@@ -150,7 +153,8 @@
cleanup();
}
-asn1_error_code asn1_decode_oid(asn1buf *buf, unsigned int *retlen, asn1_octet **val)
+asn1_error_code
+asn1_decode_oid(asn1buf *buf, unsigned int *retlen, asn1_octet **val)
{
setup();
tag(ASN1_OBJECTIDENTIFIER);
@@ -160,7 +164,8 @@
cleanup();
}
-asn1_error_code asn1_decode_octetstring(asn1buf *buf, unsigned int *retlen, asn1_octet **val)
+asn1_error_code
+asn1_decode_octetstring(asn1buf *buf, unsigned int *retlen, asn1_octet **val)
{
setup();
tag(ASN1_OCTETSTRING);
@@ -170,7 +175,8 @@
cleanup();
}
-asn1_error_code asn1_decode_charstring(asn1buf *buf, unsigned int *retlen, char **val)
+asn1_error_code
+asn1_decode_charstring(asn1buf *buf, unsigned int *retlen, char **val)
{
setup();
tag(ASN1_OCTETSTRING);
@@ -181,7 +187,8 @@
}
-asn1_error_code asn1_decode_generalstring(asn1buf *buf, unsigned int *retlen, char **val)
+asn1_error_code
+asn1_decode_generalstring(asn1buf *buf, unsigned int *retlen, char **val)
{
setup();
tag(ASN1_GENERALSTRING);
@@ -192,7 +199,8 @@
}
-asn1_error_code asn1_decode_null(asn1buf *buf)
+asn1_error_code
+asn1_decode_null(asn1buf *buf)
{
setup();
tag(ASN1_NULL);
@@ -200,7 +208,8 @@
cleanup();
}
-asn1_error_code asn1_decode_printablestring(asn1buf *buf, int *retlen, char **val)
+asn1_error_code
+asn1_decode_printablestring(asn1buf *buf, int *retlen, char **val)
{
setup();
tag(ASN1_PRINTABLESTRING);
@@ -210,7 +219,8 @@
cleanup();
}
-asn1_error_code asn1_decode_ia5string(asn1buf *buf, int *retlen, char **val)
+asn1_error_code
+asn1_decode_ia5string(asn1buf *buf, int *retlen, char **val)
{
setup();
tag(ASN1_IA5STRING);
@@ -220,7 +230,8 @@
cleanup();
}
-asn1_error_code asn1_decode_generaltime(asn1buf *buf, time_t *val)
+asn1_error_code
+asn1_decode_generaltime(asn1buf *buf, time_t *val)
{
setup();
char *s;
@@ -261,7 +272,8 @@
cleanup();
}
-asn1_error_code asn1_decode_boolean(asn1buf *buf, unsigned *val)
+asn1_error_code
+asn1_decode_boolean(asn1buf *buf, unsigned *val)
{
setup();
asn1_octet bval;
Modified: trunk/src/lib/krb5/asn.1/asn1_encode.c
===================================================================
--- trunk/src/lib/krb5/asn.1/asn1_encode.c 2009-10-31 03:50:54 UTC (rev 23105)
+++ trunk/src/lib/krb5/asn.1/asn1_encode.c 2009-10-31 03:52:01 UTC (rev 23106)
@@ -30,8 +30,8 @@
#include "asn1_encode.h"
#include "asn1_make.h"
-asn1_error_code asn1_encode_boolean(asn1buf *buf, asn1_intmax val,
- unsigned int *retlen)
+asn1_error_code
+asn1_encode_boolean(asn1buf *buf, asn1_intmax val, unsigned int *retlen)
{
asn1_error_code retval;
unsigned int length = 0;
@@ -52,9 +52,9 @@
return 0;
}
-static asn1_error_code asn1_encode_integer_internal(asn1buf *buf,
- asn1_intmax val,
- unsigned int *retlen)
+static asn1_error_code
+asn1_encode_integer_internal(asn1buf *buf, asn1_intmax val,
+ unsigned int *retlen)
{
asn1_error_code retval;
unsigned int length = 0;
@@ -85,8 +85,8 @@
return 0;
}
-asn1_error_code asn1_encode_integer(asn1buf * buf, asn1_intmax val,
- unsigned int *retlen)
+asn1_error_code
+asn1_encode_integer(asn1buf * buf, asn1_intmax val, unsigned int *retlen)
{
asn1_error_code retval;
unsigned int length = 0;
@@ -124,8 +124,9 @@
}
#endif
-asn1_error_code asn1_encode_unsigned_integer(asn1buf *buf, asn1_uintmax val,
- unsigned int *retlen)
+asn1_error_code
+asn1_encode_unsigned_integer(asn1buf *buf, asn1_uintmax val,
+ unsigned int *retlen)
{
asn1_error_code retval;
unsigned int length = 0;
@@ -175,17 +176,17 @@
return 0;
}
-asn1_error_code asn1_encode_oid(asn1buf *buf, unsigned int len,
- const asn1_octet *val,
- unsigned int *retlen)
+asn1_error_code
+asn1_encode_oid(asn1buf *buf, unsigned int len, const asn1_octet *val,
+ unsigned int *retlen)
{
return encode_bytestring_with_tag(buf, len, val, ASN1_OBJECTIDENTIFIER,
retlen);
}
-asn1_error_code asn1_encode_octetstring(asn1buf *buf, unsigned int len,
- const void *val,
- unsigned int *retlen)
+asn1_error_code
+asn1_encode_octetstring(asn1buf *buf, unsigned int len, const void *val,
+ unsigned int *retlen)
{
return encode_bytestring_with_tag(buf, len, val, ASN1_OCTETSTRING,
retlen);
@@ -220,8 +221,8 @@
}
#endif
-asn1_error_code asn1_encode_generaltime(asn1buf *buf, time_t val,
- unsigned int *retlen)
+asn1_error_code
+asn1_encode_generaltime(asn1buf *buf, time_t val, unsigned int *retlen)
{
struct tm *gtime, gtimebuf;
char s[16], *sp;
@@ -273,17 +274,17 @@
retlen);
}
-asn1_error_code asn1_encode_generalstring(asn1buf *buf, unsigned int len,
- const void *val,
- unsigned int *retlen)
+asn1_error_code
+asn1_encode_generalstring(asn1buf *buf, unsigned int len, const void *val,
+ unsigned int *retlen)
{
return encode_bytestring_with_tag(buf, len, val, ASN1_GENERALSTRING,
retlen);
}
-asn1_error_code asn1_encode_bitstring(asn1buf *buf, unsigned int len,
- const void *val,
- unsigned int *retlen)
+asn1_error_code
+asn1_encode_bitstring(asn1buf *buf, unsigned int len, const void *val,
+ unsigned int *retlen)
{
asn1_error_code retval;
unsigned int length;
@@ -299,8 +300,9 @@
return 0;
}
-asn1_error_code asn1_encode_opaque(asn1buf *buf, unsigned int len,
- const void *val, unsigned int *retlen)
+asn1_error_code
+asn1_encode_opaque(asn1buf *buf, unsigned int len, const void *val,
+ unsigned int *retlen)
{
asn1_error_code retval;
Modified: trunk/src/lib/krb5/asn.1/asn1_get.c
===================================================================
--- trunk/src/lib/krb5/asn.1/asn1_get.c 2009-10-31 03:50:54 UTC (rev 23105)
+++ trunk/src/lib/krb5/asn.1/asn1_get.c 2009-10-31 03:52:01 UTC (rev 23106)
@@ -100,7 +100,8 @@
return 0;
}
-asn1_error_code asn1_get_sequence(asn1buf *buf, unsigned int *retlen, int *indef)
+asn1_error_code
+asn1_get_sequence(asn1buf *buf, unsigned int *retlen, int *indef)
{
taginfo t;
asn1_error_code retval;
Modified: trunk/src/lib/krb5/asn.1/asn1_k_decode.c
===================================================================
--- trunk/src/lib/krb5/asn.1/asn1_k_decode.c 2009-10-31 03:50:54 UTC (rev 23105)
+++ trunk/src/lib/krb5/asn.1/asn1_k_decode.c 2009-10-31 03:52:01 UTC (rev 23106)
@@ -391,7 +391,8 @@
return 0;
/* scalars */
-asn1_error_code asn1_decode_kerberos_time(asn1buf *buf, krb5_timestamp *val)
+asn1_error_code
+asn1_decode_kerberos_time(asn1buf *buf, krb5_timestamp *val)
{
time_t t;
asn1_error_code retval;
@@ -435,7 +436,8 @@
unsigned_integer_convert(asn1_decode_ui_2,krb5_ui_2)
unsigned_integer_convert(asn1_decode_ui_4,krb5_ui_4)
-asn1_error_code asn1_decode_seqnum(asn1buf *buf, krb5_ui_4 *val)
+asn1_error_code
+asn1_decode_seqnum(asn1buf *buf, krb5_ui_4 *val)
{
asn1_error_code retval;
unsigned long n;
@@ -446,7 +448,8 @@
