Skip to content

Commit f89909b

Browse files
committed
use macros in ssh_test()
1 parent 8b5ce8b commit f89909b

File tree

1 file changed

+15
-16
lines changed

1 file changed

+15
-16
lines changed

tests/ssh_test.c

Lines changed: 15 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -67,10 +67,9 @@ static int _ssh_encoding_test(void)
6767
/* Buffer too short */
6868
buflen = 3;
6969
zeromem(buffer, BUFSIZE);
70-
err = ssh_encode_sequence_multi(buffer, &buflen,
71-
LTC_SSHDATA_UINT32, 0x29b7f4aa,
72-
LTC_SSHDATA_EOL, NULL);
73-
if (err != CRYPT_BUFFER_OVERFLOW) return CRYPT_FAIL_TESTVECTOR;
70+
SHOULD_FAIL(ssh_encode_sequence_multi(buffer, &buflen,
71+
LTC_SSHDATA_UINT32, 0x29b7f4aa,
72+
LTC_SSHDATA_EOL, NULL));
7473

7574

7675
/* byte */
@@ -205,29 +204,29 @@ static int _ssh_decoding_test(void)
205204
DO(ssh_decode_sequence_multi(byte1, sizeof(byte1),
206205
LTC_SSHDATA_BYTE, &tmp8,
207206
LTC_SSHDATA_EOL, NULL));
208-
if (tmp8 != 0x01) return CRYPT_FAIL_TESTVECTOR;
207+
ENSURE(tmp8 == 0x01);
209208

210209
DO(ssh_decode_sequence_multi(byte2, sizeof(byte2),
211210
LTC_SSHDATA_BYTE, &tmp8,
212211
LTC_SSHDATA_EOL, NULL));
213-
if (tmp8 != 0x71) return CRYPT_FAIL_TESTVECTOR;
212+
ENSURE(tmp8 == 0x71);
214213

215214
/* boolean */
216215
DO(ssh_decode_sequence_multi(byte1, sizeof(byte1),
217216
LTC_SSHDATA_BOOLEAN, &tmp8,
218217
LTC_SSHDATA_EOL, NULL));
219-
if (tmp8 != 0x01) return CRYPT_FAIL_TESTVECTOR;
218+
ENSURE(tmp8 == 0x01);
220219

221220
DO(ssh_decode_sequence_multi(byte2, sizeof(byte2),
222221
LTC_SSHDATA_BOOLEAN, &tmp8,
223222
LTC_SSHDATA_EOL, NULL));
224-
if (tmp8 != 0x01) return CRYPT_FAIL_TESTVECTOR;
223+
ENSURE(tmp8 == 0x01);
225224

226225
/* uint32 */
227226
DO(ssh_decode_sequence_multi(uint32, sizeof(uint32),
228227
LTC_SSHDATA_UINT32, &tmp32,
229228
LTC_SSHDATA_EOL, NULL));
230-
if (tmp32 != 0x29b7f4aa) return CRYPT_FAIL_TESTVECTOR;
229+
ENSURE(tmp32 == 0x29b7f4aa);
231230

232231
/* uint64 */
233232
DO(ssh_decode_sequence_multi(uint64, sizeof(uint64),
@@ -240,7 +239,7 @@ static int _ssh_decoding_test(void)
240239
DO(ssh_decode_sequence_multi(string, sizeof(string),
241240
LTC_SSHDATA_STRING, strbuf, BUFSIZE,
242241
LTC_SSHDATA_EOL, NULL));
243-
if (XSTRCMP(strbuf, "testing") != 0) return CRYPT_FAIL_TESTVECTOR;
242+
ENSURE(XSTRCMP(strbuf, "testing") == 0);
244243

245244
/* mpint */
246245
if ((err = mp_init_multi(&u, &v, NULL)) != CRYPT_OK) {
@@ -250,18 +249,18 @@ static int _ssh_decoding_test(void)
250249
DO(ssh_decode_sequence_multi(mpint1, sizeof(mpint1),
251250
LTC_SSHDATA_MPINT, v,
252251
LTC_SSHDATA_EOL, NULL));
253-
if (mp_cmp_d(v, 0) != LTC_MP_EQ) return CRYPT_FAIL_TESTVECTOR;
252+
ENSURE(mp_cmp_d(v, 0) == LTC_MP_EQ);
254253

255254
DO(mp_read_radix(u, "9a378f9b2e332a7", 16));
256255
DO(ssh_decode_sequence_multi(mpint2, sizeof(mpint2),
257256
LTC_SSHDATA_MPINT, v,
258257
LTC_SSHDATA_EOL, NULL));
259-
if (mp_cmp(u, v) != LTC_MP_EQ) return CRYPT_FAIL_TESTVECTOR;
258+
ENSURE(mp_cmp(u, v) == LTC_MP_EQ);
260259

261260
DO(ssh_decode_sequence_multi(mpint3, sizeof(mpint3),
262261
LTC_SSHDATA_MPINT, v,
263262
LTC_SSHDATA_EOL, NULL));
264-
if (mp_cmp_d(v, 0x80) != LTC_MP_EQ) return CRYPT_FAIL_TESTVECTOR;
263+
ENSURE(mp_cmp_d(v, 0x80) == LTC_MP_EQ);
265264

266265
mp_clear_multi(v, u, NULL);
267266

@@ -270,19 +269,19 @@ static int _ssh_decoding_test(void)
270269
DO(ssh_decode_sequence_multi(nlist1, sizeof(nlist1),
271270
LTC_SSHDATA_NAMELIST, strbuf, BUFSIZE,
272271
LTC_SSHDATA_EOL, NULL));
273-
if (XSTRCMP(strbuf, "") != 0) return CRYPT_FAIL_TESTVECTOR;
272+
ENSURE(XSTRCMP(strbuf, "") == 0);
274273

275274
zeromem(strbuf, BUFSIZE);
276275
DO(ssh_decode_sequence_multi(nlist2, sizeof(nlist2),
277276
LTC_SSHDATA_NAMELIST, strbuf, BUFSIZE,
278277
LTC_SSHDATA_EOL, NULL));
279-
if (XSTRCMP(strbuf, "zlib") != 0) return CRYPT_FAIL_TESTVECTOR;
278+
ENSURE(XSTRCMP(strbuf, "zlib") == 0);
280279

281280
zeromem(strbuf, BUFSIZE);
282281
DO(ssh_decode_sequence_multi(nlist3, sizeof(nlist3),
283282
LTC_SSHDATA_NAMELIST, strbuf, BUFSIZE,
284283
LTC_SSHDATA_EOL, NULL));
285-
if (XSTRCMP(strbuf, "zlib,none") != 0) return CRYPT_FAIL_TESTVECTOR;
284+
ENSURE(XSTRCMP(strbuf, "zlib,none") == 0);
286285

287286

288287
return CRYPT_OK;

0 commit comments

Comments
 (0)