summaryrefslogtreecommitdiff
path: root/tests/set_x509_ocsp_multi_cli.c
diff options
context:
space:
mode:
authorZoltan Fridrich <zfridric@redhat.com>2023-01-27 15:03:53 +0100
committerZoltan Fridrich <zfridric@redhat.com>2023-01-27 15:11:28 +0100
commit50e0c39fc9b8e0ae493f42a3046db5e70f8ea044 (patch)
tree36d6eb0dde4d81527a07017d6df7d1dd4b7e436e /tests/set_x509_ocsp_multi_cli.c
parent21288eb0ce9d27f00c4f8ac8048b22f4003f65ac (diff)
downloadgnutls-50e0c39fc9b8e0ae493f42a3046db5e70f8ea044.tar.gz
Indent code
Co-authored-by: Simon Josefsson <simon@josefsson.org> Signed-off-by: Zoltan Fridrich <zfridric@redhat.com>
Diffstat (limited to 'tests/set_x509_ocsp_multi_cli.c')
-rw-r--r--tests/set_x509_ocsp_multi_cli.c84
1 files changed, 57 insertions, 27 deletions
diff --git a/tests/set_x509_ocsp_multi_cli.c b/tests/set_x509_ocsp_multi_cli.c
index ae80ca3b0b..a99ffb991e 100644
--- a/tests/set_x509_ocsp_multi_cli.c
+++ b/tests/set_x509_ocsp_multi_cli.c
@@ -20,7 +20,7 @@
*/
#ifdef HAVE_CONFIG_H
-#include <config.h>
+# include <config.h>
#endif
#include <stdio.h>
@@ -31,9 +31,9 @@
#ifdef ENABLE_OCSP
-#include "cert-common.h"
-#include "ocsp-common.h"
-#include "utils.h"
+# include "cert-common.h"
+# include "ocsp-common.h"
+# include "utils.h"
/* Tests whether setting an OCSP response to a client
* is working as expected */
@@ -49,7 +49,8 @@ static time_t mytime(time_t * t)
static void check_cli(gnutls_session_t session, void *priv)
{
- assert((gnutls_session_get_flags(session) & GNUTLS_SFLAGS_SERV_REQUESTED_OCSP) != 0);
+ assert((gnutls_session_get_flags(session) &
+ GNUTLS_SFLAGS_SERV_REQUESTED_OCSP) != 0);
}
static void check_serv(gnutls_session_t session, void *priv)
@@ -59,7 +60,8 @@ static void check_serv(gnutls_session_t session, void *priv)
gnutls_datum_t resp;
gnutls_datum_t *exp_resp = priv;
- assert((gnutls_session_get_flags(session) & GNUTLS_SFLAGS_SERV_REQUESTED_OCSP) != 0);
+ assert((gnutls_session_get_flags(session) &
+ GNUTLS_SFLAGS_SERV_REQUESTED_OCSP) != 0);
ret = gnutls_ocsp_status_request_get(session, &resp);
if (ret < 0) {
@@ -72,7 +74,8 @@ static void check_serv(gnutls_session_t session, void *priv)
fail("not expected response, but received one\n");
}
- if (resp.size != exp_resp->size || memcmp(resp.data, exp_resp->data, resp.size) != 0) {
+ if (resp.size != exp_resp->size
+ || memcmp(resp.data, exp_resp->data, resp.size) != 0) {
fail("did not receive the expected response\n");
}
@@ -83,7 +86,9 @@ static void check_serv(gnutls_session_t session, void *priv)
fail("no intermediate response was received\n");
}
- if (resp.size != ocsp_subca3_unknown.size || memcmp(resp.data, ocsp_subca3_unknown.data, resp.size) != 0) {
+ if (resp.size != ocsp_subca3_unknown.size
+ || memcmp(resp.data, ocsp_subca3_unknown.data,
+ resp.size) != 0) {
fail("did not receive the expected intermediate response\n");
}
}
@@ -92,7 +97,9 @@ static void check_serv(gnutls_session_t session, void *priv)
if (ret != 0)
fail("error in verification (%s)\n", gnutls_strerror(ret));
- ret = gnutls_ocsp_status_request_is_checked(session, GNUTLS_OCSP_SR_IS_AVAIL);
+ ret =
+ gnutls_ocsp_status_request_is_checked(session,
+ GNUTLS_OCSP_SR_IS_AVAIL);
if (ret == 0) {
fail("did not receive the expected value (%d)\n", ret);
}
@@ -138,17 +145,23 @@ void doit(void)
fp = fopen(certfile1, "wb");
if (fp == NULL)
fail("error in fopen\n");
- assert(fwrite(server_localhost_ca3_cert_chain_pem, 1, strlen(server_localhost_ca3_cert_chain_pem), fp)>0);
