X-Git-Url: http://git.meshlink.io/?a=blobdiff_plain;f=test%2Fsign-verify.c;h=8e21b50a0ac484773f9fa859aa52081e2007f5a9;hb=13ef38b7a24efc84122b4d2bfc86cddbc359b94f;hp=a7f9a5af5b7e22bf55d9f085eac3a4cb1b4a3a0b;hpb=82a9712857c5b640288174493905499093853997;p=meshlink diff --git a/test/sign-verify.c b/test/sign-verify.c index a7f9a5af..8e21b50a 100644 --- a/test/sign-verify.c +++ b/test/sign-verify.c @@ -5,16 +5,18 @@ #include "meshlink.h" -int main(int argc, char *argv[]) { +int main() { // Open two new meshlink instance. - meshlink_handle_t *mesh1 = meshlink_open("sign_verify_conf.1", "foo"); + meshlink_handle_t *mesh1 = meshlink_open("sign_verify_conf.1", "foo", "sign-verify", DEV_CLASS_BACKBONE); + if(!mesh1) { fprintf(stderr, "Could not initialize configuration for foo\n"); return 1; } - meshlink_handle_t *mesh2 = meshlink_open("sign_verify_conf.2", "bar"); + meshlink_handle_t *mesh2 = meshlink_open("sign_verify_conf.2", "bar", "sign-verify", DEV_CLASS_BACKBONE); + if(!mesh2) { fprintf(stderr, "Could not initialize configuration for bar\n"); return 1; @@ -49,49 +51,55 @@ int main(int argc, char *argv[]) { static const char testdata2[] = "Test data 2."; char sig[MESHLINK_SIGLEN * 2]; - size_t siglen = sizeof sig * 2; + size_t siglen = sizeof(sig) * 2; - if(!meshlink_sign(mesh1, testdata1, sizeof testdata1, sig, &siglen)) { + if(!meshlink_sign(mesh1, testdata1, sizeof(testdata1), sig, &siglen)) { fprintf(stderr, "Signing failed\n"); return 1; } + if(siglen != MESHLINK_SIGLEN) { fprintf(stderr, "Signature has unexpected length %zu != %zu\n", siglen, MESHLINK_SIGLEN); return 1; } meshlink_node_t *foo = meshlink_get_node(mesh2, "foo"); + if(!foo) { fprintf(stderr, "Bar did not know about node foo\n"); return 1; } meshlink_node_t *bar = meshlink_get_node(mesh2, "bar"); + if(!bar) { fprintf(stderr, "Bar did not know about node bar\n"); return 1; } - if(!meshlink_verify(mesh2, foo, testdata1, sizeof testdata1, sig, siglen)) { + if(!meshlink_verify(mesh2, foo, testdata1, sizeof(testdata1), sig, siglen)) { fprintf(stderr, "False negative verification\n"); return 1; } // Check that bad signatures are revoked - if(meshlink_verify(mesh2, foo, testdata1, sizeof testdata1, sig, siglen / 2)) { + if(meshlink_verify(mesh2, foo, testdata1, sizeof(testdata1), sig, siglen / 2)) { fprintf(stderr, "False positive verification with half sized signature\n"); return 1; } - if(meshlink_verify(mesh2, foo, testdata1, sizeof testdata1, sig, siglen * 2)) { + + if(meshlink_verify(mesh2, foo, testdata1, sizeof(testdata1), sig, siglen * 2)) { fprintf(stderr, "False positive verification with double sized signature\n"); return 1; } - if(meshlink_verify(mesh2, foo, testdata2, sizeof testdata2, sig, siglen)) { + + if(meshlink_verify(mesh2, foo, testdata2, sizeof(testdata2), sig, siglen)) { fprintf(stderr, "False positive verification with wrong data\n"); return 1; } - if(meshlink_verify(mesh2, bar, testdata1, sizeof testdata1, sig, siglen)) { + + if(meshlink_verify(mesh2, bar, testdata1, sizeof(testdata1), sig, siglen)) { fprintf(stderr, "False positive verification with wrong signer\n"); return 1; }