aboutsummaryrefslogtreecommitdiffstats
path: root/test/cipherpack
diff options
context:
space:
mode:
authorSven Gothel <[email protected]>2022-06-26 20:51:38 +0200
committerSven Gothel <[email protected]>2022-06-26 20:51:38 +0200
commit1d8ac82fa2c3c92e077b7c25465237faf6f1e370 (patch)
tree0beafa5563f6265ce5b53fdf2a8be5feebd92b39 /test/cipherpack
parentb477ec4ccaf00bd2bcb65f1392b359384ab4fe1d (diff)
test_01_cipherpack.cpp: Fix test-name output
Diffstat (limited to 'test/cipherpack')
-rw-r--r--test/cipherpack/test_01_cipherpack.cpp24
1 files changed, 12 insertions, 12 deletions
diff --git a/test/cipherpack/test_01_cipherpack.cpp b/test/cipherpack/test_01_cipherpack.cpp
index 3b87136..7c73321 100644
--- a/test/cipherpack/test_01_cipherpack.cpp
+++ b/test/cipherpack/test_01_cipherpack.cpp
@@ -230,8 +230,8 @@ class Test01Cipherpack : public TestData {
sign_sec_key1_fname, sign_sec_key_passphrase,
source, fname_payload_lst[file_idx], "test_case", payload_version, payload_version_parent,
silentListener, fname_payload_encrypted_lst[file_idx]);
- jau::PLAIN_PRINT(true, "test02_enc_dec_file_error: Encrypted %s to %s\n", fname_payload_lst[file_idx].c_str(), fname_payload_encrypted_lst[file_idx].c_str());
- jau::PLAIN_PRINT(true, "test02_enc_dec_file_error: %s\n", ph1.toString(true, true).c_str());
+ jau::PLAIN_PRINT(true, "test11_dec_http_ok: Encrypted %s to %s\n", fname_payload_lst[file_idx].c_str(), fname_payload_encrypted_lst[file_idx].c_str());
+ jau::PLAIN_PRINT(true, "test11_dec_http_ok: %s\n", ph1.toString(true, true).c_str());
REQUIRE( ph1.isValid() == true );
const std::string uri_encrypted = url_input_root + fname_payload_encrypted_lst[file_idx];
@@ -278,8 +278,8 @@ class Test01Cipherpack : public TestData {
sign_sec_key1_fname, sign_sec_key_passphrase,
source, fname_payload_lst[file_idx], "test_case", payload_version, payload_version_parent,
silentListener, fname_payload_encrypted_lst[file_idx]);
- jau::PLAIN_PRINT(true, "test02_enc_dec_file_error: Encrypted %s to %s\n", fname_payload_lst[file_idx].c_str(), fname_payload_encrypted_lst[file_idx].c_str());
- jau::PLAIN_PRINT(true, "test02_enc_dec_file_error: %s\n", ph1.toString(true, true).c_str());
+ jau::PLAIN_PRINT(true, "test12_dec_http_ok: Encrypted %s to %s\n", fname_payload_lst[file_idx].c_str(), fname_payload_encrypted_lst[file_idx].c_str());
+ jau::PLAIN_PRINT(true, "test12_dec_http_ok: %s\n", ph1.toString(true, true).c_str());
REQUIRE( ph1.isValid() == true );
const std::string uri_encrypted = url_input_root + fname_payload_encrypted_lst[file_idx];
@@ -308,8 +308,8 @@ class Test01Cipherpack : public TestData {
sign_sec_key1_fname, sign_sec_key_passphrase,
source, fname_payload_lst[file_idx], "test_case", payload_version, payload_version_parent,
silentListener, fname_payload_encrypted_lst[file_idx]);
- jau::PLAIN_PRINT(true, "test02_enc_dec_file_error: Encrypted %s to %s\n", fname_payload_lst[file_idx].c_str(), fname_payload_encrypted_lst[file_idx].c_str());
- jau::PLAIN_PRINT(true, "test02_enc_dec_file_error: %s\n", ph1.toString(true, true).c_str());
+ jau::PLAIN_PRINT(true, "test13_dec_http_error: Encrypted %s to %s\n", fname_payload_lst[file_idx].c_str(), fname_payload_encrypted_lst[file_idx].c_str());
+ jau::PLAIN_PRINT(true, "test13_dec_http_error: %s\n", ph1.toString(true, true).c_str());
REQUIRE( ph1.isValid() == true );
const std::string uri_encrypted = url_input_root + fname_payload_encrypted_lst[file_idx];
@@ -322,8 +322,8 @@ class Test01Cipherpack : public TestData {
cipherpack::PackHeader ph2 = cipherpack::checkSignThenDecrypt(sign_pub_keys, dec_sec_key4_fname, dec_sec_key_passphrase,
enc_stream,
silentListener, file_decrypted);
- jau::PLAIN_PRINT(true, "test12_dec_http_error: Decypted %s to %s\n", uri_encrypted.c_str(), file_decrypted.c_str());
- jau::PLAIN_PRINT(true, "test12_dec_http_error: %s\n", ph2.toString(true, true).c_str());
+ jau::PLAIN_PRINT(true, "test13_dec_http_error: Decypted %s to %s\n", uri_encrypted.c_str(), file_decrypted.c_str());
+ jau::PLAIN_PRINT(true, "test13_dec_http_error: %s\n", ph2.toString(true, true).c_str());
REQUIRE( ph2.isValid() == false );
}
{
@@ -333,8 +333,8 @@ class Test01Cipherpack : public TestData {
cipherpack::PackHeader ph2 = cipherpack::checkSignThenDecrypt(sign_pub_keys_nope, dec_sec_key2_fname, dec_sec_key_passphrase,
enc_stream,
silentListener, file_decrypted);
- jau::PLAIN_PRINT(true, "test12_dec_http_error: Decypted %s to %s\n", uri_encrypted.c_str(), file_decrypted.c_str());
- jau::PLAIN_PRINT(true, "test12_dec_http_error: %s\n", ph2.toString(true, true).c_str());
+ jau::PLAIN_PRINT(true, "test13_dec_http_error: Decypted %s to %s\n", uri_encrypted.c_str(), file_decrypted.c_str());
+ jau::PLAIN_PRINT(true, "test13_dec_http_error: %s\n", ph2.toString(true, true).c_str());
REQUIRE( ph2.isValid() == false );
}
{
@@ -344,8 +344,8 @@ class Test01Cipherpack : public TestData {
cipherpack::PackHeader ph2 = cipherpack::checkSignThenDecrypt(sign_pub_keys, dec_sec_key2_fname, dec_sec_key_passphrase,
enc_stream,
silentListener, file_decrypted);
- jau::PLAIN_PRINT(true, "test12_dec_http_error: Decypted %s to %s\n", uri_encrypted.c_str(), file_decrypted.c_str());
- jau::PLAIN_PRINT(true, "test12_dec_http_error: %s\n", ph2.toString(true, true).c_str());
+ jau::PLAIN_PRINT(true, "test13_dec_http_error: Decypted %s to %s\n", uri_encrypted.c_str(), file_decrypted.c_str());
+ jau::PLAIN_PRINT(true, "test13_dec_http_error: %s\n", ph2.toString(true, true).c_str());
REQUIRE( ph2.isValid() == false );
}
}