summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorFranziskus Kiefer <franziskuskiefer@gmail.com>2018-05-18 09:58:34 +0200
committerFranziskus Kiefer <franziskuskiefer@gmail.com>2018-05-18 09:58:34 +0200
commit198dcecabfe23ee48a45441c8fe2a265b0b3e7c1 (patch)
treefd4ea404c0caf2587c0396c77142dd365cc67710
parent0d5417366c055449d60a9538522a368dbc0722ab (diff)
downloadnss-hg-198dcecabfe23ee48a45441c8fe2a265b0b3e7c1.tar.gz
Bug 1459456 - make clang-format happy
-rw-r--r--gtests/ssl_gtest/ssl_dhe_unittest.cc8
-rw-r--r--lib/ssl/ssl3con.c2
2 files changed, 5 insertions, 5 deletions
diff --git a/gtests/ssl_gtest/ssl_dhe_unittest.cc b/gtests/ssl_gtest/ssl_dhe_unittest.cc
index 980faca9b..b99461632 100644
--- a/gtests/ssl_gtest/ssl_dhe_unittest.cc
+++ b/gtests/ssl_gtest/ssl_dhe_unittest.cc
@@ -479,13 +479,13 @@ TEST_P(TlsConnectTls13, NamedGroupMismatch13) {
// larger than 8192 bits.
class TooLongDHEServerKEXFilter : public TlsHandshakeFilter {
public:
- TooLongDHEServerKEXFilter(const std::shared_ptr<TlsAgent> &server)
+ TooLongDHEServerKEXFilter(const std::shared_ptr<TlsAgent>& server)
: TlsHandshakeFilter(server, {kTlsHandshakeServerKeyExchange}) {}
protected:
- virtual PacketFilter::Action FilterHandshake(const HandshakeHeader &header,
- const DataBuffer &input,
- DataBuffer *output) {
+ virtual PacketFilter::Action FilterHandshake(const HandshakeHeader& header,
+ const DataBuffer& input,
+ DataBuffer* output) {
// Replace the server key exchange message very large DH shares that are
// not supported by NSS.
const uint32_t share_len = 0x401;
diff --git a/lib/ssl/ssl3con.c b/lib/ssl/ssl3con.c
index 76b29c284..391647c9e 100644
--- a/lib/ssl/ssl3con.c
+++ b/lib/ssl/ssl3con.c
@@ -5688,7 +5688,7 @@ ssl3_SendDHClientKeyExchange(sslSocket *ss, SECKEYPublicKey *svrPubKey)
};
sslEphemeralKeyPair *keyPair = NULL;
SECKEYPublicKey *pubKey;
- PRUint8 dhData[SSL_MAX_DH_KEY_BITS/8+2];
+ PRUint8 dhData[SSL_MAX_DH_KEY_BITS / 8 + 2];
sslBuffer dhBuf = SSL_BUFFER(dhData);
PORT_Assert(ss->opt.noLocks || ssl_HaveSSL3HandshakeLock(ss));