diff options
author | steve <steve> | 2011-04-14 16:14:41 +0000 |
---|---|---|
committer | steve <steve> | 2011-04-14 16:14:41 +0000 |
commit | f93522610c6053ea7d7386f256d5d5a482b53c82 (patch) | |
tree | 26a07ec498021b26973d3c11a9ecdd82c883a03f /fips/fips_test_suite.c | |
parent | d6c984d63924594d54deb26118af862f1ff6ea5e (diff) | |
download | openssl-f93522610c6053ea7d7386f256d5d5a482b53c82.tar.gz |
Revise fips_test_suite to use table of IDs for human readable strings.
Modify HMAC selftest callbacks to notify each digest type used.
Diffstat (limited to 'fips/fips_test_suite.c')
-rw-r--r-- | fips/fips_test_suite.c | 85 |
1 files changed, 40 insertions, 45 deletions
diff --git a/fips/fips_test_suite.c b/fips/fips_test_suite.c index 40676ae66..c14ecb305 100644 --- a/fips/fips_test_suite.c +++ b/fips/fips_test_suite.c @@ -665,42 +665,39 @@ static void test_msg(const char *msg, int result) printf("%s...%s\n", msg, result ? "successful" : Fail("Failed!")); } -static const char *post_get_sig(int id) - { - switch (id) - { - case EVP_PKEY_RSA: - return " (RSA)"; - - case EVP_PKEY_DSA: - return " (DSA)"; - - case EVP_PKEY_EC: - return " (ECDSA)"; - - default: - return " (UNKNOWN)"; +/* Table of IDs for POST translating between NIDs and names */ - } - } - -static const char *post_get_cipher(int id) +typedef struct { - static char out[128]; - switch(id) + int id; + const char *name; + } POST_ID; + +POST_ID id_list[] = { + {NID_sha1, "SHA1"}, + {NID_sha224, "SHA224"}, + {NID_sha256, "SHA256"}, + {NID_sha384, "SHA384"}, + {NID_sha512, "SHA512"}, + {EVP_PKEY_RSA, "RSA"}, + {EVP_PKEY_DSA, "DSA"}, + {EVP_PKEY_EC, "ECDSA"}, + {NID_aes_128_ecb, "AES-128-ECB"}, + {NID_des_ede3_ecb, "DES-EDE3-ECB"}, + {0, NULL} +}; + +static const char *lookup_id(int id) + { + POST_ID *n; + static char out[40]; + for (n = id_list; n->name; n++) { - - case NID_aes_128_ecb: - return " (AES-128-ECB)"; - - case NID_des_ede3_ecb: - return " (DES-EDE3-ECB)"; - - default: - sprintf(out, " (NID=%d)", id); - return out; - + if (n->id == id) + return n->name; } + sprintf(out, "ID=%d\n", id); + return out; } static int fail_id = -1; @@ -719,12 +716,11 @@ static int post_cb(int op, int id, int subid, void *ex) case FIPS_TEST_DIGEST: idstr = "Digest"; - if (subid == NID_sha1) - exstr = " (SHA1)"; + exstr = lookup_id(subid); break; case FIPS_TEST_CIPHER: - exstr = post_get_cipher(subid); + exstr = lookup_id(subid); idstr = "Cipher"; break; @@ -733,12 +729,13 @@ static int post_cb(int op, int id, int subid, void *ex) { EVP_PKEY *pkey = ex; keytype = pkey->type; - exstr = post_get_sig(keytype); + exstr = lookup_id(keytype); } idstr = "Signature"; break; case FIPS_TEST_HMAC: + exstr = lookup_id(subid); idstr = "HMAC"; break; @@ -747,11 +744,11 @@ static int post_cb(int op, int id, int subid, void *ex) break; case FIPS_TEST_GCM: - idstr = "HMAC"; + idstr = "GCM"; break; case FIPS_TEST_CCM: - idstr = "HMAC"; + idstr = "CCM"; break; case FIPS_TEST_XTS: @@ -771,7 +768,7 @@ static int post_cb(int op, int id, int subid, void *ex) { EVP_PKEY *pkey = ex; keytype = pkey->type; - exstr = post_get_sig(keytype); + exstr = lookup_id(keytype); } idstr = "Pairwise Consistency"; break; @@ -797,15 +794,15 @@ static int post_cb(int op, int id, int subid, void *ex) break; case FIPS_POST_STARTED: - printf("\t\t%s%s test started\n", idstr, exstr); + printf("\t\t%s %s test started\n", idstr, exstr); break; case FIPS_POST_SUCCESS: - printf("\t\t%s%s test OK\n", idstr, exstr); + printf("\t\t%s %s test OK\n", idstr, exstr); break; case FIPS_POST_FAIL: - printf("\t\t%s%s test FAILED!!\n", idstr, exstr); + printf("\t\t%s %s test FAILED!!\n", idstr, exstr); break; case FIPS_POST_CORRUPT: @@ -813,7 +810,7 @@ static int post_cb(int op, int id, int subid, void *ex) && (fail_key == -1 || fail_key == keytype) && (fail_sub == -1 || fail_sub == subid)) { - printf("\t\t%s%s test failure induced\n", idstr, exstr); + printf("\t\t%s %s test failure induced\n", idstr, exstr); return 0; } break; @@ -822,8 +819,6 @@ static int post_cb(int op, int id, int subid, void *ex) return 1; } - - int main(int argc,char **argv) { int bad_rsa = 0, bad_dsa = 0; |