Remove spaces at end of line in ssl/statem
authorPaul Yang <yang.yang@baishancloud.com>
Fri, 15 Dec 2017 07:01:20 +0000 (15:01 +0800)
committerKurt Roeckx <kurt@roeckx.be>
Sun, 17 Dec 2017 22:04:41 +0000 (23:04 +0100)
Reviewed-by: Kurt Roeckx <kurt@roeckx.be>
Reviewed-by: Matt Caswell <matt@openssl.org>
GH: #4934

ssl/statem/extensions.c
ssl/statem/extensions_clnt.c
ssl/statem/extensions_srvr.c
ssl/statem/statem_srvr.c

index 28f7ada55a40456fbd58b90bb6f13d3b1e9813df..505337a44a83efd28bb21c58445932e3dfd73c7d 100644 (file)
@@ -1047,7 +1047,7 @@ static int final_alpn(SSL *s, unsigned int context, int sent)
      * we also have to do this before we decide whether to accept early_data.
      * In TLSv1.3 we've already negotiated our cipher so we do this call now.
      * For < TLSv1.3 we defer it until after cipher negotiation.
-     * 
+     *
      * On failure SSLfatal() already called.
      */
     return tls_handle_alpn(s);
index 2b3945970f69d67b376163d78227b7089a24ad48..dbb881223a500879da14fb91dab341b57fe2b1f8 100644 (file)
@@ -1202,7 +1202,7 @@ int tls_parse_stoc_maxfragmentlen(SSL *s, PACKET *pkt, unsigned int context,
     unsigned int value;
 
     if (PACKET_remaining(pkt) != 1 || !PACKET_get_1(pkt, &value)) {
-        SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_F_TLS_PARSE_STOC_MAXFRAGMENTLEN, 
+        SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_F_TLS_PARSE_STOC_MAXFRAGMENTLEN,
                  SSL_R_BAD_EXTENSION);
         return 0;
     }
index d34a7c5ee5dd7f30edc49a02f4b2061dc507cac3..30cbf9e6ae2b47630991bc96af20e747880f1308 100644 (file)
@@ -1081,7 +1081,7 @@ EXT_RETURN tls_construct_stoc_status_request(SSL *s, WPACKET *pkt,
      */
     if (SSL_IS_TLS13(s) && !tls_construct_cert_status_body(s, pkt)) {
        /* SSLfatal() already called */
-       return EXT_RETURN_FAIL; 
+       return EXT_RETURN_FAIL;
     }
     if (!WPACKET_close(pkt)) {
         SSLfatal(s, SSL_AD_INTERNAL_ERROR,
index 249ee403fe8c1e142708510cbf7df102a1f84613..f24f05f44b1f9d424df8ef5fccf18c5d59a2ba99 100644 (file)
@@ -654,7 +654,7 @@ WORK_STATE ossl_statem_server_pre_work(SSL *s, WORK_STATE wst)
              * Actually this is the end of the handshake, but we're going
              * straight into writing the session ticket out. So we finish off
              * the handshake, but keep the various buffers active.
-             * 
+             *
              * Calls SSLfatal as required.
              */
             return tls_finish_handshake(s, wst, 0);