* @li Connection type ECORE_CON_LOAD_CERT | ECORE_CON_REMOTE_TCP
* @li Server data a string "Server_info"
* @li Client data a string "Client_info"
- * @li Server ca file server.pem
+ * @li Server ca file ecore_con/server.pem
* @li Server key file server.key
* @li Timeout value 10
*
ck_abort_msg("[TEST_FAIL]:: %s[%d] : Test has failed..", __FILE__, __LINE__);
}
- if (!ecore_con_ssl_server_cert_add(server, "server.pem"))
+ if (!ecore_con_ssl_server_cert_add(server, "ecore_con/server.pem"))
{
ecore_con_server_del(server);
free(server_data);
ck_abort_msg("[TEST_FAIL]:: %s[%d] : Test has failed..", __FILE__, __LINE__);
}
- if (!ecore_con_ssl_server_privkey_add(server, "server.key"))
+ if (!ecore_con_ssl_server_privkey_add(server, "ecore_con/server.key"))
{
ecore_con_server_del(server);
free(server_data);
ck_abort_msg("[TEST_FAIL]:: %s[%d] : Test has failed..", __FILE__, __LINE__);
}
- if (!ecore_con_ssl_server_cafile_add(server, "server.pem"))
+ if (!ecore_con_ssl_server_cafile_add(server, "ecore_con/server.pem"))
{
ecore_con_server_del(server);
free(server_data);
* @li Server IP adress 127.0.0.1
* @li Server port 1111
* @li Connection type ECORE_CON_LOAD_CERT | ECORE_CON_REMOTE_TCP | ECORE_CON_USE_MIXED
- * @li Server ca file server.pem
+ * @li Server ca file ecore_con/server.pem
* @li Server key file server.key
* @li Timeout value 1
*
ck_abort_msg("[TEST_FAIL]:: %s[%d] : Test has failed..\n", __func__, __LINE__);
}
- if (!ecore_con_ssl_server_cert_add(server, "server.pem"))
+ if (!ecore_con_ssl_server_cert_add(server, "ecore_con/server.pem"))
{
free(server_data);
ck_abort_msg("[TEST_FAIL]:: %s[%d] : Test has failed..\n", __func__, __LINE__);
}
- if (!ecore_con_ssl_server_privkey_add(server, "server.key"))
+ if (!ecore_con_ssl_server_privkey_add(server, "ecore_con/server.key"))
{
free(server_data);
ck_abort_msg("[TEST_FAIL]:: %s[%d] : Test has failed..\n", __func__, __LINE__);
ck_abort_msg("[TEST_FAIL]:: %s[%d] : Test has failed..\n", __func__, __LINE__);
}
- if (!ecore_con_ssl_server_cafile_add(server, "server.pem"))
+ if (!ecore_con_ssl_server_cafile_add(server, "ecore_con/server.pem"))
{
free(server_data);
free(client_data);
#include "../utc_ecore_common.h"
#include <Ecore_Con.h>
-Ecore_Timer *loop_timer_quit = NULL;
+static Ecore_Timer *loop_timer_quit = NULL;
static Eina_Bool
_timer_cb(void *data EINA_UNUSED)
ck_abort_msg("[TEST_FAIL]:: %s[%d] : Test has failed..", __FILE__, __LINE__);
return EINA_FALSE;
}
-Eina_Bool
+static Eina_Bool
_add_server(void *data EINA_UNUSED, int type EINA_UNUSED, Ecore_Con_Event_Server_Add *ev)
{
ecore_con_server_send(ev->server, "hello!", 6);
return ECORE_CALLBACK_RENEW;
}
-Eina_Bool
+static Eina_Bool
_del_server(void *data EINA_UNUSED, int type EINA_UNUSED, Ecore_Con_Event_Server_Del *ev)
{
return ECORE_CALLBACK_RENEW;
}
-Eina_Bool
+static Eina_Bool
_data_server(void *data EINA_UNUSED, int type EINA_UNUSED, Ecore_Con_Event_Server_Data *ev)
{
return ECORE_CALLBACK_RENEW;
}
-Eina_Bool
+static Eina_Bool
_add(void *data EINA_UNUSED, int type EINA_UNUSED, Ecore_Con_Event_Client_Add *ev)
{
ecore_con_client_send(ev->client, "hello!", 6);
return ECORE_CALLBACK_RENEW;
}
-Eina_Bool
+static Eina_Bool
_del(void *data EINA_UNUSED, int type EINA_UNUSED, Ecore_Con_Event_Client_Del *ev)
{
return ECORE_CALLBACK_RENEW;
}
-Eina_Bool
+static Eina_Bool
_data(void *data EINA_UNUSED, int type EINA_UNUSED, Ecore_Con_Event_Client_Data *ev)
{
return ECORE_CALLBACK_RENEW;
* there is no segmentation fail.
* @n Input Data:
* @li svr - the server object.
- * @li "new_cert/ca.crl" - The path to the CRL file.
+ * @li "ecore_con/new_cert/ca.crl" - The path to the CRL file.
*
*
* @procedure
ck_abort_msg("[TEST_FAIL]:: %s[%d] : Test has failed ..", __FILE__, __LINE__);
}
- if (!ecore_con_ssl_server_cert_add(svr, "new_cert/capub.pem"))
+ if (!ecore_con_ssl_server_cert_add(svr, "ecore_con/new_cert/capub.pem"))
{
ck_abort_msg("[TEST_FAIL]:: %s[%d] : Test has failed..", __FILE__, __LINE__);
}
- if (!ecore_con_ssl_server_privkey_add(svr, "new_cert/ca.key"))
+ if (!ecore_con_ssl_server_privkey_add(svr, "ecore_con/new_cert/ca.key"))
{
ck_abort_msg("[TEST_FAIL]:: %s[%d] : Test has failed..", __FILE__, __LINE__);
}
- if (!ecore_con_ssl_server_crl_add(svr, "new_cert/ca.crl"))
+ if (!ecore_con_ssl_server_crl_add(svr, "ecore_con/new_cert/ca.crl"))
{
ck_abort_msg("[TEST_FAIL]:: %s[%d] : Test has failed ..", __FILE__, __LINE__);
}
ck_abort_msg("[TEST_FAIL]:: %s[%d] : Test has failed ..", __FILE__, __LINE__);
}
- if (!ecore_con_ssl_server_cafile_add(client, "new_cert/capub.pem"))
+ if (!ecore_con_ssl_server_cafile_add(client, "ecore_con/new_cert/capub.pem"))
{
ck_abort_msg("[TEST_FAIL]:: %s[%d] : Test has failed ..", __FILE__, __LINE__);
}
- if (!ecore_con_ssl_server_crl_add(client, "new_cert/ca.crl"))
+ if (!ecore_con_ssl_server_crl_add(client, "ecore_con/new_cert/ca.crl"))
{
ck_abort_msg("[TEST_FAIL]:: %s[%d] : Test has failed ..", __FILE__, __LINE__);
}
- if (!ecore_con_ssl_server_cert_add(client, "new_cert/client01.pem"))
+ if (!ecore_con_ssl_server_cert_add(client, "ecore_con/new_cert/client01.pem"))
{
ck_abort_msg("[TEST_FAIL]:: %s[%d] : Test has failed..", __FILE__, __LINE__);
}
- if (!ecore_con_ssl_server_privkey_add(client, "new_cert/client01.key"))
+ if (!ecore_con_ssl_server_privkey_add(client, "ecore_con/new_cert/client01.key"))
{
ck_abort_msg("[TEST_FAIL]:: %s[%d] : Test has failed..", __FILE__, __LINE__);
}