X-Git-Url: http://git.meshlink.io/?a=blobdiff_plain;f=test%2Fsign-verify.c;h=8e21b50a0ac484773f9fa859aa52081e2007f5a9;hb=a0b633156ddb653ac7f1cc809a1ba6cf86a928e1;hp=6c7ccfec545488e4a9a91bb12b1a5f4945fc7ae1;hpb=e84f94c95b02f1ab18f0ab09e8cdc9427b00df14;p=meshlink diff --git a/test/sign-verify.c b/test/sign-verify.c index 6c7ccfec..8e21b50a 100644 --- a/test/sign-verify.c +++ b/test/sign-verify.c @@ -5,16 +5,18 @@ #include "meshlink.h" -int main(int argc, char *argv[]) { +int main() { // Open two new meshlink instance. - meshlink_handle_t *mesh1 = meshlink_open("sign_verify_conf.1", "foo", "sign-verify"); + meshlink_handle_t *mesh1 = meshlink_open("sign_verify_conf.1", "foo", "sign-verify", DEV_CLASS_BACKBONE); + if(!mesh1) { fprintf(stderr, "Could not initialize configuration for foo\n"); return 1; } - meshlink_handle_t *mesh2 = meshlink_open("sign_verify_conf.2", "bar", "sign-verify"); + meshlink_handle_t *mesh2 = meshlink_open("sign_verify_conf.2", "bar", "sign-verify", DEV_CLASS_BACKBONE); + if(!mesh2) { fprintf(stderr, "Could not initialize configuration for bar\n"); return 1; @@ -49,49 +51,55 @@ int main(int argc, char *argv[]) { static const char testdata2[] = "Test data 2."; char sig[MESHLINK_SIGLEN * 2]; - size_t siglen = sizeof sig * 2; + size_t siglen = sizeof(sig) * 2; - if(!meshlink_sign(mesh1, testdata1, sizeof testdata1, sig, &siglen)) { + if(!meshlink_sign(mesh1, testdata1, sizeof(testdata1), sig, &siglen)) { fprintf(stderr, "Signing failed\n"); return 1; } + if(siglen != MESHLINK_SIGLEN) { fprintf(stderr, "Signature has unexpected length %zu != %zu\n", siglen, MESHLINK_SIGLEN); return 1; } meshlink_node_t *foo = meshlink_get_node(mesh2, "foo"); + if(!foo) { fprintf(stderr, "Bar did not know about node foo\n"); return 1; } meshlink_node_t *bar = meshlink_get_node(mesh2, "bar"); + if(!bar) { fprintf(stderr, "Bar did not know about node bar\n"); return 1; } - if(!meshlink_verify(mesh2, foo, testdata1, sizeof testdata1, sig, siglen)) { + if(!meshlink_verify(mesh2, foo, testdata1, sizeof(testdata1), sig, siglen)) { fprintf(stderr, "False negative verification\n"); return 1; } // Check that bad signatures are revoked - if(meshlink_verify(mesh2, foo, testdata1, sizeof testdata1, sig, siglen / 2)) { + if(meshlink_verify(mesh2, foo, testdata1, sizeof(testdata1), sig, siglen / 2)) { fprintf(stderr, "False positive verification with half sized signature\n"); return 1; } - if(meshlink_verify(mesh2, foo, testdata1, sizeof testdata1, sig, siglen * 2)) { + + if(meshlink_verify(mesh2, foo, testdata1, sizeof(testdata1), sig, siglen * 2)) { fprintf(stderr, "False positive verification with double sized signature\n"); return 1; } - if(meshlink_verify(mesh2, foo, testdata2, sizeof testdata2, sig, siglen)) { + + if(meshlink_verify(mesh2, foo, testdata2, sizeof(testdata2), sig, siglen)) { fprintf(stderr, "False positive verification with wrong data\n"); return 1; } - if(meshlink_verify(mesh2, bar, testdata1, sizeof testdata1, sig, siglen)) { + + if(meshlink_verify(mesh2, bar, testdata1, sizeof(testdata1), sig, siglen)) { fprintf(stderr, "False positive verification with wrong signer\n"); return 1; }