Fix some formatting nits
authorMatt Caswell <matt@openssl.org>
Mon, 4 Dec 2017 13:37:01 +0000 (13:37 +0000)
committerMatt Caswell <matt@openssl.org>
Mon, 4 Dec 2017 13:37:01 +0000 (13:37 +0000)
Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/4778)

ssl/s3_enc.c
ssl/ssl_lib.c
ssl/statem/statem_clnt.c
ssl/statem/statem_srvr.c

index 351b10f357771c89629604378ad03e90fe43aa00..4c63d4acd5aafe384423a96a1b7cc752bfc653a1 100644 (file)
@@ -147,7 +147,7 @@ int ssl3_change_cipher_state(SSL *s, int which)
             if (s->expand == NULL) {
                 SSLfatal(s, SSL_AD_INTERNAL_ERROR,
                          SSL_F_SSL3_CHANGE_CIPHER_STATE,
-                        SSL_R_COMPRESSION_LIBRARY_ERROR);
+                         SSL_R_COMPRESSION_LIBRARY_ERROR);
                 goto err;
             }
         }
index 61ddf418e99fa382e82bc97349191d18a871bf52..a215f6816b09adcfd8fab6c0f7883750397fae0d 100644 (file)
@@ -4987,7 +4987,7 @@ int ssl_cache_cipherlist(SSL *s, PACKET *cipher_suites, int sslv2format)
 
     if (PACKET_remaining(cipher_suites) % n != 0) {
         SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_F_SSL_CACHE_CIPHERLIST,
-               SSL_R_ERROR_IN_RECEIVED_CIPHER_LIST);
+                 SSL_R_ERROR_IN_RECEIVED_CIPHER_LIST);
         return 0;
     }
 
index 48e6a0a22436720d8e6f80a67680b66eaa4c39bb..e1dcf37453697c5509d5c2f4cee76c6a1403cdc1 100644 (file)
@@ -1532,7 +1532,7 @@ MSG_PROCESS_RETURN tls_process_server_hello(SSL *s, PACKET *pkt)
 #else
     if (s->hit && compression != s->session->compress_meth) {
         SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_F_TLS_PROCESS_SERVER_HELLO,
-               SSL_R_OLD_SESSION_COMPRESSION_ALGORITHM_NOT_RETURNED);
+                 SSL_R_OLD_SESSION_COMPRESSION_ALGORITHM_NOT_RETURNED);
         goto err;
     }
     if (compression == 0)
@@ -2268,7 +2268,7 @@ MSG_PROCESS_RETURN tls_process_key_exchange(SSL *s, PACKET *pkt)
         md_ctx = EVP_MD_CTX_new();
         if (md_ctx == NULL) {
             SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_PROCESS_KEY_EXCHANGE,
-                   ERR_R_MALLOC_FAILURE);
+                     ERR_R_MALLOC_FAILURE);
             goto err;
         }
 
@@ -2664,7 +2664,7 @@ int tls_process_initial_server_flight(SSL *s)
         if (ret < 0) {
             SSLfatal(s, SSL_AD_INTERNAL_ERROR,
                      SSL_F_TLS_PROCESS_INITIAL_SERVER_FLIGHT,
-                    ERR_R_MALLOC_FAILURE);
+                     ERR_R_MALLOC_FAILURE);
             return 0;
         }
     }
@@ -3240,7 +3240,8 @@ int tls_client_key_exchange_post_work(SSL *s)
                                        sizeof(sctpauthkey), labelbuffer,
                                        sizeof(labelbuffer), NULL, 0, 0) <= 0) {
             SSLfatal(s, SSL_AD_INTERNAL_ERROR,
-                 SSL_F_TLS_CLIENT_KEY_EXCHANGE_POST_WORK, ERR_R_INTERNAL_ERROR);
+                     SSL_F_TLS_CLIENT_KEY_EXCHANGE_POST_WORK,
+                     ERR_R_INTERNAL_ERROR);
             goto err;
         }
 
@@ -3380,7 +3381,7 @@ int tls_construct_client_certificate(SSL *s, WPACKET *pkt)
          * state and thus ssl3_send_alert may crash.
          */
         SSLfatal(s, SSL_AD_NO_ALERT, SSL_F_TLS_CONSTRUCT_CLIENT_CERTIFICATE,
-               SSL_R_CANNOT_CHANGE_CIPHER);
+                 SSL_R_CANNOT_CHANGE_CIPHER);
         return 0;
     }
 
index 0ba7f89e30fc1c699f9978432078b5929f6cad44..f95c19b41bf7c7071f8147252222f7940d1f0355 100644 (file)
@@ -1576,7 +1576,7 @@ static int tls_early_post_process_client_hello(SSL *s)
     if (!ssl_cache_cipherlist(s, &clienthello->ciphersuites,
                               clienthello->isv2) ||
         !bytes_to_cipher_list(s, &clienthello->ciphersuites, &ciphers, &scsvs,
-                             clienthello->isv2, 1)) {
+                              clienthello->isv2, 1)) {
         /* SSLfatal() already called */
         goto err;
     }