summaryrefslogtreecommitdiff
path: root/tests/x509self.c
diff options
context:
space:
mode:
Diffstat (limited to 'tests/x509self.c')
-rw-r--r--tests/x509self.c68
1 files changed, 32 insertions, 36 deletions
diff --git a/tests/x509self.c b/tests/x509self.c
index 86219cd8d6..afc1975280 100644
--- a/tests/x509self.c
+++ b/tests/x509self.c
@@ -23,7 +23,7 @@
/* Parts copied from GnuTLS example programs. */
#ifdef HAVE_CONFIG_H
-# include <config.h>
+#include <config.h>
#endif
#include <stdio.h>
@@ -41,19 +41,19 @@ int main(int argc, char **argv)
#else
-# include <string.h>
-# include <sys/types.h>
-# include <sys/socket.h>
-# if !defined(_WIN32)
-# include <sys/wait.h>
-# endif
-# include <unistd.h>
-# include <gnutls/gnutls.h>
+#include <string.h>
+#include <sys/types.h>
+#include <sys/socket.h>
+#if !defined(_WIN32)
+#include <sys/wait.h>
+#endif
+#include <unistd.h>
+#include <gnutls/gnutls.h>
-# include "utils.h"
+#include "utils.h"
-# include "ex-session-info.c"
-# include "ex-x509-info.c"
+#include "ex-session-info.c"
+#include "ex-x509-info.c"
pid_t child;
@@ -63,8 +63,8 @@ static void tls_log_func(int level, const char *str)
str);
}
-# define MAX_BUF 1024
-# define MSG "Hello TLS"
+#define MAX_BUF 1024
+#define MSG "Hello TLS"
static void client(int sd, const char *prio)
{
@@ -115,16 +115,15 @@ static void client(int sd, const char *prio)
if (debug)
success("client: TLS version is: %s\n",
- gnutls_protocol_get_name
- (gnutls_protocol_get_version(session)));
+ gnutls_protocol_get_name(
+ gnutls_protocol_get_version(session)));
/* see the Getting peer's information example */
if (debug)
print_info(session);
- ret =
- gnutls_credentials_get(session, GNUTLS_CRD_CERTIFICATE,
- (void **)&tst_cred);
+ ret = gnutls_credentials_get(session, GNUTLS_CRD_CERTIFICATE,
+ (void **)&tst_cred);
if (ret < 0) {
fail("client: gnutls_credentials_get failed: %s\n",
gnutls_strerror(ret));
@@ -157,8 +156,7 @@ static void client(int sd, const char *prio)
ret = gnutls_handshake(session);
if (ret == 0) {
if (debug)
- success
- ("client: handshake complete, reading again.\n");
+ success("client: handshake complete, reading again.\n");
ret = gnutls_record_recv(session, buffer, MAX_BUF);
} else {
fail("client: handshake failed.\n");
@@ -184,7 +182,7 @@ static void client(int sd, const char *prio)
gnutls_bye(session, GNUTLS_SHUT_RDWR);
- end:
+end:
close(sd);
@@ -198,8 +196,8 @@ static void client(int sd, const char *prio)
/* This is a sample TLS 1.0 echo server, using X.509 authentication.
*/
-# define MAX_BUF 1024
-# define DH_BITS 1024
+#define MAX_BUF 1024
+#define DH_BITS 1024
static void server(int sd, const char *prio)
{
@@ -251,8 +249,8 @@ static void server(int sd, const char *prio)
if (debug) {
success("server: Handshake was completed\n");
success("server: TLS version is: %s\n",
- gnutls_protocol_get_name
- (gnutls_protocol_get_version(session)));
+ gnutls_protocol_get_name(
+ gnutls_protocol_get_version(session)));
}
/* see the Getting peer's information example */
@@ -267,19 +265,18 @@ static void server(int sd, const char *prio)
if (ret == 0) {
if (debug)
- success
- ("server: Peer has closed the GnuTLS connection\n");
+ success("server: Peer has closed the GnuTLS connection\n");
break;
} else if (ret < 0) {
- fail("server: Received corrupted data(%s). Closing...\n", gnutls_strerror(ret));
+ fail("server: Received corrupted data(%s). Closing...\n",
+ gnutls_strerror(ret));
break;
} else if (ret > 0) {
- gnutls_certificate_server_set_request(session,
- GNUTLS_CERT_REQUEST);
+ gnutls_certificate_server_set_request(
+ session, GNUTLS_CERT_REQUEST);
if (debug)
- success
- ("server: got data, forcing rehandshake.\n");
+ success("server: got data, forcing rehandshake.\n");
ret = gnutls_rehandshake(session);
if (ret < 0) {
@@ -318,8 +315,7 @@ static void server(int sd, const char *prio)
success("server: finished\n");
}
-static
-void start(const char *prio)
+static void start(const char *prio)
{
int sockets[2];
int err;
@@ -363,4 +359,4 @@ void doit(void)
start("NORMAL");
}
-#endif /* _WIN32 */
+#endif /* _WIN32 */