aboutsummaryrefslogtreecommitdiff
path: root/src/test/test_hs_descriptor.c
diff options
context:
space:
mode:
authorteor <teor@torproject.org>2019-04-05 15:08:54 +1000
committerteor <teor@torproject.org>2019-04-05 15:17:19 +1000
commitce5e38642d1f5e48a7e5c98422e0fa23145f0363 (patch)
treeae91e9e569da5507cf407acb9c43306240881ce7 /src/test/test_hs_descriptor.c
parente3124fef54f90828f7b06c41fd4e39ef7778f2e3 (diff)
downloadtor-ce5e38642d1f5e48a7e5c98422e0fa23145f0363.tar.gz
tor-ce5e38642d1f5e48a7e5c98422e0fa23145f0363.zip
crypto_format: Remove the return value from ed25519_signature_to_base64()
Also remove all checks for the return value, which were redundant anyway, because the function never failed. Part of 29660.
Diffstat (limited to 'src/test/test_hs_descriptor.c')
-rw-r--r--src/test/test_hs_descriptor.c3
1 files changed, 1 insertions, 2 deletions
diff --git a/src/test/test_hs_descriptor.c b/src/test/test_hs_descriptor.c
index 09c6c3e700..86965d7d66 100644
--- a/src/test/test_hs_descriptor.c
+++ b/src/test/test_hs_descriptor.c
@@ -739,8 +739,7 @@ test_desc_signature(void *arg)
ret = ed25519_sign_prefixed(&sig, (const uint8_t *) data, strlen(data),
"Tor onion service descriptor sig v3", &kp);
tt_int_op(ret, OP_EQ, 0);
- ret = ed25519_signature_to_base64(sig_b64, &sig);
- tt_int_op(ret, OP_EQ, 0);
+ ed25519_signature_to_base64(sig_b64, &sig);
/* Build the descriptor that should be valid. */
tor_asprintf(&desc, "%ssignature %s\n", data, sig_b64);
ret = desc_sig_is_valid(sig_b64, &kp.pubkey, desc, strlen(desc));