X-Git-Url: http://git.meshlink.io/?a=blobdiff_plain;f=test%2Fsign-verify.c;h=bd05c11285036cd0ae35abdfcc38627fe0a6dc32;hb=76c7550c8ab0e9c0ee14a9c396baa008cfb9bc42;hp=a7f9a5af5b7e22bf55d9f085eac3a4cb1b4a3a0b;hpb=82a9712857c5b640288174493905499093853997;p=meshlink diff --git a/test/sign-verify.c b/test/sign-verify.c index a7f9a5af..bd05c112 100644 --- a/test/sign-verify.c +++ b/test/sign-verify.c @@ -8,13 +8,13 @@ int main(int argc, char *argv[]) { // Open two new meshlink instance. - meshlink_handle_t *mesh1 = meshlink_open("sign_verify_conf.1", "foo"); + meshlink_handle_t *mesh1 = meshlink_open("sign_verify_conf.1", "foo", "sign-verify", DEV_CLASS_BACKBONE); if(!mesh1) { fprintf(stderr, "Could not initialize configuration for foo\n"); return 1; } - meshlink_handle_t *mesh2 = meshlink_open("sign_verify_conf.2", "bar"); + meshlink_handle_t *mesh2 = meshlink_open("sign_verify_conf.2", "bar", "sign-verify", DEV_CLASS_BACKBONE); if(!mesh2) { fprintf(stderr, "Could not initialize configuration for bar\n"); return 1; @@ -49,9 +49,9 @@ int main(int argc, char *argv[]) { static const char testdata2[] = "Test data 2."; char sig[MESHLINK_SIGLEN * 2]; - size_t siglen = sizeof sig * 2; + size_t siglen = sizeof(sig) * 2; - if(!meshlink_sign(mesh1, testdata1, sizeof testdata1, sig, &siglen)) { + if(!meshlink_sign(mesh1, testdata1, sizeof(testdata1), sig, &siglen)) { fprintf(stderr, "Signing failed\n"); return 1; } @@ -72,26 +72,26 @@ int main(int argc, char *argv[]) { return 1; } - if(!meshlink_verify(mesh2, foo, testdata1, sizeof testdata1, sig, siglen)) { + if(!meshlink_verify(mesh2, foo, testdata1, sizeof(testdata1), sig, siglen)) { fprintf(stderr, "False negative verification\n"); return 1; } // Check that bad signatures are revoked - if(meshlink_verify(mesh2, foo, testdata1, sizeof testdata1, sig, siglen / 2)) { + if(meshlink_verify(mesh2, foo, testdata1, sizeof(testdata1), sig, siglen / 2)) { fprintf(stderr, "False positive verification with half sized signature\n"); return 1; } - if(meshlink_verify(mesh2, foo, testdata1, sizeof testdata1, sig, siglen * 2)) { + if(meshlink_verify(mesh2, foo, testdata1, sizeof(testdata1), sig, siglen * 2)) { fprintf(stderr, "False positive verification with double sized signature\n"); return 1; } - if(meshlink_verify(mesh2, foo, testdata2, sizeof testdata2, sig, siglen)) { + if(meshlink_verify(mesh2, foo, testdata2, sizeof(testdata2), sig, siglen)) { fprintf(stderr, "False positive verification with wrong data\n"); return 1; } - if(meshlink_verify(mesh2, bar, testdata1, sizeof testdata1, sig, siglen)) { + if(meshlink_verify(mesh2, bar, testdata1, sizeof(testdata1), sig, siglen)) { fprintf(stderr, "False positive verification with wrong signer\n"); return 1; }