diff options
author | Simon Warta <[email protected]> | 2015-06-30 18:28:17 +0200 |
---|---|---|
committer | Simon Warta <[email protected]> | 2015-06-30 18:28:17 +0200 |
commit | d4cdf69dd24d5eb56af5fa445a34f1ebdfd8489b (patch) | |
tree | 550d7ac3045bcf41e46f9ac9954874ee1a067d25 /src | |
parent | 6f2799cbf5dacc5139bd527c8afa281ca6a3bc39 (diff) |
Replace method to_hex() by Botan::hex_encode() in test
Diffstat (limited to 'src')
-rw-r--r-- | src/tests/unit_ecdsa.cpp | 11 |
1 files changed, 3 insertions, 8 deletions
diff --git a/src/tests/unit_ecdsa.cpp b/src/tests/unit_ecdsa.cpp index 4d4c83ce3..432fc22bd 100644 --- a/src/tests/unit_ecdsa.cpp +++ b/src/tests/unit_ecdsa.cpp @@ -34,11 +34,6 @@ using namespace Botan; namespace { -std::string to_hex(const std::vector<byte>& bin) - { - return hex_encode(bin.data(), bin.size()); - } - /** * Tests whether the the signing routine will work correctly in case @@ -107,9 +102,9 @@ size_t test_decode_ecdsa_X509() CHECK_MESSAGE(OIDS::lookup(cert.signature_algorithm().oid) == "ECDSA/EMSA1(SHA-224)", "error reading signature algorithm from x509 ecdsa certificate"); - CHECK_MESSAGE(to_hex(cert.serial_number()) == "01", "error reading serial from x509 ecdsa certificate"); - CHECK_MESSAGE(to_hex(cert.authority_key_id()) == "0096452DE588F966C4CCDF161DD1F3F5341B71E7", "error reading authority key id from x509 ecdsa certificate"); - CHECK_MESSAGE(to_hex(cert.subject_key_id()) == "0096452DE588F966C4CCDF161DD1F3F5341B71E7", "error reading Subject key id from x509 ecdsa certificate"); + CHECK_MESSAGE(hex_encode(cert.serial_number()) == "01", "error reading serial from x509 ecdsa certificate"); + CHECK_MESSAGE(hex_encode(cert.authority_key_id()) == "0096452DE588F966C4CCDF161DD1F3F5341B71E7", "error reading authority key id from x509 ecdsa certificate"); + CHECK_MESSAGE(hex_encode(cert.subject_key_id()) == "0096452DE588F966C4CCDF161DD1F3F5341B71E7", "error reading Subject key id from x509 ecdsa certificate"); std::unique_ptr<X509_PublicKey> pubkey(cert.subject_public_key()); bool ver_ec = cert.check_signature(*pubkey); |