diff options
Diffstat (limited to 'tests/tls13/key_update_multiple.c')
-rw-r--r-- | tests/tls13/key_update_multiple.c | 33 |
1 files changed, 14 insertions, 19 deletions
diff --git a/tests/tls13/key_update_multiple.c b/tests/tls13/key_update_multiple.c index 06c63d5d44..19eafea4bd 100644 --- a/tests/tls13/key_update_multiple.c +++ b/tests/tls13/key_update_multiple.c @@ -20,7 +20,7 @@ */ #ifdef HAVE_CONFIG_H -# include <config.h> +#include <config.h> #endif #include <stdbool.h> @@ -49,7 +49,8 @@ static void tls_log_func(int level, const char *str) } #define MAX_BUF 1024 -#define MSG "Hello TLS, and hi and how are you and more data here... and more... and even more and even more more data..." +#define MSG \ + "Hello TLS, and hi and how are you and more data here... and more... and even more and even more more data..." /* These must match the definitions in lib/tls13/key_update.c. */ #define KEY_UPDATES_WINDOW 1000 @@ -60,7 +61,7 @@ static unsigned key_update_msg_out = 0; static int hsk_callback(gnutls_session_t session, unsigned int htype, unsigned post, unsigned int incoming, - const gnutls_datum_t * msg) + const gnutls_datum_t *msg) { assert(post == GNUTLS_HOOK_PRE); @@ -100,16 +101,13 @@ static void run(const char *name, bool exceed_limit) /* Init server */ assert(gnutls_certificate_allocate_credentials(&scred) >= 0); - assert(gnutls_certificate_set_x509_key_mem(scred, - &server_ca3_localhost_cert, - &server_ca3_key, - GNUTLS_X509_FMT_PEM) >= 0); + assert(gnutls_certificate_set_x509_key_mem( + scred, &server_ca3_localhost_cert, &server_ca3_key, + GNUTLS_X509_FMT_PEM) >= 0); assert(gnutls_init(&server, GNUTLS_SERVER) >= 0); - ret = - gnutls_priority_set_direct(server, - "NORMAL:-VERS-TLS-ALL:+VERS-TLS1.3", - NULL); + ret = gnutls_priority_set_direct( + server, "NORMAL:-VERS-TLS-ALL:+VERS-TLS1.3", NULL); if (ret < 0) exit(1); @@ -120,14 +118,12 @@ static void run(const char *name, bool exceed_limit) /* Init client */ assert(gnutls_certificate_allocate_credentials(&ccred) >= 0); - assert(gnutls_certificate_set_x509_trust_mem - (ccred, &ca3_cert, GNUTLS_X509_FMT_PEM) >= 0); + assert(gnutls_certificate_set_x509_trust_mem(ccred, &ca3_cert, + GNUTLS_X509_FMT_PEM) >= 0); gnutls_init(&client, GNUTLS_CLIENT); - ret = - gnutls_priority_set_direct(client, - "NORMAL:-VERS-TLS-ALL:+VERS-TLS1.3", - NULL); + ret = gnutls_priority_set_direct( + client, "NORMAL:-VERS-TLS-ALL:+VERS-TLS1.3", NULL); assert(ret >= 0); ret = gnutls_credentials_set(client, GNUTLS_CRD_CERTIFICATE, ccred); @@ -193,8 +189,7 @@ static void run(const char *name, bool exceed_limit) fail("server didn't reject excessive number of key updates\n"); else { if (debug) - success - ("server rejected excessive number of key updates\n"); + success("server rejected excessive number of key updates\n"); } } else { virt_sec_sleep(KEY_UPDATES_WINDOW / 1000 + 1); |