Skip to content

Commit 68cc580

Browse files
committed
use macros in more tests
1 parent a331095 commit 68cc580

File tree

9 files changed

+15
-22
lines changed

9 files changed

+15
-22
lines changed

tests/base16_test.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ int base16_test(void)
4646

4747
l1 = 4;
4848
l2 = sizeof(tmp);
49-
DO(base16_decode(failing_decode, l1, tmp, &l2) == CRYPT_OK ? CRYPT_FAIL_TESTVECTOR : CRYPT_OK);
49+
SHOULD_FAIL(base16_decode(failing_decode, l1, tmp, &l2));
5050

5151
return CRYPT_OK;
5252
}

tests/common.h

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,11 +17,13 @@ extern prng_state yarrow_prng;
1717
#define DO(x) do { fprintf(stderr, "%s:\n", #x); run_cmd((x), __LINE__, __FILE__, #x, NULL); } while (0)
1818
#define DOX(x, str) do { fprintf(stderr, "%s - %s:\n", #x, (str)); run_cmd((x), __LINE__, __FILE__, #x, (str)); } while (0)
1919
#define SHOULD_FAIL(x) do { fprintf(stderr, "%s:\n", #x); run_cmd((x) != CRYPT_OK ? CRYPT_OK : CRYPT_FAIL_TESTVECTOR, __LINE__, __FILE__, #x, NULL); } while (0)
20+
#define SHOULD_FAIL_WITH(x, e) do { fprintf(stderr, "%s:\n", #x); run_cmd((x) == (e) ? CRYPT_OK : CRYPT_FAIL_TESTVECTOR, __LINE__, __FILE__, #x, NULL); } while (0)
2021
#define ENSURE(x) do { fprintf(stderr, "%s:\n", #x); run_cmd(((x)) ? CRYPT_OK : CRYPT_FAIL_TESTVECTOR, __LINE__, __FILE__, #x, NULL); } while (0)
2122
#else
2223
#define DO(x) do { run_cmd((x), __LINE__, __FILE__, #x, NULL); } while (0)
2324
#define DOX(x, str) do { run_cmd((x), __LINE__, __FILE__, #x, (str)); } while (0)
2425
#define SHOULD_FAIL(x) do { run_cmd((x) != CRYPT_OK ? CRYPT_OK : CRYPT_FAIL_TESTVECTOR, __LINE__, __FILE__, #x, NULL); } while (0)
26+
#define SHOULD_FAIL_WITH(x, e) do { run_cmd((x) == (e) ? CRYPT_OK : CRYPT_FAIL_TESTVECTOR, __LINE__, __FILE__, #x, NULL); } while (0)
2527
#define ENSURE(x) do { run_cmd(((x)) ? CRYPT_OK : CRYPT_FAIL_TESTVECTOR, __LINE__, __FILE__, #x, NULL); } while (0)
2628
#endif
2729

tests/der_test.c

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1376,14 +1376,14 @@ static void _der_regression_test(void)
13761376
mp_init_multi(&x, &y, NULL);
13771377
LTC_SET_ASN1(seq, 0, LTC_ASN1_INTEGER, x, 1UL);
13781378
LTC_SET_ASN1(seq, 1, LTC_ASN1_INTEGER, y, 1UL);
1379-
DO(der_decode_sequence(_broken_sequence, sizeof(_broken_sequence), seq, 2) != CRYPT_OK ? CRYPT_OK : CRYPT_FAIL_TESTVECTOR);
1379+
SHOULD_FAIL(der_decode_sequence(_broken_sequence, sizeof(_broken_sequence), seq, 2));
13801380
mp_cleanup_multi(&y, &x, NULL);
13811381
len = sizeof(_broken_sequence);
13821382

13831383
mp_init_multi(&x, &y, NULL);
13841384
LTC_SET_ASN1(seq, 0, LTC_ASN1_INTEGER, x, 1UL);
13851385
LTC_SET_ASN1(seq, 1, LTC_ASN1_INTEGER, y, 1UL);
1386-
DO(der_decode_sequence(_addtl_bytes, sizeof(_addtl_bytes), seq, 2) == CRYPT_INPUT_TOO_LONG ? CRYPT_OK : CRYPT_FAIL_TESTVECTOR);
1386+
SHOULD_FAIL_WITH(der_decode_sequence(_addtl_bytes, sizeof(_addtl_bytes), seq, 2), CRYPT_INPUT_TOO_LONG);
13871387
mp_cleanup_multi(&y, &x, NULL);
13881388
len = sizeof(_addtl_bytes);
13891389
_der_decode_print(_addtl_bytes, &len);

tests/padding_test.c

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -190,18 +190,16 @@ int padding_test(void)
190190
if ((tv[i].mode & LTC_PAD_MASK) != LTC_PAD_ISO_10126)
191191
#endif
192192
{
193-
DO(compare_testvector(tv[i].data, sizeof(tv[i].data), buf, l, "padding fixed TV", i) == 0 ? CRYPT_OK : CRYPT_FAIL_TESTVECTOR);
193+
COMPARE_TESTVECTOR(tv[i].data, sizeof(tv[i].data), buf, l, "padding fixed TV", i);
194194
}
195195
}
196196

