diff options
author | Martin Willi <martin@strongswan.org> | 2006-04-10 08:07:38 +0000 |
---|---|---|
committer | Martin Willi <martin@strongswan.org> | 2006-04-10 08:07:38 +0000 |
commit | 5113680f95e522c677cdd37072cfffbdca06831e (patch) | |
tree | 973ac57accbc66b042e5307942c6cbbbf4f19579 /Source/testing/rsa_test.c | |
parent | 6862128151fb78f63685a8da5575783c426d64a7 (diff) | |
download | strongswan-5113680f95e522c677cdd37072cfffbdca06831e.tar.bz2 strongswan-5113680f95e522c677cdd37072cfffbdca06831e.tar.xz |
- split up in libstrong, charon, stroke, testing done
- new leak detective with malloc hook in library
- useable, but needs improvements
- logger_manager has now a single instance per library
- allows use of loggers from any linking prog
- a LOT of other things
Diffstat (limited to 'Source/testing/rsa_test.c')
-rw-r--r-- | Source/testing/rsa_test.c | 9 |
1 files changed, 4 insertions, 5 deletions
diff --git a/Source/testing/rsa_test.c b/Source/testing/rsa_test.c index 2b8015a51..e0c601ea8 100644 --- a/Source/testing/rsa_test.c +++ b/Source/testing/rsa_test.c @@ -25,7 +25,6 @@ #include "rsa_test.h" #include <daemon.h> -#include <utils/allocator.h> #include <utils/logger.h> #include <crypto/certificate.h> @@ -159,7 +158,7 @@ void test_rsa(protected_tester_t *tester) data.ptr = test_data; data.len = sizeof(test_data); - logger = charon->logger_manager->get_logger(charon->logger_manager, TESTER); + logger = logger_manager->get_logger(logger_manager, TESTER); logger->disable_level(logger, FULL); /* key generation and signing */ @@ -175,7 +174,7 @@ void test_rsa(protected_tester_t *tester) // status = public_key->verify_emsa_pkcs1_signature(public_key, data, signature); // tester->assert_true(tester, status == SUCCESS, "verify emsa_pkcs1_signature (genkey)"); // -// allocator_free(signature.ptr); +// free(signature.ptr); // // private_key->destroy(private_key); // public_key->destroy(public_key); @@ -191,7 +190,7 @@ void test_rsa(protected_tester_t *tester) status = public_key->verify_emsa_pkcs1_signature(public_key, data, signature); tester->assert_true(tester, status == SUCCESS, "verify emsa_pkcs1_signature (setkey)"); - allocator_free(signature.ptr); + free(signature.ptr); /* key comparison */ tester->assert_true(tester, private_key->belongs_to(private_key, public_key), "key belongs to"); @@ -218,7 +217,7 @@ void test_rsa(protected_tester_t *tester) status = public_key->verify_emsa_pkcs1_signature(public_key, data, signature); tester->assert_true(tester, status == SUCCESS, "verify emsa_pkcs1_signature (loadkey)"); - allocator_free(signature.ptr); + free(signature.ptr); certificate->destroy(certificate); public_key->destroy(public_key); |