diff options
author | Zoltan Fridrich <zfridric@redhat.com> | 2023-01-27 15:03:53 +0100 |
---|---|---|
committer | Zoltan Fridrich <zfridric@redhat.com> | 2023-01-27 15:11:28 +0100 |
commit | 50e0c39fc9b8e0ae493f42a3046db5e70f8ea044 (patch) | |
tree | 36d6eb0dde4d81527a07017d6df7d1dd4b7e436e /tests/set_x509_ocsp_multi_cli.c | |
parent | 21288eb0ce9d27f00c4f8ac8048b22f4003f65ac (diff) | |
download | gnutls-50e0c39fc9b8e0ae493f42a3046db5e70f8ea044.tar.gz |
Indent code
Co-authored-by: Simon Josefsson <simon@josefsson.org>
Signed-off-by: Zoltan Fridrich <zfridric@redhat.com>
Diffstat (limited to 'tests/set_x509_ocsp_multi_cli.c')
-rw-r--r-- | tests/set_x509_ocsp_multi_cli.c | 84 |
1 files changed, 57 insertions, 27 deletions
diff --git a/tests/set_x509_ocsp_multi_cli.c b/tests/set_x509_ocsp_multi_cli.c index ae80ca3b0b..a99ffb991e 100644 --- a/tests/set_x509_ocsp_multi_cli.c +++ b/tests/set_x509_ocsp_multi_cli.c @@ -20,7 +20,7 @@ */ #ifdef HAVE_CONFIG_H -#include <config.h> +# include <config.h> #endif #include <stdio.h> @@ -31,9 +31,9 @@ #ifdef ENABLE_OCSP -#include "cert-common.h" -#include "ocsp-common.h" -#include "utils.h" +# include "cert-common.h" +# include "ocsp-common.h" +# include "utils.h" /* Tests whether setting an OCSP response to a client * is working as expected */ @@ -49,7 +49,8 @@ static time_t mytime(time_t * t) static void check_cli(gnutls_session_t session, void *priv) { - assert((gnutls_session_get_flags(session) & GNUTLS_SFLAGS_SERV_REQUESTED_OCSP) != 0); + assert((gnutls_session_get_flags(session) & + GNUTLS_SFLAGS_SERV_REQUESTED_OCSP) != 0); } static void check_serv(gnutls_session_t session, void *priv) @@ -59,7 +60,8 @@ static void check_serv(gnutls_session_t session, void *priv) gnutls_datum_t resp; gnutls_datum_t *exp_resp = priv; - assert((gnutls_session_get_flags(session) & GNUTLS_SFLAGS_SERV_REQUESTED_OCSP) != 0); + assert((gnutls_session_get_flags(session) & + GNUTLS_SFLAGS_SERV_REQUESTED_OCSP) != 0); ret = gnutls_ocsp_status_request_get(session, &resp); if (ret < 0) { @@ -72,7 +74,8 @@ static void check_serv(gnutls_session_t session, void *priv) fail("not expected response, but received one\n"); } - if (resp.size != exp_resp->size || memcmp(resp.data, exp_resp->data, resp.size) != 0) { + if (resp.size != exp_resp->size + || memcmp(resp.data, exp_resp->data, resp.size) != 0) { fail("did not receive the expected response\n"); } @@ -83,7 +86,9 @@ static void check_serv(gnutls_session_t session, void *priv) fail("no intermediate response was received\n"); } - if (resp.size != ocsp_subca3_unknown.size || memcmp(resp.data, ocsp_subca3_unknown.data, resp.size) != 0) { + if (resp.size != ocsp_subca3_unknown.size + || memcmp(resp.data, ocsp_subca3_unknown.data, + resp.size) != 0) { fail("did not receive the expected intermediate response\n"); } } @@ -92,7 +97,9 @@ static void check_serv(gnutls_session_t session, void *priv) if (ret != 0) fail("error in verification (%s)\n", gnutls_strerror(ret)); - ret = gnutls_ocsp_status_request_is_checked(session, GNUTLS_OCSP_SR_IS_AVAIL); + ret = + gnutls_ocsp_status_request_is_checked(session, + GNUTLS_OCSP_SR_IS_AVAIL); if (ret == 0) { fail("did not receive the expected value (%d)\n", ret); } @@ -138,17 +145,23 @@ void doit(void) fp = fopen(certfile1, "wb"); if (fp == NULL) fail("error in fopen\n"); - assert(fwrite(server_localhost_ca3_cert_chain_pem, 1, strlen(server_localhost_ca3_cert_chain_pem), fp)>0); - assert(fwrite(server_ca3_key_pem, 