aboutsummaryrefslogtreecommitdiffstats
path: root/Source/testing/rsa_test.c
diff options
context:
space:
mode:
authorMartin Willi <martin@strongswan.org>2006-04-10 08:07:38 +0000
committerMartin Willi <martin@strongswan.org>2006-04-10 08:07:38 +0000
commit5113680f95e522c677cdd37072cfffbdca06831e (patch)
tree973ac57accbc66b042e5307942c6cbbbf4f19579 /Source/testing/rsa_test.c
parent6862128151fb78f63685a8da5575783c426d64a7 (diff)
downloadstrongswan-5113680f95e522c677cdd37072cfffbdca06831e.tar.bz2
strongswan-5113680f95e522c677cdd37072cfffbdca06831e.tar.xz
- split up in libstrong, charon, stroke, testing done
- new leak detective with malloc hook in library - useable, but needs improvements - logger_manager has now a single instance per library - allows use of loggers from any linking prog - a LOT of other things
Diffstat (limited to 'Source/testing/rsa_test.c')
-rw-r--r--Source/testing/rsa_test.c9
1 files changed, 4 insertions, 5 deletions
diff --git a/Source/testing/rsa_test.c b/Source/testing/rsa_test.c
index 2b8015a51..e0c601ea8 100644
--- a/Source/testing/rsa_test.c
+++ b/Source/testing/rsa_test.c
@@ -25,7 +25,6 @@
#include "rsa_test.h"
#include <daemon.h>
-#include <utils/allocator.h>
#include <utils/logger.h>
#include <crypto/certificate.h>
@@ -159,7 +158,7 @@ void test_rsa(protected_tester_t *tester)
data.ptr = test_data;
data.len = sizeof(test_data);
- logger = charon->logger_manager->get_logger(charon->logger_manager, TESTER);
+ logger = logger_manager->get_logger(logger_manager, TESTER);
logger->disable_level(logger, FULL);
/* key generation and signing */
@@ -175,7 +174,7 @@ void test_rsa(protected_tester_t *tester)
// status = public_key->verify_emsa_pkcs1_signature(public_key, data, signature);
// tester->assert_true(tester, status == SUCCESS, "verify emsa_pkcs1_signature (genkey)");
//
-// allocator_free(signature.ptr);
+// free(signature.ptr);
//
// private_key->destroy(private_key);
// public_key->destroy(public_key);
@@ -191,7 +190,7 @@ void test_rsa(protected_tester_t *tester)
status = public_key->verify_emsa_pkcs1_signature(public_key, data, signature);
tester->assert_true(tester, status == SUCCESS, "verify emsa_pkcs1_signature (setkey)");
- allocator_free(signature.ptr);
+ free(signature.ptr);
/* key comparison */
tester->assert_true(tester, private_key->belongs_to(private_key, public_key), "key belongs to");
@@ -218,7 +217,7 @@ void test_rsa(protected_tester_t *tester)
status = public_key->verify_emsa_pkcs1_signature(public_key, data, signature);
tester->assert_true(tester, status == SUCCESS, "verify emsa_pkcs1_signature (loadkey)");
- allocator_free(signature.ptr);
+ free(signature.ptr);
certificate->destroy(certificate);
public_key->destroy(public_key);