diff options
-rw-r--r-- | auto_tests/TCP_test.c | 14 |
1 files changed, 7 insertions, 7 deletions
diff --git a/auto_tests/TCP_test.c b/auto_tests/TCP_test.c index b08a04bc..06049467 100644 --- a/auto_tests/TCP_test.c +++ b/auto_tests/TCP_test.c | |||
@@ -106,9 +106,9 @@ START_TEST(test_basic) | |||
106 | do_TCP_server(tcp_s); | 106 | do_TCP_server(tcp_s); |
107 | c_sleep(50); | 107 | c_sleep(50); |
108 | uint8_t packet_resp[4096]; | 108 | uint8_t packet_resp[4096]; |
109 | int recv_data_len; | 109 | int recv_data_len = recv(sock, packet_resp, 2 + 2 + crypto_box_PUBLICKEYBYTES + crypto_box_MACBYTES, 0); |
110 | ck_assert_msg((recv_data_len = recv(sock, packet_resp, 2 + 2 + crypto_box_PUBLICKEYBYTES + crypto_box_MACBYTES, | 110 | ck_assert_msg(recv_data_len == 2 + 2 + crypto_box_PUBLICKEYBYTES + crypto_box_MACBYTES, |
111 | 0)) == 2 + 2 + crypto_box_PUBLICKEYBYTES + crypto_box_MACBYTES, "recv Failed. %u", recv_data_len); | 111 | "recv Failed. %u", recv_data_len); |
112 | memcpy(&size, packet_resp, 2); | 112 | memcpy(&size, packet_resp, 2); |
113 | ck_assert_msg(ntohs(size) == 2 + crypto_box_PUBLICKEYBYTES + crypto_box_MACBYTES, "Wrong packet size."); | 113 | ck_assert_msg(ntohs(size) == 2 + crypto_box_PUBLICKEYBYTES + crypto_box_MACBYTES, "Wrong packet size."); |
114 | uint8_t packet_resp_plain[4096]; | 114 | uint8_t packet_resp_plain[4096]; |
@@ -201,10 +201,10 @@ int write_packet_TCP_secure_connection(struct sec_TCP_con *con, uint8_t *data, u | |||
201 | 201 | ||
202 | int read_packet_sec_TCP(struct sec_TCP_con *con, uint8_t *data, uint16_t length) | 202 | int read_packet_sec_TCP(struct sec_TCP_con *con, uint8_t *data, uint16_t length) |
203 | { | 203 | { |
204 | int len; | 204 | int len = recv(con->sock, data, length, 0); |
205 | ck_assert_msg((len = recv(con->sock, data, length, 0)) == length, "wrong len %i\n", len); | 205 | ck_assert_msg(len == length, "wrong len %i\n", len); |
206 | ck_assert_msg((len = decrypt_data_symmetric(con->shared_key, con->recv_nonce, data + 2, length - 2, data)) != -1, | 206 | len = decrypt_data_symmetric(con->shared_key, con->recv_nonce, data + 2, length - 2, data); |
207 | "Decrypt failed"); | 207 | ck_assert_msg(len != -1, "Decrypt failed"); |
208 | increment_nonce(con->recv_nonce); | 208 | increment_nonce(con->recv_nonce); |
209 | return len; | 209 | return len; |
210 | } | 210 | } |