|
@@ -198,7 +198,7 @@ static int testCrypto()
|
|
|
bytes += 1234567.0;
|
|
|
}
|
|
|
uint64_t end = OSUtils::now();
|
|
|
- SHA512::hash(buf1,bb,1234567);
|
|
|
+ SHA512(buf1,bb,1234567);
|
|
|
std::cout << ((bytes / 1048576.0) / ((long double)(end - start) / 1024.0)) << " MiB/second (" << Utils::hex(buf1,16,hexbuf) << ')' << std::endl;
|
|
|
::free((void *)bb);
|
|
|
}
|
|
@@ -250,13 +250,13 @@ static int testCrypto()
|
|
|
bytes += 1234567.0;
|
|
|
}
|
|
|
uint64_t end = OSUtils::now();
|
|
|
- SHA512::hash(buf1,bb,1234567);
|
|
|
+ SHA512(buf1,bb,1234567);
|
|
|
std::cout << ((bytes / 1048576.0) / ((long double)(end - start) / 1024.0)) << " MiB/second (" << Utils::hex(buf1,16,hexbuf) << ')' << std::endl;
|
|
|
::free((void *)bb);
|
|
|
}
|
|
|
|
|
|
std::cout << "[crypto] Testing SHA-512... "; std::cout.flush();
|
|
|
- SHA512::hash(buf1,sha512TV0Input,(unsigned int)strlen(sha512TV0Input));
|
|
|
+ SHA512(buf1,sha512TV0Input,(unsigned int)strlen(sha512TV0Input));
|
|
|
if (memcmp(buf1,sha512TV0Digest,64)) {
|
|
|
std::cout << "FAIL" << std::endl;
|
|
|
return -1;
|
|
@@ -617,8 +617,8 @@ static int testPacket()
|
|
|
return -1;
|
|
|
}
|
|
|
|
|
|
- a.armor(salsaKey,true);
|
|
|
- if (!a.dearmor(salsaKey)) {
|
|
|
+ a.armor(salsaKey,true,nullptr);
|
|
|
+ if (!a.dearmor(salsaKey,nullptr)) {
|
|
|
std::cout << "FAIL (encrypt-decrypt/verify)" << std::endl;
|
|
|
return -1;
|
|
|
}
|