mirror of https://github.com/openssl/openssl.git
220 lines
6.6 KiB
C
220 lines
6.6 KiB
C
/*
|
|
* Copyright 2015-2025 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
#include <string.h>
|
|
#include <openssl/types.h>
|
|
#include "testutil.h"
|
|
#include "internal/numbers.h"
|
|
#include "internal/time.h"
|
|
|
|
#if defined(_POSIX_C_SOURCE) && _POSIX_C_SOURCE >= 200112L
|
|
# include <signal.h>
|
|
#endif
|
|
|
|
static int test_sanity_null_zero(void)
|
|
{
|
|
char *p;
|
|
char bytes[sizeof(p)];
|
|
|
|
/* Is NULL equivalent to all-bytes-zero? */
|
|
p = NULL;
|
|
memset(bytes, 0, sizeof(bytes));
|
|
return TEST_mem_eq(&p, sizeof(p), bytes, sizeof(bytes));
|
|
}
|
|
|
|
static int test_sanity_enum_size(void)
|
|
{
|
|
enum smallchoices { sa, sb, sc };
|
|
enum medchoices { ma, mb, mc, md, me, mf, mg, mh, mi, mj, mk, ml };
|
|
enum largechoices {
|
|
a01, b01, c01, d01, e01, f01, g01, h01, i01, j01,
|
|
a02, b02, c02, d02, e02, f02, g02, h02, i02, j02,
|
|
a03, b03, c03, d03, e03, f03, g03, h03, i03, j03,
|
|
a04, b04, c04, d04, e04, f04, g04, h04, i04, j04,
|
|
a05, b05, c05, d05, e05, f05, g05, h05, i05, j05,
|
|
a06, b06, c06, d06, e06, f06, g06, h06, i06, j06,
|
|
a07, b07, c07, d07, e07, f07, g07, h07, i07, j07,
|
|
a08, b08, c08, d08, e08, f08, g08, h08, i08, j08,
|
|
a09, b09, c09, d09, e09, f09, g09, h09, i09, j09,
|
|
a10, b10, c10, d10, e10, f10, g10, h10, i10, j10,
|
|
xxx };
|
|
|
|
/* Enum size */
|
|
if (!TEST_size_t_eq(sizeof(enum smallchoices), sizeof(int))
|
|
|| !TEST_size_t_eq(sizeof(enum medchoices), sizeof(int))
|
|
|| !TEST_size_t_eq(sizeof(enum largechoices), sizeof(int)))
|
|
return 0;
|
|
return 1;
|
|
}
|
|
|
|
static int test_sanity_twos_complement(void)
|
|
{
|
|
/* Basic two's complement checks. */
|
|
if (!TEST_int_eq(~(-1), 0)
|
|
|| !TEST_long_eq(~(-1L), 0L))
|
|
return 0;
|
|
return 1;
|
|
}
|
|
|
|
static int test_sanity_sign(void)
|
|
{
|
|
/* Check that values with sign bit 1 and value bits 0 are valid */
|
|
if (!TEST_int_eq(-(INT_MIN + 1), INT_MAX)
|
|
|| !TEST_long_eq(-(LONG_MIN + 1), LONG_MAX))
|
|
return 0;
|
|
return 1;
|
|
}
|
|
|
|
static int test_sanity_unsigned_conversion(void)
|
|
{
|
|
/* Check that unsigned-to-signed conversions preserve bit patterns */
|
|
if (!TEST_int_eq((int)((unsigned int)INT_MAX + 1), INT_MIN)
|
|
|| !TEST_long_eq((long)((unsigned long)LONG_MAX + 1), LONG_MIN))
|
|
return 0;
|
|
return 1;
|
|
}
|
|
|
|
static int test_sanity_range(void)
|
|
{
|
|
/* Verify some types are the correct size */
|
|
if (!TEST_size_t_eq(sizeof(int8_t), 1)
|
|
|| !TEST_size_t_eq(sizeof(uint8_t), 1)
|
|
|| !TEST_size_t_eq(sizeof(int16_t), 2)
|
|
|| !TEST_size_t_eq(sizeof(uint16_t), 2)
|
|
|| !TEST_size_t_eq(sizeof(int32_t), 4)
|
|
|| !TEST_size_t_eq(sizeof(uint32_t), 4)
|
|
|| !TEST_size_t_eq(sizeof(int64_t), 8)
|
|
|| !TEST_size_t_eq(sizeof(uint64_t), 8)
|
|
#ifdef UINT128_MAX
|
|
|| !TEST_size_t_eq(sizeof(int128_t), 16)
|
|
|| !TEST_size_t_eq(sizeof(uint128_t), 16)
|
|
#endif
|
|
|| !TEST_size_t_eq(sizeof(char), 1)
|
|
|| !TEST_size_t_eq(sizeof(unsigned char), 1))
|
|
return 0;
|
|
|
|
/* We want our long longs to be at least 64 bits */
|
|
if (!TEST_size_t_ge(sizeof(long long int), 8)
|
|
|| !TEST_size_t_ge(sizeof(unsigned long long int), 8))
|
|
return 0;
|
|
|
|
/*
|
|
* Verify intmax_t.
