X-Git-Url: http://git.meshlink.io/?a=blobdiff_plain;f=test%2Fsign-verify.c;h=bd05c11285036cd0ae35abdfcc38627fe0a6dc32;hb=8fde91038538d01aaa5b36ebb06b516a8c313364;hp=6c7ccfec545488e4a9a91bb12b1a5f4945fc7ae1;hpb=e84f94c95b02f1ab18f0ab09e8cdc9427b00df14;p=meshlink diff --git a/test/sign-verify.c b/test/sign-verify.c index 6c7ccfec..bd05c112 100644 --- a/test/sign-verify.c +++ b/test/sign-verify.c @@ -8,13 +8,13 @@ int main(int argc, char *argv[]) { // Open two new meshlink instance. - meshlink_handle_t *mesh1 = meshlink_open("sign_verify_conf.1", "foo", "sign-verify"); + meshlink_handle_t *mesh1 = meshlink_open("sign_verify_conf.1", "foo", "sign-verify", DEV_CLASS_BACKBONE); if(!mesh1) { fprintf(stderr, "Could not initialize configuration for foo\n"); return 1; } - meshlink_handle_t *mesh2 = meshlink_open("sign_verify_conf.2", "bar", "sign-verify"); + meshlink_handle_t *mesh2 = meshlink_open("sign_verify_conf.2", "bar", "sign-verify", DEV_CLASS_BACKBONE); if(!mesh2) { fprintf(stderr, "Could not initialize configuration for bar\n"); return 1; @@ -49,9 +49,9 @@ int main(int argc, char *argv[]) { static const char testdata2[] = "Test data 2."; char sig[MESHLINK_SIGLEN * 2]; - size_t siglen = sizeof sig * 2; + size_t siglen = sizeof(sig) * 2; - if(!meshlink_sign(mesh1, testdata1, sizeof testdata1, sig, &siglen)) { + if(!meshlink_sign(mesh1, testdata1, sizeof(testdata1), sig, &siglen)) { fprintf(stderr, "Signing failed\n"); return 1; } @@ -72,26 +72,26 @@ int main(int argc, char *argv[]) { return 1; } - if(!meshlink_verify(mesh2, foo, testdata1, sizeof testdata1, sig, siglen)) { + if(!meshlink_verify(mesh2, foo, testdata1, sizeof(testdata1), sig, siglen)) { fprintf(stderr, "False negative verification\n"); return 1; } // Check that bad signatures are revoked - if(meshlink_verify(mesh2, foo, testdata1, sizeof testdata1, sig, siglen / 2)) { + if(meshlink_verify(mesh2, foo, testdata1, sizeof(testdata1), sig, siglen / 2)) { fprintf(stderr, "False positive verification with half sized signature\n"); return 1; } - if(meshlink_verify(mesh2, foo, testdata1, sizeof testdata1, sig, siglen * 2)) { + if(meshlink_verify(mesh2, foo, testdata1, sizeof(testdata1), sig, siglen * 2)) { fprintf(stderr, "False positive verification with double sized signature\n"); return 1; } - if(meshlink_verify(mesh2, foo, testdata2, sizeof testdata2, sig, siglen)) { + if(meshlink_verify(mesh2, foo, testdata2, sizeof(testdata2), sig, siglen)) { fprintf(stderr, "False positive verification with wrong data\n"); return 1; } - if(meshlink_verify(mesh2, bar, testdata1, sizeof testdata1, sig, siglen)) { + if(meshlink_verify(mesh2, bar, testdata1, sizeof(testdata1), sig, siglen)) { fprintf(stderr, "False positive verification with wrong signer\n"); return 1; }