-func TestSignLocator(t *testing.T) {
- PermissionSecret = []byte(known_key)
- defer func() { PermissionSecret = nil }()
-
- if ts, err := ParseHexTimestamp(known_timestamp); err != nil {
- t.Errorf("bad known_timestamp %s", known_timestamp)
- } else {
- if known_signed_locator != SignLocator(known_locator, known_token, ts) {
- t.Fail()
- }
- }
-}
-
-func TestVerifySignature(t *testing.T) {
- PermissionSecret = []byte(known_key)
- defer func() { PermissionSecret = nil }()
-
- if !VerifySignature(known_signed_locator, known_token) {
- t.Fail()
- }
-}
-
-// The size hint on the locator string should not affect signature validation.
-func TestVerifySignatureWrongSize(t *testing.T) {
- PermissionSecret = []byte(known_key)
- defer func() { PermissionSecret = nil }()
-
- signed_locator_wrong_size := known_hash + "+999999+A" + known_signature + "@" + known_timestamp
- if !VerifySignature(signed_locator_wrong_size, known_token) {
- t.Fail()
+func (s *HandlerSuite) TestSignLocator(c *check.C) {
+ tsInt, err := strconv.ParseInt(knownTimestamp, 16, 0)
+ if err != nil {
+ c.Fatal(err)