197197
/* wycheproof failing test - https://github.com/libtom/libtomcrypt/pull/454 */
198198
{
199199
unsigned char data[] = { 0x47,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00 };
200200
unsigned long len = sizeof(data);
201-
int err;
202201

203-
err = padding_depad(data, &len, (LTC_PAD_PKCS7 | 16));
204-
if (err == CRYPT_OK) return CRYPT_FAIL_TESTVECTOR; /* should fail */
202+
SHOULD_FAIL(padding_depad(data, &len, (LTC_PAD_PKCS7 | 16)));
205203
}
206204

207205
return CRYPT_OK;

tests/pkcs_1_eme_test.c

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,8 +50,7 @@ int pkcs_1_eme_test(void)
5050
int stat;
5151
prng_descriptor[prng_idx].add_entropy(s->o2, s->o2_l, (prng_state*)no_prng_desc);
5252
DOX(rsa_encrypt_key_ex(s->o1, s->o1_l, obuf, &obuflen, NULL, 0, (prng_state*)no_prng_desc, prng_idx, -1, LTC_PKCS_1_V1_5, key), s->name);
53-
DOX(obuflen == (unsigned long)s->o3_l?CRYPT_OK:CRYPT_FAIL_TESTVECTOR, s->name);
54-
DOX(memcmp(s->o3, obuf, s->o3_l)==0?CRYPT_OK:CRYPT_FAIL_TESTVECTOR, s->name);
53+
COMPARE_TESTVECTOR(obuf, obuflen, s->o3, s->o3_l,s->name, j);
5554
DOX(rsa_decrypt_key_ex(obuf, obuflen, buf, &buflen, NULL, 0, -1, LTC_PKCS_1_V1_5, &stat, key), s->name);
5655
DOX(stat == 1?CRYPT_OK:CRYPT_FAIL_TESTVECTOR, s->name);
5756
} /* for */

tests/pkcs_1_emsa_test.c

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,8 +47,7 @@ int pkcs_1_emsa_test(void)
4747
int stat;
4848
DOX(hash_memory(hash_idx, s->o1, s->o1_l, buf, &buflen), s->name);
4949
DOX(rsa_sign_hash_ex(buf, buflen, obuf, &obuflen, LTC_PKCS_1_V1_5, NULL, -1, hash_idx, 0, key), s->name);
50-
DOX(obuflen == (unsigned long)s->o2_l?CRYPT_OK:CRYPT_FAIL_TESTVECTOR, s->name);
51-
DOX(memcmp(s->o2, obuf, s->o2_l)==0?CRYPT_OK:CRYPT_FAIL_TESTVECTOR, s->name);
50+
COMPARE_TESTVECTOR(obuf, obuflen, s->o2, s->o2_l,s->name, j);
5251
DOX(rsa_verify_hash_ex(obuf, obuflen, buf, buflen, LTC_PKCS_1_V1_5, hash_idx, 0, &stat, key), s->name);
5352
DOX(stat == 1?CRYPT_OK:CRYPT_FAIL_TESTVECTOR, s->name);
5453
} /* for */

tests/pkcs_1_oaep_test.c

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,8 +50,7 @@ int pkcs_1_oaep_test(void)
5050
int stat;
5151
prng_descriptor[prng_idx].add_entropy(s->o2, s->o2_l, (prng_state*)no_prng_desc);
5252
DOX(rsa_encrypt_key(s->o1, s->o1_l, obuf, &obuflen, NULL, 0, (prng_state*)no_prng_desc, prng_idx, hash_idx, key), s->name);
53-
DOX(obuflen == (unsigned long)s->o3_l?CRYPT_OK:CRYPT_FAIL_TESTVECTOR, s->name);
54-
DOX(memcmp(s->o3, obuf, s->o3_l)==0?CRYPT_OK:CRYPT_FAIL_TESTVECTOR, s->name);
53+
COMPARE_TESTVECTOR(obuf, obuflen, s->o3, s->o3_l,s->name, j);
5554
DOX(rsa_decrypt_key(obuf, obuflen, buf, &buflen, NULL, 0, hash_idx, &stat, key), s->name);
5655
DOX(stat == 1?CRYPT_OK:CRYPT_FAIL_TESTVECTOR, s->name);
5756
} /* for */

