Fix style issues and a typo
diff --git a/include/mbedtls/ssl.h b/include/mbedtls/ssl.h
index aabbb83..35e5764 100644
--- a/include/mbedtls/ssl.h
+++ b/include/mbedtls/ssl.h
@@ -2124,7 +2124,7 @@
  *
  * \warning        In multi-threaded environments, the callback \p f_ca_cb
  *                 must be thread-safe, and it is the user's responsibility
- *                 to guaranteee this (for example through a mutex
+ *                 to guarantee this (for example through a mutex
  *                 contained in the callback context pointed to by \p p_ca_cb).
  */
 void mbedtls_ssl_conf_ca_cb( mbedtls_ssl_config *conf,
diff --git a/programs/ssl/ssl_client2.c b/programs/ssl/ssl_client2.c
index e13c7cb..f0c7164 100644
--- a/programs/ssl/ssl_client2.c
+++ b/programs/ssl/ssl_client2.c
@@ -457,7 +457,7 @@
 
 #if defined(MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK)
 int ca_callback( void *data, mbedtls_x509_crt const *child,
-                 mbedtls_x509_crt **candidates)
+                 mbedtls_x509_crt **candidates )
 {
     int ret = 0;
     mbedtls_x509_crt *ca = (mbedtls_x509_crt *) data;
diff --git a/tests/ssl-opt.sh b/tests/ssl-opt.sh
index e9322ec..a9132a1 100755
--- a/tests/ssl-opt.sh
+++ b/tests/ssl-opt.sh
@@ -946,7 +946,7 @@
             "$P_SRV debug_level=3" \
             "$P_CLI ca_callback=1 debug_level=3 " \
             0 \
-            -c "use CA callback for X.509 CRT verification"\
+            -c "use CA callback for X.509 CRT verification" \
             -S "error" \
             -C "error"
 
@@ -959,7 +959,7 @@
             "$P_CLI ca_callback=1 debug_level=3 crt_file=data_files/server5.crt \
              key_file=data_files/server5.key" \
             0 \
-            -c "use CA callback for X.509 CRT verification"\
+            -c "use CA callback for X.509 CRT verification" \
             -s "Verifying peer X.509 certificate... ok" \
             -S "error" \
             -C "error"
@@ -2987,7 +2987,7 @@
              key_file=data_files/server5.key" \
             "$P_CLI ca_callback=1 debug_level=3 auth_mode=required" \
             1 \
-            -c "use CA callback for X.509 CRT verification"\
+            -c "use CA callback for X.509 CRT verification" \
             -c "x509_verify_cert() returned" \
             -c "! The certificate is not correctly signed by the trusted CA" \
             -c "! mbedtls_ssl_handshake returned" \
@@ -2999,7 +2999,7 @@
              key_file=data_files/server5.key" \
             "$P_CLI ca_callback=1 debug_level=3 auth_mode=optional" \
             0 \
-            -c "use CA callback for X.509 CRT verification"\
+            -c "use CA callback for X.509 CRT verification" \
             -c "x509_verify_cert() returned" \
             -c "! The certificate is not correctly signed by the trusted CA" \
             -C "! mbedtls_ssl_handshake returned" \
@@ -3019,9 +3019,9 @@
              crt_file=data_files/server5.ku-ka.crt" \
             "$P_CLI ca_callback=1 debug_level=3 auth_mode=required curves=secp521r1" \
             1 \
-            -c "use CA callback for X.509 CRT verification"\
-            -c "bad certificate (EC key curve)"\
-            -c "! Certificate verification flags"\
+            -c "use CA callback for X.509 CRT verification" \
+            -c "bad certificate (EC key curve)" \
+            -c "! Certificate verification flags" \
             -C "bad server certificate (ECDH curve)" # Expect failure at earlier verification stage
 
 requires_config_enabled MBEDTLS_ECP_C
@@ -3031,7 +3031,7 @@
              crt_file=data_files/server5.ku-ka.crt" \
             "$P_CLI ca_callback=1 debug_level=3 auth_mode=optional curves=secp521r1" \
             1 \
-            -c "use CA callback for X.509 CRT verification"\
+            -c "use CA callback for X.509 CRT verification" \
             -c "bad certificate (EC key curve)"\
             -c "! Certificate verification flags"\
             -c "bad server certificate (ECDH curve)" # Expect failure only at ECDH params check
@@ -3043,7 +3043,7 @@
              key_file=data_files/server6.key \
              force_ciphersuite=TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384" \
             0 \
-            -s "use CA callback for X.509 CRT verification"\
+            -s "use CA callback for X.509 CRT verification" \
             -c "Supported Signature Algorithm found: 4," \
             -c "Supported Signature Algorithm found: 5,"
 
@@ -3054,7 +3054,7 @@
              key_file=data_files/server6.key \
              force_ciphersuite=TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256" \
             0 \
-            -s "use CA callback for X.509 CRT verification"\
+            -s "use CA callback for X.509 CRT verification" \
             -c "Supported Signature Algorithm found: 4," \
             -c "Supported Signature Algorithm found: 5,"
 
