mirror of
https://github.com/systemd/systemd.git
synced 2024-11-07 01:27:11 +03:00
2e914f34eb
Package build machines may have module loading disabled, thus AF_ALG sockets are not available. Skip the tests that cover those (khash and id128) instead of failing them in this case. Fixes #5524
91 lines
3.2 KiB
C
91 lines
3.2 KiB
C
/***
|
|
This file is part of systemd.
|
|
|
|
Copyright 2016 Lennart Poettering
|
|
|
|
systemd is free software; you can redistribute it and/or modify it
|
|
under the terms of the GNU Lesser General Public License as published by
|
|
the Free Software Foundation; either version 2.1 of the License, or
|
|
(at your option) any later version.
|
|
|
|
systemd is distributed in the hope that it will be useful, but
|
|
WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
Lesser General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Lesser General Public License
|
|
along with systemd; If not, see <http://www.gnu.org/licenses/>.
|
|
***/
|
|
|
|
#include <stdio.h>
|
|
|
|
#include "alloc-util.h"
|
|
#include "log.h"
|
|
#include "string-util.h"
|
|
#include "khash.h"
|
|
|
|
int main(int argc, char *argv[]) {
|
|
_cleanup_(khash_unrefp) khash *h = NULL, *copy = NULL;
|
|
_cleanup_free_ char *s = NULL;
|
|
int r;
|
|
|
|
log_set_max_level(LOG_DEBUG);
|
|
|
|
assert_se(khash_new(&h, NULL) == -EINVAL);
|
|
assert_se(khash_new(&h, "") == -EINVAL);
|
|
r = khash_new(&h, "foobar");
|
|
if (r == -EAFNOSUPPORT) {
|
|
puts("khash not supported on this kernel, skipping");
|
|
return EXIT_TEST_SKIP;
|
|
}
|
|
assert_se(r == -EOPNOTSUPP);
|
|
|
|
assert_se(khash_new(&h, "sha256") >= 0);
|
|
assert_se(khash_get_size(h) == 32);
|
|
assert_se(streq(khash_get_algorithm(h), "sha256"));
|
|
|
|
assert_se(khash_digest_string(h, &s) >= 0);
|
|
assert_se(streq(s, "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855"));
|
|
s = mfree(s);
|
|
|
|
assert_se(khash_put(h, "foobar", 6) >= 0);
|
|
assert_se(khash_digest_string(h, &s) >= 0);
|
|
assert_se(streq(s, "c3ab8ff13720e8ad9047dd39466b3c8974e592c2fa383d4a3960714caef0c4f2"));
|
|
s = mfree(s);
|
|
|
|
assert_se(khash_put(h, "piep", 4) >= 0);
|
|
assert_se(khash_digest_string(h, &s) >= 0);
|
|
assert_se(streq(s, "f114d872b5ea075d3be9040d0b7a429514b3f9324a8e8e3dc3fb24c34ee56bea"));
|
|
s = mfree(s);
|
|
|
|
assert_se(khash_put(h, "foo", 3) >= 0);
|
|
assert_se(khash_dup(h, ©) >= 0);
|
|
|
|
assert_se(khash_put(h, "bar", 3) >= 0);
|
|
assert_se(khash_put(copy, "bar", 3) >= 0);
|
|
|
|
assert_se(khash_digest_string(h, &s) >= 0);
|
|
assert_se(streq(s, "c3ab8ff13720e8ad9047dd39466b3c8974e592c2fa383d4a3960714caef0c4f2"));
|
|
s = mfree(s);
|
|
|
|
assert_se(khash_digest_string(copy, &s) >= 0);
|
|
assert_se(streq(s, "c3ab8ff13720e8ad9047dd39466b3c8974e592c2fa383d4a3960714caef0c4f2"));
|
|
s = mfree(s);
|
|
|
|
h = khash_unref(h);
|
|
|
|
assert_se(khash_new_with_key(&h, "hmac(sha256)", "quux", 4) >= 0);
|
|
assert_se(khash_get_size(h) == 32);
|
|
assert_se(streq(khash_get_algorithm(h), "hmac(sha256)"));
|
|
|
|
assert_se(khash_digest_string(h, &s) >= 0);
|
|
assert_se(streq(s, "abed9f8218ab473f77218a6a7d39abf1d21fa46d0700c4898e330ba88309d5ae"));
|
|
s = mfree(s);
|
|
|
|
assert_se(khash_put(h, "foobar", 6) >= 0);
|
|
assert_se(khash_digest_string(h, &s) >= 0);
|
|
assert_se(streq(s, "33f6c70a60db66007d5325d5d1dea37c371354e5b83347a59ad339ce9f4ba3dc"));
|
|
|
|
return 0;
|
|
}
|