return 0;
}
-asn1_error_code asn1_decode_msgtype(asn1buf *buf, krb5_msgtype *val)
+asn1_error_code
+asn1_decode_msgtype(asn1buf *buf, krb5_msgtype *val)
{
asn1_error_code retval;
unsigned long n;
@@ -460,14 +463,16 @@
/* structures */
-asn1_error_code asn1_decode_realm(asn1buf *buf, krb5_principal *val)
+asn1_error_code
+asn1_decode_realm(asn1buf *buf, krb5_principal *val)
{
return asn1_decode_generalstring(buf,
&((*val)->realm.length),
&((*val)->realm.data));
}
-asn1_error_code asn1_decode_principal_name(asn1buf *buf, krb5_principal *val)
+asn1_error_code
+asn1_decode_principal_name(asn1buf *buf, krb5_principal *val)
{
int size = 0, i;
krb5_data *array = NULL, *new_array;
@@ -509,7 +514,8 @@
return retval;
}
-asn1_error_code asn1_decode_checksum(asn1buf *buf, krb5_checksum *val)
+asn1_error_code
+asn1_decode_checksum(asn1buf *buf, krb5_checksum *val)
{
setup();
val->contents = NULL;
@@ -525,12 +531,14 @@
return retval;
}
-asn1_error_code asn1_decode_checksum_ptr(asn1buf *buf, krb5_checksum **valptr)
+asn1_error_code
+asn1_decode_checksum_ptr(asn1buf *buf, krb5_checksum **valptr)
{
decode_ptr(krb5_checksum *, asn1_decode_checksum);
}
-asn1_error_code asn1_decode_encryption_key(asn1buf *buf, krb5_keyblock *val)
+asn1_error_code
+asn1_decode_encryption_key(asn1buf *buf, krb5_keyblock *val)
{
setup();
val->contents = NULL;
@@ -552,7 +560,8 @@
decode_ptr(krb5_keyblock *, asn1_decode_encryption_key);
}
-asn1_error_code asn1_decode_encrypted_data(asn1buf *buf, krb5_enc_data *val)
+asn1_error_code
+asn1_decode_encrypted_data(asn1buf *buf, krb5_enc_data *val)
{
setup();
val->ciphertext.data = NULL;
@@ -570,7 +579,8 @@
return retval;
}
-asn1_error_code asn1_decode_krb5_flags(asn1buf *buf, krb5_flags *val)
+asn1_error_code
+asn1_decode_krb5_flags(asn1buf *buf, krb5_flags *val)
{
asn1_error_code retval;
asn1_octet unused, o;
@@ -611,16 +621,20 @@
return 0;
}
-asn1_error_code asn1_decode_ticket_flags(asn1buf *buf, krb5_flags *val)
+asn1_error_code
+asn1_decode_ticket_flags(asn1buf *buf, krb5_flags *val)
{ return asn1_decode_krb5_flags(buf,val); }
-asn1_error_code asn1_decode_ap_options(asn1buf *buf, krb5_flags *val)
+asn1_error_code
+asn1_decode_ap_options(asn1buf *buf, krb5_flags *val)
{ return asn1_decode_krb5_flags(buf,val); }
-asn1_error_code asn1_decode_kdc_options(asn1buf *buf, krb5_flags *val)
+asn1_error_code
+asn1_decode_kdc_options(asn1buf *buf, krb5_flags *val)
{ return asn1_decode_krb5_flags(buf,val); }
-asn1_error_code asn1_decode_transited_encoding(asn1buf *buf, krb5_transited *val)
+asn1_error_code
+asn1_decode_transited_encoding(asn1buf *buf, krb5_transited *val)
{
setup();
val->tr_contents.data = NULL;
@@ -636,7 +650,8 @@
return retval;
}
-asn1_error_code asn1_decode_enc_kdc_rep_part(asn1buf *buf, krb5_enc_kdc_rep_part *val)
+asn1_error_code
+asn1_decode_enc_kdc_rep_part(asn1buf *buf, krb5_enc_kdc_rep_part *val)
{
setup();
val->session = NULL;
@@ -676,7 +691,8 @@
return retval;
}
-asn1_error_code asn1_decode_ticket(asn1buf *buf, krb5_ticket *val)
+asn1_error_code
+asn1_decode_ticket(asn1buf *buf, krb5_ticket *val)
{
setup();
unsigned int applen;
@@ -714,7 +730,8 @@
decode_ptr(krb5_ticket *, asn1_decode_ticket);
}
-asn1_error_code asn1_decode_kdc_req(asn1buf *buf, krb5_kdc_req *val)
+asn1_error_code
+asn1_decode_kdc_req(asn1buf *buf, krb5_kdc_req *val)
{
setup();
val->padata = NULL;
@@ -735,7 +752,8 @@
return retval;
}
-asn1_error_code asn1_decode_kdc_req_body(asn1buf *buf, krb5_kdc_req *val)
+asn1_error_code
+asn1_decode_kdc_req_body(asn1buf *buf, krb5_kdc_req *val)
{
setup();
val->client = NULL;
@@ -805,7 +823,8 @@
return retval;
}
-asn1_error_code asn1_decode_krb_safe_body(asn1buf *buf, krb5_safe *val)
+asn1_error_code
+asn1_decode_krb_safe_body(asn1buf *buf, krb5_safe *val)
{
setup();
val->user_data.data = NULL;
@@ -834,7 +853,8 @@
return retval;
}
-asn1_error_code asn1_decode_host_address(asn1buf *buf, krb5_address *val)
+asn1_error_code
+asn1_decode_host_address(asn1buf *buf, krb5_address *val)
{
setup();
val->contents = NULL;
@@ -857,7 +877,8 @@
decode_ptr(krb5_address *, asn1_decode_host_address);
}
-asn1_error_code asn1_decode_kdc_rep(asn1buf *buf, krb5_kdc_rep *val)
+asn1_error_code
+asn1_decode_kdc_rep(asn1buf *buf, krb5_kdc_rep *val)
{
setup();
val->padata = NULL;
@@ -954,19 +975,22 @@
free(array);\
return retval
-static void free_authdata_elt(void *dummy, krb5_authdata *val)
+static void
+free_authdata_elt(void *dummy, krb5_authdata *val)
{
free(val->contents);
free(val);
}
-asn1_error_code asn1_decode_authorization_data(asn1buf *buf, krb5_authdata ***val)
+asn1_error_code
+asn1_decode_authorization_data(asn1buf *buf, krb5_authdata ***val)
{
decode_array_body(krb5_authdata,asn1_decode_authdata_elt_ptr,
free_authdata_elt);
}
-asn1_error_code asn1_decode_authdata_elt(asn1buf *buf, krb5_authdata *val)
+asn1_error_code
+asn1_decode_authdata_elt(asn1buf *buf, krb5_authdata *val)
{
setup();
val->contents = NULL;
@@ -989,18 +1013,21 @@
decode_ptr(krb5_authdata *, asn1_decode_authdata_elt);
}
-asn1_error_code asn1_decode_host_addresses(asn1buf *buf, krb5_address ***val)
+asn1_error_code
+asn1_decode_host_addresses(asn1buf *buf, krb5_address ***val)
{
decode_array_body(krb5_address,asn1_decode_host_address_ptr,
krb5_free_address);
}
-asn1_error_code asn1_decode_sequence_of_ticket(asn1buf *buf, krb5_ticket ***val)
+asn1_error_code
+asn1_decode_sequence_of_ticket(asn1buf *buf, krb5_ticket ***val)
{
decode_array_body(krb5_ticket,asn1_decode_ticket_ptr,krb5_free_ticket);
}
-static void free_cred_info(void *dummy, krb5_cred_info *val)
+static void
+free_cred_info(void *dummy, krb5_cred_info *val)
{
krb5_free_keyblock(NULL, val->session);
krb5_free_principal(NULL, val->client);
@@ -1009,13 +1036,15 @@
free(val);
}
-asn1_error_code asn1_decode_sequence_of_krb_cred_info(asn1buf *buf, krb5_cred_info ***val)
+asn1_error_code
+asn1_decode_sequence_of_krb_cred_info(asn1buf *buf, krb5_cred_info ***val)
{
decode_array_body(krb5_cred_info,asn1_decode_krb_cred_info_ptr,
free_cred_info);
}
-asn1_error_code asn1_decode_krb_cred_info(asn1buf *buf, krb5_cred_info *val)
+asn1_error_code
+asn1_decode_krb_cred_info(asn1buf *buf, krb5_cred_info *val)
{
setup();
val->session = NULL;
@@ -1060,18 +1089,21 @@
decode_ptr(krb5_cred_info *, asn1_decode_krb_cred_info);
}
-static void free_pa_data(void *dummy, krb5_pa_data *val)
+static void
+free_pa_data(void *dummy, krb5_pa_data *val)
{
free(val->contents);
free(val);
}
-asn1_error_code asn1_decode_sequence_of_pa_data(asn1buf *buf, krb5_pa_data ***val)
+asn1_error_code
+asn1_decode_sequence_of_pa_data(asn1buf *buf, krb5_pa_data ***val)
