diff options
Diffstat (limited to 'sntp/tests/crypto.c')
-rw-r--r-- | sntp/tests/crypto.c | 68 |
1 files changed, 41 insertions, 27 deletions
diff --git a/sntp/tests/crypto.c b/sntp/tests/crypto.c index 82d285976d4c..fb2dc62981f3 100644 --- a/sntp/tests/crypto.c +++ b/sntp/tests/crypto.c @@ -18,8 +18,8 @@ void test_PacketSizeNotMultipleOfFourBytes(void); void -test_MakeMd5Mac(void) { - +test_MakeMd5Mac(void) +{ const char* PKT_DATA = "abcdefgh0123"; const int PKT_LEN = strlen(PKT_DATA); const char* EXPECTED_DIGEST = @@ -34,15 +34,17 @@ test_MakeMd5Mac(void) { memcpy(&md5.type, "MD5", 4); TEST_ASSERT_EQUAL(MD5_LENGTH, - make_mac((char*)PKT_DATA, PKT_LEN, MD5_LENGTH, &md5, actual)); + make_mac(PKT_DATA, PKT_LEN, MD5_LENGTH, &md5, actual)); TEST_ASSERT_TRUE(memcmp(EXPECTED_DIGEST, actual, MD5_LENGTH) == 0); } void -test_MakeSHA1Mac(void) { +test_MakeSHA1Mac(void) +{ #ifdef OPENSSL + const char* PKT_DATA = "abcdefgh0123"; const int PKT_LEN = strlen(PKT_DATA); const char* EXPECTED_DIGEST = @@ -58,22 +60,26 @@ test_MakeSHA1Mac(void) { memcpy(&sha1.type, "SHA1", 5); TEST_ASSERT_EQUAL(SHA1_LENGTH, - make_mac((char*)PKT_DATA, PKT_LEN, SHA1_LENGTH, &sha1, actual)); + make_mac(PKT_DATA, PKT_LEN, SHA1_LENGTH, &sha1, actual)); TEST_ASSERT_EQUAL_MEMORY(EXPECTED_DIGEST, actual, SHA1_LENGTH); + #else + TEST_IGNORE_MESSAGE("OpenSSL not found, skipping..."); + #endif /* OPENSSL */ } void -test_VerifyCorrectMD5(void) { +test_VerifyCorrectMD5(void) +{ const char* PKT_DATA = - "sometestdata" // Data - "\0\0\0\0" // Key-ID (unused) - "\xc7\x58\x99\xdd\x99\x32\x0f\x71" // MAC - "\x2b\x7b\xfe\x4f\xa2\x32\xcf\xac"; + "sometestdata" /* Data */ + "\0\0\0\0" /* Key-ID (unused) */ + "\xc7\x58\x99\xdd\x99\x32\x0f\x71" /* MAC */ + "\x2b\x7b\xfe\x4f\xa2\x32\xcf\xac"; const int PKT_LEN = 12; struct key md5; @@ -83,18 +89,20 @@ test_VerifyCorrectMD5(void) { memcpy(&md5.key_seq, "md5key", md5.key_len); memcpy(&md5.type, "MD5", 4); - TEST_ASSERT_TRUE(auth_md5((char*)PKT_DATA, PKT_LEN, MD5_LENGTH, &md5)); + TEST_ASSERT_TRUE(auth_md5(PKT_DATA, PKT_LEN, MD5_LENGTH, &md5)); } void -test_VerifySHA1(void) { +test_VerifySHA1(void) +{ #ifdef OPENSSL + const char* PKT_DATA = - "sometestdata" // Data - "\0\0\0\0" // Key-ID (unused) - "\xad\x07\xde\x36\x39\xa6\x77\xfa\x5b\xce" // MAC - "\x2d\x8a\x7d\x06\x96\xe6\x0c\xbc\xed\xe1"; + "sometestdata" /* Data */ + "\0\0\0\0" /* Key-ID (unused) */ + "\xad\x07\xde\x36\x39\xa6\x77\xfa\x5b\xce" /* MAC */ + "\x2d\x8a\x7d\x06\x96\xe6\x0c\xbc\xed\xe1"; const int PKT_LEN = 12; struct key sha1; @@ -104,21 +112,26 @@ test_VerifySHA1(void) { memcpy(&sha1.key_seq, "sha1key", sha1.key_len); memcpy(&sha1.type, "SHA1", 5); - TEST_ASSERT_TRUE(auth_md5((char*)PKT_DATA, PKT_LEN, SHA1_LENGTH, &sha1)); + TEST_ASSERT_TRUE(auth_md5(PKT_DATA, PKT_LEN, SHA1_LENGTH, &sha1)); + #else + TEST_IGNORE_MESSAGE("OpenSSL not found, skipping..."); + #endif /* OPENSSL */ } void -test_VerifyFailure(void) { - /* We use a copy of the MD5 verification code, but modify - * the last bit to make sure verification fails. */ +test_VerifyFailure(void) +{ + /* We use a copy of the MD5 verification code, but modify the + * last bit to make sure verification fails. + */ const char* PKT_DATA = - "sometestdata" // Data - "\0\0\0\0" // Key-ID (unused) - "\xc7\x58\x99\xdd\x99\x32\x0f\x71" // MAC - "\x2b\x7b\xfe\x4f\xa2\x32\xcf\x00"; // Last byte is wrong! + "sometestdata" /* Data */ + "\0\0\0\0" /* Key-ID (unused) */ + "\xc7\x58\x99\xdd\x99\x32\x0f\x71" /* MAC */ + "\x2b\x7b\xfe\x4f\xa2\x32\xcf\x00"; /* Last byte is wrong! */ const int PKT_LEN = 12; struct key md5; @@ -128,12 +141,13 @@ test_VerifyFailure(void) { memcpy(&md5.key_seq, "md5key", md5.key_len); memcpy(&md5.type, "MD5", 4); - TEST_ASSERT_FALSE(auth_md5((char*)PKT_DATA, PKT_LEN, MD5_LENGTH, &md5)); + TEST_ASSERT_FALSE(auth_md5(PKT_DATA, PKT_LEN, MD5_LENGTH, &md5)); } void -test_PacketSizeNotMultipleOfFourBytes(void) { +test_PacketSizeNotMultipleOfFourBytes(void) +{ const char* PKT_DATA = "123456"; const int PKT_LEN = 6; char actual[MD5_LENGTH]; @@ -145,5 +159,5 @@ test_PacketSizeNotMultipleOfFourBytes(void) { memcpy(&md5.key_seq, "md5seq", md5.key_len); memcpy(&md5.type, "MD5", 4); - TEST_ASSERT_EQUAL(0, make_mac((char*)PKT_DATA, PKT_LEN, MD5_LENGTH, &md5, actual)); + TEST_ASSERT_EQUAL(0, make_mac(PKT_DATA, PKT_LEN, MD5_LENGTH, &md5, actual)); } |