summaryrefslogtreecommitdiff
path: root/tests/sign-verify-data-newapi.c
diff options
context:
space:
mode:
Diffstat (limited to 'tests/sign-verify-data-newapi.c')
-rw-r--r--tests/sign-verify-data-newapi.c36
1 files changed, 21 insertions, 15 deletions
diff --git a/tests/sign-verify-data-newapi.c b/tests/sign-verify-data-newapi.c
index eca18974ee..2371fb3553 100644
--- a/tests/sign-verify-data-newapi.c
+++ b/tests/sign-verify-data-newapi.c
@@ -21,7 +21,7 @@
*/
#ifdef HAVE_CONFIG_H
-#include <config.h>
+# include <config.h>
#endif
#include <stdio.h>
@@ -87,7 +87,8 @@ void doit(void)
if (tests[i].pk == GNUTLS_PK_DSA)
continue;
- success("testing: %s - %s\n", tests[i].name, gnutls_sign_algorithm_get_name(tests[i].sigalgo));
+ success("testing: %s - %s\n", tests[i].name,
+ gnutls_sign_algorithm_get_name(tests[i].sigalgo));
ret = gnutls_pubkey_init(&pubkey);
if (ret < 0)
@@ -97,7 +98,10 @@ void doit(void)
if (ret < 0)
testfail("gnutls_pubkey_init\n");
- ret = gnutls_privkey_import_x509_raw(privkey, &tests[i].key, GNUTLS_X509_FMT_PEM, NULL, 0);
+ ret =
+ gnutls_privkey_import_x509_raw(privkey, &tests[i].key,
+ GNUTLS_X509_FMT_PEM, NULL,
+ 0);
if (ret < 0)
testfail("gnutls_privkey_import_x509\n");
@@ -121,42 +125,44 @@ void doit(void)
testfail("gnutls_x509_pubkey_import\n");
ret =
- gnutls_pubkey_verify_data2(pubkey, tests[i].sigalgo, 0, &raw_data,
- &signature);
+ gnutls_pubkey_verify_data2(pubkey, tests[i].sigalgo, 0,
+ &raw_data, &signature);
if (ret < 0)
testfail("gnutls_x509_pubkey_verify_data2\n");
/* Test functionality of GNUTLS_VERIFY_DISABLE_CA_SIGN flag (see issue #754) */
ret =
- gnutls_pubkey_verify_data2(pubkey, tests[i].sigalgo, GNUTLS_VERIFY_DISABLE_CA_SIGN, &raw_data,
- &signature);
+ gnutls_pubkey_verify_data2(pubkey, tests[i].sigalgo,
+ GNUTLS_VERIFY_DISABLE_CA_SIGN,
+ &raw_data, &signature);
if (ret < 0)
testfail("gnutls_x509_pubkey_verify_data2\n");
/* should fail */
ret =
gnutls_pubkey_verify_data2(pubkey, tests[i].sigalgo, 0,
- &invalid_raw_data,
- &signature);
+ &invalid_raw_data, &signature);
if (ret != GNUTLS_E_PK_SIG_VERIFY_FAILED)
- testfail("gnutls_x509_pubkey_verify_data2-2 (hashed data)\n");
+ testfail
+ ("gnutls_x509_pubkey_verify_data2-2 (hashed data)\n");
sign_algo =
gnutls_pk_to_sign(gnutls_pubkey_get_pk_algorithm
(pubkey, NULL), tests[i].digest);
ret =
gnutls_pubkey_verify_data2(pubkey, sign_algo, 0,
- &raw_data, &signature);
+ &raw_data, &signature);
if (ret < 0)
- testfail("gnutls_x509_pubkey_verify_data2-1 (hashed data)\n");
+ testfail
+ ("gnutls_x509_pubkey_verify_data2-1 (hashed data)\n");
/* should fail */
ret =
gnutls_pubkey_verify_data2(pubkey, sign_algo, 0,
- &invalid_raw_data,
- &signature);
+ &invalid_raw_data, &signature);
if (ret != GNUTLS_E_PK_SIG_VERIFY_FAILED)
- testfail("gnutls_x509_pubkey_verify_data2-2 (hashed data)\n");
+ testfail
+ ("gnutls_x509_pubkey_verify_data2-2 (hashed data)\n");
/* test the raw interface */
gnutls_free(signature.data);