{
decode_array_body(krb5_pa_data,asn1_decode_pa_data_ptr,free_pa_data);
}
-asn1_error_code asn1_decode_pa_data(asn1buf *buf, krb5_pa_data *val)
+asn1_error_code
+asn1_decode_pa_data(asn1buf *buf, krb5_pa_data *val)
{
setup();
val->contents = NULL;
@@ -1088,23 +1120,27 @@
return retval;
}
-asn1_error_code asn1_decode_pa_data_ptr(asn1buf *buf, krb5_pa_data **valptr)
+asn1_error_code
+asn1_decode_pa_data_ptr(asn1buf *buf, krb5_pa_data **valptr)
{
decode_ptr(krb5_pa_data *, asn1_decode_pa_data);
}
-static void free_last_req_entry(void *dummy, krb5_last_req_entry *val)
+static void
+free_last_req_entry(void *dummy, krb5_last_req_entry *val)
{
free(val);
}
-asn1_error_code asn1_decode_last_req(asn1buf *buf, krb5_last_req_entry ***val)
+asn1_error_code
+asn1_decode_last_req(asn1buf *buf, krb5_last_req_entry ***val)
{
decode_array_body(krb5_last_req_entry,asn1_decode_last_req_entry_ptr,
free_last_req_entry);
}
-asn1_error_code asn1_decode_last_req_entry(asn1buf *buf, krb5_last_req_entry *val)
+asn1_error_code
+asn1_decode_last_req_entry(asn1buf *buf, krb5_last_req_entry *val)
{
setup();
{ begin_structure();
@@ -1129,7 +1165,8 @@
decode_ptr(krb5_last_req_entry *, asn1_decode_last_req_entry);
}
-asn1_error_code asn1_decode_sequence_of_enctype(asn1buf *buf, int *num, krb5_enctype **val)
+asn1_error_code
+asn1_decode_sequence_of_enctype(asn1buf *buf, int *num, krb5_enctype **val)
{
int size = 0;
krb5_enctype *array = NULL, *new_array;
@@ -1154,20 +1191,23 @@
return retval;
}
-asn1_error_code asn1_decode_sequence_of_checksum(asn1buf *buf, krb5_checksum ***val)
+asn1_error_code
+asn1_decode_sequence_of_checksum(asn1buf *buf, krb5_checksum ***val)
{
decode_array_body(krb5_checksum, asn1_decode_checksum_ptr,
krb5_free_checksum);
}
-static void free_etype_info_entry(void *dummy, krb5_etype_info_entry *val)
+static void
+free_etype_info_entry(void *dummy, krb5_etype_info_entry *val)
{
krb5_free_data_contents(NULL, &val->s2kparams);
free(val->salt);
free(val);
}
-static asn1_error_code asn1_decode_etype_info2_entry(asn1buf *buf, krb5_etype_info_entry *val )
+static asn1_error_code
+asn1_decode_etype_info2_entry(asn1buf *buf, krb5_etype_info_entry *val)
{
char *salt = NULL;
krb5_octet *params = NULL;
@@ -1208,7 +1248,8 @@
decode_ptr(krb5_etype_info_entry *, asn1_decode_etype_info2_entry);
}
-static asn1_error_code asn1_decode_etype_info2_entry_1_3(asn1buf *buf, krb5_etype_info_entry *val )
+static asn1_error_code
+asn1_decode_etype_info2_entry_1_3(asn1buf *buf, krb5_etype_info_entry *val)
{
krb5_octet *params = NULL;
@@ -1247,7 +1288,8 @@
decode_ptr(krb5_etype_info_entry *, asn1_decode_etype_info2_entry_1_3);
}
-static asn1_error_code asn1_decode_etype_info_entry(asn1buf *buf, krb5_etype_info_entry *val )
+static asn1_error_code
+asn1_decode_etype_info_entry(asn1buf *buf, krb5_etype_info_entry *val)
{
setup();
val->salt = NULL;
@@ -1276,21 +1318,24 @@
decode_ptr(krb5_etype_info_entry *, asn1_decode_etype_info_entry);
}
-asn1_error_code asn1_decode_etype_info(asn1buf *buf, krb5_etype_info_entry ***val )
+asn1_error_code
+asn1_decode_etype_info(asn1buf *buf, krb5_etype_info_entry ***val )
{
decode_array_body(krb5_etype_info_entry,asn1_decode_etype_info_entry_ptr,
free_etype_info_entry);
}
-static asn1_error_code decode_etype_info2_13(asn1buf *buf, krb5_etype_info_entry ***val)
+static asn1_error_code
+decode_etype_info2_13(asn1buf *buf, krb5_etype_info_entry ***val)
{
decode_array_body(krb5_etype_info_entry,
asn1_decode_etype_info2_entry_1_3_ptr,
free_etype_info_entry);
}
-asn1_error_code asn1_decode_etype_info2(asn1buf *buf, krb5_etype_info_entry ***val ,
- krb5_boolean v1_3_behavior)
+asn1_error_code
+asn1_decode_etype_info2(asn1buf *buf, krb5_etype_info_entry ***val ,
+ krb5_boolean v1_3_behavior)
{
if (v1_3_behavior)
return decode_etype_info2_13(buf, val);
@@ -1301,7 +1346,8 @@
}
}
-asn1_error_code asn1_decode_passwdsequence(asn1buf *buf, passwd_phrase_element *val)
+asn1_error_code
+asn1_decode_passwdsequence(asn1buf *buf, passwd_phrase_element *val)
{
setup();
val->passwd = NULL;
@@ -1333,14 +1379,19 @@
decode_ptr(passwd_phrase_element *, asn1_decode_passwdsequence);
}
-asn1_error_code asn1_decode_sequence_of_passwdsequence(asn1buf *buf, passwd_phrase_element ***val)
+asn1_error_code
+asn1_decode_sequence_of_passwdsequence(asn1buf *buf,
+ passwd_phrase_element ***val)
{
decode_array_body(passwd_phrase_element,asn1_decode_passwdsequence_ptr,
krb5_free_passwd_phrase_element);
}
-asn1_error_code asn1_decode_sam_flags(asn1buf *buf, krb5_flags *val)
-{ return asn1_decode_krb5_flags(buf,val); }
+asn1_error_code
+asn1_decode_sam_flags(asn1buf *buf, krb5_flags *val)
+{
+ return asn1_decode_krb5_flags(buf,val);
+}
#define opt_string(val,n,fn) opt_lenfield((val).length,(val).data,n,fn)
#define opt_cksum(var,tagexpect,decoder)\
@@ -1348,7 +1399,8 @@
get_field_body(var,decoder); }\
else var.length = 0
-asn1_error_code asn1_decode_sam_challenge(asn1buf *buf, krb5_sam_challenge *val)
+asn1_error_code
+asn1_decode_sam_challenge(asn1buf *buf, krb5_sam_challenge *val)
{
setup();
val->sam_type_name.data = NULL;
@@ -1376,7 +1428,8 @@
krb5_free_sam_challenge_contents(NULL, val);
return retval;
}
-asn1_error_code asn1_decode_sam_challenge_2(asn1buf *buf, krb5_sam_challenge_2 *val)
+asn1_error_code
+asn1_decode_sam_challenge_2(asn1buf *buf, krb5_sam_challenge_2 *val)
{
krb5_checksum **cksump;
setup();
@@ -1414,7 +1467,8 @@
}
return retval;
}
-asn1_error_code asn1_decode_sam_challenge_2_body(asn1buf *buf, krb5_sam_challenge_2_body *val)
+asn1_error_code
+asn1_decode_sam_challenge_2_body(asn1buf *buf, krb5_sam_challenge_2_body *val)
{
setup();
val->sam_type_name.data = NULL;
@@ -1442,7 +1496,8 @@
krb5_free_sam_challenge_2_body_contents(NULL, val);
return retval;
}
-asn1_error_code asn1_decode_enc_sam_key(asn1buf *buf, krb5_sam_key *val)
+asn1_error_code
+asn1_decode_enc_sam_key(asn1buf *buf, krb5_sam_key *val)
{
setup();
val->sam_key.contents = NULL;
@@ -1457,7 +1512,8 @@
return retval;
}
-asn1_error_code asn1_decode_enc_sam_response_enc(asn1buf *buf, krb5_enc_sam_response_enc *val)
+asn1_error_code
+asn1_decode_enc_sam_response_enc(asn1buf *buf, krb5_enc_sam_response_enc *val)
{
setup();
val->sam_sad.data = NULL;
@@ -1475,7 +1531,8 @@
return retval;
}
-asn1_error_code asn1_decode_enc_sam_response_enc_2(asn1buf *buf, krb5_enc_sam_response_enc_2 *val)
+asn1_error_code
+asn1_decode_enc_sam_response_enc_2(asn1buf *buf, krb5_enc_sam_response_enc_2 *val)
{
setup();
val->sam_sad.data = NULL;
@@ -1502,7 +1559,8 @@
fld.ciphertext.length = 0;\
}
