]> WPIA git - cassiopeia.git/commitdiff
fmt: Whitespace, indentation, generic source formatting
authorBenny Baumann <BenBE@geshi.org>
Sat, 18 Jul 2015 18:40:24 +0000 (20:40 +0200)
committerBenny Baumann <BenBE@geshi.org>
Sun, 19 Jul 2015 16:54:17 +0000 (18:54 +0200)
12 files changed:
src/apps/client.cpp
src/apps/signer.cpp
src/config.cpp
src/crypto/X509.cpp
src/crypto/simpleOpensslSigner.cpp
src/crypto/sslUtil.cpp
src/crypto/sslUtil.h
src/db/database.cpp
src/db/database.h
src/db/mysql.cpp
src/io/recordHandler.cpp
src/util.cpp

index d7cda514b5bcaa8830c75156bf284b77089f96d0..1c1e188eff4197a8e94a027bcc2e2950e7561b0c 100644 (file)
@@ -93,7 +93,7 @@ int main( int argc, const char* argv[] ) {
             // todo set good log TODO FIXME
             sign->setLog( std::shared_ptr<std::ostream>(
                 &std::cout,
-                []( std::ostream * o ) {
+                []( std::ostream* o ) {
                     ( void ) o;
                 } ) );
             checkCRLs( sign );
index 3468eb274d6697c6cf399aefdcc81df182c98bd9..f7f61d8d2932eb26bd4b36366936cc16bd195949 100644 (file)
@@ -36,7 +36,7 @@ int main( int argc, const char* argv[] ) try {
 #endif
 
     if( parseConfig( path ) != 0 ) {
-        logger::fatal("Could not parse configuration file.");
+        logger::fatal( "Could not parse configuration file." );
         return -1;
     }
 
index 9dfb112a5107836cf43fe2755328fc999794fa6d..495231c8a377f1c9c5c5e86ed6ce3a0bfb4411de 100644 (file)
@@ -130,7 +130,6 @@ int parseProfiles() {
 }
 
 int parseConfig( std::string path ) {
-
     auto masterConf = parseConf( path );
 
     keyDir = masterConf->at( "key.directory" );
index acc9dec358b528bd558e43cc5819c06e9d1bcd6d..5eed484bd24aebe0c798243303400e12cfe47623 100644 (file)
@@ -268,8 +268,8 @@ std::shared_ptr<SignedCertificate> X509Cert::sign( std::shared_ptr<EVP_PKEY> caK
 
     std::shared_ptr<char> serStr(
         BN_bn2hex( ser.get() ),
-        []( char *p ) {
-            OPENSSL_free(p);
+        []( charp ) {
+            OPENSSL_free( p );
         } ); // OPENSSL_free is a macro...
     res->serial = serStr ? std::string( serStr.get() ) : "";
 
index 55b43ea5757c8276dd9accb34119f14d7187c46a..7f75142f2f964330a69cf784d9140cfda10b2441 100644 (file)
@@ -250,7 +250,6 @@ std::shared_ptr<SignedCertificate> SimpleOpensslSigner::sign( std::shared_ptr<TB
         output->log = signlog.str();
         return output;
     }
-
 }
 
 std::pair<std::shared_ptr<CRL>, std::string> SimpleOpensslSigner::revoke( std::shared_ptr<CAConfig> ca, std::vector<std::string> serials ) {
index 3b93b17be21d4fb3afbaef3bb53c48aeae948de5..d4f55da86b33247c6d9a228f7ab04f416bd4d291 100644 (file)
@@ -33,17 +33,19 @@ std::shared_ptr<X509> loadX509FromFile( const std::string& filename ) {
 
     return std::shared_ptr<X509>(
         key,
-        []( X509 * ref ) {
+        []( X509* ref ) {
             X509_free( ref );
         } );
 }
 
 std::shared_ptr<EVP_PKEY> loadPkeyFromFile( const std::string& filename ) {
-    std::shared_ptr<FILE> f( fopen( filename.c_str(), "r" ), []( FILE * ptr ) {
-        if( ptr ) {
-            fclose( ptr );
-        }
-    } );
+    std::shared_ptr<FILE> f(
+        fopen( filename.c_str(), "r" ),
+        []( FILE* ptr ) {
+            if( ptr ) {
+                fclose( ptr );
+            }
+        } );
 
     if( !f ) {
         return std::shared_ptr<EVP_PKEY>();
@@ -57,7 +59,7 @@ std::shared_ptr<EVP_PKEY> loadPkeyFromFile( const std::string& filename ) {
 
     return std::shared_ptr<EVP_PKEY>(
         key,
-        []( EVP_PKEY * ref ) {
+        []( EVP_PKEY* ref ) {
             EVP_PKEY_free( ref );
         } );
 }
@@ -66,7 +68,9 @@ int gencb( int a, int b, BN_GENCB* g ) {
     ( void ) a;
     ( void ) b;
     ( void ) g;
+
     std::cout << ( a == 0 ? "." : "+" ) << std::flush;
+
     return 1;
 }
 
