]> git.ipfire.org Git - thirdparty/openssl.git/commitdiff
unnecessary whitespace before a quoted newline
authorDimitri Papadopoulos <3234522+DimitriPapadopoulos@users.noreply.github.com>
Wed, 13 Sep 2023 20:36:43 +0000 (22:36 +0200)
committerNeil Horman <nhorman@openssl.org>
Mon, 22 Jul 2024 10:55:35 +0000 (06:55 -0400)
Found by running the checkpatch.pl Linux script to enforce coding style.

Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/22097)

apps/lib/tlssrp_depr.c
apps/passwd.c
demos/pkey/EVP_PKEY_DSA_paramvalidate.c
test/quic_client_test.c

index f03b013428f7ebc28220689008a43010e595e1ff..30c28afd6e9867ca5a830e985ab8a3fa70f57f0a 100644 (file)
@@ -178,7 +178,7 @@ static int ssl_srp_server_param_cb(SSL *s, int *ad, void *arg)
         goto err;
     }
     BIO_printf(bio_err,
-               "SRP parameters set: username = \"%s\" info=\"%s\" \n",
+               "SRP parameters set: username = \"%s\" info=\"%s\"\n",
                p->login, p->user->info);
     ret = SSL_ERROR_NONE;
 
@@ -199,7 +199,7 @@ int set_up_srp_verifier_file(SSL_CTX *ctx, srpsrvparm *srp_callback_parm,
     srp_callback_parm->login = NULL;
 
     if (srp_callback_parm->vb == NULL) {
-        BIO_printf(bio_err, "Failed to initialize SRP verifier file \n");
+        BIO_printf(bio_err, "Failed to initialize SRP verifier file\n");
         return 0;
     }
     if ((ret =
index 985a1b986430036276421db92d01d70d6fb88cb3..260e098b483438402230ba6a0aa90485bfc87212 100644 (file)
@@ -711,9 +711,9 @@ static char *shacrypt(const char *passwd, const char *magic, const char *salt)
         unsigned int w = ((B2) << 16) | ((B1) << 8) | (B0);             \
         int i = (N);                                                    \
         while (i-- > 0) {                                               \
-                *cp++ = cov_2char[w & 0x3f];                            \
-                w >>= 6;                                                \
-            }                                                           \
+            *cp++ = cov_2char[w & 0x3f];                                \
+            w >>= 6;                                                    \
+        }                                                               \
     } while (0)
 
     switch (magic[0]) {
index c909045f2a99d1b01661771641008f71778535ac..7576b9d49abaf9ce2401f36e7e47f5633e56ffc9 100644 (file)
@@ -145,7 +145,7 @@ int main(int argc, char **argv)
      * a proper FIPS 186-4 key validation which requires extra parameters
      */
     if (EVP_PKEY_param_check(ctx) <= 0) {
-        fprintf(stderr, "Simple EVP_PKEY_param_check() failed \n");
+        fprintf(stderr, "Simple EVP_PKEY_param_check() failed\n");
         goto cleanup;
     }
 
index 43adc504c35456260d57368a4f7eb7f36eb02933..35d25a8a8fba64fe2a546d9ad9340dda9c366d05 100644 (file)
@@ -133,7 +133,7 @@ static int test_quic_client_ex(int fd_arg)
             if (ret != 1) {
                 if (SSL_get_error(c_ssl, ret) == SSL_ERROR_ZERO_RETURN) {
                     c_shutdown = 1;
-                    TEST_info("Message: \n%s\n", msg2);
+                    TEST_info("Message:\n%s\n", msg2);
                 } else if (!TEST_true(is_want(c_ssl, ret))) {
                     goto err;
                 }