-asn1_error_code asn1_decode_sam_response(asn1buf *buf, krb5_sam_response *val)
+asn1_error_code
+asn1_decode_sam_response(asn1buf *buf, krb5_sam_response *val)
{
setup();
val->sam_track_id.data = NULL;
@@ -1525,7 +1583,8 @@
return retval;
}
-asn1_error_code asn1_decode_sam_response_2(asn1buf *buf, krb5_sam_response_2 *val)
+asn1_error_code
+asn1_decode_sam_response_2(asn1buf *buf, krb5_sam_response_2 *val)
{
setup();
val->sam_track_id.data = NULL;
@@ -1546,7 +1605,9 @@
}
-asn1_error_code asn1_decode_predicted_sam_response(asn1buf *buf, krb5_predicted_sam_response *val)
+asn1_error_code
+asn1_decode_predicted_sam_response(asn1buf *buf,
+ krb5_predicted_sam_response *val)
{
setup();
val->sam_key.contents = NULL;
@@ -1570,7 +1631,9 @@
return retval;
}
-asn1_error_code asn1_decode_setpw_req(asn1buf *buf, krb5_data *newpasswd, krb5_principal *principal)
+asn1_error_code
+asn1_decode_setpw_req(asn1buf *buf, krb5_data *newpasswd,
+ krb5_principal *principal)
{
krb5_principal princ = NULL;
setup();
@@ -1594,7 +1657,8 @@
return retval;
}
-asn1_error_code asn1_decode_pa_for_user(asn1buf *buf, krb5_pa_for_user *val)
+asn1_error_code
+asn1_decode_pa_for_user(asn1buf *buf, krb5_pa_for_user *val)
{
setup();
val->user = NULL;
@@ -1617,7 +1681,8 @@
return retval;
}
-asn1_error_code asn1_decode_s4u_userid(asn1buf *buf, krb5_s4u_userid *val)
+asn1_error_code
+asn1_decode_s4u_userid(asn1buf *buf, krb5_s4u_userid *val)
{
setup();
val->nonce = 0;
@@ -1642,7 +1707,8 @@
return retval;
}
-asn1_error_code asn1_decode_pa_s4u_x509_user(asn1buf *buf, krb5_pa_s4u_x509_user *val)
+asn1_error_code
+asn1_decode_pa_s4u_x509_user(asn1buf *buf, krb5_pa_s4u_x509_user *val)
{
setup();
val->cksum.contents = NULL;
@@ -1658,7 +1724,8 @@
return retval;
}
-asn1_error_code asn1_decode_pa_pac_req(asn1buf *buf, krb5_pa_pac_req *val)
+asn1_error_code
+asn1_decode_pa_pac_req(asn1buf *buf, krb5_pa_pac_req *val)
{
setup();
{ begin_structure();
@@ -1670,8 +1737,8 @@
return retval;
}
-asn1_error_code asn1_decode_fast_armor
-(asn1buf *buf, krb5_fast_armor *val)
+asn1_error_code
+asn1_decode_fast_armor(asn1buf *buf, krb5_fast_armor *val)
{
setup();
val->armor_value.data = NULL;
@@ -1687,14 +1754,14 @@
return retval;
}
-asn1_error_code asn1_decode_fast_armor_ptr
-(asn1buf *buf, krb5_fast_armor **valptr)
+asn1_error_code
+asn1_decode_fast_armor_ptr(asn1buf *buf, krb5_fast_armor **valptr)
{
decode_ptr(krb5_fast_armor *, asn1_decode_fast_armor);
}
-asn1_error_code asn1_decode_fast_finished
-(asn1buf *buf, krb5_fast_finished *val)
+asn1_error_code
+asn1_decode_fast_finished(asn1buf *buf, krb5_fast_finished *val)
{
setup();
val->client = NULL;
@@ -1714,14 +1781,14 @@
krb5_free_checksum_contents( NULL, &val->ticket_checksum);
return retval;
}
-asn1_error_code asn1_decode_fast_finished_ptr
-(asn1buf *buf, krb5_fast_finished **valptr)
+asn1_error_code
+asn1_decode_fast_finished_ptr(asn1buf *buf, krb5_fast_finished **valptr)
{
decode_ptr( krb5_fast_finished *, asn1_decode_fast_finished);
}
-asn1_error_code asn1_decode_ad_kdcissued
-(asn1buf *buf, krb5_ad_kdcissued *val)
+asn1_error_code
+asn1_decode_ad_kdcissued(asn1buf *buf, krb5_ad_kdcissued *val)
{
setup();
val->ad_checksum.contents = NULL;
@@ -1748,7 +1815,10 @@
#ifndef DISABLE_PKINIT
/* PKINIT */
-asn1_error_code asn1_decode_external_principal_identifier(asn1buf *buf, krb5_external_principal_identifier *val)
+asn1_error_code
+asn1_decode_external_principal_identifier(
+ asn1buf *buf,
+ krb5_external_principal_identifier *val)
{
setup();
val->subjectName.data = NULL;
@@ -1772,10 +1842,9 @@
return retval;
}
-asn1_error_code
-asn1_decode_external_principal_identifier_ptr
- (asn1buf *buf,
- krb5_external_principal_identifier **valptr)
+asn1_error_code asn1_decode_external_principal_identifier_ptr(
+ asn1buf *buf,
+ krb5_external_principal_identifier **valptr)
{
decode_ptr(krb5_external_principal_identifier *,
asn1_decode_external_principal_identifier);
@@ -1791,14 +1860,18 @@
free(val);
}
-asn1_error_code asn1_decode_sequence_of_external_principal_identifier(asn1buf *buf, krb5_external_principal_identifier ***val)
+asn1_error_code
+asn1_decode_sequence_of_external_principal_identifier(
+ asn1buf *buf,
+ krb5_external_principal_identifier ***val)
{
decode_array_body(krb5_external_principal_identifier,
asn1_decode_external_principal_identifier_ptr,
free_external_principal_identifier);
}
-asn1_error_code asn1_decode_pa_pk_as_req(asn1buf *buf, krb5_pa_pk_as_req *val)
+asn1_error_code
+asn1_decode_pa_pk_as_req(asn1buf *buf, krb5_pa_pk_as_req *val)
{
setup();
val->signedAuthPack.data = NULL;
@@ -1823,7 +1896,8 @@
}
#if 0 /* XXX This needs to be tested!!! XXX */
-asn1_error_code asn1_decode_trusted_ca(asn1buf *buf, krb5_trusted_ca *val)
+asn1_error_code
+asn1_decode_trusted_ca(asn1buf *buf, krb5_trusted_ca *val)
{
setup();
val->choice = choice_trusted_cas_UNKNOWN;
@@ -1881,7 +1955,8 @@
return retval;
}
#else
-asn1_error_code asn1_decode_trusted_ca(asn1buf *buf, krb5_trusted_ca *val)
+asn1_error_code
+asn1_decode_trusted_ca(asn1buf *buf, krb5_trusted_ca *val)
{
setup();
val->choice = choice_trusted_cas_UNKNOWN;
@@ -1919,7 +1994,8 @@
decode_ptr(krb5_trusted_ca *, asn1_decode_trusted_ca);
}
-static void free_trusted_ca(void *dummy, krb5_trusted_ca *val)
+static void
+free_trusted_ca(void *dummy, krb5_trusted_ca *val)
{
if (val->choice == choice_trusted_cas_caName)
free(val->u.caName.data);
@@ -1928,13 +2004,15 @@
free(val);
}
-asn1_error_code asn1_decode_sequence_of_trusted_ca(asn1buf *buf, krb5_trusted_ca ***val)
+asn1_error_code
+asn1_decode_sequence_of_trusted_ca(asn1buf *buf, krb5_trusted_ca ***val)
{
decode_array_body(krb5_trusted_ca, asn1_decode_trusted_ca_ptr,
free_trusted_ca);
}
-asn1_error_code asn1_decode_pa_pk_as_req_draft9(asn1buf *buf, krb5_pa_pk_as_req_draft9 *val)
+asn1_error_code
+asn1_decode_pa_pk_as_req_draft9(asn1buf *buf, krb5_pa_pk_as_req_draft9 *val)
{
int i;
setup();
@@ -1966,7 +2044,8 @@
return retval;
}
-asn1_error_code asn1_decode_dh_rep_info(asn1buf *buf, krb5_dh_rep_info *val)
+asn1_error_code
+asn1_decode_dh_rep_info(asn1buf *buf, krb5_dh_rep_info *val)
{
setup();
val->dhSignedData.data = NULL;
@@ -1986,7 +2065,8 @@
return retval;
}
-asn1_error_code asn1_decode_pk_authenticator(asn1buf *buf, krb5_pk_authenticator *val)
+asn1_error_code
+asn1_decode_pk_authenticator(asn1buf *buf, krb5_pk_authenticator *val)
{
setup();
val->paChecksum.contents = NULL;
@@ -2003,7 +2083,9 @@
return retval;
}
-asn1_error_code asn1_decode_pk_authenticator_draft9(asn1buf *buf, krb5_pk_authenticator_draft9 *val)
+asn1_error_code
+asn1_decode_pk_authenticator_draft9(asn1buf *buf,
