diff options
author | Craig Tiller <ctiller@google.com> | 2017-11-03 09:09:36 -0700 |
---|---|---|
committer | Craig Tiller <ctiller@google.com> | 2017-11-03 09:09:36 -0700 |
commit | baa14a975ef92ee6fb301f0e684f56f18f2c55a7 (patch) | |
tree | 9a6cb2df58fe175e8abfccf2cbd40349726e46f3 /test/core/bad_ssl/servers | |
parent | ef68fe7239a89095f1eaa89c1dd28b2b7be2a3c7 (diff) |
Update clang-format to 5.0
Diffstat (limited to 'test/core/bad_ssl/servers')
-rw-r--r-- | test/core/bad_ssl/servers/alpn.c | 14 | ||||
-rw-r--r-- | test/core/bad_ssl/servers/cert.c | 12 |
2 files changed, 13 insertions, 13 deletions
diff --git a/test/core/bad_ssl/servers/alpn.c b/test/core/bad_ssl/servers/alpn.c index 3179054aff..a207516a72 100644 --- a/test/core/bad_ssl/servers/alpn.c +++ b/test/core/bad_ssl/servers/alpn.c @@ -31,9 +31,9 @@ * a protocol that the connecting client does not support. It does this by * overriding the functions declared in alpn.c from the core library. */ -static const char *const fake_versions[] = {"not-h2"}; +static const char* const fake_versions[] = {"not-h2"}; -int grpc_chttp2_is_alpn_version_supported(const char *version, size_t size) { +int grpc_chttp2_is_alpn_version_supported(const char* version, size_t size) { size_t i; for (i = 0; i < GPR_ARRAY_SIZE(fake_versions); i++) { if (!strncmp(version, fake_versions[i], size)) return 1; @@ -45,17 +45,17 @@ size_t grpc_chttp2_num_alpn_versions(void) { return GPR_ARRAY_SIZE(fake_versions); } -const char *grpc_chttp2_get_alpn_version_index(size_t i) { +const char* grpc_chttp2_get_alpn_version_index(size_t i) { GPR_ASSERT(i < GPR_ARRAY_SIZE(fake_versions)); return fake_versions[i]; } -int main(int argc, char **argv) { - const char *addr = bad_ssl_addr(argc, argv); +int main(int argc, char** argv) { + const char* addr = bad_ssl_addr(argc, argv); grpc_ssl_pem_key_cert_pair pem_key_cert_pair = {test_server1_key, test_server1_cert}; - grpc_server_credentials *ssl_creds; - grpc_server *server; + grpc_server_credentials* ssl_creds; + grpc_server* server; grpc_init(); ssl_creds = diff --git a/test/core/bad_ssl/servers/cert.c b/test/core/bad_ssl/servers/cert.c index a1f3048164..4a8ac93452 100644 --- a/test/core/bad_ssl/servers/cert.c +++ b/test/core/bad_ssl/servers/cert.c @@ -31,11 +31,11 @@ /* This server will present an untrusted cert to the connecting client, * causing the SSL handshake to fail */ -int main(int argc, char **argv) { - const char *addr = bad_ssl_addr(argc, argv); +int main(int argc, char** argv) { + const char* addr = bad_ssl_addr(argc, argv); grpc_ssl_pem_key_cert_pair pem_key_cert_pair; - grpc_server_credentials *ssl_creds; - grpc_server *server; + grpc_server_credentials* ssl_creds; + grpc_server* server; grpc_slice cert_slice, key_slice; grpc_init(); @@ -46,8 +46,8 @@ int main(int argc, char **argv) { GPR_ASSERT(GRPC_LOG_IF_ERROR( "load_file", grpc_load_file("src/core/tsi/test_creds/badserver.key", 1, &key_slice))); - pem_key_cert_pair.private_key = (const char *)GRPC_SLICE_START_PTR(key_slice); - pem_key_cert_pair.cert_chain = (const char *)GRPC_SLICE_START_PTR(cert_slice); + pem_key_cert_pair.private_key = (const char*)GRPC_SLICE_START_PTR(key_slice); + pem_key_cert_pair.cert_chain = (const char*)GRPC_SLICE_START_PTR(cert_slice); ssl_creds = grpc_ssl_server_credentials_create(NULL, &pem_key_cert_pair, 1, 0, NULL); |