summaryrefslogtreecommitdiff
path: root/auto_tests/TCP_test.c
diff options
context:
space:
mode:
authoriphydf <iphydf@users.noreply.github.com>2018-02-27 02:07:59 +0000
committeriphydf <iphydf@users.noreply.github.com>2018-05-20 15:42:42 +0000
commitbe797d4b039b40d2c876f0a71cd1e48454a74065 (patch)
treec759c0f15a3ac0285e0bd941dc3edad06ade015d /auto_tests/TCP_test.c
parent291a849a5a0afb4450bcd0d0c50b7aeccaac04f5 (diff)
Move system header includes from network.h to network.c
Diffstat (limited to 'auto_tests/TCP_test.c')
-rw-r--r--auto_tests/TCP_test.c24
1 files changed, 13 insertions, 11 deletions
diff --git a/auto_tests/TCP_test.c b/auto_tests/TCP_test.c
index 144d7e14..41125116 100644
--- a/auto_tests/TCP_test.c
+++ b/auto_tests/TCP_test.c
@@ -83,14 +83,14 @@ START_TEST(test_basic)
83 TCP_HANDSHAKE_PLAIN_SIZE, handshake + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE); 83 TCP_HANDSHAKE_PLAIN_SIZE, handshake + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE);
84 ck_assert_msg(ret == TCP_CLIENT_HANDSHAKE_SIZE - (CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE), 84 ck_assert_msg(ret == TCP_CLIENT_HANDSHAKE_SIZE - (CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE),
85 "Encrypt failed."); 85 "Encrypt failed.");
86 ck_assert_msg(send(sock, (const char *)handshake, TCP_CLIENT_HANDSHAKE_SIZE - 1, 0) == TCP_CLIENT_HANDSHAKE_SIZE - 1, 86 ck_assert_msg(net_send(sock, handshake, TCP_CLIENT_HANDSHAKE_SIZE - 1) == TCP_CLIENT_HANDSHAKE_SIZE - 1,
87 "send Failed."); 87 "send Failed.");
88 c_sleep(50); 88 c_sleep(50);
89 do_TCP_server(tcp_s); 89 do_TCP_server(tcp_s);
90 c_sleep(50); 90 c_sleep(50);
91 do_TCP_server(tcp_s); 91 do_TCP_server(tcp_s);
92 c_sleep(50); 92 c_sleep(50);
93 ck_assert_msg(send(sock, (const char *)(handshake + (TCP_CLIENT_HANDSHAKE_SIZE - 1)), 1, 0) == 1, "send Failed."); 93 ck_assert_msg(net_send(sock, handshake + (TCP_CLIENT_HANDSHAKE_SIZE - 1), 1) == 1, "send Failed.");
94 c_sleep(50); 94 c_sleep(50);
95 do_TCP_server(tcp_s); 95 do_TCP_server(tcp_s);
96 c_sleep(50); 96 c_sleep(50);
@@ -98,7 +98,7 @@ START_TEST(test_basic)
98 c_sleep(50); 98 c_sleep(50);
99 uint8_t response[TCP_SERVER_HANDSHAKE_SIZE]; 99 uint8_t response[TCP_SERVER_HANDSHAKE_SIZE];
100 uint8_t response_plain[TCP_HANDSHAKE_PLAIN_SIZE]; 100 uint8_t response_plain[TCP_HANDSHAKE_PLAIN_SIZE];
101 ck_assert_msg(recv(sock, (char *)response, TCP_SERVER_HANDSHAKE_SIZE, 0) == TCP_SERVER_HANDSHAKE_SIZE, "recv Failed."); 101 ck_assert_msg(net_recv(sock, response, TCP_SERVER_HANDSHAKE_SIZE) == TCP_SERVER_HANDSHAKE_SIZE, "recv Failed.");
102 ret = decrypt_data(self_public_key, f_secret_key, response, response + CRYPTO_NONCE_SIZE, 102 ret = decrypt_data(self_public_key, f_secret_key, response, response + CRYPTO_NONCE_SIZE,
103 TCP_SERVER_HANDSHAKE_SIZE - CRYPTO_NONCE_SIZE, response_plain); 103 TCP_SERVER_HANDSHAKE_SIZE - CRYPTO_NONCE_SIZE, response_plain);
104 ck_assert_msg(ret == TCP_HANDSHAKE_PLAIN_SIZE, "Decrypt Failed."); 104 ck_assert_msg(ret == TCP_HANDSHAKE_PLAIN_SIZE, "Decrypt Failed.");
@@ -118,8 +118,10 @@ START_TEST(test_basic)
118 uint32_t i; 118 uint32_t i;
119 119
120 for (i = 0; i < sizeof(r_req); ++i) { 120 for (i = 0; i < sizeof(r_req); ++i) {
121 ck_assert_msg(send(sock, (const char *)(r_req + i), 1, 0) == 1, "send Failed."); 121 ck_assert_msg(net_send(sock, r_req + i, 1) == 1, "send Failed.");
122 //ck_assert_msg(send(sock, (const char *)r_req, sizeof(r_req), 0) == sizeof(r_req), "send Failed."); 122#if 0
123 ck_assert_msg(net_send(sock, r_req, sizeof(r_req)) == sizeof(r_req), "send Failed.");
124#endif
123 do_TCP_server(tcp_s); 125 do_TCP_server(tcp_s);
124 c_sleep(50); 126 c_sleep(50);
125 } 127 }
@@ -127,7 +129,7 @@ START_TEST(test_basic)
127 do_TCP_server(tcp_s); 129 do_TCP_server(tcp_s);
128 c_sleep(50); 130 c_sleep(50);
129 uint8_t packet_resp[4096]; 131 uint8_t packet_resp[4096];
