]> git.ipfire.org Git - thirdparty/openssl.git/blame - test/stack_test.c
Fix 0 -> NULL, indentation
[thirdparty/openssl.git] / test / stack_test.c
CommitLineData
98374961
P
1/*
2 * Copyright 2017 The OpenSSL Project Authors. All Rights Reserved.
3 *
4 * Licensed under the OpenSSL license (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
8 */
9
10/* ====================================================================
11 * Copyright (c) 2017 Oracle and/or its affiliates. All rights reserved.
12 */
13
14#include <stdio.h>
15#include <string.h>
16
17#include <openssl/opensslconf.h>
18#include <openssl/safestack.h>
19#include <openssl/err.h>
20#include <openssl/crypto.h>
21
22#include "e_os.h"
23#include "test_main.h"
24#include "testutil.h"
25
26/* The macros below generate unused functions which error out one of the clang
27 * builds. We disable this check here.
28 */
29#ifdef __clang__
30#pragma clang diagnostic ignored "-Wunused-function"
31#endif
32
33typedef struct {
34 int n;
35 char c;
36} SS;
37
38typedef union {
39 int n;
40 char c;
41} SU;
42
43DEFINE_SPECIAL_STACK_OF(sint, int)
44DEFINE_SPECIAL_STACK_OF_CONST(uchar, unsigned char)
45DEFINE_STACK_OF(SS)
46DEFINE_STACK_OF_CONST(SU)
47
48static int int_compare(const int *const *a, const int *const *b)
49{
50 if (**a < **b)
51 return -1;
52 if (**a > **b)
53 return 1;
54 return 0;
55}
56
57static int test_int_stack(void)
58{
59 static int v[] = { 1, 2, -4, 16, 999, 1, -173, 1, 9 };
3fb2c3e4 60 static int notpresent = -1;
98374961
P
61 const int n = OSSL_NELEM(v);
62 static struct {
63 int value;
64 int unsorted;
65 int sorted;
66 int ex;
67 } finds[] = {
68 { 2, 1, 5, 5 },
69 { 9, 7, 6, 6 },
70 { -173, 5, 0, 0 },
71 { 999, 3, 8, 8 },
72 { 0, -1, -1, 1 }
73 };
74 const int n_finds = OSSL_NELEM(finds);
75 static struct {
76 int value;
77 int ex;
78 } exfinds[] = {
79 { 3, 5 },
80 { 1000, 8 },
81 { 20, 8 },
82 { -999, 0 },
83 { -5, 0 },
84 { 8, 5 }
85 };
86 const int n_exfinds = OSSL_NELEM(exfinds);
87 STACK_OF(sint) *s = sk_sint_new_null();
88 int i;
89 int testresult = 0;
90
91 /* Check push and num */
92 for (i = 0; i < n; i++) {
93 if (sk_sint_num(s) != i) {
94 fprintf(stderr, "test int stack size %d\n", i);
95 goto end;
96 }
97 sk_sint_push(s, v + i);
98 }
99 if (sk_sint_num(s) != n) {
100 fprintf(stderr, "test int stack size %d\n", n);
101 goto end;
102 }
103
104 /* check the values */
105 for (i = 0; i < n; i++)
106 if (sk_sint_value(s, i) != v + i) {
107 fprintf(stderr, "test int value %d\n", i);
108 goto end;
109 }
110
111 /* find unsorted -- the pointers are compared */
3fb2c3e4
MC
112 for (i = 0; i < n_finds; i++) {
113 int *val = (finds[i].unsorted == -1) ? &notpresent
114 : v + finds[i].unsorted;
115
116 if (sk_sint_find(s, val) != finds[i].unsorted) {
98374961
P
117 fprintf(stderr, "test int unsorted find %d\n", i);
118 goto end;
119 }
3fb2c3e4 120 }
98374961
P
121
122 /* find_ex unsorted */
3fb2c3e4
MC
123 for (i = 0; i < n_finds; i++) {
124 int *val = (finds[i].unsorted == -1) ? &notpresent
125 : v + finds[i].unsorted;
126
127 if (sk_sint_find_ex(s, val) != finds[i].unsorted) {
98374961
P
128 fprintf(stderr, "test int unsorted find_ex %d\n", i);
