aboutsummaryrefslogtreecommitdiff
path: root/crypto/openssl/test/bio_pw_callback_test.c
diff options
context:
space:
mode:
Diffstat (limited to 'crypto/openssl/test/bio_pw_callback_test.c')
-rw-r--r--crypto/openssl/test/bio_pw_callback_test.c34
1 files changed, 17 insertions, 17 deletions
diff --git a/crypto/openssl/test/bio_pw_callback_test.c b/crypto/openssl/test/bio_pw_callback_test.c
index e11368454a8c..0fb79238f911 100644
--- a/crypto/openssl/test/bio_pw_callback_test.c
+++ b/crypto/openssl/test/bio_pw_callback_test.c
@@ -63,7 +63,7 @@ const OPTIONS *test_get_options(void)
static const OPTIONS test_options[] = {
OPT_TEST_OPTIONS_DEFAULT_USAGE,
{ "keyfile", OPT_KEY_FILE, '<',
- "The PEM file with the encrypted key to load" },
+ "The PEM file with the encrypted key to load" },
{ NULL }
};
return test_options;
@@ -152,7 +152,7 @@ err:
}
static int re_encrypt_key(char **enc_data, int *enc_data_size,
- KEY_ENCODING key_encoding)
+ KEY_ENCODING key_encoding)
{
CALLBACK_DATA cb_data;
int w_ret = 0;
@@ -171,11 +171,11 @@ static int re_encrypt_key(char **enc_data, int *enc_data_size,
switch (key_encoding) {
case KE_PEM:
w_ret = PEM_write_bio_PrivateKey(bio, original_pkey, EVP_aes_256_cbc(),
- NULL, 0, write_callback, &cb_data);
+ NULL, 0, write_callback, &cb_data);
break;
case KE_PKCS8:
w_ret = i2d_PKCS8PrivateKey_bio(bio, original_pkey, EVP_aes_256_cbc(),
- NULL, 0, write_callback, &cb_data);
+ NULL, 0, write_callback, &cb_data);
break;
}
if (!TEST_int_ne(w_ret, 0))
@@ -197,8 +197,8 @@ err:
}
static int decrypt_key(char *enc_data, int enc_data_size,
- KEY_ENCODING key_encoding,
- EXPECTED_RESULT expected_result)
+ KEY_ENCODING key_encoding,
+ EXPECTED_RESULT expected_result)
{
CALLBACK_DATA cb_data;
EVP_PKEY *r_ret = NULL;
@@ -237,8 +237,8 @@ err:
}
static int full_cycle_test(KEY_ENCODING key_encoding, CALLBACK_TEST write_test,
- CALLBACK_TEST read_test,
- EXPECTED_RESULT expected_read_result)
+ CALLBACK_TEST read_test,
+ EXPECTED_RESULT expected_read_result)
{
char *enc_data = NULL;
int enc_data_size = 0;
@@ -249,7 +249,7 @@ static int full_cycle_test(KEY_ENCODING key_encoding, CALLBACK_TEST write_test,
goto err;
callback_test = read_test;
if (!decrypt_key(enc_data, enc_data_size, key_encoding,
- expected_read_result))
+ expected_read_result))
goto err;
ret = 1;
err:
@@ -265,7 +265,7 @@ static int test_pem_negative(void)
static int test_pem_zero_length(void)
{
return full_cycle_test(KE_PEM, CB_TEST_ZERO_LENGTH, CB_TEST_ZERO_LENGTH,
- ER_SUCCESS);
+ ER_SUCCESS);
}
static int test_pem_weak(void)
@@ -291,13 +291,13 @@ static int test_pem_a0a_a0b(void)
static int test_pem_match_size(void)
{
return full_cycle_test(KE_PEM, CB_TEST_MATCH_SIZE, CB_TEST_MATCH_SIZE,
- ER_SUCCESS);
+ ER_SUCCESS);
}
static int test_pem_exceed_size(void)
{
return full_cycle_test(KE_PEM, CB_TEST_MATCH_SIZE, CB_TEST_EXCEED_SIZE,
- ER_FAILURE);
+ ER_FAILURE);
}
static int test_pkcs8_negative(void)
@@ -308,7 +308,7 @@ static int test_pkcs8_negative(void)
static int test_pkcs8_zero_length(void)
{
return full_cycle_test(KE_PKCS8, CB_TEST_ZERO_LENGTH, CB_TEST_ZERO_LENGTH,
- ER_SUCCESS);
+ ER_SUCCESS);
}
static int test_pkcs8_weak(void)
@@ -319,7 +319,7 @@ static int test_pkcs8_weak(void)
static int test_pkcs8_16zero(void)
{
return full_cycle_test(KE_PKCS8, CB_TEST_16ZERO, CB_TEST_16ZERO,
- ER_SUCCESS);
+ ER_SUCCESS);
}
static int test_pkcs8_a0a(void)
@@ -335,13 +335,13 @@ static int test_pkcs8_a0a_a0b(void)
static int test_pkcs8_match_size(void)
{
return full_cycle_test(KE_PKCS8, CB_TEST_MATCH_SIZE, CB_TEST_MATCH_SIZE,
- ER_SUCCESS);
+ ER_SUCCESS);
}
static int test_pkcs8_exceed_size(void)
{
return full_cycle_test(KE_PKCS8, CB_TEST_MATCH_SIZE, CB_TEST_EXCEED_SIZE,
- ER_FAILURE);
+ ER_FAILURE);
}
static int callback_original_pw(char *buf, int size, int rwflag, void *u)
@@ -372,7 +372,7 @@ int setup_tests(void)
if (!TEST_ptr(bio = BIO_new_file(key_file, "r")))
return 0;
if (!TEST_ptr(PEM_read_bio_PrivateKey(bio, &original_pkey,
- callback_original_pw, NULL)))
+ callback_original_pw, NULL)))
return 0;
BIO_free(bio);