From 56917f3bcb61bebc42b4cdbb89e6e6bdefe00e06 Mon Sep 17 00:00:00 2001 From: anton <> Date: Fri, 23 Aug 2024 12:56:26 +0000 Subject: Remove unwanted trailing newlines from err/warn format strings. --- src/regress/lib/libcrypto/bn/bn_mod_sqrt.c | 4 ++-- src/regress/lib/libcrypto/bn/bn_word.c | 10 +++++----- src/regress/lib/libcrypto/x509/callback.c | 4 ++-- src/regress/lib/libcrypto/x509/callbackfailures.c | 4 ++-- src/regress/lib/libcrypto/x509/expirecallback.c | 4 ++-- src/regress/lib/libcrypto/x509/policy/policy.c | 4 ++-- src/regress/lib/libcrypto/x509/verify.c | 4 ++-- src/regress/lib/libssl/key_schedule/key_schedule.c | 4 ++-- 8 files changed, 19 insertions(+), 19 deletions(-) (limited to 'src') diff --git a/src/regress/lib/libcrypto/bn/bn_mod_sqrt.c b/src/regress/lib/libcrypto/bn/bn_mod_sqrt.c index 7ab7905136..345ab4cb61 100644 --- a/src/regress/lib/libcrypto/bn/bn_mod_sqrt.c +++ b/src/regress/lib/libcrypto/bn/bn_mod_sqrt.c @@ -1,4 +1,4 @@ -/* $OpenBSD: bn_mod_sqrt.c,v 1.10 2023/04/11 10:10:52 tb Exp $ */ +/* $OpenBSD: bn_mod_sqrt.c,v 1.11 2024/08/23 12:56:26 anton Exp $ */ /* * Copyright (c) 2022,2023 Theo Buehler @@ -2865,7 +2865,7 @@ mod_sqrt_test(struct mod_sqrt_test *test, BN_CTX *ctx) if (!BN_hex2bn(&want, test->sqrt)) errx(1, "BN_hex2bn(%s)", test->sqrt); if (!BN_mod_sub(diff, want, got, p, ctx)) - errx(1, "BN_mod_sub() failed\n"); + errx(1, "BN_mod_sub() failed"); if (!BN_is_zero(diff)) { fprintf(stderr, "a: %s\n", test->a); diff --git a/src/regress/lib/libcrypto/bn/bn_word.c b/src/regress/lib/libcrypto/bn/bn_word.c index 0a543add97..2ec518ed1b 100644 --- a/src/regress/lib/libcrypto/bn/bn_word.c +++ b/src/regress/lib/libcrypto/bn/bn_word.c @@ -1,4 +1,4 @@ -/* $OpenBSD: bn_word.c,v 1.1 2023/03/11 14:04:21 jsing Exp $ */ +/* $OpenBSD: bn_word.c,v 1.2 2024/08/23 12:56:26 anton Exp $ */ /* * Copyright (c) 2023 Joel Sing * @@ -51,7 +51,7 @@ check_bn_word_test(const char *op_name, const BIGNUM *bn, } if ((out_hex = BN_bn2hex(bn)) == NULL) - errx(1, "BN_bn2hex() failed\n"); + errx(1, "BN_bn2hex() failed"); if (strcmp(out_hex, bwt->out_hex) != 0) { fprintf(stderr, "FAIL %s: Got hex %s, want %s\n", @@ -82,7 +82,7 @@ test_bn_word(int (*bn_word_op)(BIGNUM *, BN_ULONG), const char *op_name, int failed = 0; if ((bn = BN_new()) == NULL) - errx(1, "BN_new() failed\n"); + errx(1, "BN_new() failed"); for (i = 0; i < num_tests; i++) { bwt = &bwts[i]; @@ -428,7 +428,7 @@ test_bn_div_word(void) int failed = 0; if ((bn = BN_new()) == NULL) - errx(1, "BN_new() failed\n"); + errx(1, "BN_new() failed"); for (i = 0; i < N_BN_DIV_WORD_TESTS; i++) { bwt = &bn_div_word_tests[i]; @@ -574,7 +574,7 @@ test_bn_mod_word(void) int failed = 0; if ((bn = BN_new()) == NULL) - errx(1, "BN_new() failed\n"); + errx(1, "BN_new() failed"); for (i = 0; i < N_BN_MOD_WORD_TESTS; i++) { bwt = &bn_mod_word_tests[i]; diff --git a/src/regress/lib/libcrypto/x509/callback.c b/src/regress/lib/libcrypto/x509/callback.c index a01ffd5d6f..c4d1575ae8 100644 --- a/src/regress/lib/libcrypto/x509/callback.c +++ b/src/regress/lib/libcrypto/x509/callback.c @@ -1,4 +1,4 @@ -/* $OpenBSD: callback.c,v 1.4 2023/01/28 19:12:20 tb Exp $ */ +/* $OpenBSD: callback.c,v 1.5 2024/08/23 12:56:26 anton Exp $ */ /* * Copyright (c) 2020 Joel Sing * Copyright (c) 2020-2021 Bob Beck @@ -158,7 +158,7 @@ verify_cert(const char *roots_dir, const char *roots_file, verify_err = X509_STORE_CTX_get_error(xsc); if (verify_err == 0) - errx(1, "Error unset on failure!