diff options
author | iphydf <iphydf@users.noreply.github.com> | 2018-02-27 02:07:59 +0000 |
---|---|---|
committer | iphydf <iphydf@users.noreply.github.com> | 2018-05-20 15:42:42 +0000 |
commit | be797d4b039b40d2c876f0a71cd1e48454a74065 (patch) | |
tree | c759c0f15a3ac0285e0bd941dc3edad06ade015d /auto_tests/TCP_test.c | |
parent | 291a849a5a0afb4450bcd0d0c50b7aeccaac04f5 (diff) |
Move system header includes from network.h to network.c
Diffstat (limited to 'auto_tests/TCP_test.c')
-rw-r--r-- | auto_tests/TCP_test.c | 24 |
1 files changed, 13 insertions, 11 deletions
diff --git a/auto_tests/TCP_test.c b/auto_tests/TCP_test.c index 144d7e14..41125116 100644 --- a/auto_tests/TCP_test.c +++ b/auto_tests/TCP_test.c | |||
@@ -83,14 +83,14 @@ START_TEST(test_basic) | |||
83 | TCP_HANDSHAKE_PLAIN_SIZE, handshake + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE); | 83 | TCP_HANDSHAKE_PLAIN_SIZE, handshake + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE); |
84 | ck_assert_msg(ret == TCP_CLIENT_HANDSHAKE_SIZE - (CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE), | 84 | ck_assert_msg(ret == TCP_CLIENT_HANDSHAKE_SIZE - (CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE), |
85 | "Encrypt failed."); | 85 | "Encrypt failed."); |
86 | ck_assert_msg(send(sock, (const char *)handshake, TCP_CLIENT_HANDSHAKE_SIZE - 1, 0) == TCP_CLIENT_HANDSHAKE_SIZE - 1, | 86 | ck_assert_msg(net_send(sock, handshake, TCP_CLIENT_HANDSHAKE_SIZE - 1) == TCP_CLIENT_HANDSHAKE_SIZE - 1, |
87 | "send Failed."); | 87 | "send Failed."); |
88 | c_sleep(50); | 88 | c_sleep(50); |
89 | do_TCP_server(tcp_s); | 89 | do_TCP_server(tcp_s); |
90 | c_sleep(50); | 90 | c_sleep(50); |
91 | do_TCP_server(tcp_s); | 91 | do_TCP_server(tcp_s); |
92 | c_sleep(50); | 92 | c_sleep(50); |
93 | ck_assert_msg(send(sock, (const char *)(handshake + (TCP_CLIENT_HANDSHAKE_SIZE - 1)), 1, 0) == 1, "send Failed."); | 93 | ck_assert_msg(net_send(sock, handshake + (TCP_CLIENT_HANDSHAKE_SIZE - 1), 1) == 1, "send Failed."); |
94 | c_sleep(50); | 94 | c_sleep(50); |
95 | do_TCP_server(tcp_s); | 95 | do_TCP_server(tcp_s); |
96 | c_sleep(50); | 96 | c_sleep(50); |
@@ -98,7 +98,7 @@ START_TEST(test_basic) | |||
98 | c_sleep(50); | 98 | c_sleep(50); |
99 | uint8_t response[TCP_SERVER_HANDSHAKE_SIZE]; | 99 | uint8_t response[TCP_SERVER_HANDSHAKE_SIZE]; |
100 | uint8_t response_plain[TCP_HANDSHAKE_PLAIN_SIZE]; | 100 | uint8_t response_plain[TCP_HANDSHAKE_PLAIN_SIZE]; |
101 | ck_assert_msg(recv(sock, (char *)response, TCP_SERVER_HANDSHAKE_SIZE, 0) == TCP_SERVER_HANDSHAKE_SIZE, "recv Failed."); | 101 | ck_assert_msg(net_recv(sock, response, TCP_SERVER_HANDSHAKE_SIZE) == TCP_SERVER_HANDSHAKE_SIZE, "recv Failed."); |
102 | ret = decrypt_data(self_public_key, f_secret_key, response, response + CRYPTO_NONCE_SIZE, | 102 | ret = decrypt_data(self_public_key, f_secret_key, response, response + CRYPTO_NONCE_SIZE, |
103 | TCP_SERVER_HANDSHAKE_SIZE - CRYPTO_NONCE_SIZE, response_plain); | 103 | TCP_SERVER_HANDSHAKE_SIZE - CRYPTO_NONCE_SIZE, response_plain); |
104 | ck_assert_msg(ret == TCP_HANDSHAKE_PLAIN_SIZE, "Decrypt Failed."); | 104 | ck_assert_msg(ret == TCP_HANDSHAKE_PLAIN_SIZE, "Decrypt Failed."); |
@@ -118,8 +118,10 @@ START_TEST(test_basic) | |||
118 | uint32_t i; | 118 | uint32_t i; |
119 | 119 | ||
120 | for (i = 0; i < sizeof(r_req); ++i) { | 120 | for (i = 0; i < sizeof(r_req); ++i) { |
121 | ck_assert_msg(send(sock, (const char *)(r_req + i), 1, 0) == 1, "send Failed."); | 121 | ck_assert_msg(net_send(sock, r_req + i, 1) == 1, "send Failed."); |
122 | //ck_assert_msg(send(sock, (const char *)r_req, sizeof(r_req), 0) == sizeof(r_req), "send Failed."); | 122 | #if 0 |
123 | ck_assert_msg(net_send(sock, r_req, sizeof(r_req)) == sizeof(r_req), "send Failed."); | ||
124 | #endif | ||
123 | do_TCP_server(tcp_s); | 125 | do_TCP_server(tcp_s); |
124 | c_sleep(50); | 126 | c_sleep(50); |
125 | } | 127 | } |
@@ -127,7 +129,7 @@ START_TEST(test_basic) | |||
127 | do_TCP_server(tcp_s); | 129 | do_TCP_server(tcp_s); |
128 | c_sleep(50); | 130 | c_sleep(50); |
129 | uint8_t packet_resp[4096]; | 131 | uint8_t packet_resp[4096]; |
130 | int recv_data_len = recv(sock, (char *)packet_resp, 2 + 2 + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_MAC_SIZE, 0); | 132 | int recv_data_len = net_recv(sock, packet_resp, 2 + 2 + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_MAC_SIZE); |
131 | ck_assert_msg(recv_data_len == 2 + 2 + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_MAC_SIZE, | 133 | ck_assert_msg(recv_data_len == 2 + 2 + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_MAC_SIZE, |
132 | "recv Failed. %u", recv_data_len); | 134 | "recv Failed. %u", recv_data_len); |
133 | memcpy(&size, packet_resp, 2); | 135 | memcpy(&size, packet_resp, 2); |
@@ -180,16 +182,16 @@ static struct sec_TCP_con *new_TCP_con(TCP_Server *tcp_s) | |||
180 | TCP_HANDSHAKE_PLAIN_SIZE, handshake + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE); | 182 | TCP_HANDSHAKE_PLAIN_SIZE, handshake + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE); |
181 | ck_assert_msg(ret == TCP_CLIENT_HANDSHAKE_SIZE - (CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE), | 183 | ck_assert_msg(ret == TCP_CLIENT_HANDSHAKE_SIZE - (CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE), |
182 | "Encrypt failed."); | 184 | "Encrypt failed."); |
183 | ck_assert_msg(send(sock, (const char *)handshake, TCP_CLIENT_HANDSHAKE_SIZE - 1, 0) == TCP_CLIENT_HANDSHAKE_SIZE - 1, | 185 | ck_assert_msg(net_send(sock, handshake, TCP_CLIENT_HANDSHAKE_SIZE - 1) == TCP_CLIENT_HANDSHAKE_SIZE - 1, |
184 | "send Failed."); | 186 | "send Failed."); |
185 | do_TCP_server(tcp_s); | 187 | do_TCP_server(tcp_s); |
186 | c_sleep(50); | 188 | c_sleep(50); |
187 | ck_assert_msg(send(sock, (const char *)(handshake + (TCP_CLIENT_HANDSHAKE_SIZE - 1)), 1, 0) == 1, "send Failed."); | 189 | ck_assert_msg(net_send(sock, handshake + (TCP_CLIENT_HANDSHAKE_SIZE - 1), 1) == 1, "send Failed."); |
188 | c_sleep(50); | 190 | c_sleep(50); |
189 | do_TCP_server(tcp_s); | 191 | do_TCP_server(tcp_s); |
190 | uint8_t response[TCP_SERVER_HANDSHAKE_SIZE]; | 192 | uint8_t response[TCP_SERVER_HANDSHAKE_SIZE]; |
191 | uint8_t response_plain[TCP_HANDSHAKE_PLAIN_SIZE]; | 193 | uint8_t response_plain[TCP_HANDSHAKE_PLAIN_SIZE]; |
192 | ck_assert_msg(recv(sock, (char *)response, TCP_SERVER_HANDSHAKE_SIZE, 0) == TCP_SERVER_HANDSHAKE_SIZE, "recv Failed."); | 194 | ck_assert_msg(net_recv(sock, response, TCP_SERVER_HANDSHAKE_SIZE) == TCP_SERVER_HANDSHAKE_SIZE, "recv Failed."); |
193 | ret = decrypt_data(tcp_server_public_key(tcp_s), f_secret_key, response, response + CRYPTO_NONCE_SIZE, | 195 | ret = decrypt_data(tcp_server_public_key(tcp_s), f_secret_key, response, response + CRYPTO_NONCE_SIZE, |
194 | TCP_SERVER_HANDSHAKE_SIZE - CRYPTO_NONCE_SIZE, response_plain); | 196 | TCP_SERVER_HANDSHAKE_SIZE - CRYPTO_NONCE_SIZE, response_plain); |
195 | ck_assert_msg(ret == TCP_HANDSHAKE_PLAIN_SIZE, "Decrypt Failed."); | 197 | ck_assert_msg(ret == TCP_HANDSHAKE_PLAIN_SIZE, "Decrypt Failed."); |
@@ -219,13 +221,13 @@ static int write_packet_TCP_secure_connection(struct sec_TCP_con *con, uint8_t * | |||
219 | 221 | ||
220 | increment_nonce(con->sent_nonce); | 222 | increment_nonce(con->sent_nonce); |
221 | 223 | ||
222 | ck_assert_msg(send(con->sock, (const char *)packet, SIZEOF_VLA(packet), 0) == SIZEOF_VLA(packet), "send failed"); | 224 | ck_assert_msg(net_send(con->sock, packet, SIZEOF_VLA(packet)) == SIZEOF_VLA(packet), "send failed"); |
223 | return 0; | 225 | return 0; |
224 | } | 226 | } |
225 | 227 | ||
226 | static int read_packet_sec_TCP(struct sec_TCP_con *con, uint8_t *data, uint16_t length) | 228 | static int read_packet_sec_TCP(struct sec_TCP_con *con, uint8_t *data, uint16_t length) |
227 | { | 229 | { |
228 | int len = recv(con->sock, (char *)data, length, 0); | 230 | int len = net_recv(con->sock, data, length); |
229 | ck_assert_msg(len == length, "wrong len %i\n", len); | 231 | ck_assert_msg(len == length, "wrong len %i\n", len); |
230 | len = decrypt_data_symmetric(con->shared_key, con->recv_nonce, data + 2, length - 2, data); | 232 | len = decrypt_data_symmetric(con->shared_key, con->recv_nonce, data + 2, length - 2, data); |
231 | ck_assert_msg(len != -1, "Decrypt failed"); | 233 | ck_assert_msg(len != -1, "Decrypt failed"); |