ring-native 0.0.0

Sign up to get free protection for your applications and to get access to all the features.
Files changed (261) hide show
  1. checksums.yaml +7 -0
  2. data/.gitignore +9 -0
  3. data/Gemfile +3 -0
  4. data/README.md +22 -0
  5. data/Rakefile +1 -0
  6. data/ext/ring/extconf.rb +29 -0
  7. data/lib/ring/native.rb +8 -0
  8. data/lib/ring/native/version.rb +5 -0
  9. data/ring-native.gemspec +25 -0
  10. data/vendor/ring/BUILDING.md +40 -0
  11. data/vendor/ring/Cargo.toml +43 -0
  12. data/vendor/ring/LICENSE +185 -0
  13. data/vendor/ring/Makefile +35 -0
  14. data/vendor/ring/PORTING.md +163 -0
  15. data/vendor/ring/README.md +113 -0
  16. data/vendor/ring/STYLE.md +197 -0
  17. data/vendor/ring/appveyor.yml +27 -0
  18. data/vendor/ring/build.rs +108 -0
  19. data/vendor/ring/crypto/aes/aes.c +1142 -0
  20. data/vendor/ring/crypto/aes/aes_test.Windows.vcxproj +25 -0
  21. data/vendor/ring/crypto/aes/aes_test.cc +93 -0
  22. data/vendor/ring/crypto/aes/asm/aes-586.pl +2368 -0
  23. data/vendor/ring/crypto/aes/asm/aes-armv4.pl +1249 -0
  24. data/vendor/ring/crypto/aes/asm/aes-x86_64.pl +2246 -0
  25. data/vendor/ring/crypto/aes/asm/aesni-x86.pl +1318 -0
  26. data/vendor/ring/crypto/aes/asm/aesni-x86_64.pl +2084 -0
  27. data/vendor/ring/crypto/aes/asm/aesv8-armx.pl +675 -0
  28. data/vendor/ring/crypto/aes/asm/bsaes-armv7.pl +1364 -0
  29. data/vendor/ring/crypto/aes/asm/bsaes-x86_64.pl +1565 -0
  30. data/vendor/ring/crypto/aes/asm/vpaes-x86.pl +841 -0
  31. data/vendor/ring/crypto/aes/asm/vpaes-x86_64.pl +1116 -0
  32. data/vendor/ring/crypto/aes/internal.h +87 -0
  33. data/vendor/ring/crypto/aes/mode_wrappers.c +61 -0
  34. data/vendor/ring/crypto/bn/add.c +394 -0
  35. data/vendor/ring/crypto/bn/asm/armv4-mont.pl +694 -0
  36. data/vendor/ring/crypto/bn/asm/armv8-mont.pl +1503 -0
  37. data/vendor/ring/crypto/bn/asm/bn-586.pl +774 -0
  38. data/vendor/ring/crypto/bn/asm/co-586.pl +287 -0
  39. data/vendor/ring/crypto/bn/asm/rsaz-avx2.pl +1882 -0
  40. data/vendor/ring/crypto/bn/asm/x86-mont.pl +592 -0
  41. data/vendor/ring/crypto/bn/asm/x86_64-gcc.c +599 -0
  42. data/vendor/ring/crypto/bn/asm/x86_64-mont.pl +1393 -0
  43. data/vendor/ring/crypto/bn/asm/x86_64-mont5.pl +3507 -0
  44. data/vendor/ring/crypto/bn/bn.c +352 -0
  45. data/vendor/ring/crypto/bn/bn_asn1.c +74 -0
  46. data/vendor/ring/crypto/bn/bn_test.Windows.vcxproj +25 -0
  47. data/vendor/ring/crypto/bn/bn_test.cc +1696 -0
  48. data/vendor/ring/crypto/bn/cmp.c +200 -0
  49. data/vendor/ring/crypto/bn/convert.c +433 -0
  50. data/vendor/ring/crypto/bn/ctx.c +311 -0
  51. data/vendor/ring/crypto/bn/div.c +594 -0
  52. data/vendor/ring/crypto/bn/exponentiation.c +1335 -0
  53. data/vendor/ring/crypto/bn/gcd.c +711 -0
  54. data/vendor/ring/crypto/bn/generic.c +1019 -0
  55. data/vendor/ring/crypto/bn/internal.h +316 -0
  56. data/vendor/ring/crypto/bn/montgomery.c +516 -0
  57. data/vendor/ring/crypto/bn/mul.c +888 -0
  58. data/vendor/ring/crypto/bn/prime.c +829 -0
  59. data/vendor/ring/crypto/bn/random.c +334 -0
  60. data/vendor/ring/crypto/bn/rsaz_exp.c +262 -0
  61. data/vendor/ring/crypto/bn/rsaz_exp.h +53 -0
  62. data/vendor/ring/crypto/bn/shift.c +276 -0
  63. data/vendor/ring/crypto/bytestring/bytestring_test.Windows.vcxproj +25 -0
  64. data/vendor/ring/crypto/bytestring/bytestring_test.cc +421 -0
  65. data/vendor/ring/crypto/bytestring/cbb.c +399 -0
  66. data/vendor/ring/crypto/bytestring/cbs.c +227 -0
  67. data/vendor/ring/crypto/bytestring/internal.h +46 -0
  68. data/vendor/ring/crypto/chacha/chacha_generic.c +140 -0
  69. data/vendor/ring/crypto/chacha/chacha_vec.c +323 -0
  70. data/vendor/ring/crypto/chacha/chacha_vec_arm.S +1447 -0
