diff options
author | Nick Mathewson <nickm@torproject.org> | 2015-12-20 15:00:20 -0500 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2015-12-20 15:00:20 -0500 |
commit | bb19799a49cf43feff46da1a445e8d80273ca0a3 (patch) | |
tree | 4b9f3f91dc6ab558ec79505b6cf028a3720503fc /src/test | |
parent | 2d9c38ea7295dc484c0e9a884b4b90f436f83627 (diff) | |
download | tor-bb19799a49cf43feff46da1a445e8d80273ca0a3.tar.gz tor-bb19799a49cf43feff46da1a445e8d80273ca0a3.zip |
Appease "make check-spaces"
Diffstat (limited to 'src/test')
-rw-r--r-- | src/test/test_crypto.c | 44 |
1 files changed, 29 insertions, 15 deletions
diff --git a/src/test/test_crypto.c b/src/test/test_crypto.c index b6398c5f35..e343779bb8 100644 --- a/src/test/test_crypto.c +++ b/src/test/test_crypto.c @@ -480,11 +480,13 @@ test_crypto_sha3(void *arg) /* Len = 24, Msg = 1F877C */ const uint8_t keccak_kat_msg24[] = { 0x1f, 0x87, 0x7c }; - i = crypto_digest256(data, (const char*)keccak_kat_msg24, 3, DIGEST_SHA3_256); + i = crypto_digest256(data, (const char*)keccak_kat_msg24, 3, + DIGEST_SHA3_256); test_memeq_hex(data, "BC22345E4BD3F792A341CF18AC0789F1" "C9C966712A501B19D1B6632CCD408EC5"); tt_int_op(i, OP_EQ, 0); - i = crypto_digest512(data, (const char*)keccak_kat_msg24, 3, DIGEST_SHA3_512); + i = crypto_digest512(data, (const char*)keccak_kat_msg24, 3, + DIGEST_SHA3_512); test_memeq_hex(data, "CB20DCF54955F8091111688BECCEF48C" "1A2F0D0608C3A575163751F002DB30F4" "0F2F671834B22D208591CFAF1F5ECFE4" @@ -508,11 +510,13 @@ test_crypto_sha3(void *arg) 0x76, 0x3D, 0x52, 0xDB, 0x98, 0xD9, 0x49, 0xD3, 0xB0, 0xFE, 0xD6, 0xA8, 0x05, 0x2F, 0xBB, }; - i = crypto_digest256(data, (const char*)keccak_kat_msg1080, 135, DIGEST_SHA3_256); + i = crypto_digest256(data, (const char*)keccak_kat_msg1080, 135, + DIGEST_SHA3_256); test_memeq_hex(data, "A19EEE92BB2097B64E823D597798AA18" "BE9B7C736B8059ABFD6779AC35AC81B5"); tt_int_op(i, OP_EQ, 0); - i = crypto_digest512(data, (const char*)keccak_kat_msg1080, 135, DIGEST_SHA3_512); + i = crypto_digest512(data, (const char*)keccak_kat_msg1080, 135, + DIGEST_SHA3_512); test_memeq_hex(data, "7575A1FB4FC9A8F9C0466BD5FCA496D1" "CB78696773A212A5F62D02D14E3259D1" "92A87EBA4407DD83893527331407B6DA" @@ -536,11 +540,13 @@ test_crypto_sha3(void *arg) 0x87, 0xC8, 0xB9, 0x27, 0xF5, 0xB0, 0x8B, 0xEB, 0x37, 0x67, 0x4C, 0x6F, 0x8E, 0x38, 0x0C, 0x04, }; - i = crypto_digest256(data, (const char*)keccak_kat_msg1088, 136, DIGEST_SHA3_256); + i = crypto_digest256(data, (const char*)keccak_kat_msg1088, 136, + DIGEST_SHA3_256); test_memeq_hex(data, "DF673F4105379FF6B755EEAB20CEB0DC" "77B5286364FE16C59CC8A907AFF07732"); tt_int_op(i, OP_EQ, 0); - i = crypto_digest512(data, (const char*)keccak_kat_msg1088, 136, DIGEST_SHA3_512); + i = crypto_digest512(data, (const char*)keccak_kat_msg1088, 136, + DIGEST_SHA3_512); test_memeq_hex(data, "2E293765022D48996CE8EFF0BE54E87E" "FB94A14C72DE5ACD10D0EB5ECE029CAD" "FA3BA17A40B2FFA2163991B17786E51C" @@ -564,11 +570,13 @@ test_crypto_sha3(void *arg) 0xB5, 0x67, 0x7D, 0x92, 0x6D, 0xAC, 0x57, 0xB3, 0xF2, 0x2D, 0xA8, 0x73, 0xC6, 0x01, 0x01, 0x6A, 0x0D, }; - i = crypto_digest256(data, (const