@@ -86,9 +90,11 @@ static int verify_callback( int preverify_ok, X509_STORE_CTX* ctx ) {
 static std::shared_ptr<DH> dh_param;
 
 std::shared_ptr<SSL_CTX> generateSSLContext( bool server ) {
-    std::shared_ptr<SSL_CTX> ctx = std::shared_ptr<SSL_CTX>( SSL_CTX_new( TLSv1_2_method() ), []( SSL_CTX * p ) {
-        SSL_CTX_free( p );
-    } );
+    std::shared_ptr<SSL_CTX> ctx = std::shared_ptr<SSL_CTX>(
+        SSL_CTX_new( TLSv1_2_method() ),
+        []( SSL_CTX* p ) {
+            SSL_CTX_free( p );
+        } );
 
     if( !SSL_CTX_set_cipher_list( ctx.get(), "HIGH:+CAMELLIA256:!eNull:!aNULL:!ADH:!MD5:-RSA+AES+SHA1:!RC4:!DES:!3DES:!SEED:!EXP:!AES128:!CAMELLIA128" ) ) {
         throw "Cannot set cipher list. Your source is broken.";
@@ -178,7 +184,7 @@ std::shared_ptr<BIO> openSerial( const std::string& name ) {
     return std::shared_ptr<BIO>(
         BIO_new_fd( fileno( f.get() ), 0 ),
         [f]( BIO* b ) {
-            BIO_free(b);
+            BIO_free( b );
         } );
 }
 
index 1327a17bd47367dd0113ce8dec984e1ca93ccb27..6ecb536cd5cac1ca479239da1411d042595d5925 100644 (file)
 
 #include "db/database.h"
 
-class CAConfig {
-public:
+struct CAConfig {
     std::string path;
     std::string name;
 
     std::shared_ptr<X509> ca;
     std::shared_ptr<EVP_PKEY> caKey;
     std::shared_ptr<ASN1_TIME> notBefore;
+
     CAConfig( const std::string& name );
+
     bool crlNeedsResign();
 };
 
@@ -49,4 +50,5 @@ std::shared_ptr<EVP_PKEY> loadPkeyFromFile( const std::string& filename );
 std::shared_ptr<SSL_CTX> generateSSLContext( bool server );
 std::shared_ptr<BIO> openSerial( const std::string& name );
 std::string timeToString( std::shared_ptr<ASN1_TIME> time );
+
 void extractTimes( std::shared_ptr<X509> source, std::shared_ptr<SignedCertificate> cert );
index 7eabc17d9d99b30c31a2725883ee97cc2db6a81d..4bb12b292c98b402348fd4868d0b05261b78ecdf 100644 (file)
@@ -1 +1 @@
-#include "database.h"
+#include "db/database.h"
index 6a3d5d7a549ee9b02051fcf5ff5fcc1740fd4701..31687b13ce43242e68ab14babba87ae25e2908f6 100644 (file)
@@ -26,6 +26,7 @@ struct AVA {
 struct TBSCertificate {
     std::string md;
     std::string profile;
+
     /**
      * CSR path
      */
@@ -39,7 +40,6 @@ struct TBSCertificate {
     std::string wishTo;
 };
 
-
 struct SignedCertificate {
     std::string certificate;
     std::string serial;
index db3a7b91402fba5da76cf3bebbd1eaa3b066a9d9..cf2bb7ebf8c0d3a6b7a39bb65ccd83924bd7e5b3 100644 (file)
@@ -10,6 +10,7 @@
 std::shared_ptr<int> MySQLJobProvider::lib_ref(
     //Initializer: Store the return code as a pointer to an integer
     new int( mysql_library_init( 0, NULL, NULL ) ),
+
     //Finalizer: Check the pointer and free resources
     []( int* ref ) {
         if( !ref ) {
@@ -171,7 +172,6 @@ void MySQLJobProvider::finishJob( std::shared_ptr<Job> job ) {
     if( query( q ).first ) {
         throw "No database entry found.";
     }
-
 }
 
 void MySQLJobProvider::failJob( std::shared_ptr<Job> job ) {
index 0e63805e98f8e5e57eb2cfd06913421395ec147b..a1d7b47d1e7b0853bd04de66ebc1a807357d26d6 100644 (file)
@@ -135,33 +135,35 @@ public:
             tbs->wishTo = data;
             break;
 
