Fix test_suite_pk.function to work on 64-bit ILP32
This change fixes a problem in the tests pk_rsa_alt() and pk_rsa_overflow() from test_suite_pk.function that would cause a segmentation fault. The problem is that these tests are only designed to run in computers where the SIZE_MAX > UINT_MAX.
This commit is contained in:
parent
3b8fbaab87
commit
7ea67274f7
@ -5,8 +5,7 @@
|
|||||||
#include "mbedtls/ecp.h"
|
#include "mbedtls/ecp.h"
|
||||||
#include "mbedtls/rsa.h"
|
#include "mbedtls/rsa.h"
|
||||||
|
|
||||||
/* For detecting 64-bit compilation */
|
#include <limits.h>
|
||||||
#include "mbedtls/bignum.h"
|
|
||||||
|
|
||||||
static int rnd_std_rand( void *rng_state, unsigned char *output, size_t len );
|
static int rnd_std_rand( void *rng_state, unsigned char *output, size_t len );
|
||||||
|
|
||||||
@ -413,11 +412,14 @@ exit:
|
|||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
/* BEGIN_CASE depends_on:MBEDTLS_RSA_C:MBEDTLS_HAVE_INT64 */
|
/* BEGIN_CASE depends_on:MBEDTLS_RSA_C */
|
||||||
void pk_rsa_overflow( )
|
void pk_rsa_overflow( )
|
||||||
{
|
{
|
||||||
mbedtls_pk_context pk;
|
mbedtls_pk_context pk;
|
||||||
size_t hash_len = (size_t)-1;
|
size_t hash_len = SIZE_MAX;
|
||||||
|
|
||||||
|
if( SIZE_MAX <= UINT_MAX )
|
||||||
|
return;
|
||||||
|
|
||||||
mbedtls_pk_init( &pk );
|
mbedtls_pk_init( &pk );
|
||||||
|
|
||||||
@ -486,13 +488,13 @@ void pk_rsa_alt( )
|
|||||||
TEST_ASSERT( strcmp( mbedtls_pk_get_name( &alt ), "RSA-alt" ) == 0 );
|
TEST_ASSERT( strcmp( mbedtls_pk_get_name( &alt ), "RSA-alt" ) == 0 );
|
||||||
|
|
||||||
/* Test signature */
|
/* Test signature */
|
||||||
TEST_ASSERT( mbedtls_pk_sign( &alt, MBEDTLS_MD_NONE, hash, sizeof hash,
|
#if SIZE_MAX > UINT_MAX
|
||||||
sig, &sig_len, rnd_std_rand, NULL ) == 0 );
|
TEST_ASSERT( mbedtls_pk_sign( &alt, MBEDTLS_MD_NONE, hash, SIZE_MAX,
|
||||||
#if defined(MBEDTLS_HAVE_INT64)
|
sig, &sig_len, rnd_std_rand, NULL ) ==
|
||||||
TEST_ASSERT( mbedtls_pk_sign( &alt, MBEDTLS_MD_NONE, hash, (size_t)-1,
|
|
||||||
NULL, NULL, rnd_std_rand, NULL ) ==
|
|
||||||
MBEDTLS_ERR_PK_BAD_INPUT_DATA );
|
MBEDTLS_ERR_PK_BAD_INPUT_DATA );
|
||||||
#endif /* MBEDTLS_HAVE_INT64 */
|
#endif /* SIZE_MAX > UINT_MAX */
|
||||||
|
TEST_ASSERT( mbedtls_pk_sign( &alt, MBEDTLS_MD_NONE, hash, sizeof hash,
|
||||||
|
sig, &sig_len, rnd_std_rand, NULL ) == 0 );
|
||||||
TEST_ASSERT( sig_len == RSA_KEY_LEN );
|
TEST_ASSERT( sig_len == RSA_KEY_LEN );
|
||||||
TEST_ASSERT( mbedtls_pk_verify( &rsa, MBEDTLS_MD_NONE,
|
TEST_ASSERT( mbedtls_pk_verify( &rsa, MBEDTLS_MD_NONE,
|
||||||
hash, sizeof hash, sig, sig_len ) == 0 );
|
hash, sizeof hash, sig, sig_len ) == 0 );
|
||||||
|
Loading…
Reference in New Issue
Block a user