summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRobert Hencke <robert.hencke@gmail.com>2011-05-22 09:23:22 +1000
committerRob Pike <r@golang.org>2011-05-22 09:23:22 +1000
commit6dced6d992b30e50f562a8efec1b99986834b140 (patch)
tree26e7d3928972308f31a53ae43ff2f88152ae6821
parentf4fe688b0983077cffe5baf8f4f62dfe196bffe9 (diff)
downloadgo-git-6dced6d992b30e50f562a8efec1b99986834b140.tar.gz
crypto/x509: fix incorrect prints found by govet
R=golang-dev, r CC=golang-dev https://golang.org/cl/4526073
-rw-r--r--src/pkg/crypto/x509/x509_test.go6
1 files changed, 3 insertions, 3 deletions
diff --git a/src/pkg/crypto/x509/x509_test.go b/src/pkg/crypto/x509/x509_test.go
index 89d60f6a49..fd137a6f5e 100644
--- a/src/pkg/crypto/x509/x509_test.go
+++ b/src/pkg/crypto/x509/x509_test.go
@@ -313,7 +313,7 @@ func TestParseCertificateWithDSASignatureAlgorithm(t *testing.T) {
pemBlock, _ := pem.Decode([]byte(dsaCertPem))
cert, err := ParseCertificate(pemBlock.Bytes)
if err != nil {
- t.Fatal("Failed to parse certificate: %s", err)
+ t.Fatalf("Failed to parse certificate: %s", err)
}
if cert.SignatureAlgorithm != DSAWithSHA1 {
t.Errorf("Parsed signature algorithm was not DSAWithSHA1")
@@ -324,10 +324,10 @@ func TestVerifyCertificateWithDSASignature(t *testing.T) {
pemBlock, _ := pem.Decode([]byte(dsaCertPem))
cert, err := ParseCertificate(pemBlock.Bytes)
if err != nil {
- t.Fatal("Failed to parse certificate: %s", err)
+ t.Fatalf("Failed to parse certificate: %s", err)
}
// test cert is self-signed
if err = cert.CheckSignatureFrom(cert); err != nil {
- t.Fatal("DSA Certificate verfication failed: %s", err)
+ t.Fatalf("DSA Certificate verfication failed: %s", err)
}
}