diff -up ./cmd/p7sign/p7sign.c.fix_warnings ./cmd/p7sign/p7sign.c --- ./cmd/p7sign/p7sign.c.fix_warnings 2016-02-07 15:29:48.459494920 -0800 +++ ./cmd/p7sign/p7sign.c 2016-02-07 15:55:04.920963101 -0800 @@ -92,21 +92,24 @@ SignFile(FILE *outFile, PRFileDesc *inFi SEC_PKCS7ContentInfo *cinfo; SECStatus rv; - if (outFile == NULL || inFile == NULL || cert == NULL) - return -1; + if (outFile == NULL || inFile == NULL || cert == NULL) { + return -1; + } /* suck the file in */ - if (SECU_ReadDERFromFile(&data2sign, inFile, PR_FALSE, - PR_FALSE) != SECSuccess) - return -1; + if (SECU_ReadDERFromFile(&data2sign, inFile, PR_FALSE, + PR_FALSE) != SECSuccess) { + return -1; + } if (!encapsulated) { /* unfortunately, we must create the digest ourselves */ /* SEC_PKCS7CreateSignedData should have a flag to not include */ /* the content for non-encapsulated content at encode time, but */ /* should always compute the hash itself */ - if (CreateDigest(&data2sign, digestdata, &len, 32) < 0) - return -1; + if (CreateDigest(&data2sign, digestdata, &len, 32) < 0) { + return -1; + } digest.data = (unsigned char *)digestdata; digest.len = len; } @@ -116,9 +119,9 @@ SignFile(FILE *outFile, PRFileDesc *inFi SEC_OID_SHA1, encapsulated ? NULL : &digest, NULL, NULL); - if (cinfo == NULL) + if (cinfo == NULL) { return -1; - + } if (encapsulated) { SEC_PKCS7SetContent(cinfo, (char *)data2sign.data, data2sign.len); } @@ -134,8 +137,9 @@ SignFile(FILE *outFile, PRFileDesc *inFi SEC_PKCS7DestroyContentInfo (cinfo); - if (rv != SECSuccess) + if (rv != SECSuccess) { return -1; + } return 0; } diff -up ./cmd/vfychain/vfychain.c.fix_warnings ./cmd/vfychain/vfychain.c --- ./cmd/vfychain/vfychain.c.fix_warnings 2016-02-07 16:03:13.189775733 -0800 +++ ./cmd/vfychain/vfychain.c 2016-02-07 16:22:33.709073372 -0800 @@ -439,7 +439,7 @@ main(int argc, char *argv[], char *envp[ case 0 : /* positional parameter */ goto breakout; case 'a' : isAscii = PR_TRUE; break; case 'b' : secStatus = DER_AsciiToTime(&time, optstate->value); - if (secStatus != SECSuccess) Usage(progName); break; + if (secStatus != SECSuccess) { Usage(progName); } break; case 'd' : certDir = PL_strdup(optstate->value); break; case 'e' : ocsp_fetchingFailureIsAFailure = PR_FALSE; break; case 'f' : certFetching = PR_TRUE; break; @@ -484,9 +484,9 @@ main(int argc, char *argv[], char *envp[ case 't' : trusted = PR_TRUE; break; case 'T' : onlyTrustAnchors = PR_FALSE; break; case 'u' : usage = PORT_Atoi(optstate->value); - if (usage < 0 || usage > 62) Usage(progName); + if (usage < 0 || usage > 62) { Usage(progName); } certUsage = ((SECCertificateUsage)1) << usage; - if (certUsage > certificateUsageHighest) Usage(progName); + if (certUsage > certificateUsageHighest) { Usage(progName); } break; case 'w': pwdata.source = PW_PLAINTEXT; diff -up ./lib/dbm/src/hash.c.fix_warnings ./lib/dbm/src/hash.c --- ./lib/dbm/src/hash.c.fix_warnings 2016-02-07 15:18:54.006925157 -0800 +++ ./lib/dbm/src/hash.c 2016-02-07 15:21:02.151491099 -0800 @@ -815,9 +815,9 @@ hash_access( } ovfl_loop_count++; - if(ovfl_loop_count > MAX_OVERFLOW_HASH_ACCESS_LOOPS) + if(ovfl_loop_count > MAX_OVERFLOW_HASH_ACCESS_LOOPS) { return (DATABASE_CORRUPTED_ERROR); - + } /* FOR LOOP INIT */ bp = (uint16 *)rbufp->page; n = *bp++; @@ -825,8 +825,9 @@ hash_access( off = hashp->BSIZE; } else if (bp[1] < REAL_KEY) { if ((ndx = - __find_bigpair(hashp, rbufp, ndx, kp, (int)size)) > 0) + __find_bigpair(hashp, rbufp, ndx, kp, (int)size)) > 0) { goto found; + } if (ndx == -2) { bufp = rbufp; if (!(pageno = diff -up ./lib/dbm/src/h_page.c.fix_warnings ./lib/dbm/src/h_page.c --- ./lib/dbm/src/h_page.c.fix_warnings 2016-01-29 02:30:10.000000000 -0800 +++ ./lib/dbm/src/h_page.c 2016-02-07 15:10:42.439250993 -0800 @@ -114,9 +114,9 @@ long new_lseek(int fd, long offset, int if(origin == SEEK_CUR) { - if(offset < 1) - return(lseek(fd, offset, SEEK_CUR)); - + if(offset < 1) { + return(lseek(fd, offset, SEEK_CUR)); + } cur_pos = lseek(fd, 0, SEEK_CUR); if(cur_pos < 0)