CN117176629A - Test method for SecOc encryption communication, processor and readable storage medium - Google Patents

Test method for SecOc encryption communication, processor and readable storage medium Download PDF

Info

Publication number
CN117176629A
CN117176629A CN202210576785.1A CN202210576785A CN117176629A CN 117176629 A CN117176629 A CN 117176629A CN 202210576785 A CN202210576785 A CN 202210576785A CN 117176629 A CN117176629 A CN 117176629A
Authority
CN
China
Prior art keywords
test
secoc
cases
encrypted communication
results
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210576785.1A
Other languages
Chinese (zh)
Inventor
刘建权
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Noble Automotive Technology Co ltd
Original Assignee
Noble Automotive Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Noble Automotive Technology Co ltd filed Critical Noble Automotive Technology Co ltd
Priority to CN202210576785.1A priority Critical patent/CN117176629A/en
Publication of CN117176629A publication Critical patent/CN117176629A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The embodiment of the application provides a test method, a processor and a machine-readable storage medium for SecOc encryption communication. The test method comprises the following steps: acquiring all test cases of SecOc encrypted communication; extracting keywords of each test case; respectively calling RF test scripts corresponding to the keywords from a preset test library; and executing the processing flow corresponding to each RF test script in sequence to obtain the test result of the SecOc encrypted communication. Through the technical scheme, a tester can complete automatic test on the SecOc encrypted communication only by using the keyword to create the test case according to the test requirement, and does not need to purchase related hardware licenses, so that the test difficulty and the test cost of the SecOc encrypted communication are reduced.

