summaryrefslogtreecommitdiff
path: root/tests/tls13-early-data-neg2.c
diff options
context:
space:
mode:
Diffstat (limited to 'tests/tls13-early-data-neg2.c')
-rw-r--r--tests/tls13-early-data-neg2.c98
1 files changed, 48 insertions, 50 deletions
diff --git a/tests/tls13-early-data-neg2.c b/tests/tls13-early-data-neg2.c
index ea71a3d36c..0c5232faf6 100644
--- a/tests/tls13-early-data-neg2.c
+++ b/tests/tls13-early-data-neg2.c
@@ -20,7 +20,7 @@
*/
#ifdef HAVE_CONFIG_H
-# include <config.h>
+#include <config.h>
#endif
#include <stdio.h>
@@ -35,23 +35,23 @@ int main(void)
#else
-# include <string.h>
-# include <sys/types.h>
-# include <netinet/in.h>
-# include <sys/socket.h>
-# include <sys/wait.h>
-# include <arpa/inet.h>
-# include <unistd.h>
-# include <gnutls/gnutls.h>
-# include <gnutls/crypto.h>
-# include <gnutls/dtls.h>
-# include <signal.h>
-# include <sys/wait.h>
-# include <assert.h>
-
-# include "cert-common.h"
-# include "utils.h"
-# include "virt-time.h"
+#include <string.h>
+#include <sys/types.h>
+#include <netinet/in.h>
+#include <sys/socket.h>
+#include <sys/wait.h>
+#include <arpa/inet.h>
+#include <unistd.h>
+#include <gnutls/gnutls.h>
+#include <gnutls/crypto.h>
+#include <gnutls/dtls.h>
+#include <signal.h>
+#include <sys/wait.h>
+#include <assert.h>
+
+#include "cert-common.h"
+#include "utils.h"
+#include "virt-time.h"
/* This program checks that early data is refused upon resumption failure.
*/
@@ -66,11 +66,11 @@ static void client_log_func(int level, const char *str)
fprintf(stderr, "client|<%d>| %s", level, str);
}
-# define SESSIONS 2
-# define MAX_BUF 1024
-# define MSG "Hello TLS"
-# define EARLY_MSG "Hello TLS, it's early"
-# define PRIORITY "NORMAL:-VERS-ALL:+VERS-TLS1.3"
+#define SESSIONS 2
+#define MAX_BUF 1024
+#define MSG "Hello TLS"
+#define EARLY_MSG "Hello TLS, it's early"
+#define PRIORITY "NORMAL:-VERS-ALL:+VERS-TLS1.3"
static void client(int sds[])
{
@@ -106,11 +106,12 @@ static void client(int sds[])
gnutls_transport_set_int(session, sd);
if (t > 0) {
- assert(gnutls_session_set_data
- (session, session_data.data,
- session_data.size) >= 0);
- assert(gnutls_record_send_early_data
- (session, EARLY_MSG, sizeof(EARLY_MSG)) >= 0);
+ assert(gnutls_session_set_data(session,
+ session_data.data,
+ session_data.size) >= 0);
+ assert(gnutls_record_send_early_data(
+ session, EARLY_MSG, sizeof(EARLY_MSG)) >=
+ 0);
}
/* Perform the TLS handshake
@@ -118,8 +119,7 @@ static void client(int sds[])
gnutls_handshake_set_timeout(session, get_timeout());
do {
ret = gnutls_handshake(session);
- }
- while (ret < 0 && gnutls_error_is_fatal(ret) == 0);
+ } while (ret < 0 && gnutls_error_is_fatal(ret) == 0);
if (ret < 0) {
fail("client: Handshake failed: %s\n",
@@ -143,13 +143,12 @@ static void client(int sds[])
gnutls_record_send(session, MSG, strlen(MSG));
do {
- ret =
- gnutls_record_recv(session, buffer, sizeof(buffer));
+ ret = gnutls_record_recv(session, buffer,
+ sizeof(buffer));
} while (ret == GNUTLS_E_AGAIN);
if (ret == 0) {
if (debug)
- success
- ("client: Peer has closed the TLS connection\n");
+ success("client: Peer has closed the TLS connection\n");
goto end;
} else if (ret < 0) {
fail("client: Error: %s\n", gnutls_strerror(ret));
@@ -162,23 +161,22 @@ static void client(int sds[])
gnutls_deinit(session);
}
- end:
+end:
gnutls_free(session_data.data);
gnutls_certificate_free_credentials(x509_cred);
}
static pid_t child;
-# define MAX_CLIENT_HELLO_RECORDED 10
+#define MAX_CLIENT_HELLO_RECORDED 10
struct storage_st {
gnutls_datum_t entries[MAX_CLIENT_HELLO_RECORDED];
size_t num_entries;
};
-static int
-storage_add(void *ptr, time_t expires, const gnutls_datum_t * key,
- const gnutls_datum_t * value)
+static int storage_add(void *ptr, time_t expires, const gnutls_datum_t *key,
+ const gnutls_datum_t *value)
{
struct storage_st *storage = ptr;
gnutls_datum_t *datum;
@@ -186,8 +184,8 @@ storage_add(void *ptr, time_t expires, const gnutls_datum_t * key,
for (i = 0; i < storage->num_entries; i++) {
if (key->size == storage->entries[i].size &&
- memcmp(storage->entries[i].data, key->data,
- key->size) == 0) {
+ memcmp(storage->entries[i].data, key->data, key->size) ==
+ 0) {
return GNUTLS_E_DB_ENTRY_EXISTS;
}
}
@@ -256,9 +254,9 @@ static void server(int sds[])
success("=== session %d ===\n", t);
- assert(gnutls_init
- (&session,
- GNUTLS_SERVER | GNUTLS_ENABLE_EARLY_DATA) >= 0);
+ assert(gnutls_init(&session,
+ GNUTLS_SERVER | GNUTLS_ENABLE_EARLY_DATA) >=
+ 0);
assert(gnutls_priority_set_direct(session, PRIORITY, NULL) >=
0);
@@ -283,8 +281,8 @@ static void server(int sds[])
if (ret < 0) {
gnutls_deinit(session);
- fail("server[%d]: Handshake has failed (%s)\n\n",
- t, gnutls_strerror(ret));
+ fail("server[%d]: Handshake has failed (%s)\n\n", t,
+ gnutls_strerror(ret));
}
if (debug)
success("server: Handshake was completed\n");
@@ -305,12 +303,12 @@ static void server(int sds[])
if (ret == 0) {
if (debug)
- success
- ("server: Peer has closed the GnuTLS connection\n");
+ success("server: Peer has closed the GnuTLS connection\n");
break;
} else if (ret < 0) {
kill(child, SIGTERM);
- fail("server: Received corrupted data(%d). Closing...\n", ret);
+ fail("server: Received corrupted data(%d). Closing...\n",
+ ret);
} else if (ret > 0) {
/* echo data back to the client
*/
@@ -383,4 +381,4 @@ void doit(void)
}
}
-#endif /* _WIN32 */
+#endif /* _WIN32 */