129 goto end;
130 }
3fb2c3e4 131 }
98374961
P
132
133 /* sorting */
134 if (sk_sint_is_sorted(s)) {
135 fprintf(stderr, "test int unsorted\n");
136 goto end;
137 }
138 sk_sint_set_cmp_func(s, &int_compare);
139 sk_sint_sort(s);
140 if (!sk_sint_is_sorted(s)) {
141 fprintf(stderr, "test int sorted\n");
142 goto end;
143 }
144
145 /* find sorted -- the value is matched so we don't need to locate it */
146 for (i = 0; i < n_finds; i++)
147 if (sk_sint_find(s, &finds[i].value) != finds[i].sorted) {
148 fprintf(stderr, "test int sorted find %d\n", i);
149 goto end;
150 }
151
152 /* find_ex sorted */
153 for (i = 0; i < n_finds; i++)
154 if (sk_sint_find_ex(s, &finds[i].value) != finds[i].ex) {
155 fprintf(stderr, "test int sorted find_ex present %d\n", i);
156 goto end;
157 }
158 for (i = 0; i < n_exfinds; i++)
159 if (sk_sint_find_ex(s, &exfinds[i].value) != exfinds[i].ex) {
160 fprintf(stderr, "test int sorted find_ex absent %d\n", i);
161 goto end;
162 }
163
164 /* shift */
165 if (sk_sint_shift(s) != v + 6) {
166 fprintf(stderr, "test int shift\n");
167 goto end;
168 }
169
170 testresult = 1;
171end:
172 sk_sint_free(s);
173 return testresult;
174}
175
176static int uchar_compare(const unsigned char *const *a,
177 const unsigned char *const *b)
178{
179 return **a - (signed int)**b;
180}
181
182static int test_uchar_stack(void)
183{
184 static const unsigned char v[] = { 1, 3, 7, 5, 255, 0 };
185 const int n = OSSL_NELEM(v);
186 STACK_OF(uchar) *s = sk_uchar_new(&uchar_compare), *r = NULL;
187 int i;
188 int testresult = 0;
189
190 /* unshift and num */
191 for (i = 0; i < n; i++) {
192 if (sk_uchar_num(s) != i) {
193 fprintf(stderr, "test uchar stack size %d\n", i);
194 goto end;
195 }
196 sk_uchar_unshift(s, v + i);
197 }
198 if (sk_uchar_num(s) != n) {
199 fprintf(stderr, "test uchar stack size %d\n", n);
200 goto end;
201 }
202
203 /* dup */
204 r = sk_uchar_dup(s);
205 if (sk_uchar_num(r) != n) {
206 fprintf(stderr, "test uchar dup size %d\n", n);
207 goto end;
208 }
209 sk_uchar_sort(r);
210
211 /* pop */
212 for (i = 0; i < n; i++)
213 if (sk_uchar_pop(s) != v + i) {
214 fprintf(stderr, "test uchar pop %d\n", i);
215 goto end;
216 }
217
218 /* free -- we rely on the debug malloc to detect leakage here */
219 sk_uchar_free(s);
220 s = NULL;
221
222 /* dup again */
223 if (sk_uchar_num(r) != n) {
224 fprintf(stderr, "test uchar dup size %d\n", n);
225 goto end;
226 }
227
228 /* zero */
229 sk_uchar_zero(r);
230 if (sk_uchar_num(r) != 0) {
231 fprintf(stderr, "test uchar zero %d\n", n);
232 goto end;
233 }
234
235 /* insert */
236 sk_uchar_insert(r, v, 0);
237 sk_uchar_insert(r, v + 2, -1);
238 sk_uchar_insert(r, v + 1, 1);
239 for (i = 0; i < 3; i++)
240 if (sk_uchar_value(r, i) != v + i) {
241 fprintf(stderr, "test uchar insert %d\n", i);
242 goto end;
243 }
244
245 /* delete */
246 if (sk_uchar_delete(r, 12) != NULL) {
247 fprintf(stderr, "test uchar delete missing %d\n", n);
248 goto end;
249 }
250 if (sk_uchar_delete(r, 1) != v + 1) {
251 fprintf(stderr, "test uchar delete middle %d\n", n);
252 goto end;
253 }
254
255 /* set */
256 sk_uchar_set(r, 1, v + 1);
257 for (i = 0; i < 2; i++)
