diff options
author | 2017-11-06 14:39:17 -0800 | |
---|---|---|
committer | 2017-11-06 14:43:31 -0800 | |
commit | 40422d5fa621624868280094efb2f01c2cd1352b (patch) | |
tree | cbb2baa955e11c03fa004e9e0f4f3037ba3d6150 /test/core/bad_ssl/servers | |
parent | aae4ca01a315a69fcf182d09aea1efdfcda13d48 (diff) | |
parent | e759d2ad7abdb0702970eeccc5f033ff4b2a4c7f (diff) |
Merge master
Diffstat (limited to 'test/core/bad_ssl/servers')
-rw-r--r-- | test/core/bad_ssl/servers/alpn.cc | 14 | ||||
-rw-r--r-- | test/core/bad_ssl/servers/cert.cc | 12 |
2 files changed, 13 insertions, 13 deletions
diff --git a/test/core/bad_ssl/servers/alpn.cc b/test/core/bad_ssl/servers/alpn.cc index 3179054aff..a207516a72 100644 --- a/test/core/bad_ssl/servers/alpn.cc +++ b/test/core/bad_ssl/servers/alpn.cc @@ -31,9 +31,9 @@ * a protocol that the connecting client does not support. It does this by * overriding the functions declared in alpn.c from the core library. */ -static const char *const fake_versions[] = {"not-h2"}; +static const char* const fake_versions[] = {"not-h2"}; -int grpc_chttp2_is_alpn_version_supported(const char *version, size_t size) { +int grpc_chttp2_is_alpn_version_supported(const char* version, size_t size) { size_t i; for (i = 0; i < GPR_ARRAY_SIZE(fake_versions); i++) { if (!strncmp(version, fake_versions[i], size)) return 1; @@ -45,17 +45,17 @@ size_t grpc_chttp2_num_alpn_versions(void) { return GPR_ARRAY_SIZE(fake_versions); } -const char *grpc_chttp2_get_alpn_version_index(size_t i) { +const char* grpc_chttp2_get_alpn_version_index(size_t i) { GPR_ASSERT(i < GPR_ARRAY_SIZE(fake_versions)); return fake_versions[i]; } -int main(int argc, char **argv) { - const char *addr = bad_ssl_addr(argc, argv); +int main(int argc, char** argv) { + const char* addr = bad_ssl_addr(argc, argv); grpc_ssl_pem_key_cert_pair pem_key_cert_pair = {test_server1_key, test_server1_cert}; - grpc_server_credentials *ssl_creds; - grpc_server *server; + grpc_server_credentials* ssl_creds; + grpc_server* server; grpc_init(); ssl_creds = diff --git a/test/core/bad_ssl/servers/cert.cc b/test/core/bad_ssl/servers/cert.cc index a1f3048164..4a8ac93452 100644 --- a/test/core/bad_ssl/servers/cert.cc +++ b/test/core/bad_ssl/servers/cert.cc @@ -31,11 +31,11 @@ /* This server will present an untrusted cert to the connecting client, * causing the SSL handshake to fail */ -int main(int argc, char **argv) { - const char *addr = bad_ssl_addr(argc, argv); +int main(int argc, char** argv) { + const char* addr = bad_ssl_addr(argc, argv); grpc_ssl_pem_key_cert_pair pem_key_cert_pair; - grpc_server_credentials *ssl_creds; - grpc_server *server; + grpc_server_credentials* ssl_creds; + grpc_server* server; grpc_slice cert_slice, key_slice; grpc_init(); @@ -46,8 +46,8 @@ int main(int argc, char **argv) { GPR_ASSERT(GRPC_LOG_IF_ERROR( "load_file", grpc_load_file("src/core/tsi/test_creds/badserver.key", 1, &key_slice))); - pem_key_cert_pair.private_key = (const char *)GRPC_SLICE_START_PTR(key_slice); - pem_key_cert_pair.cert_chain = (const char *)GRPC_SLICE_START_PTR(cert_slice); + pem_key_cert_pair.private_key = (const char*)GRPC_SLICE_START_PTR(key_slice); + pem_key_cert_pair.cert_chain = (const char*)GRPC_SLICE_START_PTR(cert_slice); ssl_creds = grpc_ssl_server_credentials_create(NULL, &pem_key_cert_pair, 1, 0, NULL); |