From bbf8086e6edc53acf317210c2ef372f670a7754c Mon Sep 17 00:00:00 2001 From: tantingting Date: Fri, 2 Aug 2024 16:35:38 +0800 Subject: [PATCH] add tdd test case Signed-off-by: tantingting --- .../src/hap_signing_block_utils_test.cpp | 20 +++++++++++ .../src/hap_verify_openssl_utils_test.cpp | 34 +++++++++++++++++++ 2 files changed, 54 insertions(+) diff --git a/interfaces/innerkits/appverify/test/unittest/src/hap_signing_block_utils_test.cpp b/interfaces/innerkits/appverify/test/unittest/src/hap_signing_block_utils_test.cpp index 2efd921..288c971 100644 --- a/interfaces/innerkits/appverify/test/unittest/src/hap_signing_block_utils_test.cpp +++ b/interfaces/innerkits/appverify/test/unittest/src/hap_signing_block_utils_test.cpp @@ -348,4 +348,24 @@ HWTEST_F(HapSigningBlockUtilsTest, GetSumOfChunkDigestLenTest001, TestSize.Level TEST_ZIP_BLOCKS_NUM_NEED_DIGEST, INT_MAX, chunkCount, sumOfChunkDigestLen); ASSERT_FALSE(ret); } + +/** + * @tc.name: Test DigestParameter function + * @tc.desc: Test DigestParameter with copy construction and assignment construction + * @tc.type: FUNC + */ +HWTEST_F(HapSigningBlockUtilsTest, GetDigestParameterTest001, TestSize.Level1) +{ + /* + * @tc.steps: step1. call copy construction and assignment construction + * @tc.expected: step1. the digestOutputSizebytes of two objects are equal. + */ + HapSigningBlockUtils hapSignBlockUtils; + int32_t nid = TEST_NULL_NID; + DigestParameter digestParam = hapSignBlockUtils.GetDigestParameter(nid); + DigestParameter otherParam(digestParam); + ASSERT_EQ(digestParam.digestOutputSizeBytes, otherParam.digestOutputSizeBytes); + otherParam = digestParam; + ASSERT_EQ(digestParam.digestOutputSizeBytes, otherParam.digestOutputSizeBytes); +} } diff --git a/interfaces/innerkits/appverify/test/unittest/src/hap_verify_openssl_utils_test.cpp b/interfaces/innerkits/appverify/test/unittest/src/hap_verify_openssl_utils_test.cpp index b479251..3759d27 100644 --- a/interfaces/innerkits/appverify/test/unittest/src/hap_verify_openssl_utils_test.cpp +++ b/interfaces/innerkits/appverify/test/unittest/src/hap_verify_openssl_utils_test.cpp @@ -92,4 +92,38 @@ HWTEST_F(HapVerifyOpensslUtilsTest, GetDigestAlgorithmId001, TestSize.Level1) nId = HapVerifyOpensslUtils::GetDigestAlgorithmId(0); ASSERT_TRUE(nId == 0); } + +/** + * @tc.name: Test VerifyPkcs7 functions + * @tc.desc: use invalid input to verify VerifyPkcs7, The function will return false + * @tc.type: FUNC + */ +HWTEST_F(HapVerifyOpensslUtilsTest, VerifyPkcs7_002, TestSize.Level1) +{ + /* + * @tc.steps: step1. use a null input to run VerifyPkcs7 + * @tc.expected: step1. the return will be false. + */ + Pkcs7Context pkcs7Context; + bool ret = HapVerifyOpensslUtils::VerifyPkcs7(pkcs7Context); + ASSERT_FALSE(ret); +} + +/** + * @tc.name: Test ParsePkcs7Package functions + * @tc.desc: use invalid input to verify ParsePkcs7Package, The function will return false + * @tc.type: FUNC + */ +HWTEST_F(HapVerifyOpensslUtilsTest, ParsePkcs7Package_001, TestSize.Level1) +{ + /* + * @tc.steps: step1. use a null input to run ParsePkcs7Package + * @tc.expected: step1. the return will be false. + */ + Pkcs7Context pkcs7Context; + unsigned char packageData[] = ""; + uint32_t packageLen = 0; + bool ret = HapVerifyOpensslUtils::ParsePkcs7Package(packageData, packageLen, pkcs7Context); + ASSERT_FALSE(ret); +} } -- Gitee