aboutsummaryrefslogtreecommitdiffhomepage
path: root/test/core/bad_ssl/servers
diff options
context:
space:
mode:
authorGravatar Craig Tiller <ctiller@google.com>2017-11-03 09:09:36 -0700
committerGravatar Craig Tiller <ctiller@google.com>2017-11-03 09:09:36 -0700
commitbaa14a975ef92ee6fb301f0e684f56f18f2c55a7 (patch)
tree9a6cb2df58fe175e8abfccf2cbd40349726e46f3 /test/core/bad_ssl/servers
parentef68fe7239a89095f1eaa89c1dd28b2b7be2a3c7 (diff)
Update clang-format to 5.0
Diffstat (limited to 'test/core/bad_ssl/servers')
-rw-r--r--test/core/bad_ssl/servers/alpn.c14
-rw-r--r--test/core/bad_ssl/servers/cert.c12
2 files changed, 13 insertions, 13 deletions
diff --git a/test/core/bad_ssl/servers/alpn.c b/test/core/bad_ssl/servers/alpn.c
index 3179054aff..a207516a72 100644
--- a/test/core/bad_ssl/servers/alpn.c
+++ b/test/core/bad_ssl/servers/alpn.c
@@ -31,9 +31,9 @@
* a protocol that the connecting client does not support. It does this by
* overriding the functions declared in alpn.c from the core library. */
-static const char *const fake_versions[] = {"not-h2"};
+static const char* const fake_versions[] = {"not-h2"};
-int grpc_chttp2_is_alpn_version_supported(const char *version, size_t size) {
+int grpc_chttp2_is_alpn_version_supported(const char* version, size_t size) {
size_t i;
for (i = 0; i < GPR_ARRAY_SIZE(fake_versions); i++) {
if (!strncmp(version, fake_versions[i], size)) return 1;
@@ -45,17 +45,17 @@ size_t grpc_chttp2_num_alpn_versions(void) {
return GPR_ARRAY_SIZE(fake_versions);
}
-const char *grpc_chttp2_get_alpn_version_index(size_t i) {
+const char* grpc_chttp2_get_alpn_version_index(size_t i) {
GPR_ASSERT(i < GPR_ARRAY_SIZE(fake_versions));
return fake_versions[i];
}
-int main(int argc, char **argv) {
- const char *addr = bad_ssl_addr(argc, argv);
+int main(int argc, char** argv) {
+ const char* addr = bad_ssl_addr(argc, argv);
grpc_ssl_pem_key_cert_pair pem_key_cert_pair = {test_server1_key,
test_server1_cert};
- grpc_server_credentials *ssl_creds;
- grpc_server *server;
+ grpc_server_credentials* ssl_creds;
+ grpc_server* server;
grpc_init();
ssl_creds =
diff --git a/test/core/bad_ssl/servers/cert.c b/test/core/bad_ssl/servers/cert.c
index a1f3048164..4a8ac93452 100644
--- a/test/core/bad_ssl/servers/cert.c
+++ b/test/core/bad_ssl/servers/cert.c
@@ -31,11 +31,11 @@
/* This server will present an untrusted cert to the connecting client,
* causing the SSL handshake to fail */
-int main(int argc, char **argv) {
- const char *addr = bad_ssl_addr(argc, argv);
+int main(int argc, char** argv) {
+ const char* addr = bad_ssl_addr(argc, argv);
grpc_ssl_pem_key_cert_pair pem_key_cert_pair;
- grpc_server_credentials *ssl_creds;
- grpc_server *server;
+ grpc_server_credentials* ssl_creds;
+ grpc_server* server;
grpc_slice cert_slice, key_slice;
grpc_init();
@@ -46,8 +46,8 @@ int main(int argc, char **argv) {
GPR_ASSERT(GRPC_LOG_IF_ERROR(
"load_file",
grpc_load_file("src/core/tsi/test_creds/badserver.key", 1, &key_slice)));
- pem_key_cert_pair.private_key = (const char *)GRPC_SLICE_START_PTR(key_slice);
- pem_key_cert_pair.cert_chain = (const char *)GRPC_SLICE_START_PTR(cert_slice);
+ pem_key_cert_pair.private_key = (const char*)GRPC_SLICE_START_PTR(key_slice);
+ pem_key_cert_pair.cert_chain = (const char*)GRPC_SLICE_START_PTR(cert_slice);
ssl_creds =
grpc_ssl_server_credentials_create(NULL, &pem_key_cert_pair, 1, 0, NULL);