  71. data/vendor/ring/crypto/chacha/chacha_vec_arm_generate.go +153 -0
  72. data/vendor/ring/crypto/cipher/cipher_test.Windows.vcxproj +25 -0
  73. data/vendor/ring/crypto/cipher/e_aes.c +390 -0
  74. data/vendor/ring/crypto/cipher/e_chacha20poly1305.c +208 -0
  75. data/vendor/ring/crypto/cipher/internal.h +173 -0
  76. data/vendor/ring/crypto/cipher/test/aes_128_gcm_tests.txt +543 -0
  77. data/vendor/ring/crypto/cipher/test/aes_128_key_wrap_tests.txt +9 -0
  78. data/vendor/ring/crypto/cipher/test/aes_256_gcm_tests.txt +475 -0
  79. data/vendor/ring/crypto/cipher/test/aes_256_key_wrap_tests.txt +23 -0
  80. data/vendor/ring/crypto/cipher/test/chacha20_poly1305_old_tests.txt +422 -0
  81. data/vendor/ring/crypto/cipher/test/chacha20_poly1305_tests.txt +484 -0
  82. data/vendor/ring/crypto/cipher/test/cipher_test.txt +100 -0
  83. data/vendor/ring/crypto/constant_time_test.Windows.vcxproj +25 -0
  84. data/vendor/ring/crypto/constant_time_test.c +304 -0
  85. data/vendor/ring/crypto/cpu-arm-asm.S +32 -0
  86. data/vendor/ring/crypto/cpu-arm.c +199 -0
  87. data/vendor/ring/crypto/cpu-intel.c +261 -0
  88. data/vendor/ring/crypto/crypto.c +151 -0
  89. data/vendor/ring/crypto/curve25519/asm/x25519-arm.S +2118 -0
  90. data/vendor/ring/crypto/curve25519/curve25519.c +4888 -0
  91. data/vendor/ring/crypto/curve25519/x25519_test.cc +128 -0
  92. data/vendor/ring/crypto/digest/md32_common.h +181 -0
  93. data/vendor/ring/crypto/ec/asm/p256-x86_64-asm.pl +2725 -0
  94. data/vendor/ring/crypto/ec/ec.c +193 -0
  95. data/vendor/ring/crypto/ec/ec_curves.c +61 -0
  96. data/vendor/ring/crypto/ec/ec_key.c +228 -0
  97. data/vendor/ring/crypto/ec/ec_montgomery.c +114 -0
  98. data/vendor/ring/crypto/ec/example_mul.Windows.vcxproj +25 -0
  99. data/vendor/ring/crypto/ec/internal.h +243 -0
  100. data/vendor/ring/crypto/ec/oct.c +253 -0
  101. data/vendor/ring/crypto/ec/p256-64.c +1794 -0
  102. data/vendor/ring/crypto/ec/p256-x86_64-table.h +9548 -0
  103. data/vendor/ring/crypto/ec/p256-x86_64.c +509 -0
  104. data/vendor/ring/crypto/ec/simple.c +1007 -0
  105. data/vendor/ring/crypto/ec/util-64.c +183 -0
  106. data/vendor/ring/crypto/ec/wnaf.c +508 -0
  107. data/vendor/ring/crypto/ecdh/ecdh.c +155 -0
  108. data/vendor/ring/crypto/ecdsa/ecdsa.c +304 -0
  109. data/vendor/ring/crypto/ecdsa/ecdsa_asn1.c +193 -0
  110. data/vendor/ring/crypto/ecdsa/ecdsa_test.Windows.vcxproj +25 -0
  111. data/vendor/ring/crypto/ecdsa/ecdsa_test.cc +327 -0
  112. data/vendor/ring/crypto/header_removed.h +17 -0
  113. data/vendor/ring/crypto/internal.h +495 -0
  114. data/vendor/ring/crypto/libring.Windows.vcxproj +101 -0
  115. data/vendor/ring/crypto/mem.c +98 -0
  116. data/vendor/ring/crypto/modes/asm/aesni-gcm-x86_64.pl +1045 -0
  117. data/vendor/ring/crypto/modes/asm/ghash-armv4.pl +517 -0
  118. data/vendor/ring/crypto/modes/asm/ghash-x86.pl +1393 -0
  119. data/vendor/ring/crypto/modes/asm/ghash-x86_64.pl +1741 -0
  120. data/vendor/ring/crypto/modes/asm/ghashv8-armx.pl +422 -0
  121. data/vendor/ring/crypto/modes/ctr.c +226 -0
  122. data/vendor/ring/crypto/modes/gcm.c +1206 -0
  123. data/vendor/ring/crypto/modes/gcm_test.Windows.vcxproj +25 -0
  124. data/vendor/ring/crypto/modes/gcm_test.c +348 -0
  125. data/vendor/ring/crypto/modes/internal.h +299 -0
  126. data/vendor/ring/crypto/perlasm/arm-xlate.pl +170 -0
  127. data/vendor/ring/crypto/perlasm/readme +100 -0
  128. data/vendor/ring/crypto/perlasm/x86_64-xlate.pl +1164 -0
  129. data/vendor/ring/crypto/perlasm/x86asm.pl +292 -0
  130. data/vendor/ring/crypto/perlasm/x86gas.pl +263 -0
  131. data/vendor/ring/crypto/perlasm/x86masm.pl +200 -0
