40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
|
[md5 updateWithBuffer: buf
ofSize: len];
[sha1 updateWithBuffer: buf
ofSize: len];
}
[f free];
if (!memcmp([md5 digest], testfile_md5, MD5_DIGEST_SIZE))
puts("Correct MD5 sum calculated!");
else {
puts("MD5 SUM MISMATCH!!");
return 1;
}
[md5 free];
if (!memcmp([sha1 digest], testfile_sha1, SHA1_DIGEST_SIZE))
puts("Correct SHA1 sum calculated!");
else {
puts("SHA1 SUM MISMATCH!!");
return 1;
}
[sha1 free];
return 0;
}
|
|
|
>
|
|
|
|
|
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
|
[md5 updateWithBuffer: buf
ofSize: len];
[sha1 updateWithBuffer: buf
ofSize: len];
}
[f free];
if (!memcmp([md5 digest], testfile_md5, MD5_DIGEST_SIZE)) {
fputs("\r\033[1;33mTests successful: 1/2\033[0m", stdout);
fflush(stdout);
} else {
puts("\r\033[K\033[1;31mTest 1/2 failed!\033[0m");
return 1;
}
[md5 free];
if (!memcmp([sha1 digest], testfile_sha1, SHA1_DIGEST_SIZE))
puts("\r\033[1;32mTests successful: 2/2\033[0m");
else {
puts("\r\033[K\033[1;31mTest 2/2 failed!\033[0m");
return 1;
}
[sha1 free];
return 0;
}
|