]> git.ipfire.org Git - thirdparty/hostap.git/commitdiff
tests: Remove trailing whitespace
authorJouni Malinen <j@w1.fi>
Tue, 27 Dec 2016 15:07:11 +0000 (17:07 +0200)
committerJouni Malinen <j@w1.fi>
Wed, 28 Dec 2016 12:31:42 +0000 (14:31 +0200)
Signed-off-by: Jouni Malinen <j@w1.fi>
tests/hwsim/netlink.py
tests/hwsim/rfkill.py
tests/hwsim/test_ap_eap.py
tests/hwsim/test_ap_track.py
tests/hwsim/test_ap_wps.py
tests/hwsim/test_dbus.py
tests/hwsim/test_eap_proto.py
tests/hwsim/test_p2ps.py

index 82b6fa22d287453d64c445d64037ccec29d65380..eef79090ce10fa30afb3b1b276744afd80cd03a3 100644 (file)
@@ -163,7 +163,7 @@ class Connection(object):
         contents = self.descriptor.recv(16384)
         # XXX: python doesn't give us message flags, check
         #      len(contents) vs. msglen for TRUNC
-        msglen, msg_type, flags, seq, pid = struct.unpack("IHHII", 
+        msglen, msg_type, flags, seq, pid = struct.unpack("IHHII",
                                                           contents[:16])
         msg = Message(msg_type, flags, seq, contents[16:])
         msg.pid = pid
index cf73f4fb103089f0504e77cbfa014b261515c23c..d85d68e1ab188827499515ceaa7986b2b8b17978 100755 (executable)
@@ -84,7 +84,7 @@ class RFKill(object):
     @property
     def soft_blocked(self):
         return self.blocked[0]
-        
+
     @soft_blocked.setter
     def soft_blocked(self, block):
         if block:
index a82ea088e849725e8a328f5bf061def0851779c2..073382900a049a04dde88bf88d3c71e72092d12b 100644 (file)
@@ -2039,7 +2039,7 @@ def test_ap_wpa2_eap_tls_diff_ca_trust(dev, apdev):
     ev = dev[0].wait_event(["CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=21"], timeout=15)
     if ev is None:
         raise Exception("EAP-TTLS not re-started")
-    
+
     ev = dev[0].wait_disconnected(timeout=15)
     if "reason=23" not in ev:
         raise Exception("Proper reason code for disconnection not reported")
@@ -2066,7 +2066,7 @@ def test_ap_wpa2_eap_tls_diff_ca_trust2(dev, apdev):
     ev = dev[0].wait_event(["CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=21"], timeout=15)
     if ev is None:
         raise Exception("EAP-TTLS not re-started")
-    
+
     ev = dev[0].wait_disconnected(timeout=15)
     if "reason=23" not in ev:
         raise Exception("Proper reason code for disconnection not reported")
@@ -2089,7 +2089,7 @@ def test_ap_wpa2_eap_tls_diff_ca_trust3(dev, apdev):
     ev = dev[0].wait_event(["CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=21"], timeout=15)
     if ev is None:
         raise Exception("EAP-TTLS not re-started")
-    
+
     ev = dev[0].wait_disconnected(timeout=15)
     if "reason=23" not in ev:
         raise Exception("Proper reason code for disconnection not reported")
index 69c96d8249b9764298525ae303bc69f552aae29e..8965af9e6194f7d9cdb68fc415e8b75ab5fd1e44 100644 (file)
@@ -53,7 +53,7 @@ def _test_ap_track_sta(dev, apdev):
         raise Exception("Station missing from 2.4 GHz tracking")
     if addr2 in track:
         raise Exception("Unexpected station included in 2.4 GHz tracking")
-    
+
     track = hapd2.request("TRACK_STA_LIST")
     if addr0 not in track or addr2 not in track:
         raise Exception("Station missing from 5 GHz tracking")
index eeb8da2caf4a9c656ab6dd63000aac520670bcd0..4f1d0ec03787bf26f88eef0ee455fbad2cd6860c 100644 (file)
@@ -6271,7 +6271,7 @@ def decrypt_attr_encr_settings(authkey, keywrapkey, data):
     for i in range(-pad_len, -1):
         if decrypted[i] != decrypted[-1]:
             raise Exception("Invalid PS value in Encrypted Settings")
-    
+
     decrypted = decrypted[0:len(decrypted) - pad_len]
     if len(decrypted) < 12:
         raise Exception("Truncated Encrypted Settings plaintext")
index e95fb9421b33d02e9d1f76722021f08635837499..d7b4b6dfcd706bf9c846748bc236b64c01221217 100644 (file)
@@ -2975,7 +2975,7 @@ def test_dbus_p2p_service_discovery(dev, apdev):
 
     bonjour_query = dbus.ByteArray(binascii.unhexlify('0b5f6166706f766572746370c00c000c01'))
     bonjour_response = dbus.ByteArray(binascii.unhexlify('074578616d706c65c027'))
-                                   
+
     args = { 'service_type': 'bonjour',
              'query': bonjour_query,
              'response': bonjour_response }
index fe2dccebaab6cd61730b745ac0dc953c69dae8a4..14509f2565aabcd97435e0fe40f23c1fce697283 100644 (file)
@@ -5585,7 +5585,7 @@ def test_eap_proto_mschapv2(dev, apdev):
 
             auth_challenge = binascii.unhexlify("00112233445566778899aabbccddeeff")
             logger.info("auth_challenge: " + auth_challenge.encode("hex"))
+
             auth_resp = GenerateAuthenticatorResponse("new-pw", nt_response,
                                                       peer_challenge,
                                                       auth_challenge, "user")
@@ -5633,7 +5633,7 @@ def test_eap_proto_mschapv2(dev, apdev):
 
             auth_challenge = binascii.unhexlify("00112233445566778899aabbccddeeff")
             logger.info("auth_challenge: " + auth_challenge.encode("hex"))
+
             auth_resp = GenerateAuthenticatorResponse("new-pw", nt_response,
                                                       peer_challenge,
                                                       auth_challenge, "user")
index 075e440f720e7e7be53d2de73467ae92ebb88bfd..8befaf2a1f8aef89232a9764fc8b7960bf04a0b5 100644 (file)
@@ -767,7 +767,7 @@ def p2ps_connect_p2ps_method(dev, keep_group=False, join_extra="", flush=True):
         res = dev[1].group_form_result(go_ev)
         if join_extra == "":
             join_extra = " freq=" + res['freq']
-        
+
     ifnames = get_ifnames()
     p2ps_connect_pd(dev[0], dev[1], ev0, ev1, join_extra=join_extra,
                     go_ev=go_ev)