@@ -112,8 +112,8 @@ UTEST(CRYPTO_C, PDU_SWITCH)
112
112
113
113
Crypto_Init ();
114
114
115
- sdls_frame .hdr .type = 0 ;
116
- sdls_frame .pdu .hdr .uf = 0 ;
115
+ sdls_frame .pdu . hdr .type = PDU_TYPE_COMMAND ;
116
+ sdls_frame .pdu .hdr .uf = PDU_USER_FLAG_FALSE ;
117
117
printf ("SG_KEY_MGMT\n" );
118
118
sdls_frame .pdu .hdr .sg = SG_KEY_MGMT ;
119
119
sdls_frame .pdu .hdr .pid = PID_OTAR ;
@@ -131,7 +131,6 @@ UTEST(CRYPTO_C, PDU_SWITCH)
131
131
status = Crypto_PDU (ingest , & tc_frame );
132
132
ASSERT_EQ (status , CRYPTO_LIB_SUCCESS );
133
133
134
- sdls_frame .pdu .hdr .pdu_len = 0 ;
135
134
sdls_frame .pdu .hdr .pid = PID_KEY_VERIFICATION ;
136
135
status = Crypto_PDU (ingest , & tc_frame );
137
136
ASSERT_EQ (status , CRYPTO_LIB_SUCCESS );
@@ -142,7 +141,7 @@ UTEST(CRYPTO_C, PDU_SWITCH)
142
141
143
142
sdls_frame .pdu .hdr .pid = PID_KEY_INVENTORY ;
144
143
status = Crypto_PDU (ingest , & tc_frame );
145
- ASSERT_EQ (status , CRYPTO_LIB_SUCCESS );
144
+ ASSERT_EQ (status , CRYPTOGRAPHY_UNSUPPORTED_OPERATION_FOR_KEY_RING );
146
145
147
146
sdls_frame .pdu .hdr .pid = SG_KEY_MGMT ;
148
147
status = Crypto_PDU (ingest , & tc_frame );
@@ -184,11 +183,11 @@ UTEST(CRYPTO_C, PDU_SWITCH)
184
183
185
184
sdls_frame .pdu .hdr .pid = PID_READ_ARSN ;
186
185
status = Crypto_PDU (ingest , & tc_frame );
187
- ASSERT_EQ (status , CRYPTO_LIB_SUCCESS );
186
+ ASSERT_EQ (status , CRYPTO_LIB_ERROR );
188
187
189
188
sdls_frame .pdu .hdr .pid = PID_SA_STATUS ;
190
189
status = Crypto_PDU (ingest , & tc_frame );
191
- ASSERT_EQ (status , CRYPTO_LIB_SUCCESS );
190
+ ASSERT_EQ (status , CRYPTO_LIB_ERROR );
192
191
193
192
sdls_frame .pdu .hdr .pid = 0b111 ;
194
193
status = Crypto_PDU (ingest , & tc_frame );
@@ -198,19 +197,19 @@ UTEST(CRYPTO_C, PDU_SWITCH)
198
197
sdls_frame .pdu .hdr .sg = SG_SEC_MON_CTRL ;
199
198
sdls_frame .pdu .hdr .pid = PID_LOG_STATUS ;
200
199
status = Crypto_PDU (ingest , & tc_frame );
201
- ASSERT_EQ (status , CRYPTO_LIB_SUCCESS );
200
+ ASSERT_EQ (status , CRYPTO_LIB_ERROR );
202
201
203
202
sdls_frame .pdu .hdr .pid = PID_DUMP_LOG ;
204
203
status = Crypto_PDU (ingest , & tc_frame );
205
- ASSERT_EQ (status , CRYPTO_LIB_SUCCESS );
204
+ ASSERT_EQ (status , CRYPTO_LIB_ERROR );
206
205
207
206
sdls_frame .pdu .hdr .pid = PID_ERASE_LOG ;
208
207
status = Crypto_PDU (ingest , & tc_frame );
209
- ASSERT_EQ (status , CRYPTO_LIB_SUCCESS );
208
+ ASSERT_EQ (status , CRYPTO_LIB_ERROR );
210
209
211
210
sdls_frame .pdu .hdr .pid = PID_SELF_TEST ;
212
211
status = Crypto_PDU (ingest , & tc_frame );
213
- ASSERT_EQ (status , CRYPTO_LIB_SUCCESS );
212
+ ASSERT_EQ (status , CRYPTO_LIB_ERROR );
214
213
215
214
