diff src/ui/mfw/mfw_mfw.c @ 188:92abb46dc1ba

src/ui/mfw/*.[ch]: rm trailing white space
author Mychaela Falconia <falcon@freecalypso.org>
date Tue, 19 Jan 2021 06:10:27 +0000
parents 67bfe9f274f6
children
line wrap: on
line diff
--- a/src/ui/mfw/mfw_mfw.c	Tue Jan 19 05:41:26 2021 +0000
+++ b/src/ui/mfw/mfw_mfw.c	Tue Jan 19 06:10:27 2021 +0000
@@ -16,14 +16,14 @@
 
    $History:: mfw_mfw.c                                             $
 	Sep 14, 2007	REF: OMAPS00145866  Adrian Salido
-	Description:	FT - MMI: Wrong trace class 
-	Solution:		changed event traces to function traces because the information content of 
+	Description:	FT - MMI: Wrong trace class
+	Solution:		changed event traces to function traces because the information content of
 				this is low for non-MMI people and against TI coding convention.
 
       Nov 05, 2005	REF: OMAPS00049571   Sumanth Kumar. C
       Description:	eZi Text function is not working
-      Solution:		current_mfw_elem variable is updated when any of the elements 
-                            such as window, keyboard, timer, etc., are deleted so that the 
+      Solution:		current_mfw_elem variable is updated when any of the elements
+                            such as window, keyboard, timer, etc., are deleted so that the
                             current_mfw_element does not point to element that has already been freed.
 
   	Feb 28, 2004    REF: CRR 25608     Deepa M.D
@@ -31,9 +31,9 @@
 
       Jan 27, 2005 REF: CRR MMI-SPR-28300 xnkulkar
       Description: BMI: memory leak in mfwFree/mfwAlloc ??
-      Solution: Trace output to print memory address and size freed  
+      Solution: Trace output to print memory address and size freed
                     modified in function mfwFree()
-      
+
       Dec 22, 2004 REF: CRR MFW-SPR-27847 xnkulkar
       Description: MFW memory size variable changed from U16 -> U32
       Solution: The use of variable U16 has been replaced with U32
@@ -154,7 +154,7 @@
 //Feb 28, 2005    REF: CRR 25608     Deepa M.D
 //The mfwEorc is made const.The changes will be present both in Color and Golite build
 static const  MfwHdr mfwEorc = {0, MfwTypMax, 0}; /* end of root chain     */
- 
+
 
 /***************************Go-lite Optimization changes end***********************/
 
@@ -190,10 +190,10 @@
     mfwMemDynTotal = dynMemSize;
     if (dynMemSize)
     {
-		
+
 /***************************Go-lite Optimization changes start***********************/
         mfwRoot = (MfwHdr *)&mfwEorc;             /* points to end of chain   */
-		
+
 /***************************Go-lite Optimization changes end***********************/
         mfwMemBase = (U8 *) externalRoot; /* setup memory handler   */
         mfwMemEnd = (U8 *) externalRoot + dynMemSize;
@@ -208,11 +208,11 @@
     else
     {
         mfwRoot = (MfwHdr *) externalRoot; /* setup root pointer    */
-		
+
 /***************************Go-lite Optimization changes start***********************/
         if (!mfwRoot)
             mfwRoot = (MfwHdr *)&mfwEorc;         /* points to end of chain   */
-		
+
 /***************************Go-lite Optimization changes end***********************/
         mfwMemBase = 0;
         mfwMemEnd = 0;
@@ -425,10 +425,10 @@
             if (mfwFocus == e)          /* first element of window  */
                 mfwSetFocus(e->next);
 /*    Nov 05, 2005	REF: OMAPS00049571   Sumanth Kumar. C
-  *    Solution: 	current_mfw_elem variable is updated when any of the elements 
-  *                         such as window, keyboard, timer, etc., are deleted so that the 
+  *    Solution: 	current_mfw_elem variable is updated when any of the elements
+  *                         such as window, keyboard, timer, etc., are deleted so that the
   *                         current_mfw_element does not point to element that has already been freed.
-  */			
+  */
             if(e->type == MfwTypWin || e->type == MfwTypKbd ||e->type == MfwTypTim ||
 	         e->type == MfwTypEdt || e->type == MfwTypMnu || e->type == MfwTypIcn)
 	             current_mfw_elem = e->next;
@@ -533,7 +533,7 @@
         TRACE_ERROR("mfwAlloc(): invalid memory request");
         return 0;
     }
-    
+
 #ifdef SENTINAL_CHECK
     if (!mfwMemBase)
     {
@@ -552,7 +552,7 @@
         TRACE_ERROR("mfwAlloc(): no memory");
         return 0;
     }
-    
+
     if (mfwMemBase + mfwMem.next > mfwMemEnd
               || mfwMemBase + mfwMem.next < mfwMemBase)
     {
@@ -627,7 +627,7 @@
         TRACE_ERROR("mfwAlloc(): no memory");
         return 0;
     }
-    
+
     if (mfwMemBase + mfwMem.next > mfwMemEnd
               || mfwMemBase + mfwMem.next < mfwMemBase)
     {
@@ -732,7 +732,7 @@
 #ifdef TRACE_MEMORY_CHECK
 // Jan 27, 2005 REF: CRR MMI-SPR-28300 xnkulkar
 // Description: BMI: memory leak in mfwFree/mfwAlloc ??
-// Solution: Trace output to print memory address and size freed modified 
+// Solution: Trace output to print memory address and size freed modified
 	/* x0083025 on Sep 14, 2007 for OMAPS00145866 (adrian) */
 	MMI_TRACE_EVENT_P2("MFWFree address = %p, size : %d bytes",mem,size);
 #endif
@@ -740,7 +740,7 @@
     if (!mfwMemBase)
     {
         void *m = mem;
-        
+
 #ifdef SENTINAL_CHECK
 		/*
 		** Check the SENTINEL_SIZE last bytes to ensure they haven't been changed
@@ -794,7 +794,7 @@
 	/*
 	** Memory not already free
 	*/
-        
+
 #ifdef SENTINAL_CHECK
 		/*
 		** Check the 4 last bytes to ensure they haven't been changed
@@ -847,7 +847,7 @@
 
 /*
 ** This function gives the bounds safety of strncpy, but NULL terminates the string like strcpy
-** 
+**
 ** parameters : cpyto : the pointer to the destination string
 **                   : cpyfrm : the pointer to the source string
 **                   : len : the maximum length of the destination string including the NULL terminator