+ krb5_pk_authenticator_draft9 *val)
{
setup();
val->kdcName = NULL;
@@ -2023,8 +2105,9 @@
return retval;
}
-asn1_error_code asn1_decode_algorithm_identifier(asn1buf *buf, krb5_algorithm_identifier *val) {
-
+asn1_error_code
+asn1_decode_algorithm_identifier(asn1buf *buf, krb5_algorithm_identifier *val)
+{
setup();
val->algorithm.data = NULL;
val->parameters.data = NULL;
@@ -2078,7 +2161,8 @@
decode_ptr(krb5_algorithm_identifier *, asn1_decode_algorithm_identifier);
}
-asn1_error_code asn1_decode_subject_pk_info(asn1buf *buf, krb5_subject_pk_info *val)
+asn1_error_code
+asn1_decode_subject_pk_info(asn1buf *buf, krb5_subject_pk_info *val)
{
asn1_octet unused;
setup();
@@ -2136,14 +2220,17 @@
free(val);
}
-asn1_error_code asn1_decode_sequence_of_algorithm_identifier(asn1buf *buf, krb5_algorithm_identifier ***val)
+asn1_error_code
+asn1_decode_sequence_of_algorithm_identifier(asn1buf *buf,
+ krb5_algorithm_identifier ***val)
{
decode_array_body(krb5_algorithm_identifier,
asn1_decode_algorithm_identifier_ptr,
free_algorithm_identifier);
}
-asn1_error_code asn1_decode_kdc_dh_key_info (asn1buf *buf, krb5_kdc_dh_key_info *val)
+asn1_error_code
+asn1_decode_kdc_dh_key_info(asn1buf *buf, krb5_kdc_dh_key_info *val)
{
setup();
val->subjectPublicKey.data = NULL;
@@ -2163,7 +2250,8 @@
return retval;
}
-asn1_error_code asn1_decode_reply_key_pack (asn1buf *buf, krb5_reply_key_pack *val)
+asn1_error_code
+asn1_decode_reply_key_pack (asn1buf *buf, krb5_reply_key_pack *val)
{
setup();
val->replyKey.contents = NULL;
@@ -2182,7 +2270,9 @@
return retval;
}
-asn1_error_code asn1_decode_reply_key_pack_draft9 (asn1buf *buf, krb5_reply_key_pack_draft9 *val)
+asn1_error_code
+asn1_decode_reply_key_pack_draft9 (asn1buf *buf,
+ krb5_reply_key_pack_draft9 *val)
{
setup();
val->replyKey.contents = NULL;
@@ -2198,8 +2288,8 @@
return retval;
}
-
-asn1_error_code asn1_decode_krb5_principal_name (asn1buf *buf, krb5_principal *val)
+asn1_error_code
+asn1_decode_krb5_principal_name (asn1buf *buf, krb5_principal *val)
{
int i;
setup();
@@ -2223,7 +2313,8 @@
return retval;
}
-asn1_error_code asn1_decode_auth_pack(asn1buf *buf, krb5_auth_pack *val)
+asn1_error_code
+asn1_decode_auth_pack(asn1buf *buf, krb5_auth_pack *val)
{
int i;
setup();
@@ -2286,7 +2377,8 @@
return retval;
}
-asn1_error_code asn1_decode_auth_pack_draft9(asn1buf *buf, krb5_auth_pack_draft9 *val)
+asn1_error_code
+asn1_decode_auth_pack_draft9(asn1buf *buf, krb5_auth_pack_draft9 *val)
{
setup();
val->pkAuthenticator.kdcName = NULL;
@@ -2328,7 +2420,8 @@
return retval;
}
-asn1_error_code asn1_decode_pa_pk_as_rep(asn1buf *buf, krb5_pa_pk_as_rep *val)
+asn1_error_code
+asn1_decode_pa_pk_as_rep(asn1buf *buf, krb5_pa_pk_as_rep *val)
{
setup();
val->choice = choice_pa_pk_as_rep_UNKNOWN;
@@ -2360,7 +2453,8 @@
return retval;
}
-asn1_error_code asn1_decode_pa_pk_as_rep_draft9(asn1buf *buf, krb5_pa_pk_as_rep_draft9 *val)
+asn1_error_code
+asn1_decode_pa_pk_as_rep_draft9(asn1buf *buf, krb5_pa_pk_as_rep_draft9 *val)
{
setup();
val->choice = choice_pa_pk_as_rep_draft9_UNKNOWN;
@@ -2398,13 +2492,15 @@
free(val);
}
-asn1_error_code asn1_decode_sequence_of_typed_data(asn1buf *buf, krb5_typed_data ***val)
+asn1_error_code
+asn1_decode_sequence_of_typed_data(asn1buf *buf, krb5_typed_data ***val)
{
decode_array_body(krb5_typed_data,asn1_decode_typed_data_ptr,
free_typed_data);
}
-asn1_error_code asn1_decode_typed_data(asn1buf *buf, krb5_typed_data *val)
+asn1_error_code
+asn1_decode_typed_data(asn1buf *buf, krb5_typed_data *val)
{
setup();
val->data = NULL;
Modified: trunk/src/lib/krb5/asn.1/asn1_k_encode.c
===================================================================
--- trunk/src/lib/krb5/asn.1/asn1_k_encode.c 2009-10-31 03:50:54 UTC (rev 23105)
+++ trunk/src/lib/krb5/asn.1/asn1_k_encode.c 2009-10-31 03:52:01 UTC (rev 23106)
@@ -250,7 +250,8 @@
/* encrypted-pa-data[12] SEQUENCE OF PA-DATA OPTIONAL */
FIELDOF_OPT(krb5_enc_kdc_rep_part, ptr_seqof_pa_data, enc_padata, 12, 12),
};
-static unsigned int optional_enc_kdc_rep_part(const void *p)
+static unsigned int
+optional_enc_kdc_rep_part(const void *p)
{
const krb5_enc_kdc_rep_part *val = p;
unsigned int optional = 0;
@@ -293,7 +294,8 @@
FIELDOF_OPT(struct kdc_req_hack, encrypted_data, v.authorization_data, 10, 10),
FIELDOF_OPT(struct kdc_req_hack, ptr_seqof_ticket, v.second_ticket, 11, 11),
};
-static unsigned int optional_kdc_req_hack(const void *p)
+static unsigned int
+optional_kdc_req_hack(const void *p)
{
const struct kdc_req_hack *val2 = p;
const krb5_kdc_req *val = &val2->v;
@@ -356,7 +358,8 @@
FIELDOF_NORM(krb5_safe, address_ptr, s_address, 4),
FIELDOF_OPT(krb5_safe, address_ptr, r_address, 5, 5),
};
-static unsigned int optional_krb_safe_body(const void *p)
+static unsigned int
+optional_krb_safe_body(const void *p)
{
const krb5_safe *val = p;
unsigned int optional = 0;
@@ -388,7 +391,8 @@
FIELDOF_OPT(krb5_cred_info, principal, server, 9, 9),
FIELDOF_OPT(krb5_cred_info, ptr_seqof_host_addresses, caddrs, 10, 10),
};
-static unsigned int optional_krb_cred_info(const void *p)
+static unsigned int
+optional_krb_cred_info(const void *p)
{
const krb5_cred_info *val = p;
unsigned int optional = 0;
@@ -495,7 +499,8 @@
FIELDOF_OPT(krb5_sam_challenge, int32, sam_nonce, 8, 8),
FIELDOF_OPT(krb5_sam_challenge, checksum, sam_cksum, 9, 9),
};
-static unsigned int optional_sam_challenge(const void *p)
+static unsigned int
+optional_sam_challenge(const void *p)
{
const krb5_sam_challenge *val = p;
unsigned int optional = 0;
@@ -564,7 +569,8 @@
FIELDOF_NORM(krb5_sam_challenge_2_body, int32, sam_nonce, 8),
FIELDOF_NORM(krb5_sam_challenge_2_body, int32, sam_etype, 9),
};
-static unsigned int optional_sam_challenge_2_body(const void *p)
+static unsigned int
+optional_sam_challenge_2_body(const void *p)
{
const krb5_sam_challenge_2_body *val = p;
unsigned int optional = 0;
@@ -593,7 +599,8 @@
FIELDOF_NORM(krb5_enc_sam_response_enc, int32, sam_usec, 2),
FIELDOF_OPT(krb5_enc_sam_response_enc, ostring_data, sam_sad, 3, 3),
};
-static unsigned int optional_enc_sam_response_enc(const void *p)
+static unsigned int
+optional_enc_sam_response_enc(const void *p)
{
const krb5_enc_sam_response_enc *val = p;
unsigned int optional = 0;
@@ -609,7 +616,8 @@
FIELDOF_NORM(krb5_enc_sam_response_enc_2, int32, sam_nonce, 0),
FIELDOF_OPT(krb5_enc_sam_response_enc_2, ostring_data, sam_sad, 1, 1),
};
-static unsigned int optional_enc_sam_response_enc_2(const void *p)
+static unsigned int
+optional_enc_sam_response_enc_2(const void *p)
{
const krb5_enc_sam_response_enc_2 *val = p;
unsigned int optional = 0;