  132. data/vendor/ring/crypto/perlasm/x86nasm.pl +187 -0
  133. data/vendor/ring/crypto/poly1305/poly1305.c +331 -0
  134. data/vendor/ring/crypto/poly1305/poly1305_arm.c +301 -0
  135. data/vendor/ring/crypto/poly1305/poly1305_arm_asm.S +2015 -0
  136. data/vendor/ring/crypto/poly1305/poly1305_test.Windows.vcxproj +25 -0
  137. data/vendor/ring/crypto/poly1305/poly1305_test.cc +80 -0
  138. data/vendor/ring/crypto/poly1305/poly1305_test.txt +52 -0
  139. data/vendor/ring/crypto/poly1305/poly1305_vec.c +892 -0
  140. data/vendor/ring/crypto/rand/asm/rdrand-x86_64.pl +75 -0
  141. data/vendor/ring/crypto/rand/internal.h +32 -0
  142. data/vendor/ring/crypto/rand/rand.c +189 -0
  143. data/vendor/ring/crypto/rand/urandom.c +219 -0
  144. data/vendor/ring/crypto/rand/windows.c +56 -0
  145. data/vendor/ring/crypto/refcount_c11.c +66 -0
  146. data/vendor/ring/crypto/refcount_lock.c +53 -0
  147. data/vendor/ring/crypto/refcount_test.Windows.vcxproj +25 -0
  148. data/vendor/ring/crypto/refcount_test.c +58 -0
  149. data/vendor/ring/crypto/rsa/blinding.c +462 -0
  150. data/vendor/ring/crypto/rsa/internal.h +108 -0
  151. data/vendor/ring/crypto/rsa/padding.c +300 -0
  152. data/vendor/ring/crypto/rsa/rsa.c +450 -0
  153. data/vendor/ring/crypto/rsa/rsa_asn1.c +261 -0
  154. data/vendor/ring/crypto/rsa/rsa_impl.c +944 -0
  155. data/vendor/ring/crypto/rsa/rsa_test.Windows.vcxproj +25 -0
  156. data/vendor/ring/crypto/rsa/rsa_test.cc +437 -0
  157. data/vendor/ring/crypto/sha/asm/sha-armv8.pl +436 -0
  158. data/vendor/ring/crypto/sha/asm/sha-x86_64.pl +2390 -0
  159. data/vendor/ring/crypto/sha/asm/sha256-586.pl +1275 -0
  160. data/vendor/ring/crypto/sha/asm/sha256-armv4.pl +735 -0
  161. data/vendor/ring/crypto/sha/asm/sha256-armv8.pl +14 -0
  162. data/vendor/ring/crypto/sha/asm/sha256-x86_64.pl +14 -0
  163. data/vendor/ring/crypto/sha/asm/sha512-586.pl +911 -0
  164. data/vendor/ring/crypto/sha/asm/sha512-armv4.pl +666 -0
  165. data/vendor/ring/crypto/sha/asm/sha512-armv8.pl +14 -0
  166. data/vendor/ring/crypto/sha/asm/sha512-x86_64.pl +14 -0
  167. data/vendor/ring/crypto/sha/sha1.c +271 -0
  168. data/vendor/ring/crypto/sha/sha256.c +204 -0
  169. data/vendor/ring/crypto/sha/sha512.c +355 -0
  170. data/vendor/ring/crypto/test/file_test.cc +326 -0
  171. data/vendor/ring/crypto/test/file_test.h +181 -0
  172. data/vendor/ring/crypto/test/malloc.cc +150 -0
  173. data/vendor/ring/crypto/test/scoped_types.h +95 -0
  174. data/vendor/ring/crypto/test/test.Windows.vcxproj +35 -0
  175. data/vendor/ring/crypto/test/test_util.cc +46 -0
  176. data/vendor/ring/crypto/test/test_util.h +41 -0
  177. data/vendor/ring/crypto/thread_none.c +55 -0
  178. data/vendor/ring/crypto/thread_pthread.c +165 -0
  179. data/vendor/ring/crypto/thread_test.Windows.vcxproj +25 -0
  180. data/vendor/ring/crypto/thread_test.c +200 -0
  181. data/vendor/ring/crypto/thread_win.c +282 -0
  182. data/vendor/ring/examples/checkdigest.rs +103 -0
  183. data/vendor/ring/include/openssl/aes.h +121 -0
  184. data/vendor/ring/include/openssl/arm_arch.h +129 -0
  185. data/vendor/ring/include/openssl/base.h +156 -0
  186. data/vendor/ring/include/openssl/bn.h +794 -0
  187. data/vendor/ring/include/openssl/buffer.h +18 -0
  188. data/vendor/ring/include/openssl/bytestring.h +235 -0
  189. data/vendor/ring/include/openssl/chacha.h +37 -0
  190. data/vendor/ring/include/openssl/cmac.h +76 -0
  191. data/vendor/ring/include/openssl/cpu.h +184 -0
  192. data/vendor/ring/include/openssl/crypto.h +43 -0
  193. data/vendor/ring/include/openssl/curve25519.h +88 -0
  194. data/vendor/ring/include/openssl/ec.h +225 -0
  195. data/vendor/ring/include/openssl/ec_key.h +129 -0