Description

Test method for SecOc encryption communication, processor and readable storage medium
Technical Field
The application relates to the technical field of vehicle communication, in particular to a test method, a processor and a readable storage medium for SecOc encryption communication.
Background
With the increasing popularization of the networking of automobiles, the safety of vehicle-mounted communication is also more and more emphasized, but in the current vehicle-mounted network, most of data transmission is carried out under the condition without any safety measures, even if the safety measures exist, the safety measures are very crude, and the credibility of a transmitting node cannot be checked. Therefore, secOc (english full name: secure On Board Communacation, chinese full name: secure onboard communication) has been listed as a secure and reliable encryption communication scheme in the onboard secure communication standard to secure onboard communication.
In the prior art, when a test is performed on SecOc communication, because the SecOc communication has the characteristics of high instantaneity, high encryption and decryption complexity and the like, a tester needs to learn to use a CAPL (Communication Access Programming Laguage) test framework provided by an automatic test tool such as Vector company Canoe (Can open environment) software, purchase a hardware license of the Vector company, write a test script according to a test case, and then run the test script to obtain a test result. The existing test method has higher technical requirements for testers, and has higher test cost because related hardware licenses are required to be purchased.
Disclosure of Invention
It is an object of embodiments of the present application to provide a test method, processor and machine-readable storage medium for SecOc encrypted communications.
To achieve the above object, a first aspect of the present application provides a test method for SecOc encrypted communication, including:
acquiring all test cases of SecOc encrypted communication;
extracting keywords of each test case;
respectively calling RF test scripts corresponding to the keywords from a preset test library;
and executing the processing flow corresponding to each RF test script in sequence to obtain the test result of the SecOc encrypted communication.
Optionally, the processing flow includes at least one of an authentication information processing flow, an authentication information authentication flow, an encryption and decryption algorithm processing flow, and a data message transfer flow.
Optionally, executing the processing flow corresponding to each RF test script in sequence to obtain a test result of SecOc encrypted communication, including:
sequentially executing the processing flows corresponding to the RF test scripts to obtain test results of all test cases;
determining whether all test results of all test cases pass the test;
and under the condition that all test results of all test cases are determined to pass the test, determining that the test of the SecOc encrypted communication passes.
Optionally, determining whether all test results of all test cases are test passing includes:
respectively determining whether the test results of the test cases are consistent with the expected test results;
and under the condition that the test results of all the test cases are all consistent with the expected test results, determining that the test results of all the test cases are all passing tests.
Optionally, the test method further comprises:
and under the condition that the test results of all the test cases are not all the test passing, determining that the test of the SecOc encrypted communication is not passed, and outputting fault information.
Optionally, the test method further comprises:
and re-testing the test cases which are failed in the test until the test passes or the test times reach a preset times value.
Optionally, the test method further comprises:
and configuring the test sequence of each test case.
Optionally, the test method further comprises:
and generating a test report according to the test result of the test case, the keyword, the RF test script and the SecOc encrypted communication.
A second aspect of the present application provides a processor configured to perform the above-described test method for SecOc encrypted communications.
A third aspect of the application provides a machine-readable storage medium having instructions stored thereon that, when executed by a processor, cause the processor to be configured to perform the test method for SecOc encrypted communications described above.
According to the technical scheme, all test cases of the SecOc encrypted communication are obtained, keywords of each test case are extracted, then RF test scripts corresponding to the keywords are called from a preset test library, and processing flows corresponding to the RF test scripts are executed in sequence, so that test results of the SecOc encrypted communication are obtained.
Additional features and advantages of embodiments of the application will be set forth in the detailed description which follows.
Drawings
The accompanying drawings are included to provide a further understanding of embodiments of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain, without limitation, the embodiments of the application. In the drawings:
FIG. 1 is a flow chart of a test method for SecOc encrypted communications provided in an embodiment of the present application;
fig. 2 is a flowchart of step S14 in the test method for SecOc encrypted communication provided in the embodiment of the present application;
fig. 3 is a flowchart of step S142 in the test method for SecOc encrypted communication provided in the embodiment of the present application;
fig. 4 is an internal structural diagram of a computer device provided in an embodiment of the present application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it should be understood that the detailed description described herein is merely for illustrating and explaining the embodiments of the present application, and is not intended to limit the embodiments of the present application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The test method for SecOc encryption communication provided by the application can be an automatic test method for SecOc encryption communication based on RF (English full name: robotFramework, chinese full name: robot automation test framework). The RobotFramework is a Python-written function automation test framework, a developer can change and expand the RobotFramework by using Python or Java, the test method is developed based on the RobotFramework open source framework, related hardware licenses are not required to be purchased, the use requirement on hardware communication equipment is low, and the cost is low.
Based on this, the present application provides a test method for SecOc encrypted communication. Referring to fig. 1, fig. 1 is a flow chart of a test method for SecOc encrypted communication according to an embodiment of the present application. As shown in fig. 1, in an embodiment of the present application, there is provided a test method for SecOc encrypted communication, including the steps of:
step S11: acquiring all test cases of SecOc encrypted communication;
step S12: extracting keywords of each test case;
step S13: respectively calling RF test scripts corresponding to the keywords from a preset test library;
step S14: and executing the processing flow corresponding to each RF test script in sequence to obtain the test result of the SecOc encrypted communication.
Specifically, in step S11 and step S12, since the robotframe has good expandability, supports keyword (keyword) driving, and the keywords are similar to functions of other high-level languages, so that codes are structured and recycled, so that a tester can respectively create corresponding test cases by using the keywords according to different test requirements, wherein the keywords are defined according to the grammar rules of the robotframe, and the test cases are easier to understand and more flexible to construct after the keywords are packaged. Therefore, after all the test cases of the SecOc encrypted communication are acquired, the keywords of each test case can be extracted. In step S13, a preset test library may be developed in advance by a developer, where the preset test library includes RF test scripts required by each test case, and provides a call interface corresponding to a keyword of each test case. According to the extracted keywords of each test case, the RF test scripts corresponding to the keywords can be respectively called from a preset test library. In step S14, after obtaining the RF test scripts required by all the test cases, the test result of SecOc encrypted communication may be obtained by sequentially executing the processing flows corresponding to the RF test scripts. It will be appreciated that since robotframe supports testing multiple types of clients or interfaces simultaneously, distributed test execution may be performed on each RF test script to improve automated test efficiency. Through the mode, a tester can complete automatic test on the SecOc encrypted communication only by using the keyword to create the test case according to the test requirement, and does not need to purchase related hardware licenses, so that the test difficulty and the test cost of the SecOc encrypted communication are reduced.
In one embodiment, the processing flow includes at least one of an authentication information processing flow, an authentication information authentication flow, an encryption and decryption algorithm processing flow, and a data message delivery flow.
Specifically, secOc encrypted communication is an encrypted communication method for performing Cmac (english full name: cipher-Based Message Authentication Code, chinese full name: cryptography-based message authentication code) authentication on a data field and a freshness value of a vehicle-mounted data frame using an Aes (english full name: advanced Encryption Standard, chinese full name: advanced encryption standard) 128 asymmetric encryption algorithm. The SecOC mechanism is used to protect the integrity, authenticability, and playback resistance of sensitive information in an in-vehicle network, and a protected object is in units of PDUs (english full name: protocol Data Unit, chinese full name: protocol data unit), and it is necessary to pre-select and configure each PDU message to be protected by the SecOC, and to add information of a freshness value and information of an integrity check value at the end of the protected PDU message.
In order to facilitate understanding of the scheme by those skilled in the art, the following describes the function and principle mechanism of the preset test library in the test method for SecOc encryption communication provided in the embodiment of the present application.
The pre-set test Library may include SecOc Library, can Library, fvm Library, and Dbc Analisis Library.
The SecOc Library is a SecOc encryption communication service stack meeting the requirements of clients, is a core service side in a SecOc testing method, is used as a SecOc host to perform data synchronization service, and provides Cmac authentication service for encrypting and decrypting data frames. Providing a plurality of SecOc service keywords for users, wherein the execution flow comprises the following steps: requesting SecOc service through keywords, such as sending synchronous message, sending security authentication message, sending non-security authentication message, obtaining GW node SecOc message list, detecting whether the detected node records a fault code, etc.; constructing a freshness value from a freshness management module; acquiring specified message Layout information and a message counter value from a database analysis module; obtaining the Aes128 Cmac authentication information from an encryption algorithm library; and receiving/sending an application message and a diagnosis message from the Can Driver.
Can Library is a COM communication stack and a UDS (english full name: unified Diagnostic Services, chinese full name: unified diagnostic service) stack conforming to Can (english full name: controller Area Network, chinese full name: controller area network bus) 2.0, ISO14229 standard, and provides Can basic communication and UDS diagnostic service. CAN Library will perform different call paths depending on the content of the upper layer request: when the request message is a diagnosis message, sending a diagnosis request to a physical bus through UDS, iso-tp and python-can, and monitoring a diagnosis response through RxNotifier provided by python-can; when the request message is an application message, the data is sent to the physical bus through python-Can after being processed through Com, and the call structure of Can Library comprises: encoding the encrypted SecOc application message data content through a com.py script; encoding the diagnostic message request service content into a Uds service request by a uds.py script; decoding the received Uds service response into corresponding service data by means of Iso-tp; encoding Uds service data into a transport layer data stream by Iso-tp; the form of the received CAN data frame receiving message callback function is transmitted to an upper layer through the python-CAN or the application message and the diagnosis message are transmitted to a physical bus through the python-CAN.
Fvm Library provides freshness value management services for the SecOc host. The host Fvm (english full name: freshness Value Management, chinese full name: freshness value management module) has a freshness value synchronization function, and is used for synchronizing current freshness value information of the host Fvm to the slave to-be-detected device Fvm, so as to ensure consistency of freshness values at both ends of the secure PDU. The freshness value synchronization message contains a synchronization counter (accounting for 3 bytes), a reset counter (accounting for 2 bytes), and authentication information (accounting for 11 bytes). The synchronization counter and the reset counter are the current value of the host Fvm, the authentication information is information of a message verification code calculated by using an AES-128-CMAC algorithm, and the slave device Fvm to be tested verifies the validity of the freshness value synchronization message through the information of the message verification code. In addition to the management sync message as the host Fvm, fvm Library needs to provide a freshness value constructed for a transmission message when sending the SecOc message and save the previous value of the construction after the transmission is completed. The structure of the freshness value, the maintenance method of each counter, the format of the freshness value synchronization message, and the construction method of the freshness value refer to the prior art, and the embodiments of the present application are not described in detail.
Dbc Analisis Library the regular expression is used to match all dbc data attributes in turn according to the text parsing rule of dbc (English name: dataBase Can, chinese name: can communication DataBase) file, and the dbc DataBase is converted into SecOc internal DataBase, the converted DataBase is python dictionary, all attributes of dbc Can be conveniently searched by using dictionary key values, the module provides the acquisition interface and attribute access interface of various messages for other modules, and is responsible for maintaining the message counter of each sent message.
Referring to fig. 2, fig. 2 is a flowchart of step S14 in a test method for SecOc encrypted communication according to an embodiment of the present application. Sequentially executing the processing flow corresponding to each RF test script in step S14 to obtain a test result of SecOc encrypted communication, which may include the following steps:
step S141: sequentially executing the processing flows corresponding to the RF test scripts to obtain test results of all test cases;
step S142: determining whether all test results of all test cases pass the test;
step S143: and under the condition that all test results of all test cases are determined to pass the test, determining that the test of the SecOc encrypted communication passes.
Specifically, after the test results of all the test cases are obtained, whether the test result of each test case is a test pass is respectively judged, when the test result of at least one test case is a test fail, the test of SecOc encrypted communication is determined to be failed, otherwise, the test of SecOc encrypted communication is determined to be passed.
Referring to fig. 3, fig. 3 is a flowchart illustrating a step S142 in a test method for SecOc encrypted communication according to an embodiment of the present application. Determining whether all test results of all test cases pass the test in step S142 may include the following steps:
step S1421: respectively determining whether the test results of the test cases are consistent with the expected test results;
step S1422: and under the condition that the test results of all the test cases are all consistent with the expected test results, determining that the test results of all the test cases are all passing tests.
Specifically, each test case corresponds to an expected test result, the test result of each test case is compared with the corresponding expected test result, when the test result of at least one test case is inconsistent with the corresponding expected test result, the test results of all test cases are determined to not pass all the tests, otherwise, the test results of all the test cases are determined to pass all the tests.
In one embodiment, the test method further comprises the steps of:
and under the condition that the test results of all the test cases are not all the test passing, determining that the test of the SecOc encrypted communication is not passed, and outputting fault information.
Specifically, when the test result of at least one test case is inconsistent with the corresponding expected test result, determining that the test of the SecOc encrypted communication fails, detecting the reason of the failed test to a window of each test case, outputting fault information, and facilitating a developer to complete bug correction according to the test result.
In one embodiment, the test method further comprises the steps of:
and re-testing the test cases which are failed in the test until the test passes or the test times reach a preset times value.
Specifically, when the test results of one or more test cases are inconsistent with the corresponding expected test results, the test cases may be tested again at the moment due to the failure of the system or the execution error of the script, until the test of the test case passes or the test times of the test case reach the preset times, so that the accuracy of the test results of the test cases is improved.
In one embodiment, the test method further comprises the steps of:
and configuring the test sequence of each test case.
Specifically, a tester can preset the test sequence of each test case so as to test each test case sequentially according to the test sequence, thereby improving the test efficiency of the test cases.
In one embodiment, the test method further comprises the steps of:
and generating a test report according to the test result of the test case, the keyword, the RF test script and the SecOc encrypted communication.
Specifically, after the test of all test cases is completed, the test results of all test cases can be collated and counted, and a test report is automatically generated according to the test results of the test cases, keywords, RF test scripts and SecOc encrypted communication, so that the developer can conveniently follow-up problem tracking. The test report may be in an html format, and in addition, the data normalization may be performed on the test report in the html format to form a test report in an excel format readable by a user, and the test report in the excel format is displayed or sent to the user. Of course, the test report may be in a format such as xml or txt, and the specific format is not limited, and may be selected according to the specific requirements of the user or the actual test environment.
According to the technical scheme, all test cases of the SecOc encrypted communication are obtained, keywords of each test case are extracted, then RF test scripts corresponding to the keywords are called from a preset test library, and processing flows corresponding to the RF test scripts are executed in sequence, so that test results of the SecOc encrypted communication are obtained.
The embodiment of the application also provides a processor, which is configured to execute the following method steps: acquiring all test cases of SecOc encrypted communication; extracting keywords of each test case; respectively calling RF test scripts corresponding to the keywords from a preset test library; and executing the processing flow corresponding to each RF test script in sequence to obtain the test result of the SecOc encrypted communication.
In one embodiment, the processing flow includes at least one of an authentication information processing flow, an authentication information authentication flow, an encryption and decryption algorithm processing flow, and a data message delivery flow.
In one embodiment, a process flow corresponding to each RF test script is sequentially executed to obtain a test result of SecOc encrypted communication, including: sequentially executing the processing flows corresponding to the RF test scripts to obtain test results of all test cases; determining whether all test results of all test cases pass the test; and under the condition that all test results of all test cases are determined to pass the test, determining that the test of the SecOc encrypted communication passes.
In one embodiment, determining whether all test results for all test cases are test passing includes: respectively determining whether the test results of the test cases are consistent with the expected test results; and under the condition that the test results of all the test cases are all consistent with the expected test results, determining that the test results of all the test cases are all passing tests.
In one embodiment, the method further comprises: and under the condition that the test results of all the test cases are not all the test passing, determining that the test of the SecOc encrypted communication is not passed, and outputting fault information.
In one embodiment, the method further comprises: and re-testing the test cases which are failed in the test until the test passes or the test times reach a preset times value.
In one embodiment, the method further comprises: and configuring the test sequence of each test case.
In one embodiment, the method further comprises: and generating a test report according to the test result of the test case, the keyword, the RF test script and the SecOc encrypted communication.
It should be noted that, the detailed process of the processor for executing the above operation is shown in the method embodiment, and will not be described herein.
Embodiments of the present application also provide a machine-readable storage medium having instructions stored thereon, which when executed by a processor, cause the processor to be configured to perform the method steps of: acquiring all test cases of SecOc encrypted communication; extracting keywords of each test case; respectively calling RF test scripts corresponding to the keywords from a preset test library; and executing the processing flow corresponding to each RF test script in sequence to obtain the test result of the SecOc encrypted communication.
In one embodiment, the processing flow includes at least one of an authentication information processing flow, an authentication information authentication flow, an encryption and decryption algorithm processing flow, and a data message delivery flow.
In one embodiment, a process flow corresponding to each RF test script is sequentially executed to obtain a test result of SecOc encrypted communication, including: sequentially executing the processing flows corresponding to the RF test scripts to obtain test results of all test cases; determining whether all test results of all test cases pass the test; and under the condition that all test results of all test cases are determined to pass the test, determining that the test of the SecOc encrypted communication passes.
In one embodiment, determining whether all test results for all test cases are test passing includes: respectively determining whether the test results of the test cases are consistent with the expected test results; and under the condition that the test results of all the test cases are all consistent with the expected test results, determining that the test results of all the test cases are all passing tests.
In one embodiment, the method further comprises: and under the condition that the test results of all the test cases are not all the test passing, determining that the test of the SecOc encrypted communication is not passed, and outputting fault information.
In one embodiment, the method further comprises: and re-testing the test cases which are failed in the test until the test passes or the test times reach a preset times value.
In one embodiment, the method further comprises: and configuring the test sequence of each test case.
In one embodiment, the method further comprises: and generating a test report according to the test result of the test case, the keyword, the RF test script and the SecOc encrypted communication.
In one embodiment, a computer device is provided, which may be a terminal, and the internal structure of which may be as shown in fig. 4. The computer apparatus includes a processor a01, a network interface a02, a display screen a04, an input device a05, and a memory (not shown in the figure) which are connected through a system bus. Wherein the processor a01 of the computer device is adapted to provide computing and control capabilities. The memory of the computer device includes an internal memory a03 and a nonvolatile storage medium a06. The nonvolatile storage medium a06 stores an operating system B01 and a computer program B02. The internal memory a03 provides an environment for the operation of the operating system B01 and the computer program B02 in the nonvolatile storage medium a06. The network interface a02 of the computer device is used for communication with an external terminal through a network connection. The computer program is executed by a processor a01 to implement a XXX method. The display screen a04 of the computer device may be a liquid crystal display screen or an electronic ink display screen, and the input device a05 of the computer device may be a touch layer covered on the display screen, or may be a key, a track ball or a touch pad arranged on a casing of the computer device, or may be an external keyboard, a touch pad or a mouse.
It will be appreciated by persons skilled in the art that the architecture shown in fig. 4 is merely a block diagram of some of the architecture relevant to the present inventive arrangements and is not limiting as to the computer device to which the present inventive arrangements are applicable, and that a particular computer device may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
The embodiment of the application provides equipment, which comprises a processor, a memory and a program stored in the memory and capable of running on the processor, wherein the processor realizes the test method for SecOc encryption communication when executing the program.
The processor may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or by instructions in the form of software. The processor may be a general purpose processor, a digital signal processor (DSP, digital Signal Processor), or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like. The processor may implement or perform the methods, steps, and logic blocks disclosed in embodiments of the present application. The general purpose processor may be a microprocessor or any conventional processor or the like. The steps of the method disclosed in the embodiment of the application can be directly embodied in the hardware of the decoding processor or can be implemented by combining hardware and software modules in the decoding processor. The software modules may be located in a storage medium having memory and a processor reading information from the memory and performing the steps of the method in combination with hardware.
It will be appreciated that the memory of embodiments of the application may be either volatile memory or nonvolatile memory, and may include both volatile and nonvolatile memory. Wherein the non-volatile Memory may be a Read Only Memory (ROM), a programmable read only Memory (PROM, programmable Read Only Memory), an erasable programmable read only Memory (EPROM, erasable Programmable Read Only Memory), an electrically erasable programmable read only Memory (EEPROM, electrically Erasable Programmable Read Only Memory), a magnetic random access Memory (FRAM, ferromagnetic random access Memory), a Flash Memory (Flash Memory), a magnetic surface Memory, an optical disk, or a compact disk read only (CD ROM, compact Disc Read Only Memory); the magnetic surface memory may be a disk memory or a tape memory. The volatile Memory may be a random access Memory (RAM, randomAccess Memory) that acts as an external cache. By way of example, and not limitation, many forms of RAM are available, such as static random access memory (SRAM, static Random Access Memory), synchronous static random access memory (SSRAM, synchronous Static Random Access Memory), dynamic random access memory (DRAM, dynamic Random Access Memory), synchronous dynamic random access memory (SDRAM, synchronousDynamic Random Access Memory), double data rate synchronous dynamic random access memory (ddr sdram, double Data Rate Synchronous Dynamic Random Access Memory), enhanced synchronous dynamic random access memory (ESDRAM, enhanced Synchronous Dynamic Random Access Memory), synchronous link dynamic random access memory (SLDRAM, syncLink Dynamic Random Access Memory), direct memory bus random access memory (DRRAM, direct Rambus Random Access Memory). The memory described by embodiments of the present application is intended to comprise, without being limited to, these and any other suitable types of memory.
The present application also provides a computer program product adapted to perform, when executed on a data processing apparatus, the test method for SecOc encrypted communication described above, when initialized.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, etc., such as Read Only Memory (ROM) or flash RAM. Memory is an example of a computer-readable medium.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises an element.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and variations of the present application will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. which come within the spirit and principles of the application are to be included in the scope of the claims of the present application.

Claims (10)

1. A test method for SecOc encrypted communications, comprising:
acquiring all test cases of SecOc encrypted communication;
extracting keywords of each test case;
respectively calling RF test scripts corresponding to the keywords from a preset test library;
and sequentially executing the processing flows corresponding to the RF test scripts to obtain the test result of the SecOc encrypted communication.
2. The test method of claim 1, wherein the process flow comprises at least one of an authentication information process flow, an authentication information authentication flow, an encryption and decryption algorithm process flow, and a data message transfer flow.
3. The test method according to claim 2, wherein the sequentially executing the processing flows corresponding to the RF test scripts to obtain the test result of the SecOc encrypted communication includes:
sequentially executing the processing flows corresponding to the RF test scripts to obtain test results of all the test cases;
determining whether all test results of all the test cases pass the test;
and under the condition that all test results of all the test cases are determined to be test passing, determining that the test of the SecOc encrypted communication is passed.
4. A test method according to claim 3, wherein said determining whether all of the test results of all of the test cases are test passing comprises:
respectively determining whether the test results of the test cases are consistent with expected test results;
and under the condition that all the test results of the test cases are determined to be consistent with the expected test results, determining that all the test results of the test cases are all passed tests.
5. A test method according to claim 3, further comprising:
and under the condition that all test results of all the test cases are not passed, determining that the test of the SecOc encrypted communication is not passed, and outputting fault information.
6. The method of testing of claim 5, further comprising:
and re-testing the test cases which are failed in the test until the test passes or the test times reach a preset times value.
7. The test method of claim 1, further comprising:
and configuring the test sequence of each test case.
8. The test method of claim 1, further comprising:
and generating a test report according to the test case, the keyword, the RF test script and the test result of the SecOc encrypted communication.
9. A processor configured to perform the test method for SecOc encrypted communications according to any one of claims 1 to 8.
10. A machine-readable storage medium having instructions stored thereon, which when executed by a processor, cause the processor to be configured to perform the test method for SecOc encrypted communications according to any one of claims 1 to 8.
CN202210576785.1A 2022-05-25 2022-05-25 Test method for SecOc encryption communication, processor and readable storage medium Pending CN117176629A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210576785.1A CN117176629A (en) 2022-05-25 2022-05-25 Test method for SecOc encryption communication, processor and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210576785.1A CN117176629A (en) 2022-05-25 2022-05-25 Test method for SecOc encryption communication, processor and readable storage medium