258 if (sk_uchar_value(r, i) != v + i) {
259 fprintf(stderr, "test uchar set %d\n", i);
260 goto end;
261 }
262
263 testresult = 1;
264end:
265 sk_uchar_free(r);
266 sk_uchar_free(s);
267 return testresult;
268}
269
270static SS *SS_copy(const SS *p)
271{
272 SS *q = OPENSSL_malloc(sizeof(*q));
273
274 if (q != NULL)
275 memcpy(q, p, sizeof(*q));
276 return q;
277}
278
279static void SS_free(SS *p) {
280 OPENSSL_free(p);
281}
282
283static int test_SS_stack(void)
284{
285 STACK_OF(SS) *s = sk_SS_new_null();
286 STACK_OF(SS) *r = NULL;
287 SS *v[10], *p;
288 const int n = OSSL_NELEM(v);
289 int i;
290 int testresult = 0;
291
292 /* allocate and push */
293 for (i = 0; i < n; i++) {
294 v[i] = OPENSSL_malloc(sizeof(*v[i]));
295
296 if (v[i] == NULL) {
297 fprintf(stderr, "test SS memory allocation failure\n");
298 goto end;
299 }
300 v[i]->n = i;
301 v[i]->c = 'A' + i;
302 if (sk_SS_num(s) != i) {
303 fprintf(stderr, "test SS stack size %d\n", i);
304 goto end;
305 }
306 sk_SS_push(s, v[i]);
307 }
308 if (sk_SS_num(s) != n) {
309 fprintf(stderr, "test SS size %d\n", n);
310 goto end;
311 }
312
313 /* deepcopy */
314 r = sk_SS_deep_copy(s, &SS_copy, &SS_free);
315 if (r == NULL) {
316 fprintf(stderr, "test SS deepcopy failure\n");
317 goto end;
318 }
319 for (i = 0; i < n; i++) {
320 p = sk_SS_value(r, i);
321 if (p == v[i]) {
322 fprintf(stderr, "test SS deepcopy non-copy %d\n", i);
323 goto end;
324 }
325 if (p->n != v[i]->n || p->c != v[i]->c) {
326 fprintf(stderr, "test SS deepcopy values %d\n", i);
327 goto end;
328 }
329 }
330
331 /* pop_free - we rely on the malloc debug to catch the leak */
332 sk_SS_pop_free(r, &SS_free);
333 r = NULL;
334
335 /* delete_ptr */
336 if ((p = sk_SS_delete_ptr(s, v[3])) == NULL) {
337 fprintf(stderr, "test SS delete ptr not found\n");
338 goto end;
339 }
340 SS_free(p);
341 if (sk_SS_num(s) != n-1) {
342 fprintf(stderr, "test SS delete ptr size\n");
343 goto end;
344 }
345 for (i = 0; i < n-1; i++)
346 if (sk_SS_value(s, i) != v[i<3 ? i : 1+i]) {
347 fprintf(stderr, "test SS delete ptr item %d\n", i);
348 goto end;
349 }
350
351 testresult = 1;
352end:
353 sk_SS_pop_free(r, &SS_free);
354 sk_SS_pop_free(s, &SS_free);
355 return testresult;
356}
357
358static int test_SU_stack(void)
359{
360 STACK_OF(SU) *s = sk_SU_new_null();
361 SU v[10];
362 const int n = OSSL_NELEM(v);
363 int i;
364 int testresult = 0;
365
366 /* allocate and push */
367 for (i = 0; i < n; i++) {
368 if ((i & 1) == 0)
369 v[i].n = i;
370 else
371 v[i].c = 'A' + i;
372 if (sk_SU_num(s) != i) {
373 fprintf(stderr, "test SU stack size %d\n", i);
374 goto end;
375 }
376 sk_SU_push(s, v + i);
377 }
378 if (sk_SU_num(s) != n) {
379 fprintf(stderr, "test SU size %d\n", n);
380 goto end;
381 }
382
383 /* check the pointers are correct */
384 for (i = 0; i < n; i++)
385 if (sk_SU_value(s, i) != v + i) {
386 fprintf(stderr, "test SU pointer check %d\n", i);
387 goto end;
388 }
389
390 testresult = 1;
391end:
392 sk_SU_free(s);
393 return testresult;
394}
395
396void register_tests(void)
397{
398 ADD_TEST(test_int_stack);
399 ADD_TEST(test_uchar_stack);
400 ADD_TEST(test_SS_stack);
401 ADD_TEST(test_SU_stack);
402}