  196. data/vendor/ring/include/openssl/ecdh.h +110 -0
  197. data/vendor/ring/include/openssl/ecdsa.h +156 -0
  198. data/vendor/ring/include/openssl/err.h +201 -0
  199. data/vendor/ring/include/openssl/mem.h +101 -0
  200. data/vendor/ring/include/openssl/obj_mac.h +71 -0
  201. data/vendor/ring/include/openssl/opensslfeatures.h +68 -0
  202. data/vendor/ring/include/openssl/opensslv.h +18 -0
  203. data/vendor/ring/include/openssl/ossl_typ.h +18 -0
  204. data/vendor/ring/include/openssl/poly1305.h +51 -0
  205. data/vendor/ring/include/openssl/rand.h +70 -0
  206. data/vendor/ring/include/openssl/rsa.h +399 -0
  207. data/vendor/ring/include/openssl/thread.h +133 -0
  208. data/vendor/ring/include/openssl/type_check.h +71 -0
  209. data/vendor/ring/mk/Common.props +63 -0
  210. data/vendor/ring/mk/Windows.props +42 -0
  211. data/vendor/ring/mk/WindowsTest.props +18 -0
  212. data/vendor/ring/mk/appveyor.bat +62 -0
  213. data/vendor/ring/mk/bottom_of_makefile.mk +54 -0
  214. data/vendor/ring/mk/ring.mk +266 -0
  215. data/vendor/ring/mk/top_of_makefile.mk +214 -0
  216. data/vendor/ring/mk/travis.sh +40 -0
  217. data/vendor/ring/mk/update-travis-yml.py +229 -0
  218. data/vendor/ring/ring.sln +153 -0
  219. data/vendor/ring/src/aead.rs +682 -0
  220. data/vendor/ring/src/agreement.rs +248 -0
  221. data/vendor/ring/src/c.rs +129 -0
  222. data/vendor/ring/src/constant_time.rs +37 -0
  223. data/vendor/ring/src/der.rs +96 -0
  224. data/vendor/ring/src/digest.rs +690 -0
  225. data/vendor/ring/src/digest_tests.txt +57 -0
  226. data/vendor/ring/src/ecc.rs +28 -0
  227. data/vendor/ring/src/ecc_build.rs +279 -0
  228. data/vendor/ring/src/ecc_curves.rs +117 -0
  229. data/vendor/ring/src/ed25519_tests.txt +2579 -0
  230. data/vendor/ring/src/exe_tests.rs +46 -0
  231. data/vendor/ring/src/ffi.rs +29 -0
  232. data/vendor/ring/src/file_test.rs +187 -0
  233. data/vendor/ring/src/hkdf.rs +153 -0
  234. data/vendor/ring/src/hkdf_tests.txt +59 -0
  235. data/vendor/ring/src/hmac.rs +414 -0
  236. data/vendor/ring/src/hmac_tests.txt +97 -0
  237. data/vendor/ring/src/input.rs +312 -0
  238. data/vendor/ring/src/lib.rs +41 -0
  239. data/vendor/ring/src/pbkdf2.rs +265 -0
  240. data/vendor/ring/src/pbkdf2_tests.txt +113 -0
  241. data/vendor/ring/src/polyfill.rs +57 -0
  242. data/vendor/ring/src/rand.rs +28 -0
  243. data/vendor/ring/src/signature.rs +314 -0
  244. data/vendor/ring/third-party/NIST/README.md +9 -0
  245. data/vendor/ring/third-party/NIST/SHAVS/SHA1LongMsg.rsp +263 -0
  246. data/vendor/ring/third-party/NIST/SHAVS/SHA1Monte.rsp +309 -0
  247. data/vendor/ring/third-party/NIST/SHAVS/SHA1ShortMsg.rsp +267 -0
  248. data/vendor/ring/third-party/NIST/SHAVS/SHA224LongMsg.rsp +263 -0
  249. data/vendor/ring/third-party/NIST/SHAVS/SHA224Monte.rsp +309 -0
  250. data/vendor/ring/third-party/NIST/SHAVS/SHA224ShortMsg.rsp +267 -0
  251. data/vendor/ring/third-party/NIST/SHAVS/SHA256LongMsg.rsp +263 -0
  252. data/vendor/ring/third-party/NIST/SHAVS/SHA256Monte.rsp +309 -0
  253. data/vendor/ring/third-party/NIST/SHAVS/SHA256ShortMsg.rsp +267 -0
  254. data/vendor/ring/third-party/NIST/SHAVS/SHA384LongMsg.rsp +519 -0
  255. data/vendor/ring/third-party/NIST/SHAVS/SHA384Monte.rsp +309 -0
  256. data/vendor/ring/third-party/NIST/SHAVS/SHA384ShortMsg.rsp +523 -0
  257. data/vendor/ring/third-party/NIST/SHAVS/SHA512LongMsg.rsp +519 -0
  258. data/vendor/ring/third-party/NIST/SHAVS/SHA512Monte.rsp +309 -0
  259. data/vendor/ring/third-party/NIST/SHAVS/SHA512ShortMsg.rsp +523 -0
  260. data/vendor/ring/third-party/NIST/sha256sums.txt +1 -0
  261. metadata +333 -0
@@ -0,0 +1,181 @@
1
+ /* Copyright (c) 2015, Google Inc.