1, strlen((char*)server_ca3_key_pem), fp)>0); + assert(fwrite + (server_localhost_ca3_cert_chain_pem, 1, + strlen(server_localhost_ca3_cert_chain_pem), fp) > 0); + assert(fwrite + (server_ca3_key_pem, 1, strlen((char *)server_ca3_key_pem), + fp) > 0); fclose(fp); ret = gnutls_certificate_set_x509_key_file2(xcred, certfile1, certfile1, - GNUTLS_X509_FMT_PEM, NULL, 0); + GNUTLS_X509_FMT_PEM, NULL, + 0); if (ret < 0) fail("set_x509_key_file failed: %s\n", gnutls_strerror(ret)); - ret = gnutls_certificate_set_x509_key_file2(clicred, certfile1, certfile1, - GNUTLS_X509_FMT_PEM, NULL, 0); + ret = + gnutls_certificate_set_x509_key_file2(clicred, certfile1, certfile1, + GNUTLS_X509_FMT_PEM, NULL, 0); if (ret < 0) fail("set_x509_key_file failed: %s\n", gnutls_strerror(ret)); index1 = ret; @@ -158,13 +171,21 @@ void doit(void) fp = fopen(ocspfile1, "wb"); if (fp == NULL) fail("error in fopen\n"); - assert(fwrite(ocsp_subca3_unknown_pem.data, 1, ocsp_subca3_unknown_pem.size, fp)>0); - assert(fwrite(ocsp_ca3_localhost_unknown_pem.data, 1, ocsp_ca3_localhost_unknown_pem.size, fp)>0); - assert(fwrite(ocsp_ca3_localhost6_unknown_pem.data, 1, ocsp_ca3_localhost6_unknown_pem.size, fp)>0); + assert(fwrite + (ocsp_subca3_unknown_pem.data, 1, ocsp_subca3_unknown_pem.size, + fp) > 0); + assert(fwrite + (ocsp_ca3_localhost_unknown_pem.data, 1, + ocsp_ca3_localhost_unknown_pem.size, fp) > 0); + assert(fwrite + (ocsp_ca3_localhost6_unknown_pem.data, 1, + ocsp_ca3_localhost6_unknown_pem.size, fp) > 0); fclose(fp); - ret = gnutls_certificate_set_ocsp_status_request_file2(clicred, ocspfile1, index1, - GNUTLS_X509_FMT_PEM); + ret = + gnutls_certificate_set_ocsp_status_request_file2(clicred, ocspfile1, + index1, + GNUTLS_X509_FMT_PEM); if (ret != GNUTLS_E_OCSP_MISMATCH_WITH_CERTS) fail("ocsp file set failed: %s\n", gnutls_strerror(ret)); @@ -173,16 +194,24 @@ void doit(void) fp = fopen(ocspfile1, "wb"); if (fp == NULL) fail("error in fopen\n"); - assert(fwrite(ocsp_subca3_unknown_pem.data, 1, ocsp_subca3_unknown_pem.size, fp)>0); - assert(fwrite(ocsp_ca3_localhost_unknown_pem.data, 1, ocsp_ca3_localhost_unknown_pem.size, fp)>0); + assert(fwrite + (ocsp_subca3_unknown_pem.data, 1, ocsp_subca3_unknown_pem.size, + fp) > 0); + assert(fwrite + (ocsp_ca3_localhost_unknown_pem.data, 1, + ocsp_ca3_localhost_unknown_pem.size, fp) > 0); fclose(fp); - ret = gnutls_certificate_set_ocsp_status_request_file2(clicred, ocspfile1, index1, - GNUTLS_X509_FMT_PEM); + ret = + gnutls_certificate_set_ocsp_status_request_file2(clicred, ocspfile1, + index1, + GNUTLS_X509_FMT_PEM); if (ret < 0) fail("ocsp file set failed: %s\n", gnutls_strerror(ret)); - ret = gnutls_certificate_set_x509_trust_mem(clicred, &ca3_cert, GNUTLS_X509_FMT_PEM); + ret = + gnutls_certificate_set_x509_trust_mem(clicred, &ca3_cert, + GNUTLS_X509_FMT_PEM); if (ret < 0) { fail("error in setting trust cert: %s\n", gnutls_strerror(ret)); } @@ -199,9 +228,10 @@ void doit(void) if (t != 1509625639) fail("error in OCSP validity time: %ld\n", (long int)t); -#define PRIO "NORMAL:-ECDHE-ECDSA:-VERS-TLS-ALL:+VERS-TLS1.3" - _test_cli_serv(xcred, clicred, PRIO, PRIO, "localhost", &ocsp_ca3_localhost_unknown, check_cli, - check_serv, 0, 1, 0, 0); +# define PRIO "NORMAL:-ECDHE-ECDSA:-VERS-TLS-ALL:+VERS-TLS1.3" + _test_cli_serv(xcred, clicred, PRIO, PRIO, "localhost", + &ocsp_ca3_localhost_unknown, check_cli, check_serv, 0, 1, + 0, 0); gnutls_certificate_free_credentials(xcred); gnutls_certificate_free_credentials(clicred); |