Skip to content

Commit 14fd570

Browse files
authored
Remove Redundant Slice Syntax (#192)
* Fix:remove double slice headering * fix:revert fmt package changes
1 parent 3bd2326 commit 14fd570

File tree

2 files changed

+6
-6
lines changed

2 files changed

+6
-6
lines changed

aes_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -526,7 +526,7 @@ func BenchmarkAESGCM_Open(b *testing.B) {
526526
aesgcm, _ := cipher.NewGCM(c)
527527
var out []byte
528528

529-
ct := aesgcm.Seal(nil, nonce[:], buf[:], ad[:])
529+
ct := aesgcm.Seal(nil, nonce[:], buf, ad[:])
530530

531531
b.ResetTimer()
532532
for i := 0; i < b.N; i++ {

dsa_test.go

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ func testGenerateDSAParameters(t *testing.T, L, N int) {
8080

8181
func testDSASignAndVerify(t *testing.T, priv *openssl.PrivateKeyDSA) {
8282
hashed := []byte("testing")
83-
sig, err := openssl.SignDSA(priv, hashed[:])
83+
sig, err := openssl.SignDSA(priv, hashed)
8484
if err != nil {
8585
t.Errorf("error signing: %s", err)
8686
return
@@ -90,7 +90,7 @@ func testDSASignAndVerify(t *testing.T, priv *openssl.PrivateKeyDSA) {
9090
t.Errorf("error getting public key: %s", err)
9191
return
9292
}
93-
if !openssl.VerifyDSA(pub, hashed[:], sig) {
93+
if !openssl.VerifyDSA(pub, hashed, sig) {
9494
t.Error("error verifying")
9595
return
9696
}
@@ -112,10 +112,10 @@ func testDSASignAndVerify(t *testing.T, priv *openssl.PrivateKeyDSA) {
112112
t.Error(err)
113113
return
114114
}
115-
if !dsa.Verify(&priv1.PublicKey, hashed[:], esig.R, esig.S) {
115+
if !dsa.Verify(&priv1.PublicKey, hashed, esig.R, esig.S) {
116116
t.Error("compat: crypto/dsa can't verify OpenSSL signature")
117117
}
118-
r1, s1, err := dsa.Sign(openssl.RandReader, &priv1, hashed[:])
118+
r1, s1, err := dsa.Sign(openssl.RandReader, &priv1, hashed)
119119
if err != nil {
120120
t.Errorf("error signing: %s", err)
121121
return
@@ -125,7 +125,7 @@ func testDSASignAndVerify(t *testing.T, priv *openssl.PrivateKeyDSA) {
125125
t.Error(err)
126126
return
127127
}
128-
if !openssl.VerifyDSA(pub, hashed[:], sig) {
128+
if !openssl.VerifyDSA(pub, hashed, sig) {
129129
t.Error("compat: OpenSSL can't verify crypto/dsa signature")
130130
return
131131
}

0 commit comments

Comments
 (0)