diff options
author | ng0 <ng0@n0.is> | 2019-09-06 22:46:29 +0000 |
---|---|---|
committer | ng0 <ng0@n0.is> | 2019-09-06 22:46:29 +0000 |
commit | 6e599264ad13e8fc105493d74d7c11d46f8739ed (patch) | |
tree | 169bef1ecbade5a659831fb169f3ae6943af127f /src/util/test_crypto_eddsa.c | |
parent | 4f13bc15113021ebf71d5d81e99bc29f8a07fc9c (diff) | |
download | gnunet-6e599264ad13e8fc105493d74d7c11d46f8739ed.tar.gz gnunet-6e599264ad13e8fc105493d74d7c11d46f8739ed.zip |
first step to remove plibc
Diffstat (limited to 'src/util/test_crypto_eddsa.c')
-rw-r--r-- | src/util/test_crypto_eddsa.c | 20 |
1 files changed, 10 insertions, 10 deletions
diff --git a/src/util/test_crypto_eddsa.c b/src/util/test_crypto_eddsa.c index e738f7e6c..acb5fbdf5 100644 --- a/src/util/test_crypto_eddsa.c +++ b/src/util/test_crypto_eddsa.c | |||
@@ -48,7 +48,7 @@ testSignVerify () | |||
48 | struct GNUNET_TIME_Absolute start; | 48 | struct GNUNET_TIME_Absolute start; |
49 | int ok = GNUNET_OK; | 49 | int ok = GNUNET_OK; |
50 | 50 | ||
51 | FPRINTF (stderr, "%s", "W"); | 51 | fprintf (stderr, "%s", "W"); |
52 | GNUNET_CRYPTO_eddsa_key_get_public (key, &pkey); | 52 | GNUNET_CRYPTO_eddsa_key_get_public (key, &pkey); |
53 | start = GNUNET_TIME_absolute_get (); | 53 | start = GNUNET_TIME_absolute_get (); |
54 | purp.size = htonl (sizeof (struct GNUNET_CRYPTO_EccSignaturePurpose)); | 54 | purp.size = htonl (sizeof (struct GNUNET_CRYPTO_EccSignaturePurpose)); |
@@ -56,10 +56,10 @@ testSignVerify () | |||
56 | 56 | ||
57 | for (i = 0; i < ITER; i++) | 57 | for (i = 0; i < ITER; i++) |
58 | { | 58 | { |
59 | FPRINTF (stderr, "%s", "."); fflush (stderr); | 59 | fprintf (stderr, "%s", "."); fflush (stderr); |
60 | if (GNUNET_SYSERR == GNUNET_CRYPTO_eddsa_sign (key, &purp, &sig)) | 60 | if (GNUNET_SYSERR == GNUNET_CRYPTO_eddsa_sign (key, &purp, &sig)) |
61 | { | 61 | { |
62 | FPRINTF (stderr, "%s", "GNUNET_CRYPTO_eddsa_sign returned SYSERR\n"); | 62 | fprintf (stderr, "%s", "GNUNET_CRYPTO_eddsa_sign returned SYSERR\n"); |
63 | ok = GNUNET_SYSERR; | 63 | ok = GNUNET_SYSERR; |
64 | continue; | 64 | continue; |
65 | } | 65 | } |
@@ -99,15 +99,15 @@ testSignPerformance () | |||
99 | 99 | ||
100 | purp.size = htonl (sizeof (struct GNUNET_CRYPTO_EccSignaturePurpose)); | 100 | purp.size = htonl (sizeof (struct GNUNET_CRYPTO_EccSignaturePurpose)); |
101 | purp.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_TEST); | 101 | purp.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_TEST); |
102 | FPRINTF (stderr, "%s", "W"); | 102 | fprintf (stderr, "%s", "W"); |
103 | GNUNET_CRYPTO_eddsa_key_get_public (key, &pkey); | 103 | GNUNET_CRYPTO_eddsa_key_get_public (key, &pkey); |
104 | start = GNUNET_TIME_absolute_get (); | 104 | start = GNUNET_TIME_absolute_get (); |
