diff options
author | beck <> | 2019-11-26 18:21:50 +0000 |
---|---|---|
committer | beck <> | 2019-11-26 18:21:50 +0000 |
commit | b2d85cf05e8897e5204031c7e483a80d9c359ea2 (patch) | |
tree | ac29ae07e0b4fdfdda17b07ed41398b3a73fd276 | |
parent | a8b02ce01d0a38df6a9720eaa0957322fb626833 (diff) | |
download | openbsd-b2d85cf05e8897e5204031c7e483a80d9c359ea2.tar.gz openbsd-b2d85cf05e8897e5204031c7e483a80d9c359ea2.tar.bz2 openbsd-b2d85cf05e8897e5204031c7e483a80d9c359ea2.zip |
Nuke trailing whitespace that is annoying before changing things in here
-rw-r--r-- | src/regress/lib/libssl/client/clienttest.c | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/src/regress/lib/libssl/client/clienttest.c b/src/regress/lib/libssl/client/clienttest.c index 6b8ea7d8bd..e44b31e205 100644 --- a/src/regress/lib/libssl/client/clienttest.c +++ b/src/regress/lib/libssl/client/clienttest.c | |||
@@ -101,7 +101,7 @@ static unsigned char client_hello_tls11[] = { | |||
101 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x2e, 0xc0, 0x14, | 101 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x2e, 0xc0, 0x14, |
102 | 0xc0, 0x0a, 0x00, 0x39, 0xff, 0x85, 0x00, 0x88, | 102 | 0xc0, 0x0a, 0x00, 0x39, 0xff, 0x85, 0x00, 0x88, |
103 | 0x00, 0x81, 0x00, 0x35, 0x00, 0x84, 0xc0, 0x13, | 103 | 0x00, 0x81, 0x00, 0x35, 0x00, 0x84, 0xc0, 0x13, |
104 | 0xc0, 0x09, 0x00, 0x33, 0x00, 0x45, 0x00, 0x2f, | 104 | 0xc0, 0x09, 0x00, 0x33, 0x00, 0x45, 0x00, 0x2f, |
105 | 0x00, 0x41, 0xc0, 0x11, 0xc0, 0x07, 0x00, 0x05, | 105 | 0x00, 0x41, 0xc0, 0x11, 0xc0, 0x07, 0x00, 0x05, |
106 | 0x00, 0x04, 0xc0, 0x12, 0xc0, 0x08, 0x00, 0x16, | 106 | 0x00, 0x04, 0xc0, 0x12, 0xc0, 0x08, 0x00, 0x16, |
107 | 0x00, 0x0a, 0x00, 0xff, 0x01, 0x00, 0x00, 0x16, | 107 | 0x00, 0x0a, 0x00, 0xff, 0x01, 0x00, 0x00, 0x16, |
@@ -281,7 +281,7 @@ make_client_hello(int protocol, char **out, size_t *outlen) | |||
281 | size_t client_hello_len, cipher_list_len, cipher_list_offset; | 281 | size_t client_hello_len, cipher_list_len, cipher_list_offset; |
282 | const char *client_hello, *cipher_list; | 282 | const char *client_hello, *cipher_list; |
283 | char *p; | 283 | char *p; |
284 | 284 | ||
285 | *out = NULL; | 285 | *out = NULL; |
286 | *outlen = 0; | 286 | *outlen = 0; |
287 | 287 | ||
@@ -293,7 +293,7 @@ make_client_hello(int protocol, char **out, size_t *outlen) | |||
293 | cipher_list_len = sizeof(cipher_list_dtls1); | 293 | cipher_list_len = sizeof(cipher_list_dtls1); |
294 | cipher_list_offset = DTLS_CIPHER_OFFSET; | 294 | cipher_list_offset = DTLS_CIPHER_OFFSET; |
295 | break; | 295 | break; |
296 | 296 | ||
297 | case TLS1_VERSION: | 297 | case TLS1_VERSION: |
298 | client_hello = client_hello_tls10; | 298 | client_hello = client_hello_tls10; |
299 | client_hello_len = sizeof(client_hello_tls10); | 299 | client_hello_len = sizeof(client_hello_tls10); |
@@ -320,7 +320,7 @@ make_client_hello(int protocol, char **out, size_t *outlen) | |||
320 | cipher_list_len = sizeof(cipher_list_tls12_chacha); | 320 | cipher_list_len = sizeof(cipher_list_tls12_chacha); |
321 | cipher_list_offset = SSL3_CIPHER_OFFSET; | 321 | cipher_list_offset = SSL3_CIPHER_OFFSET; |
322 | break; | 322 | break; |
323 | 323 | ||
324 | default: | 324 | default: |
325 | return (-1); | 325 | return (-1); |
326 | } | 326 | } |
@@ -378,7 +378,7 @@ client_hello_test(int testno, struct client_hello_test *cht) | |||
378 | wbio->references = 2; | 378 | wbio->references = 2; |
379 | 379 | ||
380 | SSL_set_bio(ssl, rbio, wbio); | 380 | SSL_set_bio(ssl, rbio, wbio); |
381 | 381 | ||
382 | if (SSL_connect(ssl) != 0) { | 382 | if (SSL_connect(ssl) != 0) { |
383 | fprintf(stderr, "SSL_connect() returned non-zero\n"); | 383 | fprintf(stderr, "SSL_connect() returned non-zero\n"); |
384 | goto failure; | 384 | goto failure; |
@@ -413,7 +413,7 @@ client_hello_test(int testno, struct client_hello_test *cht) | |||
413 | fprintf(stderr, "\n"); | 413 | fprintf(stderr, "\n"); |
414 | goto failure; | 414 | goto failure; |
415 | } | 415 | } |
416 | 416 | ||
417 | ret = 0; | 417 | ret = 0; |
418 | 418 | ||
419 | failure: | 419 | failure: |