提交 4afc6060 编写于 作者: R Rich Salz

WIP: Convert ui,v3ext,verify_extra_test

verify_extra_test still failing :(
Reviewed-by: NRichard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/3194)
上级 80b06b0c
...@@ -171,7 +171,7 @@ IF[{- !$disabled{tests} -}] ...@@ -171,7 +171,7 @@ IF[{- !$disabled{tests} -}]
INCLUDE[crltest]=../include INCLUDE[crltest]=../include
DEPEND[crltest]=../libcrypto DEPEND[crltest]=../libcrypto
SOURCE[v3ext]=v3ext.c SOURCE[v3ext]=v3ext.c testutil.c test_main_custom.c
INCLUDE[v3ext]=../include INCLUDE[v3ext]=../include
DEPEND[v3ext]=../libcrypto DEPEND[v3ext]=../libcrypto
...@@ -183,7 +183,7 @@ IF[{- !$disabled{tests} -}] ...@@ -183,7 +183,7 @@ IF[{- !$disabled{tests} -}]
INCLUDE[constant_time_test]=.. ../include INCLUDE[constant_time_test]=.. ../include
DEPEND[constant_time_test]=../libcrypto DEPEND[constant_time_test]=../libcrypto
SOURCE[verify_extra_test]=verify_extra_test.c SOURCE[verify_extra_test]=verify_extra_test.c testutil.c test_main_custom.c
INCLUDE[verify_extra_test]=../include INCLUDE[verify_extra_test]=../include
DEPEND[verify_extra_test]=../libcrypto DEPEND[verify_extra_test]=../libcrypto
......
...@@ -59,9 +59,9 @@ static int test_old() ...@@ -59,9 +59,9 @@ static int test_old()
char pass[16]; char pass[16];
int ok = 0; int ok = 0;
if ((ui_method = if (!TEST_ptr(ui_method =
UI_UTIL_wrap_read_pem_callback(test_pem_password_cb, 0)) == NULL UI_UTIL_wrap_read_pem_callback( test_pem_password_cb, 0))
|| (ui = UI_new_method(ui_method)) == NULL) || !TEST_ptr(ui = UI_new_method(ui_method)))
goto err; goto err;
/* The wrapper passes the UI userdata as the callback userdata param */ /* The wrapper passes the UI userdata as the callback userdata param */
...@@ -73,7 +73,7 @@ static int test_old() ...@@ -73,7 +73,7 @@ static int test_old()
switch (UI_process(ui)) { switch (UI_process(ui)) {
case -2: case -2:
BIO_printf(bio_err, "test_old: UI process interrupted or cancelled\n"); TEST_info("test_old: UI process interrupted or cancelled");
/* fall through */ /* fall through */
case -1: case -1:
goto err; goto err;
...@@ -81,14 +81,10 @@ static int test_old() ...@@ -81,14 +81,10 @@ static int test_old()
break; break;
} }
if (strcmp(pass, defpass) == 0) if (TEST_str_eq(pass, defpass))
ok = 1; ok = 1;
else
BIO_printf(bio_err, "test_old: password failure\n");
err: err:
if (!ok)
ERR_print_errors_fp(stderr);
UI_free(ui); UI_free(ui);
UI_destroy_method(ui_method); UI_destroy_method(ui_method);
...@@ -106,15 +102,9 @@ static int test_new_ui() ...@@ -106,15 +102,9 @@ static int test_new_ui()
int ok = 0; int ok = 0;
setup_ui_method(); setup_ui_method();
if (password_callback(pass, sizeof(pass), 0, &cb_data) > 0 if (TEST_int_gt(password_callback(pass, sizeof(pass), 0, &cb_data), 0)
&& strcmp(pass, cb_data.password) == 0) && TEST_str_eq(pass, cb_data.password))
ok = 1; ok = 1;
else
BIO_printf(bio_err, "test_new: password failure\n");
if (!ok)
ERR_print_errors_fp(stderr);
destroy_ui_method(); destroy_ui_method();
return ok; return ok;
} }
......
...@@ -13,30 +13,42 @@ ...@@ -13,30 +13,42 @@
#include <openssl/pem.h> #include <openssl/pem.h>
#include <openssl/err.h> #include <openssl/err.h>
int main(int ac, char **av) #include "test_main_custom.h"
#include "testutil.h"
static const char *infile;
static int test_pathlen(void)
{ {
X509 *x = NULL; X509 *x = NULL;
BIO *b = NULL; BIO *b = NULL;
long pathlen; long pathlen;
int ret = 1; int ret = 0;
if (ac != 2) { if (!TEST_ptr(b = BIO_new_file(infile, "r"))
fprintf(stderr, "Usage error\n"); || !TEST_ptr(x = PEM_read_bio_X509(b, NULL, NULL, NULL))
goto end; || !TEST_int_eq(pathlen = X509_get_pathlen(x), 6))
}
b = BIO_new_file(av[1], "r");
if (b == NULL)
goto end; goto end;
x = PEM_read_bio_X509(b, NULL, NULL, NULL);
if (x == NULL) ret = 1;
goto end;
pathlen = X509_get_pathlen(x);
if (pathlen == 6)
ret = 0;
end: end:
ERR_print_errors_fp(stderr);
BIO_free(b); BIO_free(b);
X509_free(x); X509_free(x);
return ret; return ret;
} }
int test_main(int argc, char *argv[])
{
int ret;
if (argc != 2) {
TEST_error("Usage error");
return 0;
}
infile = argv[1];
ADD_TEST(test_pathlen);
ret = run_tests(argv[0]);
return ret;
}
...@@ -13,6 +13,8 @@ ...@@ -13,6 +13,8 @@
#include <openssl/x509.h> #include <openssl/x509.h>
#include <openssl/pem.h> #include <openssl/pem.h>
#include <openssl/err.h> #include <openssl/err.h>
#include "testutil.h"
#include "test_main_custom.h"
static STACK_OF(X509) *load_certs_from_file(const char *filename) static STACK_OF(X509) *load_certs_from_file(const char *filename)
{ {
...@@ -132,31 +134,17 @@ static int test_alt_chains_cert_forgery(const char *roots_f, ...@@ -132,31 +134,17 @@ static int test_alt_chains_cert_forgery(const char *roots_f,
BIO_free(bio); BIO_free(bio);
sk_X509_pop_free(untrusted, X509_free); sk_X509_pop_free(untrusted, X509_free);
X509_STORE_free(store); X509_STORE_free(store);
if (ret != 1)
ERR_print_errors_fp(stderr);
return ret; return ret;
} }
int main(int argc, char **argv) int test_main(int argc, char **argv)
{ {
CRYPTO_set_mem_debug(1);
CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON);
if (argc != 4) { if (argc != 4) {
fprintf(stderr, "usage: verify_extra_test roots.pem untrusted.pem bad.pem\n"); TEST_error("usage: verify_extra_test roots.pem untrusted.pem bad.pem\n");
return 1; return EXIT_FAILURE;
}
if (!test_alt_chains_cert_forgery(argv[1], argv[2], argv[3])) {
fprintf(stderr, "Test alt chains cert forgery failed\n");
return 1;
} }
#ifndef OPENSSL_NO_CRYPTO_MDEBUG if (!TEST_true(test_alt_chains_cert_forgery(argv[1], argv[2], argv[3])))
if (CRYPTO_mem_leaks_fp(stderr) <= 0) return EXIT_FAILURE;
return 1; return EXIT_SUCCESS;
#endif
printf("PASS\n");
return 0;
} }
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册