diff options
author | FdaSilvaYY <fdasilvayy@gmail.com> | 2016-08-24 00:17:31 +0200 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2017-01-25 10:06:34 +0100 |
commit | 28b86f313b43cc70d11054d3830ef82e7af8290a (patch) | |
tree | 20743c03a976c242810d0a60675c994b724b7640 /test | |
parent | s_client: Better response success check for CONNECT (diff) | |
download | openssl-28b86f313b43cc70d11054d3830ef82e7af8290a.tar.xz openssl-28b86f313b43cc70d11054d3830ef82e7af8290a.zip |
Fix some extra or missing whitespaces...
Reviewed-by: Rich Salz <rsalz@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/1618)
Diffstat (limited to 'test')
-rw-r--r-- | test/asynciotest.c | 2 | ||||
-rw-r--r-- | test/handshake_helper.c | 2 | ||||
-rw-r--r-- | test/ssltestlib.c | 4 | ||||
-rw-r--r-- | test/verify_extra_test.c | 4 |
4 files changed, 6 insertions, 6 deletions
diff --git a/test/asynciotest.c b/test/asynciotest.c index e14747265d..d4edd94936 100644 --- a/test/asynciotest.c +++ b/test/asynciotest.c @@ -205,7 +205,7 @@ static int async_write(BIO *bio, const char *in, int inl) /* Write any data we have left after fragmenting */ ret = 0; if ((int)written < inl) { - ret = BIO_write(next, in + written , inl - written); + ret = BIO_write(next, in + written, inl - written); } if (ret <= 0 && BIO_should_write(next)) diff --git a/test/handshake_helper.c b/test/handshake_helper.c index c8fd47430a..fd79565bef 100644 --- a/test/handshake_helper.c +++ b/test/handshake_helper.c @@ -837,7 +837,7 @@ static char *dup_str(const unsigned char *in, size_t len) { char *ret; - if(len == 0) + if (len == 0) return NULL; /* Assert that the string does not contain NUL-bytes. */ diff --git a/test/ssltestlib.c b/test/ssltestlib.c index 42ba98cb7a..57039e77a9 100644 --- a/test/ssltestlib.c +++ b/test/ssltestlib.c @@ -155,7 +155,7 @@ static void dump_data(const char *data, int len) printf("*** Message Fragment len: %d\n", fraglen); if (fragoff + fraglen > msglen) printf("***---- HANDSHAKE MESSAGE FRAGMENT INVALID ----\n"); - else if(reclen < fraglen) + else if (reclen < fraglen) printf("**---- HANDSHAKE MESSAGE FRAGMENT TRUNCATED ----\n"); else printf("**---- END OF HANDSHAKE MESSAGE FRAGMENT ----\n"); @@ -442,7 +442,7 @@ int mempacket_test_inject(BIO *bio, const char *in, int inl, int pktnum, else return inl; } while(1); - } else if(looppkt->num == thispkt->num) { + } else if (looppkt->num == thispkt->num) { if (!ctx->noinject) { /* We injected two packets with the same packet number! */ return -1; diff --git a/test/verify_extra_test.c b/test/verify_extra_test.c index cc05bc2ef1..bfbe5c02f1 100644 --- a/test/verify_extra_test.c +++ b/test/verify_extra_test.c @@ -102,7 +102,7 @@ static int test_alt_chains_cert_forgery(const char *roots_f, lookup = X509_STORE_add_lookup(store, X509_LOOKUP_file()); if (lookup == NULL) goto err; - if(!X509_LOOKUP_load_file(lookup, roots_f, X509_FILETYPE_PEM)) + if (!X509_LOOKUP_load_file(lookup, roots_f, X509_FILETYPE_PEM)) goto err; untrusted = load_certs_from_file(untrusted_f); @@ -110,7 +110,7 @@ static int test_alt_chains_cert_forgery(const char *roots_f, if ((bio = BIO_new_file(bad_f, "r")) == NULL) goto err; - if((x = PEM_read_bio_X509(bio, NULL, 0, NULL)) == NULL) + if ((x = PEM_read_bio_X509(bio, NULL, 0, NULL)) == NULL) goto err; sctx = X509_STORE_CTX_new(); |