- assert(fwrite(server_ca3_key_pem, 1, strlen((char*)server_ca3_key_pem), fp)>0);
+ assert(fwrite
+ (server_localhost_ca3_cert_chain_pem, 1,
+ strlen(server_localhost_ca3_cert_chain_pem), fp) > 0);
+ assert(fwrite
+ (server_ca3_key_pem, 1, strlen((char *)server_ca3_key_pem),
+ fp) > 0);
fclose(fp);
ret = gnutls_certificate_set_x509_key_file2(xcred, certfile1, certfile1,
- GNUTLS_X509_FMT_PEM, NULL, 0);
+ GNUTLS_X509_FMT_PEM, NULL,
+ 0);
if (ret < 0)
fail("set_x509_key_file failed: %s\n", gnutls_strerror(ret));
- ret = gnutls_certificate_set_x509_key_file2(clicred, certfile1, certfile1,
- GNUTLS_X509_FMT_PEM, NULL, 0);
+ ret =
+ gnutls_certificate_set_x509_key_file2(clicred, certfile1, certfile1,
+ GNUTLS_X509_FMT_PEM, NULL, 0);
if (ret < 0)
fail("set_x509_key_file failed: %s\n", gnutls_strerror(ret));
index1 = ret;
@@ -158,13 +171,21 @@ void doit(void)
fp = fopen(ocspfile1, "wb");
if (fp == NULL)
fail("error in fopen\n");
- assert(fwrite(ocsp_subca3_unknown_pem.data, 1, ocsp_subca3_unknown_pem.size, fp)>0);
- assert(fwrite(ocsp_ca3_localhost_unknown_pem.data, 1, ocsp_ca3_localhost_unknown_pem.size, fp)>0);
- assert(fwrite(ocsp_ca3_localhost6_unknown_pem.data, 1, ocsp_ca3_localhost6_unknown_pem.size, fp)>0);
+ assert(fwrite
+ (ocsp_subca3_unknown_pem.data, 1, ocsp_subca3_unknown_pem.size,
+ fp) > 0);
+ assert(fwrite
+ (ocsp_ca3_localhost_unknown_pem.data, 1,
+ ocsp_ca3_localhost_unknown_pem.size, fp) > 0);
+ assert(fwrite
+ (ocsp_ca3_localhost6_unknown_pem.data, 1,
+ ocsp_ca3_localhost6_unknown_pem.size, fp) > 0);
fclose(fp);
- ret = gnutls_certificate_set_ocsp_status_request_file2(clicred, ocspfile1, index1,
- GNUTLS_X509_FMT_PEM);
+ ret =
+ gnutls_certificate_set_ocsp_status_request_file2(clicred, ocspfile1,
+ index1,
+ GNUTLS_X509_FMT_PEM);
if (ret != GNUTLS_E_OCSP_MISMATCH_WITH_CERTS)
fail("ocsp file set failed: %s\n", gnutls_strerror(ret));
@@ -173,16 +194,24 @@ void doit(void)
fp = fopen(ocspfile1, "wb");
if (fp == NULL)
fail("error in fopen\n");
- assert(fwrite(ocsp_subca3_unknown_pem.data, 1, ocsp_subca3_unknown_pem.size, fp)>0);
- assert(fwrite(ocsp_ca3_localhost_unknown_pem.data, 1, ocsp_ca3_localhost_unknown_pem.size, fp)>0);
+ assert(fwrite
+ (ocsp_subca3_unknown_pem.data, 1, ocsp_subca3_unknown_pem.size,
+ fp) > 0);
+ assert(fwrite
+ (ocsp_ca3_localhost_unknown_pem.data, 1,
+ ocsp_ca3_localhost_unknown_pem.size, fp) > 0);
fclose(fp);
- ret = gnutls_certificate_set_ocsp_status_request_file2(clicred, ocspfile1, index1,
- GNUTLS_X509_FMT_PEM);
+ ret =
+ gnutls_certificate_set_ocsp_status_request_file2(clicred, ocspfile1,
+ index1,
+ GNUTLS_X509_FMT_PEM);
if (ret < 0)
fail("ocsp file set failed: %s\n", gnutls_strerror(ret));
- ret = gnutls_certificate_set_x509_trust_mem(clicred, &ca3_cert, GNUTLS_X509_FMT_PEM);
+ ret =
+ gnutls_certificate_set_x509_trust_mem(clicred, &ca3_cert,
+ GNUTLS_X509_FMT_PEM);
if (ret < 0) {
fail("error in setting trust cert: %s\n", gnutls_strerror(ret));
}
@@ -199,9 +228,10 @@ void doit(void)
if (t != 1509625639)
fail("error in OCSP validity time: %ld\n", (long int)t);
-#define PRIO "NORMAL:-ECDHE-ECDSA:-VERS-TLS-ALL:+VERS-TLS1.3"
- _test_cli_serv(xcred, clicred, PRIO, PRIO, "localhost", &ocsp_ca3_localhost_unknown, check_cli,
- check_serv, 0, 1, 0, 0);
+# define PRIO "NORMAL:-ECDHE-ECDSA:-VERS-TLS-ALL:+VERS-TLS1.3"
+ _test_cli_serv(xcred, clicred, PRIO, PRIO, "localhost",
+ &ocsp_ca3_localhost_unknown, check_cli, check_serv, 0, 1,
+ 0, 0);
gnutls_certificate_free_credentials(xcred);
gnutls_certificate_free_credentials(clicred);