diff --git a/include/mbedtls/ssl.h b/include/mbedtls/ssl.h index 33d9fcf844..2eb8d85dc9 100644 --- a/include/mbedtls/ssl.h +++ b/include/mbedtls/ssl.h @@ -1717,8 +1717,8 @@ struct mbedtls_ssl_context { unsigned char MBEDTLS_PRIVATE(in_alert_recv); /*!< Determines if a fatal alert has been received. Values: - - \c 0 , no fatal alert received. - - \c 1 , a fatal alert has been received */ + - \c 0 , no fatal alert received. + - \c 1 , a fatal alert has been received */ unsigned char MBEDTLS_PRIVATE(in_alert_type); /*!< Type of fatal alert if in_alert_recv != 0 */ diff --git a/tests/suites/test_suite_ssl.function b/tests/suites/test_suite_ssl.function index 1a0d091b28..d4eeb760f8 100644 --- a/tests/suites/test_suite_ssl.function +++ b/tests/suites/test_suite_ssl.function @@ -5965,11 +5965,11 @@ void ssl_get_alert_after_fatal(void) ssl.in_msg[1] = MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE; /* import prepared fatal alert and test getter */ - TEST_ASSERT(mbedtls_ssl_handle_message_type(&ssl) == MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE ); + TEST_ASSERT(mbedtls_ssl_handle_message_type(&ssl) == MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE); TEST_ASSERT(mbedtls_ssl_get_alert(&ssl) == MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE); /* Reset the session and check that no alert is present*/ - mbedtls_ssl_session_reset_msg_layer( &ssl, 0 ); + mbedtls_ssl_session_reset_msg_layer( &ssl, 0); TEST_ASSERT(mbedtls_ssl_get_alert(&ssl) == MBEDTLS_ERR_SSL_BAD_INPUT_DATA); exit: