From 8e572c76ea1f88213041d8394aa478381641e07c Mon Sep 17 00:00:00 2001 From: jsing <> Date: Sat, 7 Jun 2014 14:03:50 +0000 Subject: More KNF. --- src/lib/libssl/src/ssl/ssl_lib.c | 10 ++++------ src/lib/libssl/ssl_lib.c | 10 ++++------ 2 files changed, 8 insertions(+), 12 deletions(-) (limited to 'src') diff --git a/src/lib/libssl/src/ssl/ssl_lib.c b/src/lib/libssl/src/ssl/ssl_lib.c index 7feb920ab8..be57df7736 100644 --- a/src/lib/libssl/src/ssl/ssl_lib.c +++ b/src/lib/libssl/src/ssl/ssl_lib.c @@ -2234,8 +2234,7 @@ ssl_get_server_send_pkey(const SSL *s) } else if (alg_a & SSL_aGOST01) { i = SSL_PKEY_GOST01; } else { /* if (alg_a & SSL_aNULL) */ - SSLerr(SSL_F_SSL_GET_SERVER_SEND_PKEY, - ERR_R_INTERNAL_ERROR); + SSLerr(SSL_F_SSL_GET_SERVER_SEND_PKEY, ERR_R_INTERNAL_ERROR); return (NULL); } @@ -2275,8 +2274,7 @@ ssl_get_sign_pkey(SSL *s, const SSL_CIPHER *cipher, const EVP_MD **pmd) (c->pkeys[SSL_PKEY_ECC].privatekey != NULL)) idx = SSL_PKEY_ECC; if (idx == -1) { - SSLerr(SSL_F_SSL_GET_SIGN_PKEY, - ERR_R_INTERNAL_ERROR); + SSLerr(SSL_F_SSL_GET_SIGN_PKEY, ERR_R_INTERNAL_ERROR); return (NULL); } if (pmd) @@ -3025,8 +3023,8 @@ SSL_use_psk_identity_hint(SSL *s, const char *identity_hint) if (s->session == NULL) return (1); /* session not created yet, ignored */ - if (identity_hint != NULL && strlen(identity_hint) > - PSK_MAX_IDENTITY_LEN) { + if (identity_hint != NULL && + strlen(identity_hint) > PSK_MAX_IDENTITY_LEN) { SSLerr(SSL_F_SSL_USE_PSK_IDENTITY_HINT, SSL_R_DATA_LENGTH_TOO_LONG); return (0); diff --git a/src/lib/libssl/ssl_lib.c b/src/lib/libssl/ssl_lib.c index 7feb920ab8..be57df7736 100644 --- a/src/lib/libssl/ssl_lib.c +++ b/src/lib/libssl/ssl_lib.c @@ -2234,8 +2234,7 @@ ssl_get_server_send_pkey(const SSL *s) } else if (alg_a & SSL_aGOST01) { i = SSL_PKEY_GOST01; } else { /* if (alg_a & SSL_aNULL) */ - SSLerr(SSL_F_SSL_GET_SERVER_SEND_PKEY, - ERR_R_INTERNAL_ERROR); + SSLerr(SSL_F_SSL_GET_SERVER_SEND_PKEY, ERR_R_INTERNAL_ERROR); return (NULL); } @@ -2275,8 +2274,7 @@ ssl_get_sign_pkey(SSL *s, const SSL_CIPHER *cipher, const EVP_MD **pmd) (c->pkeys[SSL_PKEY_ECC].privatekey != NULL)) idx = SSL_PKEY_ECC; if (idx == -1) { - SSLerr(SSL_F_SSL_GET_SIGN_PKEY, - ERR_R_INTERNAL_ERROR); + SSLerr(SSL_F_SSL_GET_SIGN_PKEY, ERR_R_INTERNAL_ERROR); return (NULL); } if (pmd) @@ -3025,8 +3023,8 @@ SSL_use_psk_identity_hint(SSL *s, const char *identity_hint) if (s->session == NULL) return (1); /* session not created yet, ignored */ - if (identity_hint != NULL && strlen(identity_hint) > - PSK_MAX_IDENTITY_LEN) { + if (identity_hint != NULL && + strlen(identity_hint) > PSK_MAX_IDENTITY_LEN) { SSLerr(SSL_F_SSL_USE_PSK_IDENTITY_HINT, SSL_R_DATA_LENGTH_TOO_LONG); return (0); -- cgit v1.2.3-55-g6feb