提交 e2a29ad6 编写于 作者: R Rich Salz

Convert x509aux, cipherlist, casttest

To new test framework
Reviewed-by: NRichard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/3189)
上级 f75f007c
...@@ -127,8 +127,8 @@ IF[{- !$disabled{tests} -}] ...@@ -127,8 +127,8 @@ IF[{- !$disabled{tests} -}]
INCLUDE[enginetest]=../include INCLUDE[enginetest]=../include
DEPEND[enginetest]=../libcrypto DEPEND[enginetest]=../libcrypto
SOURCE[casttest]=casttest.c SOURCE[casttest]=casttest.c testutil.c test_main.o
INCLUDE[casttest]=../include INCLUDE[casttest]=.. ../include
DEPEND[casttest]=../libcrypto DEPEND[casttest]=../libcrypto
SOURCE[bftest]=bftest.c testutil.c test_main_custom.c SOURCE[bftest]=bftest.c testutil.c test_main_custom.c
...@@ -260,8 +260,8 @@ IF[{- !$disabled{tests} -}] ...@@ -260,8 +260,8 @@ IF[{- !$disabled{tests} -}]
INCLUDE[handshake_helper.o]=../include INCLUDE[handshake_helper.o]=../include
INCLUDE[ssltestlib.o]=.. ../include INCLUDE[ssltestlib.o]=.. ../include
SOURCE[x509aux]=x509aux.c SOURCE[x509aux]=x509aux.c testutil.c test_main_custom.c
INCLUDE[x509aux]=../include INCLUDE[x509aux]=.. ../include
DEPEND[x509aux]=../libcrypto DEPEND[x509aux]=../libcrypto
SOURCE[asynciotest]=asynciotest.c ssltestlib.c testutil.c test_main_custom.c SOURCE[asynciotest]=asynciotest.c ssltestlib.c testutil.c test_main_custom.c
......
...@@ -10,9 +10,11 @@ ...@@ -10,9 +10,11 @@
#include <stdio.h> #include <stdio.h>
#include <string.h> #include <string.h>
#include <stdlib.h> #include <stdlib.h>
#include <openssl/opensslconf.h> /* To see if OPENSSL_NO_CAST is defined */
#include "../e_os.h" #include <openssl/opensslconf.h> /* To see if OPENSSL_NO_CAST is defined */
#include "e_os.h"
#include "test_main.h"
#include "testutil.h"
#ifdef OPENSSL_NO_CAST #ifdef OPENSSL_NO_CAST
int main(int argc, char *argv[]) int main(int argc, char *argv[])
...@@ -23,8 +25,6 @@ int main(int argc, char *argv[]) ...@@ -23,8 +25,6 @@ int main(int argc, char *argv[])
#else #else
# include <openssl/cast.h> # include <openssl/cast.h>
# define FULL_TEST
static unsigned char k[16] = { static unsigned char k[16] = {
0x01, 0x23, 0x45, 0x67, 0x12, 0x34, 0x56, 0x78, 0x01, 0x23, 0x45, 0x67, 0x12, 0x34, 0x56, 0x78,
0x23, 0x45, 0x67, 0x89, 0x34, 0x56, 0x78, 0x9A 0x23, 0x45, 0x67, 0x89, 0x34, 0x56, 0x78, 0x9A
...@@ -63,101 +63,54 @@ static unsigned char c_b[16] = { ...@@ -63,101 +63,54 @@ static unsigned char c_b[16] = {
0x80, 0xAC, 0x05, 0xB8, 0xE8, 0x3D, 0x69, 0x6E 0x80, 0xAC, 0x05, 0xB8, 0xE8, 0x3D, 0x69, 0x6E
}; };
int main(int argc, char *argv[]) static int cast_test(void)
{ {
# ifdef FULL_TEST static char *hex = "0123456789ABCDEF";
long l; long l;
CAST_KEY key_b; int i, z, testresult = 1;
# endif CAST_KEY key, key_b;
int i, z, err = 0; unsigned char out_a[16], out_b[16];
CAST_KEY key;
for (z = 0; z < 3; z++) { for (z = 0; z < 3; z++) {
CAST_set_key(&key, k_len[z], k); CAST_set_key(&key, k_len[z], k);
CAST_ecb_encrypt(in, out, &key, CAST_ENCRYPT); CAST_ecb_encrypt(in, out, &key, CAST_ENCRYPT);
if (memcmp(out, &(c[z][0]), 8) != 0) { if (!TEST_mem_eq(out, sizeof(c[z]), c[z], sizeof(c[z])))
printf("ecb cast error encrypting for keysize %d\n", testresult = 0;
k_len[z] * 8);
printf("got :");
for (i = 0; i < 8; i++)
printf("%02X ", out[i]);
printf("\n");
printf("expected:");
for (i = 0; i < 8; i++)
printf("%02X ", c[z][i]);
err = 20;
printf("\n");
}
