changeset 25168:68f0093134b1 v8.2.3120

patch 8.2.3120: crypt with sodium test fails on MS-Windows Commit: https://github.com/vim/vim/commit/db8647277082a8a69a189ded8bd1408af993b54e Author: Bram Moolenaar <Bram@vim.org> Date: Thu Jul 8 11:37:50 2021 +0200 patch 8.2.3120: crypt with sodium test fails on MS-Windows Problem: Crypt with sodium test fails on MS-Windows. Solution: Make the tests pass. (closes https://github.com/vim/vim/issues/8428)
author Bram Moolenaar <Bram@vim.org>
date Thu, 08 Jul 2021 11:45:04 +0200
parents 92b0acab7286
children 0a239b6dde5e
files src/testdir/test_crypt.vim src/version.c
diffstat 2 files changed, 7 insertions(+), 2 deletions(-) [+]
line wrap: on
line diff
--- a/src/testdir/test_crypt.vim
+++ b/src/testdir/test_crypt.vim
@@ -124,6 +124,7 @@ endfunc
 
 func Test_uncrypt_xchacha20_invalid()
   CheckFeature sodium
+
   " load an invalid encrypted file and verify it can be decrypted with an
   " error message
   try
@@ -142,6 +143,7 @@ endfunc
 
 func Test_uncrypt_xchacha20_2()
   CheckFeature sodium
+
   sp Xcrypt_sodium.txt
   " Create a larger file, so that Vim will write in several blocks
   call setline(1, range(1,4000))
@@ -159,7 +161,7 @@ func Test_uncrypt_xchacha20_2()
   " successfully decrypted
   call assert_equal(range(1, 4000)->map( {_, v -> string(v)}), getline(1,'$'))
   set key=
-  w!
+  w! ++ff=unix
   " enryption removed
   call assert_match('"Xcrypt_sodium.txt" 4000L, 18893B written', execute(':message'))
   bw!
@@ -170,6 +172,7 @@ endfunc
 func Test_uncrypt_xchacha20_3_persistent_undo()
   CheckFeature sodium
   CheckFeature persistent_undo
+
   sp Xcrypt_sodium_undo.txt
   set cryptmethod=xchacha20 undofile
   call feedkeys(":X\<CR>sodium\<CR>sodium\<CR>", 'xt')
@@ -191,7 +194,7 @@ func Test_uncrypt_xchacha20_3_persistent
   " should fail
   norm! u
   call assert_match('Already at oldest change', execute(':1mess'))
-  call assert_fails('verbose rundo' .. fnameescape(ufile), 'E822')
+  call assert_fails('verbose rundo ' .. fnameescape(ufile), 'E822')
   bw!
   set undolevels& cryptmethod& undofile&
   call delete('Xcrypt_sodium_undo.txt')
--- a/src/version.c
+++ b/src/version.c
@@ -756,6 +756,8 @@ static char *(features[]) =
 static int included_patches[] =
 {   /* Add new patch number below this line */
 /**/
+    3120,
+/**/
     3119,
 /**/
     3118,