2
+ *
3
+ * Permission to use, copy, modify, and/or distribute this software for any
4
+ * purpose with or without fee is hereby granted, provided that the above
5
+ * copyright notice and this permission notice appear in all copies.
6
+ *
7
+ * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
8
+ * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
9
+ * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
10
+ * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
11
+ * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
12
+ * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
13
+ * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */
14
+
15
+ #ifndef OPENSSL_HEADER_CRYPTO_TEST_FILE_TEST_H
16
+ #define OPENSSL_HEADER_CRYPTO_TEST_FILE_TEST_H
17
+
18
+ #include <stdint.h>
19
+ #include <stdio.h>
20
+
21
+ #if defined(_MSC_VER)
22
+ #pragma warning(push)
23
+ #pragma warning(disable: 4702)
24
+ #endif
25
+
26
+ #include <string>
27
+ #include <map>
28
+ #include <set>
29
+ #include <vector>
30
+
31
+ #if defined(_MSC_VER)
32
+ #pragma warning(pop)
33
+ #endif
34
+
35
+ // File-based test framework.
36
+ //
37
+ // This module provides a file-based test framework. The file format is based on
38
+ // that of OpenSSL upstream's evp_test and BoringSSL's aead_test. Each input
39
+ // file is a sequence of attributes, blocks, and blank lines.
40
+ //
41
+ // Each attribute has the form:
42
+ //
43
+ // Name = Value
44
+ //
45
+ // Either '=' or ':' may be used to delimit the name from the value. Both the
46
+ // name and value have leading and trailing spaces stripped.
47
+ //
48
+ // Blocks are delimited by lines beginning with three hyphens, "---". One such
49
+ // line begins a block and another ends it. Blocks are intended as a convenient
50
+ // way to embed PEM data and include their delimiters.
51
+ //
52
+ // Outside a block, lines beginning with # are ignored.
53
+ //
54
+ // A test is a sequence of one or more attributes followed by a block or blank
55
+ // line. Blank lines are otherwise ignored. For tests that process multiple
56
+ // kinds of test cases, the first attribute is parsed out as the test's type and
57
+ // parameter. Otherwise, attributes are unordered. The first attribute is also
58
+ // included in the set of attributes, so tests which do not dispatch may ignore
59
+ // this mechanism.
60
+ //
61
+ // Functions in this module freely output to |stderr| on failure. Tests should
62
+ // also do so, and it is recommended they include the corresponding test's line
63
+ // number in any output. |PrintLine| does this automatically.
64
+ //
65
+ // Each attribute in a test must be consumed. When a test completes, if any
66
+ // attributes haven't been processed, the framework reports an error.
67
+
68
+
69
+ class FileTest {
70
+ public:
71
+ explicit FileTest(const char *path);
72
+ ~FileTest();
73
+
74
+ // is_open returns true if the file was successfully opened.
75
+ bool is_open() const { return file_ != nullptr; }
76
+
77
+ enum ReadResult {
78
+ kReadSuccess,
79
+ kReadEOF,
80
+ kReadError,
81
+ };
82
+
83
+ // ReadNext reads the next test from the file. It returns |kReadSuccess| if
84
+ // successfully reading a test and |kReadEOF| at the end of the file. On
85
+ // error or if the previous test had unconsumed attributes, it returns
86
+ // |kReadError|.
87
+ ReadResult ReadNext();
88
+
89
+ // PrintLine is a variant of printf which prepends the line number and appends
90
+ // a trailing newline.
91
+ void PrintLine(const char *format, ...)
92
+ #ifdef __GNUC__
93
+ __attribute__((__format__(__printf__, 2, 3)))
94
+ #endif
95
+ ;
96
+
97
+ unsigned start_line() const { return start_line_; }
98
+
99
+ // GetType returns the name of the first attribute of the current test.
100
+ const std::string &GetType();
101
+ // GetParameter returns the value of the first attribute of the current test.
102
+ const std::string &GetParameter();
103
+ // GetBlock returns the optional block of the current test, or the empty
104
+ // if there was no block.
105
+ const std::string &GetBlock();
106
+
107
+ // HasAttribute returns true if the current test has an attribute named |key|.
108
+ bool HasAttribute(const std::string &key);
109
+
110
+ // GetAttribute looks up the attribute with key |key|. It sets |*out_value| to
111
+ // the value and returns true if it exists and returns false with an error to
112
+ // |stderr| otherwise.
