Bug 1577803, clang-format, a=bustage
authorDaiki Ueno <dueno@redhat.com>
Wed, 06 Nov 2019 11:38:56 +0100
changeset 15378 c9014b2892d5d2d17874f269a56c592dc7007517
parent 15377 b39c8eeabe6a7b51cafbff1b1730ceec5aefbbc2
child 15379 a2bebaad41dd7b8e543c2ba8df1f9b83ab01876c
push id3571
push userdueno@redhat.com
push dateWed, 06 Nov 2019 10:39:33 +0000
reviewersbustage
bugs1577803
Bug 1577803, clang-format, a=bustage
gtests/pk11_gtest/pk11_module_unittest.cc
--- a/gtests/pk11_gtest/pk11_module_unittest.cc
+++ b/gtests/pk11_gtest/pk11_module_unittest.cc
@@ -47,18 +47,17 @@ TEST_F(Pkcs11ModuleTest, ListSlots) {
 
   PK11SlotListElement* element = PK11_GetFirstSafe(slots.get());
   EXPECT_NE(nullptr, element);
 
   // These tokens are always present.
   const std::vector<std::string> kSlotsWithToken = {
       "NSS Internal Cryptographic Services",
       "NSS User Private Key and Certificate Services",
-      "Test PKCS11 Public Certs Slot",
-      "Test PKCS11 Slot 二"};
+      "Test PKCS11 Public Certs Slot", "Test PKCS11 Slot 二"};
   std::vector<std::string> foundSlots;
 
   do {
     std::string name = PK11_GetSlotName(element->slot);
     foundSlots.push_back(name);
     std::cerr << "loaded slot: " << name << std::endl;
   } while ((element = PK11_GetNextSafe(slots.get(), element, PR_FALSE)) !=
            nullptr);
@@ -71,14 +70,15 @@ TEST_F(Pkcs11ModuleTest, ListSlots) {
 TEST_F(Pkcs11ModuleTest, PublicCertificatesToken) {
   const std::string kRegularToken = "Test PKCS11 Tokeñ 2 Label";
   const std::string kPublicCertificatesToken = "Test PKCS11 Public Certs Token";
 
   ScopedPK11SlotInfo slot1(PK11_FindSlotByName(kRegularToken.c_str()));
   EXPECT_NE(nullptr, slot1);
   EXPECT_FALSE(PK11_IsFriendly(slot1.get()));
 
-  ScopedPK11SlotInfo slot2(PK11_FindSlotByName(kPublicCertificatesToken.c_str()));
+  ScopedPK11SlotInfo slot2(
+      PK11_FindSlotByName(kPublicCertificatesToken.c_str()));
   EXPECT_NE(nullptr, slot2);
   EXPECT_TRUE(PK11_IsFriendly(slot2.get()));
 }
 
 }  // namespace nss_test