summaryrefslogtreecommitdiffstats
path: root/test
diff options
context:
space:
mode:
authorFdaSilvaYY <fdasilvayy@gmail.com>2016-08-24 00:17:31 +0200
committerMatt Caswell <matt@openssl.org>2017-01-25 10:06:34 +0100
commit28b86f313b43cc70d11054d3830ef82e7af8290a (patch)
tree20743c03a976c242810d0a60675c994b724b7640 /test
parents_client: Better response success check for CONNECT (diff)
downloadopenssl-28b86f313b43cc70d11054d3830ef82e7af8290a.tar.xz
openssl-28b86f313b43cc70d11054d3830ef82e7af8290a.zip
Fix some extra or missing whitespaces...
Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/1618)
Diffstat (limited to 'test')
-rw-r--r--test/asynciotest.c2
-rw-r--r--test/handshake_helper.c2
-rw-r--r--test/ssltestlib.c4
-rw-r--r--test/verify_extra_test.c4
4 files changed, 6 insertions, 6 deletions
diff --git a/test/asynciotest.c b/test/asynciotest.c
index e14747265d..d4edd94936 100644
--- a/test/asynciotest.c
+++ b/test/asynciotest.c
@@ -205,7 +205,7 @@ static int async_write(BIO *bio, const char *in, int inl)
/* Write any data we have left after fragmenting */
ret = 0;
if ((int)written < inl) {
- ret = BIO_write(next, in + written , inl - written);
+ ret = BIO_write(next, in + written, inl - written);
}
if (ret <= 0 && BIO_should_write(next))
diff --git a/test/handshake_helper.c b/test/handshake_helper.c
index c8fd47430a..fd79565bef 100644
--- a/test/handshake_helper.c
+++ b/test/handshake_helper.c
@@ -837,7 +837,7 @@ static char *dup_str(const unsigned char *in, size_t len)
{
char *ret;
- if(len == 0)
+ if (len == 0)
return NULL;
/* Assert that the string does not contain NUL-bytes. */
diff --git a/test/ssltestlib.c b/test/ssltestlib.c
index 42ba98cb7a..57039e77a9 100644
--- a/test/ssltestlib.c
+++ b/test/ssltestlib.c
@@ -155,7 +155,7 @@ static void dump_data(const char *data, int len)
printf("*** Message Fragment len: %d\n", fraglen);
if (fragoff + fraglen > msglen)
printf("***---- HANDSHAKE MESSAGE FRAGMENT INVALID ----\n");
- else if(reclen < fraglen)
+ else if (reclen < fraglen)
printf("**---- HANDSHAKE MESSAGE FRAGMENT TRUNCATED ----\n");
else
printf("**---- END OF HANDSHAKE MESSAGE FRAGMENT ----\n");
@@ -442,7 +442,7 @@ int mempacket_test_inject(BIO *bio, const char *in, int inl, int pktnum,
else
return inl;
} while(1);
- } else if(looppkt->num == thispkt->num) {
+ } else if (looppkt->num == thispkt->num) {
if (!ctx->noinject) {
/* We injected two packets with the same packet number! */
return -1;
diff --git a/test/verify_extra_test.c b/test/verify_extra_test.c
index cc05bc2ef1..bfbe5c02f1 100644
--- a/test/verify_extra_test.c
+++ b/test/verify_extra_test.c
@@ -102,7 +102,7 @@ static int test_alt_chains_cert_forgery(const char *roots_f,
lookup = X509_STORE_add_lookup(store, X509_LOOKUP_file());
if (lookup == NULL)
goto err;
- if(!X509_LOOKUP_load_file(lookup, roots_f, X509_FILETYPE_PEM))
+ if (!X509_LOOKUP_load_file(lookup, roots_f, X509_FILETYPE_PEM))
goto err;
untrusted = load_certs_from_file(untrusted_f);
@@ -110,7 +110,7 @@ static int test_alt_chains_cert_forgery(const char *roots_f,
if ((bio = BIO_new_file(bad_f, "r")) == NULL)
goto err;
- if((x = PEM_read_bio_X509(bio, NULL, 0, NULL)) == NULL)
+ if ((x = PEM_read_bio_X509(bio, NULL, 0, NULL)) == NULL)
goto err;
sctx = X509_STORE_CTX_new();