Further fixups on the new tests.

I messed up the indentation in one place, and Shane Lontis pointed out
that the comment is slightly out of date now that there are two
codepaths involved.

Change-Id: I1be69f3f9a3835fffc4801b4464b9fb8ecb092cc
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/54745
Auto-Submit: David Benjamin <davidben@google.com>
Reviewed-by: Bob Beck <bbe@google.com>
Commit-Queue: Bob Beck <bbe@google.com>
diff --git a/crypto/x509/x509_test.cc b/crypto/x509/x509_test.cc
index 66ae124..bfd8fa7 100644
--- a/crypto/x509/x509_test.cc
+++ b/crypto/x509/x509_test.cc
@@ -2025,7 +2025,7 @@
       EXPECT_TRUE(X509_verify(cert.get(), pkey.get()));
 
       // Re-encode the certificate. X509 objects contain a cached TBSCertificate
-      // encoding and |i2d_re_X509_tbs| should have dropped that cache.
+      // encoding and re-signing should have dropped that cache.
       bssl::UniquePtr<X509> copy = ReencodeCertificate(cert.get());
       ASSERT_TRUE(copy);
       EXPECT_TRUE(X509_verify(copy.get(), pkey.get()));
@@ -2115,7 +2115,7 @@
       EXPECT_TRUE(X509_CRL_verify(crl.get(), pkey.get()));
 
       // Re-encode the CRL. X509_CRL objects contain a cached TBSCertList
-      // encoding and |i2d_re_X509_tbs| should have dropped that cache.
+      // encoding and re-signing should have dropped that cache.
       bssl::UniquePtr<X509_CRL> copy = ReencodeCRL(crl.get());
       ASSERT_TRUE(copy);
       EXPECT_TRUE(X509_CRL_verify(copy.get(), pkey.get()));
@@ -2189,28 +2189,28 @@
       EXPECT_TRUE(X509_REQ_set_pubkey(csr.get(), pkey.get()));
 
       if (sign_manual) {
-      // Fill in the signature algorithm.
-      ASSERT_TRUE(X509_REQ_set1_signature_algo(csr.get(), algor.get()));
+        // Fill in the signature algorithm.
+        ASSERT_TRUE(X509_REQ_set1_signature_algo(csr.get(), algor.get()));
 
-      // Extract the CertificationRequestInfo.
-      uint8_t *tbs = nullptr;
-      int tbs_len = i2d_re_X509_REQ_tbs(csr.get(), &tbs);
-      bssl::UniquePtr<uint8_t> free_tbs(tbs);
-      ASSERT_GT(tbs_len, 0);
+        // Extract the CertificationRequestInfo.
+        uint8_t *tbs = nullptr;
+        int tbs_len = i2d_re_X509_REQ_tbs(csr.get(), &tbs);
+        bssl::UniquePtr<uint8_t> free_tbs(tbs);
+        ASSERT_GT(tbs_len, 0);
 
-      // Generate a signature externally and fill it in.
-      bssl::ScopedEVP_MD_CTX md_ctx;
-      ASSERT_TRUE(EVP_DigestSignInit(md_ctx.get(), nullptr, kSignatureHash,
-                                     nullptr, pkey.get()));
-      size_t sig_len;
-      ASSERT_TRUE(
-          EVP_DigestSign(md_ctx.get(), nullptr, &sig_len, tbs, tbs_len));
-      std::vector<uint8_t> sig(sig_len);
-      ASSERT_TRUE(
-          EVP_DigestSign(md_ctx.get(), sig.data(), &sig_len, tbs, tbs_len));
-      sig.resize(sig_len);
-      ASSERT_TRUE(
-          X509_REQ_set1_signature_value(csr.get(), sig.data(), sig.size()));
+        // Generate a signature externally and fill it in.
+        bssl::ScopedEVP_MD_CTX md_ctx;
+        ASSERT_TRUE(EVP_DigestSignInit(md_ctx.get(), nullptr, kSignatureHash,
+                                       nullptr, pkey.get()));
+        size_t sig_len;
+        ASSERT_TRUE(
+            EVP_DigestSign(md_ctx.get(), nullptr, &sig_len, tbs, tbs_len));
+        std::vector<uint8_t> sig(sig_len);
+        ASSERT_TRUE(
+            EVP_DigestSign(md_ctx.get(), sig.data(), &sig_len, tbs, tbs_len));
+        sig.resize(sig_len);
+        ASSERT_TRUE(
+            X509_REQ_set1_signature_value(csr.get(), sig.data(), sig.size()));
       } else {
         ASSERT_TRUE(X509_REQ_sign(csr.get(), pkey.get(), EVP_sha384()));
       }
@@ -2219,8 +2219,8 @@
       EXPECT_TRUE(X509_REQ_verify(csr.get(), pkey.get()));
 
       // Re-encode the CSR. X509_REQ objects contain a cached
-      // CertificationRequestInfo encoding and |i2d_re_X509_REQ_tbs| should have
-      // dropped that cache.
+      // CertificationRequestInfo encoding and re-signing should have dropped
+      // that cache.
       bssl::UniquePtr<X509_REQ> copy = ReencodeCSR(csr.get());
       ASSERT_TRUE(copy);
       EXPECT_TRUE(X509_REQ_verify(copy.get(), pkey.get()));