130 int recv_data_len = recv(sock, (char *)packet_resp, 2 + 2 + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_MAC_SIZE, 0); 132 int recv_data_len = net_recv(sock, packet_resp, 2 + 2 + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_MAC_SIZE);
131 ck_assert_msg(recv_data_len == 2 + 2 + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_MAC_SIZE, 133 ck_assert_msg(recv_data_len == 2 + 2 + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_MAC_SIZE,
132 "recv Failed. %u", recv_data_len); 134 "recv Failed. %u", recv_data_len);
133 memcpy(&size, packet_resp, 2); 135 memcpy(&size, packet_resp, 2);
@@ -180,16 +182,16 @@ static struct sec_TCP_con *new_TCP_con(TCP_Server *tcp_s)
180 TCP_HANDSHAKE_PLAIN_SIZE, handshake + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE); 182 TCP_HANDSHAKE_PLAIN_SIZE, handshake + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE);
181 ck_assert_msg(ret == TCP_CLIENT_HANDSHAKE_SIZE - (CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE), 183 ck_assert_msg(ret == TCP_CLIENT_HANDSHAKE_SIZE - (CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE),
182 "Encrypt failed."); 184 "Encrypt failed.");
183 ck_assert_msg(send(sock, (const char *)handshake, TCP_CLIENT_HANDSHAKE_SIZE - 1, 0) == TCP_CLIENT_HANDSHAKE_SIZE - 1, 185 ck_assert_msg(net_send(sock, handshake, TCP_CLIENT_HANDSHAKE_SIZE - 1) == TCP_CLIENT_HANDSHAKE_SIZE - 1,
184 "send Failed."); 186 "send Failed.");
185 do_TCP_server(tcp_s); 187 do_TCP_server(tcp_s);
186 c_sleep(50); 188 c_sleep(50);
187 ck_assert_msg(send(sock, (const char *)(handshake + (TCP_CLIENT_HANDSHAKE_SIZE - 1)), 1, 0) == 1, "send Failed."); 189 ck_assert_msg(net_send(sock, handshake + (TCP_CLIENT_HANDSHAKE_SIZE - 1), 1) == 1, "send Failed.");
188 c_sleep(50); 190 c_sleep(50);
189 do_TCP_server(tcp_s); 191 do_TCP_server(tcp_s);
190 uint8_t response[TCP_SERVER_HANDSHAKE_SIZE]; 192 uint8_t response[TCP_SERVER_HANDSHAKE_SIZE];
191 uint8_t response_plain[TCP_HANDSHAKE_PLAIN_SIZE]; 193 uint8_t response_plain[TCP_HANDSHAKE_PLAIN_SIZE];
192 ck_assert_msg(recv(sock, (char *)response, TCP_SERVER_HANDSHAKE_SIZE, 0) == TCP_SERVER_HANDSHAKE_SIZE, "recv Failed."); 194 ck_assert_msg(net_recv(sock, response, TCP_SERVER_HANDSHAKE_SIZE) == TCP_SERVER_HANDSHAKE_SIZE, "recv Failed.");
193 ret = decrypt_data(tcp_server_public_key(tcp_s), f_secret_key, response, response + CRYPTO_NONCE_SIZE, 195 ret = decrypt_data(tcp_server_public_key(tcp_s), f_secret_key, response, response + CRYPTO_NONCE_SIZE,
194 TCP_SERVER_HANDSHAKE_SIZE - CRYPTO_NONCE_SIZE, response_plain); 196 TCP_SERVER_HANDSHAKE_SIZE - CRYPTO_NONCE_SIZE, response_plain);
195 ck_assert_msg(ret == TCP_HANDSHAKE_PLAIN_SIZE, "Decrypt Failed."); 197 ck_assert_msg(ret == TCP_HANDSHAKE_PLAIN_SIZE, "Decrypt Failed.");
@@ -219,13 +221,13 @@ static int write_packet_TCP_secure_connection(struct sec_TCP_con *con, uint8_t *
219 221
220 increment_nonce(con->sent_nonce); 222 increment_nonce(con->sent_nonce);
221 223
222 ck_assert_msg(send(con->sock, (const char *)packet, SIZEOF_VLA(packet), 0) == SIZEOF_VLA(packet), "send failed"); 224 ck_assert_msg(net_send(con->sock, packet, SIZEOF_VLA(packet)) == SIZEOF_VLA(packet), "send failed");
223 return 0; 225 return 0;
224} 226}
225 227
226static int read_packet_sec_TCP(struct sec_TCP_con *con, uint8_t *data, uint16_t length) 228static int read_packet_sec_TCP(struct sec_TCP_con *con, uint8_t *data, uint16_t length)
227{ 229{
228 int len = recv(con->sock, (char *)data, length, 0); 230 int len = net_recv(con->sock, data, length);
229 ck_assert_msg(len == length, "wrong len %i\n", len); 231 ck_assert_msg(len == length, "wrong len %i\n", len);
230 len = decrypt_data_symmetric(con->shared_key, con->recv_nonce, data + 2, length - 2, data); 232 len = decrypt_data_symmetric(con->shared_key, con->recv_nonce, data + 2, length - 2, data);
231 ck_assert_msg(len != -1, "Decrypt failed"); 233 ck_assert_msg(len != -1, "Decrypt failed");