diff options
author | David Benjamin <davidben@google.com> | 2016-07-29 19:11:34 +0300 |
---|---|---|
committer | CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org> | 2016-07-29 19:39:04 +0300 |
commit | ccd511e499d14f03d52c1d1d9159264a15974b56 (patch) | |
tree | 2d2b5ae4b272d7525c79afdf02b1a4d177bd688f /crypto | |
parent | 4edca0b308eae525ccb54ed61ef92b61b51c114c (diff) |
Add a test for BN_cmp_word.
This also adds a missing OPENSSL_EXPORT.
Change-Id: I6c2400246280f68f51157e959438644976b1171b
Reviewed-on: https://boringssl-review.googlesource.com/9041
Reviewed-by: Adam Langley <agl@google.com>
Reviewed-by: David Benjamin <davidben@google.com>
Commit-Queue: David Benjamin <davidben@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
Diffstat (limited to 'crypto')
-rw-r--r-- | crypto/bn/bn_test.cc | 74 |
1 files changed, 73 insertions, 1 deletions
diff --git a/crypto/bn/bn_test.cc b/crypto/bn/bn_test.cc index 20f64d6c..14dcead1 100644 --- a/crypto/bn/bn_test.cc +++ b/crypto/bn/bn_test.cc @@ -1291,6 +1291,77 @@ static bool TestSmallPrime(BN_CTX *ctx) { return true; } +static bool TestCmpWord() { + static const BN_ULONG kMaxWord = (BN_ULONG)-1; + + ScopedBIGNUM r(BN_new()); + if (!r || + !BN_set_word(r.get(), 0)) { + return false; + } + + if (BN_cmp_word(r.get(), 0) != 0 || + BN_cmp_word(r.get(), 1) >= 0 || + BN_cmp_word(r.get(), kMaxWord) >= 0) { + fprintf(stderr, "BN_cmp_word compared against 0 incorrectly.\n"); + return false; + } + + if (!BN_set_word(r.get(), 100)) { + return false; + } + + if (BN_cmp_word(r.get(), 0) <= 0 || + BN_cmp_word(r.get(), 99) <= 0 || + BN_cmp_word(r.get(), 100) != 0 || + BN_cmp_word(r.get(), 101) >= 0 || + BN_cmp_word(r.get(), kMaxWord) >= 0) { + fprintf(stderr, "BN_cmp_word compared against 100 incorrectly.\n"); + return false; + } + + BN_set_negative(r.get(), 1); + + if (BN_cmp_word(r.get(), 0) >= 0 || + BN_cmp_word(r.get(), 100) >= 0 || + BN_cmp_word(r.get(), kMaxWord) >= 0) { + fprintf(stderr, "BN_cmp_word compared against -100 incorrectly.\n"); + return false; + } + + if (!BN_set_word(r.get(), kMaxWord)) { + return false; + } + + if (BN_cmp_word(r.get(), 0) <= 0 || + BN_cmp_word(r.get(), kMaxWord - 1) <= 0 || + BN_cmp_word(r.get(), kMaxWord) != 0) { + fprintf(stderr, "BN_cmp_word compared against kMaxWord incorrectly.\n"); + return false; + } + + if (!BN_add(r.get(), r.get(), BN_value_one())) { + return false; + } + + if (BN_cmp_word(r.get(), 0) <= 0 || + BN_cmp_word(r.get(), kMaxWord) <= 0) { + fprintf(stderr, "BN_cmp_word compared against kMaxWord + 1 incorrectly.\n"); + return false; + } + + BN_set_negative(r.get(), 1); + + if (BN_cmp_word(r.get(), 0) >= 0 || + BN_cmp_word(r.get(), kMaxWord) >= 0) { + fprintf(stderr, + "BN_cmp_word compared against -kMaxWord - 1 incorrectly.\n"); + return false; + } + + return true; +} + int main(int argc, char *argv[]) { CRYPTO_library_init(); @@ -1314,7 +1385,8 @@ int main(int argc, char *argv[]) { !TestNegativeZero(ctx.get()) || !TestBadModulus(ctx.get()) || !TestExpModZero() || - !TestSmallPrime(ctx.get())) { + !TestSmallPrime(ctx.get()) || + !TestCmpWord()) { return 1; } |