@@ -630,7 +638,8 @@
FIELDOF_OPT(krb5_sam_response, int32, sam_nonce, 5, 5),
FIELDOF_OPT(krb5_sam_response, kerberos_time, sam_patimestamp, 6, 6),
};
-static unsigned int optional_sam_response(const void *p)
+static unsigned int
+optional_sam_response(const void *p)
{
const krb5_sam_response *val = p;
unsigned int optional = 0;
@@ -655,7 +664,8 @@
FIELDOF_NORM(krb5_sam_response_2, encrypted_data, sam_enc_nonce_or_sad, 3),
FIELDOF_NORM(krb5_sam_response_2, int32, sam_nonce, 4),
};
-static unsigned int optional_sam_response_2(const void *p)
+static unsigned int
+optional_sam_response_2(const void *p)
{
const krb5_sam_response_2 *val = p;
unsigned int optional = 0;
@@ -676,7 +686,8 @@
FIELDOF_NORM(krb5_predicted_sam_response, principal, client, 5),
FIELDOF_OPT(krb5_predicted_sam_response, ostring_data, msd, 6, 6),
};
-static unsigned int optional_predicted_sam_response(const void *p)
+static unsigned int
+optional_predicted_sam_response(const void *p)
{
const krb5_predicted_sam_response *val = p;
unsigned int optional = 0;
@@ -710,7 +721,8 @@
/* authorization-data[8] AuthorizationData OPTIONAL */
FIELDOF_OPT(krb5_authenticator, auth_data_ptr, authorization_data, 8, 8),
};
-static unsigned int optional_krb5_authenticator(const void *p)
+static unsigned int
+optional_krb5_authenticator(const void *p)
{
const krb5_authenticator *val = p;
unsigned int optional = 0;
@@ -758,7 +770,8 @@
/* authorization-data[10] AuthorizationData OPTIONAL */
FIELDOF_OPT(krb5_enc_tkt_part, auth_data_ptr, authorization_data, 10, 10),
};
-static unsigned int optional_enc_tkt_part(const void *p)
+static unsigned int
+optional_enc_tkt_part(const void *p)
{
const krb5_enc_tkt_part *val = p;
unsigned int optional = 0;
@@ -792,7 +805,8 @@
FIELDOF_NORM(krb5_kdc_rep, ticket_ptr, ticket, 5),
FIELDOF_NORM(krb5_kdc_rep, encrypted_data, enc_part, 6),
};
-static unsigned int optional_as_rep(const void *p)
+static unsigned int
+optional_as_rep(const void *p)
{
const krb5_kdc_rep *val = p;
unsigned int optional = 0;
@@ -817,7 +831,8 @@
FIELDOF_NORM(krb5_kdc_rep, ticket_ptr, ticket, 5),
FIELDOF_NORM(krb5_kdc_rep, encrypted_data, enc_part, 6),
};
-static unsigned int optional_tgs_rep(const void *p)
+static unsigned int
+optional_tgs_rep(const void *p)
{
const krb5_kdc_rep *val = p;
unsigned int optional = 0;
@@ -869,7 +884,8 @@
/* seq-number[3] INTEGER OPTIONAL */
FIELDOF_OPT(krb5_ap_rep_enc_part, uint, seq_number, 3, 3),
};
-static unsigned int optional_ap_rep_enc_part(const void *p)
+static unsigned int
+optional_ap_rep_enc_part(const void *p)
{
const krb5_ap_rep_enc_part *val = p;
unsigned int optional = 0;
@@ -892,7 +908,8 @@
FIELDOF_OPT(krb5_kdc_req, ptr_seqof_pa_data, padata, 3, 3),
FIELDOF_ENCODEAS(krb5_kdc_req, kdc_req_body, 4),
};
-static unsigned int optional_as_req(const void *p)
+static unsigned int
+optional_as_req(const void *p)
{
const krb5_kdc_req *val = p;
unsigned int optional = 0;
@@ -912,7 +929,8 @@
FIELDOF_OPT(krb5_kdc_req, ptr_seqof_pa_data, padata, 3, 3),
FIELDOF_ENCODEAS(krb5_kdc_req, kdc_req_body, 4),
};
-static unsigned int optional_tgs_req(const void *p)
+static unsigned int
+optional_tgs_req(const void *p)
{
const krb5_kdc_req *val = p;
unsigned int optional = 0;
@@ -965,7 +983,8 @@
FIELDOF_NORM(krb5_priv_enc_part, address_ptr, s_address, 4),
FIELDOF_OPT(krb5_priv_enc_part, address_ptr, r_address, 5, 5),
};
-static unsigned int optional_priv_enc_part(const void *p)
+static unsigned int
+optional_priv_enc_part(const void *p)
{
const krb5_priv_enc_part *val = p;
unsigned int optional = 0;
@@ -1014,7 +1033,8 @@
/* r-address[5] HostAddress OPTIONAL */
FIELDOF_OPT(krb5_cred_enc_part, address_ptr, r_address, 5, 5),
};
-static unsigned int optional_enc_cred_part(const void *p)
+static unsigned int
+optional_enc_cred_part(const void *p)
{
const krb5_cred_enc_part *val = p;
unsigned int optional = 0;
@@ -1068,7 +1088,8 @@
/* e-data[12] OCTET STRING OPTIONAL */
FIELDOF_OPT(krb5_error, ostring_data, e_data, 12, 12),
};
-static unsigned int optional_error(const void *p)
+static unsigned int
+optional_error(const void *p)
{
const krb5_error *val = p;
unsigned int optional = 0;
@@ -1270,7 +1291,8 @@
FIELDOF_NORM(krb5_fast_response, int32, nonce, 3),
};
-static unsigned int fast_response_optional (const void *p)
+static unsigned int
+fast_response_optional (const void *p)
{
unsigned int optional = 0;
const krb5_fast_response *val = p;
@@ -1297,7 +1319,8 @@
FIELDOF_NORM(krb5_ad_kdcissued, auth_data_ptr, elements, 3),
};
-static unsigned int ad_kdcissued_optional(const void *p)
+static unsigned int
+ad_kdcissued_optional(const void *p)
{
unsigned int optional = 0;
const krb5_ad_kdcissued *val = p;
@@ -1506,7 +1529,9 @@
}
/* Now the real PKINIT encoder functions. */
-asn1_error_code asn1_encode_pk_authenticator(asn1buf *buf, const krb5_pk_authenticator *val, unsigned int *retlen)
+asn1_error_code
+asn1_encode_pk_authenticator(asn1buf *buf, const krb5_pk_authenticator *val,
+ unsigned int *retlen)
{
asn1_setup();
asn1_addlenfield(val->paChecksum.length, val->paChecksum.contents, 3, asn1_encode_octetstring);
@@ -1518,7 +1543,10 @@
asn1_cleanup();
}
-asn1_error_code asn1_encode_pk_authenticator_draft9(asn1buf *buf, const krb5_pk_authenticator_draft9 *val, unsigned int *retlen)
+asn1_error_code
+asn1_encode_pk_authenticator_draft9(asn1buf *buf,
+ const krb5_pk_authenticator_draft9 *val,
+ unsigned int *retlen)
{
asn1_setup();
@@ -1533,7 +1561,10 @@
}
-asn1_error_code asn1_encode_algorithm_identifier(asn1buf *buf, const krb5_algorithm_identifier *val, unsigned int *retlen)
+asn1_error_code
+asn1_encode_algorithm_identifier(asn1buf *buf,
+ const krb5_algorithm_identifier *val,
+ unsigned int *retlen)
{
asn1_setup();
@@ -1560,7 +1591,9 @@
asn1_cleanup();
}
-asn1_error_code asn1_encode_subject_pk_info(asn1buf *buf, const krb5_subject_pk_info *val, unsigned int *retlen)
+asn1_error_code
+asn1_encode_subject_pk_info(asn1buf *buf, const krb5_subject_pk_info *val,
+ unsigned int *retlen)
{
asn1_setup();
@@ -1600,7 +1633,10 @@
asn1_cleanup();
}
-asn1_error_code asn1_encode_sequence_of_algorithm_identifier(asn1buf *buf, const krb5_algorithm_identifier **val, unsigned int *retlen)
+asn1_error_code
+asn1_encode_sequence_of_algorithm_identifier(
+ asn1buf *buf, const krb5_algorithm_identifier **val,
+ unsigned int *retlen)
{
asn1_setup();
int i;
@@ -1619,7 +1655,9 @@
asn1_cleanup();
}
-asn1_error_code asn1_encode_auth_pack(asn1buf *buf, const krb5_auth_pack *val, unsigned int *retlen)
+asn1_error_code
+asn1_encode_auth_pack(asn1buf *buf, const krb5_auth_pack *val,
+ unsigned int *retlen)
