Skip to content
代码片段 群组 项目
提交 58ef6ec6 编辑于 作者: Paul Bakker's avatar Paul Bakker
浏览文件

Cleaner test-memory cleanups

上级 02303e8b
No related branches found
No related tags found
无相关合并请求
...@@ -39,6 +39,8 @@ debug_print_crt:crt_file:file:line:prefix:result_str ...@@ -39,6 +39,8 @@ debug_print_crt:crt_file:file:line:prefix:result_str
debug_print_crt( &ssl, 0, {file}, {line}, {prefix}, &crt); debug_print_crt( &ssl, 0, {file}, {line}, {prefix}, &crt);
TEST_ASSERT( strcmp( buffer.buf, {result_str} ) == 0 ); TEST_ASSERT( strcmp( buffer.buf, {result_str} ) == 0 );
x509_free( &crt );
} }
END_CASE END_CASE
......
...@@ -47,6 +47,8 @@ pkcs1_rsaes_oaep_encrypt:mod:radix_N:input_N:radix_E:input_E:hash:message_hex_st ...@@ -47,6 +47,8 @@ pkcs1_rsaes_oaep_encrypt:mod:radix_N:input_N:radix_E:input_E:hash:message_hex_st
TEST_ASSERT( strcasecmp( (char *) output_str, {result_hex_str} ) == 0 ); TEST_ASSERT( strcasecmp( (char *) output_str, {result_hex_str} ) == 0 );
} }
rsa_free( &ctx );
} }
END_CASE END_CASE
...@@ -95,6 +97,7 @@ pkcs1_rsaes_oaep_decrypt:mod:radix_P:input_P:radix_Q:input_Q:radix_N:input_N:rad ...@@ -95,6 +97,7 @@ pkcs1_rsaes_oaep_decrypt:mod:radix_P:input_P:radix_Q:input_Q:radix_N:input_N:rad
} }
mpi_free( &P1 ); mpi_free( &Q1 ); mpi_free( &H ); mpi_free( &G ); mpi_free( &P1 ); mpi_free( &Q1 ); mpi_free( &H ); mpi_free( &G );
rsa_free( &ctx );
} }
END_CASE END_CASE
...@@ -190,6 +193,7 @@ pkcs1_rsassa_pss_sign:mod:radix_P:input_P:radix_Q:input_Q:radix_N:input_N:radix_ ...@@ -190,6 +193,7 @@ pkcs1_rsassa_pss_sign:mod:radix_P:input_P:radix_Q:input_Q:radix_N:input_N:radix_
} }
mpi_free( &P1 ); mpi_free( &Q1 ); mpi_free( &H ); mpi_free( &G ); mpi_free( &P1 ); mpi_free( &Q1 ); mpi_free( &H ); mpi_free( &G );
rsa_free( &ctx );
} }
END_CASE END_CASE
...@@ -257,5 +261,7 @@ pkcs1_rsassa_pss_verify:mod:radix_N:input_N:radix_E:input_E:digest:hash:message_ ...@@ -257,5 +261,7 @@ pkcs1_rsassa_pss_verify:mod:radix_N:input_N:radix_E:input_E:digest:hash:message_
} }
TEST_ASSERT( rsa_pkcs1_verify( &ctx, RSA_PUBLIC, {digest}, 0, hash_result, result_str ) == {result} ); TEST_ASSERT( rsa_pkcs1_verify( &ctx, RSA_PUBLIC, {digest}, 0, hash_result, result_str ) == {result} );
rsa_free( &ctx );
} }
END_CASE END_CASE
...@@ -101,6 +101,7 @@ rsa_pkcs1_sign:message_hex_string:padding_mode:digest:mod:radix_P:input_P:radix_ ...@@ -101,6 +101,7 @@ rsa_pkcs1_sign:message_hex_string:padding_mode:digest:mod:radix_P:input_P:radix_
} }
mpi_free( &P1 ); mpi_free( &Q1 ); mpi_free( &H ); mpi_free( &G ); mpi_free( &P1 ); mpi_free( &Q1 ); mpi_free( &H ); mpi_free( &G );