105 | for (i = 0; i < ITER; i++) | 105 | for (i = 0; i < ITER; i++) |
106 | { | 106 | { |
107 | FPRINTF (stderr, "%s", "."); fflush (stderr); | 107 | fprintf (stderr, "%s", "."); fflush (stderr); |
108 | if (GNUNET_SYSERR == GNUNET_CRYPTO_eddsa_sign (key, &purp, &sig)) | 108 | if (GNUNET_SYSERR == GNUNET_CRYPTO_eddsa_sign (key, &purp, &sig)) |
109 | { | 109 | { |
110 | FPRINTF (stderr, "%s", "GNUNET_CRYPTO_eddsa_sign returned SYSERR\n"); | 110 | fprintf (stderr, "%s", "GNUNET_CRYPTO_eddsa_sign returned SYSERR\n"); |
111 | ok = GNUNET_SYSERR; | 111 | ok = GNUNET_SYSERR; |
112 | continue; | 112 | continue; |
113 | } | 113 | } |
@@ -135,7 +135,7 @@ testCreateFromFile () | |||
135 | GNUNET_CRYPTO_eddsa_key_get_public (key, &p2); | 135 | GNUNET_CRYPTO_eddsa_key_get_public (key, &p2); |
136 | GNUNET_assert (0 == memcmp (&p1, &p2, sizeof (p1))); | 136 | GNUNET_assert (0 == memcmp (&p1, &p2, sizeof (p1))); |
137 | GNUNET_free (key); | 137 | GNUNET_free (key); |
138 | GNUNET_assert (0 == UNLINK (KEYFILE)); | 138 | GNUNET_assert (0 == unlink (KEYFILE)); |
139 | key = GNUNET_CRYPTO_eddsa_key_create_from_file (KEYFILE); | 139 | key = GNUNET_CRYPTO_eddsa_key_create_from_file (KEYFILE); |
140 | GNUNET_assert (NULL != key); | 140 | GNUNET_assert (NULL != key); |
141 | GNUNET_CRYPTO_eddsa_key_get_public (key, &p2); | 141 | GNUNET_CRYPTO_eddsa_key_get_public (key, &p2); |
@@ -152,7 +152,7 @@ perf_keygen () | |||
152 | struct GNUNET_CRYPTO_EddsaPrivateKey *pk; | 152 | struct GNUNET_CRYPTO_EddsaPrivateKey *pk; |
153 | int i; | 153 | int i; |
154 | 154 | ||
155 | FPRINTF (stderr, "%s", "W"); | 155 | fprintf (stderr, "%s", "W"); |
156 | start = GNUNET_TIME_absolute_get (); | 156 | start = GNUNET_TIME_absolute_get (); |
157 | for (i=0;i<10;i++) | 157 | for (i=0;i<10;i++) |
158 | { | 158 | { |
@@ -175,7 +175,7 @@ main (int argc, char *argv[]) | |||
175 | 175 | ||
176 | if (! gcry_check_version ("1.6.0")) | 176 | if (! gcry_check_version ("1.6.0")) |
177 | { | 177 | { |
178 | FPRINTF (stderr, | 178 | fprintf (stderr, |
179 | _("libgcrypt has not the expected version (version %s is required).\n"), | 179 | _("libgcrypt has not the expected version (version %s is required).\n"), |
180 | "1.6.0"); | 180 | "1.6.0"); |
181 | return 0; | 181 | return 0; |
@@ -193,7 +193,7 @@ main (int argc, char *argv[]) | |||
193 | GNUNET_free (key); | 193 | GNUNET_free (key); |
194 | if (GNUNET_OK != testCreateFromFile ()) | 194 | if (GNUNET_OK != testCreateFromFile ()) |
195 | failure_count++; | 195 | failure_count++; |
196 | GNUNET_assert (0 == UNLINK (KEYFILE)); | 196 | GNUNET_assert (0 == unlink (KEYFILE)); |
197 | perf_keygen (); | 197 | perf_keygen (); |
198 | 198 | ||
199 | if (0 != failure_count) | 199 | if (0 != failure_count) |