{
asn1_setup();
@@ -1635,7 +1673,9 @@
asn1_cleanup();
}
-asn1_error_code asn1_encode_auth_pack_draft9(asn1buf *buf, const krb5_auth_pack_draft9 *val, unsigned int *retlen)
+asn1_error_code
+asn1_encode_auth_pack_draft9(asn1buf *buf, const krb5_auth_pack_draft9 *val,
+ unsigned int *retlen)
{
asn1_setup();
@@ -1647,7 +1687,10 @@
asn1_cleanup();
}
-asn1_error_code asn1_encode_external_principal_identifier(asn1buf *buf, const krb5_external_principal_identifier *val, unsigned int *retlen)
+asn1_error_code
+asn1_encode_external_principal_identifier(
+ asn1buf *buf, const krb5_external_principal_identifier *val,
+ unsigned int *retlen)
{
asn1_setup();
@@ -1668,7 +1711,11 @@
asn1_cleanup();
}
-asn1_error_code asn1_encode_sequence_of_external_principal_identifier(asn1buf *buf, const krb5_external_principal_identifier **val, unsigned int *retlen)
+asn1_error_code
+asn1_encode_sequence_of_external_principal_identifier(
+ asn1buf *buf,
+ const krb5_external_principal_identifier **val,
+ unsigned int *retlen)
{
asn1_setup();
int i;
@@ -1687,7 +1734,9 @@
asn1_cleanup();
}
-asn1_error_code asn1_encode_pa_pk_as_req(asn1buf *buf, const krb5_pa_pk_as_req *val, unsigned int *retlen)
+asn1_error_code
+asn1_encode_pa_pk_as_req(asn1buf *buf, const krb5_pa_pk_as_req *val,
+ unsigned int *retlen)
{
asn1_setup();
@@ -1703,7 +1752,9 @@
asn1_cleanup();
}
-asn1_error_code asn1_encode_trusted_ca(asn1buf *buf, const krb5_trusted_ca *val, unsigned int *retlen)
+asn1_error_code
+asn1_encode_trusted_ca(asn1buf *buf, const krb5_trusted_ca *val,
+ unsigned int *retlen)
{
asn1_setup();
@@ -1724,7 +1775,9 @@
asn1_cleanup();
}
-asn1_error_code asn1_encode_sequence_of_trusted_ca(asn1buf *buf, const krb5_trusted_ca **val, unsigned int *retlen)
+asn1_error_code
+asn1_encode_sequence_of_trusted_ca(asn1buf *buf, const krb5_trusted_ca **val,
+ unsigned int *retlen)
{
asn1_setup();
int i;
@@ -1742,7 +1795,10 @@
asn1_cleanup();
}
-asn1_error_code asn1_encode_pa_pk_as_req_draft9(asn1buf *buf, const krb5_pa_pk_as_req_draft9 *val, unsigned int *retlen)
+asn1_error_code
+asn1_encode_pa_pk_as_req_draft9(asn1buf *buf,
+ const krb5_pa_pk_as_req_draft9 *val,
+ unsigned int *retlen)
{
asn1_setup();
@@ -1761,7 +1817,9 @@
asn1_cleanup();
}
-asn1_error_code asn1_encode_dh_rep_info(asn1buf *buf, const krb5_dh_rep_info *val, unsigned int *retlen)
+asn1_error_code
+asn1_encode_dh_rep_info(asn1buf *buf, const krb5_dh_rep_info *val,
+ unsigned int *retlen)
{
asn1_setup();
@@ -1774,7 +1832,9 @@
asn1_cleanup();
}
-asn1_error_code asn1_encode_kdc_dh_key_info(asn1buf *buf, const krb5_kdc_dh_key_info *val, unsigned int *retlen)
+asn1_error_code
+asn1_encode_kdc_dh_key_info(asn1buf *buf, const krb5_kdc_dh_key_info *val,
+ unsigned int *retlen)
{
asn1_setup();
@@ -1798,7 +1858,9 @@
asn1_cleanup();
}
-asn1_error_code asn1_encode_reply_key_pack(asn1buf *buf, const krb5_reply_key_pack *val, unsigned int *retlen)
+asn1_error_code
+asn1_encode_reply_key_pack(asn1buf *buf, const krb5_reply_key_pack *val,
+ unsigned int *retlen)
{
asn1_setup();
@@ -1809,7 +1871,10 @@
asn1_cleanup();
}
-asn1_error_code asn1_encode_reply_key_pack_draft9(asn1buf *buf, const krb5_reply_key_pack_draft9 *val, unsigned int *retlen)
+asn1_error_code
+asn1_encode_reply_key_pack_draft9(asn1buf *buf,
+ const krb5_reply_key_pack_draft9 *val,
+ unsigned int *retlen)
{
asn1_setup();
@@ -1820,7 +1885,9 @@
asn1_cleanup();
}
-asn1_error_code asn1_encode_pa_pk_as_rep(asn1buf *buf, const krb5_pa_pk_as_rep *val, unsigned int *retlen)
+asn1_error_code
+asn1_encode_pa_pk_as_rep(asn1buf *buf, const krb5_pa_pk_as_rep *val,
+ unsigned int *retlen)
{
asn1_setup();
@@ -1839,7 +1906,10 @@
asn1_cleanup();
}
-asn1_error_code asn1_encode_pa_pk_as_rep_draft9(asn1buf *buf, const krb5_pa_pk_as_rep_draft9 *val, unsigned int *retlen)
+asn1_error_code
+asn1_encode_pa_pk_as_rep_draft9(asn1buf *buf,
+ const krb5_pa_pk_as_rep_draft9 *val,
+ unsigned int *retlen)
{
asn1_setup();
@@ -1858,7 +1928,10 @@
asn1_cleanup();
}
-asn1_error_code asn1_encode_td_trusted_certifiers(asn1buf *buf, const krb5_external_principal_identifier **val, unsigned int *retlen)
+asn1_error_code
+asn1_encode_td_trusted_certifiers(
+ asn1buf *buf, const krb5_external_principal_identifier **val,
+ unsigned int *retlen)
{
asn1_setup();
{
@@ -1873,7 +1946,9 @@
#endif /* DISABLE_PKINIT */
-asn1_error_code asn1_encode_sequence_of_typed_data(asn1buf *buf, const krb5_typed_data **val, unsigned int *retlen)
+asn1_error_code
+asn1_encode_sequence_of_typed_data(asn1buf *buf, const krb5_typed_data **val,
+ unsigned int *retlen)
{
asn1_setup();
int i;
@@ -1893,7 +1968,9 @@
asn1_cleanup();
}
-asn1_error_code asn1_encode_typed_data(asn1buf *buf, const krb5_typed_data *val, unsigned int *retlen)
+asn1_error_code
+asn1_encode_typed_data(asn1buf *buf, const krb5_typed_data *val,
+ unsigned int *retlen)
{
asn1_setup();
asn1_addlenfield(val->length, val->data, 1, asn1_encode_octetstring);
Modified: trunk/src/lib/krb5/asn.1/asn1_make.c
===================================================================
--- trunk/src/lib/krb5/asn.1/asn1_make.c 2009-10-31 03:50:54 UTC (rev 23105)
+++ trunk/src/lib/krb5/asn.1/asn1_make.c 2009-10-31 03:52:01 UTC (rev 23106)
@@ -27,18 +27,17 @@
#include "asn1_make.h"
-asn1_error_code asn1_make_etag(asn1buf *buf, asn1_class asn1class,
- asn1_tagnum tagnum, unsigned int in_len,
- unsigned int *retlen)
+asn1_error_code
+asn1_make_etag(asn1buf *buf, asn1_class asn1class, asn1_tagnum tagnum,
+ unsigned int in_len, unsigned int *retlen)
{
return asn1_make_tag(buf,asn1class,CONSTRUCTED,tagnum,in_len,retlen);
}
-
-asn1_error_code asn1_make_tag(asn1buf *buf, asn1_class asn1class,
- asn1_construction construction,
- asn1_tagnum tagnum, unsigned int in_len,
- unsigned int *retlen)
+asn1_error_code
+asn1_make_tag(asn1buf *buf, asn1_class asn1class,
+ asn1_construction construction, asn1_tagnum tagnum,
+ unsigned int in_len, unsigned int *retlen)
{
asn1_error_code retval;
unsigned int sumlen=0, length;
@@ -56,7 +55,8 @@
return 0;
}
-asn1_error_code asn1_make_length(asn1buf *buf, const unsigned int in_len, unsigned int *retlen)
+asn1_error_code
+asn1_make_length(asn1buf *buf, const unsigned int in_len, unsigned int *retlen)
{
asn1_error_code retval;
@@ -82,9 +82,10 @@
return 0;
}
-asn1_error_code asn1_make_id(asn1buf *buf, asn1_class asn1class,
- asn1_construction construction,
- asn1_tagnum tagnum, unsigned int *retlen)
+asn1_error_code
+asn1_make_id(asn1buf *buf, asn1_class asn1class,
+ asn1_construction construction, asn1_tagnum tagnum,
+ unsigned int *retlen)
{
asn1_error_code retval;
@@ -117,7 +118,9 @@
