summaryrefslogtreecommitdiff
path: root/tests/pkcs11/pkcs11-privkey-generate.c
diff options
context:
space:
mode:
Diffstat (limited to 'tests/pkcs11/pkcs11-privkey-generate.c')
-rw-r--r--tests/pkcs11/pkcs11-privkey-generate.c47
1 files changed, 29 insertions, 18 deletions
diff --git a/tests/pkcs11/pkcs11-privkey-generate.c b/tests/pkcs11/pkcs11-privkey-generate.c
index 102cf4b292..b7106dbc66 100644
--- a/tests/pkcs11/pkcs11-privkey-generate.c
+++ b/tests/pkcs11/pkcs11-privkey-generate.c
@@ -20,7 +20,7 @@
*/
#ifdef HAVE_CONFIG_H
-#include <config.h>
+# include <config.h>
#endif
#include <stdio.h>
@@ -45,13 +45,13 @@ void doit(void)
#else
-#include "../utils.h"
-#include "softhsm.h"
-#include <assert.h>
+# include "../utils.h"
+# include "softhsm.h"
+# include <assert.h>
-#define CONFIG_NAME "softhsm-generate"
-#define CONFIG CONFIG_NAME".config"
-#define PIN "1234"
+# define CONFIG_NAME "softhsm-generate"
+# define CONFIG CONFIG_NAME".config"
+# define PIN "1234"
/* Tests whether a gnutls_privkey_generate3 will work generate a key
* which is marked as sensitive.
*/
@@ -65,8 +65,8 @@ static void tls_log_func(int level, const char *str)
}
static
-int pin_func(void* userdata, int attempt, const char* url, const char *label,
- unsigned flags, char *pin, size_t pin_max)
+int pin_func(void *userdata, int attempt, const char *url, const char *label,
+ unsigned flags, char *pin, size_t pin_max)
{
if (_pin == NULL)
return -1;
@@ -103,7 +103,9 @@ void doit(void)
lib = softhsm_lib();
set_softhsm_conf(CONFIG);
- snprintf(buf, sizeof(buf), "%s --init-token --slot 0 --label test --so-pin "PIN" --pin "PIN, bin);
+ snprintf(buf, sizeof(buf),
+ "%s --init-token --slot 0 --label test --so-pin " PIN " --pin "
+ PIN, bin);
system(buf);
ret = gnutls_pkcs11_init(GNUTLS_PKCS11_FLAG_MANUAL, NULL);
@@ -121,9 +123,11 @@ void doit(void)
gnutls_pkcs11_set_pin_function(pin_func, NULL);
/* generate sensitive */
- ret = gnutls_pkcs11_privkey_generate3("pkcs11:token=test", GNUTLS_PK_RSA, 2048,
- "testkey", NULL, GNUTLS_X509_FMT_DER,
- &out, 0, GNUTLS_PKCS11_OBJ_FLAG_LOGIN);
+ ret =
+ gnutls_pkcs11_privkey_generate3("pkcs11:token=test", GNUTLS_PK_RSA,
+ 2048, "testkey", NULL,
+ GNUTLS_X509_FMT_DER, &out, 0,
+ GNUTLS_PKCS11_OBJ_FLAG_LOGIN);
if (ret < 0) {
fail("%d: %s\n", ret, gnutls_strerror(ret));
exit(1);
@@ -133,7 +137,9 @@ void doit(void)
assert(out.size > 0);
gnutls_pkcs11_obj_set_pin_function(obj, pin_func, NULL);
- assert(gnutls_pkcs11_obj_import_url(obj, "pkcs11:token=test;object=testkey;type=private", GNUTLS_PKCS11_OBJ_FLAG_LOGIN) >= 0);
+ assert(gnutls_pkcs11_obj_import_url
+ (obj, "pkcs11:token=test;object=testkey;type=private",
+ GNUTLS_PKCS11_OBJ_FLAG_LOGIN) >= 0);
assert(gnutls_pkcs11_obj_get_flags(obj, &flags) >= 0);
@@ -144,9 +150,12 @@ void doit(void)
gnutls_pkcs11_obj_deinit(obj);
/* generate non-sensitive */
- ret = gnutls_pkcs11_privkey_generate3("pkcs11:token=test", GNUTLS_PK_RSA, 2048,
- "testkey2", NULL, GNUTLS_X509_FMT_DER,
- &out, 0, GNUTLS_PKCS11_OBJ_FLAG_LOGIN|GNUTLS_PKCS11_OBJ_FLAG_MARK_NOT_SENSITIVE);
+ ret =
+ gnutls_pkcs11_privkey_generate3("pkcs11:token=test", GNUTLS_PK_RSA,
+ 2048, "testkey2", NULL,
+ GNUTLS_X509_FMT_DER, &out, 0,
+ GNUTLS_PKCS11_OBJ_FLAG_LOGIN |
+ GNUTLS_PKCS11_OBJ_FLAG_MARK_NOT_SENSITIVE);
if (ret < 0) {
fail("%d: %s\n", ret, gnutls_strerror(ret));
exit(1);
@@ -156,7 +165,9 @@ void doit(void)
assert(out.size > 0);
gnutls_pkcs11_obj_set_pin_function(obj, pin_func, NULL);
- assert(gnutls_pkcs11_obj_import_url(obj, "pkcs11:token=test;object=testkey2;type=private", GNUTLS_PKCS11_OBJ_FLAG_LOGIN) >= 0);
+ assert(gnutls_pkcs11_obj_import_url
+ (obj, "pkcs11:token=test;object=testkey2;type=private",
+ GNUTLS_PKCS11_OBJ_FLAG_LOGIN) >= 0);
assert(gnutls_pkcs11_obj_get_flags(obj, &flags) >= 0);