aboutsummaryrefslogtreecommitdiffstats
path: root/librecrypt_decode.c
diff options
context:
space:
mode:
authorMattias Andrée <m@maandree.se>2026-05-14 19:46:14 +0200
committerMattias Andrée <m@maandree.se>2026-05-14 19:46:14 +0200
commit5660c556a06916c2f1e004f7f8d5e368b3a88e25 (patch)
tree562217dbfa5f33ee7a73f6bdfc3b67dc9245b4d9 /librecrypt_decode.c
parentFix test bug only found with musl+clang (diff)
downloadlibrecrypt-5660c556a06916c2f1e004f7f8d5e368b3a88e25.tar.gz
librecrypt-5660c556a06916c2f1e004f7f8d5e368b3a88e25.tar.bz2
librecrypt-5660c556a06916c2f1e004f7f8d5e368b3a88e25.tar.xz
Clean up
Signed-off-by: Mattias Andrée <m@maandree.se>
Diffstat (limited to '')
-rw-r--r--librecrypt_decode.c12
1 files changed, 6 insertions, 6 deletions
diff --git a/librecrypt_decode.c b/librecrypt_decode.c
index c7f397b..3981612 100644
--- a/librecrypt_decode.c
+++ b/librecrypt_decode.c
@@ -186,21 +186,21 @@ check(const char *binary, size_t binary_len, const char *ascii, size_t unpadded_
for (i = 0u; i < sizeof(buf); i++) {
memset(buf, 99, sizeof(buf));
EXPECT(librecrypt_decode(buf, i, ascii, unpadded_len, lut, '\0', 0) == (ssize_t)binary_len);
- j = i < binary_len ? i : binary_len;
+ j = MIN(i, binary_len);
EXPECT(!memcmp(buf, binary, j));
for (; j < sizeof(buf); j++)
EXPECT(buf[j] == 99);
memset(buf, 99, sizeof(buf));
EXPECT(librecrypt_decode(buf, i, ascii, unpadded_len, lut, '\0', 1) == (ssize_t)binary_len);
- j = i < binary_len ? i : binary_len;
+ j = MIN(i, binary_len);
EXPECT(!memcmp(buf, binary, j));
for (; j < sizeof(buf); j++)
EXPECT(buf[j] == 99);
memset(buf, 99, sizeof(buf));
EXPECT(librecrypt_decode(buf, i, ascii, unpadded_len, lut, '=', 0) == (ssize_t)binary_len);
- j = i < binary_len ? i : binary_len;
+ j = MIN(i, binary_len);
EXPECT(!memcmp(buf, binary, j));
for (; j < sizeof(buf); j++)
EXPECT(buf[j] == 99);
@@ -208,7 +208,7 @@ check(const char *binary, size_t binary_len, const char *ascii, size_t unpadded_
if (padded_len == unpadded_len) {
memset(buf, 99, sizeof(buf));
EXPECT(librecrypt_decode(buf, i, ascii, unpadded_len, lut, '=', 1) == (ssize_t)binary_len);
- j = i < binary_len ? i : binary_len;
+ j = MIN(i, binary_len);
EXPECT(!memcmp(buf, binary, j));
for (; j < sizeof(buf); j++)
EXPECT(buf[j] == 99);
@@ -228,7 +228,7 @@ check(const char *binary, size_t binary_len, const char *ascii, size_t unpadded_
memset(buf, 99, sizeof(buf));
EXPECT(librecrypt_decode(buf, i, ascii, padded_len, lut, '=', 0) == (ssize_t)binary_len);
- j = i < binary_len ? i : binary_len;
+ j = MIN(i, binary_len);
EXPECT(!memcmp(buf, binary, j));
for (; j < sizeof(buf); j++)
EXPECT(buf[j] == 99);
@@ -236,7 +236,7 @@ check(const char *binary, size_t binary_len, const char *ascii, size_t unpadded_
if (check_good_padding) {
memset(buf, 99, sizeof(buf));
EXPECT(librecrypt_decode(buf, i, ascii, padded_len, lut, '=', 1) == (ssize_t)binary_len);
- j = i < binary_len ? i : binary_len;
+ j = MIN(i, binary_len);
EXPECT(!memcmp(buf, binary, j));
for (; j < sizeof(buf); j++)
EXPECT(buf[j] == 99);