summaryrefslogtreecommitdiff
path: root/tests/pkcs11/pkcs11-get-raw-issuer-exts.c
diff options
context:
space:
mode:
Diffstat (limited to 'tests/pkcs11/pkcs11-get-raw-issuer-exts.c')
-rw-r--r--tests/pkcs11/pkcs11-get-raw-issuer-exts.c22
1 files changed, 14 insertions, 8 deletions
diff --git a/tests/pkcs11/pkcs11-get-raw-issuer-exts.c b/tests/pkcs11/pkcs11-get-raw-issuer-exts.c
index d49fe514b4..f0e36e733b 100644
--- a/tests/pkcs11/pkcs11-get-raw-issuer-exts.c
+++ b/tests/pkcs11/pkcs11-get-raw-issuer-exts.c
@@ -20,7 +20,7 @@
*/
#ifdef HAVE_CONFIG_H
-#include <config.h>
+# include <config.h>
#endif
#include <stdio.h>
@@ -61,7 +61,7 @@ void doit(void)
gnutls_x509_crt_t crt, ocrt;
unsigned keyusage;
const char *lib;
- gnutls_datum_t issuer = {NULL, 0};
+ gnutls_datum_t issuer = { NULL, 0 };
ret = global_init();
if (ret != 0) {
@@ -91,17 +91,21 @@ void doit(void)
exit(1);
}
- assert(gnutls_x509_crt_init(&crt)>=0);
- assert(gnutls_x509_crt_init(&ocrt)>=0);
+ assert(gnutls_x509_crt_init(&crt) >= 0);
+ assert(gnutls_x509_crt_init(&ocrt) >= 0);
/* check high level certificate functions */
- ret = gnutls_x509_crt_import_url(crt, "pkcs11:type=cert;object=cert1", 0);
+ ret =
+ gnutls_x509_crt_import_url(crt, "pkcs11:type=cert;object=cert1", 0);
if (ret < 0) {
fail("%d: %s\n", ret, gnutls_strerror(ret));
exit(1);
}
- ret = gnutls_pkcs11_get_raw_issuer("pkcs11:", crt, &issuer, GNUTLS_X509_FMT_DER, GNUTLS_PKCS11_OBJ_FLAG_OVERWRITE_TRUSTMOD_EXT);
+ ret =
+ gnutls_pkcs11_get_raw_issuer("pkcs11:", crt, &issuer,
+ GNUTLS_X509_FMT_DER,
+ GNUTLS_PKCS11_OBJ_FLAG_OVERWRITE_TRUSTMOD_EXT);
if (ret < 0) {
fail("%d: %s\n", ret, gnutls_strerror(ret));
exit(1);
@@ -109,7 +113,7 @@ void doit(void)
ret = gnutls_x509_crt_equals2(crt, &issuer);
if (ret != 0) {
- fail("exported certificates are equal!\n");
+ fail("exported certificates are equal!\n");
}
ret = gnutls_x509_crt_import(ocrt, &issuer, GNUTLS_X509_FMT_DER);
@@ -135,7 +139,9 @@ void doit(void)
exit(1);
}
- if (keyusage != (GNUTLS_KEY_KEY_ENCIPHERMENT|GNUTLS_KEY_ENCIPHER_ONLY|GNUTLS_KEY_KEY_CERT_SIGN)) {
+ if (keyusage !=
+ (GNUTLS_KEY_KEY_ENCIPHERMENT | GNUTLS_KEY_ENCIPHER_ONLY |
+ GNUTLS_KEY_KEY_CERT_SIGN)) {
fail("Extension does not have the expected key usage!\n");
}