summaryrefslogtreecommitdiff
path: root/python
diff options
context:
space:
mode:
authorGary Lockyer <gary@catalyst.net.nz>2017-04-12 09:09:27 +1200
committerAndrew Bartlett <abartlet@samba.org>2017-05-25 02:25:12 +0200
commitadae071daad3f3508c389fe2933e5c7f98a45be6 (patch)
tree9f49f248a02063afec4355fe9b7652c29e751514 /python
parent601dbca8f9617c5632601f8a8fb26ba4426f0fca (diff)
downloadsamba-adae071daad3f3508c389fe2933e5c7f98a45be6.tar.gz
tests password_hash: fix white space issues
Clean up white space issues in password_hash.py Signed-off-by: Gary Lockyer <gary@catalyst.net.nz> Reviewed-by: Garming Sam <garming@catalyst.net.nz> Reviewed-by: Andrew Bartlett <abartlet@samba.org>
Diffstat (limited to 'python')
-rw-r--r--python/samba/tests/password_hash.py8
1 files changed, 4 insertions, 4 deletions
diff --git a/python/samba/tests/password_hash.py b/python/samba/tests/password_hash.py
index b50242e998a..de110cfcb07 100644
--- a/python/samba/tests/password_hash.py
+++ b/python/samba/tests/password_hash.py
@@ -36,7 +36,7 @@ import md5
USER_NAME = "PasswordHashTestUser"
-USER_PASS = samba.generate_random_password(32,32)
+USER_PASS = samba.generate_random_password(32, 32)
UPN = "PWHash@User.Principle"
# Get named package from the passed supplemental credentials
@@ -73,7 +73,7 @@ class PassWordHashTests(TestCase):
self.lp = samba.tests.env_loadparm()
# set any needed options
if options is not None:
- for (option,value) in options:
+ for (option, value) in options:
self.lp.set(option, value)
self.creds = Credentials()
@@ -139,7 +139,7 @@ class PassWordHashTests(TestCase):
res = self.ldb.search(scope=ldb.SCOPE_BASE,
base=base,
attrs=["supplementalCredentials"])
- self.assertIs( True, len(res) > 0)
+ self.assertIs(True, len(res) > 0)
obj = res[0]
sc_blob = obj["supplementalCredentials"][0]
sc = ndr_unpack(drsblobs.supplementalCredentialsBlob, sc_blob)
@@ -147,7 +147,7 @@ class PassWordHashTests(TestCase):
# Calculate and validate a Wdigest value
def check_digest(self, user, realm, password, digest):
- expected = calc_digest( user, realm, password)
+ expected = calc_digest(user, realm, password)
actual = binascii.hexlify(bytearray(digest))
error = "Digest expected[%s], actual[%s], " \
"user[%s], realm[%s], pass[%s]" % \