summaryrefslogtreecommitdiff
path: root/tests/tls13/key_update_multiple.c
diff options
context:
space:
mode:
Diffstat (limited to 'tests/tls13/key_update_multiple.c')
-rw-r--r--tests/tls13/key_update_multiple.c33
1 files changed, 14 insertions, 19 deletions
diff --git a/tests/tls13/key_update_multiple.c b/tests/tls13/key_update_multiple.c
index 06c63d5d44..19eafea4bd 100644
--- a/tests/tls13/key_update_multiple.c
+++ b/tests/tls13/key_update_multiple.c
@@ -20,7 +20,7 @@
*/
#ifdef HAVE_CONFIG_H
-# include <config.h>
+#include <config.h>
#endif
#include <stdbool.h>
@@ -49,7 +49,8 @@ static void tls_log_func(int level, const char *str)
}
#define MAX_BUF 1024
-#define MSG "Hello TLS, and hi and how are you and more data here... and more... and even more and even more more data..."
+#define MSG \
+ "Hello TLS, and hi and how are you and more data here... and more... and even more and even more more data..."
/* These must match the definitions in lib/tls13/key_update.c. */
#define KEY_UPDATES_WINDOW 1000
@@ -60,7 +61,7 @@ static unsigned key_update_msg_out = 0;
static int hsk_callback(gnutls_session_t session, unsigned int htype,
unsigned post, unsigned int incoming,
- const gnutls_datum_t * msg)
+ const gnutls_datum_t *msg)
{
assert(post == GNUTLS_HOOK_PRE);
@@ -100,16 +101,13 @@ static void run(const char *name, bool exceed_limit)
/* Init server */
assert(gnutls_certificate_allocate_credentials(&scred) >= 0);
- assert(gnutls_certificate_set_x509_key_mem(scred,
- &server_ca3_localhost_cert,
- &server_ca3_key,
- GNUTLS_X509_FMT_PEM) >= 0);
+ assert(gnutls_certificate_set_x509_key_mem(
+ scred, &server_ca3_localhost_cert, &server_ca3_key,
+ GNUTLS_X509_FMT_PEM) >= 0);
assert(gnutls_init(&server, GNUTLS_SERVER) >= 0);
- ret =
- gnutls_priority_set_direct(server,
- "NORMAL:-VERS-TLS-ALL:+VERS-TLS1.3",
- NULL);
+ ret = gnutls_priority_set_direct(
+ server, "NORMAL:-VERS-TLS-ALL:+VERS-TLS1.3", NULL);
if (ret < 0)
exit(1);
@@ -120,14 +118,12 @@ static void run(const char *name, bool exceed_limit)
/* Init client */
assert(gnutls_certificate_allocate_credentials(&ccred) >= 0);
- assert(gnutls_certificate_set_x509_trust_mem
- (ccred, &ca3_cert, GNUTLS_X509_FMT_PEM) >= 0);
+ assert(gnutls_certificate_set_x509_trust_mem(ccred, &ca3_cert,
+ GNUTLS_X509_FMT_PEM) >= 0);
gnutls_init(&client, GNUTLS_CLIENT);
- ret =
- gnutls_priority_set_direct(client,
- "NORMAL:-VERS-TLS-ALL:+VERS-TLS1.3",
- NULL);
+ ret = gnutls_priority_set_direct(
+ client, "NORMAL:-VERS-TLS-ALL:+VERS-TLS1.3", NULL);
assert(ret >= 0);
ret = gnutls_credentials_set(client, GNUTLS_CRD_CERTIFICATE, ccred);
@@ -193,8 +189,7 @@ static void run(const char *name, bool exceed_limit)
fail("server didn't reject excessive number of key updates\n");
else {
if (debug)
- success
- ("server rejected excessive number of key updates\n");
+ success("server rejected excessive number of key updates\n");
}
} else {
virt_sec_sleep(KEY_UPDATES_WINDOW / 1000 + 1);