Rerun util/openssl-format-source -v -c . OpenSSL_1_0_0-post-auto-reformat
authorMatt Caswell <matt@openssl.org>
Thu, 22 Jan 2015 01:02:03 +0000 (01:02 +0000)
committerMatt Caswell <matt@openssl.org>
Thu, 22 Jan 2015 09:46:26 +0000 (09:46 +0000)
Reviewed-by: Tim Hudson <tjh@openssl.org>
crypto/asn1/x_crl.c
crypto/bio/bss_file.c
crypto/ec/ecp_smpl.c
crypto/pem/pem_all.c
crypto/rsa/rsa_eay.c
engines/e_padlock.c
ssl/d1_srvr.c
ssl/s2_srvr.c
ssl/s3_lib.c
ssl/s3_srvr.c
ssl/ssl_sess.c

index cd5c0bfb187383dde2490fdd9b79576aebbfffc9..e258c714b2499b840b57c35a423361cc1379894b 100644 (file)
@@ -344,6 +344,7 @@ IMPLEMENT_ASN1_FUNCTIONS(X509_REVOKED)
 IMPLEMENT_ASN1_FUNCTIONS(X509_CRL_INFO)
 
 IMPLEMENT_ASN1_FUNCTIONS(X509_CRL)
+
 IMPLEMENT_ASN1_DUP_FUNCTION(X509_CRL)
 
 static int X509_REVOKED_cmp(const X509_REVOKED *const *a,
@@ -510,4 +511,5 @@ IMPLEMENT_STACK_OF(X509_REVOKED)
 IMPLEMENT_ASN1_SET_OF(X509_REVOKED)
 
 IMPLEMENT_STACK_OF(X509_CRL)
+
 IMPLEMENT_ASN1_SET_OF(X509_CRL)
index d3da7e789f78324f1fee2b7e9c7d011e9829dd1c..d7f15b0699c91d202e1033619a1e71a1aa9ea467 100644 (file)
@@ -239,8 +239,7 @@ static int MS_CALLBACK file_read(BIO *b, char *out, int outl)
         else
             ret = fread(out, 1, (int)outl, (FILE *)b->ptr);
         if (ret == 0
-            && (b->
-                flags & BIO_FLAGS_UPLINK) ? UP_ferror((FILE *)b->ptr) :
+            && (b->flags & BIO_FLAGS_UPLINK) ? UP_ferror((FILE *)b->ptr) :
             ferror((FILE *)b->ptr)) {
             SYSerr(SYS_F_FREAD, get_last_sys_error());
             BIOerr(BIO_F_FILE_READ, ERR_R_SYS_LIB);
index 6b27ee660ba7ac9e805710c810b38d0a3dd60705..3548e1be28520b8f76e5e977c431dc778c70ee9b 100644 (file)
@@ -1650,9 +1650,8 @@ int ec_GFp_simple_points_make_affine(const EC_GROUP *group, size_t num,
 
     for (i = 1; i < num; i++) {
         if (!BN_is_zero(&points[i]->Z)) {
-            if (!group->
-                meth->field_mul(group, prod_Z[i], prod_Z[i - 1],
-                                &points[i]->Z, ctx))
+            if (!group->meth->field_mul(group, prod_Z[i], prod_Z[i - 1],
+                                        &points[i]->Z, ctx))
                 goto err;
         } else {
             if (!BN_copy(prod_Z[i], prod_Z[i - 1]))
index 110bd3ea30bee84f4b3a049377c2f2bb87c0b33d..09f2f9dad421360857b8d094ee1edd6b37766116 100644 (file)
@@ -190,6 +190,7 @@ RSA *PEM_read_RSAPrivateKey(FILE *fp, RSA **rsa, pem_password_cb *cb, void *u)
 IMPLEMENT_PEM_write_cb_const(RSAPrivateKey, RSA, PEM_STRING_RSA,
                              RSAPrivateKey)
 
+
 IMPLEMENT_PEM_rw_const(RSAPublicKey, RSA, PEM_STRING_RSA_PUBLIC,
                        RSAPublicKey) IMPLEMENT_PEM_rw(RSA_PUBKEY, RSA,
                                                       PEM_STRING_PUBLIC,
index a6df3be59b70576cabcc98a26da3c129f38fb7a1..b147fff8bd6086e1f712459521a98c4e00492458 100644 (file)
@@ -842,9 +842,8 @@ static int RSA_eay_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa, BN_CTX *ctx)
         goto err;
 
