Skip to content

Commit 0e98ee3

Browse files
committed
Fixed white spaces
1 parent 05d86c8 commit 0e98ee3

1 file changed

Lines changed: 14 additions & 14 deletions

File tree

tests/api/test_asn.c

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -657,12 +657,12 @@ int test_SerialNumber0_RootCA(void)
657657
const char* rootNormalFile = "./certs/test-serial0/root.pem";
658658
const char* eeSerial0File = "./certs/test-serial0/ee_serial0.pem";
659659
const char* eeNormalFile = "./certs/test-serial0/ee_normal.pem";
660-
const char* selfSignedNonCASerial0File =
660+
const char* selfSignedNonCASerial0File =
661661
"./certs/test-serial0/selfsigned_nonca_serial0.pem";
662662

663663
/* Test 1: Root CA with serial 0 should load successfully */
664664
ExpectNotNull(cm = wolfSSL_CertManagerNew());
665-
ExpectIntEQ(wolfSSL_CertManagerLoadCA(cm, rootSerial0File, NULL),
665+
ExpectIntEQ(wolfSSL_CertManagerLoadCA(cm, rootSerial0File, NULL),
666666
WOLFSSL_SUCCESS);
667667
if (cm != NULL) {
668668
wolfSSL_CertManagerFree(cm);
@@ -671,43 +671,43 @@ int test_SerialNumber0_RootCA(void)
671671

672672
/* Test 2: Normal root CA (serial != 0) should load successfully */
673673
ExpectNotNull(cm = wolfSSL_CertManagerNew());
674-
ExpectIntEQ(wolfSSL_CertManagerLoadCA(cm, rootNormalFile, NULL),
674+
ExpectIntEQ(wolfSSL_CertManagerLoadCA(cm, rootNormalFile, NULL),
675675
WOLFSSL_SUCCESS);
676-
676+
677677
/* Test 3: End-entity cert with serial 0 should be rejected during verify */
678-
ExpectIntNE(wolfSSL_CertManagerVerify(cm, eeSerial0File,
678+
ExpectIntNE(wolfSSL_CertManagerVerify(cm, eeSerial0File,
679679
WOLFSSL_FILETYPE_PEM), WOLFSSL_SUCCESS);
680-
680+
681681
if (cm != NULL) {
682682
wolfSSL_CertManagerFree(cm);
683683
cm = NULL;
684684
}
685685

686-
/* Test 4: Normal end-entity cert signed by root CA with serial 0
686+
/* Test 4: Normal end-entity cert signed by root CA with serial 0
687687
* should verify successfully */
688688
ExpectNotNull(cm = wolfSSL_CertManagerNew());
689-
ExpectIntEQ(wolfSSL_CertManagerLoadCA(cm, rootSerial0File, NULL),
689+
ExpectIntEQ(wolfSSL_CertManagerLoadCA(cm, rootSerial0File, NULL),
690690
WOLFSSL_SUCCESS);
691-
ExpectIntEQ(wolfSSL_CertManagerVerify(cm, eeNormalFile,
691+
ExpectIntEQ(wolfSSL_CertManagerVerify(cm, eeNormalFile,
692692
WOLFSSL_FILETYPE_PEM), WOLFSSL_SUCCESS);
693-
693+
694694
if (cm != NULL) {
695695
wolfSSL_CertManagerFree(cm);
696696
cm = NULL;
697697
}
698698

699699
/* Test 5: Self-signed non-CA certificate with serial 0 should be rejected */
700700
ExpectNotNull(cm = wolfSSL_CertManagerNew());
701-
ExpectIntNE(wolfSSL_CertManagerLoadCA(cm, selfSignedNonCASerial0File, NULL),
701+
ExpectIntNE(wolfSSL_CertManagerLoadCA(cm, selfSignedNonCASerial0File, NULL),
702702
WOLFSSL_SUCCESS);
703-
703+
704704
if (cm != NULL) {
705705
wolfSSL_CertManagerFree(cm);
706706
cm = NULL;
707707
}
708-
#endif /* !WOLFSSL_NO_ASN_STRICT && !WOLFSSL_PYTHON &&
708+
#endif /* !WOLFSSL_NO_ASN_STRICT && !WOLFSSL_PYTHON &&
709709
!WOLFSSL_ASN_ALLOW_0_SERIAL */
710-
#endif /* !NO_CERTS && !NO_FILESYSTEM && !NO_RSA && WOLFSSL_CERT_GEN &&
710+
#endif /* !NO_CERTS && !NO_FILESYSTEM && !NO_RSA && WOLFSSL_CERT_GEN &&
711711
WOLFSSL_CERT_EXT */
712712

713713
return EXPECT_RESULT();

0 commit comments

Comments
 (0)