mirror of
https://github.com/openssl/openssl.git
synced 2024-11-27 05:21:51 +08:00
f83707dc6d
Found by running the checkpatch.pl Linux script to enforce coding style. Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22097)
139 lines
3.6 KiB
C
139 lines
3.6 KiB
C
/*
|
|
* Copyright 2020-2021 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the Apache License 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
* https://www.openssl.org/source/license.html
|
|
* or in the file LICENSE in the source distribution.
|
|
*/
|
|
|
|
/*
|
|
* This program tests the use of OSSL_PARAM, currently in raw form.
|
|
*/
|
|
|
|
#include "internal/nelem.h"
|
|
#include "internal/cryptlib.h"
|
|
#include "testutil.h"
|
|
|
|
struct testdata {
|
|
const char *in;
|
|
const unsigned char *expected;
|
|
size_t expected_len;
|
|
const char sep;
|
|
};
|
|
|
|
static const unsigned char test_1[] = { 0xAB, 0xCD, 0xEF, 0xF1 };
|
|
static const unsigned char test_2[] = { 0xAB, 0xCD, 0xEF, 0x76, 0x00 };
|
|
|
|
static struct testdata tbl_testdata[] = {
|
|
{
|
|
"AB:CD:EF:F1",
|
|
test_1, sizeof(test_1),
|
|
':',
|
|
},
|
|
{
|
|
"AB:CD:EF:76:00",
|
|
test_2, sizeof(test_2),
|
|
':',
|
|
},
|
|
{
|
|
"AB_CD_EF_F1",
|
|
test_1, sizeof(test_1),
|
|
'_',
|
|
},
|
|
{
|
|
"AB_CD_EF_76_00",
|
|
test_2, sizeof(test_2),
|
|
'_',
|
|
},
|
|
{
|
|
"ABCDEFF1",
|
|
test_1, sizeof(test_1),
|
|
'\0',
|
|
},
|
|
{
|
|
"ABCDEF7600",
|
|
test_2, sizeof(test_2),
|
|
'\0',
|
|
},
|
|
};
|
|
|
|
static int test_hexstr_sep_to_from(int test_index)
|
|
{
|
|
int ret = 0;
|
|
long len = 0;
|
|
unsigned char *buf = NULL;
|
|
char *out = NULL;
|
|
struct testdata *test = &tbl_testdata[test_index];
|
|
|
|
if (!TEST_ptr(buf = ossl_hexstr2buf_sep(test->in, &len, test->sep))
|
|
|| !TEST_mem_eq(buf, len, test->expected, test->expected_len)
|
|
|| !TEST_ptr(out = ossl_buf2hexstr_sep(buf, len, test->sep))
|
|
|| !TEST_str_eq(out, test->in))
|
|
goto err;
|
|
|
|
ret = 1;
|
|
err:
|
|
OPENSSL_free(buf);
|
|
OPENSSL_free(out);
|
|
return ret;
|
|
}
|
|
|
|
static int test_hexstr_to_from(int test_index)
|
|
{
|
|
int ret = 0;
|
|
long len = 0;
|
|
unsigned char *buf = NULL;
|
|
char *out = NULL;
|
|
struct testdata *test = &tbl_testdata[test_index];
|
|
|
|
if (test->sep != '_') {
|
|
if (!TEST_ptr(buf = OPENSSL_hexstr2buf(test->in, &len))
|
|
|| !TEST_mem_eq(buf, len, test->expected, test->expected_len)
|
|
|| !TEST_ptr(out = OPENSSL_buf2hexstr(buf, len)))
|
|
goto err;
|
|
if (test->sep == ':') {
|
|
if (!TEST_str_eq(out, test->in))
|
|
goto err;
|
|
} else if (!TEST_str_ne(out, test->in)) {
|
|
goto err;
|
|
}
|
|
} else {
|
|
if (!TEST_ptr_null(buf = OPENSSL_hexstr2buf(test->in, &len)))
|
|
goto err;
|
|
}
|
|
ret = 1;
|
|
err:
|
|
OPENSSL_free(buf);
|
|
OPENSSL_free(out);
|
|
return ret;
|
|
}
|
|
|
|
static int test_hexstr_ex_to_from(int test_index)
|
|
{
|
|
size_t len = 0;
|
|
char out[64];
|
|
unsigned char buf[64];
|
|
struct testdata *test = &tbl_testdata[test_index];
|
|
|
|
return TEST_true(OPENSSL_hexstr2buf_ex(buf, sizeof(buf), &len, test->in, ':'))
|
|
&& TEST_mem_eq(buf, len, test->expected, test->expected_len)
|
|
&& TEST_false(OPENSSL_buf2hexstr_ex(out, 3 * len - 1, NULL, buf, len,
|
|
':'))
|
|
&& TEST_true(OPENSSL_buf2hexstr_ex(out, sizeof(out), NULL, buf, len,
|
|
':'))
|
|
&& TEST_str_eq(out, test->in)
|
|
&& TEST_true(OPENSSL_buf2hexstr_ex(out, sizeof(out), NULL, buf, 0,
|
|
':'))
|
|
&& TEST_size_t_eq(strlen(out), 0);
|
|
}
|
|
|
|
int setup_tests(void)
|
|
{
|
|
ADD_ALL_TESTS(test_hexstr_sep_to_from, OSSL_NELEM(tbl_testdata));
|
|
ADD_ALL_TESTS(test_hexstr_to_from, OSSL_NELEM(tbl_testdata));
|
|
ADD_ALL_TESTS(test_hexstr_ex_to_from, 2);
|
|
return 1;
|
|
}
|