rsa_free( &ctx );
} }
END_CASE END_CASE
...@@ -168,6 +169,8 @@ rsa_pkcs1_verify:message_hex_string:padding_mode:digest:mod:radix_N:input_N:radi ...@@ -168,6 +169,8 @@ rsa_pkcs1_verify:message_hex_string:padding_mode:digest:mod:radix_N:input_N:radi
} }
TEST_ASSERT( rsa_pkcs1_verify( &ctx, RSA_PUBLIC, {digest}, 0, hash_result, result_str ) == {result} ); TEST_ASSERT( rsa_pkcs1_verify( &ctx, RSA_PUBLIC, {digest}, 0, hash_result, result_str ) == {result} );
rsa_free( &ctx );
} }
END_CASE END_CASE
...@@ -218,6 +221,7 @@ rsa_pkcs1_sign_raw:message_hex_string:hash_result_string:padding_mode:mod:radix_ ...@@ -218,6 +221,7 @@ rsa_pkcs1_sign_raw:message_hex_string:hash_result_string:padding_mode:mod:radix_
TEST_ASSERT( strcasecmp( (char *) output_str, {result_hex_str} ) == 0 ); TEST_ASSERT( strcasecmp( (char *) output_str, {result_hex_str} ) == 0 );
mpi_free( &P1 ); mpi_free( &Q1 ); mpi_free( &H ); mpi_free( &G ); mpi_free( &P1 ); mpi_free( &Q1 ); mpi_free( &H ); mpi_free( &G );
rsa_free( &ctx );
} }
END_CASE END_CASE
...@@ -246,6 +250,8 @@ rsa_pkcs1_verify_raw:message_hex_string:hash_result_string:padding_mode:mod:radi ...@@ -246,6 +250,8 @@ rsa_pkcs1_verify_raw:message_hex_string:hash_result_string:padding_mode:mod:radi
unhexify( result_str, {result_hex_str} ); unhexify( result_str, {result_hex_str} );
TEST_ASSERT( rsa_pkcs1_verify( &ctx, RSA_PUBLIC, SIG_RSA_RAW, hash_len, hash_result, result_str ) == {correct} ); TEST_ASSERT( rsa_pkcs1_verify( &ctx, RSA_PUBLIC, SIG_RSA_RAW, hash_len, hash_result, result_str ) == {correct} );
rsa_free( &ctx );
} }
END_CASE END_CASE
...@@ -281,6 +287,8 @@ rsa_pkcs1_encrypt:message_hex_string:padding_mode:mod:radix_N:input_N:radix_E:in ...@@ -281,6 +287,8 @@ rsa_pkcs1_encrypt:message_hex_string:padding_mode:mod:radix_N:input_N:radix_E:in
TEST_ASSERT( strcasecmp( (char *) output_str, {result_hex_str} ) == 0 ); TEST_ASSERT( strcasecmp( (char *) output_str, {result_hex_str} ) == 0 );
} }
rsa_free( &ctx );
} }
END_CASE END_CASE
...@@ -313,6 +321,8 @@ rsa_pkcs1_encrypt_bad_rng:message_hex_string:padding_mode:mod:radix_N:input_N:ra ...@@ -313,6 +321,8 @@ rsa_pkcs1_encrypt_bad_rng:message_hex_string:padding_mode:mod:radix_N:input_N:ra
TEST_ASSERT( strcasecmp( (char *) output_str, {result_hex_str} ) == 0 ); TEST_ASSERT( strcasecmp( (char *) output_str, {result_hex_str} ) == 0 );
} }
rsa_free( &ctx );
} }
END_CASE END_CASE
...@@ -362,6 +372,7 @@ rsa_pkcs1_decrypt:message_hex_string:padding_mode:mod:radix_P:input_P:radix_Q:in ...@@ -362,6 +372,7 @@ rsa_pkcs1_decrypt:message_hex_string:padding_mode:mod:radix_P:input_P:radix_Q:in