@@ -3064,7 +3064,7 @@
             "$P_CLI debug_level=3 crt_file=data_files/server5-badsign.crt \
              key_file=data_files/server5.key" \
             1 \
-            -s "use CA callback for X.509 CRT verification"\
+            -s "use CA callback for X.509 CRT verification" \
             -S "skip write certificate request" \
             -C "skip parse certificate request" \
             -c "got a certificate request" \
@@ -3087,7 +3087,7 @@
             "$P_CLI debug_level=3 crt_file=data_files/server5-selfsigned.crt \
              key_file=data_files/server5.key" \
             1 \
-            -s "use CA callback for X.509 CRT verification"\
+            -s "use CA callback for X.509 CRT verification" \
             -S "skip write certificate request" \
             -C "skip parse certificate request" \
             -c "got a certificate request" \
@@ -3106,7 +3106,7 @@
             "$P_CLI debug_level=3 crt_file=data_files/server5-badsign.crt \
              key_file=data_files/server5.key" \
             0 \
-            -s "use CA callback for X.509 CRT verification"\
+            -s "use CA callback for X.509 CRT verification" \
             -S "skip write certificate request" \
             -C "skip parse certificate request" \
             -c "got a certificate request" \
@@ -3126,7 +3126,7 @@
                     key_file=data_files/dir-maxpath/09.key" \
             "$P_CLI ca_callback=1 debug_level=3 server_name=CA09 ca_file=data_files/dir-maxpath/00.crt" \
             0 \
-            -c "use CA callback for X.509 CRT verification"\
+            -c "use CA callback for X.509 CRT verification" \
             -C "X509 - A fatal error occurred"
 
 requires_full_size_output_buffer
@@ -3136,7 +3136,7 @@
                     key_file=data_files/dir-maxpath/10.key" \
             "$P_CLI debug_level=3 ca_callback=1 server_name=CA10 ca_file=data_files/dir-maxpath/00.crt" \
             1 \
-            -c "use CA callback for X.509 CRT verification"\
+            -c "use CA callback for X.509 CRT verification" \
             -c "X509 - A fatal error occurred"
 
 requires_full_size_output_buffer
@@ -3147,7 +3147,7 @@
             "$P_CLI ca_callback=1 server_name=CA10 ca_file=data_files/dir-maxpath/00.crt \
                     debug_level=3 auth_mode=optional" \
             1 \
-            -c "use CA callback for X.509 CRT verification"\
+            -c "use CA callback for X.509 CRT verification" \
             -c "X509 - A fatal error occurred"
 
 requires_full_size_output_buffer
@@ -3157,7 +3157,7 @@
             "$P_CLI crt_file=data_files/dir-maxpath/c10.pem \
                     key_file=data_files/dir-maxpath/10.key" \
             1 \
-            -s "use CA callback for X.509 CRT verification"\
+            -s "use CA callback for X.509 CRT verification" \
             -s "X509 - A fatal error occurred"
 
 requires_full_size_output_buffer
@@ -3167,7 +3167,7 @@
             "$P_CLI crt_file=data_files/dir-maxpath/c10.pem \
                     key_file=data_files/dir-maxpath/10.key" \
             1 \
-            -s "use CA callback for X.509 CRT verification"\
+            -s "use CA callback for X.509 CRT verification" \
             -s "X509 - A fatal error occurred"
 
 requires_full_size_output_buffer
@@ -3177,7 +3177,7 @@
             "$P_CLI crt_file=data_files/dir-maxpath/c09.pem \
                     key_file=data_files/dir-maxpath/09.key" \
             0 \
-            -s "use CA callback for X.509 CRT verification"\
+            -s "use CA callback for X.509 CRT verification" \
             -S "X509 - A fatal error occurred"
 
 # Tests for certificate selection based on SHA verson
diff --git a/tests/suites/test_suite_x509parse.function b/tests/suites/test_suite_x509parse.function
index d574c94..cd6e292 100644
--- a/tests/suites/test_suite_x509parse.function
+++ b/tests/suites/test_suite_x509parse.function
@@ -69,7 +69,7 @@
 }
 
 #if defined(MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK)
-int ca_callback_fail( void *data, mbedtls_x509_crt const *child, mbedtls_x509_crt **candidates)
+int ca_callback_fail( void *data, mbedtls_x509_crt const *child, mbedtls_x509_crt **candidates )
 {
     ((void) data);
     ((void) child);
@@ -79,7 +79,7 @@
 }
 
 int ca_callback( void *data, mbedtls_x509_crt const *child,
-                 mbedtls_x509_crt **candidates)
+                 mbedtls_x509_crt **candidates )
 {
     int ret = 0;
     mbedtls_x509_crt *ca = (mbedtls_x509_crt *) data;
@@ -478,8 +478,8 @@
         name = NULL;
 
     ret = mbedtls_x509_crt_verify_with_ca_cb( &crt, ca_callback_fail, &ca,
-                                           &compat_profile, name, &flags,
-                                           NULL, NULL );
+                                              &compat_profile, name, &flags,
+                                              NULL, NULL );
 
     TEST_ASSERT( ret == exp_ret );
 exit: