mirror of
https://github.com/qemu/qemu.git
synced 2024-12-03 08:43:38 +08:00
Merge QEMU crypto 2017/09/05 v1
-----BEGIN PGP SIGNATURE----- iQIcBAABCAAGBQJZrm4xAAoJEL6G67QVEE/fy3cQALKHtuxOCYn1CsgRWlTzscMX J8+mpUCxhPVoBcTL1rLh/NhNFcNg0VScSmF2jqEoktJx9ZnerT8fVk+UaMEHdSnb ePdf09keFdwlWorFPcrwVO1wiqy/3BOTqnU2B7uNwLT0wHRX/+0VtodBt7cdZKRz jPsYR3LADsz45+SvakHzRKHIRnsl2JSg0vQgwBPUqUtP744Ci4YZnNYv4IS5czda i47HMn9rNOqL31uKymRseYnai0cPbKXI4ksB70fwjqBy+lXUotmyI8lY+T/mzUcP iC3MZzY1rRf5R4N+s5DDat5PT7kapGCJUeasjP0E8uxHcZ+2UewKeeAUveFnx72K SX7inAuBl6OGMVdwQrcFMm51p+HScVLHynXT6jx2vHq2hGJQuLC+v3pXTgfDgXbe 29BSDsQuyAuArrK7IHNyFJ95hALBTNnjA65G2EMHfKxrL5XtedcL7+nrLNFIuatU ra78lrAfWSftUGogbiDKu5GuJamIsqFQ3HLCC94x41i3LWxco+XP9NllDXfZd4bU Zr1VBnKF+ILJWLyAJQBTZdst+rA2Jvmh2cTTAFetXeL8QuDIIvW5zW9ft7dYVP/K egNwr4LK2eSTHlLjz0hKfYtqUYccQ9FVWTOKtZvMBs5a5QbfHQgCN6U8rr1YYmJI v42iI2HmvuH022mPmv4n =w1Kp -----END PGP SIGNATURE----- Merge remote-tracking branch 'remotes/berrange/tags/pull-qcrypto-20170905-1' into staging Merge QEMU crypto 2017/09/05 v1 # gpg: Signature made Tue 05 Sep 2017 10:28:17 BST # gpg: using RSA key 0xBE86EBB415104FDF # gpg: Good signature from "Daniel P. Berrange <dan@berrange.com>" # gpg: aka "Daniel P. Berrange <berrange@redhat.com>" # Primary key fingerprint: DAF3 A6FD B26B 6291 2D0E 8E3F BE86 EBB4 1510 4FDF * remotes/berrange/tags/pull-qcrypto-20170905-1: crypto: fix test cert generation to not use SHA1 algorithm tests: fix incorrect size_t format in benchmark-crypto Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
This commit is contained in:
commit
6d58d50e53
@ -59,7 +59,7 @@ static void test_cipher_speed(const void *opaque)
|
||||
total /= 1024 * 1024; /* to MB */
|
||||
|
||||
g_print("cbc(aes128): ");
|
||||
g_print("Testing chunk_size %ld bytes ", chunk_size);
|
||||
g_print("Testing chunk_size %zu bytes ", chunk_size);
|
||||
g_print("done: %.2f MB in %.2f secs: ", total, g_test_timer_last());
|
||||
g_print("%.2f MB/sec\n", total / g_test_timer_last());
|
||||
|
||||
@ -80,7 +80,7 @@ int main(int argc, char **argv)
|
||||
|
||||
for (i = 512; i <= (64 * 1204); i *= 2) {
|
||||
memset(name, 0 , sizeof(name));
|
||||
snprintf(name, sizeof(name), "/crypto/cipher/speed-%lu", i);
|
||||
snprintf(name, sizeof(name), "/crypto/cipher/speed-%zu", i);
|
||||
g_test_add_data_func(name, (void *)i, test_cipher_speed);
|
||||
}
|
||||
|
||||
|
@ -41,7 +41,7 @@ static void test_hash_speed(const void *opaque)
|
||||
|
||||
total /= 1024 * 1024; /* to MB */
|
||||
g_print("sha256: ");
|
||||
g_print("Testing chunk_size %ld bytes ", chunk_size);
|
||||
g_print("Testing chunk_size %zu bytes ", chunk_size);
|
||||
g_print("done: %.2f MB in %.2f secs: ", total, g_test_timer_last());
|
||||
g_print("%.2f MB/sec\n", total / g_test_timer_last());
|
||||
|
||||
@ -59,7 +59,7 @@ int main(int argc, char **argv)
|
||||
|
||||
for (i = 512; i <= (64 * 1204); i *= 2) {
|
||||
memset(name, 0 , sizeof(name));
|
||||
snprintf(name, sizeof(name), "/crypto/hash/speed-%lu", i);
|
||||
snprintf(name, sizeof(name), "/crypto/hash/speed-%zu", i);
|
||||
g_test_add_data_func(name, (void *)i, test_hash_speed);
|
||||
}
|
||||
|
||||
|
@ -56,7 +56,7 @@ static void test_hmac_speed(const void *opaque)
|
||||
total /= 1024 * 1024; /* to MB */
|
||||
|
||||
g_print("hmac(sha256): ");
|
||||
g_print("Testing chunk_size %ld bytes ", chunk_size);
|
||||
g_print("Testing chunk_size %zu bytes ", chunk_size);
|
||||
g_print("done: %.2f MB in %.2f secs: ", total, g_test_timer_last());
|
||||
g_print("%.2f MB/sec\n", total / g_test_timer_last());
|
||||
|
||||
@ -74,7 +74,7 @@ int main(int argc, char **argv)
|
||||
|
||||
for (i = 512; i <= (64 * 1204); i *= 2) {
|
||||
memset(name, 0 , sizeof(name));
|
||||
snprintf(name, sizeof(name), "/crypto/hmac/speed-%lu", i);
|
||||
snprintf(name, sizeof(name), "/crypto/hmac/speed-%zu", i);
|
||||
g_test_add_data_func(name, (void *)i, test_hmac_speed);
|
||||
}
|
||||
|
||||
|
@ -406,7 +406,8 @@ test_tls_generate_cert(QCryptoTLSTestCertReq *req,
|
||||
* If no 'ca' is set then we are self signing
|
||||
* the cert. This is done for the root CA certs
|
||||
*/
|
||||
err = gnutls_x509_crt_sign(crt, ca ? ca : crt, privkey);
|
||||
err = gnutls_x509_crt_sign2(crt, ca ? ca : crt, privkey,
|
||||
GNUTLS_DIG_SHA256, 0);
|
||||
if (err < 0) {
|
||||
g_critical("Failed to sign certificate %s",
|
||||
gnutls_strerror(err));
|
||||
|
Loading…
Reference in New Issue
Block a user