Sun, 23 Jun 2013 02:34:22 -0500
fixed the cipher unittests and removed some uncessary g_return_val_if_fails since the cipher api is alredy doing the check, and since the ones in the des stuff seemed to be doing the opposite of the check that the cipher api was doing
| libpurple/ciphers/des.c | file | annotate | diff | comparison | revisions | |
| libpurple/tests/test_cipher.c | file | annotate | diff | comparison | revisions |
--- a/libpurple/ciphers/des.c Sun Jun 23 02:33:38 2013 -0500 +++ b/libpurple/ciphers/des.c Sun Jun 23 02:34:22 2013 -0500 @@ -399,8 +399,6 @@ guint8 buf[8] = {0,0,0,0,0,0,0,0}; ssize_t out_len; - g_return_val_if_fail(out_size < in_len, -1); - while(offset+8<=in_len) { des_ecb_crypt(purple_cipher_context_get_data(context), input+offset, @@ -435,8 +433,6 @@ guint8 buf[8] = {0,0,0,0,0,0,0,0}; ssize_t out_len; - g_return_val_if_fail(out_size < in_len, -1); - while(offset+8<=in_len) { des_ecb_crypt(purple_cipher_context_get_data(context), input+offset, @@ -562,8 +558,6 @@ guint8 buf[8] = {0,0,0,0,0,0,0,0}; ssize_t out_len; - g_return_val_if_fail(out_size < in_len, -1); - while (offset + 8 <= in_len) { des_ecb_crypt(&ctx->key1, input+offset, @@ -616,8 +610,6 @@ ssize_t out_len; memcpy(buf, ctx->iv, 8); - g_return_val_if_fail(out_size < in_len, -1); - while (offset + 8 <= in_len) { for (i = 0; i < 8; i++) buf[i] ^= input[offset + i]; @@ -690,8 +682,6 @@ guint8 buf[8] = {0,0,0,0,0,0,0,0}; ssize_t out_len; - g_return_val_if_fail(out_size < in_len, -1); - while (offset + 8 <= in_len) { /* NOTE: Apply key in reverse */ des_ecb_crypt(&ctx->key3, @@ -745,8 +735,6 @@ guint8 link[8]; ssize_t out_len; - g_return_val_if_fail(out_size < in_len, -1); - memcpy(link, ctx->iv, 8); while (offset + 8 <= in_len) { des_ecb_crypt(&ctx->key3,
--- a/libpurple/tests/test_cipher.c Sun Jun 23 02:33:38 2013 -0500 +++ b/libpurple/tests/test_cipher.c Sun Jun 23 02:34:22 2013 -0500 @@ -22,8 +22,7 @@ context = purple_cipher_context_new(cipher, NULL); \ purple_cipher_context_append(context, (guchar *)(data), strlen((data))); \ \ - ret = purple_cipher_context_digest_to_str(context, sizeof(cdigest), cdigest, \ - NULL); \ + ret = purple_cipher_context_digest_to_str(context, cdigest, sizeof(cdigest)); \ \ fail_unless(ret == TRUE, NULL); \ \ @@ -85,8 +84,7 @@ context = purple_cipher_context_new(cipher, NULL); \ purple_cipher_context_append(context, (guchar *)(data), strlen((data))); \ \ - ret = purple_cipher_context_digest_to_str(context, sizeof(cdigest), cdigest, \ - NULL); \ + ret = purple_cipher_context_digest_to_str(context, cdigest, sizeof(cdigest)); \ \ fail_unless(ret == TRUE, NULL); \ \ @@ -159,8 +157,7 @@ purple_cipher_context_append(context, buff, 1000); \ } \ \ - ret = purple_cipher_context_digest_to_str(context, sizeof(cdigest), cdigest, \ - NULL); \ + ret = purple_cipher_context_digest_to_str(context, cdigest, sizeof(cdigest)); \ \ fail_unless(ret == TRUE, NULL); \ \ @@ -220,8 +217,7 @@ purple_cipher_context_append(context, buff, 1000); \ } \ \ - ret = purple_cipher_context_digest_to_str(context, sizeof(cdigest), cdigest, \ - NULL); \ + ret = purple_cipher_context_digest_to_str(context, cdigest, sizeof(cdigest)); \ \ fail_unless(ret == TRUE, NULL); \ \ @@ -267,20 +263,17 @@ guchar decrypt[len+1] = in; \ guchar key[8+1] = keyz;\ guchar encrypt[len+1] = out;\ - size_t outlen; \ \ cipher = purple_ciphers_find_cipher("des"); \ context = purple_cipher_context_new(cipher, NULL); \ - purple_cipher_context_set_key(context, key); \ + purple_cipher_context_set_key(context, key, sizeof(key)); \ \ - ret = purple_cipher_context_encrypt(context, decrypt, len, answer, &outlen); \ - fail_unless(ret == 0, NULL); \ - fail_unless(outlen == (len), NULL); \ + ret = purple_cipher_context_encrypt(context, decrypt, len, answer, sizeof(answer)); \ + fail_unless(ret == len, NULL); \ fail_unless(memcmp(encrypt, answer, len) == 0, NULL); \ \ - ret = purple_cipher_context_decrypt(context, encrypt, len, answer, &outlen); \ - fail_unless(ret == 0, NULL); \ - fail_unless(outlen == (len), NULL); \ + ret = purple_cipher_context_decrypt(context, encrypt, len, answer, sizeof(answer)); \ + fail_unless(ret == len, NULL); \ fail_unless(memcmp(decrypt, answer, len) == 0, NULL); \ \ purple_cipher_context_destroy(context); \ @@ -314,23 +307,20 @@ guchar answer[len+1]; \ guchar decrypt[len+1] = in; \ guchar encrypt[len+1] = out; \ - size_t outlen; \ gint ret = 0; \ \ cipher = purple_ciphers_find_cipher("des3"); \ context = purple_cipher_context_new(cipher, NULL); \ - purple_cipher_context_set_key(context, (guchar *)key); \ + purple_cipher_context_set_key(context, (guchar *)key, sizeof(key)); \ purple_cipher_context_set_batch_mode(context, (mode)); \ purple_cipher_context_set_iv(context, (guchar *)iv, 8); \ \ - ret = purple_cipher_context_encrypt(context, decrypt, len, answer, &outlen); \ - fail_unless(ret == 0, NULL); \ - fail_unless(outlen == (len), NULL); \ + ret = purple_cipher_context_encrypt(context, decrypt, len, answer, sizeof(answer)); \ + fail_unless(ret == len, NULL); \ fail_unless(memcmp(encrypt, answer, len) == 0, NULL); \ \ - ret = purple_cipher_context_decrypt(context, encrypt, len, answer, &outlen); \ - fail_unless(ret == 0, NULL); \ - fail_unless(outlen == (len), NULL); \ + ret = purple_cipher_context_decrypt(context, encrypt, len, answer, sizeof(answer)); \ + fail_unless(ret == len, NULL); \ fail_unless(memcmp(decrypt, answer, len) == 0, NULL); \ \ purple_cipher_context_destroy(context); \ @@ -488,11 +478,10 @@ cipher = purple_ciphers_find_cipher("hmac"); \ context = purple_cipher_context_new(cipher, NULL); \ purple_cipher_context_set_option(context, "hash", type); \ - purple_cipher_context_set_key_with_len(context, (guchar *)key, (key_len)); \ + purple_cipher_context_set_key(context, (guchar *)key, (key_len)); \ \ purple_cipher_context_append(context, (guchar *)(data), (data_len)); \ - ret = purple_cipher_context_digest_to_str(context, sizeof(cdigest), cdigest, \ - NULL); \ + ret = purple_cipher_context_digest_to_str(context, cdigest, sizeof(cdigest)); \ \ fail_unless(ret == TRUE, NULL); \ fail_unless(strcmp((digest), cdigest) == 0, NULL); \