CAST_ecb_encrypt(out, out, &key, CAST_DECRYPT); CAST_ecb_encrypt(out, out, &key, CAST_DECRYPT);
if (memcmp(out, in, 8) != 0) { if (!TEST_mem_eq(out, sizeof(in), in, sizeof(in)))
printf("ecb cast error decrypting for keysize %d\n", testresult = 0;
k_len[z] * 8);
printf("got :");
for (i = 0; i < 8; i++)
printf("%02X ", out[i]);
printf("\n");
printf("expected:");
for (i = 0; i < 8; i++)
printf("%02X ", in[i]);
printf("\n");
err = 3;
}
} }
if (err == 0) if (testresult)
printf("ecb cast5 ok\n"); TEST_info("ecb cast5 ok");
# ifdef FULL_TEST
{ memcpy(out_a, in_a, sizeof(in_a));
unsigned char out_a[16], out_b[16]; memcpy(out_b, in_b, sizeof(in_b));
static char *hex = "0123456789ABCDEF";
i = 1;
printf("This test will take some time...."); for (l = 0; l < 1000000L; l++) {
fflush(stdout); CAST_set_key(&key_b, 16, out_b);
memcpy(out_a, in_a, sizeof(in_a)); CAST_ecb_encrypt(&(out_a[0]), &(out_a[0]), &key_b, CAST_ENCRYPT);
memcpy(out_b, in_b, sizeof(in_b)); CAST_ecb_encrypt(&(out_a[8]), &(out_a[8]), &key_b, CAST_ENCRYPT);
i = 1; CAST_set_key(&key, 16, out_a);
CAST_ecb_encrypt(&(out_b[0]), &(out_b[0]), &key, CAST_ENCRYPT);
for (l = 0; l < 1000000L; l++) { CAST_ecb_encrypt(&(out_b[8]), &(out_b[8]), &key, CAST_ENCRYPT);
CAST_set_key(&key_b, 16, out_b); if ((l & 0xffff) == 0xffff) {
CAST_ecb_encrypt(&(out_a[0]), &(out_a[0]), &key_b, CAST_ENCRYPT); TEST_info("%c", hex[i & 0x0f]);
CAST_ecb_encrypt(&(out_a[8]), &(out_a[8]), &key_b, CAST_ENCRYPT); i++;
CAST_set_key(&key, 16, out_a);
CAST_ecb_encrypt(&(out_b[0]), &(out_b[0]), &key, CAST_ENCRYPT);
CAST_ecb_encrypt(&(out_b[8]), &(out_b[8]), &key, CAST_ENCRYPT);
if ((l & 0xffff) == 0xffff) {
printf("%c", hex[i & 0x0f]);
fflush(stdout);
i++;
}
} }
if ((memcmp(out_a, c_a, sizeof(c_a)) != 0) ||
(memcmp(out_b, c_b, sizeof(c_b)) != 0)) {
printf("\n");
printf("Error\n");
printf("A out =");
for (i = 0; i < 16; i++)
printf("%02X ", out_a[i]);
printf("\nactual=");
for (i = 0; i < 16; i++)
printf("%02X ", c_a[i]);
printf("\n");
printf("B out =");
for (i = 0; i < 16; i++)
printf("%02X ", out_b[i]);
printf("\nactual=");
for (i = 0; i < 16; i++)
printf("%02X ", c_b[i]);
printf("\n");
} else
printf(" ok\n");
} }
# endif
EXIT(err); if (!TEST_mem_eq(out_a, sizeof(c_a), c_a, sizeof(c_a))
|| !TEST_mem_eq(out_b, sizeof(c_b), c_b, sizeof(c_b)))
testresult = 0;
return testresult;
} }
#endif #endif
void register_tests(void)
{
ADD_TEST(cast_test);
}
...@@ -34,7 +34,7 @@ static CIPHERLIST_TEST_FIXTURE set_up(const char *const test_case_name) ...@@ -34,7 +34,7 @@ static CIPHERLIST_TEST_FIXTURE set_up(const char *const test_case_name)
fixture.test_case_name = test_case_name; fixture.test_case_name = test_case_name;
fixture.server = SSL_CTX_new(TLS_server_method()); fixture.server = SSL_CTX_new(TLS_server_method());
fixture.client = SSL_CTX_new(TLS_client_method()); fixture.client = SSL_CTX_new(TLS_client_method());
OPENSSL_assert(fixture.client != NULL && fixture.server != NULL); TEST_check(fixture.client != NULL && fixture.server != NULL);
return fixture; return fixture;
} }
...@@ -130,10 +130,10 @@ static int test_default_cipherlist(SSL_CTX *ctx) ...@@ -130,10 +130,10 @@ static int test_default_cipherlist(SSL_CTX *ctx)
uint32_t expected_cipher_id, cipher_id; uint32_t expected_cipher_id, cipher_id;
ssl = SSL_new(ctx); ssl = SSL_new(ctx);
OPENSSL_assert(ssl != NULL); TEST_check(ssl != NULL);
ciphers = SSL_get1_supported_ciphers(ssl); ciphers = SSL_get1_supported_ciphers(ssl);
