X-Git-Url: https://git.librecmc.org/?a=blobdiff_plain;f=src%2Futil%2Ftest_crypto_ksk.c;h=f062e31f500fadd1c3fbe7c48d8678e7b7f06fff;hb=72c8645af31896829b674b575c5375706f362a30;hp=2789f5edb25a224bb1a357a2878d5bfebf70edd9;hpb=16a6919a9f98ee9fa1fee9dd262906c321004a19;p=oweals%2Fgnunet.git diff --git a/src/util/test_crypto_ksk.c b/src/util/test_crypto_ksk.c index 2789f5edb..f062e31f5 100644 --- a/src/util/test_crypto_ksk.c +++ b/src/util/test_crypto_ksk.c @@ -25,9 +25,9 @@ */ #include "platform.h" #include "gnunet_common.h" -#include "gnunet_crypto_lib.h" +#include "gnunet_util_lib.h" #include "gnunet_signatures.h" -#include "gnunet_time_lib.h" + #define TESTSTRING "Hello World\0" #define MAX_TESTVAL 20 @@ -40,13 +40,13 @@ testCorrectKey () { const char *want = "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"; - GNUNET_HashCode in; + struct GNUNET_HashCode in; struct GNUNET_CRYPTO_RsaPrivateKey *hostkey; struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pkey; int i; char out[3]; - fprintf (stderr, "Testing KBlock key correctness"); + FPRINTF (stderr, "%s", "Testing KBlock key correctness"); GNUNET_CRYPTO_hash ("X", strlen ("X"), &in); hostkey = GNUNET_CRYPTO_rsa_key_create_from_hash (&in); if (hostkey == NULL) @@ -66,12 +66,12 @@ testCorrectKey () snprintf (out, sizeof (out), "%02x", ((unsigned char *) &pkey)[i]); if (0 != strncmp (out, &want[i * 2], 2)) { - fprintf (stderr, " Failed! Wanted %.2s but got %2s at %d\n", &want[i * 2], + FPRINTF (stderr, " Failed! Wanted %.2s but got %2s at %d\n", &want[i * 2], out, i); return GNUNET_SYSERR; } } - fprintf (stderr, " OK\n"); + FPRINTF (stderr, "%s", " OK\n"); return GNUNET_OK; } @@ -79,13 +79,13 @@ testCorrectKey () static int testMultiKey (const char *word) { - GNUNET_HashCode in; + struct GNUNET_HashCode in; struct GNUNET_CRYPTO_RsaPrivateKey *hostkey; struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pkey; struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pkey1; int i; - fprintf (stderr, "Testing KBlock key uniqueness (%s) ", word); + FPRINTF (stderr, "Testing KBlock key uniqueness (%s) ", word); GNUNET_CRYPTO_hash (word, strlen (word), &in); hostkey = GNUNET_CRYPTO_rsa_key_create_from_hash (&in); if (hostkey == NULL) @@ -101,12 +101,12 @@ testMultiKey (const char *word) GNUNET_CRYPTO_rsa_key_free (hostkey); for (i = 0; i < UNIQUE_ITER; i++) { - fprintf (stderr, "."); + FPRINTF (stderr, "%s", "."); hostkey = GNUNET_CRYPTO_rsa_key_create_from_hash (&in); if (hostkey == NULL) { GNUNET_break (0); - fprintf (stderr, " ERROR\n"); + FPRINTF (stderr, "%s", " ERROR\n"); return GNUNET_SYSERR; } GNUNET_CRYPTO_rsa_key_get_public (hostkey, &pkey1); @@ -116,11 +116,11 @@ testMultiKey (const char *word) sizeof (struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded))) { GNUNET_break (0); - fprintf (stderr, " ERROR\n"); + FPRINTF (stderr, "%s", " ERROR\n"); return GNUNET_SYSERR; } } - fprintf (stderr, " OK\n"); + FPRINTF (stderr, "%s", " OK\n"); return GNUNET_OK; } @@ -135,19 +135,19 @@ testEncryptDecrypt (struct GNUNET_CRYPTO_RsaPrivateKey *hostkey) struct GNUNET_TIME_Absolute start; int ok; - fprintf (stderr, "W"); + FPRINTF (stderr, "%s", "W"); GNUNET_CRYPTO_rsa_key_get_public (hostkey, &pkey); ok = 0; start = GNUNET_TIME_absolute_get (); for (i = 0; i < ITER; i++) { - fprintf (stderr, "."); + FPRINTF (stderr, "%s", "."); if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_encrypt (TESTSTRING, strlen (TESTSTRING) + 1, &pkey, &target)) { - fprintf (stderr, "GNUNET_CRYPTO_rsa_encrypt returned SYSERR\n"); + FPRINTF (stderr, "%s", "GNUNET_CRYPTO_rsa_encrypt returned SYSERR\n"); ok++; continue; } @@ -155,7 +155,7 @@ testEncryptDecrypt (struct GNUNET_CRYPTO_RsaPrivateKey *hostkey) GNUNET_CRYPTO_rsa_decrypt (hostkey, &target, result, strlen (TESTSTRING) + 1)) { - fprintf (stderr, "GNUNET_CRYPTO_rsa_decrypt returned SYSERR\n"); + FPRINTF (stderr, "%s", "GNUNET_CRYPTO_rsa_decrypt returned SYSERR\n"); ok++; continue; } @@ -167,9 +167,10 @@ testEncryptDecrypt (struct GNUNET_CRYPTO_RsaPrivateKey *hostkey) continue; } } - printf ("%d RSA encrypt/decrypt operations %llums (%d failures)\n", ITER, - (unsigned long long) - GNUNET_TIME_absolute_get_duration (start).rel_value, ok); + printf ("%d RSA encrypt/decrypt operations %s (%d failures)\n", + ITER, + GNUNET_STRINGS_relative_time_to_string (GNUNET_TIME_absolute_get_duration (start), GNUNET_YES), + ok); if (ok == 0) return GNUNET_OK; else @@ -186,17 +187,17 @@ testSignVerify (struct GNUNET_CRYPTO_RsaPrivateKey *hostkey) struct GNUNET_TIME_Absolute start; int ok = GNUNET_OK; - fprintf (stderr, "W"); + FPRINTF (stderr, "%s", "W"); GNUNET_CRYPTO_rsa_key_get_public (hostkey, &pkey); start = GNUNET_TIME_absolute_get (); purp.size = htonl (sizeof (struct GNUNET_CRYPTO_RsaSignaturePurpose)); purp.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_TEST); for (i = 0; i < ITER; i++) { - fprintf (stderr, "."); + FPRINTF (stderr, "%s", "."); if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_sign (hostkey, &purp, &sig)) { - fprintf (stderr, "GNUNET_CRYPTO_rsa_sign returned SYSERR\n"); + FPRINTF (stderr, "%s", "GNUNET_CRYPTO_rsa_sign returned SYSERR\n"); ok = GNUNET_SYSERR; continue; } @@ -217,9 +218,9 @@ testSignVerify (struct GNUNET_CRYPTO_RsaPrivateKey *hostkey) continue; } } - printf ("%d RSA sign/verify operations %llums\n", ITER, - (unsigned long long) - GNUNET_TIME_absolute_get_duration (start).rel_value); + printf ("%d RSA sign/verify operations %s\n", + ITER, + GNUNET_STRINGS_relative_time_to_string (GNUNET_TIME_absolute_get_duration (start), GNUNET_YES)); return ok; } @@ -228,7 +229,7 @@ int main (int argc, char *argv[]) { int failureCount = 0; - GNUNET_HashCode in; + struct GNUNET_HashCode in; struct GNUNET_CRYPTO_RsaPrivateKey *hostkey; GNUNET_log_setup ("test-crypto-ksk", "WARNING", NULL);