diff options
author | Nick Mathewson <nickm@torproject.org> | 2016-11-04 14:00:08 -0400 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2016-11-04 14:00:08 -0400 |
commit | 6847b9f6af1db75e44c7249b04820bf82f00a887 (patch) | |
tree | e16d3cb983d29ec1be227fda3dfb5acd1e34c70b /src/test | |
parent | 0e2df2b653ea25d3191995829e64c512c4868f2c (diff) | |
download | tor-6847b9f6af1db75e44c7249b04820bf82f00a887.tar.gz tor-6847b9f6af1db75e44c7249b04820bf82f00a887.zip |
Fix make check-spaces
Diffstat (limited to 'src/test')
-rw-r--r-- | src/test/test_dir.c | 2 | ||||
-rw-r--r-- | src/test/test_hs_cache.c | 2 | ||||
-rw-r--r-- | src/test/test_hs_descriptor.c | 7 |
3 files changed, 6 insertions, 5 deletions
diff --git a/src/test/test_dir.c b/src/test/test_dir.c index c8daa18653..4281109812 100644 --- a/src/test/test_dir.c +++ b/src/test/test_dir.c @@ -5761,7 +5761,7 @@ test_dir_post_parsing(void *arg) version = parse_hs_version_from_post("/tor/hs/42/publish", prefix, &end); tt_int_op(version, OP_EQ, 42); tt_str_op(end, OP_EQ, "/publish"); - version = parse_hs_version_from_post("/tor/hs/18163/publish", prefix, &end); + version = parse_hs_version_from_post("/tor/hs/18163/publish",prefix, &end); tt_int_op(version, OP_EQ, 18163); tt_str_op(end, OP_EQ, "/publish"); version = parse_hs_version_from_post("JUNKJUNKJUNK", prefix, &end); diff --git a/src/test/test_hs_cache.c b/src/test/test_hs_cache.c index c33e4302a6..dc7cf03d81 100644 --- a/src/test/test_hs_cache.c +++ b/src/test/test_hs_cache.c @@ -93,7 +93,7 @@ helper_build_hs_desc(uint64_t revision_counter, uint32_t lifetime, /* Setup encrypted data section. */ desc->encrypted_data.create2_ntor = 1; desc->encrypted_data.auth_types = smartlist_new(); - smartlist_add(desc->encrypted_data.auth_types, strdup("ed25519")); + smartlist_add(desc->encrypted_data.auth_types, tor_strdup("ed25519")); desc->encrypted_data.intro_points = smartlist_new(); /* Add an intro point. */ smartlist_add(desc->encrypted_data.intro_points, diff --git a/src/test/test_hs_descriptor.c b/src/test/test_hs_descriptor.c index a387120819..01e32cfa40 100644 --- a/src/test/test_hs_descriptor.c +++ b/src/test/test_hs_descriptor.c @@ -102,7 +102,7 @@ helper_build_hs_desc(unsigned int no_ip) /* Setup encrypted data section. */ desc->encrypted_data.create2_ntor = 1; desc->encrypted_data.auth_types = smartlist_new(); - smartlist_add(desc->encrypted_data.auth_types, strdup("ed25519")); + smartlist_add(desc->encrypted_data.auth_types, tor_strdup("ed25519")); desc->encrypted_data.intro_points = smartlist_new(); if (!no_ip) { /* Add four intro points. */ @@ -294,7 +294,7 @@ test_cert_encoding(void *arg) done: tor_cert_free(cert); - free(encoded); + tor_free(encoded); } /* Test the descriptor padding. */ @@ -1054,7 +1054,8 @@ test_validate_cert(void *arg) tor_cert_free(cert); /* Try a cert without including the signing key. */ - cert = tor_cert_create(&kp, CERT_TYPE_AUTH_HS_IP_KEY, &kp.pubkey, now, 3600, 0); + cert = tor_cert_create(&kp, CERT_TYPE_AUTH_HS_IP_KEY, &kp.pubkey, now, + 3600, 0); tt_assert(cert); /* Test with a bad type. */ ret = cert_is_valid(cert, CERT_TYPE_AUTH_HS_IP_KEY, "unicorn"); |