diff options
author | Simon Josefsson <simon@josefsson.org> | 2010-04-14 14:51:01 +0200 |
---|---|---|
committer | Simon Josefsson <simon@josefsson.org> | 2010-04-14 14:51:01 +0200 |
commit | a23f37448755d89924f791999432b76f490cb2bf (patch) | |
tree | 188c331f124e69d62fc7e9be2d8d5cab90469b24 /tests/x509self.c | |
parent | 705aa8cd3da09abedd6eb5d0d55610b644e4f98d (diff) | |
download | gnutls-a23f37448755d89924f791999432b76f490cb2bf.tar.gz |
Indent code.
Diffstat (limited to 'tests/x509self.c')
-rw-r--r-- | tests/x509self.c | 63 |
1 files changed, 40 insertions, 23 deletions
diff --git a/tests/x509self.c b/tests/x509self.c index e0e620f89e..39aaeca225 100644 --- a/tests/x509self.c +++ b/tests/x509self.c @@ -161,17 +161,21 @@ client (void) success ("client: Handshake was completed\n"); } - if (debug) success ("client: TLS version is: %s\n", - gnutls_protocol_get_name (gnutls_protocol_get_version (session))); + if (debug) + success ("client: TLS version is: %s\n", + gnutls_protocol_get_name (gnutls_protocol_get_version + (session))); /* see the Getting peer's information example */ - if (debug) print_info (session); + if (debug) + print_info (session); ret = gnutls_record_send (session, MSG, strlen (MSG)); if (ret == strlen (MSG)) { - if (debug) success ("client: sent record.\n"); + if (debug) + success ("client: sent record.\n"); } else { @@ -182,15 +186,18 @@ client (void) ret = gnutls_record_recv (session, buffer, MAX_BUF); - if (debug) success ("client: recv returned %d.\n", ret); + if (debug) + success ("client: recv returned %d.\n", ret); if (ret == GNUTLS_E_REHANDSHAKE) { - if (debug) success ("client: doing handshake!\n"); + if (debug) + success ("client: doing handshake!\n"); ret = gnutls_handshake (session); if (ret == 0) { - if (debug) success ("client: handshake complete, reading again.\n"); + if (debug) + success ("client: handshake complete, reading again.\n"); ret = gnutls_record_recv (session, buffer, MAX_BUF); } else @@ -201,7 +208,8 @@ client (void) if (ret == 0) { - if (debug) success ("client: Peer has closed the TLS connection\n"); + if (debug) + success ("client: Peer has closed the TLS connection\n"); goto end; } else if (ret < 0) @@ -210,13 +218,13 @@ client (void) goto end; } - if (debug) + if (debug) { printf ("- Received %d bytes: ", ret); for (ii = 0; ii < ret; ii++) - { - fputc (buffer[ii], stdout); - } + { + fputc (buffer[ii], stdout); + } fputs ("\n", stdout); } @@ -372,7 +380,8 @@ server_start (void) return; } - if (debug) success ("server: ready. Listening to port '%d'.\n", PORT); + if (debug) + success ("server: ready. Listening to port '%d'.\n", PORT); } static void @@ -392,7 +401,8 @@ server (void) gnutls_certificate_set_x509_key_mem (x509_cred, &server_cert, &server_key, GNUTLS_X509_FMT_PEM); - if (debug) success ("Launched, generating DH parameters...\n"); + if (debug) + success ("Launched, generating DH parameters...\n"); generate_dh_params (); @@ -404,9 +414,10 @@ server (void) sd = accept (listen_sd, (SA *) & sa_cli, &client_len); - if (debug) success ("server: connection from %s, port %d\n", - inet_ntop (AF_INET, &sa_cli.sin_addr, topbuf, - sizeof (topbuf)), ntohs (sa_cli.sin_port)); + if (debug) + success ("server: connection from %s, port %d\n", + inet_ntop (AF_INET, &sa_cli.sin_addr, topbuf, + sizeof (topbuf)), ntohs (sa_cli.sin_port)); gnutls_transport_set_ptr (session, (gnutls_transport_ptr_t) sd); ret = gnutls_handshake (session); @@ -421,11 +432,13 @@ server (void) { success ("server: Handshake was completed\n"); success ("server: TLS version is: %s\n", - gnutls_protocol_get_name (gnutls_protocol_get_version (session))); + gnutls_protocol_get_name (gnutls_protocol_get_version + (session))); } /* see the Getting peer's information example */ - if (debug) print_info (session); + if (debug) + print_info (session); i = 0; for (;;) @@ -435,7 +448,8 @@ server (void) if (ret == 0) { - if (debug) success ("server: Peer has closed the GNUTLS connection\n"); + if (debug) + success ("server: Peer has closed the GNUTLS connection\n"); break; } else if (ret < 0) @@ -448,7 +462,8 @@ server (void) gnutls_certificate_server_set_request (session, GNUTLS_CERT_REQUEST); - if (debug) success ("server: got data, forcing rehandshake.\n"); + if (debug) + success ("server: got data, forcing rehandshake.\n"); ret = gnutls_rehandshake (session); if (ret < 0) @@ -466,7 +481,8 @@ server (void) break; } - if (debug) success ("server: rehandshake complete.\n"); + if (debug) + success ("server: rehandshake complete.\n"); /* echo data back to the client */ @@ -488,7 +504,8 @@ server (void) gnutls_global_deinit (); - if (debug) success ("server: finished\n"); + if (debug) + success ("server: finished\n"); } |