diff options
Diffstat (limited to 'tests/tls13-early-data-neg2.c')
-rw-r--r-- | tests/tls13-early-data-neg2.c | 98 |
1 files changed, 48 insertions, 50 deletions
diff --git a/tests/tls13-early-data-neg2.c b/tests/tls13-early-data-neg2.c index ea71a3d36c..0c5232faf6 100644 --- a/tests/tls13-early-data-neg2.c +++ b/tests/tls13-early-data-neg2.c @@ -20,7 +20,7 @@ */ #ifdef HAVE_CONFIG_H -# include <config.h> +#include <config.h> #endif #include <stdio.h> @@ -35,23 +35,23 @@ int main(void) #else -# include <string.h> -# include <sys/types.h> -# include <netinet/in.h> -# include <sys/socket.h> -# include <sys/wait.h> -# include <arpa/inet.h> -# include <unistd.h> -# include <gnutls/gnutls.h> -# include <gnutls/crypto.h> -# include <gnutls/dtls.h> -# include <signal.h> -# include <sys/wait.h> -# include <assert.h> - -# include "cert-common.h" -# include "utils.h" -# include "virt-time.h" +#include <string.h> +#include <sys/types.h> +#include <netinet/in.h> +#include <sys/socket.h> +#include <sys/wait.h> +#include <arpa/inet.h> +#include <unistd.h> +#include <gnutls/gnutls.h> +#include <gnutls/crypto.h> +#include <gnutls/dtls.h> +#include <signal.h> +#include <sys/wait.h> +#include <assert.h> + +#include "cert-common.h" +#include "utils.h" +#include "virt-time.h" /* This program checks that early data is refused upon resumption failure. */ @@ -66,11 +66,11 @@ static void client_log_func(int level, const char *str) fprintf(stderr, "client|<%d>| %s", level, str); } -# define SESSIONS 2 -# define MAX_BUF 1024 -# define MSG "Hello TLS" -# define EARLY_MSG "Hello TLS, it's early" -# define PRIORITY "NORMAL:-VERS-ALL:+VERS-TLS1.3" +#define SESSIONS 2 +#define MAX_BUF 1024 +#define MSG "Hello TLS" +#define EARLY_MSG "Hello TLS, it's early" +#define PRIORITY "NORMAL:-VERS-ALL:+VERS-TLS1.3" static void client(int sds[]) { @@ -106,11 +106,12 @@ static void client(int sds[]) gnutls_transport_set_int(session, sd); if (t > 0) { - assert(gnutls_session_set_data - (session, session_data.data, - session_data.size) >= 0); - assert(gnutls_record_send_early_data - (session, EARLY_MSG, sizeof(EARLY_MSG)) >= 0); + assert(gnutls_session_set_data(session, + session_data.data, + session_data.size) >= 0); + assert(gnutls_record_send_early_data( + session, EARLY_MSG, sizeof(EARLY_MSG)) >= + 0); } /* Perform the TLS handshake @@ -118,8 +119,7 @@ static void client(int sds[]) gnutls_handshake_set_timeout(session, get_timeout()); do { ret = gnutls_handshake(session); - } - while (ret < 0 && gnutls_error_is_fatal(ret) == 0); + } while (ret < 0 && gnutls_error_is_fatal(ret) == 0); if (ret < 0) { fail("client: Handshake failed: %s\n", @@ -143,13 +143,12 @@ static void client(int sds[]) gnutls_record_send(session, MSG, strlen(MSG)); do { - ret = - gnutls_record_recv(session, buffer, sizeof(buffer)); + ret = gnutls_record_recv(session, buffer, + sizeof(buffer)); } while (ret == GNUTLS_E_AGAIN); if (ret == 0) { if (debug) - success - ("client: Peer has closed the TLS connection\n"); + success("client: Peer has closed the TLS connection\n"); goto end; } else if (ret < 0) { fail("client: Error: %s\n", gnutls_strerror(ret)); @@ -162,23 +161,22 @@ static void client(int sds[]) gnutls_deinit(session); } - end: +end: gnutls_free(session_data.data); gnutls_certificate_free_credentials(x509_cred); } static pid_t child; -# define MAX_CLIENT_HELLO_RECORDED 10 +#define MAX_CLIENT_HELLO_RECORDED 10 struct storage_st { gnutls_datum_t entries[MAX_CLIENT_HELLO_RECORDED]; size_t num_entries; }; -static int -storage_add(void *ptr, time_t expires, const gnutls_datum_t * key, - const gnutls_datum_t * value) +static int storage_add(void *ptr, time_t expires, const gnutls_datum_t *key, + const gnutls_datum_t *value) { struct storage_st *storage = ptr; gnutls_datum_t *datum; @@ -186,8 +184,8 @@ storage_add(void *ptr, time_t expires, const gnutls_datum_t * key, for (i = 0; i < storage->num_entries; i++) { if (key->size == storage->entries[i].size && - memcmp(storage->entries[i].data, key->data, - key->size) == 0) { + memcmp(storage->entries[i].data, key->data, key->size) == + 0) { return GNUTLS_E_DB_ENTRY_EXISTS; } } @@ -256,9 +254,9 @@ static void server(int sds[]) success("=== session %d ===\n", t); - assert(gnutls_init - (&session, - GNUTLS_SERVER | GNUTLS_ENABLE_EARLY_DATA) >= 0); + assert(gnutls_init(&session, + GNUTLS_SERVER | GNUTLS_ENABLE_EARLY_DATA) >= + 0); assert(gnutls_priority_set_direct(session, PRIORITY, NULL) >= 0); @@ -283,8 +281,8 @@ static void server(int sds[]) if (ret < 0) { gnutls_deinit(session); - fail("server[%d]: Handshake has failed (%s)\n\n", - t, gnutls_strerror(ret)); + fail("server[%d]: Handshake has failed (%s)\n\n", t, + gnutls_strerror(ret)); } if (debug) success("server: Handshake was completed\n"); @@ -305,12 +303,12 @@ static void server(int sds[]) if (ret == 0) { if (debug) - success - ("server: Peer has closed the GnuTLS connection\n"); + success("server: Peer has closed the GnuTLS connection\n"); break; } else if (ret < 0) { kill(child, SIGTERM); - fail("server: Received corrupted data(%d). Closing...\n", ret); + fail("server: Received corrupted data(%d). Closing...\n", + ret); } else if (ret > 0) { /* echo data back to the client */ @@ -383,4 +381,4 @@ void doit(void) } } -#endif /* _WIN32 */ +#endif /* _WIN32 */ |