Mercurial > trustbridge
diff common/binverify.c @ 905:698b6a9bd75e
Fix coding style for C code
astyle --style=gnu --indent=spaces=2
author | Andre Heinecke <andre.heinecke@intevation.de> |
---|---|
date | Wed, 13 Aug 2014 15:49:47 +0200 |
parents | 44fa5de02b52 |
children | edbf5e5e88f4 |
line wrap: on
line diff
--- a/common/binverify.c Wed Aug 13 15:44:35 2014 +0200 +++ b/common/binverify.c Wed Aug 13 15:49:47 2014 +0200 @@ -17,7 +17,8 @@ #endif bin_verify_result -verify_binary(const char *filename, size_t name_len) { +verify_binary(const char *filename, size_t name_len) +{ if (!filename || !name_len) return VerifyUnknownError; #ifdef WIN32 @@ -98,7 +99,8 @@ } bin_verify_result -verify_binary_win(const char *filename, size_t name_len) { +verify_binary_win(const char *filename, size_t name_len) +{ bin_verify_result retval = VerifyUnknownError; WCHAR *filenameW = NULL; BOOL result = FALSE; @@ -166,9 +168,9 @@ } pSignerCertContext = CertGetSubjectCertificateFromStore( - hStore, - PKCS_7_ASN_ENCODING | X509_ASN_ENCODING, - pSignerCert); + hStore, + PKCS_7_ASN_ENCODING | X509_ASN_ENCODING, + pSignerCert); if (!pSignerCertContext) { @@ -241,11 +243,11 @@ int ret = -1; const size_t sig_b64_size = TRUSTBRIDGE_RSA_KEY_SIZE / 8 * 4 / 3; char *data = NULL, - signature_b64[sig_b64_size + 1]; + signature_b64[sig_b64_size + 1]; size_t data_size = 0, sig_size = TRUSTBRIDGE_RSA_KEY_SIZE / 8; unsigned char signature[sig_size], - hash[32]; + hash[32]; bin_verify_result retval = VerifyUnknownError; x509_crt codesign_cert;