r = crypto_pk_get_digest(k, digest);
test_assert(r == 0);
test_memeq(hex_str(digest, DIGEST_LEN),
- AUTHORITY_SIGNKEY_1_DIGEST, HEX_DIGEST_LEN);
+ AUTHORITY_SIGNKEY_1_DIGEST, HEX_DIGEST_LEN);
r = crypto_pk_get_all_digests(k, &pkey_digests);
test_memeq(hex_str(pkey_digests.d[DIGEST_SHA1], DIGEST_LEN),
- AUTHORITY_SIGNKEY_1_DIGEST, HEX_DIGEST_LEN);
+ AUTHORITY_SIGNKEY_1_DIGEST, HEX_DIGEST_LEN);
test_memeq(hex_str(pkey_digests.d[DIGEST_SHA256], DIGEST256_LEN),
- AUTHORITY_SIGNKEY_1_DIGEST256, HEX_DIGEST256_LEN);
-done:
+ AUTHORITY_SIGNKEY_1_DIGEST256, HEX_DIGEST256_LEN);
+ done:
crypto_pk_free(k);
}
#include "or.h"
#include "test.h"
-
static void
test_tortls_evp_pkey_eq(void)
{
test_assert(tor_tls_evp_pkey_eq(evp1, evp2) == 0);
test_assert(tor_tls_evp_pkey_eq(evp1, evp1) == 1);
-done:
+ done:
crypto_pk_free(pk1);
crypto_pk_free(pk2);
if (evp1)
TORTLS_LEGACY(evp_pkey_eq),
END_OF_TESTCASES
};
+