summaryrefslogtreecommitdiff
path: root/tests/pkcs11/pkcs11-obj-import.c
diff options
context:
space:
mode:
authorDaiki Ueno <ueno@gnu.org>2023-04-24 12:39:42 +0900
committerDaiki Ueno <ueno@gnu.org>2023-04-24 12:45:46 +0900
commitaa5950abab56b011331ad4331409b6ff8efb8aeb (patch)
treead363fb38e8b65c942876641cda9c76caa13b498 /tests/pkcs11/pkcs11-obj-import.c
parent0fe9cb6842d63761718046cc7dd7eb437e6c5163 (diff)
downloadgnutls-aa5950abab56b011331ad4331409b6ff8efb8aeb.tar.gz
build: re-indent code
Signed-off-by: Daiki Ueno <ueno@gnu.org>
Diffstat (limited to 'tests/pkcs11/pkcs11-obj-import.c')
-rw-r--r--tests/pkcs11/pkcs11-obj-import.c93
1 files changed, 47 insertions, 46 deletions
diff --git a/tests/pkcs11/pkcs11-obj-import.c b/tests/pkcs11/pkcs11-obj-import.c
index 07c1a30292..9004b27f95 100644
--- a/tests/pkcs11/pkcs11-obj-import.c
+++ b/tests/pkcs11/pkcs11-obj-import.c
@@ -20,7 +20,7 @@
*/
#ifdef HAVE_CONFIG_H
-# include <config.h>
+#include <config.h>
#endif
#include <stdio.h>
@@ -34,7 +34,7 @@
#include <gnutls/abstract.h>
#define CONFIG_NAME "softhsm-obj-import"
-#define CONFIG CONFIG_NAME".config"
+#define CONFIG CONFIG_NAME ".config"
#include "../utils.h"
#include "softhsm.h"
@@ -51,9 +51,9 @@ static void tls_log_func(int level, const char *str)
fprintf(stderr, "|<%d>| %s", level, str);
}
-static
-int pin_func(void *userdata, int attempt, const char *url, const char *label,
- unsigned flags, char *pin, size_t pin_max)
+static int pin_func(void *userdata, int attempt, const char *url,
+ const char *label, unsigned flags, char *pin,
+ size_t pin_max)
{
if (attempt == 0) {
strcpy(pin, PIN);
@@ -93,8 +93,9 @@ void doit(void)
set_softhsm_conf(CONFIG);
snprintf(buf, sizeof(buf),
- "%s --init-token --slot 0 --label test --so-pin " PIN " --pin "
- PIN, bin);
+ "%s --init-token --slot 0 --label test --so-pin " PIN
+ " --pin " PIN,
+ bin);
system(buf);
ret = gnutls_pkcs11_add_provider(lib, NULL);
@@ -106,15 +107,15 @@ void doit(void)
ret = gnutls_x509_crt_init(&crt);
if (ret < 0) {
- fprintf(stderr,
- "gnutls_x509_crt_init: %s\n", gnutls_strerror(ret));
+ fprintf(stderr, "gnutls_x509_crt_init: %s\n",
+ gnutls_strerror(ret));
exit(1);
}
ret = gnutls_x509_crt_import(crt, &server_cert, GNUTLS_X509_FMT_PEM);
if (ret < 0) {
- fprintf(stderr,
- "gnutls_x509_crt_import: %s\n", gnutls_strerror(ret));
+ fprintf(stderr, "gnutls_x509_crt_import: %s\n",
+ gnutls_strerror(ret));
exit(1);
}
@@ -132,17 +133,17 @@ void doit(void)
exit(1);
}
- ret =
- gnutls_pkcs11_token_set_pin(SOFTHSM_URL, NULL, PIN,
- GNUTLS_PIN_USER);
+ ret = gnutls_pkcs11_token_set_pin(SOFTHSM_URL, NULL, PIN,
+ GNUTLS_PIN_USER);
if (ret < 0) {
fail("gnutls_pkcs11_token_set_pin: %s\n", gnutls_strerror(ret));
exit(1);
}
- ret = gnutls_pkcs11_copy_x509_crt(SOFTHSM_URL, crt, "cert",
- GNUTLS_PKCS11_OBJ_FLAG_MARK_NOT_PRIVATE
- | GNUTLS_PKCS11_OBJ_FLAG_LOGIN);
+ ret = gnutls_pkcs11_copy_x509_crt(
+ SOFTHSM_URL, crt, "cert",
+ GNUTLS_PKCS11_OBJ_FLAG_MARK_NOT_PRIVATE |
+ GNUTLS_PKCS11_OBJ_FLAG_LOGIN);
if (ret < 0) {
fail("gnutls_pkcs11_copy_x509_crt: %s\n", gnutls_strerror(ret));
exit(1);
@@ -159,8 +160,8 @@ void doit(void)
exit(1);
}
- assert(gnutls_pkcs11_obj_export_url
- (obj, GNUTLS_PKCS11_URL_GENERIC, &url) >= 0);
