diff options
Diffstat (limited to 'tests/dtls-session-ticket-lost.c')
-rw-r--r-- | tests/dtls-session-ticket-lost.c | 60 |
1 files changed, 30 insertions, 30 deletions
diff --git a/tests/dtls-session-ticket-lost.c b/tests/dtls-session-ticket-lost.c index 236b303961..e174563204 100644 --- a/tests/dtls-session-ticket-lost.c +++ b/tests/dtls-session-ticket-lost.c @@ -20,7 +20,7 @@ */ #ifdef HAVE_CONFIG_H -#include <config.h> +# include <config.h> #endif #include <stdio.h> @@ -35,20 +35,20 @@ int main(void) #else -#include <string.h> -#include <sys/types.h> -#include <netinet/in.h> -#include <sys/socket.h> -#include <sys/wait.h> -#include <arpa/inet.h> -#include <unistd.h> -#include <gnutls/gnutls.h> -#include <gnutls/dtls.h> -#include <signal.h> -#include <assert.h> - -#include "cert-common.h" -#include "utils.h" +# include <string.h> +# include <sys/types.h> +# include <netinet/in.h> +# include <sys/socket.h> +# include <sys/wait.h> +# include <arpa/inet.h> +# include <unistd.h> +# include <gnutls/gnutls.h> +# include <gnutls/dtls.h> +# include <signal.h> +# include <assert.h> + +# include "cert-common.h" +# include "utils.h" /* This program is a reproducer for issue #543; the timeout * of DTLS handshake when a NewSessionTicket is lost. @@ -64,7 +64,7 @@ static void client_log_func(int level, const char *str) fprintf(stderr, "client|<%d>| %s", level, str); } -#define MAX_BUF 1024 +# define MAX_BUF 1024 static void client(int fd, const char *prio) { @@ -79,9 +79,9 @@ static void client(int fd, const char *prio) gnutls_certificate_allocate_credentials(&x509_cred); - assert(gnutls_init(&session, GNUTLS_CLIENT|GNUTLS_DATAGRAM)>=0); + assert(gnutls_init(&session, GNUTLS_CLIENT | GNUTLS_DATAGRAM) >= 0); - assert(gnutls_priority_set_direct(session, prio, NULL)>=0); + assert(gnutls_priority_set_direct(session, prio, NULL) >= 0); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, x509_cred); @@ -99,11 +99,11 @@ static void client(int fd, const char *prio) success("client: Handshake was completed\n"); } - gnutls_record_set_timeout(session, 30*1000); + gnutls_record_set_timeout(session, 30 * 1000); do { ret = gnutls_bye(session, GNUTLS_SHUT_WR); - } while(ret == GNUTLS_E_AGAIN || ret == GNUTLS_E_INTERRUPTED); + } while (ret == GNUTLS_E_AGAIN || ret == GNUTLS_E_INTERRUPTED); close(fd); @@ -112,7 +112,6 @@ static void client(int fd, const char *prio) gnutls_certificate_free_credentials(x509_cred); } - static ssize_t server_push(gnutls_transport_ptr_t tr, const void *data, size_t len) { @@ -121,7 +120,8 @@ server_push(gnutls_transport_ptr_t tr, const void *data, size_t len) if (d[13] == GNUTLS_HANDSHAKE_NEW_SESSION_TICKET) { if (dropped == 0) { - success("dropping message: %s\n", gnutls_handshake_description_get_name(d[13])); + success("dropping message: %s\n", + gnutls_handshake_description_get_name(d[13])); dropped = 1; return len; } @@ -145,19 +145,19 @@ static void server(int fd, const char *prio) gnutls_global_set_log_level(6); } - assert(gnutls_certificate_allocate_credentials(&x509_cred)>=0); + assert(gnutls_certificate_allocate_credentials(&x509_cred) >= 0); assert(gnutls_certificate_set_x509_key_mem(x509_cred, &server_cert, - &server_key, - GNUTLS_X509_FMT_PEM)>=0); + &server_key, + GNUTLS_X509_FMT_PEM) >= 0); - assert(gnutls_init(&session, GNUTLS_SERVER|GNUTLS_DATAGRAM)>=0); + assert(gnutls_init(&session, GNUTLS_SERVER | GNUTLS_DATAGRAM) >= 0); - assert(gnutls_session_ticket_key_generate(&skey)>=0); + assert(gnutls_session_ticket_key_generate(&skey) >= 0); assert(gnutls_session_ticket_enable_server(session, &skey) >= 0); gnutls_transport_set_push_function(session, server_push); - assert(gnutls_priority_set_direct(session, prio, NULL)>=0); + assert(gnutls_priority_set_direct(session, prio, NULL) >= 0); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, x509_cred); @@ -175,12 +175,12 @@ static void server(int fd, const char *prio) success("server: Handshake was completed\n"); } - gnutls_record_set_timeout(session, 30*1000); + gnutls_record_set_timeout(session, 30 * 1000); success("waiting for EOF\n"); do { ret = gnutls_record_recv(session, buffer, sizeof(buffer)); - } while(ret == GNUTLS_E_AGAIN || ret == GNUTLS_E_INTERRUPTED); + } while (ret == GNUTLS_E_AGAIN || ret == GNUTLS_E_INTERRUPTED); if (ret != 0) fail("error waiting for EOF: %s\n", gnutls_strerror(ret)); |