tests/pkcs_1_pss_test.c

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,8 +51,7 @@ int pkcs_1_pss_test(void)
5151
prng_descriptor[prng_idx].add_entropy(s->o2, s->o2_l, (prng_state*)no_prng_desc);
5252
DOX(hash_memory(hash_idx, s->o1, s->o1_l, buf, &buflen), s->name);
5353
DOX(rsa_sign_hash(buf, buflen, obuf, &obuflen, (prng_state*)no_prng_desc, prng_idx, hash_idx, s->o2_l, key), s->name);
54-
DOX(obuflen == (unsigned long)s->o3_l?CRYPT_OK:CRYPT_FAIL_TESTVECTOR, s->name);
55-
DOX(memcmp(s->o3, obuf, s->o3_l)==0?CRYPT_OK:CRYPT_FAIL_TESTVECTOR, s->name);
54+
COMPARE_TESTVECTOR(obuf, obuflen, s->o3, s->o3_l,s->name, j);
5655
DOX(rsa_verify_hash(obuf, obuflen, buf, buflen, hash_idx, s->o2_l, &stat, key), s->name);
5756
DOX(stat == 1?CRYPT_OK:CRYPT_FAIL_TESTVECTOR, s->name);
5857
} /* for */

tests/rsa_test.c

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -354,7 +354,7 @@ int rsa_test(void)
354354
{
355355
unsigned char in[1024], out[1024], tmp[3072];
356356
rsa_key key, privKey, pubKey;
357-
int hash_idx, prng_idx, stat, stat2, i, err;
357+
int hash_idx, prng_idx, stat, stat2, i;
358358
unsigned long rsa_msgsize, len, len2, len3, cnt, cnt2;
359359
static unsigned char lparam[] = { 0x01, 0x02, 0x03, 0x04 };
360360
void* dP;
@@ -421,8 +421,7 @@ print_hex("q", tmp, len);
421421
DO(rsa_encrypt_key(in, rsa_msgsize, out, &len, NULL, 0, &yarrow_prng, prng_idx, hash_idx, &key));
422422
/* change a byte */
423423
out[8] ^= 1;
424-
DOX((err = rsa_decrypt_key(out, len, tmp, &len2, NULL, 0, hash_idx, &stat2, &key))
425-
== CRYPT_INVALID_PACKET ? CRYPT_OK:err, "should fail");
424+
SHOULD_FAIL(rsa_decrypt_key(out, len, tmp, &len2, NULL, 0, hash_idx, &stat2, &key));
426425
/* change a byte back */
427426
out[8] ^= 1;
428427
if (len2 != rsa_msgsize) {
@@ -453,8 +452,7 @@ print_hex("q", tmp, len);
453452
DO(rsa_encrypt_key(in, rsa_msgsize, out, &len, lparam, sizeof(lparam), &yarrow_prng, prng_idx, hash_idx, &key));
454453
/* change a byte */
455454
out[8] ^= 1;
456-
DOX((err = rsa_decrypt_key(out, len, tmp, &len2, lparam, sizeof(lparam), hash_idx, &stat2, &key))
457-
== CRYPT_INVALID_PACKET ? CRYPT_OK:err, "should fail");
455+
SHOULD_FAIL(rsa_decrypt_key(out, len, tmp, &len2, lparam, sizeof(lparam), hash_idx, &stat2, &key));
458456
if (len2 != rsa_msgsize) {
459457
fprintf(stderr, "\n%i:rsa_decrypt_key mismatch len %lu (first decrypt)", __LINE__, len2);
460458
return 1;
@@ -671,8 +669,7 @@ print_hex("q", tmp, len);
671669

672670
len3 = sizeof(tmp);
673671
/* (6) */
674-
DOX(rsa_verify_hash_ex(p2, len2, p, 20, LTC_PKCS_1_V1_5, hash_idx, -1, &stat, &pubKey)
675-
== CRYPT_INVALID_PACKET ? CRYPT_OK:CRYPT_INVALID_PACKET, "should fail");
672+
SHOULD_FAIL(rsa_verify_hash_ex(p2, len2, p, 20, LTC_PKCS_1_V1_5, hash_idx, -1, &stat, &pubKey));
676673
DOX(stat == 0?CRYPT_OK:CRYPT_FAIL_TESTVECTOR, "should fail");
677674
}
678675
rsa_free(&key);

0 commit comments

Comments
 (0)