return 0;
}
-asn1_error_code asn1_make_sequence(asn1buf *buf, const unsigned int seq_len, unsigned int *retlen)
+asn1_error_code
+asn1_make_sequence(asn1buf *buf, const unsigned int seq_len,
+ unsigned int *retlen)
{
asn1_error_code retval;
unsigned int len, sum=0;
@@ -133,7 +136,8 @@
return 0;
}
-asn1_error_code asn1_make_set(asn1buf *buf, const unsigned int set_len, unsigned int *retlen)
+asn1_error_code
+asn1_make_set(asn1buf *buf, const unsigned int set_len, unsigned int *retlen)
{
asn1_error_code retval;
unsigned int len, sum=0;
@@ -149,7 +153,9 @@
return 0;
}
-asn1_error_code asn1_make_string(asn1buf *buf, const unsigned int length, const char *string, int *retlen)
+asn1_error_code
+asn1_make_string(asn1buf *buf, const unsigned int length, const char *string,
+ int *retlen)
{
asn1_error_code retval;
Modified: trunk/src/lib/krb5/asn.1/asn1_misc.c
===================================================================
--- trunk/src/lib/krb5/asn.1/asn1_misc.c 2009-10-31 03:50:54 UTC (rev 23105)
+++ trunk/src/lib/krb5/asn.1/asn1_misc.c 2009-10-31 03:52:01 UTC (rev 23106)
@@ -27,7 +27,8 @@
#include "asn1_misc.h"
-asn1_error_code asn1_krb5_realm_copy(krb5_principal target, krb5_principal source)
+asn1_error_code
+asn1_krb5_realm_copy(krb5_principal target, krb5_principal source)
{
target->realm.length = source->realm.length;
target->realm.data = (char*)malloc(target->realm.length); /* copy realm */
Modified: trunk/src/lib/krb5/asn.1/krb5_encode.c
===================================================================
--- trunk/src/lib/krb5/asn.1/krb5_encode.c 2009-10-31 03:50:54 UTC (rev 23105)
+++ trunk/src/lib/krb5/asn.1/krb5_encode.c 2009-10-31 03:52:01 UTC (rev 23106)
@@ -63,7 +63,8 @@
return 0
#ifndef DISABLE_PKINIT
-krb5_error_code encode_krb5_pa_pk_as_req(const krb5_pa_pk_as_req *rep, krb5_data **code)
+krb5_error_code
+encode_krb5_pa_pk_as_req(const krb5_pa_pk_as_req *rep, krb5_data **code)
{
krb5_setup();
retval = asn1_encode_pa_pk_as_req(buf,rep,&length);
@@ -72,7 +73,9 @@
krb5_cleanup();
}
-krb5_error_code encode_krb5_pa_pk_as_req_draft9(const krb5_pa_pk_as_req_draft9 *rep, krb5_data **code)
+krb5_error_code
+encode_krb5_pa_pk_as_req_draft9(const krb5_pa_pk_as_req_draft9 *rep,
+ krb5_data **code)
{
krb5_setup();
retval = asn1_encode_pa_pk_as_req_draft9(buf,rep,&length);
@@ -81,7 +84,8 @@
krb5_cleanup();
}
-krb5_error_code encode_krb5_pa_pk_as_rep(const krb5_pa_pk_as_rep *rep, krb5_data **code)
+krb5_error_code
+encode_krb5_pa_pk_as_rep(const krb5_pa_pk_as_rep *rep, krb5_data **code)
{
krb5_setup();
retval = asn1_encode_pa_pk_as_rep(buf,rep,&length);
@@ -90,7 +94,8 @@
krb5_cleanup();
}
-krb5_error_code encode_krb5_pa_pk_as_rep_draft9(const krb5_pa_pk_as_rep_draft9 *rep, krb5_data **code)
+krb5_error_code
+encode_krb5_pa_pk_as_rep_draft9(const krb5_pa_pk_as_rep_draft9 *rep, krb5_data **code)
{
krb5_setup();
retval = asn1_encode_pa_pk_as_rep_draft9(buf,rep,&length);
@@ -99,7 +104,8 @@
krb5_cleanup();
}
-krb5_error_code encode_krb5_auth_pack(const krb5_auth_pack *rep, krb5_data **code)
+krb5_error_code
+encode_krb5_auth_pack(const krb5_auth_pack *rep, krb5_data **code)
{
krb5_setup();
retval = asn1_encode_auth_pack(buf,rep,&length);
@@ -108,7 +114,9 @@
krb5_cleanup();
}
-krb5_error_code encode_krb5_auth_pack_draft9(const krb5_auth_pack_draft9 *rep, krb5_data **code)
+krb5_error_code
+encode_krb5_auth_pack_draft9(const krb5_auth_pack_draft9 *rep,
+ krb5_data **code)
{
krb5_setup();
retval = asn1_encode_auth_pack_draft9(buf,rep,&length);
@@ -117,7 +125,8 @@
krb5_cleanup();
}
-krb5_error_code encode_krb5_kdc_dh_key_info(const krb5_kdc_dh_key_info *rep, krb5_data **code)
+krb5_error_code
+encode_krb5_kdc_dh_key_info(const krb5_kdc_dh_key_info *rep, krb5_data **code)
{
krb5_setup();
retval = asn1_encode_kdc_dh_key_info(buf,rep,&length);
@@ -126,7 +135,8 @@
krb5_cleanup();
}
-krb5_error_code encode_krb5_reply_key_pack(const krb5_reply_key_pack *rep, krb5_data **code)
+krb5_error_code
+encode_krb5_reply_key_pack(const krb5_reply_key_pack *rep, krb5_data **code)
{
krb5_setup();
retval = asn1_encode_reply_key_pack(buf,rep,&length);
@@ -135,7 +145,9 @@
krb5_cleanup();
}
-krb5_error_code encode_krb5_reply_key_pack_draft9(const krb5_reply_key_pack_draft9 *rep, krb5_data **code)
+krb5_error_code
+encode_krb5_reply_key_pack_draft9(const krb5_reply_key_pack_draft9 *rep,
+ krb5_data **code)
{
krb5_setup();
retval = asn1_encode_reply_key_pack_draft9(buf,rep,&length);
@@ -144,7 +156,9 @@
krb5_cleanup();
}
-krb5_error_code encode_krb5_td_trusted_certifiers(const krb5_external_principal_identifier **rep, krb5_data **code)
+krb5_error_code
+encode_krb5_td_trusted_certifiers(
+ const krb5_external_principal_identifier **rep, krb5_data **code)
{
krb5_setup();
retval = asn1_encode_td_trusted_certifiers(buf,rep,&length);
@@ -153,7 +167,9 @@
krb5_cleanup();
}
-krb5_error_code encode_krb5_td_dh_parameters(const krb5_algorithm_identifier **rep, krb5_data **code)
+krb5_error_code
+encode_krb5_td_dh_parameters(const krb5_algorithm_identifier **rep,
+ krb5_data **code)
{
krb5_setup();
retval = asn1_encode_sequence_of_algorithm_identifier(buf,rep,&length);
@@ -163,7 +179,8 @@
}
#endif /* DISABLE_PKINIT */
-krb5_error_code encode_krb5_typed_data(const krb5_typed_data **rep, krb5_data **code)
+krb5_error_code
+encode_krb5_typed_data(const krb5_typed_data **rep, krb5_data **code)
{
krb5_setup();
retval = asn1_encode_sequence_of_typed_data(buf,rep,&length);
Modified: trunk/src/lib/krb5/asn.1/ldap_key_seq.c
===================================================================
--- trunk/src/lib/krb5/asn.1/ldap_key_seq.c 2009-10-31 03:50:54 UTC (rev 23105)
+++ trunk/src/lib/krb5/asn.1/ldap_key_seq.c 2009-10-31 03:52:01 UTC (rev 23106)
@@ -60,7 +60,8 @@
FIELDOF_OPTSTRINGL(krb5_key_data, octetstring, key_data_contents[1],
ui_2, key_data_length[1], 1, 1),
};
-static unsigned int optional_krbsalt (const void *p)
+static unsigned int
+optional_krbsalt (const void *p)
{
const krb5_key_data *k = p;
unsigned int optional = 0;
@@ -208,7 +209,8 @@
return ret;
}
-static asn1_error_code asn1_decode_key(asn1buf *buf, krb5_key_data *key)
+static asn1_error_code
+asn1_decode_key(asn1buf *buf, krb5_key_data *key)
{
int full_buflen, seqindef;
unsigned int length;
@@ -290,8 +292,8 @@
return ret;
}
-krb5_error_code krb5int_ldap_decode_sequence_of_keys (krb5_data *in,
- ldap_seqof_key_data **rep)
+krb5_error_code
+krb5int_ldap_decode_sequence_of_keys (krb5_data *in, ldap_seqof_key_data **rep)
{
ldap_seqof_key_data *repval;
krb5_key_data **out;
More information about the cvs-krb5
mailing list