diff options
author | Daiki Ueno <ueno@gnu.org> | 2023-04-24 12:39:42 +0900 |
---|---|---|
committer | Daiki Ueno <ueno@gnu.org> | 2023-04-24 12:45:46 +0900 |
commit | aa5950abab56b011331ad4331409b6ff8efb8aeb (patch) | |
tree | ad363fb38e8b65c942876641cda9c76caa13b498 /tests/pkcs11/pkcs11-obj-import.c | |
parent | 0fe9cb6842d63761718046cc7dd7eb437e6c5163 (diff) | |
download | gnutls-aa5950abab56b011331ad4331409b6ff8efb8aeb.tar.gz |
build: re-indent code
Signed-off-by: Daiki Ueno <ueno@gnu.org>
Diffstat (limited to 'tests/pkcs11/pkcs11-obj-import.c')
-rw-r--r-- | tests/pkcs11/pkcs11-obj-import.c | 93 |
1 files changed, 47 insertions, 46 deletions
diff --git a/tests/pkcs11/pkcs11-obj-import.c b/tests/pkcs11/pkcs11-obj-import.c index 07c1a30292..9004b27f95 100644 --- a/tests/pkcs11/pkcs11-obj-import.c +++ b/tests/pkcs11/pkcs11-obj-import.c @@ -20,7 +20,7 @@ */ #ifdef HAVE_CONFIG_H -# include <config.h> +#include <config.h> #endif #include <stdio.h> @@ -34,7 +34,7 @@ #include <gnutls/abstract.h> #define CONFIG_NAME "softhsm-obj-import" -#define CONFIG CONFIG_NAME".config" +#define CONFIG CONFIG_NAME ".config" #include "../utils.h" #include "softhsm.h" @@ -51,9 +51,9 @@ static void tls_log_func(int level, const char *str) fprintf(stderr, "|<%d>| %s", level, str); } -static -int pin_func(void *userdata, int attempt, const char *url, const char *label, - unsigned flags, char *pin, size_t pin_max) +static int pin_func(void *userdata, int attempt, const char *url, + const char *label, unsigned flags, char *pin, + size_t pin_max) { if (attempt == 0) { strcpy(pin, PIN); @@ -93,8 +93,9 @@ void doit(void) set_softhsm_conf(CONFIG); snprintf(buf, sizeof(buf), - "%s --init-token --slot 0 --label test --so-pin " PIN " --pin " - PIN, bin); + "%s --init-token --slot 0 --label test --so-pin " PIN + " --pin " PIN, + bin); system(buf); ret = gnutls_pkcs11_add_provider(lib, NULL); @@ -106,15 +107,15 @@ void doit(void) ret = gnutls_x509_crt_init(&crt); if (ret < 0) { - fprintf(stderr, - "gnutls_x509_crt_init: %s\n", gnutls_strerror(ret)); + fprintf(stderr, "gnutls_x509_crt_init: %s\n", + gnutls_strerror(ret)); exit(1); } ret = gnutls_x509_crt_import(crt, &server_cert, GNUTLS_X509_FMT_PEM); if (ret < 0) { - fprintf(stderr, - "gnutls_x509_crt_import: %s\n", gnutls_strerror(ret)); + fprintf(stderr, "gnutls_x509_crt_import: %s\n", + gnutls_strerror(ret)); exit(1); } @@ -132,17 +133,17 @@ void doit(void) exit(1); } - ret = - gnutls_pkcs11_token_set_pin(SOFTHSM_URL, NULL, PIN, - GNUTLS_PIN_USER); + ret = gnutls_pkcs11_token_set_pin(SOFTHSM_URL, NULL, PIN, + GNUTLS_PIN_USER); if (ret < 0) { fail("gnutls_pkcs11_token_set_pin: %s\n", gnutls_strerror(ret)); exit(1); } - ret = gnutls_pkcs11_copy_x509_crt(SOFTHSM_URL, crt, "cert", - GNUTLS_PKCS11_OBJ_FLAG_MARK_NOT_PRIVATE - | GNUTLS_PKCS11_OBJ_FLAG_LOGIN); + ret = gnutls_pkcs11_copy_x509_crt( + SOFTHSM_URL, crt, "cert", + GNUTLS_PKCS11_OBJ_FLAG_MARK_NOT_PRIVATE | + GNUTLS_PKCS11_OBJ_FLAG_LOGIN); if (ret < 0) { fail("gnutls_pkcs11_copy_x509_crt: %s\n", gnutls_strerror(ret)); exit(1); @@ -159,8 +160,8 @@ void doit(void) exit(1); } - assert(gnutls_pkcs11_obj_export_url - (obj, GNUTLS_PKCS11_URL_GENERIC, &url) >= 0); + assert(gnutls_pkcs11_obj_export_url(obj, GNUTLS_PKCS11_URL_GENERIC, + &url) >= 