void test_HaveKeyIncorrect(void) { const keyid_t KEYNO = 2; TEST_ASSERT_FALSE(auth_havekey(KEYNO)); TEST_ASSERT_FALSE(authhavekey(KEYNO)); }
TEST_F(authkeysTest, HaveKeyCorrect) { const keyid_t KEYNO = 3; AddTrustedKey(KEYNO); EXPECT_TRUE(auth_havekey(KEYNO)); EXPECT_TRUE(authhavekey(KEYNO)); }
void test_HaveKeyCorrect(void) { const keyid_t KEYNO = 3; AddTrustedKey(KEYNO); TEST_ASSERT_TRUE(auth_havekey(KEYNO)); TEST_ASSERT_TRUE(authhavekey(KEYNO)); }
/* * authdecrypt - verify message authenticator * * Returns true if authenticator valid, false if invalid or not found. */ int authdecrypt( keyid_t keyno, uint32_t * pkt, int length, int size ) { /* * A zero key identifier means the sender has not verified * the last message was correctly authenticated. For our * purpose this is an invalid authenticator. */ authdecryptions++; if (0 == keyno || !authhavekey(keyno) || size < 4) { return false; } return MD5authdecrypt(cache_type, cache_secret, pkt, length, size); }
/* * authencrypt - generate message authenticator * * Returns length of authenticator field, zero if key not found. */ int authencrypt( keyid_t keyno, uint32_t * pkt, int length ) {\ /* * A zero key identifier means the sender has not verified * the last message was correctly authenticated. The MAC * consists of a single word with value zero. */ authencryptions++; pkt[length / 4] = htonl(keyno); if (0 == keyno) { return 4; } if (!authhavekey(keyno)) { return 0; } return MD5authencrypt(cache_type, cache_secret, pkt, length); }
TEST_F(authkeysTest, HaveKeyIncorrect) { const keyid_t KEYNO = 2; EXPECT_FALSE(auth_havekey(KEYNO)); EXPECT_FALSE(authhavekey(KEYNO)); }