forked from wolfSSL/wolfssl
add snifftest script check to make check
This commit is contained in:
1
.gitignore
vendored
1
.gitignore
vendored
@ -78,6 +78,7 @@ pkcs7signedData.der
|
|||||||
pkcs7envelopedData.der
|
pkcs7envelopedData.der
|
||||||
diff
|
diff
|
||||||
sslSniffer/sslSnifferTest/tracefile.txt
|
sslSniffer/sslSnifferTest/tracefile.txt
|
||||||
|
tracefile.txt
|
||||||
*.gz
|
*.gz
|
||||||
*.zip
|
*.zip
|
||||||
*.bak
|
*.bak
|
||||||
|
@ -16,6 +16,8 @@ EXTRA_HEADERS =
|
|||||||
BUILT_SOURCES=
|
BUILT_SOURCES=
|
||||||
EXTRA_DIST=
|
EXTRA_DIST=
|
||||||
dist_doc_DATA=
|
dist_doc_DATA=
|
||||||
|
dist_noinst_SCRIPTS =
|
||||||
|
check_SCRIPTS =
|
||||||
|
|
||||||
#includes additional rules from aminclude.am
|
#includes additional rules from aminclude.am
|
||||||
@INC_AMINCLUDE@
|
@INC_AMINCLUDE@
|
||||||
@ -94,6 +96,7 @@ include mcapi/wolfcrypt_test.X/nbproject/include.am
|
|||||||
include mcapi/wolfssl.X/nbproject/include.am
|
include mcapi/wolfssl.X/nbproject/include.am
|
||||||
include mcapi/zlib.X/nbproject/include.am
|
include mcapi/zlib.X/nbproject/include.am
|
||||||
include tirtos/include.am
|
include tirtos/include.am
|
||||||
|
include scripts/include.am
|
||||||
|
|
||||||
if USE_VALGRIND
|
if USE_VALGRIND
|
||||||
TESTS_ENVIRONMENT=./valgrind-error.sh
|
TESTS_ENVIRONMENT=./valgrind-error.sh
|
||||||
@ -101,6 +104,10 @@ endif
|
|||||||
|
|
||||||
TEST_EXTENSIONS=.test
|
TEST_EXTENSIONS=.test
|
||||||
TESTS += $(check_PROGRAMS)
|
TESTS += $(check_PROGRAMS)
|
||||||
|
|
||||||
|
check_SCRIPTS+= $(dist_noinst_SCRIPTS)
|
||||||
|
TESTS += $(check_SCRIPTS)
|
||||||
|
|
||||||
test: check
|
test: check
|
||||||
tests/unit.log: testsuite/testsuite.log
|
tests/unit.log: testsuite/testsuite.log
|
||||||
|
|
||||||
|
9
scripts/include.am
Normal file
9
scripts/include.am
Normal file
@ -0,0 +1,9 @@
|
|||||||
|
# vim:ft=automake
|
||||||
|
# included from Top Level Makefile.am
|
||||||
|
# All paths should be given relative to the root
|
||||||
|
|
||||||
|
|
||||||
|
if BUILD_SNIFFTEST
|
||||||
|
dist_noinst_SCRIPTS+= scripts/sniffer-testsuite.test
|
||||||
|
endif
|
||||||
|
EXTRA_DIST += scripts/testsuite.pcap
|
13
scripts/sniffer-testsuite.test
Executable file
13
scripts/sniffer-testsuite.test
Executable file
@ -0,0 +1,13 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
#sniffer-testsuite.test
|
||||||
|
|
||||||
|
echo -e "\nStaring snifftest on testsuite.pcap...\n"
|
||||||
|
./sslSniffer/sslSnifferTest/snifftest ./scripts/testsuite.pcap ./certs/server-key.pem 127.0.0.1 11111
|
||||||
|
|
||||||
|
RESULT=$?
|
||||||
|
[ $RESULT -ne 0 ] && echo -e "\nsnifftest failed\n" && exit 1
|
||||||
|
|
||||||
|
echo -e "\nSuccess!\n"
|
||||||
|
|
||||||
|
exit 0
|
BIN
scripts/testsuite.pcap
Normal file
BIN
scripts/testsuite.pcap
Normal file
Binary file not shown.
@ -123,6 +123,7 @@ static char* iptos(unsigned int addr)
|
|||||||
int main(int argc, char** argv)
|
int main(int argc, char** argv)
|
||||||
{
|
{
|
||||||
int ret = 0;
|
int ret = 0;
|
||||||
|
int hadBadPacket = 0;
|
||||||
int inum;
|
int inum;
|
||||||
int port;
|
int port;
|
||||||
int saveFile = 0;
|
int saveFile = 0;
|
||||||
@ -303,8 +304,10 @@ int main(int argc, char** argv)
|
|||||||
continue;
|
continue;
|
||||||
|
|
||||||
ret = ssl_DecodePacket(packet, header.caplen, data, err);
|
ret = ssl_DecodePacket(packet, header.caplen, data, err);
|
||||||
if (ret < 0)
|
if (ret < 0) {
|
||||||
printf("ssl_Decode ret = %d, %s\n", ret, err);
|
printf("ssl_Decode ret = %d, %s\n", ret, err);
|
||||||
|
hadBadPacket = 1;
|
||||||
|
}
|
||||||
if (ret > 0) {
|
if (ret > 0) {
|
||||||
data[ret] = 0;
|
data[ret] = 0;
|
||||||
printf("SSL App Data(%d:%d):%s\n", packetNumber, ret, data);
|
printf("SSL App Data(%d:%d):%s\n", packetNumber, ret, data);
|
||||||
@ -315,7 +318,7 @@ int main(int argc, char** argv)
|
|||||||
}
|
}
|
||||||
FreeAll();
|
FreeAll();
|
||||||
|
|
||||||
return EXIT_SUCCESS;
|
return hadBadPacket ? EXIT_FAILURE : EXIT_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|
||||||
#endif /* full build */
|
#endif /* full build */
|
||||||
|
Reference in New Issue
Block a user