\n"); + errx(1, "Error unset on failure!"); fprintf(stderr, "failed to verify at %d: %s\n", X509_STORE_CTX_get_error_depth(xsc), diff --git a/src/regress/lib/libcrypto/x509/callbackfailures.c b/src/regress/lib/libcrypto/x509/callbackfailures.c index 53570e1532..9230122146 100644 --- a/src/regress/lib/libcrypto/x509/callbackfailures.c +++ b/src/regress/lib/libcrypto/x509/callbackfailures.c @@ -1,4 +1,4 @@ -/* $OpenBSD: callbackfailures.c,v 1.2 2023/01/28 19:12:20 tb Exp $ */ +/* $OpenBSD: callbackfailures.c,v 1.3 2024/08/23 12:56:26 anton Exp $ */ /* * Copyright (c) 2020 Joel Sing * Copyright (c) 2020-2021 Bob Beck @@ -167,7 +167,7 @@ verify_cert(const char *roots_dir, const char *roots_file, verify_err = X509_STORE_CTX_get_error(xsc); if (verify_err == 0) - errx(1, "Error unset on failure!\n"); + errx(1, "Error unset on failure!"); fprintf(stderr, "failed to verify at %d: %s\n", X509_STORE_CTX_get_error_depth(xsc), diff --git a/src/regress/lib/libcrypto/x509/expirecallback.c b/src/regress/lib/libcrypto/x509/expirecallback.c index 88cef6fd01..bd3f568f86 100644 --- a/src/regress/lib/libcrypto/x509/expirecallback.c +++ b/src/regress/lib/libcrypto/x509/expirecallback.c @@ -1,4 +1,4 @@ -/* $OpenBSD: expirecallback.c,v 1.3 2023/01/28 19:12:20 tb Exp $ */ +/* $OpenBSD: expirecallback.c,v 1.4 2024/08/23 12:56:26 anton Exp $ */ /* * Copyright (c) 2020 Joel Sing * Copyright (c) 2020-2021 Bob Beck @@ -172,7 +172,7 @@ verify_cert(const char *roots_dir, const char *roots_file, } if (*error == 0) - errx(1, "Error unset on failure!\n"); + errx(1, "Error unset on failure!"); fprintf(stderr, "failed to verify at %d: %s\n", *error_depth, X509_verify_cert_error_string(*error)); diff --git a/src/regress/lib/libcrypto/x509/policy/policy.c b/src/regress/lib/libcrypto/x509/policy/policy.c index f5c9700b2b..17ac78dd23 100644 --- a/src/regress/lib/libcrypto/x509/policy/policy.c +++ b/src/regress/lib/libcrypto/x509/policy/policy.c @@ -1,4 +1,4 @@ -/* $OpenBSD: policy.c,v 1.12 2023/06/02 08:35:10 tb Exp $ */ +/* $OpenBSD: policy.c,v 1.13 2024/08/23 12:56:26 anton Exp $ */ /* * Copyright (c) 2020 Joel Sing * Copyright (c) 2020-2023 Bob Beck @@ -182,7 +182,7 @@ verify_cert(const char *roots_file, const char *intermediate_file, } if (*error == 0) - errx(1, "Error unset on failure!\n"); + errx(1, "Error unset on failure!"); fprintf(stderr, "failed to verify at %d: %s\n", *error_depth, X509_verify_cert_error_string(*error)); diff --git a/src/regress/lib/libcrypto/x509/verify.c b/src/regress/lib/libcrypto/x509/verify.c index e49180f7f1..b4b4e06cf7 100644 --- a/src/regress/lib/libcrypto/x509/verify.c +++ b/src/regress/lib/libcrypto/x509/verify.c @@ -1,4 +1,4 @@ -/* $OpenBSD: verify.c,v 1.11 2023/01/28 19:12:20 tb Exp $ */ +/* $OpenBSD: verify.c,v 1.12 2024/08/23 12:56:26 anton Exp $ */ /* * Copyright (c) 2020 Joel Sing * Copyright (c) 2020-2021 Bob Beck @@ -162,7 +162,7 @@ verify_cert(const char *roots_dir, const char *roots_file, } if (*error == 0) - errx(1, "Error unset on failure!\n"); + errx(1, "Error unset on failure!"); fprintf(stderr, "failed to verify at %d: %s\n", *error_depth, X509_verify_cert_error_string(*error)); diff --git a/src/regress/lib/libssl/key_schedule/key_schedule.c b/src/regress/lib/libssl/key_schedule/key_schedule.c index f937d042c4..cbf5ea9df7 100644 --- a/src/regress/lib/libssl/key_schedule/key_schedule.c +++ b/src/regress/lib/libssl/key_schedule/key_schedule.c @@ -1,4 +1,4 @@ -/* $OpenBSD: key_schedule.c,v 1.10 2022/11/26 16:08:56 tb Exp $ */ +/* $OpenBSD: key_schedule.c,v 1.11 2024/08/23 12:56:26 anton Exp $ */ /* * Copyright (c) 2018-2019 Bob Beck * @@ -188,7 +188,7 @@ main (int argc, char **argv) struct tls13_secrets *secrets; if ((secrets = tls13_secrets_create(EVP_sha256(), 0)) == NULL) - errx(1,"failed to create secrets\n"); + errx(1, "failed to create secrets"); secrets->insecure = 1; /* don't explicit_bzero when done */ -- cgit v1.2.3-55-g6feb