diff options
author | Nick Mathewson <nickm@torproject.org> | 2019-04-30 14:49:05 -0400 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2019-04-30 14:49:05 -0400 |
commit | 295feeb09377c4d78f9ee43ec3197b908d7cb960 (patch) | |
tree | 9fe43c9444b3812bc585487e20442056a2d08735 /src/test/test_crypto.c | |
parent | 0034f1095680e2b05c19ec13368ddc936a53058a (diff) | |
download | tor-295feeb09377c4d78f9ee43ec3197b908d7cb960.tar.gz tor-295feeb09377c4d78f9ee43ec3197b908d7cb960.zip |
Replace all remaining tor_mem_is_zero() with fast_mem_is_zero()
Diffstat (limited to 'src/test/test_crypto.c')
-rw-r--r-- | src/test/test_crypto.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/src/test/test_crypto.c b/src/test/test_crypto.c index 08dfb6bcdd..872da3d2c5 100644 --- a/src/test/test_crypto.c +++ b/src/test/test_crypto.c @@ -389,7 +389,7 @@ test_crypto_aes128(void *arg) "\xff\xff\xff\xff\xff\xff\xff\xff" "\xff\xff\xff\xff\xff\xff\xff\xff"); crypto_cipher_crypt_inplace(env1, data2, 64); - tt_assert(tor_mem_is_zero(data2, 64)); + tt_assert(fast_mem_is_zero(data2, 64)); done: tor_free(mem_op_hex_tmp); @@ -2134,7 +2134,7 @@ test_crypto_curve25519_persist(void *arg) tt_u64_op((uint64_t)st.st_size, OP_EQ, 32+CURVE25519_PUBKEY_LEN+CURVE25519_SECKEY_LEN); tt_assert(fast_memeq(content, "== c25519v1: testing ==", taglen)); - tt_assert(tor_mem_is_zero(content+taglen, 32-taglen)); + tt_assert(fast_mem_is_zero(content+taglen, 32-taglen)); cp = content + 32; tt_mem_op(keypair.seckey.secret_key,OP_EQ, cp, |