Commented out old test, needs to be redone
This commit is contained in:
parent
898e06ea55
commit
f4db6f15fb
1 changed files with 6 additions and 22 deletions
|
@ -33,6 +33,7 @@ void print_stretched_key(struct StretchedKey* key) {
|
||||||
|
|
||||||
int test_secio_handshake() {
|
int test_secio_handshake() {
|
||||||
|
|
||||||
|
/** THis needs to be redone to handle the new way of doing things
|
||||||
libp2p_logger_add_class("secio");
|
libp2p_logger_add_class("secio");
|
||||||
|
|
||||||
int retVal = 0;
|
int retVal = 0;
|
||||||
|
@ -104,17 +105,6 @@ int test_secio_handshake() {
|
||||||
goto exit;
|
goto exit;
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
|
||||||
fprintf(stdout, "Shared key: ");
|
|
||||||
for(int i = 0; i < secure_session.shared_key_size; i++)
|
|
||||||
fprintf(stdout, "%d ", secure_session.shared_key[i]);
|
|
||||||
fprintf(stdout, "\nLocal stretched key: ");
|
|
||||||
print_stretched_key(secure_session.local_stretched_key);
|
|
||||||
fprintf(stdout, "\nRemote stretched key: ");
|
|
||||||
print_stretched_key(secure_session.remote_stretched_key);
|
|
||||||
fprintf(stdout, "\n");
|
|
||||||
*/
|
|
||||||
|
|
||||||
// now attempt to do something with it... try to negotiate a multistream
|
// now attempt to do something with it... try to negotiate a multistream
|
||||||
if (libp2p_net_multistream_negotiate(&secure_session) == 0) {
|
if (libp2p_net_multistream_negotiate(&secure_session) == 0) {
|
||||||
fprintf(stdout, "Unable to negotiate multistream\n");
|
fprintf(stdout, "Unable to negotiate multistream\n");
|
||||||
|
@ -172,6 +162,8 @@ int test_secio_handshake() {
|
||||||
if (peerstore != NULL)
|
if (peerstore != NULL)
|
||||||
libp2p_peerstore_free(peerstore);
|
libp2p_peerstore_free(peerstore);
|
||||||
return retVal;
|
return retVal;
|
||||||
|
*/
|
||||||
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
int libp2p_secio_encrypt(const struct SessionContext* session, const unsigned char* incoming, size_t incoming_size, unsigned char** outgoing, size_t* outgoing_size);
|
int libp2p_secio_encrypt(const struct SessionContext* session, const unsigned char* incoming, size_t incoming_size, unsigned char** outgoing, size_t* outgoing_size);
|
||||||
|
@ -330,6 +322,7 @@ int test_secio_encrypt_like_go() {
|
||||||
*/
|
*/
|
||||||
int test_secio_handshake_go() {
|
int test_secio_handshake_go() {
|
||||||
|
|
||||||
|
/*this needs to be redone to the new way of handling things
|
||||||
libp2p_logger_add_class("secio");
|
libp2p_logger_add_class("secio");
|
||||||
|
|
||||||
int retVal = 0;
|
int retVal = 0;
|
||||||
|
@ -410,17 +403,6 @@ int test_secio_handshake_go() {
|
||||||
goto exit;
|
goto exit;
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
|
||||||
fprintf(stdout, "Shared key: ");
|
|
||||||
for(int i = 0; i < secure_session.shared_key_size; i++)
|
|
||||||
fprintf(stdout, "%d ", secure_session.shared_key[i]);
|
|
||||||
fprintf(stdout, "\nLocal stretched key: ");
|
|
||||||
print_stretched_key(secure_session.local_stretched_key);
|
|
||||||
fprintf(stdout, "\nRemote stretched key: ");
|
|
||||||
print_stretched_key(secure_session.remote_stretched_key);
|
|
||||||
fprintf(stdout, "\n");
|
|
||||||
*/
|
|
||||||
|
|
||||||
// now attempt to do something with it... try to negotiate a multistream
|
// now attempt to do something with it... try to negotiate a multistream
|
||||||
if (libp2p_net_multistream_negotiate(secure_session) == 0) {
|
if (libp2p_net_multistream_negotiate(secure_session) == 0) {
|
||||||
fprintf(stdout, "Unable to negotiate multistream\n");
|
fprintf(stdout, "Unable to negotiate multistream\n");
|
||||||
|
@ -458,4 +440,6 @@ int test_secio_handshake_go() {
|
||||||
if (peerstore != NULL)
|
if (peerstore != NULL)
|
||||||
libp2p_peerstore_free(peerstore);
|
libp2p_peerstore_free(peerstore);
|
||||||
return retVal;
|
return retVal;
|
||||||
|
*/
|
||||||
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue