Brad Bishop | 6e60e8b | 2018-02-01 10:27:11 -0500 | [diff] [blame] | 1 | From 829302792bf0e4935d29efc23ca1f2e9e7ee7dfd Mon Sep 17 00:00:00 2001 |
| 2 | From: Jackie Huang <jackie.huang@windriver.com> |
| 3 | Date: Thu, 7 Jan 2016 03:12:38 -0500 |
| 4 | Subject: [PATCH] test.pl: adjust for ptest |
| 5 | |
| 6 | * Don't use interactive inputs, set default test |
| 7 | settings instead. |
| 8 | * Change the test results output to the ptest format |
| 9 | |
| 10 | Upstream-Status: Inappropriate [OE ptest specific] |
| 11 | |
| 12 | Signed-off-by: Jackie Huang <jackie.huang@windriver.com> |
| 13 | --- |
| 14 | test.pl | 31 ++++++++++++++++++------------- |
| 15 | 1 file changed, 18 insertions(+), 13 deletions(-) |
| 16 | |
| 17 | diff --git a/test.pl b/test.pl |
| 18 | index cfd1c1e..9b4f10e 100644 |
| 19 | --- a/test.pl |
| 20 | +++ b/test.pl |
| 21 | @@ -7,11 +7,11 @@ |
| 22 | # Change 1..1 below to 1..last_test_to_print . |
| 23 | # (It may become useful if the test is moved to ./t subdirectory.) |
| 24 | |
| 25 | -BEGIN {print "1..5\n";} |
| 26 | -END {print "not ok 1\n" unless $loaded;} |
| 27 | +BEGIN {print "Start testing for libauthen-radius-perl\n";} |
| 28 | +END {print "\nFAIL: test1\n" unless $loaded;} |
| 29 | use Authen::Radius; |
| 30 | $loaded = 1; |
| 31 | -print "ok 1\n"; |
| 32 | +print "\nPASS: test1\n"; |
| 33 | |
| 34 | ######################### End of black magic. |
| 35 | |
| 36 | @@ -19,26 +19,31 @@ print "ok 1\n"; |
| 37 | # (correspondingly "not ok 13") depending on the success of chunk 13 |
| 38 | # of the test code): |
| 39 | |
| 40 | +$host = "127.0.0.1"; |
| 41 | +$secret = "testing123"; |
| 42 | +$user = "testing"; |
| 43 | +$pwd = "testpassword"; |
| 44 | + |
| 45 | print "Make sure this machine is in your Radius clients file!\n"; |
| 46 | -print "Enter hostname[:port] of your Radius server: "; chomp ($host = <STDIN>); |
| 47 | -print "Enter shared-secret of your Radius server: "; chomp ($secret = <STDIN>); |
| 48 | -print "Enter a username to be validated: "; chomp ($user = <STDIN>); |
| 49 | -print "Enter this user's password: "; chomp ($pwd = <STDIN>); |
| 50 | +print "hostname of your Radius server: $host\n"; |
| 51 | +print "shared-secret of your Radius server: $secret\n"; |
| 52 | +print "The username to be validated: $user\n"; |
| 53 | +print "The user's password: $pwd\n"; |
| 54 | |
| 55 | $t = 2; |
| 56 | if ($host ne '') { |
| 57 | $r = new Authen::Radius(Host => $host, Secret => $secret, Debug => 1); |
| 58 | - print defined($r) ? "" : "not ", "ok $t\n"; $t++; |
| 59 | + print defined($r) ? "\nPASS: test$t\n" : "\nFAIL: test$t\n"; $t++; |
| 60 | #Authen::Radius->load_dictionary; |
| 61 | - print $r->check_pwd($user, $pwd) ? "" : "not ", "ok $t\n"; $t++; |
| 62 | + print $r->check_pwd($user, $pwd) ? "\nPASS: test$t\n" : "\nFAIL: test$t\n"; $t++; |
| 63 | @a = $r->get_attributes; |
| 64 | - print $#a != -1 ? "" : "not ", "ok $t\n"; $t++; |
| 65 | + print $#a != -1 ? "\nPASS: test$t\n" : "\nFAIL: test$t\n"; $t++; |
| 66 | #for $a (@a) { |
| 67 | # print "attr: name=$a->{'Name'} value=$a->{'Value'}\n"; |
| 68 | #} |
| 69 | } else { |
| 70 | foreach my $t (2..4) { |
| 71 | - print "skipped $t\n"; |
| 72 | + print "\nSKIP test$t\n"; |
| 73 | } |
| 74 | } |
| 75 | |
| 76 | @@ -53,9 +58,9 @@ my $data = "what do ya want for nothing?"; |
| 77 | my $etalon_digest = hex_to_ascii("750c783e6ab0b503eaa86e310a5db738"); |
| 78 | my $digest = Authen::Radius::hmac_md5(undef, $data, $key); |
| 79 | if ($etalon_digest eq $digest) { |
| 80 | - print "ok 5\n"; |
| 81 | + print "\nPASS: test5\n"; |
| 82 | } else { |
| 83 | - print "not ok 5\n"; |
| 84 | + print "\nFAIL: test5\n"; |
| 85 | } |
| 86 | |
| 87 | exit; |
| 88 | -- |
| 89 | 1.9.1 |
| 90 | |