From 4dba6a6f6863608f853e3d0b34609289dbb4795c Mon Sep 17 00:00:00 2001 From: Miguel Company Date: Thu, 21 Nov 2024 17:13:27 +0100 Subject: [PATCH] Refs #19921. Uncrustify. Signed-off-by: Miguel Company --- .../blackbox/common/BlackboxTestsSecurity.cpp | 4 +- .../authentication/BuiltinPKIDHTests.cpp | 68 +++++++++---------- 2 files changed, 36 insertions(+), 36 deletions(-) diff --git a/test/blackbox/common/BlackboxTestsSecurity.cpp b/test/blackbox/common/BlackboxTestsSecurity.cpp index 120e12e6d87..064dde4d360 100644 --- a/test/blackbox/common/BlackboxTestsSecurity.cpp +++ b/test/blackbox/common/BlackboxTestsSecurity.cpp @@ -3018,7 +3018,7 @@ TEST_P(Security, RemoveParticipantProxyDataonSecurityManagerLeaseExpired_validat //!Lambda for configuring publisher participant qos and security properties auto secure_participant_pub_configurator = [this, &governance_file, &permissions_file](const std::shared_ptr>& part, - const std::shared_ptr& transport_interface) + const std::shared_ptr& transport_interface) { part->lease_duration(3, 1); part->disable_builtin_transport().add_user_transport_to_pparams(transport_interface); @@ -3048,7 +3048,7 @@ TEST_P(Security, RemoveParticipantProxyDataonSecurityManagerLeaseExpired_validat //!Lambda for configuring subscriber participant qos and security properties auto secure_participant_sub_configurator = [this, &governance_file, &permissions_file](const std::shared_ptr>& part, - const std::shared_ptr& transport_interface) + const std::shared_ptr& transport_interface) { part->lease_duration(3, 1); part->disable_builtin_transport().add_user_transport_to_pparams(transport_interface); diff --git a/test/unittest/security/authentication/BuiltinPKIDHTests.cpp b/test/unittest/security/authentication/BuiltinPKIDHTests.cpp index 62ad5888026..8e83480ade7 100644 --- a/test/unittest/security/authentication/BuiltinPKIDHTests.cpp +++ b/test/unittest/security/authentication/BuiltinPKIDHTests.cpp @@ -425,40 +425,40 @@ TEST_F(AuthenticationPluginTest, validate_local_identity_kagree_algo) auto test_fn = [this]( const std::string& alg, ValidationResult_t expected_result) -> void - { - IdentityHandle* local_identity_handle = nullptr; - GUID_t adjusted_participant_key; - uint32_t domain_id = 0; - RTPSParticipantAttributes participant_attr; - GUID_t candidate_participant_key; - SecurityException exception; - ValidationResult_t result = ValidationResult_t::VALIDATION_FAILED; - - fill_candidate_participant_key(candidate_participant_key); - participant_attr.properties = get_valid_policy(); - participant_attr.properties.properties().emplace_back( - Property("dds.sec.auth.builtin.PKI-DH.preferred_key_agreement", alg)); - result = plugin.validate_local_identity(&local_identity_handle, - adjusted_participant_key, - domain_id, - participant_attr, - candidate_participant_key, - exception); - - ASSERT_TRUE(result == expected_result); - if (ValidationResult_t::VALIDATION_OK == result) - { - ASSERT_TRUE(local_identity_handle != nullptr); - check_local_identity_handle(*local_identity_handle); - ASSERT_TRUE(adjusted_participant_key != GUID_t::unknown()); - ASSERT_TRUE(plugin.return_identity_handle(local_identity_handle, exception)); - } - else - { - ASSERT_TRUE(local_identity_handle == nullptr); - ASSERT_TRUE(adjusted_participant_key == GUID_t::unknown()); - } - }; + { + IdentityHandle* local_identity_handle = nullptr; + GUID_t adjusted_participant_key; + uint32_t domain_id = 0; + RTPSParticipantAttributes participant_attr; + GUID_t candidate_participant_key; + SecurityException exception; + ValidationResult_t result = ValidationResult_t::VALIDATION_FAILED; + + fill_candidate_participant_key(candidate_participant_key); + participant_attr.properties = get_valid_policy(); + participant_attr.properties.properties().emplace_back( + Property("dds.sec.auth.builtin.PKI-DH.preferred_key_agreement", alg)); + result = plugin.validate_local_identity(&local_identity_handle, + adjusted_participant_key, + domain_id, + participant_attr, + candidate_participant_key, + exception); + + ASSERT_TRUE(result == expected_result); + if (ValidationResult_t::VALIDATION_OK == result) + { + ASSERT_TRUE(local_identity_handle != nullptr); + check_local_identity_handle(*local_identity_handle); + ASSERT_TRUE(adjusted_participant_key != GUID_t::unknown()); + ASSERT_TRUE(plugin.return_identity_handle(local_identity_handle, exception)); + } + else + { + ASSERT_TRUE(local_identity_handle == nullptr); + ASSERT_TRUE(adjusted_participant_key == GUID_t::unknown()); + } + }; }