var b bytes.Buffer
b.Grow(64)
b.Write([]byte("abcde"))
- fmt.Printf("%s\n", string(b.Next(2)))
- fmt.Printf("%s\n", string(b.Next(2)))
- fmt.Printf("%s", string(b.Next(2)))
+ fmt.Printf("%s\n", b.Next(2))
+ fmt.Printf("%s\n", b.Next(2))
+ fmt.Printf("%s", b.Next(2))
// Output:
// ab
// cd
return
}
- fmt.Printf("Plaintext: %s\n", string(plaintext))
+ fmt.Printf("Plaintext: %s\n", plaintext)
}
func ExampleSignPKCS1v15() {
return
}
- fmt.Printf("Plaintext: %s\n", string(plaintext))
+ fmt.Printf("Plaintext: %s\n", plaintext)
// Remember that encryption only provides confidentiality. The
// ciphertext should be signed before authenticity is assumed and, even
sbuf = sbuf[:runtime.Stack(sbuf, true)]
n = strings.Count(string(sbuf), "goroutine ")
if n != want {
- fmt.Printf("%s Stack: want %d; got %d:\n%s\n", label, want, n, string(sbuf))
+ fmt.Printf("%s Stack: want %d; got %d:\n%s\n", label, want, n, sbuf)
return "", false
}
return string(sbuf), true