|
|
* Some platforms defined intmax_t to be 64 bits but still support
|
|
* an int128_t, so this check is for at least 64 bits.
|
|
*/
|
|
if (!TEST_size_t_ge(sizeof(ossl_intmax_t), 8)
|
|
|| !TEST_size_t_ge(sizeof(ossl_uintmax_t), 8)
|
|
|| !TEST_size_t_ge(sizeof(ossl_uintmax_t), sizeof(size_t)))
|
|
return 0;
|
|
|
|
/* This isn't possible to check using the framework functions */
|
|
if (SIZE_MAX < INT_MAX) {
|
|
TEST_error("int must not be wider than size_t");
|
|
return 0;
|
|
}
|
|
|
|
/* SIZE_MAX is always greater than 2*INT_MAX */
|
|
if (SIZE_MAX - INT_MAX <= INT_MAX) {
|
|
TEST_error("SIZE_MAX must exceed 2*INT_MAX");
|
|
return 0;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
static int test_sanity_memcmp(void)
|
|
{
|
|
return CRYPTO_memcmp("ab", "cd", 2);
|
|
}
|
|
|
|
static const struct sleep_test_vector {
|
|
uint64_t val;
|
|
} sleep_test_vectors[] = { { 0 }, { 1 }, { 999 }, { 1000 } };
|
|
|
|
#if defined(_POSIX_C_SOURCE) && _POSIX_C_SOURCE >= 200112L
|
|
static void
|
|
alrm_handler(int sig)
|
|
{
|
|
}
|
|
#endif /* defined(_POSIX_C_SOURCE) && _POSIX_C_SOURCE >= 200112L */
|
|
|
|
static int test_sanity_sleep(int i)
|
|
{
|
|
const struct sleep_test_vector * const td = sleep_test_vectors + i;
|
|
OSSL_TIME start = ossl_time_now();
|
|
uint64_t ms;
|
|
|
|
#if defined(_POSIX_C_SOURCE) && _POSIX_C_SOURCE >= 200112L
|
|
/*
|
|
* Set up an interrupt timer to check that OSSL_sleep doesn't return early
|
|
* due to interrupts.
|
|
*/
|
|
do {
|
|
static const struct sigaction sa = { .sa_handler = alrm_handler };
|
|
static const struct itimerval it = { .it_value.tv_usec = 111111 };
|
|
sigset_t mask;
|
|
|
|
if (sigaction(SIGALRM, &sa, NULL)) {
|
|
TEST_perror("test_sanity_sleep: sigaction");
|
|
break;
|
|
}
|
|
|
|
sigemptyset(&mask);
|
|
sigaddset(&mask, SIGALRM);
|
|
if (sigprocmask(SIG_UNBLOCK, &mask, NULL)) {
|
|
TEST_perror("test_sanity_sleep: sigprocmask");
|
|
break;
|
|
}
|
|
|
|
if (setitimer(ITIMER_REAL, &it, NULL)) {
|
|
TEST_perror("test_sanity_sleep: arm setitimer");
|
|
break;
|
|
}
|
|
} while (0);
|
|
#endif /* defined(_POSIX_C_SOURCE) && _POSIX_C_SOURCE >= 200112L */
|
|
|
|
/*
|
|
* On any reasonable system this must sleep at least the specified time
|
|
* but not more than 20 seconds more than that.
|
|
*/
|
|
OSSL_sleep(td->val);
|
|
|
|
#if defined(_POSIX_C_SOURCE) && _POSIX_C_SOURCE >= 200112L
|
|
/* disarm the timer */
|
|
do {
|
|
static const struct itimerval it;
|
|
|
|
if (setitimer(ITIMER_REAL, &it, NULL)) {
|
|
TEST_perror("test_sanity_sleep: disarm setitimer");
|
|
break;
|
|
}
|
|
} while (0);
|
|
#endif /* defined(_POSIX_C_SOURCE) && _POSIX_C_SOURCE >= 200112L */
|
|
|
|
ms = ossl_time2ms(ossl_time_subtract(ossl_time_now(), start));
|
|
|
|
if (!TEST_uint64_t_ge(ms, td->val) + !TEST_uint64_t_le(ms, td->val + 20000))
|
|
return 0;
|
|
return 1;
|
|
}
|
|
|
|
int setup_tests(void)
|
|
{
|
|
ADD_TEST(test_sanity_null_zero);
|
|
ADD_TEST(test_sanity_enum_size);
|
|
ADD_TEST(test_sanity_twos_complement);
|
|
ADD_TEST(test_sanity_sign);
|
|
ADD_TEST(test_sanity_unsigned_conversion);
|
|
ADD_TEST(test_sanity_range);
|
|
ADD_TEST(test_sanity_memcmp);
|
|
ADD_ALL_TESTS(test_sanity_sleep, OSSL_NELEM(sleep_test_vectors));
|
|
return 1;
|
|
}
|