summaryrefslogtreecommitdiff
path: root/tests/dtls-session-ticket-lost.c
diff options
context:
space:
mode:
Diffstat (limited to 'tests/dtls-session-ticket-lost.c')
-rw-r--r--tests/dtls-session-ticket-lost.c60
1 files changed, 30 insertions, 30 deletions
diff --git a/tests/dtls-session-ticket-lost.c b/tests/dtls-session-ticket-lost.c
index 236b303961..e174563204 100644
--- a/tests/dtls-session-ticket-lost.c
+++ b/tests/dtls-session-ticket-lost.c
@@ -20,7 +20,7 @@
*/
#ifdef HAVE_CONFIG_H
-#include <config.h>
+# include <config.h>
#endif
#include <stdio.h>
@@ -35,20 +35,20 @@ int main(void)
#else
-#include <string.h>
-#include <sys/types.h>
-#include <netinet/in.h>
-#include <sys/socket.h>
-#include <sys/wait.h>
-#include <arpa/inet.h>
-#include <unistd.h>
-#include <gnutls/gnutls.h>
-#include <gnutls/dtls.h>
-#include <signal.h>
-#include <assert.h>
-
-#include "cert-common.h"
-#include "utils.h"
+# include <string.h>
+# include <sys/types.h>
+# include <netinet/in.h>
+# include <sys/socket.h>
+# include <sys/wait.h>
+# include <arpa/inet.h>
+# include <unistd.h>
+# include <gnutls/gnutls.h>
+# include <gnutls/dtls.h>
+# include <signal.h>
+# include <assert.h>
+
+# include "cert-common.h"
+# include "utils.h"
/* This program is a reproducer for issue #543; the timeout
* of DTLS handshake when a NewSessionTicket is lost.
@@ -64,7 +64,7 @@ static void client_log_func(int level, const char *str)
fprintf(stderr, "client|<%d>| %s", level, str);
}
-#define MAX_BUF 1024
+# define MAX_BUF 1024
static void client(int fd, const char *prio)
{
@@ -79,9 +79,9 @@ static void client(int fd, const char *prio)
gnutls_certificate_allocate_credentials(&x509_cred);
- assert(gnutls_init(&session, GNUTLS_CLIENT|GNUTLS_DATAGRAM)>=0);
+ assert(gnutls_init(&session, GNUTLS_CLIENT | GNUTLS_DATAGRAM) >= 0);
- assert(gnutls_priority_set_direct(session, prio, NULL)>=0);
+ assert(gnutls_priority_set_direct(session, prio, NULL) >= 0);
gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, x509_cred);
@@ -99,11 +99,11 @@ static void client(int fd, const char *prio)
success("client: Handshake was completed\n");
}
- gnutls_record_set_timeout(session, 30*1000);
+ gnutls_record_set_timeout(session, 30 * 1000);
do {
ret = gnutls_bye(session, GNUTLS_SHUT_WR);
- } while(ret == GNUTLS_E_AGAIN || ret == GNUTLS_E_INTERRUPTED);
+ } while (ret == GNUTLS_E_AGAIN || ret == GNUTLS_E_INTERRUPTED);
close(fd);
@@ -112,7 +112,6 @@ static void client(int fd, const char *prio)
gnutls_certificate_free_credentials(x509_cred);
}
-
static ssize_t
server_push(gnutls_transport_ptr_t tr, const void *data, size_t len)
{
@@ -121,7 +120,8 @@ server_push(gnutls_transport_ptr_t tr, const void *data, size_t len)
if (d[13] == GNUTLS_HANDSHAKE_NEW_SESSION_TICKET) {
if (dropped == 0) {
- success("dropping message: %s\n", gnutls_handshake_description_get_name(d[13]));
+ success("dropping message: %s\n",
+ gnutls_handshake_description_get_name(d[13]));
dropped = 1;
return len;
}
@@ -145,19 +145,19 @@ static void server(int fd, const char *prio)
gnutls_global_set_log_level(6);
}
- assert(gnutls_certificate_allocate_credentials(&x509_cred)>=0);
+ assert(gnutls_certificate_allocate_credentials(&x509_cred) >= 0);
assert(gnutls_certificate_set_x509_key_mem(x509_cred, &server_cert,
- &server_key,
- GNUTLS_X509_FMT_PEM)>=0);
+ &server_key,
+ GNUTLS_X509_FMT_PEM) >= 0);
- assert(gnutls_init(&session, GNUTLS_SERVER|GNUTLS_DATAGRAM)>=0);
+ assert(gnutls_init(&session, GNUTLS_SERVER | GNUTLS_DATAGRAM) >= 0);
- assert(gnutls_session_ticket_key_generate(&skey)>=0);
+ assert(gnutls_session_ticket_key_generate(&skey) >= 0);
assert(gnutls_session_ticket_enable_server(session, &skey) >= 0);
gnutls_transport_set_push_function(session, server_push);
- assert(gnutls_priority_set_direct(session, prio, NULL)>=0);
+ assert(gnutls_priority_set_direct(session, prio, NULL) >= 0);
gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, x509_cred);
@@ -175,12 +175,12 @@ static void server(int fd, const char *prio)
success("server: Handshake was completed\n");
}
- gnutls_record_set_timeout(session, 30*1000);
+ gnutls_record_set_timeout(session, 30 * 1000);
success("waiting for EOF\n");
do {
ret = gnutls_record_recv(session, buffer, sizeof(buffer));
- } while(ret == GNUTLS_E_AGAIN || ret == GNUTLS_E_INTERRUPTED);
+ } while (ret == GNUTLS_E_AGAIN || ret == GNUTLS_E_INTERRUPTED);
if (ret != 0)
fail("error waiting for EOF: %s\n", gnutls_strerror(ret));