Astyle fixes

pull/8659/head
Seppo Takalo 2018-11-19 15:31:31 +02:00
parent 5d170f2b3e
commit bdc355f873
8 changed files with 29 additions and 29 deletions

View File

@ -36,7 +36,7 @@ public:
unsigned int dataSize = 10;
char dataBuf[10];
protected:
UDPSocket* transport;
UDPSocket *transport;
DTLSSocketWrapper *wrapper;
NetworkStackstub stack;
@ -60,7 +60,7 @@ protected:
delete wrapper;
}
char* cert = "-----BEGIN CERTIFICATE-----\
char *cert = "-----BEGIN CERTIFICATE-----\
MIIEkjCCA3qgAwIBAgIQCgFBQgAAAVOFc2oLheynCDANBgkqhkiG9w0BAQsFADA/\
MSQwIgYDVQQKExtEaWdpdGFsIFNpZ25hdHVyZSBUcnVzdCBDby4xFzAVBgNVBAMT\
DkRTVCBSb290IENBIFgzMB4XDTE2MDMxNzE2NDA0NloXDTIxMDMxNzE2NDA0Nlow\
@ -304,10 +304,10 @@ TEST_F(TestDTLSSocketWrapper, recv_from_null)
TEST_F(TestDTLSSocketWrapper, set_root_ca_cert)
{
EXPECT_EQ(wrapper->get_ca_chain(), static_cast<mbedtls_x509_crt*>(NULL));
EXPECT_EQ(wrapper->get_ca_chain(), static_cast<mbedtls_x509_crt *>(NULL));
EXPECT_EQ(transport->open((NetworkStack *)&stack), NSAPI_ERROR_OK);
EXPECT_EQ(wrapper->set_root_ca_cert(cert, strlen(cert)), NSAPI_ERROR_OK);
EXPECT_NE(wrapper->get_ca_chain(), static_cast<mbedtls_x509_crt*>(NULL));
EXPECT_NE(wrapper->get_ca_chain(), static_cast<mbedtls_x509_crt *>(NULL));
}
TEST_F(TestDTLSSocketWrapper, set_root_ca_cert_nolen)
@ -327,10 +327,10 @@ TEST_F(TestDTLSSocketWrapper, set_root_ca_cert_invalid)
TEST_F(TestDTLSSocketWrapper, set_client_cert_key)
{
EXPECT_EQ(wrapper->get_own_cert(), static_cast<mbedtls_x509_crt*>(NULL));
EXPECT_EQ(wrapper->get_own_cert(), static_cast<mbedtls_x509_crt *>(NULL));
EXPECT_EQ(transport->open((NetworkStack *)&stack), NSAPI_ERROR_OK);
EXPECT_EQ(wrapper->set_client_cert_key(cert, cert), NSAPI_ERROR_OK);
EXPECT_NE(wrapper->get_own_cert(), static_cast<mbedtls_x509_crt*>(NULL));
EXPECT_NE(wrapper->get_own_cert(), static_cast<mbedtls_x509_crt *>(NULL));
}
TEST_F(TestDTLSSocketWrapper, set_client_cert_key_invalid)

View File

@ -36,7 +36,7 @@ public:
unsigned int dataSize = 10;
char dataBuf[10];
protected:
TCPSocket* transport;
TCPSocket *transport;
TLSSocketWrapper *wrapper;
NetworkStackstub stack;
@ -58,7 +58,7 @@ protected:
delete wrapper;
}
char* cert = "-----BEGIN CERTIFICATE-----\
char *cert = "-----BEGIN CERTIFICATE-----\
MIIEkjCCA3qgAwIBAgIQCgFBQgAAAVOFc2oLheynCDANBgkqhkiG9w0BAQsFADA/\
MSQwIgYDVQQKExtEaWdpdGFsIFNpZ25hdHVyZSBUcnVzdCBDby4xFzAVBgNVBAMT\
DkRTVCBSb290IENBIFgzMB4XDTE2MDMxNzE2NDA0NloXDTIxMDMxNzE2NDA0Nlow\
@ -319,10 +319,10 @@ TEST_F(TestTLSSocketWrapper, recv_from_null)
TEST_F(TestTLSSocketWrapper, set_root_ca_cert)
{
EXPECT_EQ(wrapper->get_ca_chain(), static_cast<mbedtls_x509_crt*>(NULL));
EXPECT_EQ(wrapper->get_ca_chain(), static_cast<mbedtls_x509_crt *>(NULL));
EXPECT_EQ(transport->open((NetworkStack *)&stack), NSAPI_ERROR_OK);
EXPECT_EQ(wrapper->set_root_ca_cert(cert, strlen(cert)), NSAPI_ERROR_OK);
EXPECT_NE(wrapper->get_ca_chain(), static_cast<mbedtls_x509_crt*>(NULL));
EXPECT_NE(wrapper->get_ca_chain(), static_cast<mbedtls_x509_crt *>(NULL));
}
TEST_F(TestTLSSocketWrapper, set_root_ca_cert_nolen)
@ -341,10 +341,10 @@ TEST_F(TestTLSSocketWrapper, set_root_ca_cert_invalid)
TEST_F(TestTLSSocketWrapper, set_client_cert_key)
{
EXPECT_EQ(wrapper->get_own_cert(), static_cast<mbedtls_x509_crt*>(NULL));
EXPECT_EQ(wrapper->get_own_cert(), static_cast<mbedtls_x509_crt *>(NULL));
EXPECT_EQ(transport->open((NetworkStack *)&stack), NSAPI_ERROR_OK);
EXPECT_EQ(wrapper->set_client_cert_key(cert, cert), NSAPI_ERROR_OK);
EXPECT_NE(wrapper->get_own_cert(), static_cast<mbedtls_x509_crt*>(NULL));
EXPECT_NE(wrapper->get_own_cert(), static_cast<mbedtls_x509_crt *>(NULL));
}
TEST_F(TestTLSSocketWrapper, set_client_cert_key_invalid)