     if (rsa->e && rsa->n) {
-        if (!rsa->
-            meth->bn_mod_exp(vrfy, r0, rsa->e, rsa->n, ctx,
-                             rsa->_method_mod_n))
+        if (!rsa->meth->bn_mod_exp(vrfy, r0, rsa->e, rsa->n, ctx,
+                                   rsa->_method_mod_n))
             goto err;
         /*
          * If 'I' was greater than (or equal to) rsa->n, the operation will
index afc04053d9691ffcf1ddac73a9fd889d99052365..f33b779a29f2a7793be699cde100f96ffce10493 100644 (file)
@@ -579,7 +579,9 @@ pushfd cld mov esi, ecx mov edi, ecx mov ecx, 60 up:lodsd
 #    if defined(NID_aes_256_ofb128) && ! defined (NID_aes_256_ofb)
 #     define NID_aes_256_ofb NID_aes_256_ofb128
 #    endif
-/* List of supported ciphers. */ static int padlock_cipher_nids[] = {
+/*
+ * List of supported ciphers.
+ */ static int padlock_cipher_nids[] = {
     NID_aes_128_ecb,
     NID_aes_128_cbc,
     NID_aes_128_cfb,
index 67d445a723dac4c264bd7177d3023dbab39323eb..cc18a2fa336435cfeb64a3d360a4402617fdfc1f 100644 (file)
@@ -394,8 +394,7 @@ int dtls1_accept(SSL *s)
                 || ((alg_k & SSL_kRSA)
                     && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL
                         || (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher)
-                            && EVP_PKEY_size(s->cert->
-                                             pkeys
+                            && EVP_PKEY_size(s->cert->pkeys
                                              [SSL_PKEY_RSA_ENC].privatekey) *
                             8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher)
                         )
index 256325707c648e2eed43d6d995a4c36612443402..1fc97789a2b214575f9f27e56905c4341c6320e3 100644 (file)
@@ -484,8 +484,7 @@ static int get_client_master_key(SSL *s)
     if ((i < 0) || ((!is_export && (i != EVP_CIPHER_key_length(c)))
                     || (is_export && ((i != ek)
                                       || (s->s2->tmp.clear +
-                                          (unsigned int)i !=
-                                          (unsigned int)
+                                          (unsigned int)i != (unsigned int)
                                           EVP_CIPHER_key_length(c)))))) {
         ERR_clear_error();
         if (is_export)
index 86272f77edf4dc2449de15d8a68ba892a1d52d7c..034134cabccdbb540b4eee1296cc4f0796591c6b 100644 (file)
@@ -3034,9 +3034,8 @@ SSL_CIPHER *ssl3_choose_cipher(SSL *s, STACK_OF(SSL_CIPHER) *clnt,
                          j++) {
                         if ((s->session->tlsext_ellipticcurvelist[2 * j] ==
                              ec_search1)
-                            && (s->
-                                session->tlsext_ellipticcurvelist[2 * j +
-                                                                  1] ==
+                            && (s->session->tlsext_ellipticcurvelist[2 * j +
+                                                                     1] ==
                                 ec_search2)) {
                             ec_ok = 1;
                             break;
@@ -3089,9 +3088,8 @@ SSL_CIPHER *ssl3_choose_cipher(SSL *s, STACK_OF(SSL_CIPHER) *clnt,
                          j++) {
                         if ((s->session->tlsext_ellipticcurvelist[2 * j] ==
                              ec_search1)
-                            && (s->
-                                session->tlsext_ellipticcurvelist[2 * j +
-                                                                  1] ==
+                            && (s->session->tlsext_ellipticcurvelist[2 * j +
+                                                                     1] ==
                                 ec_search2)) {
                             ec_ok = 1;
                             break;
index abceac5f6284eec6fbe19443416f93eb47278ef6..86de218596d7b821d54a6f9b4c1d4b3f193fb487 100644 (file)
@@ -402,8 +402,7 @@ int ssl3_accept(SSL *s)
                 || ((alg_k & SSL_kRSA)
                     && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL
                         || (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher)
-                            && EVP_PKEY_size(s->cert->
-                                             pkeys
+                            && EVP_PKEY_size(s->cert->pkeys
                                              [SSL_PKEY_RSA_ENC].privatekey) *
                             8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher)
                         )
index 47e90ce64a876cb7cfaa6116b1ffcebc5504a8c9..1fc44c1e309703899aad0bf013a757954b068c4f 100644 (file)
@@ -439,8 +439,7 @@ int ssl_get_prev_session(SSL *s, unsigned char *session_id, int len,
     } else if (r == 0 || (!ret && !len))
         goto err;
     else if (!ret
-             && !(s->
-                  session_ctx->session_cache_mode &
+             && !(s->session_ctx->session_cache_mode &
                   SSL_SESS_CACHE_NO_INTERNAL_LOOKUP))
 #else
     if (len == 0)
@@ -490,8 +489,7 @@ int ssl_get_prev_session(SSL *s, unsigned char *session_id, int len,
              * well if and only if we are supposed to.
              */
             if (!
-                (s->
-                 session_ctx->session_cache_mode &
+                (s->session_ctx->session_cache_mode &
                  SSL_SESS_CACHE_NO_INTERNAL_STORE))
                 /*
                  * The following should not return 1, otherwise, things are