mirror of
https://github.com/openssl/openssl.git
synced 2024-12-27 06:21:43 +08:00
1832bb0f02
Fixes #17869. Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/17870)
144 lines
4.4 KiB
C
144 lines
4.4 KiB
C
/*
|
|
* Copyright 2015-2021 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
#include <string.h>
|
|
#include <openssl/types.h>
|
|
#include "testutil.h"
|
|
#include "internal/numbers.h"
|
|
|
|
static int test_sanity_null_zero(void)
|
|
{
|
|
char *p;
|
|
char bytes[sizeof(p)];
|
|
|
|
/* Is NULL equivalent to all-bytes-zero? */
|
|
p = NULL;
|
|
memset(bytes, 0, sizeof(bytes));
|
|
return TEST_mem_eq(&p, sizeof(p), bytes, sizeof(bytes));
|
|
}
|
|
|
|
static int test_sanity_enum_size(void)
|
|
{
|
|
enum smallchoices { sa, sb, sc };
|
|
enum medchoices { ma, mb, mc, md, me, mf, mg, mh, mi, mj, mk, ml };
|
|
enum largechoices {
|
|
a01, b01, c01, d01, e01, f01, g01, h01, i01, j01,
|
|
a02, b02, c02, d02, e02, f02, g02, h02, i02, j02,
|
|
a03, b03, c03, d03, e03, f03, g03, h03, i03, j03,
|
|
a04, b04, c04, d04, e04, f04, g04, h04, i04, j04,
|
|
a05, b05, c05, d05, e05, f05, g05, h05, i05, j05,
|
|
a06, b06, c06, d06, e06, f06, g06, h06, i06, j06,
|
|
a07, b07, c07, d07, e07, f07, g07, h07, i07, j07,
|
|
a08, b08, c08, d08, e08, f08, g08, h08, i08, j08,
|
|
a09, b09, c09, d09, e09, f09, g09, h09, i09, j09,
|
|
a10, b10, c10, d10, e10, f10, g10, h10, i10, j10,
|
|
xxx };
|
|
|
|
/* Enum size */
|
|
if (!TEST_size_t_eq(sizeof(enum smallchoices), sizeof(int))
|
|
|| !TEST_size_t_eq(sizeof(enum medchoices), sizeof(int))
|
|
|| !TEST_size_t_eq(sizeof(enum largechoices), sizeof(int)))
|
|
return 0;
|
|
return 1;
|
|
}
|
|
|
|
static int test_sanity_twos_complement(void)
|
|
{
|
|
/* Basic two's complement checks. */
|
|
if (!TEST_int_eq(~(-1), 0)
|
|
|| !TEST_long_eq(~(-1L), 0L))
|
|
return 0;
|
|
return 1;
|
|
}
|
|
|
|
static int test_sanity_sign(void)
|
|
{
|
|
/* Check that values with sign bit 1 and value bits 0 are valid */
|
|
if (!TEST_int_eq(-(INT_MIN + 1), INT_MAX)
|
|
|| !TEST_long_eq(-(LONG_MIN + 1), LONG_MAX))
|
|
return 0;
|
|
return 1;
|
|
}
|
|
|
|
static int test_sanity_unsigned_conversion(void)
|
|
{
|
|
/* Check that unsigned-to-signed conversions preserve bit patterns */
|
|
if (!TEST_int_eq((int)((unsigned int)INT_MAX + 1), INT_MIN)
|
|
|| !TEST_long_eq((long)((unsigned long)LONG_MAX + 1), LONG_MIN))
|
|
return 0;
|
|
return 1;
|
|
}
|
|
|
|
static int test_sanity_range(void)
|
|
{
|
|
/* Verify some types are the correct size */
|
|
if (!TEST_size_t_eq(sizeof(int8_t), 1)
|
|
|| !TEST_size_t_eq(sizeof(uint8_t), 1)
|
|
|| !TEST_size_t_eq(sizeof(int16_t), 2)
|
|
|| !TEST_size_t_eq(sizeof(uint16_t), 2)
|
|
|| !TEST_size_t_eq(sizeof(int32_t), 4)
|
|
|| !TEST_size_t_eq(sizeof(uint32_t), 4)
|
|
|| !TEST_size_t_eq(sizeof(int64_t), 8)
|
|
|| !TEST_size_t_eq(sizeof(uint64_t), 8)
|
|
#ifdef UINT128_MAX
|
|
|| !TEST_size_t_eq(sizeof(int128_t), 16)
|
|
|| !TEST_size_t_eq(sizeof(uint128_t), 16)
|
|
#endif
|
|
|| !TEST_size_t_eq(sizeof(char), 1)
|
|
|| !TEST_size_t_eq(sizeof(unsigned char), 1))
|
|
return 0;
|
|
|
|
/* We want our long longs to be at least 64 bits */
|
|
if (!TEST_size_t_ge(sizeof(long long int), 8)
|
|
|| !TEST_size_t_ge(sizeof(unsigned long long int), 8))
|
|
return 0;
|
|
|
|
/*
|
|
* Verify intmax_t.
|
|
* Some platforms defined intmax_t to be 64 bits but still support
|
|
* an int128_t, so this check is for at least 64 bits.
|
|
*/
|
|
if (!TEST_size_t_ge(sizeof(ossl_intmax_t), 8)
|
|
|| !TEST_size_t_ge(sizeof(ossl_uintmax_t), 8)
|
|
|| !TEST_size_t_ge(sizeof(ossl_uintmax_t), sizeof(size_t)))
|
|
return 0;
|
|
|
|
/* This isn't possible to check using the framework functions */
|
|
if (SIZE_MAX < INT_MAX) {
|
|
TEST_error("int must not be wider than size_t");
|
|
return 0;
|
|
}
|
|
|
|
/* SIZE_MAX is always greater than 2*INT_MAX */
|
|
if (SIZE_MAX - INT_MAX <= INT_MAX) {
|
|
TEST_error("SIZE_MAX must exceed 2*INT_MAX");
|
|
return 0;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
static int test_sanity_memcmp(void)
|
|
{
|
|
return CRYPTO_memcmp("ab", "cd", 2);
|
|
}
|
|
|
|
int setup_tests(void)
|
|
{
|
|
ADD_TEST(test_sanity_null_zero);
|
|
ADD_TEST(test_sanity_enum_size);
|
|
ADD_TEST(test_sanity_twos_complement);
|
|
ADD_TEST(test_sanity_sign);
|
|
ADD_TEST(test_sanity_unsigned_conversion);
|
|
ADD_TEST(test_sanity_range);
|
|
ADD_TEST(test_sanity_memcmp);
|
|
return 1;
|
|
}
|
|
|