diff --git a/interfaces/innerkits/appverify/test/unittest/src/hap_signing_block_utils_test.cpp b/interfaces/innerkits/appverify/test/unittest/src/hap_signing_block_utils_test.cpp index 2efd921d1ad4d9c6e9c7dbb4a2ab3a53ce3d8e75..288c971c2c37dbd8ee666047ef929524667a8205 100644 --- a/interfaces/innerkits/appverify/test/unittest/src/hap_signing_block_utils_test.cpp +++ b/interfaces/innerkits/appverify/test/unittest/src/hap_signing_block_utils_test.cpp @@ -348,4 +348,24 @@ HWTEST_F(HapSigningBlockUtilsTest, GetSumOfChunkDigestLenTest001, TestSize.Level TEST_ZIP_BLOCKS_NUM_NEED_DIGEST, INT_MAX, chunkCount, sumOfChunkDigestLen); ASSERT_FALSE(ret); } + +/** + * @tc.name: Test DigestParameter function + * @tc.desc: Test DigestParameter with copy construction and assignment construction + * @tc.type: FUNC + */ +HWTEST_F(HapSigningBlockUtilsTest, GetDigestParameterTest001, TestSize.Level1) +{ + /* + * @tc.steps: step1. call copy construction and assignment construction + * @tc.expected: step1. the digestOutputSizebytes of two objects are equal. + */ + HapSigningBlockUtils hapSignBlockUtils; + int32_t nid = TEST_NULL_NID; + DigestParameter digestParam = hapSignBlockUtils.GetDigestParameter(nid); + DigestParameter otherParam(digestParam); + ASSERT_EQ(digestParam.digestOutputSizeBytes, otherParam.digestOutputSizeBytes); + otherParam = digestParam; + ASSERT_EQ(digestParam.digestOutputSizeBytes, otherParam.digestOutputSizeBytes); +} } diff --git a/interfaces/innerkits/appverify/test/unittest/src/hap_verify_openssl_utils_test.cpp b/interfaces/innerkits/appverify/test/unittest/src/hap_verify_openssl_utils_test.cpp index b4792513b8bdafbd5af093ea792f6d011ba17929..3759d273352457ef7f63139633bdf40c3beaa5b4 100644 --- a/interfaces/innerkits/appverify/test/unittest/src/hap_verify_openssl_utils_test.cpp +++ b/interfaces/innerkits/appverify/test/unittest/src/hap_verify_openssl_utils_test.cpp @@ -92,4 +92,38 @@ HWTEST_F(HapVerifyOpensslUtilsTest, GetDigestAlgorithmId001, TestSize.Level1) nId = HapVerifyOpensslUtils::GetDigestAlgorithmId(0); ASSERT_TRUE(nId == 0); } + +/** + * @tc.name: Test VerifyPkcs7 functions + * @tc.desc: use invalid input to verify VerifyPkcs7, The function will return false + * @tc.type: FUNC + */ +HWTEST_F(HapVerifyOpensslUtilsTest, VerifyPkcs7_002, TestSize.Level1) +{ + /* + * @tc.steps: step1. use a null input to run VerifyPkcs7 + * @tc.expected: step1. the return will be false. + */ + Pkcs7Context pkcs7Context; + bool ret = HapVerifyOpensslUtils::VerifyPkcs7(pkcs7Context); + ASSERT_FALSE(ret); +} + +/** + * @tc.name: Test ParsePkcs7Package functions + * @tc.desc: use invalid input to verify ParsePkcs7Package, The function will return false + * @tc.type: FUNC + */ +HWTEST_F(HapVerifyOpensslUtilsTest, ParsePkcs7Package_001, TestSize.Level1) +{ + /* + * @tc.steps: step1. use a null input to run ParsePkcs7Package + * @tc.expected: step1. the return will be false. + */ + Pkcs7Context pkcs7Context; + unsigned char packageData[] = ""; + uint32_t packageLen = 0; + bool ret = HapVerifyOpensslUtils::ParsePkcs7Package(packageData, packageLen, pkcs7Context); + ASSERT_FALSE(ret); +} }