diff options
author | Stef Walter <stefw@gnome.org> | 2013-03-20 09:33:04 +0100 |
---|---|---|
committer | Stef Walter <stefw@gnome.org> | 2013-03-20 10:54:00 +0100 |
commit | f45942a4fc3e1c5219e9b5201b82203337ee7280 (patch) | |
tree | f83313676d1c8de9dbc48d161e16c13264bc8049 /trust/tests | |
parent | 1dc227b4fce16fcc721276925492f4ba4db00b4f (diff) |
hash: Add the murmur2 hash and start using it
Add implementation of the murmur2 hash function, and start using
it for our dictionaries. Our implementation is incremental
like our other hash functions.
Also remove p11_oid_hash() which wasn't being used.
In addition fix several tests whose success was based on the
way that the dictionary hashed. This was a hidden testing bug.
Diffstat (limited to 'trust/tests')
-rw-r--r-- | trust/tests/files/cacert3-trusted.pem | 4 | ||||
-rw-r--r-- | trust/tests/test-parser.c | 3 |
2 files changed, 3 insertions, 4 deletions
diff --git a/trust/tests/files/cacert3-trusted.pem b/trust/tests/files/cacert3-trusted.pem index c767eff..55593ec 100644 --- a/trust/tests/files/cacert3-trusted.pem +++ b/trust/tests/files/cacert3-trusted.pem @@ -38,6 +38,6 @@ hbNc09+4ufLKxw0BFKxwWMWMjTPUnWajGlCVI/xI4AZDEtnNp4Y5LzZyo4AQ5OHz 0ctbGsDkgJp8E3MGT9ujayQKurMcvEp4u+XjdTilSKeiHq921F73OIZWWonO1sOn ebJSoMbxhbQljPI/lrMQ2Y1sVzufb4Y6GIIiNsiwkTjbKqGTqoQ/9SdlrnPVyNXT d+pLncdBu8fA46A/5H2kjXPmEkvfoXNzczqA6NXLji/L6hOn1kGLrPo8idck9U60 -4GGSt/M3mMS+lqO3ijAwMBQGCCsGAQUFBwMCBggrBgEFBQcDAaAKBggrBgEFBQcD -BAwMQ3VzdG9tIExhYmVs +4GGSt/M3mMS+lqO3ijAmMAoGCCsGAQUFBwMBoAoGCCsGAQUFBwMEDAxDdXN0b20g +TGFiZWw= -----END TRUSTED CERTIFICATE----- diff --git a/trust/tests/test-parser.c b/trust/tests/test-parser.c index 69049f7..7998d97 100644 --- a/trust/tests/test-parser.c +++ b/trust/tests/test-parser.c @@ -203,8 +203,7 @@ test_parse_openssl_trusted (CuTest *cu) { CKA_CLASS, &certificate_extension, sizeof (certificate_extension), }, { CKA_OBJECT_ID, (void *)P11_OID_EXTENDED_KEY_USAGE, sizeof (P11_OID_EXTENDED_KEY_USAGE) }, { CKA_X_CRITICAL, &truev, sizeof (truev) }, - { CKA_VALUE, "\x30\x14\x06\x08\x2b\x06\x01\x05\x05\x07\x03\x01\x06\x08\x2b\x06" - "\x01\x05\x05\x07\x03\x02", 22 }, + { CKA_VALUE, "\x30\x0a\x06\x08\x2b\x06\x01\x05\x05\x07\x03\x01", 12 }, { CKA_INVALID }, }; |