View File

@ -114,8 +114,7 @@ protected:
virtual nsapi_size_or_error_t socket_recvfrom(nsapi_socket_t handle, SocketAddress *address,
void *buffer, nsapi_size_t size)
{
if (return_socketAddress != SocketAddress())
{
if (return_socketAddress != SocketAddress()) {
*address = return_socketAddress;
}
if (!return_values.empty()) {

View File

@ -50,9 +50,8 @@ nsapi_error_t DTLSSocket::connect(const char *host, uint16_t port)
DTLSSocket::~DTLSSocket()
{
/* Make sure that DTLSSocketWrapper::close() is called before the transport is
* destroyed.
*/
// Make sure that DTLSSocketWrapper::close() is called before the transport is
// destroyed.
close();
}

View File

@ -62,12 +62,14 @@ public:
* @param stack Network stack as target for socket
* @return 0 on success, negative error code on failure
*/
virtual nsapi_error_t open(NetworkStack *stack) {
virtual nsapi_error_t open(NetworkStack *stack)
{
return _udp_socket.open(stack);
}
template <typename S>
nsapi_error_t open(S *stack) {
nsapi_error_t open(S *stack)
{
return open(nsapi_create_stack(stack));
}

View File

@ -12,8 +12,8 @@ DTLSSocketWrapper::DTLSSocketWrapper(Socket *transport, const char *hostname, co
_timer_event_id(0),
_timer_expired(false)
{
mbedtls_ssl_conf_transport( get_ssl_config(), MBEDTLS_SSL_TRANSPORT_DATAGRAM);
mbedtls_ssl_set_timer_cb( get_ssl_context(), this, timing_set_delay, timing_get_delay);
mbedtls_ssl_conf_transport(get_ssl_config(), MBEDTLS_SSL_TRANSPORT_DATAGRAM);
mbedtls_ssl_set_timer_cb(get_ssl_context(), this, timing_set_delay, timing_get_delay);
}
void DTLSSocketWrapper::timing_set_delay(void *ctx, uint32_t int_ms, uint32_t fin_ms)

View File

@ -15,7 +15,7 @@ private:
void timer_event();
uint64_t _int_ms_tick;
int _timer_event_id;
bool _timer_expired:1;
bool _timer_expired : 1;
};
#endif

View File

@ -160,7 +160,6 @@ nsapi_error_t TLSSocketWrapper::start_handshake(bool first_call)
}
#ifdef MBEDTLS_X509_CRT_PARSE_C
/* Start the handshake, the rest will be done in onReceive() */
tr_info("Starting TLS handshake with %s", _ssl.hostname);
#else
tr_info("Starting TLS handshake");
@ -198,7 +197,7 @@ nsapi_error_t TLSSocketWrapper::start_handshake(bool first_call)
ret = continue_handshake();
if (first_call) {
if (ret == NSAPI_ERROR_ALREADY ) {
if (ret == NSAPI_ERROR_ALREADY) {
ret = NSAPI_ERROR_IN_PROGRESS; // If first call should return IN_PROGRESS
}
if (ret == NSAPI_ERROR_IS_CONNECTED) {
@ -208,7 +207,8 @@ nsapi_error_t TLSSocketWrapper::start_handshake(bool first_call)
return ret;
}
nsapi_error_t TLSSocketWrapper::continue_handshake() {
nsapi_error_t TLSSocketWrapper::continue_handshake()
{
int ret;
if (_handshake_completed) {
@ -623,13 +623,13 @@ nsapi_error_t TLSSocketWrapper::bind(const SocketAddress &address)
void TLSSocketWrapper::set_blocking(bool blocking)
{
set_timeout(blocking?-1:0);
set_timeout(blocking ? -1 : 0);
}
void TLSSocketWrapper::set_timeout(int timeout)
{
_timeout = timeout;
if (!is_handshake_started() && timeout!=-1 && _connect_transport) {
if (!is_handshake_started() && timeout != -1 && _connect_transport) {
// If we have not yet connected the transport, we need to modify its blocking mode as well.
// After connection is initiated, it is already set to non blocking mode
_transport->set_timeout(timeout);
@ -641,7 +641,7 @@ void TLSSocketWrapper::sigio(mbed::Callback<void()> func)
if (!_transport) {
return;
}
_sigio = func;
_sigio = func;
_transport->sigio(mbed::callback(this, &TLSSocketWrapper::event));
}
@ -676,7 +676,7 @@ nsapi_error_t TLSSocketWrapper::listen(int)
void TLSSocketWrapper::event()
{
_event_flag.set(1);
_event_flag.set(1);
if (_sigio) {
_sigio();
}