From dbe64d6fe01d5f298af85e7e82fcf3e22a7a1730 Mon Sep 17 00:00:00 2001 From: Eharve14 <71228603+Eharve14@users.noreply.github.com> Date: Thu, 13 Jan 2022 16:15:56 -0500 Subject: [PATCH] Fixed style --- src/bin/jp2/opj_compress.c | 2 +- src/bin/jp2/opj_decompress.c | 2 +- src/bin/jp2/opj_dump.c | 5 +++-- 3 files changed, 5 insertions(+), 4 deletions(-) diff --git a/src/bin/jp2/opj_compress.c b/src/bin/jp2/opj_compress.c index 1072f5b5..515ba856 100644 --- a/src/bin/jp2/opj_compress.c +++ b/src/bin/jp2/opj_compress.c @@ -486,7 +486,7 @@ static unsigned int get_num_images(char *imgdirpath) continue; } num_images++; - if(num_images == 0) { + if (num_images == 0) { fprintf(stderr, "Integer overflow detected when reading %s\n", imgdirpath); return 0; } diff --git a/src/bin/jp2/opj_decompress.c b/src/bin/jp2/opj_decompress.c index 3a6b409f..88e88469 100644 --- a/src/bin/jp2/opj_decompress.c +++ b/src/bin/jp2/opj_decompress.c @@ -389,7 +389,7 @@ int get_num_images(char *imgdirpath) continue; } num_images++; - if(num_images == 0) { + if (num_images == 0) { fprintf(stderr, "Integer overflow detected when reading %s\n", imgdirpath); return 0; } diff --git a/src/bin/jp2/opj_dump.c b/src/bin/jp2/opj_dump.c index 8eb73ada..99d8f08f 100644 --- a/src/bin/jp2/opj_dump.c +++ b/src/bin/jp2/opj_dump.c @@ -141,8 +141,9 @@ static int get_num_images(char *imgdirpath) continue; } num_images++; - if(num_images == 0) { - fprintf(stderr, "Integer overflow detected when reading images from %s\n", imgdirpath); + if (num_images == 0) { + fprintf(stderr, "Integer overflow detected when reading images from %s\n", + imgdirpath); return 0; } }