Found by running the checkpatch.pl Linux script to enforce coding style.
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/22097)
goto err;
}
BIO_printf(bio_err,
- "SRP parameters set: username = \"%s\" info=\"%s\" \n",
+ "SRP parameters set: username = \"%s\" info=\"%s\"\n",
p->login, p->user->info);
ret = SSL_ERROR_NONE;
srp_callback_parm->login = NULL;
if (srp_callback_parm->vb == NULL) {
- BIO_printf(bio_err, "Failed to initialize SRP verifier file \n");
+ BIO_printf(bio_err, "Failed to initialize SRP verifier file\n");
return 0;
}
if ((ret =
unsigned int w = ((B2) << 16) | ((B1) << 8) | (B0); \
int i = (N); \
while (i-- > 0) { \
- *cp++ = cov_2char[w & 0x3f]; \
- w >>= 6; \
- } \
+ *cp++ = cov_2char[w & 0x3f]; \
+ w >>= 6; \
+ } \
} while (0)
switch (magic[0]) {
* a proper FIPS 186-4 key validation which requires extra parameters
*/
if (EVP_PKEY_param_check(ctx) <= 0) {
- fprintf(stderr, "Simple EVP_PKEY_param_check() failed \n");
+ fprintf(stderr, "Simple EVP_PKEY_param_check() failed\n");
goto cleanup;
}
if (ret != 1) {
if (SSL_get_error(c_ssl, ret) == SSL_ERROR_ZERO_RETURN) {
c_shutdown = 1;
- TEST_info("Message: \n%s\n", msg2);
+ TEST_info("Message:\n%s\n", msg2);
} else if (!TEST_true(is_want(c_ssl, ret))) {
goto err;
}