aboutsummaryrefslogtreecommitdiff
path: root/src/test
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2011-03-16 17:11:27 -0400
committerNick Mathewson <nickm@torproject.org>2011-03-16 17:11:30 -0400
commit3310dd23583dd0a799477bb042cb06c3c058147b (patch)
treecbc106c1b92c2f01b71556bbf306b7d507cd1445 /src/test
parent6617822b841e32d6339bac13c79dd5f2b566c3c6 (diff)
downloadtor-3310dd23583dd0a799477bb042cb06c3c058147b.tar.gz
tor-3310dd23583dd0a799477bb042cb06c3c058147b.zip
Clean up whitespace
Diffstat (limited to 'src/test')
-rw-r--r--src/test/test_crypto.c6
-rw-r--r--src/test/test_dir.c6
2 files changed, 7 insertions, 5 deletions
diff --git a/src/test/test_crypto.c b/src/test/test_crypto.c
index 6ea7f295ed..781081a4ad 100644
--- a/src/test/test_crypto.c
+++ b/src/test/test_crypto.c
@@ -384,12 +384,14 @@ test_crypto_pk(void)
/* Now try signing. */
strlcpy(data1, "Ossifrage", 1024);
test_eq(128, crypto_pk_private_sign(pk1, data2, sizeof(data2), data1, 10));
- test_eq(10, crypto_pk_public_checksig(pk1, data3, sizeof(data3), data2, 128));
+ test_eq(10,
+ crypto_pk_public_checksig(pk1, data3, sizeof(data3), data2, 128));
test_streq(data3, "Ossifrage");
/* Try signing digests. */
test_eq(128, crypto_pk_private_sign_digest(pk1, data2, sizeof(data2),
data1, 10));
- test_eq(20, crypto_pk_public_checksig(pk1, data3, sizeof(data3), data2, 128));
+ test_eq(20,
+ crypto_pk_public_checksig(pk1, data3, sizeof(data3), data2, 128));
test_eq(0, crypto_pk_public_checksig_digest(pk1, data1, 10, data2, 128));
test_eq(-1, crypto_pk_public_checksig_digest(pk1, data1, 11, data2, 128));
diff --git a/src/test/test_dir.c b/src/test/test_dir.c
index 1f3beb4baa..8fd94289a9 100644
--- a/src/test/test_dir.c
+++ b/src/test/test_dir.c
@@ -748,11 +748,11 @@ test_dir_v3_networkstatus(void)
sign_skey_leg1 = pk_generate(4);
test_assert(!crypto_pk_read_private_key_from_string(sign_skey_1,
- AUTHORITY_SIGNKEY_1, -1));
+ AUTHORITY_SIGNKEY_1, -1));
test_assert(!crypto_pk_read_private_key_from_string(sign_skey_2,
- AUTHORITY_SIGNKEY_2, -1));
+ AUTHORITY_SIGNKEY_2, -1));
test_assert(!crypto_pk_read_private_key_from_string(sign_skey_3,
- AUTHORITY_SIGNKEY_3, -1));
+ AUTHORITY_SIGNKEY_3, -1));
test_assert(!crypto_pk_cmp_keys(sign_skey_1, cert1->signing_key));
test_assert(!crypto_pk_cmp_keys(sign_skey_2, cert2->signing_key));