summaryrefslogtreecommitdiff
path: root/tests/tls13-early-data-neg2.c
diff options
context:
space:
mode:
Diffstat (limited to 'tests/tls13-early-data-neg2.c')
-rw-r--r--tests/tls13-early-data-neg2.c104
1 files changed, 56 insertions, 48 deletions
diff --git a/tests/tls13-early-data-neg2.c b/tests/tls13-early-data-neg2.c
index 37b6c3ecf8..ea71a3d36c 100644
--- a/tests/tls13-early-data-neg2.c
+++ b/tests/tls13-early-data-neg2.c
@@ -20,7 +20,7 @@
*/
#ifdef HAVE_CONFIG_H
-#include <config.h>
+# include <config.h>
#endif
#include <stdio.h>
@@ -35,23 +35,23 @@ int main(void)
#else
-#include <string.h>
-#include <sys/types.h>
-#include <netinet/in.h>
-#include <sys/socket.h>
-#include <sys/wait.h>
-#include <arpa/inet.h>
-#include <unistd.h>
-#include <gnutls/gnutls.h>
-#include <gnutls/crypto.h>
-#include <gnutls/dtls.h>
-#include <signal.h>
-#include <sys/wait.h>
-#include <assert.h>
-
-#include "cert-common.h"
-#include "utils.h"
-#include "virt-time.h"
+# include <string.h>
+# include <sys/types.h>
+# include <netinet/in.h>
+# include <sys/socket.h>
+# include <sys/wait.h>
+# include <arpa/inet.h>
+# include <unistd.h>
+# include <gnutls/gnutls.h>
+# include <gnutls/crypto.h>
+# include <gnutls/dtls.h>
+# include <signal.h>
+# include <sys/wait.h>
+# include <assert.h>
+
+# include "cert-common.h"
+# include "utils.h"
+# include "virt-time.h"
/* This program checks that early data is refused upon resumption failure.
*/
@@ -66,12 +66,11 @@ static void client_log_func(int level, const char *str)
fprintf(stderr, "client|<%d>| %s", level, str);
}
-
-#define SESSIONS 2
-#define MAX_BUF 1024
-#define MSG "Hello TLS"
-#define EARLY_MSG "Hello TLS, it's early"
-#define PRIORITY "NORMAL:-VERS-ALL:+VERS-TLS1.3"
+# define SESSIONS 2
+# define MAX_BUF 1024
+# define MSG "Hello TLS"
+# define EARLY_MSG "Hello TLS, it's early"
+# define PRIORITY "NORMAL:-VERS-ALL:+VERS-TLS1.3"
static void client(int sds[])
{
@@ -80,7 +79,7 @@ static void client(int sds[])
gnutls_certificate_credentials_t x509_cred;
gnutls_session_t session;
int t;
- gnutls_datum_t session_data = {NULL, 0};
+ gnutls_datum_t session_data = { NULL, 0 };
if (debug) {
gnutls_global_set_log_function(client_log_func);
@@ -97,16 +96,21 @@ static void client(int sds[])
for (t = 0; t < SESSIONS; t++) {
int sd = sds[t];
- assert(gnutls_init(&session, GNUTLS_CLIENT)>=0);
- assert(gnutls_priority_set_direct(session, PRIORITY, NULL)>=0);
+ assert(gnutls_init(&session, GNUTLS_CLIENT) >= 0);
+ assert(gnutls_priority_set_direct(session, PRIORITY, NULL) >=
+ 0);
- gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, x509_cred);
+ gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE,
+ x509_cred);
gnutls_transport_set_int(session, sd);
if (t > 0) {
- assert(gnutls_session_set_data(session, session_data.data, session_data.size) >= 0);
- assert(gnutls_record_send_early_data(session, EARLY_MSG, sizeof(EARLY_MSG)) >= 0);
+ assert(gnutls_session_set_data
+ (session, session_data.data,
+ session_data.size) >= 0);
+ assert(gnutls_record_send_early_data
+ (session, EARLY_MSG, sizeof(EARLY_MSG)) >= 0);
}
/* Perform the TLS handshake
@@ -127,9 +131,7 @@ static void client(int sds[])
