}
printf ("%d RSA encrypt/decrypt operations %llums (%d failures)\n",
ITER,
- (unsigned long long) GNUNET_TIME_absolute_get_duration (start).
- value, ok);
+ (unsigned long long)
+ GNUNET_TIME_absolute_get_duration (start).value, ok);
if (ok == 0)
return GNUNET_OK;
else
continue;
}
if (GNUNET_SYSERR !=
- GNUNET_CRYPTO_rsa_verify (GNUNET_SIGNATURE_PURPOSE_TRANSPORT_HELLO,
- &purp, &sig, &pkey))
+ GNUNET_CRYPTO_rsa_verify
+ (GNUNET_SIGNATURE_PURPOSE_TRANSPORT_PING, &purp, &sig, &pkey))
{
printf ("GNUNET_CRYPTO_rsa_verify failed to fail!\n");
ok = GNUNET_SYSERR;
}
printf ("%d RSA sign/verify operations %llums\n",
ITER,
- (unsigned long long) GNUNET_TIME_absolute_get_duration (start).
- value);
+ (unsigned long long)
+ GNUNET_TIME_absolute_get_duration (start).value);
return ok;
}
struct GNUNET_CRYPTO_RsaPrivateKey *hostkey;
GNUNET_log_setup ("test-crypto-ksk", "WARNING", NULL);
- GNUNET_CRYPTO_hash_create_random (&in);
+ GNUNET_CRYPTO_hash_create_random (GNUNET_CRYPTO_QUALITY_WEAK, &in);
hostkey = GNUNET_CRYPTO_rsa_key_create_from_hash (&in);
if (hostkey == NULL)
{