]> Cypherpunks repositories - gostls13.git/commitdiff
crypto/x509: fix incorrect prints found by govet
authorRobert Hencke <robert.hencke@gmail.com>
Sat, 21 May 2011 23:23:22 +0000 (09:23 +1000)
committerRob Pike <r@golang.org>
Sat, 21 May 2011 23:23:22 +0000 (09:23 +1000)
R=golang-dev, r
CC=golang-dev
https://golang.org/cl/4526073

src/pkg/crypto/x509/x509_test.go

index 89d60f6a490fbe5a6825a725978ff6b7fb0b2040..fd137a6f5e9dcefa01ce9d2c379d01f0228ddb77 100644 (file)
@@ -313,7 +313,7 @@ func TestParseCertificateWithDSASignatureAlgorithm(t *testing.T) {
        pemBlock, _ := pem.Decode([]byte(dsaCertPem))
        cert, err := ParseCertificate(pemBlock.Bytes)
        if err != nil {
-               t.Fatal("Failed to parse certificate: %s", err)
+               t.Fatalf("Failed to parse certificate: %s", err)
        }
        if cert.SignatureAlgorithm != DSAWithSHA1 {
                t.Errorf("Parsed signature algorithm was not DSAWithSHA1")
@@ -324,10 +324,10 @@ func TestVerifyCertificateWithDSASignature(t *testing.T) {
        pemBlock, _ := pem.Decode([]byte(dsaCertPem))
        cert, err := ParseCertificate(pemBlock.Bytes)
        if err != nil {
-               t.Fatal("Failed to parse certificate: %s", err)
+               t.Fatalf("Failed to parse certificate: %s", err)
        }
        // test cert is self-signed
        if err = cert.CheckSignatureFrom(cert); err != nil {
-               t.Fatal("DSA Certificate verfication failed: %s", err)
+               t.Fatalf("DSA Certificate verfication failed: %s", err)
        }
 }