OPENSSL_assert(ciphers != NULL); TEST_check(ciphers != NULL);
num_expected_ciphers = OSSL_NELEM(default_ciphers_in_order); num_expected_ciphers = OSSL_NELEM(default_ciphers_in_order);
num_ciphers = sk_SSL_CIPHER_num(ciphers); num_ciphers = sk_SSL_CIPHER_num(ciphers);
if (!TEST_int_eq(num_ciphers, num_expected_ciphers)) if (!TEST_int_eq(num_ciphers, num_expected_ciphers))
...@@ -183,8 +183,8 @@ static int test_default_cipherlist_implicit() ...@@ -183,8 +183,8 @@ static int test_default_cipherlist_implicit()
static int test_default_cipherlist_explicit() static int test_default_cipherlist_explicit()
{ {
SETUP_CIPHERLIST_TEST_FIXTURE(); SETUP_CIPHERLIST_TEST_FIXTURE();
OPENSSL_assert(SSL_CTX_set_cipher_list(fixture.server, "DEFAULT")); TEST_check(SSL_CTX_set_cipher_list(fixture.server, "DEFAULT"));
OPENSSL_assert(SSL_CTX_set_cipher_list(fixture.client, "DEFAULT")); TEST_check(SSL_CTX_set_cipher_list(fixture.client, "DEFAULT"));
EXECUTE_CIPHERLIST_TEST(); EXECUTE_CIPHERLIST_TEST();
} }
......
...@@ -16,33 +16,10 @@ ...@@ -16,33 +16,10 @@
#include <openssl/pem.h> #include <openssl/pem.h>
#include <openssl/conf.h> #include <openssl/conf.h>
#include <openssl/err.h> #include <openssl/err.h>
#include "e_os.h"
#include "../e_os.h" #include "test_main.h"
#include "test_main_custom.h"
static const char *progname; #include "testutil.h"
static void test_usage(void)
{
fprintf(stderr, "usage: %s certfile\n", progname);
}
static void print_errors(void)
{
unsigned long err;
char buffer[1024];
const char *file;
const char *data;
int line;
int flags;
while ((err = ERR_get_error_line_data(&file, &line, &data, &flags)) != 0) {
ERR_error_string_n(err, buffer, sizeof(buffer));
if (flags & ERR_TXT_STRING)
fprintf(stderr, "Error: %s:%s:%d:%s\n", buffer, file, line, data);
else
fprintf(stderr, "Error: %s:%s:%d\n", buffer, file, line);
}
}
static int test_certs(BIO *fp) static int test_certs(BIO *fp)
{ {
...@@ -173,59 +150,31 @@ static int test_certs(BIO *fp) ...@@ -173,59 +150,31 @@ static int test_certs(BIO *fp)
} }
/* Some other PEM read error */ /* Some other PEM read error */
print_errors();
return 0; return 0;
} }
int main(int argc, char *argv[]) int test_main(int argc, char *argv[])
{ {
BIO *bio_err; BIO *bio_err;
const char *p;
int ret = 1; int ret = 1;
progname = argv[0]; if (argc < 2)
if (argc < 2) { TEST_error("usage: %s certfile...", argv[0]);
test_usage();
EXIT(ret);
}
bio_err = BIO_new_fp(stderr, BIO_NOCLOSE | BIO_FP_TEXT); bio_err = BIO_new_fp(stderr, BIO_NOCLOSE | BIO_FP_TEXT);
p = getenv("OPENSSL_DEBUG_MEMORY"); for (argv++; *argv; argv++) {
if (p != NULL && strcmp(p, "on") == 0)
CRYPTO_set_mem_debug(1);
CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON);
argc--;
argv++;
while (argc >= 1) {
BIO *f = BIO_new_file(*argv, "r"); BIO *f = BIO_new_file(*argv, "r");
int ok; int ok;
if (f == NULL) { TEST_check(f != NULL);
fprintf(stderr, "%s: Error opening cert file: '%s': %s\n", ok = test_certs(f);
progname, *argv, strerror(errno));
EXIT(ret);
}
ret = !(ok = test_certs(f));
BIO_free(f); BIO_free(f);
if (!ok) { if (!TEST_int_eq(ok, 1))
printf("%s ERROR\n", *argv);
ret = 1;
break; break;
} ret = 0;
printf("%s OK\n", *argv);
argc--;
argv++;
} }
#ifndef OPENSSL_NO_CRYPTO_MDEBUG
if (CRYPTO_mem_leaks(bio_err) <= 0)
ret = 1;
#endif
BIO_free(bio_err); BIO_free(bio_err);
EXIT(ret); return ret;
} }
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册