Fix whitespace of 369e6c20.
diff --git a/library/asn1parse.c b/library/asn1parse.c
index 4847f78..2cfd129 100644
--- a/library/asn1parse.c
+++ b/library/asn1parse.c
@@ -270,8 +270,7 @@
/* Allocate and assign next pointer */
if( *p < end )
{
- cur->next = polarssl_malloc(
- sizeof( asn1_sequence ) );
+ cur->next = polarssl_malloc( sizeof( asn1_sequence ) );
if( cur->next == NULL )
return( POLARSSL_ERR_ASN1_MALLOC_FAILED );
diff --git a/library/ssl_cache.c b/library/ssl_cache.c
index 7519f36..7fb3089 100644
--- a/library/ssl_cache.c
+++ b/library/ssl_cache.c
@@ -259,8 +259,7 @@
*/
if( session->peer_cert != NULL )
{
- cur->peer_cert.p = polarssl_malloc(
- session->peer_cert->raw.len );
+ cur->peer_cert.p = polarssl_malloc( session->peer_cert->raw.len );
if( cur->peer_cert.p == NULL )
{
ret = 1;
diff --git a/library/ssl_tls.c b/library/ssl_tls.c
index f526b5f..c0fc3a2 100644
--- a/library/ssl_tls.c
+++ b/library/ssl_tls.c
@@ -3545,20 +3545,17 @@
*/
if( ssl->transform_negotiate == NULL )
{
- ssl->transform_negotiate = polarssl_malloc(
- sizeof(ssl_transform) );
+ ssl->transform_negotiate = polarssl_malloc( sizeof(ssl_transform) );
}
if( ssl->session_negotiate == NULL )
{
- ssl->session_negotiate = polarssl_malloc(
- sizeof(ssl_session) );
+ ssl->session_negotiate = polarssl_malloc( sizeof(ssl_session) );
}
if( ssl->handshake == NULL )
{
- ssl->handshake =
- polarssl_malloc( sizeof(ssl_handshake_params) );
+ ssl->handshake = polarssl_malloc( sizeof(ssl_handshake_params) );
}
/* All pointers should exist and can be directly freed without issue */
@@ -4065,8 +4062,7 @@
ssl->psk_identity_len = psk_identity_len;
ssl->psk = polarssl_malloc( ssl->psk_len );
- ssl->psk_identity =
- polarssl_malloc( ssl->psk_identity_len );
+ ssl->psk_identity = polarssl_malloc( ssl->psk_identity_len );
if( ssl->psk == NULL || ssl->psk_identity == NULL )
return( POLARSSL_ERR_SSL_MALLOC_FAILED );
diff --git a/library/x509_crt.c b/library/x509_crt.c
index 9d5aa94..d9f5fac 100644
--- a/library/x509_crt.c
+++ b/library/x509_crt.c
@@ -359,8 +359,7 @@
if( cur->next != NULL )
return( POLARSSL_ERR_X509_INVALID_EXTENSIONS );
- cur->next = polarssl_malloc(
- sizeof( asn1_sequence ) );
+ cur->next = polarssl_malloc( sizeof( asn1_sequence ) );
if( cur->next == NULL )
return( POLARSSL_ERR_X509_INVALID_EXTENSIONS +