0); assert(url != NULL); gnutls_free(url); @@ -186,76 +187,76 @@ void doit(void) /* The ID is constant and copied from the certificate */ buf_size = sizeof(buf); - assert(gnutls_pkcs11_obj_get_info - (obj, GNUTLS_PKCS11_OBJ_ID_HEX, buf, &buf_size) >= 0); + assert(gnutls_pkcs11_obj_get_info(obj, GNUTLS_PKCS11_OBJ_ID_HEX, buf, + &buf_size) >= 0); assert(buf_size == 60); - assert(memcmp - (buf, - "95:d1:ad:a4:52:e4:c5:61:12:a6:91:13:8d:80:dd:2d:81:22:3e:d4", - 60) == 0); + assert(memcmp(buf, + "95:d1:ad:a4:52:e4:c5:61:12:a6:91:13:8d:80:dd:2d:81:22:3e:d4", + 60) == 0); /* label */ buf_size = sizeof(buf); - assert(gnutls_pkcs11_obj_get_info - (obj, GNUTLS_PKCS11_OBJ_LABEL, buf, &buf_size) >= 0); + assert(gnutls_pkcs11_obj_get_info(obj, GNUTLS_PKCS11_OBJ_LABEL, buf, + &buf_size) >= 0); assert(buf_size == 4); assert(memcmp(buf, "cert", 4) == 0); /* token-label */ buf_size = sizeof(buf); - assert(gnutls_pkcs11_obj_get_info - (obj, GNUTLS_PKCS11_OBJ_TOKEN_LABEL, buf, &buf_size) >= 0); + assert(gnutls_pkcs11_obj_get_info(obj, GNUTLS_PKCS11_OBJ_TOKEN_LABEL, + buf, &buf_size) >= 0); assert(buf_size == 4); assert(memcmp(buf, "test", 4) == 0); /* token-serial */ buf_size = sizeof(buf); - assert(gnutls_pkcs11_obj_get_info - (obj, GNUTLS_PKCS11_OBJ_TOKEN_SERIAL, buf, &buf_size) >= 0); + assert(gnutls_pkcs11_obj_get_info(obj, GNUTLS_PKCS11_OBJ_TOKEN_SERIAL, + buf, &buf_size) >= 0); assert(buf_size != 0); assert(strlen(buf) != 0); /* token-model */ buf_size = sizeof(buf); - assert(gnutls_pkcs11_obj_get_info - (obj, GNUTLS_PKCS11_OBJ_TOKEN_MODEL, buf, &buf_size) >= 0); + assert(gnutls_pkcs11_obj_get_info(obj, GNUTLS_PKCS11_OBJ_TOKEN_MODEL, + buf, &buf_size) >= 0); assert(buf_size != 0); assert(strlen(buf) != 0); /* token-manufacturer */ buf_size = sizeof(buf); - assert(gnutls_pkcs11_obj_get_info - (obj, GNUTLS_PKCS11_OBJ_TOKEN_MANUFACTURER, buf, - &buf_size) >= 0); + assert(gnutls_pkcs11_obj_get_info(obj, + GNUTLS_PKCS11_OBJ_TOKEN_MANUFACTURER, + buf, &buf_size) >= 0); assert(buf_size != 0); assert(strlen(buf) != 0); /* token-ID */ buf_size = sizeof(buf); - assert(gnutls_pkcs11_obj_get_info - (obj, GNUTLS_PKCS11_OBJ_ID, buf, &buf_size) >= 0); + assert(gnutls_pkcs11_obj_get_info(obj, GNUTLS_PKCS11_OBJ_ID, buf, + &buf_size) >= 0); assert(buf_size != 0); /* library description */ buf_size = sizeof(buf); - assert(gnutls_pkcs11_obj_get_info - (obj, GNUTLS_PKCS11_OBJ_LIBRARY_DESCRIPTION, buf, - &buf_size) >= 0); + assert(gnutls_pkcs11_obj_get_info(obj, + GNUTLS_PKCS11_OBJ_LIBRARY_DESCRIPTION, + buf, &buf_size) >= 0); assert(buf_size != 0); assert(strlen(buf) != 0); /* library manufacturer */ buf_size = sizeof(buf); - assert(gnutls_pkcs11_obj_get_info - (obj, GNUTLS_PKCS11_OBJ_LIBRARY_MANUFACTURER, buf, - &buf_size) >= 0); + assert(gnutls_pkcs11_obj_get_info( + obj, GNUTLS_PKCS11_OBJ_LIBRARY_MANUFACTURER, buf, + &buf_size) >= 0); assert(buf_size != 0); assert(strlen(buf) != 0); /* library version */ buf_size = sizeof(buf); - assert(gnutls_pkcs11_obj_get_info - (obj, GNUTLS_PKCS11_OBJ_LIBRARY_VERSION, buf, &buf_size) >= 0); + assert(gnutls_pkcs11_obj_get_info(obj, + GNUTLS_PKCS11_OBJ_LIBRARY_VERSION, + buf, &buf_size) >= 0); assert(buf_size != 0); assert(strlen(buf) != 0); |