goto end;
if (i == 0) {
BIO_printf(bio_err, "verify failure\n");
- goto end;
- } else
+ goto end;
+ } else {
BIO_printf(bio_err, "verify OK\n");
+ }
}
if (crldiff != NULL) {
goto end;
if (i == 0) {
BIO_printf(bio_err, "Certificate request self-signature verify failure\n");
- goto end;
- } else /* i > 0 */
+ goto end;
+ } else /* i > 0 */ {
BIO_printf(bio_out, "Certificate request self-signature verify OK\n");
+ }
}
if (noout && !text && !modulus && !subject && !pubkey) {
}
if (proxystr != NULL) {
-#ifndef OPENSSL_NO_HTTP
+# ifndef OPENSSL_NO_HTTP
int res;
char *tmp_host = host, *tmp_port = port;
"%s: -proxy argument malformed or ambiguous\n", prog);
goto end;
}
-#else
+# else
BIO_printf(bio_err,
"%s: -proxy not supported in no-http build\n", prog);
- goto end;
-#endif
+ goto end;
+# endif
}
void OPENSSL_cpuid_setup(void)
{
- OPENSSL_loongarch_hwcap_P = getauxval(AT_HWCAP);
+ OPENSSL_loongarch_hwcap_P = getauxval(AT_HWCAP);
}
len_1 = wcslen(wstr) + 1;
if (len_1 > INT_MAX) {
- CAPIerr(CAPI_F_WIDE_TO_ASC, CAPI_R_FUNCTION_NOT_SUPPORTED);
- return NULL;
+ CAPIerr(CAPI_F_WIDE_TO_ASC, CAPI_R_FUNCTION_NOT_SUPPORTED);
+ return NULL;
}
len_0 = (int)len_1; /* WideCharToMultiByte expects int */
unsigned char key[] = "012345678901234567890123456789";
unsigned char info[] = "";
const unsigned char expected[] = {
- 0x67, 0x12, 0xf9, 0x27, 0x8a, 0x8a, 0x3a, 0x8f, 0x7d, 0x2c, 0xa3, 0x6a,
- 0xaa, 0xe9, 0xb3, 0xb9, 0x52, 0x5f, 0xe0, 0x06,
+ 0x67, 0x12, 0xf9, 0x27, 0x8a, 0x8a, 0x3a, 0x8f, 0x7d, 0x2c, 0xa3, 0x6a,
+ 0xaa, 0xe9, 0xb3, 0xb9, 0x52, 0x5f, 0xe0, 0x06,
};
size_t expectedlen = sizeof(expected);
if (key_deleted == 1) {
*storectx = 1;
break;
- }
+ }
/* Construct a new key using our keymgmt functions */
if (!TEST_ptr(key = fake_rsa_keymgmt_new(NULL)))
goto end;
while (!OSSL_STORE_eof(ctx)) {
- info = OSSL_STORE_load(ctx);
- if (!TEST_ptr_null(info))
- goto end;
+ info = OSSL_STORE_load(ctx);
+ if (!TEST_ptr_null(info))
+ goto end;
}
ret = 1;
#if defined(OPENSSL_THREADS)
struct child_thread_args *threads;
size_t num_threads;
- CRYPTO_MUTEX *misc_m;
- CRYPTO_CONDVAR *misc_cv;
+ CRYPTO_MUTEX *misc_m;
+ CRYPTO_CONDVAR *misc_cv;
#endif
OSSL_TIME start_time;