Publications (1)

Publication Number Publication Date
CN117176629A true CN117176629A (en) 2023-12-05

Family

ID=88934028

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210576785.1A Pending CN117176629A (en) 2022-05-25 2022-05-25 Test method for SecOc encryption communication, processor and readable storage medium

Country Status (1)

Country Link
CN (1) CN117176629A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117971672A (en) * 2024-01-31 2024-05-03 北京长木谷医疗科技股份有限公司 Self-adaptive test method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117971672A (en) * 2024-01-31 2024-05-03 北京长木谷医疗科技股份有限公司 Self-adaptive test method and device

Similar Documents

Publication Publication Date Title
CN107122297B (en) Method and equipment for generating request message of test interface
CN107122258B (en) Method and equipment for checking state code of test interface
US10769228B2 (en) Systems and methods for web analytics testing and web development
CN107092535B (en) Method and apparatus for data storage of test interface
CN110324416B (en) Download path tracking method, device, server, terminal and medium
CN110309669B (en) Data labeling method, device and equipment
CN113221194B (en) Tamper web page hybrid detection technology
CN112241370B (en) API interface class checking method, system and device
CN111737304B (en) Processing method, device and equipment of block chain data
CN117176629A (en) Test method for SecOc encryption communication, processor and readable storage medium
CN113934758A (en) Vehicle fault repairing method and device, vehicle-mounted terminal, server and storage medium
CN105743725A (en) Method and device for testing application programs
CN111488095A (en) User login management method and device
CN112685077A (en) Data modification method, system, computer device and computer readable storage medium
CN116580804A (en) Method for storing DICOM data in association with OFD file
CN116361793A (en) Code detection method, device, electronic equipment and storage medium
CN115982254A (en) Database file conversion method, device, system, equipment and storage medium
CN116975792A (en) Data processing method, apparatus, computer device, storage medium, and program product
CN112416875B (en) Log management method, device, computer equipment and storage medium
US11212170B1 (en) Service provider network application testing with standards references
CN109670152B (en) HL7V3 analysis method, storage medium, electronic equipment and system
CN114115871A (en) Page data embedding method and device, storage medium and electronic equipment
CN111475400A (en) Verification method of service platform and related equipment
CN112580107A (en) Data opening method based on block chain, data acquisition method and corresponding devices
CN117176352A (en) Analysis method, processor and readable storage medium for SecOc real vehicle communication data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination