summaryrefslogtreecommitdiff
path: root/tests/cert-status.c
diff options
context:
space:
mode:
Diffstat (limited to 'tests/cert-status.c')
-rw-r--r--tests/cert-status.c67
1 files changed, 33 insertions, 34 deletions
diff --git a/tests/cert-status.c b/tests/cert-status.c
index 61d3272f0c..20cb767297 100644
--- a/tests/cert-status.c
+++ b/tests/cert-status.c
@@ -20,7 +20,7 @@
*/
#ifdef HAVE_CONFIG_H
-#include <config.h>
+# include <config.h>
#endif
#include <stdio.h>
@@ -35,20 +35,20 @@ int main(void)
#else
-#include <string.h>
-#include <sys/types.h>
-#include <netinet/in.h>
-#include <sys/socket.h>
-#include <sys/wait.h>
-#include <arpa/inet.h>
-#include <unistd.h>
-#include <gnutls/gnutls.h>
-#include <gnutls/dtls.h>
-#include <assert.h>
-#include <signal.h>
-
-#include "utils.h"
-#include "cert-common.h"
+# include <string.h>
+# include <sys/types.h>
+# include <netinet/in.h>
+# include <sys/socket.h>
+# include <sys/wait.h>
+# include <arpa/inet.h>
+# include <unistd.h>
+# include <gnutls/gnutls.h>
+# include <gnutls/dtls.h>
+# include <assert.h>
+# include <signal.h>
+
+# include "utils.h"
+# include "cert-common.h"
/* This program tests whether the GNUTLS_CERT_* flags
* work as expected.
@@ -64,7 +64,7 @@ static void client_log_func(int level, const char *str)
fprintf(stderr, "client|<%d>| %s", level, str);
}
-#define MAX_BUF 1024
+# define MAX_BUF 1024
static void client(int fd, const char *prio)
{
@@ -84,9 +84,7 @@ static void client(int fd, const char *prio)
gnutls_init(&session, GNUTLS_CLIENT);
- ret =
- gnutls_priority_set_direct(session,
- prio, &p);
+ ret = gnutls_priority_set_direct(session, prio, &p);
if (ret < 0) {
fail("error in setting priority: %s\n", p);
exit(1);
@@ -128,7 +126,6 @@ static void client(int fd, const char *prio)
gnutls_global_deinit();
}
-
static void server(int fd, const char *prio, unsigned status, int expected)
{
int ret;
@@ -143,8 +140,7 @@ static void server(int fd, const char *prio, unsigned status, int expected)
gnutls_init(&session, GNUTLS_SERVER);
- assert(gnutls_priority_set_direct(session,
- prio, NULL)>=0);
+ assert(gnutls_priority_set_direct(session, prio, NULL) >= 0);
if (debug) {
gnutls_global_set_log_function(server_log_func);
@@ -153,8 +149,7 @@ static void server(int fd, const char *prio, unsigned status, int expected)
gnutls_certificate_allocate_credentials(&x509_cred);
gnutls_certificate_set_x509_key_mem(x509_cred, &server_cert,
- &server_key,
- GNUTLS_X509_FMT_PEM);
+ &server_key, GNUTLS_X509_FMT_PEM);
gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, x509_cred);
@@ -169,11 +164,11 @@ static void server(int fd, const char *prio, unsigned status, int expected)
if (ret == expected) {
if (debug)
success
- ("server: Handshake finished as expected (%d)\n", ret);
+ ("server: Handshake finished as expected (%d)\n",
+ ret);
goto finish;
} else {
- fail("expected %d, handshake returned %d\n", expected,
- ret);
+ fail("expected %d, handshake returned %d\n", expected, ret);
}
if (debug)
@@ -183,7 +178,7 @@ static void server(int fd, const char *prio, unsigned status, int expected)
success("server: TLS version is: %s\n",
gnutls_protocol_get_name
(gnutls_protocol_get_version(session)));
- finish:
+ finish:
close(fd);
gnutls_deinit(session);
@@ -235,23 +230,27 @@ static void ch_handler(int sig)
return;
}
-
void doit(void)
{
signal(SIGCHLD, ch_handler);
signal(SIGPIPE, SIG_IGN);
- start("NONE:+VERS-TLS1.0:+AES-128-CBC:+SHA1:+SIGN-ALL:+COMP-NULL:+RSA", GNUTLS_CERT_IGNORE, 0);
- start("NONE:+VERS-TLS1.0:+AES-128-CBC:+SHA1:+SIGN-ALL:+COMP-NULL:+RSA", GNUTLS_CERT_REQUEST, 0);
- start("NONE:+VERS-TLS1.0:+AES-128-CBC:+SHA1:+SIGN-ALL:+COMP-NULL:+RSA", GNUTLS_CERT_REQUIRE, GNUTLS_E_NO_CERTIFICATE_FOUND);
+ start("NONE:+VERS-TLS1.0:+AES-128-CBC:+SHA1:+SIGN-ALL:+COMP-NULL:+RSA",
+ GNUTLS_CERT_IGNORE, 0);
+ start("NONE:+VERS-TLS1.0:+AES-128-CBC:+SHA1:+SIGN-ALL:+COMP-NULL:+RSA",
+ GNUTLS_CERT_REQUEST, 0);
+ start("NONE:+VERS-TLS1.0:+AES-128-CBC:+SHA1:+SIGN-ALL:+COMP-NULL:+RSA",
+ GNUTLS_CERT_REQUIRE, GNUTLS_E_NO_CERTIFICATE_FOUND);
start("NORMAL:-VERS-ALL:+VERS-TLS1.2", GNUTLS_CERT_IGNORE, 0);
start("NORMAL:-VERS-ALL:+VERS-TLS1.2", GNUTLS_CERT_REQUEST, 0);
- start("NORMAL:-VERS-ALL:+VERS-TLS1.2", GNUTLS_CERT_REQUIRE, GNUTLS_E_NO_CERTIFICATE_FOUND);
+ start("NORMAL:-VERS-ALL:+VERS-TLS1.2", GNUTLS_CERT_REQUIRE,
+ GNUTLS_E_NO_CERTIFICATE_FOUND);
start("NORMAL:-VERS-ALL:+VERS-TLS1.3", GNUTLS_CERT_IGNORE, 0);
start("NORMAL:-VERS-ALL:+VERS-TLS1.3", GNUTLS_CERT_REQUEST, 0);
- start("NORMAL:-VERS-ALL:+VERS-TLS1.3", GNUTLS_CERT_REQUIRE, GNUTLS_E_CERTIFICATE_REQUIRED);
+ start("NORMAL:-VERS-ALL:+VERS-TLS1.3", GNUTLS_CERT_REQUIRE,
+ GNUTLS_E_CERTIFICATE_REQUIRED);
start("NORMAL", GNUTLS_CERT_IGNORE, 0);
start("NORMAL", GNUTLS_CERT_REQUEST, 0);