From: Joey Date: Wed, 14 Nov 2018 12:26:12 +0000 (+0800) Subject: convert rsa_test X-Git-Tag: v9.13.4~21^2~9 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=b915cdbf0be46f39711681c33bdd5e39a4310ad4;p=thirdparty%2Fbind9.git convert rsa_test --- diff --git a/lib/dns/tests/rsa_test.c b/lib/dns/tests/rsa_test.c index a92464f774e..f1adb0eee29 100644 --- a/lib/dns/tests/rsa_test.c +++ b/lib/dns/tests/rsa_test.c @@ -10,14 +10,21 @@ */ -/* ! \file */ - #include -#include +#if HAVE_CMOCKA + +#include +#include +#include #include +#include #include +#include + +#define UNIT_TESTING +#include #include #include @@ -28,6 +35,27 @@ #include "../dst_internal.h" +static int +_setup(void **state) { + isc_result_t result; + + UNUSED(state); + + result = dns_test_begin(NULL, false); + assert_int_equal(result, ISC_R_SUCCESS); + + return (0); +} + +static int +_teardown(void **state) { + UNUSED(state); + + dns_test_end(); + + return (0); +} + static unsigned char d[10] = { 0xa, 0x10, 0xbb, 0, 0xfe, 0x15, 0x1, 0x88, 0xcc, 0x7d }; @@ -172,11 +200,9 @@ static unsigned char sigsha512[512] = { 0xff, 0x6a, 0x63, 0x8b, 0xe1, 0x2e, 0xa3, 0xa7 }; -ATF_TC(isc_rsa_verify); -ATF_TC_HEAD(isc_rsa_verify, tc) { - atf_tc_set_md_var(tc, "descr", "RSA verify"); -} -ATF_TC_BODY(isc_rsa_verify, tc) { +/* RSA verify */ +static void +isc_rsa_verify_test(void **state) { isc_result_t ret; dns_fixedname_t fname; isc_buffer_t buf; @@ -185,36 +211,33 @@ ATF_TC_BODY(isc_rsa_verify, tc) { dst_context_t *ctx = NULL; isc_region_t r; - UNUSED(tc); - - ret = dns_test_begin(NULL, false); - ATF_REQUIRE_EQ(ret, ISC_R_SUCCESS); + UNUSED(state); name = dns_fixedname_initname(&fname); isc_buffer_constinit(&buf, "rsa.", 4); isc_buffer_add(&buf, 4); ret = dns_name_fromtext(name, &buf, NULL, 0, NULL); - ATF_REQUIRE_EQ(ret, ISC_R_SUCCESS); + assert_int_equal(ret, ISC_R_SUCCESS); ret = dst_key_fromfile(name, 29235, DST_ALG_RSASHA1, DST_TYPE_PUBLIC, "./", mctx, &key); - ATF_REQUIRE_EQ(ret, ISC_R_SUCCESS); + assert_int_equal(ret, ISC_R_SUCCESS); /* RSASHA1 */ ret = dst_context_create(key, mctx, DNS_LOGCATEGORY_DNSSEC, false, 0, &ctx); - ATF_REQUIRE_EQ(ret, ISC_R_SUCCESS); + assert_int_equal(ret, ISC_R_SUCCESS); r.base = d; r.length = 10; ret = dst_context_adddata(ctx, &r); - ATF_REQUIRE_EQ(ret, ISC_R_SUCCESS); + assert_int_equal(ret, ISC_R_SUCCESS); r.base = sigsha1; r.length = 256; ret = dst_context_verify(ctx, &r); - ATF_REQUIRE_EQ(ret, ISC_R_SUCCESS); + assert_int_equal(ret, ISC_R_SUCCESS); dst_context_destroy(&ctx); @@ -224,17 +247,17 @@ ATF_TC_BODY(isc_rsa_verify, tc) { ret = dst_context_create(key, mctx, DNS_LOGCATEGORY_DNSSEC, false, 0, &ctx); - ATF_REQUIRE_EQ(ret, ISC_R_SUCCESS); + assert_int_equal(ret, ISC_R_SUCCESS); r.base = d; r.length = 10; ret = dst_context_adddata(ctx, &r); - ATF_REQUIRE_EQ(ret, ISC_R_SUCCESS); + assert_int_equal(ret, ISC_R_SUCCESS); r.base = sigmd5; r.length = 256; ret = dst_context_verify(ctx, &r); - ATF_REQUIRE_EQ(ret, ISC_R_SUCCESS); + assert_int_equal(ret, ISC_R_SUCCESS); dst_context_destroy(&ctx); @@ -244,17 +267,17 @@ ATF_TC_BODY(isc_rsa_verify, tc) { ret = dst_context_create(key, mctx, DNS_LOGCATEGORY_DNSSEC, false, 0, &ctx); - ATF_REQUIRE_EQ(ret, ISC_R_SUCCESS); + assert_int_equal(ret, ISC_R_SUCCESS); r.base = d; r.length = 10; ret = dst_context_adddata(ctx, &r); - ATF_REQUIRE_EQ(ret, ISC_R_SUCCESS); + assert_int_equal(ret, ISC_R_SUCCESS); r.base = sigsha256; r.length = 256; ret = dst_context_verify(ctx, &r); - ATF_REQUIRE_EQ(ret, ISC_R_SUCCESS); + assert_int_equal(ret, ISC_R_SUCCESS); dst_context_destroy(&ctx); @@ -264,30 +287,42 @@ ATF_TC_BODY(isc_rsa_verify, tc) { ret = dst_context_create(key, mctx, DNS_LOGCATEGORY_DNSSEC, false, 0, &ctx); - ATF_REQUIRE_EQ(ret, ISC_R_SUCCESS); + assert_int_equal(ret, ISC_R_SUCCESS); r.base = d; r.length = 10; ret = dst_context_adddata(ctx, &r); - ATF_REQUIRE_EQ(ret, ISC_R_SUCCESS); + assert_int_equal(ret, ISC_R_SUCCESS); r.base = sigsha512; r.length = 256; ret = dst_context_verify(ctx, &r); - ATF_REQUIRE_EQ(ret, ISC_R_SUCCESS); + assert_int_equal(ret, ISC_R_SUCCESS); dst_context_destroy(&ctx); dst_key_free(&key); - dns_test_end(); } -/* - * Main - */ -ATF_TP_ADD_TCS(tp) { - ATF_TP_ADD_TC(tp, isc_rsa_verify); - return (atf_no_error()); +int +main(void) { + const struct CMUnitTest tests[] = { + cmocka_unit_test_setup_teardown(isc_rsa_verify_test, + _setup, _teardown), + }; + + return (cmocka_run_group_tests(tests, NULL, NULL)); +} + +#else /* HAVE_CMOCKA */ + +#include + +int +main(void) { + printf("1..0 # Skipped: cmocka not available\n"); + return (0); } +#endif