]> CyberLeo.Net >> Repos - FreeBSD/releng/10.2.git/blob - contrib/ntp/tests/libntp/g_ssl_init.cpp
Fix a regression with SA-15:24 patch that prevented NIS from
[FreeBSD/releng/10.2.git] / contrib / ntp / tests / libntp / g_ssl_init.cpp
1 #include "g_libntptest.h"
2
3 extern "C" {
4 #ifdef OPENSSL
5 # include "openssl/err.h"
6 # include "openssl/rand.h"
7 # include "openssl/evp.h"
8 #endif
9 #include "ntp.h"
10 };
11
12 class ssl_initTest : public libntptest {
13 protected:
14         static const size_t TEST_MD5_DIGEST_LENGTH = 16;
15         static const size_t TEST_SHA1_DIGEST_LENGTH = 20;
16 };
17
18 // keytype_from_text()
19 TEST_F(ssl_initTest, MD5KeyTypeWithoutDigestLength) {
20         ASSERT_EQ(KEY_TYPE_MD5, keytype_from_text("MD5", NULL));
21 }
22
23 TEST_F(ssl_initTest, MD5KeyTypeWithDigestLength) {
24         size_t digestLength;
25         size_t expected = TEST_MD5_DIGEST_LENGTH;
26
27         EXPECT_EQ(KEY_TYPE_MD5, keytype_from_text("MD5", &digestLength));
28         EXPECT_EQ(expected, digestLength);
29 }
30
31 #ifdef OPENSSL
32 TEST_F(ssl_initTest, SHA1KeyTypeWithDigestLength) {
33         size_t digestLength;
34         size_t expected = TEST_SHA1_DIGEST_LENGTH;
35
36         EXPECT_EQ(NID_sha, keytype_from_text("SHA", &digestLength));
37         EXPECT_EQ(expected, digestLength);
38 }
39 #endif  /* OPENSSL */
40
41 // keytype_name()
42 TEST_F(ssl_initTest, MD5KeyName) {
43         EXPECT_STREQ("MD5", keytype_name(KEY_TYPE_MD5));
44 }
45
46 #ifdef OPENSSL
47 TEST_F(ssl_initTest, SHA1KeyName) {
48         EXPECT_STREQ("SHA", keytype_name(NID_sha));
49 }
50 #endif  /* OPENSSL */