113
+ bool GetAttribute(std::string *out_value, const std::string &key);
114
+
115
+ // GetAttributeOrDie looks up the attribute with key |key| and aborts if it is
116
+ // missing. It only be used after a |HasAttribute| call.
117
+ const std::string &GetAttributeOrDie(const std::string &key);
118
+
119
+ // GetBytes looks up the attribute with key |key| and decodes it as a byte
120
+ // string. On success, it writes the result to |*out| and returns
121
+ // true. Otherwise it returns false with an error to |stderr|. The value may
122
+ // be either a hexadecimal string or a quoted ASCII string. It returns true on
123
+ // success and returns false with an error to |stderr| on failure.
124
+ bool GetBytes(std::vector<uint8_t> *out, const std::string &key);
125
+
126
+ // GetBytesOrDefault looks up the attribute with key |key|. If the value is
127
+ // encoded as "DEFAULT", without the quotes, then it sets |*is_default| to
128
+ // true and returns true, leaving |out| untouched. Otherwise it sets
129
+ // |*is_default| to false and works identically to |GetBytes|.
130
+ bool GetBytesOrDefault(std::vector<uint8_t> *out, bool *is_default,
131
+ const std::string &key);
132
+
133
+ // ExpectBytesEqual returns true if |expected| and |actual| are equal.
134
+ // Otherwise, it returns false and prints a message to |stderr|.
135
+ bool ExpectBytesEqual(const uint8_t *expected, size_t expected_len,
136
+ const uint8_t *actual, size_t actual_len);
137
+
138
+ private:
139
+ void ClearTest();
140
+ void OnKeyUsed(const std::string &key);
141
+
142
+ FILE *file_ = nullptr;
143
+ // line_ is the number of lines read.
144
+ unsigned line_ = 0;
145
+
146
+ // start_line_ is the line number of the first attribute of the test.
147
+ unsigned start_line_ = 0;
148
+ // type_ is the name of the first attribute of the test.
149
+ std::string type_;
150
+ // parameter_ is the value of the first attribute.
151
+ std::string parameter_;
152
+ // attributes_ contains all attributes in the test, including the first.
153
+ std::map<std::string, std::string> attributes_;
154
+ // block_, if non-empty, is the test's optional trailing block.
155
+ std::string block_;
156
+
157
+ // unused_attributes_ is the set of attributes that have been queried.
158
+ std::set<std::string> unused_attributes_;
159
+ // used_block_ is true if the block has been queried.
160
+ bool used_block_ = false;
161
+
162
+ FileTest(const FileTest&) = delete;
163
+ FileTest &operator=(const FileTest&) = delete;
164
+ };
165
+
166
+ // FileTestMain runs a file-based test out of |path| and returns an exit code
167
+ // suitable to return out of |main|. |run_test| should return true on pass and
168
+ // false on failure. FileTestMain also implements common handling of the 'Error'
169
+ // attribute. A test with that attribute is expected to fail. The value of the
170
+ // attribute is the reason string of the expected OpenSSL error code.
171
+ //
172
+ // Tests are guaranteed to run serially and may affect global state if need be.
173
+ // It is legal to use "tests" which, for example, import a private key into a
174
+ // list of keys. This may be used to initialize a shared set of keys for many
175
+ // tests. However, if one test fails, the framework will continue to run
176
+ // subsequent tests.
177
+ int FileTestMain(bool (*run_test)(FileTest *t, void *arg), void *arg,
178
+ const char *path);
179
+
180
+
181
+ #endif /* OPENSSL_HEADER_CRYPTO_TEST_FILE_TEST_H */
@@ -0,0 +1,150 @@
1
+ /* Copyright (c) 2014, Google Inc.
2
+ *
3
+ * Permission to use, copy, modify, and/or distribute this software for any
4
+ * purpose with or without fee is hereby granted, provided that the above
5
+ * copyright notice and this permission notice appear in all copies.
6
+ *
7
+ * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
8
+ * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
9
+ * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
10
+ * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
11
+ * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
12
+ * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
13
+ * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */
14
+
15
+ #include <openssl/base.h>
16
+
17
+ #if defined(__has_feature)
18
+ #if __has_feature(address_sanitizer) || __has_feature(memory_sanitizer)
19
+ #define OPENSSL_ASAN
20
+ #endif
21
+ #endif
22
+
23
+ #if defined(__GLIBC__) && !defined(__UCLIBC__)
24
+ #define OPENSSL_GLIBC
25
+ #endif
26
+
27
+ // This file isn't built on ARM or Aarch64 because we link statically in those
28
+ // builds and trying to override malloc in a static link doesn't work. It also
29
+ // requires glibc. It's also disabled on ASan builds as this interferes with
30
+ // ASan's malloc interceptor.
31
+ //
32
+ // TODO(davidben): See if this and ASan's and MSan's interceptors can be made to
33
+ // coexist.
