diff options
author | Martin Thomson <martin.thomson@gmail.com> | 2019-02-23 11:11:57 -0800 |
---|---|---|
committer | Martin Thomson <martin.thomson@gmail.com> | 2019-02-23 11:11:57 -0800 |
commit | 3be384fbb27c8e479b8589f9808f3b8769215990 (patch) | |
tree | 95baf9bb049e6c4487acd3693b610f73d63ed46c | |
parent | 6923b295ab1f525deabcb34e4429a443ab37ff02 (diff) | |
download | nss-hg-3be384fbb27c8e479b8589f9808f3b8769215990.tar.gz |
Bug 1529813 - clang-format, a=bustage
-rw-r--r-- | gtests/ssl_gtest/tls_hkdf_unittest.cc | 26 |
1 files changed, 12 insertions, 14 deletions
diff --git a/gtests/ssl_gtest/tls_hkdf_unittest.cc b/gtests/ssl_gtest/tls_hkdf_unittest.cc index 01f58db65..ef54c0bf2 100644 --- a/gtests/ssl_gtest/tls_hkdf_unittest.cc +++ b/gtests/ssl_gtest/tls_hkdf_unittest.cc @@ -321,29 +321,27 @@ TEST_P(TlsHkdfTest, BadExtractWrapperInput) { PK11SymKey* key = nullptr; // Bad version. - EXPECT_EQ(SECFailure, SSL_HkdfExtract(SSL_LIBRARY_VERSION_TLS_1_2, - TLS_AES_128_GCM_SHA256, k1_.get(), - k2_.get(), &key)); + EXPECT_EQ(SECFailure, + SSL_HkdfExtract(SSL_LIBRARY_VERSION_TLS_1_2, TLS_AES_128_GCM_SHA256, + k1_.get(), k2_.get(), &key)); EXPECT_EQ(SEC_ERROR_INVALID_ARGS, PORT_GetError()); // Bad ciphersuite. - EXPECT_EQ(SECFailure, SSL_HkdfExtract(SSL_LIBRARY_VERSION_TLS_1_3, - TLS_RSA_WITH_NULL_SHA, k1_.get(), - k2_.get(), &key)); + EXPECT_EQ(SECFailure, + SSL_HkdfExtract(SSL_LIBRARY_VERSION_TLS_1_3, TLS_RSA_WITH_NULL_SHA, + k1_.get(), k2_.get(), &key)); EXPECT_EQ(SEC_ERROR_INVALID_ARGS, PORT_GetError()); // Old ciphersuite. - EXPECT_EQ(SECFailure, - SSL_HkdfExtract(SSL_LIBRARY_VERSION_TLS_1_3, - TLS_RSA_WITH_AES_128_CBC_SHA, k1_.get(), - k2_.get(), &key)); + EXPECT_EQ(SECFailure, SSL_HkdfExtract(SSL_LIBRARY_VERSION_TLS_1_3, + TLS_RSA_WITH_AES_128_CBC_SHA, k1_.get(), + k2_.get(), &key)); EXPECT_EQ(SEC_ERROR_INVALID_ARGS, PORT_GetError()); // NULL outparam.. - EXPECT_EQ(SECFailure, - SSL_HkdfExtract(SSL_LIBRARY_VERSION_TLS_1_3, - TLS_RSA_WITH_AES_128_CBC_SHA, k1_.get(), - k2_.get(), nullptr)); + EXPECT_EQ(SECFailure, SSL_HkdfExtract(SSL_LIBRARY_VERSION_TLS_1_3, + TLS_RSA_WITH_AES_128_CBC_SHA, k1_.get(), + k2_.get(), nullptr)); EXPECT_EQ(SEC_ERROR_INVALID_ARGS, PORT_GetError()); EXPECT_EQ(nullptr, key); |