-        case RecordHeader::SignerCommand::ADD_SAN: {
-            size_t pos = data.find( "," );
-
-            if( pos == std::string::npos ) {
-                // error
-            } else {
-                std::shared_ptr<SAN> san( new SAN() );
-                san->type = data.substr( 0, pos );
-                san->content = data.substr( pos + 1 );
-                tbs->SANs.push_back( san );
+        case RecordHeader::SignerCommand::ADD_SAN:
+            {
+                size_t pos = data.find( "," );
+
+                if( pos == std::string::npos ) {
+                    // error
+                } else {
+                    std::shared_ptr<SAN> san( new SAN() );
+                    san->type = data.substr( 0, pos );
+                    san->content = data.substr( pos + 1 );
+                    tbs->SANs.push_back( san );
+                }
             }
-        }
-        break;
-
-        case RecordHeader::SignerCommand::ADD_AVA: {
-            size_t pos = data.find( "," );
-
-            if( pos == std::string::npos ) {
-                // error
-            } else {
-                std::shared_ptr<AVA> ava( new AVA() );
-                ava->name = data.substr( 0, pos );
-                ava->value = data.substr( pos + 1 );
-                tbs->AVAs.push_back( ava );
+            break;
+
+        case RecordHeader::SignerCommand::ADD_AVA:
+            {
+                size_t pos = data.find( "," );
+
+                if( pos == std::string::npos ) {
+                    // error
+                } else {
+                    std::shared_ptr<AVA> ava( new AVA() );
+                    ava->name = data.substr( 0, pos );
+                    ava->value = data.substr( pos + 1 );
+                    tbs->AVAs.push_back( ava );
+                }
             }
-        }
-        break;
+            break;
 
         case RecordHeader::SignerCommand::ADD_PROOF_LINE:
             break;
@@ -191,31 +193,32 @@ public:
             serials.push_back( data );
             break;
 
-        case RecordHeader::SignerCommand::REVOKE: {
-            std::string ca = data;
-            auto reqCA = CAs.at( ca );
-            logger::note( "CA found" );
-            std::shared_ptr<CRL> crl;
-            std::string date;
-            std::tie<std::shared_ptr<CRL>, std::string>( crl, date ) = signer->revoke( reqCA, serials );
-
-            respondCommand( RecordHeader::SignerResult::REVOKED, date + crl->getSignature() );
+        case RecordHeader::SignerCommand::REVOKE:
+            {
+                std::string ca = data;
+                auto reqCA = CAs.at( ca );
+                logger::note( "CA found" );
+                std::shared_ptr<CRL> crl;
+                std::string date;
+                std::tie<std::shared_ptr<CRL>, std::string>( crl, date ) = signer->revoke( reqCA, serials );
 
+                respondCommand( RecordHeader::SignerResult::REVOKED, date + crl->getSignature() );
+            }
             break;
-        }
 
-        case RecordHeader::SignerCommand::GET_FULL_CRL: {
-            auto ca = CAs.at( data );
-            CRL c( ca->path + "/ca.crl" );
-            respondCommand( RecordHeader::SignerResult::FULL_CRL, c.toString() );
+        case RecordHeader::SignerCommand::GET_FULL_CRL:
+            {
+                auto ca = CAs.at( data );
+                CRL c( ca->path + "/ca.crl" );
+                respondCommand( RecordHeader::SignerResult::FULL_CRL, c.toString() );
 
-            if( !SSL_shutdown( ssl.get() ) && !SSL_shutdown( ssl.get() ) ) {
-                logger::error( "ERROR: SSL shutdown failed." );
-            }
+                if( !SSL_shutdown( ssl.get() ) && !SSL_shutdown( ssl.get() ) ) {
+                    logger::error( "ERROR: SSL shutdown failed." );
+                }
 
-            parent->reset(); // Connection ended
+                parent->reset(); // Connection ended
+            }
             break;
-        }
 
         default:
             throw "Unimplemented";
@@ -223,8 +226,8 @@ public:
     }
 };
 
-DefaultRecordHandler::DefaultRecordHandler( std::shared_ptr<Signer> signer, std::shared_ptr<BIO> bio )
-    bio( bio ), ctx( generateSSLContext( true ) ), signer( signer ), currentSession() {
+DefaultRecordHandler::DefaultRecordHandler( std::shared_ptr<Signer> signer, std::shared_ptr<BIO> bio ) :
+    bio( bio ), ctx( generateSSLContext( true ) ), signer( signer ), currentSession() {
 }
 
 void DefaultRecordHandler::reset() {
index a052843561302edcf1869df1250bcf11dca04a80..9e24b378d834c6e3ad6a356b3f9a48b533fb1751 100644 (file)
@@ -138,7 +138,6 @@ std::pair<bool, time_t> addMonths( std::time_t t, int32_t count ) {
     }
 
     return std::pair<bool, time_t>( true, res );
-
 }
 
 std::pair<bool, time_t> parseMonthInterval( std::time_t t, const std::string& date ) {
@@ -161,6 +160,7 @@ std::pair<bool, time_t> parseMonthInterval( std::time_t t, const std::string& da
         return std::pair<bool, time_t>( false, 0 );
     }
 }
+
 std::pair<bool, time_t> parseYearInterval( std::time_t t, const std::string& date ) {
     if( date[date.size() - 1] != 'y' ) {
         return  std::pair<bool, time_t>( false, 0 );