aboutsummaryrefslogtreecommitdiff
path: root/src/test/test_crypto.c
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2019-04-30 14:49:05 -0400
committerNick Mathewson <nickm@torproject.org>2019-04-30 14:49:05 -0400
commit295feeb09377c4d78f9ee43ec3197b908d7cb960 (patch)
tree9fe43c9444b3812bc585487e20442056a2d08735 /src/test/test_crypto.c
parent0034f1095680e2b05c19ec13368ddc936a53058a (diff)
downloadtor-295feeb09377c4d78f9ee43ec3197b908d7cb960.tar.gz
tor-295feeb09377c4d78f9ee43ec3197b908d7cb960.zip
Replace all remaining tor_mem_is_zero() with fast_mem_is_zero()
Diffstat (limited to 'src/test/test_crypto.c')
-rw-r--r--src/test/test_crypto.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/src/test/test_crypto.c b/src/test/test_crypto.c
index 08dfb6bcdd..872da3d2c5 100644
--- a/src/test/test_crypto.c
+++ b/src/test/test_crypto.c
@@ -389,7 +389,7 @@ test_crypto_aes128(void *arg)
"\xff\xff\xff\xff\xff\xff\xff\xff"
"\xff\xff\xff\xff\xff\xff\xff\xff");
crypto_cipher_crypt_inplace(env1, data2, 64);
- tt_assert(tor_mem_is_zero(data2, 64));
+ tt_assert(fast_mem_is_zero(data2, 64));
done:
tor_free(mem_op_hex_tmp);
@@ -2134,7 +2134,7 @@ test_crypto_curve25519_persist(void *arg)
tt_u64_op((uint64_t)st.st_size, OP_EQ,
32+CURVE25519_PUBKEY_LEN+CURVE25519_SECKEY_LEN);
tt_assert(fast_memeq(content, "== c25519v1: testing ==", taglen));
- tt_assert(tor_mem_is_zero(content+taglen, 32-taglen));
+ tt_assert(fast_mem_is_zero(content+taglen, 32-taglen));
cp = content + 32;
tt_mem_op(keypair.seckey.secret_key,OP_EQ,
cp,