Skip to content

Commit

Permalink
wip
Browse files Browse the repository at this point in the history
  • Loading branch information
beltram committed Sep 18, 2023
1 parent b6cced3 commit 3cebaff
Show file tree
Hide file tree
Showing 4 changed files with 24 additions and 6 deletions.
4 changes: 3 additions & 1 deletion openmls/src/group/core_group/test_proposals.rs
Original file line number Diff line number Diff line change
Expand Up @@ -195,7 +195,9 @@ async fn proposal_queue_order(ciphersuite: Ciphersuite, backend: &impl OpenMlsCr
let alice_update_key_package = alice_update_key_package_bundle.key_package();
let kpi = KeyPackageIn::from(alice_update_key_package.clone());

assert!(kpi.standalone_validate(backend.crypto(), ProtocolVersion::Mls10).is_ok());
assert!(kpi
.standalone_validate(backend.crypto(), ProtocolVersion::Mls10)
.is_ok());

let group_context = GroupContext::new(
ciphersuite,
Expand Down
12 changes: 10 additions & 2 deletions openmls/src/group/tests/test_external_commit_validation.rs
Original file line number Diff line number Diff line change
Expand Up @@ -194,7 +194,11 @@ async fn test_valsem242(ciphersuite: Ciphersuite, backend: &impl OpenMlsCryptoPr
.await;

alice_group
.add_members(backend, &alice_credential.signer, vec![bob_key_package.clone().into()])
.add_members(
backend,
&alice_credential.signer,
vec![bob_key_package.clone().into()],
)
.await
.unwrap();
alice_group.merge_pending_commit(backend).await.unwrap();
Expand Down Expand Up @@ -349,7 +353,11 @@ async fn test_valsem243(ciphersuite: Ciphersuite, backend: &impl OpenMlsCryptoPr
.await;

alice_group
.add_members(backend, &alice_credential.signer, vec![bob_key_package.clone().into()])
.add_members(
backend,
&alice_credential.signer,
vec![bob_key_package.clone().into()],
)
.await
.unwrap();

Expand Down
2 changes: 1 addition & 1 deletion openmls/src/group/tests/test_framing.rs
Original file line number Diff line number Diff line change
Expand Up @@ -346,7 +346,7 @@ async fn bad_padding(ciphersuite: Ciphersuite, backend: &impl OpenMlsCryptoProvi
Err(MessageDecryptionError::MalformedContent)
);
} else {
assert!(matches!(verifiable_plaintext_result, Ok(_)))
assert!(verifiable_plaintext_result.is_ok())
}
}
}
12 changes: 10 additions & 2 deletions openmls/tests/book_code.rs
Original file line number Diff line number Diff line change
Expand Up @@ -842,7 +842,11 @@ async fn book_operations(ciphersuite: Ciphersuite, backend: &impl OpenMlsCryptoP
// Create AddProposal and remove it
// ANCHOR: rollback_proposal_by_ref
let (_mls_message_out, proposal_ref) = alice_group
.propose_add_member(backend, &alice_signature_keys, bob_key_package.clone().into())
.propose_add_member(
backend,
&alice_signature_keys,
bob_key_package.clone().into(),
)
.expect("Could not create proposal to add Bob");
alice_group
.remove_pending_proposal(backend.key_store(), &proposal_ref)
Expand All @@ -853,7 +857,11 @@ async fn book_operations(ciphersuite: Ciphersuite, backend: &impl OpenMlsCryptoP
// Create AddProposal and process it
// ANCHOR: propose_add
let (mls_message_out, _proposal_ref) = alice_group
.propose_add_member(backend, &alice_signature_keys, bob_key_package.clone().into())
.propose_add_member(
backend,
&alice_signature_keys,
bob_key_package.clone().into(),
)
.expect("Could not create proposal to add Bob");
// ANCHOR_END: propose_add

Expand Down

0 comments on commit 3cebaff

Please sign in to comment.