summaryrefslogtreecommitdiff
path: root/tests/x509-server-verify.c
diff options
context:
space:
mode:
Diffstat (limited to 'tests/x509-server-verify.c')
-rw-r--r--tests/x509-server-verify.c64
1 files changed, 39 insertions, 25 deletions
diff --git a/tests/x509-server-verify.c b/tests/x509-server-verify.c
index ee48d39ad4..b2685e114d 100644
--- a/tests/x509-server-verify.c
+++ b/tests/x509-server-verify.c
@@ -21,7 +21,7 @@
*/
#ifdef HAVE_CONFIG_H
-#include <config.h>
+# include <config.h>
#endif
#include <stdio.h>
@@ -68,20 +68,25 @@ static void start(const char *prio)
if (debug)
gnutls_global_set_log_level(2);
- assert(gnutls_certificate_allocate_credentials(&serverx509cred)>=0);
- ret = gnutls_certificate_set_x509_key_mem2(serverx509cred, &server_ca3_localhost6_cert,
- &server_ca3_key, GNUTLS_X509_FMT_PEM, NULL, 0);
- assert(ret>=0);
+ assert(gnutls_certificate_allocate_credentials(&serverx509cred) >= 0);
+ ret =
+ gnutls_certificate_set_x509_key_mem2(serverx509cred,
+ &server_ca3_localhost6_cert,
+ &server_ca3_key,
+ GNUTLS_X509_FMT_PEM, NULL, 0);
+ assert(ret >= 0);
index1 = ret;
- ret = gnutls_certificate_set_ocsp_status_request_mem(serverx509cred, &ocsp_ca3_localhost6_unknown_pem,
- index1, GNUTLS_X509_FMT_PEM);
- assert(ret>=0);
+ ret =
+ gnutls_certificate_set_ocsp_status_request_mem(serverx509cred,
+ &ocsp_ca3_localhost6_unknown_pem,
+ index1,
+ GNUTLS_X509_FMT_PEM);
+ assert(ret >= 0);
- assert(gnutls_init(&server, GNUTLS_SERVER)>=0);
+ assert(gnutls_init(&server, GNUTLS_SERVER) >= 0);
gnutls_credentials_set(server, GNUTLS_CRD_CERTIFICATE, serverx509cred);
- assert(gnutls_priority_set_direct(server,
- prio, NULL) >= 0);
+ assert(gnutls_priority_set_direct(server, prio, NULL) >= 0);
gnutls_transport_set_push_function(server, server_push);
gnutls_transport_set_pull_function(server, server_pull);
gnutls_transport_set_ptr(server, server);
@@ -91,25 +96,30 @@ static void start(const char *prio)
assert(gnutls_certificate_set_x509_trust_mem(clientx509cred, &ca3_cert,
GNUTLS_X509_FMT_PEM) >= 0);
- ret = gnutls_certificate_set_x509_key_mem2(clientx509cred, &cli_ca3_cert_chain,
- &cli_ca3_key, GNUTLS_X509_FMT_PEM, NULL, 0);
- assert(ret>=0);
+ ret =
+ gnutls_certificate_set_x509_key_mem2(clientx509cred,
+ &cli_ca3_cert_chain,
+ &cli_ca3_key,
+ GNUTLS_X509_FMT_PEM, NULL, 0);
+ assert(ret >= 0);
index1 = ret;
- ret = gnutls_certificate_set_ocsp_status_request_mem(clientx509cred, &ocsp_cli_ca3_good_pem,
- index1, GNUTLS_X509_FMT_PEM);
- assert(ret>=0);
+ ret =
+ gnutls_certificate_set_ocsp_status_request_mem(clientx509cred,
+ &ocsp_cli_ca3_good_pem,
+ index1,
+ GNUTLS_X509_FMT_PEM);
+ assert(ret >= 0);
assert(gnutls_certificate_set_x509_trust_mem(clientx509cred, &ca3_cert,
GNUTLS_X509_FMT_PEM) >= 0);
-
assert(gnutls_init(&client, GNUTLS_CLIENT) >= 0);
assert(gnutls_credentials_set(client, GNUTLS_CRD_CERTIFICATE,
clientx509cred) >= 0);
- assert(gnutls_priority_set_direct(client, prio, NULL)>=0);
+ assert(gnutls_priority_set_direct(client, prio, NULL) >= 0);
gnutls_transport_set_push_function(client, client_push);
gnutls_transport_set_pull_function(client, client_pull);
gnutls_transport_set_ptr(client, client);
@@ -123,19 +133,19 @@ static void start(const char *prio)
ret = gnutls_certificate_verify_peers2(server, &status);
if (ret < 0) {
fail("could not verify client certificate: %s\n",
- gnutls_strerror(ret));
+ gnutls_strerror(ret));
}
if (status == 0)
fail("No CAs present but succeeded!\n");
- assert(gnutls_certificate_set_x509_trust_mem(serverx509cred, &ca3_cert,
- GNUTLS_X509_FMT_PEM) >= 0);
+ assert(gnutls_certificate_set_x509_trust_mem
+ (serverx509cred, &ca3_cert, GNUTLS_X509_FMT_PEM) >= 0);
ret = gnutls_certificate_verify_peers2(server, &status);
if (ret < 0) {
fail("could not verify client certificate: %s\n",
- gnutls_strerror(ret));
+ gnutls_strerror(ret));
}
if (status != 0)
@@ -143,13 +153,17 @@ static void start(const char *prio)
/* under TLS1.3 the client can send OCSP responses too */
if (gnutls_protocol_get_version(server) == GNUTLS_TLS1_3) {
- ret = gnutls_ocsp_status_request_is_checked(server, GNUTLS_OCSP_SR_IS_AVAIL);
+ ret =
+ gnutls_ocsp_status_request_is_checked(server,
+ GNUTLS_OCSP_SR_IS_AVAIL);
assert(ret >= 0);
ret = gnutls_ocsp_status_request_is_checked(server, 0);
assert(ret >= 0);
} else {
- ret = gnutls_ocsp_status_request_is_checked(server, GNUTLS_OCSP_SR_IS_AVAIL);
+ ret =
+ gnutls_ocsp_status_request_is_checked(server,
+ GNUTLS_OCSP_SR_IS_AVAIL);
assert(ret == 0);
ret = gnutls_ocsp_status_request_is_checked(server, 0);