char*)keccak_kat_msg1096, 137, DIGEST_SHA3_256); + i = crypto_digest256(data, (const char*)keccak_kat_msg1096, 137, + DIGEST_SHA3_256); test_memeq_hex(data, "D52432CF3B6B4B949AA848E058DCD62D" "735E0177279222E7AC0AF8504762FAA0"); tt_int_op(i, OP_EQ, 0); - i = crypto_digest512(data, (const char*)keccak_kat_msg1096, 137, DIGEST_SHA3_512); + i = crypto_digest512(data, (const char*)keccak_kat_msg1096, 137, + DIGEST_SHA3_512); test_memeq_hex(data, "BE8E14B6757FFE53C9B75F6DDE9A7B6C" "40474041DE83D4A60645A826D7AF1ABE" "1EEFCB7B74B62CA6A514E5F2697D585B" @@ -593,13 +601,15 @@ test_crypto_sha3(void *arg) 0x4B, 0xA0, 0x80, 0x1A, 0x12, 0x94, 0xCD, 0x8D, 0x7E, 0x66, 0xDF, 0xAF, 0xEC, }; - i = crypto_digest512(data, (const char*)keccak_kat_msg1144, 143, DIGEST_SHA3_512); + i = crypto_digest512(data, (const char*)keccak_kat_msg1144, 143, + DIGEST_SHA3_512); test_memeq_hex(data, "3A8E938C45F3F177991296B24565D9A6" "605516615D96A062C8BE53A0D6C5A648" "7BE35D2A8F3CF6620D0C2DBA2C560D68" "295F284BE7F82F3B92919033C9CE5D80"); tt_int_op(i, OP_EQ, 0); - i = crypto_digest256(data, (const char*)keccak_kat_msg1144, 143, DIGEST_SHA3_256); + i = crypto_digest256(data, (const char*)keccak_kat_msg1144, 143, + DIGEST_SHA3_256); test_memeq_hex(data, "E58A947E98D6DD7E932D2FE02D9992E6" "118C0C2C606BDCDA06E7943D2C95E0E5"); tt_int_op(i, OP_EQ, 0); @@ -622,13 +632,15 @@ test_crypto_sha3(void *arg) 0xB3, 0x3D, 0x42, 0x60, 0x43, 0x9C, 0xBA, 0x73, 0xA9, 0x47, 0x9E, 0xE0, 0x0C, 0x63, }; - i = crypto_digest512(data, (const char*)keccak_kat_msg1152, 144, DIGEST_SHA3_512); + i = crypto_digest512(data, (const char*)keccak_kat_msg1152, 144, + DIGEST_SHA3_512); test_memeq_hex(data, "FE45289874879720CE2A844AE34BB735" "22775DCB6019DCD22B8885994672A088" "9C69E8115C641DC8B83E39F7311815A1" "64DC46E0BA2FCA344D86D4BC2EF2532C"); tt_int_op(i, OP_EQ, 0); - i = crypto_digest256(data, (const char*)keccak_kat_msg1152, 144, DIGEST_SHA3_256); + i = crypto_digest256(data, (const char*)keccak_kat_msg1152, 144, + DIGEST_SHA3_256); test_memeq_hex(data, "A936FB9AF87FB67857B3EAD5C76226AD" "84DA47678F3C2FFE5A39FDB5F7E63FFB"); tt_int_op(i, OP_EQ, 0); @@ -651,13 +663,15 @@ test_crypto_sha3(void *arg) 0xC1, 0xDB, 0xB3, 0xB5, 0xC7, 0x87, 0x1A, 0x11, 0xF5, 0x53, 0x70, 0x11, 0x04, 0x4C, 0x53, }; - i = crypto_digest512(data, (const char*)keccak_kat_msg1160, 145, DIGEST_SHA3_512); + i = crypto_digest512(data, (const char*)keccak_kat_msg1160, 145, + DIGEST_SHA3_512); test_memeq_hex(data, "AFF61C6E11B98E55AC213B1A0BC7DE04" "05221AC5EFB1229842E4614F4A029C9B" "D14A0ED7FD99AF3681429F3F309FDB53" "166AA9A3CD9F1F1223D04B4A9015E94A"); tt_int_op(i, OP_EQ, 0); - i = crypto_digest256(data, (const char*)keccak_kat_msg1160, 145, DIGEST_SHA3_256); + i = crypto_digest256(data, (const char*)keccak_kat_msg1160, 145, + DIGEST_SHA3_256); test_memeq_hex(data, "3A654B88F88086C2751EDAE6D3924814" "3CF6235C6B0B7969342C45A35194B67E"); tt_int_op(i, OP_EQ, 0); @@ -816,7 +830,7 @@ test_crypto_sha3_xof(void *arg) crypto_xof_squeeze_bytes(xof, out + i, 1); test_memeq_hex(out, squeezed_hex); -done: + done: if (xof) crypto_xof_free(xof); tor_free(mem_op_hex_tmp); |