summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorbeck <>2019-11-26 18:21:50 +0000
committerbeck <>2019-11-26 18:21:50 +0000
commitb2d85cf05e8897e5204031c7e483a80d9c359ea2 (patch)
treeac29ae07e0b4fdfdda17b07ed41398b3a73fd276
parenta8b02ce01d0a38df6a9720eaa0957322fb626833 (diff)
downloadopenbsd-b2d85cf05e8897e5204031c7e483a80d9c359ea2.tar.gz
openbsd-b2d85cf05e8897e5204031c7e483a80d9c359ea2.tar.bz2
openbsd-b2d85cf05e8897e5204031c7e483a80d9c359ea2.zip
Nuke trailing whitespace that is annoying before changing things in here
-rw-r--r--src/regress/lib/libssl/client/clienttest.c12
1 files changed, 6 insertions, 6 deletions
diff --git a/src/regress/lib/libssl/client/clienttest.c b/src/regress/lib/libssl/client/clienttest.c
index 6b8ea7d8bd..e44b31e205 100644
--- a/src/regress/lib/libssl/client/clienttest.c
+++ b/src/regress/lib/libssl/client/clienttest.c
@@ -101,7 +101,7 @@ static unsigned char client_hello_tls11[] = {
101 0x00, 0x00, 0x00, 0x00, 0x00, 0x2e, 0xc0, 0x14, 101 0x00, 0x00, 0x00, 0x00, 0x00, 0x2e, 0xc0, 0x14,
102 0xc0, 0x0a, 0x00, 0x39, 0xff, 0x85, 0x00, 0x88, 102 0xc0, 0x0a, 0x00, 0x39, 0xff, 0x85, 0x00, 0x88,
103 0x00, 0x81, 0x00, 0x35, 0x00, 0x84, 0xc0, 0x13, 103 0x00, 0x81, 0x00, 0x35, 0x00, 0x84, 0xc0, 0x13,
104 0xc0, 0x09, 0x00, 0x33, 0x00, 0x45, 0x00, 0x2f, 104 0xc0, 0x09, 0x00, 0x33, 0x00, 0x45, 0x00, 0x2f,
105 0x00, 0x41, 0xc0, 0x11, 0xc0, 0x07, 0x00, 0x05, 105 0x00, 0x41, 0xc0, 0x11, 0xc0, 0x07, 0x00, 0x05,
106 0x00, 0x04, 0xc0, 0x12, 0xc0, 0x08, 0x00, 0x16, 106 0x00, 0x04, 0xc0, 0x12, 0xc0, 0x08, 0x00, 0x16,
107 0x00, 0x0a, 0x00, 0xff, 0x01, 0x00, 0x00, 0x16, 107 0x00, 0x0a, 0x00, 0xff, 0x01, 0x00, 0x00, 0x16,
@@ -281,7 +281,7 @@ make_client_hello(int protocol, char **out, size_t *outlen)
281 size_t client_hello_len, cipher_list_len, cipher_list_offset; 281 size_t client_hello_len, cipher_list_len, cipher_list_offset;
282 const char *client_hello, *cipher_list; 282 const char *client_hello, *cipher_list;
283 char *p; 283 char *p;
284 284
285 *out = NULL; 285 *out = NULL;
286 *outlen = 0; 286 *outlen = 0;
287 287
@@ -293,7 +293,7 @@ make_client_hello(int protocol, char **out, size_t *outlen)
293 cipher_list_len = sizeof(cipher_list_dtls1); 293 cipher_list_len = sizeof(cipher_list_dtls1);
294 cipher_list_offset = DTLS_CIPHER_OFFSET; 294 cipher_list_offset = DTLS_CIPHER_OFFSET;
295 break; 295 break;
296 296
297 case TLS1_VERSION: 297 case TLS1_VERSION:
298 client_hello = client_hello_tls10; 298 client_hello = client_hello_tls10;
299 client_hello_len = sizeof(client_hello_tls10); 299 client_hello_len = sizeof(client_hello_tls10);
@@ -320,7 +320,7 @@ make_client_hello(int protocol, char **out, size_t *outlen)
320 cipher_list_len = sizeof(cipher_list_tls12_chacha); 320 cipher_list_len = sizeof(cipher_list_tls12_chacha);
321 cipher_list_offset = SSL3_CIPHER_OFFSET; 321 cipher_list_offset = SSL3_CIPHER_OFFSET;
322 break; 322 break;
323 323
324 default: 324 default:
325 return (-1); 325 return (-1);
326 } 326 }
@@ -378,7 +378,7 @@ client_hello_test(int testno, struct client_hello_test *cht)
378 wbio->references = 2; 378 wbio->references = 2;
379 379
380 SSL_set_bio(ssl, rbio, wbio); 380 SSL_set_bio(ssl, rbio, wbio);
381 381
382 if (SSL_connect(ssl) != 0) { 382 if (SSL_connect(ssl) != 0) {
383 fprintf(stderr, "SSL_connect() returned non-zero\n"); 383 fprintf(stderr, "SSL_connect() returned non-zero\n");
384 goto failure; 384 goto failure;
@@ -413,7 +413,7 @@ client_hello_test(int testno, struct client_hello_test *cht)
413 fprintf(stderr, "\n"); 413 fprintf(stderr, "\n");
414 goto failure; 414 goto failure;
415 } 415 }
416 416
417 ret = 0; 417 ret = 0;
418 418
419failure: 419failure: