summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMartin Thomson <martin.thomson@gmail.com>2019-02-23 11:11:57 -0800
committerMartin Thomson <martin.thomson@gmail.com>2019-02-23 11:11:57 -0800
commit3be384fbb27c8e479b8589f9808f3b8769215990 (patch)
tree95baf9bb049e6c4487acd3693b610f73d63ed46c
parent6923b295ab1f525deabcb34e4429a443ab37ff02 (diff)
downloadnss-hg-3be384fbb27c8e479b8589f9808f3b8769215990.tar.gz
Bug 1529813 - clang-format, a=bustage
-rw-r--r--gtests/ssl_gtest/tls_hkdf_unittest.cc26
1 files changed, 12 insertions, 14 deletions
diff --git a/gtests/ssl_gtest/tls_hkdf_unittest.cc b/gtests/ssl_gtest/tls_hkdf_unittest.cc
index 01f58db65..ef54c0bf2 100644
--- a/gtests/ssl_gtest/tls_hkdf_unittest.cc
+++ b/gtests/ssl_gtest/tls_hkdf_unittest.cc
@@ -321,29 +321,27 @@ TEST_P(TlsHkdfTest, BadExtractWrapperInput) {
PK11SymKey* key = nullptr;
// Bad version.
- EXPECT_EQ(SECFailure, SSL_HkdfExtract(SSL_LIBRARY_VERSION_TLS_1_2,
- TLS_AES_128_GCM_SHA256, k1_.get(),
- k2_.get(), &key));
+ EXPECT_EQ(SECFailure,
+ SSL_HkdfExtract(SSL_LIBRARY_VERSION_TLS_1_2, TLS_AES_128_GCM_SHA256,
+ k1_.get(), k2_.get(), &key));
EXPECT_EQ(SEC_ERROR_INVALID_ARGS, PORT_GetError());
// Bad ciphersuite.
- EXPECT_EQ(SECFailure, SSL_HkdfExtract(SSL_LIBRARY_VERSION_TLS_1_3,
- TLS_RSA_WITH_NULL_SHA, k1_.get(),
- k2_.get(), &key));
+ EXPECT_EQ(SECFailure,
+ SSL_HkdfExtract(SSL_LIBRARY_VERSION_TLS_1_3, TLS_RSA_WITH_NULL_SHA,
+ k1_.get(), k2_.get(), &key));
EXPECT_EQ(SEC_ERROR_INVALID_ARGS, PORT_GetError());
// Old ciphersuite.
- EXPECT_EQ(SECFailure,
- SSL_HkdfExtract(SSL_LIBRARY_VERSION_TLS_1_3,
- TLS_RSA_WITH_AES_128_CBC_SHA, k1_.get(),
- k2_.get(), &key));
+ EXPECT_EQ(SECFailure, SSL_HkdfExtract(SSL_LIBRARY_VERSION_TLS_1_3,
+ TLS_RSA_WITH_AES_128_CBC_SHA, k1_.get(),
+ k2_.get(), &key));
EXPECT_EQ(SEC_ERROR_INVALID_ARGS, PORT_GetError());
// NULL outparam..
- EXPECT_EQ(SECFailure,
- SSL_HkdfExtract(SSL_LIBRARY_VERSION_TLS_1_3,
- TLS_RSA_WITH_AES_128_CBC_SHA, k1_.get(),
- k2_.get(), nullptr));
+ EXPECT_EQ(SECFailure, SSL_HkdfExtract(SSL_LIBRARY_VERSION_TLS_1_3,
+ TLS_RSA_WITH_AES_128_CBC_SHA, k1_.get(),
+ k2_.get(), nullptr));
EXPECT_EQ(SEC_ERROR_INVALID_ARGS, PORT_GetError());
EXPECT_EQ(nullptr, key);