+ assert(gnutls_pkcs11_obj_export_url(obj, GNUTLS_PKCS11_URL_GENERIC,
+ &url) >= 0);
assert(url != NULL);
gnutls_free(url);
@@ -186,76 +187,76 @@ void doit(void)
/* The ID is constant and copied from the certificate */
buf_size = sizeof(buf);
- assert(gnutls_pkcs11_obj_get_info
- (obj, GNUTLS_PKCS11_OBJ_ID_HEX, buf, &buf_size) >= 0);
+ assert(gnutls_pkcs11_obj_get_info(obj, GNUTLS_PKCS11_OBJ_ID_HEX, buf,
+ &buf_size) >= 0);
assert(buf_size == 60);
- assert(memcmp
- (buf,
- "95:d1:ad:a4:52:e4:c5:61:12:a6:91:13:8d:80:dd:2d:81:22:3e:d4",
- 60) == 0);
+ assert(memcmp(buf,
+ "95:d1:ad:a4:52:e4:c5:61:12:a6:91:13:8d:80:dd:2d:81:22:3e:d4",
+ 60) == 0);
/* label */
buf_size = sizeof(buf);
- assert(gnutls_pkcs11_obj_get_info
- (obj, GNUTLS_PKCS11_OBJ_LABEL, buf, &buf_size) >= 0);
+ assert(gnutls_pkcs11_obj_get_info(obj, GNUTLS_PKCS11_OBJ_LABEL, buf,
+ &buf_size) >= 0);
assert(buf_size == 4);
assert(memcmp(buf, "cert", 4) == 0);
/* token-label */
buf_size = sizeof(buf);
- assert(gnutls_pkcs11_obj_get_info
- (obj, GNUTLS_PKCS11_OBJ_TOKEN_LABEL, buf, &buf_size) >= 0);
+ assert(gnutls_pkcs11_obj_get_info(obj, GNUTLS_PKCS11_OBJ_TOKEN_LABEL,
+ buf, &buf_size) >= 0);
assert(buf_size == 4);
assert(memcmp(buf, "test", 4) == 0);
/* token-serial */
buf_size = sizeof(buf);
- assert(gnutls_pkcs11_obj_get_info
- (obj, GNUTLS_PKCS11_OBJ_TOKEN_SERIAL, buf, &buf_size) >= 0);
+ assert(gnutls_pkcs11_obj_get_info(obj, GNUTLS_PKCS11_OBJ_TOKEN_SERIAL,
+ buf, &buf_size) >= 0);
assert(buf_size != 0);
assert(strlen(buf) != 0);
/* token-model */
buf_size = sizeof(buf);
- assert(gnutls_pkcs11_obj_get_info
- (obj, GNUTLS_PKCS11_OBJ_TOKEN_MODEL, buf, &buf_size) >= 0);
+ assert(gnutls_pkcs11_obj_get_info(obj, GNUTLS_PKCS11_OBJ_TOKEN_MODEL,
+ buf, &buf_size) >= 0);
assert(buf_size != 0);
assert(strlen(buf) != 0);
/* token-manufacturer */
buf_size = sizeof(buf);
- assert(gnutls_pkcs11_obj_get_info
- (obj, GNUTLS_PKCS11_OBJ_TOKEN_MANUFACTURER, buf,
- &buf_size) >= 0);
+ assert(gnutls_pkcs11_obj_get_info(obj,
+ GNUTLS_PKCS11_OBJ_TOKEN_MANUFACTURER,
+ buf, &buf_size) >= 0);
assert(buf_size != 0);
assert(strlen(buf) != 0);
/* token-ID */
buf_size = sizeof(buf);
- assert(gnutls_pkcs11_obj_get_info
- (obj, GNUTLS_PKCS11_OBJ_ID, buf, &buf_size) >= 0);
+ assert(gnutls_pkcs11_obj_get_info(obj, GNUTLS_PKCS11_OBJ_ID, buf,
+ &buf_size) >= 0);
assert(buf_size != 0);
/* library description */
buf_size = sizeof(buf);
- assert(gnutls_pkcs11_obj_get_info
- (obj, GNUTLS_PKCS11_OBJ_LIBRARY_DESCRIPTION, buf,
- &buf_size) >= 0);
+ assert(gnutls_pkcs11_obj_get_info(obj,
+ GNUTLS_PKCS11_OBJ_LIBRARY_DESCRIPTION,
+ buf, &buf_size) >= 0);
assert(buf_size != 0);
assert(strlen(buf) != 0);
/* library manufacturer */
buf_size = sizeof(buf);
- assert(gnutls_pkcs11_obj_get_info
- (obj, GNUTLS_PKCS11_OBJ_LIBRARY_MANUFACTURER, buf,
- &buf_size) >= 0);
+ assert(gnutls_pkcs11_obj_get_info(
+ obj, GNUTLS_PKCS11_OBJ_LIBRARY_MANUFACTURER, buf,
+ &buf_size) >= 0);
assert(buf_size != 0);
assert(strlen(buf) != 0);
/* library version */
buf_size = sizeof(buf);
- assert(gnutls_pkcs11_obj_get_info
- (obj, GNUTLS_PKCS11_OBJ_LIBRARY_VERSION, buf, &buf_size) >= 0);
+ assert(gnutls_pkcs11_obj_get_info(obj,
+ GNUTLS_PKCS11_OBJ_LIBRARY_VERSION,
+ buf, &buf_size) >= 0);
assert(buf_size != 0);
assert(strlen(buf) != 0);