} }
mpi_free( &P1 ); mpi_free( &Q1 ); mpi_free( &H ); mpi_free( &G ); mpi_free( &P1 ); mpi_free( &Q1 ); mpi_free( &H ); mpi_free( &G );
rsa_free( &ctx );
} }
END_CASE END_CASE
...@@ -393,6 +404,8 @@ rsa_public:message_hex_string:mod:radix_N:input_N:radix_E:input_E:result_hex_str ...@@ -393,6 +404,8 @@ rsa_public:message_hex_string:mod:radix_N:input_N:radix_E:input_E:result_hex_str
TEST_ASSERT( strcasecmp( (char *) output_str, {result_hex_str} ) == 0 ); TEST_ASSERT( strcasecmp( (char *) output_str, {result_hex_str} ) == 0 );
} }
rsa_free( &ctx );
} }
END_CASE END_CASE
...@@ -440,6 +453,7 @@ rsa_private:message_hex_string:mod:radix_P:input_P:radix_Q:input_Q:radix_N:input ...@@ -440,6 +453,7 @@ rsa_private:message_hex_string:mod:radix_P:input_P:radix_Q:input_Q:radix_N:input
} }
mpi_free( &P1 ); mpi_free( &Q1 ); mpi_free( &H ); mpi_free( &G ); mpi_free( &P1 ); mpi_free( &Q1 ); mpi_free( &H ); mpi_free( &G );
rsa_free( &ctx );
} }
END_CASE END_CASE
...@@ -470,6 +484,8 @@ rsa_check_pubkey:radix_N:input_N:radix_E:input_E:result ...@@ -470,6 +484,8 @@ rsa_check_pubkey:radix_N:input_N:radix_E:input_E:result
} }
TEST_ASSERT( rsa_check_pubkey( &ctx ) == {result} ); TEST_ASSERT( rsa_check_pubkey( &ctx ) == {result} );
rsa_free( &ctx );
} }
END_CASE END_CASE
...@@ -515,6 +531,8 @@ rsa_check_privkey:mod:radix_P:input_P:radix_Q:input_Q:radix_N:input_N:radix_E:in ...@@ -515,6 +531,8 @@ rsa_check_privkey:mod:radix_P:input_P:radix_Q:input_Q:radix_N:input_N:radix_E:in
} }
TEST_ASSERT( rsa_check_privkey( &ctx ) == {result} ); TEST_ASSERT( rsa_check_privkey( &ctx ) == {result} );
rsa_free( &ctx );
} }
END_CASE END_CASE
...@@ -537,6 +555,8 @@ rsa_gen_key:nrbits:exponent:result ...@@ -537,6 +555,8 @@ rsa_gen_key:nrbits:exponent:result
{ {
TEST_ASSERT( rsa_check_privkey( &ctx ) == 0 ); TEST_ASSERT( rsa_check_privkey( &ctx ) == 0 );
} }
rsa_free( &ctx );
} }
END_CASE END_CASE
......
...@@ -60,5 +60,14 @@ x509_cert_req_check:key_file:md_type:cert_req_check_file ...@@ -60,5 +60,14 @@ x509_cert_req_check:key_file:md_type:cert_req_check_file
TEST_ASSERT( memcmp( c, pem.buf, pem.buflen ) == 0 ); TEST_ASSERT( memcmp( c, pem.buf, pem.buflen ) == 0 );
TEST_ASSERT( pem.buflen == (size_t) ret ); TEST_ASSERT( pem.buflen == (size_t) ret );
while( ( cur = req_name.next ) != NULL )
{
req_name.next = cur->next;
free( cur );
}
rsa_free( &rsa );
pem_free( &pem );
} }
END_CASE END_CASE
0% 加载中 .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册