@@ -657,12 +657,12 @@ int test_SerialNumber0_RootCA(void)
657657 const char * rootNormalFile = "./certs/test-serial0/root.pem" ;
658658 const char * eeSerial0File = "./certs/test-serial0/ee_serial0.pem" ;
659659 const char * eeNormalFile = "./certs/test-serial0/ee_normal.pem" ;
660- const char * selfSignedNonCASerial0File =
660+ const char * selfSignedNonCASerial0File =
661661 "./certs/test-serial0/selfsigned_nonca_serial0.pem" ;
662662
663663 /* Test 1: Root CA with serial 0 should load successfully */
664664 ExpectNotNull (cm = wolfSSL_CertManagerNew ());
665- ExpectIntEQ (wolfSSL_CertManagerLoadCA (cm , rootSerial0File , NULL ),
665+ ExpectIntEQ (wolfSSL_CertManagerLoadCA (cm , rootSerial0File , NULL ),
666666 WOLFSSL_SUCCESS );
667667 if (cm != NULL ) {
668668 wolfSSL_CertManagerFree (cm );
@@ -671,43 +671,43 @@ int test_SerialNumber0_RootCA(void)
671671
672672 /* Test 2: Normal root CA (serial != 0) should load successfully */
673673 ExpectNotNull (cm = wolfSSL_CertManagerNew ());
674- ExpectIntEQ (wolfSSL_CertManagerLoadCA (cm , rootNormalFile , NULL ),
674+ ExpectIntEQ (wolfSSL_CertManagerLoadCA (cm , rootNormalFile , NULL ),
675675 WOLFSSL_SUCCESS );
676-
676+
677677 /* Test 3: End-entity cert with serial 0 should be rejected during verify */
678- ExpectIntNE (wolfSSL_CertManagerVerify (cm , eeSerial0File ,
678+ ExpectIntNE (wolfSSL_CertManagerVerify (cm , eeSerial0File ,
679679 WOLFSSL_FILETYPE_PEM ), WOLFSSL_SUCCESS );
680-
680+
681681 if (cm != NULL ) {
682682 wolfSSL_CertManagerFree (cm );
683683 cm = NULL ;
684684 }
685685
686- /* Test 4: Normal end-entity cert signed by root CA with serial 0
686+ /* Test 4: Normal end-entity cert signed by root CA with serial 0
687687 * should verify successfully */
688688 ExpectNotNull (cm = wolfSSL_CertManagerNew ());
689- ExpectIntEQ (wolfSSL_CertManagerLoadCA (cm , rootSerial0File , NULL ),
689+ ExpectIntEQ (wolfSSL_CertManagerLoadCA (cm , rootSerial0File , NULL ),
690690 WOLFSSL_SUCCESS );
691- ExpectIntEQ (wolfSSL_CertManagerVerify (cm , eeNormalFile ,
691+ ExpectIntEQ (wolfSSL_CertManagerVerify (cm , eeNormalFile ,
692692 WOLFSSL_FILETYPE_PEM ), WOLFSSL_SUCCESS );
693-
693+
694694 if (cm != NULL ) {
695695 wolfSSL_CertManagerFree (cm );
696696 cm = NULL ;
697697 }
698698
699699 /* Test 5: Self-signed non-CA certificate with serial 0 should be rejected */
700700 ExpectNotNull (cm = wolfSSL_CertManagerNew ());
701- ExpectIntNE (wolfSSL_CertManagerLoadCA (cm , selfSignedNonCASerial0File , NULL ),
701+ ExpectIntNE (wolfSSL_CertManagerLoadCA (cm , selfSignedNonCASerial0File , NULL ),
702702 WOLFSSL_SUCCESS );
703-
703+
704704 if (cm != NULL ) {
705705 wolfSSL_CertManagerFree (cm );
706706 cm = NULL ;
707707 }
708- #endif /* !WOLFSSL_NO_ASN_STRICT && !WOLFSSL_PYTHON &&
708+ #endif /* !WOLFSSL_NO_ASN_STRICT && !WOLFSSL_PYTHON &&
709709 !WOLFSSL_ASN_ALLOW_0_SERIAL */
710- #endif /* !NO_CERTS && !NO_FILESYSTEM && !NO_RSA && WOLFSSL_CERT_GEN &&
710+ #endif /* !NO_CERTS && !NO_FILESYSTEM && !NO_RSA && WOLFSSL_CERT_GEN &&
711711 WOLFSSL_CERT_EXT */
712712
713713 return EXPECT_RESULT ();
0 commit comments