34
+ #if defined(__linux__) && defined(OPENSSL_GLIBC) && !defined(OPENSSL_ARM) && \
35
+ !defined(OPENSSL_AARCH64) && !defined(OPENSSL_ASAN)
36
+
37
+ #include <errno.h>
38
+ #include <signal.h>
39
+ #include <stdint.h>
40
+ #include <stdio.h>
41
+ #include <stdlib.h>
42
+ #include <unistd.h>
43
+
44
+ #include <new>
45
+
46
+
47
+ /* This file defines overrides for the standard allocation functions that allow
48
+ * a given allocation to be made to fail for testing. If the program is run
49
+ * with MALLOC_NUMBER_TO_FAIL set to a base-10 number then that allocation will
50
+ * return NULL. If MALLOC_BREAK_ON_FAIL is also defined then the allocation
51
+ * will signal SIGTRAP rather than return NULL.
52
+ *
53
+ * This code is not thread safe. */
54
+
55
+ static uint64_t current_malloc_count = 0;
56
+ static uint64_t malloc_number_to_fail = 0;
57
+ static char failure_enabled = 0, break_on_fail = 0;
58
+ static int in_call = 0;
59
+
60
+ extern "C" {
61
+ /* These are other names for the standard allocation functions. */
62
+ extern void *__libc_malloc(size_t size);
63
+ extern void *__libc_calloc(size_t num_elems, size_t size);
64
+ extern void *__libc_realloc(void *ptr, size_t size);
65
+ }
66
+
67
+ static void exit_handler(void) {
68
+ if (failure_enabled && current_malloc_count > malloc_number_to_fail) {
69
+ _exit(88);
70
+ }
71
+ }
72
+
73
+ static void cpp_new_handler() {
74
+ // Return to try again. It won't fail a second time.
75
+ return;
76
+ }
77
+
78
+ /* should_fail_allocation returns true if the current allocation should fail. */
79
+ static int should_fail_allocation() {
80
+ static int init = 0;
81
+ char should_fail;
82
+
83
+ if (in_call) {
84
+ return 0;
85
+ }
86
+
87
+ in_call = 1;
88
+
89
+ if (!init) {
90
+ const char *env = getenv("MALLOC_NUMBER_TO_FAIL");
91
+ if (env != NULL && env[0] != 0) {
92
+ char *endptr;
93
+ malloc_number_to_fail = strtoull(env, &endptr, 10);
94
+ if (*endptr == 0) {
95
+ failure_enabled = 1;
96
+ atexit(exit_handler);
97
+ std::set_new_handler(cpp_new_handler);
98
+ }
99
+ }
100
+ break_on_fail = (NULL != getenv("MALLOC_BREAK_ON_FAIL"));
101
+ init = 1;
102
+ }
103
+
104
+ in_call = 0;
105
+
106
+ if (!failure_enabled) {
107
+ return 0;
108
+ }
109
+
110
+ should_fail = (current_malloc_count == malloc_number_to_fail);
111
+ current_malloc_count++;
112
+
113
+ if (should_fail && break_on_fail) {
114
+ raise(SIGTRAP);
115
+ }
116
+ return should_fail;
117
+ }
118
+
119
+ extern "C" {
120
+
121
+ void *malloc(size_t size) {
122
+ if (should_fail_allocation()) {
123
+ errno = ENOMEM;
124
+ return NULL;
125
+ }
126
+
127
+ return __libc_malloc(size);
128
+ }
129
+
130
+ void *calloc(size_t num_elems, size_t size) {
131
+ if (should_fail_allocation()) {
132
+ errno = ENOMEM;
133
+ return NULL;
134
+ }
135
+
136
+ return __libc_calloc(num_elems, size);
137
+ }
138
+
139
+ void *realloc(void *ptr, size_t size) {
140
+ if (should_fail_allocation()) {
141
+ errno = ENOMEM;
142
+ return NULL;
143
+ }
144
+
145
+ return __libc_realloc(ptr, size);
146
+ }
147
+
148
+ } // extern "C"
149
+
150
+ #endif /* defined(linux) && GLIBC && !ARM && !AARCH64 && !ASAN */
@@ -0,0 +1,95 @@
1
+ /* Copyright (c) 2015, Google Inc.
2
+ *
3
+ * Permission to use, copy, modify, and/or distribute this software for any
4
+ * purpose with or without fee is hereby granted, provided that the above
5
+ * copyright notice and this permission notice appear in all copies.
6
+ *
7
+ * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
8
+ * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
9
+ * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
10
+ * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
11
+ * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
12
+ * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
13
+ * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */
14
+
15
+ #ifndef OPENSSL_HEADER_CRYPTO_TEST_SCOPED_TYPES_H
16
+ #define OPENSSL_HEADER_CRYPTO_TEST_SCOPED_TYPES_H
17
+
18
+ #include <stdint.h>
19
+ #include <stdio.h>
20
+
21
+ // Avoid "C4548: expression before comma has no effect; expected expression
22
+ // with side-effect." in malloc.h in Visual Studio 2015 Update 1 in debug mode.
23
+ #if defined(_MSC_VER) && defined(_DEBUG) && _MSC_VER >= 1900
24
+ #pragma warning(push)
25
+ #pragma warning(disable: 4548)
26
+ #endif
27
+
28
+ #include <memory>
29
+
30
+ #if defined(_MSC_VER) && defined(_DEBUG) && _MSC_VER >= 1900
31
+ #pragma warning(pop)
32
+ #endif
33
+
34
+ #include <openssl/bn.h>
35
+ #include <openssl/ec.h>
36
+ #include <openssl/ec_key.h>
37
+ #include <openssl/ecdsa.h>
38
+ #include <openssl/mem.h>
39
+ #include <openssl/rsa.h>
40
+
41
+ template<typename T, void (*func)(T*)>
42
+ struct OpenSSLDeleter {
43
+ void operator()(T *obj) {
44
+ func(obj);
45
+ }
46
+ };
47
+
48
+ template<typename T>
49
+ struct OpenSSLFree {
50
+ void operator()(T *buf) {
51
+ OPENSSL_free(buf);
52
+ }
53
+ };
54
+
55
+ struct FileCloser {
56
+ void operator()(FILE *file) {
57
+ fclose(file);
58
+ }
59
+ };
60
+
61
+ template<typename T, void (*func)(T*)>
62
+ using ScopedOpenSSLType = std::unique_ptr<T, OpenSSLDeleter<T, func>>;
63
+
64
+ template<typename T, typename CleanupRet, void (*init_func)(T*),
65
+ CleanupRet (*cleanup_func)(T*)>
66
+ class ScopedOpenSSLContext {
67
+ public:
68
+ ScopedOpenSSLContext() {
69
+ init_func(&ctx_);
70
+ }
71
+ ~ScopedOpenSSLContext() {
72
+ cleanup_func(&ctx_);
73
+ }
74
+
75
+ T *get() { return &ctx_; }
76
+ const T *get() const { return &ctx_; }
77
+
78
+ private:
79
+ T ctx_;
80
+ };
81
+
82
+ using ScopedBIGNUM = ScopedOpenSSLType<BIGNUM, BN_free>;
83
+ using ScopedBN_CTX = ScopedOpenSSLType<BN_CTX, BN_CTX_free>;
84
+ using ScopedBN_MONT_CTX = ScopedOpenSSLType<BN_MONT_CTX, BN_MONT_CTX_free>;
85
+ using ScopedECDSA_SIG = ScopedOpenSSLType<ECDSA_SIG, ECDSA_SIG_free>;
86
+ using ScopedEC_KEY = ScopedOpenSSLType<EC_KEY, EC_KEY_free>;
87
+ using ScopedEC_POINT = ScopedOpenSSLType<EC_POINT, EC_POINT_free>;
88
+ using ScopedRSA = ScopedOpenSSLType<RSA, RSA_free>;
89
+
90
+ using ScopedOpenSSLBytes = std::unique_ptr<uint8_t, OpenSSLFree<uint8_t>>;
91
+ using ScopedOpenSSLString = std::unique_ptr<char, OpenSSLFree<char>>;
92
+
93
+ using ScopedFILE = std::unique_ptr<FILE, FileCloser>;
94
+
95
+ #endif // OPENSSL_HEADER_CRYPTO_TEST_SCOPED_TYPES_H
@@ -0,0 +1,35 @@
1
+ <?xml version="1.0" encoding="utf-8"?>
2
+ <Project DefaultTargets="Build" ToolsVersion="14.0" xmlns="http://schemas.microsoft.com/developer/msbuild/2003">
3
+ <PropertyGroup Label="Globals">
4
+ <ProjectGuid>{1DACE503-6498-492D-B1FF-F9EE18624443}</ProjectGuid>
5
+ <ProjectName>libring.test.Windows</ProjectName>
6
+ <TargetName>ring-test</TargetName>
7
+ </PropertyGroup>
8
+ <PropertyGroup Label="Configuration">
9
+ <ConfigurationType>StaticLibrary</ConfigurationType>
10
+ </PropertyGroup>
11
+ <ImportGroup Label="PropertySheets">
12
+ <Import Project="..\..\mk\Windows.props" />
13
+ </ImportGroup>
14
+ <PropertyGroup Label="Configuration">
15
+ <OutDir>$(IntRootDir)</OutDir>
16
+ </PropertyGroup>
17
+ <ItemGroup>
18
+ <ClCompile Include="file_test.cc" />
19
+ <ClCompile Include="malloc.cc" />
20
+ <ClCompile Include="test_util.cc" />
21
+ </ItemGroup>
22
+ <ItemGroup>
23
+ <ClInclude Include="file_test.h" />
24
+ <ClInclude Include="scoped_types.h" />
25
+ <ClInclude Include="stl_compat.h" />
26
+ <ClInclude Include="test_util.h" />
27
+ </ItemGroup>
28
+ <ItemDefinitionGroup>
29
+ <ClCompile>
30
+ <AdditionalIncludeDirectories>%(AdditionalIncludeDirectories);..\include</AdditionalIncludeDirectories>
31
+ <PreprocessorDefinitions>OPENSSL_NO_ASM;_LIB;%(PreprocessorDefinitions)</PreprocessorDefinitions>
32
+ </ClCompile>
33
+ </ItemDefinitionGroup>
34
+ <Import Project="$(VCTargetsPath)\Microsoft.Cpp.targets" />
35
+ </Project>