if (t == 0) {
/* get the session data size */
- ret =
- gnutls_session_get_data2(session,
- &session_data);
+ ret = gnutls_session_get_data2(session, &session_data);
if (ret < 0)
fail("client: Getting resume data failed\n");
}
@@ -141,12 +143,13 @@ static void client(int sds[])
gnutls_record_send(session, MSG, strlen(MSG));
do {
- ret = gnutls_record_recv(session, buffer, sizeof(buffer));
+ ret =
+ gnutls_record_recv(session, buffer, sizeof(buffer));
} while (ret == GNUTLS_E_AGAIN);
if (ret == 0) {
if (debug)
success
- ("client: Peer has closed the TLS connection\n");
+ ("client: Peer has closed the TLS connection\n");
goto end;
} else if (ret < 0) {
fail("client: Error: %s\n", gnutls_strerror(ret));
@@ -164,10 +167,9 @@ static void client(int sds[])
gnutls_certificate_free_credentials(x509_cred);
}
-
static pid_t child;
-#define MAX_CLIENT_HELLO_RECORDED 10
+# define MAX_CLIENT_HELLO_RECORDED 10
struct storage_st {
gnutls_datum_t entries[MAX_CLIENT_HELLO_RECORDED];
@@ -175,7 +177,8 @@ struct storage_st {
};
static int
-storage_add(void *ptr, time_t expires, const gnutls_datum_t *key, const gnutls_datum_t *value)
+storage_add(void *ptr, time_t expires, const gnutls_datum_t * key,
+ const gnutls_datum_t * value)
{
struct storage_st *storage = ptr;
gnutls_datum_t *datum;
@@ -183,7 +186,8 @@ storage_add(void *ptr, time_t expires, const gnutls_datum_t *key, const gnutls_d
for (i = 0; i < storage->num_entries; i++) {
if (key->size == storage->entries[i].size &&
- memcmp(storage->entries[i].data, key->data, key->size) == 0) {
+ memcmp(storage->entries[i].data, key->data,
+ key->size) == 0) {
return GNUTLS_E_DB_ENTRY_EXISTS;
}
}
@@ -206,8 +210,7 @@ storage_add(void *ptr, time_t expires, const gnutls_datum_t *key, const gnutls_d
return 0;
}
-static void
-storage_clear(struct storage_st *storage)
+static void storage_clear(struct storage_st *storage)
{
size_t i;
@@ -240,8 +243,7 @@ static void server(int sds[])
gnutls_certificate_allocate_credentials(&x509_cred);
gnutls_certificate_set_x509_key_mem(x509_cred, &server_cert,
- &server_key,
- GNUTLS_X509_FMT_PEM);
+ &server_key, GNUTLS_X509_FMT_PEM);
ret = gnutls_anti_replay_init(&anti_replay);
if (ret < 0)
@@ -254,11 +256,15 @@ static void server(int sds[])
success("=== session %d ===\n", t);
- assert(gnutls_init(&session, GNUTLS_SERVER|GNUTLS_ENABLE_EARLY_DATA)>=0);
+ assert(gnutls_init
+ (&session,
+ GNUTLS_SERVER | GNUTLS_ENABLE_EARLY_DATA) >= 0);
- assert(gnutls_priority_set_direct(session, PRIORITY, NULL)>=0);
+ assert(gnutls_priority_set_direct(session, PRIORITY, NULL) >=
+ 0);
- gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, x509_cred);
+ gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE,
+ x509_cred);
/* Intentionally overwrite the previous key to cause resumption
* failure. */
@@ -287,8 +293,10 @@ static void server(int sds[])
fail("server: Session unexpectedly resumed (%d)\n", t);
}
- if (gnutls_session_get_flags(session) & GNUTLS_SFLAGS_EARLY_DATA) {
- fail("server: Unexpected early data received (%d)\n", t);
+ if (gnutls_session_get_flags(session) &
+ GNUTLS_SFLAGS_EARLY_DATA) {
+ fail("server: Unexpected early data received (%d)\n",
+ t);
}
for (;;) {