sdls_frame .pdu .hdr .pid = PID_ALARM_FLAG ;
216
215
status = Crypto_PDU (ingest , & tc_frame );
@@ -220,53 +219,45 @@ UTEST(CRYPTO_C, PDU_SWITCH)
220
219
status = Crypto_PDU (ingest , & tc_frame );
221
220
ASSERT_EQ (status , CRYPTO_LIB_SUCCESS );
222
221
223
- printf ("PID_LOG_STATUS\n" );
224
- sdls_frame .pdu .hdr .sg = PID_LOG_STATUS ;
225
- sdls_frame .pdu .hdr .pid = PID_LOG_STATUS ;
226
- status = Crypto_PDU (ingest , & tc_frame );
227
- ASSERT_EQ (status , CRYPTO_LIB_SUCCESS );
228
-
229
222
printf ("UF_TRUE\n" );
230
- sdls_frame .pdu .hdr .uf = 1 ;
231
- sdls_frame .pdu .hdr .pid = 0 ;
223
+ sdls_frame .pdu .hdr .uf = PDU_USER_FLAG_TRUE ;
224
+ sdls_frame .pdu .hdr .pid = PID_IDLE_FRAME_TRIGGER ;
232
225
status = Crypto_PDU (ingest , & tc_frame );
233
226
ASSERT_EQ (status , CRYPTO_LIB_SUCCESS );
234
227
235
- sdls_frame .pdu .hdr .pid = 1 ;
228
+ sdls_frame .pdu .hdr .pid = PID_TOGGLE_BAD_SPI ;
236
229
status = Crypto_PDU (ingest , & tc_frame );
237
230
ASSERT_EQ (status , CRYPTO_LIB_SUCCESS );
238
231
239
- sdls_frame .pdu .hdr .pid = 2 ;
232
+ sdls_frame .pdu .hdr .pid = PID_TOGGLE_BAD_IV ;
240
233
status = Crypto_PDU (ingest , & tc_frame );
241
234
ASSERT_EQ (status , CRYPTO_LIB_SUCCESS );
242
235
243
- sdls_frame .pdu .hdr .pid = 3 ;
236
+ sdls_frame .pdu .hdr .pid = PID_TOGGLE_BAD_MAC ;
244
237
status = Crypto_PDU (ingest , & tc_frame );
245
238
ASSERT_EQ (status , CRYPTO_LIB_SUCCESS );
246
239
247
- sdls_frame .pdu .hdr .pid = 4 ;
240
+ sdls_frame .pdu .hdr .pid = PID_TOGGLE_BAD_FECF ;
248
241
status = Crypto_PDU (ingest , & tc_frame );
249
242
ASSERT_EQ (status , CRYPTO_LIB_SUCCESS );
250
243
251
- sdls_frame .pdu .hdr .pid = 5 ;
244
+ sdls_frame .pdu .hdr .pid = PID_MODIFY_KEY ;
252
245
status = Crypto_PDU (ingest , & tc_frame );
253
246
ASSERT_EQ (status , CRYPTO_LIB_SUCCESS );
254
247
255
- sdls_frame .pdu .hdr .pid = 6 ;
248
+ sdls_frame .pdu .hdr .pid = PID_MODIFY_ACTIVE_TM ;
256
249
status = Crypto_PDU (ingest , & tc_frame );
257
250
ASSERT_EQ (status , CRYPTO_LIB_SUCCESS );
258
251
259
- // TODO: (RB) Disabled for now. Key Inventory needs to be re-worked. - Not currently using EP
260
-
261
- // sdls_frame.pdu.hdr.pid = 7;
262
- // status = Crypto_PDU(ingest, &tc_frame);
263
- // ASSERT_EQ(status, CRYPTO_LIB_SUCCESS);
252
+ sdls_frame .pdu .hdr .pid = PID_MODIFY_VCID ;
253
+ status = Crypto_PDU (ingest , & tc_frame );
254
+ ASSERT_EQ (status , CRYPTO_LIB_ERROR );
264
255
265
256
sdls_frame .pdu .hdr .pid = 8 ;
266
257
status = Crypto_PDU (ingest , & tc_frame );
267
258
ASSERT_EQ (status , CRYPTO_LIB_SUCCESS );
268
259
269
- sdls_frame .hdr .type = 1 ;
260
+ sdls_frame .hdr .type = PDU_TYPE_REPLY ;
270
261
sdls_frame .pdu .hdr .pid = 8 ;
271
262
status = Crypto_PDU (ingest , & tc_frame );
272
263
ASSERT_EQ (status , CRYPTO_LIB_SUCCESS );
@@ -360,4 +351,48 @@ UTEST(CRYPTO_C, GET_ECS_ALGO_KEY_LEN)
360
351
ASSERT_EQ (algo_keylen , 32 );
361
352
}
362
353
354
+ UTEST (CRYPTO_C , STRUCT_SIZE_VERIFICATION )
355
+ {
356
+ ASSERT_EQ (CRYPTO_GVCID_SIZE , (size_t )4 );
357
+ ASSERT_EQ (SA_SIZE , (size_t )2348 );
358
+ ASSERT_EQ (SDLS_FSR_SIZE , (size_t )4 );
359
+ ASSERT_EQ (SDLS_TLV_HDR_SIZE , (size_t )3 );
360
+ ASSERT_EQ (SDLS_TLV_SIZE , (size_t )497 );
361
+ ASSERT_EQ (SDLS_EKB_SIZE , (size_t )514 );
362
+ ASSERT_EQ (SDLS_OTAR_SIZE , (size_t )(2 + 16 + 30 * 514 + 16 ));
363
+ ASSERT_EQ (SDLS_KEY_SIZE , (size_t )2 );
364
+ ASSERT_EQ (SDLS_KEY_INVENTORY_CMD_SIZE , (size_t )4 );
365
+ ASSERT_EQ (SDLS_KEY_INVENTORY_RPLY_SIZE , (size_t )3 );
366
+ ASSERT_EQ (SDLS_KEYV_CMD_BLK_SIZE , (size_t )18 );
367
+ ASSERT_EQ (SDLS_KEYV_CMD_SIZE , (size_t )(29 * 18 ));
368
+ ASSERT_EQ (SDLS_KEYV_RPLY_BLK_SIZE , (size_t )50 );
369
+ ASSERT_EQ (SDLS_KEYV_RPLY_SIZE , (size_t )(50 * 29 ));
370
+ ASSERT_EQ (SDLS_KEYDB_CMD_SIZE , (size_t )12 );
371
+ ASSERT_EQ (SDLS_KEYDB_RPLY_SIZE , (size_t )38 );
372
+ ASSERT_EQ (SDLS_SA_STATUS_RPLY_SIZE , (size_t )3 );
373
+ ASSERT_EQ (SDLS_SA_READ_ARSN_RPLY_SIZE , (size_t )22 );
374
+ ASSERT_EQ (SDLS_MC_LOG_RPLY_SIZE , (size_t )4 );
375
+ ASSERT_EQ (SDLS_MC_DUMP_RPLY_SIZE , (size_t )7 );
376
+ ASSERT_EQ (SDLS_MC_DUMP_BLK_RPLY_SIZE , (size_t )(7 * 50 ));
377
+ ASSERT_EQ (SDLS_MC_ST_RPLY_SIZE , (size_t )1 );
378
+ ASSERT_EQ (SDLS_MC_SN_RPLY_SIZE , (size_t )16 );
379
+ ASSERT_EQ (TC_FRAME_PRIMARYHEADER_STRUCT_SIZE , (size_t )5 );
380
+ ASSERT_EQ (TC_FRAME_SECHEADER_SIZE , (size_t )70 );
381
+ ASSERT_EQ (TC_FRAME_SECTRAILER_SIZE , (size_t )19 );
382
+ ASSERT_EQ (TC_SIZE , (size_t )(5 + 70 + 19 + 2 + 1019 ));
383
+ ASSERT_EQ (CCSDS_HDR_SIZE , (size_t )6 );
384
+ ASSERT_EQ (CCSDS_PUS_SIZE , (size_t )4 );
385
+ ASSERT_EQ (CCSDS_SIZE , (size_t )(6 + 4 + 497 ));
386
+ ASSERT_EQ (TELEMETRY_FRAME_OCF_CLCW_SIZE , (size_t )4 );
387
+ ASSERT_EQ (TELEMETRY_FRAME_OCF_FSR_SIZE , (size_t )4 );
388
+ ASSERT_EQ (TM_FRAME_PRIMARYHEADER_SIZE , (size_t )6 );
389
+ ASSERT_EQ (TM_FRAME_SECHEADER_SIZE , (size_t )18 );
390
+ ASSERT_EQ (TM_FRAME_SECTRAILER_SIZE , (size_t )22 );
391
+ ASSERT_EQ (TM_SIZE , (size_t )(6 + 18 + 1786 + 22 ));
392
+ ASSERT_EQ (AOS_FRAME_PRIMARYHEADER_SIZE , (size_t )8 );
393
+ ASSERT_EQ (AOS_FRAME_SECHEADER_SIZE , (size_t )18 );
394
+ ASSERT_EQ (AOS_FRAME_SECTRAILER_SIZE , (size_t )22 );
395
+ ASSERT_EQ (AOS_SIZE , (size_t )(8 + 18 + 1786 + 22 ));
396
+ }
397
+
363
398
UTEST_MAIN ();
0 commit comments