diff options
author | Nick Mathewson <nickm@torproject.org> | 2014-05-08 14:01:17 -0400 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2014-05-08 14:01:17 -0400 |
commit | 28538069b2f1909a7600ec6d25f8efb78be496fd (patch) | |
tree | c6f935a3dd34c0604d6219e792ede4c691b29f76 /src/test/test_crypto.c | |
parent | df684789380a51c9de14120160adfb796d891436 (diff) | |
download | tor-28538069b2f1909a7600ec6d25f8efb78be496fd.tar.gz tor-28538069b2f1909a7600ec6d25f8efb78be496fd.zip |
Fix numerous 64->32 errors in the unit tests
Before the 11825 fix, these were all silently ignored.
Diffstat (limited to 'src/test/test_crypto.c')
-rw-r--r-- | src/test/test_crypto.c | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/src/test/test_crypto.c b/src/test/test_crypto.c index 1fda334760..5d8edb6550 100644 --- a/src/test/test_crypto.c +++ b/src/test/test_crypto.c @@ -1132,7 +1132,8 @@ test_crypto_curve25519_persist(void *arg) content = read_file_to_str(fname, RFTS_BIN, &st); tt_assert(content); taglen = strlen("== c25519v1: testing =="); - tt_int_op(st.st_size, ==, 32+CURVE25519_PUBKEY_LEN+CURVE25519_SECKEY_LEN); + tt_u64_op((uint64_t)st.st_size, ==, + 32+CURVE25519_PUBKEY_LEN+CURVE25519_SECKEY_LEN); tt_assert(fast_memeq(content, "== c25519v1: testing ==", taglen)); tt_assert(tor_mem_is_zero(content+taglen, 32-taglen)); cp = content + 32; |