From 20fbeacb299f10cc1354c5f77fa040debe9a52ab Mon Sep 17 00:00:00 2001 From: lanlanlan Date: Sun, 23 Apr 2023 03:42:40 +0000 Subject: [PATCH 1/2] update test/unittest/src/crypto_rsa_asy_key_generator_test.cpp. Signed-off-by: lanlanlan --- .../src/crypto_rsa_asy_key_generator_test.cpp | 336 +++++++++--------- 1 file changed, 169 insertions(+), 167 deletions(-) diff --git a/test/unittest/src/crypto_rsa_asy_key_generator_test.cpp b/test/unittest/src/crypto_rsa_asy_key_generator_test.cpp index dfa43e9..ca6baf9 100644 --- a/test/unittest/src/crypto_rsa_asy_key_generator_test.cpp +++ b/test/unittest/src/crypto_rsa_asy_key_generator_test.cpp @@ -1,5 +1,5 @@ /* - * Copyright (C) 2022 Huawei Device Co., Ltd. + * Copyright (C) 2022-2023 Huawei Device Co., Ltd. * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at @@ -40,7 +40,7 @@ void CryptoRsaAsyKeyGeneratorTest::TearDown() {} // HcfAsyKeyGeneratorCreate correct case: no primes HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest100, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA512", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); @@ -53,7 +53,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest100, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest110, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA768", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); @@ -66,7 +66,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest110, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest120, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); @@ -80,7 +80,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest120, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest130, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA2048", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); @@ -93,7 +93,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest130, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest140, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA3072", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); @@ -106,7 +106,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest140, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest150, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA4096", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); @@ -120,7 +120,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest150, TestSize // HcfAsyKeyGeneratorCreate correct case: with primes HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest200, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA512|PRIMES_2", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); @@ -133,7 +133,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest200, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest210, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA768|PRIMES_2", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); @@ -146,7 +146,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest210, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest220, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024|PRIMES_2", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); @@ -159,7 +159,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest220, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest230, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024|PRIMES_3", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); @@ -172,7 +172,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest230, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest240, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA2048|PRIMES_2", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); @@ -185,7 +185,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest240, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest250, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA2048|PRIMES_3", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); @@ -198,7 +198,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest250, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest260, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA3072|PRIMES_3", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); @@ -211,7 +211,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest260, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest270, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA4096|PRIMES_4", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); @@ -225,8 +225,8 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest270, TestSize // HcfAsyKeyGeneratorCreate Incorrect case : algname is null HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest300, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; - HcfResult res = HcfAsyKeyGeneratorCreate(NULL, &generator); + HcfAsyKeyGenerator *generator = nullptr; + HcfResult res = HcfAsyKeyGeneratorCreate(nullptr, &generator); EXPECT_NE(res, HCF_SUCCESS); EXPECT_EQ(generator, nullptr); HcfObjDestroy(generator); @@ -234,14 +234,14 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest300, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest301, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("", &generator); EXPECT_NE(res, HCF_SUCCESS); } HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest310, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("111111111111111111111111111111111111111111111111111111111111111111111111" "111111111111111111111111111111111111111111111111111111111111111111111", &generator); EXPECT_NE(res, HCF_SUCCESS); @@ -251,13 +251,13 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest310, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest320, TestSize.Level0) { - HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024", NULL); + HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024", nullptr); EXPECT_NE(res, HCF_SUCCESS); } HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest330, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA12315", &generator); EXPECT_NE(res, HCF_SUCCESS); EXPECT_EQ(generator, nullptr); @@ -266,7 +266,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest330, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest340, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA512|PRIMES_777", &generator); EXPECT_NE(res, HCF_SUCCESS); EXPECT_EQ(generator, nullptr); @@ -275,7 +275,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest340, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest350, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA512|PRIMES_3", &generator); EXPECT_NE(res, HCF_SUCCESS); EXPECT_EQ(generator, nullptr); @@ -284,7 +284,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest350, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest360, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA768|PRIMES_3", &generator); EXPECT_NE(res, HCF_SUCCESS); EXPECT_EQ(generator, nullptr); @@ -293,7 +293,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest360, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest370, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024|PRIMES_4", &generator); EXPECT_NE(res, HCF_SUCCESS); EXPECT_EQ(generator, nullptr); @@ -302,7 +302,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest370, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest380, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA3072|PRIMES_4", &generator); EXPECT_NE(res, HCF_SUCCESS); EXPECT_EQ(generator, nullptr); @@ -311,7 +311,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest380, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest381, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA3072|PRIMES_3", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); @@ -320,7 +320,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest381, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest390, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA4096|PRIMES_5", &generator); EXPECT_NE(res, HCF_SUCCESS); EXPECT_EQ(generator, nullptr); @@ -329,7 +329,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest390, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest391, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA8192|PRIMES_5", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); @@ -338,28 +338,24 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest391, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest400, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); HcfObjDestroy(generator); - generator = NULL; + generator = nullptr; HcfObjDestroy(generator); -} - -HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest410, TestSize.Level0) -{ - HcfObjDestroy(NULL); + HcfObjDestroy(nullptr); } // generateKeyPair correct case HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest500, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024|PRIMES_2", &generator); - HcfKeyPair *keyPair = NULL; - res = generator->generateKeyPair(generator, NULL, &keyPair); + HcfKeyPair *keyPair = nullptr; + res = generator->generateKeyPair(generator, nullptr, &keyPair); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(keyPair, nullptr); @@ -387,11 +383,11 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest500, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest510, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA2048|PRIMES_2", &generator); - HcfKeyPair *keyPair = NULL; - res = generator->generateKeyPair(generator, NULL, &keyPair); + HcfKeyPair *keyPair = nullptr; + res = generator->generateKeyPair(generator, nullptr, &keyPair); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(keyPair, nullptr); @@ -419,14 +415,14 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest510, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest511, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA2048|PRIMES_3", &generator); - HcfKeyPair *keyPair = NULL; - res = generator->generateKeyPair(generator, NULL, &keyPair); + HcfKeyPair *keyPair = nullptr; + res = generator->generateKeyPair(generator, nullptr, &keyPair); - HcfBlob pubKeyBlob = { .data = nullptr, .len = 0 }; - HcfBlob priKeyBlob = { .data = nullptr, .len = 0 }; + HcfBlob pubKeyBlob; + HcfBlob priKeyBlob; HcfPubKey *pubKey = keyPair->pubKey; HcfPriKey *priKey = keyPair->priKey; @@ -442,18 +438,18 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest511, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest512, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA2048|PRIMES_2", &generator); - HcfKeyPair *keyPair = NULL; - res = generator->generateKeyPair(generator, NULL, &keyPair); + HcfKeyPair *keyPair = nullptr; + res = generator->generateKeyPair(generator, nullptr, &keyPair); HcfPubKey *pubKey = keyPair->pubKey; HcfPriKey *priKey = keyPair->priKey; - res = pubKey->base.getEncoded((HcfKey *)priKey, NULL); + res = pubKey->base.getEncoded((HcfKey *)priKey, nullptr); EXPECT_NE(res, HCF_SUCCESS); - res = priKey->base.getEncoded((HcfKey *)pubKey, NULL); + res = priKey->base.getEncoded((HcfKey *)pubKey, nullptr); EXPECT_NE(res, HCF_SUCCESS); HcfObjDestroy(keyPair); HcfObjDestroy(generator); @@ -462,23 +458,23 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest512, TestSize // generateKeyPair conrrect case: use getEncode encode pubkey and prikey HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest520, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); - HcfKeyPair *keyPair = NULL; - res = generator->generateKeyPair(generator, NULL, &keyPair); + HcfKeyPair *keyPair = nullptr; + res = generator->generateKeyPair(generator, nullptr, &keyPair); EXPECT_EQ(res, HCF_SUCCESS); - HcfBlob pubKeyBlob = {.data = NULL, .len = 0}; - HcfBlob priKeyBlob = {.data = NULL, .len = 0}; + HcfBlob pubKeyBlob = {.data = nullptr, .len = 0}; + HcfBlob priKeyBlob = {.data = nullptr, .len = 0}; res = keyPair->pubKey->base.getEncoded((HcfKey *)keyPair->pubKey, &pubKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); res = keyPair->priKey->base.getEncoded((HcfKey *)keyPair->priKey, &priKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); - HcfKeyPair *dupKeyPair = NULL; - res = generator->convertKey(generator, NULL, &pubKeyBlob, &priKeyBlob, &dupKeyPair); + HcfKeyPair *dupKeyPair = nullptr; + res = generator->convertKey(generator, nullptr, &pubKeyBlob, &priKeyBlob, &dupKeyPair); EXPECT_EQ(res, HCF_SUCCESS); HcfPubKey *pubkey = dupKeyPair->pubKey; EXPECT_NE(pubkey->base.getAlgorithm((HcfKey *)pubkey), nullptr); @@ -503,33 +499,33 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest520, TestSize // Test muliti getEncoded and convertKey HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest521, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); - HcfKeyPair *keyPair = NULL; - res = generator->generateKeyPair(generator, NULL, &keyPair); + HcfKeyPair *keyPair = nullptr; + res = generator->generateKeyPair(generator, nullptr, &keyPair); EXPECT_EQ(res, HCF_SUCCESS); - HcfBlob pubKeyBlob1 = {.data = NULL, .len = 0}; - HcfBlob priKeyBlob1 = {.data = NULL, .len = 0}; + HcfBlob pubKeyBlob1 = {.data = nullptr, .len = 0}; + HcfBlob priKeyBlob1 = {.data = nullptr, .len = 0}; res = keyPair->pubKey->base.getEncoded((HcfKey *)keyPair->pubKey, &pubKeyBlob1); EXPECT_EQ(res, HCF_SUCCESS); res = keyPair->priKey->base.getEncoded((HcfKey *)keyPair->priKey, &priKeyBlob1); EXPECT_EQ(res, HCF_SUCCESS); - HcfKeyPair *dupKeyPair1 = NULL; - res = generator->convertKey(generator, NULL, &pubKeyBlob1, &priKeyBlob1, &dupKeyPair1); + HcfKeyPair *dupKeyPair1 = nullptr; + res = generator->convertKey(generator, nullptr, &pubKeyBlob1, &priKeyBlob1, &dupKeyPair1); EXPECT_EQ(res, HCF_SUCCESS); - HcfKeyPair *dupKeyPair2 = NULL; - HcfBlob pubKeyBlob2 = {.data = NULL, .len = 0}; - HcfBlob priKeyBlob2 = {.data = NULL, .len = 0}; + HcfKeyPair *dupKeyPair2 = nullptr; + HcfBlob pubKeyBlob2 = {.data = nullptr, .len = 0}; + HcfBlob priKeyBlob2 = {.data = nullptr, .len = 0}; res = keyPair->pubKey->base.getEncoded((HcfKey *)keyPair->pubKey, &pubKeyBlob2); EXPECT_EQ(res, HCF_SUCCESS); res = keyPair->priKey->base.getEncoded((HcfKey *)keyPair->priKey, &priKeyBlob2); EXPECT_EQ(res, HCF_SUCCESS); - res = generator->convertKey(generator, NULL, &pubKeyBlob2, &priKeyBlob2, &dupKeyPair2); + res = generator->convertKey(generator, nullptr, &pubKeyBlob2, &priKeyBlob2, &dupKeyPair2); EXPECT_EQ(res, HCF_SUCCESS); HcfFree(pubKeyBlob1.data); @@ -545,20 +541,20 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest521, TestSize // generateKeyPair correct case: getEncode encode pubkey HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest530, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA3072|PRIMES_3", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); - HcfKeyPair *keyPair = NULL; - res = generator->generateKeyPair(generator, NULL, &keyPair); + HcfKeyPair *keyPair = nullptr; + res = generator->generateKeyPair(generator, nullptr, &keyPair); EXPECT_EQ(res, HCF_SUCCESS); - HcfBlob pubKeyBlob = {.data = NULL, .len = 0}; + HcfBlob pubKeyBlob = {.data = nullptr, .len = 0}; res = keyPair->pubKey->base.getEncoded((HcfKey *)keyPair->pubKey, &pubKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); - HcfKeyPair *dupKeyPair = NULL; - res = generator->convertKey(generator, NULL, &pubKeyBlob, NULL, &dupKeyPair); + HcfKeyPair *dupKeyPair = nullptr; + res = generator->convertKey(generator, nullptr, &pubKeyBlob, nullptr, &dupKeyPair); EXPECT_EQ(res, HCF_SUCCESS); HcfPubKey *pubkey = dupKeyPair->pubKey; EXPECT_NE(pubkey->base.getAlgorithm((HcfKey *)pubkey), nullptr); @@ -575,20 +571,20 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest530, TestSize // generateKeyPair correct case: getEncode encode prikey HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest540, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); - HcfKeyPair *keyPair = NULL; - res = generator->generateKeyPair(generator, NULL, &keyPair); + HcfKeyPair *keyPair = nullptr; + res = generator->generateKeyPair(generator, nullptr, &keyPair); EXPECT_EQ(res, HCF_SUCCESS); - HcfBlob priKeyBlob = {.data = NULL, .len = 0}; + HcfBlob priKeyBlob = {.data = nullptr, .len = 0}; res = keyPair->priKey->base.getEncoded((HcfKey *)keyPair->priKey, &priKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); - HcfKeyPair *dupKeyPair = NULL; - res = generator->convertKey(generator, NULL, NULL, &priKeyBlob, &dupKeyPair); + HcfKeyPair *dupKeyPair = nullptr; + res = generator->convertKey(generator, nullptr, nullptr, &priKeyBlob, &dupKeyPair); EXPECT_EQ(res, HCF_SUCCESS); HcfPriKey *prikey = dupKeyPair->priKey; @@ -606,23 +602,23 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest540, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest550, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA3072", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); - HcfKeyPair *keyPair = NULL; - res = generator->generateKeyPair(generator, NULL, &keyPair); + HcfKeyPair *keyPair = nullptr; + res = generator->generateKeyPair(generator, nullptr, &keyPair); EXPECT_EQ(res, HCF_SUCCESS); - HcfBlob pubKeyBlob = {.data = NULL, .len = 0}; - HcfBlob priKeyBlob = {.data = NULL, .len = 0}; + HcfBlob pubKeyBlob = {.data = nullptr, .len = 0}; + HcfBlob priKeyBlob = {.data = nullptr, .len = 0}; res = keyPair->pubKey->base.getEncoded((HcfKey *)keyPair->pubKey, &pubKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); res = keyPair->priKey->base.getEncoded((HcfKey *)keyPair->priKey, &priKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); - HcfKeyPair *dupKeyPair = NULL; - res = generator->convertKey(generator, NULL, &pubKeyBlob, &priKeyBlob, &dupKeyPair); + HcfKeyPair *dupKeyPair = nullptr; + res = generator->convertKey(generator, nullptr, &pubKeyBlob, &priKeyBlob, &dupKeyPair); EXPECT_EQ(res, HCF_SUCCESS); HcfPubKey *pubkey = dupKeyPair->pubKey; EXPECT_NE(pubkey->base.getAlgorithm((HcfKey *)pubkey), nullptr); @@ -646,23 +642,23 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest550, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest560, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA4096", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); - HcfKeyPair *keyPair = NULL; - res = generator->generateKeyPair(generator, NULL, &keyPair); + HcfKeyPair *keyPair = nullptr; + res = generator->generateKeyPair(generator, nullptr, &keyPair); EXPECT_EQ(res, HCF_SUCCESS); - HcfBlob pubKeyBlob = {.data = NULL, .len = 0}; - HcfBlob priKeyBlob = {.data = NULL, .len = 0}; + HcfBlob pubKeyBlob = {.data = nullptr, .len = 0}; + HcfBlob priKeyBlob = {.data = nullptr, .len = 0}; res = keyPair->pubKey->base.getEncoded((HcfKey *)keyPair->pubKey, &pubKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); res = keyPair->priKey->base.getEncoded((HcfKey *)keyPair->priKey, &priKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); - HcfKeyPair *dupKeyPair = NULL; - res = generator->convertKey(generator, NULL, &pubKeyBlob, &priKeyBlob, &dupKeyPair); + HcfKeyPair *dupKeyPair = nullptr; + res = generator->convertKey(generator, nullptr, &pubKeyBlob, &priKeyBlob, &dupKeyPair); EXPECT_EQ(res, HCF_SUCCESS); HcfPubKey *pubkey = dupKeyPair->pubKey; EXPECT_NE(pubkey->base.getAlgorithm((HcfKey *)pubkey), nullptr); @@ -686,23 +682,23 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest560, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest570, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA512", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); - HcfKeyPair *keyPair = NULL; - res = generator->generateKeyPair(generator, NULL, &keyPair); + HcfKeyPair *keyPair = nullptr; + res = generator->generateKeyPair(generator, nullptr, &keyPair); EXPECT_EQ(res, HCF_SUCCESS); - HcfBlob pubKeyBlob = {.data = NULL, .len = 0}; - HcfBlob priKeyBlob = {.data = NULL, .len = 0}; + HcfBlob pubKeyBlob = {.data = nullptr, .len = 0}; + HcfBlob priKeyBlob = {.data = nullptr, .len = 0}; res = keyPair->pubKey->base.getEncoded((HcfKey *)keyPair->pubKey, &pubKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); res = keyPair->priKey->base.getEncoded((HcfKey *)keyPair->priKey, &priKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); - HcfKeyPair *dupKeyPair = NULL; - res = generator->convertKey(generator, NULL, &pubKeyBlob, &priKeyBlob, &dupKeyPair); + HcfKeyPair *dupKeyPair = nullptr; + res = generator->convertKey(generator, nullptr, &pubKeyBlob, &priKeyBlob, &dupKeyPair); EXPECT_EQ(res, HCF_SUCCESS); HcfPubKey *pubkey = dupKeyPair->pubKey; EXPECT_NE(pubkey->base.getAlgorithm((HcfKey *)pubkey), nullptr); @@ -726,23 +722,23 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest570, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest580, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA768", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); - HcfKeyPair *keyPair = NULL; - res = generator->generateKeyPair(generator, NULL, &keyPair); + HcfKeyPair *keyPair = nullptr; + res = generator->generateKeyPair(generator, nullptr, &keyPair); EXPECT_EQ(res, HCF_SUCCESS); - HcfBlob pubKeyBlob = {.data = NULL, .len = 0}; - HcfBlob priKeyBlob = {.data = NULL, .len = 0}; + HcfBlob pubKeyBlob = {.data = nullptr, .len = 0}; + HcfBlob priKeyBlob = {.data = nullptr, .len = 0}; res = keyPair->pubKey->base.getEncoded((HcfKey *)keyPair->pubKey, &pubKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); res = keyPair->priKey->base.getEncoded((HcfKey *)keyPair->priKey, &priKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); - HcfKeyPair *dupKeyPair = NULL; - res = generator->convertKey(generator, NULL, &pubKeyBlob, &priKeyBlob, &dupKeyPair); + HcfKeyPair *dupKeyPair = nullptr; + res = generator->convertKey(generator, nullptr, &pubKeyBlob, &priKeyBlob, &dupKeyPair); EXPECT_EQ(res, HCF_SUCCESS); HcfPubKey *pubkey = dupKeyPair->pubKey; EXPECT_NE(pubkey->base.getAlgorithm((HcfKey *)pubkey), nullptr); @@ -767,18 +763,18 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest580, TestSize // generateKeyPair incorrect case: user wrong ECC class, ignore in this version HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest600, TestSize.Level0) { - HcfAsyKeyGenerator *eccGenerator = NULL; + HcfAsyKeyGenerator *eccGenerator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("ECC224", &eccGenerator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(eccGenerator, nullptr); - HcfAsyKeyGenerator *rsaGenerator = NULL; + HcfAsyKeyGenerator *rsaGenerator = nullptr; res = HcfAsyKeyGeneratorCreate("RSA1024", &rsaGenerator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(rsaGenerator, nullptr); - HcfKeyPair *keyPair = NULL; - res = rsaGenerator->generateKeyPair(eccGenerator, NULL, &keyPair); + HcfKeyPair *keyPair = nullptr; + res = rsaGenerator->generateKeyPair(eccGenerator, nullptr, &keyPair); HcfObjDestroy(keyPair); HcfObjDestroy(eccGenerator); @@ -788,13 +784,13 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest600, TestSize // generateKeyPair incorrect case: generator class is null HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest610, TestSize.Level0) { - HcfAsyKeyGenerator *rsaGenerator = NULL; + HcfAsyKeyGenerator *rsaGenerator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024", &rsaGenerator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(rsaGenerator, nullptr); - HcfKeyPair *keyPair = NULL; - res = rsaGenerator->generateKeyPair(NULL, NULL, &keyPair); + HcfKeyPair *keyPair = nullptr; + res = rsaGenerator->generateKeyPair(nullptr, nullptr, &keyPair); EXPECT_NE(res, HCF_SUCCESS); EXPECT_EQ(keyPair, nullptr); @@ -804,12 +800,12 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest610, TestSize // generateKeyPair incorrect case: keypair is null HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest620, TestSize.Level0) { - HcfAsyKeyGenerator *rsaGenerator = NULL; + HcfAsyKeyGenerator *rsaGenerator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024", &rsaGenerator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(rsaGenerator, nullptr); - res = rsaGenerator->generateKeyPair(rsaGenerator, NULL, NULL); + res = rsaGenerator->generateKeyPair(rsaGenerator, nullptr, nullptr); EXPECT_NE(res, HCF_SUCCESS); HcfObjDestroy(rsaGenerator); @@ -818,23 +814,23 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest620, TestSize // convertKey correct case HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest700, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA2048", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); - HcfKeyPair *keyPair = NULL; - res = generator->generateKeyPair(generator, NULL, &keyPair); + HcfKeyPair *keyPair = nullptr; + res = generator->generateKeyPair(generator, nullptr, &keyPair); EXPECT_EQ(res, HCF_SUCCESS); - HcfBlob pubKeyBlob = {.data = NULL, .len = 0}; - HcfBlob priKeyBlob = {.data = NULL, .len = 0}; + HcfBlob pubKeyBlob = {.data = nullptr, .len = 0}; + HcfBlob priKeyBlob = {.data = nullptr, .len = 0}; res = keyPair->pubKey->base.getEncoded((HcfKey *)keyPair->pubKey, &pubKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); res = keyPair->priKey->base.getEncoded((HcfKey *)keyPair->priKey, &priKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); - HcfKeyPair *dupKeyPair = NULL; - res = generator->convertKey(generator, NULL, &pubKeyBlob, &priKeyBlob, &dupKeyPair); + HcfKeyPair *dupKeyPair = nullptr; + res = generator->convertKey(generator, nullptr, &pubKeyBlob, &priKeyBlob, &dupKeyPair); EXPECT_EQ(res, HCF_SUCCESS); HcfPubKey *pubkey = dupKeyPair->pubKey; EXPECT_NE(pubkey->base.getAlgorithm((HcfKey *)pubkey), nullptr); @@ -859,18 +855,18 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest700, TestSize // convertKey incorrect case: input ECC class HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest710, TestSize.Level0) { - HcfAsyKeyGenerator *eccGenerator = NULL; + HcfAsyKeyGenerator *eccGenerator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("ECC224", &eccGenerator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(eccGenerator, nullptr); - HcfAsyKeyGenerator *rsaGenerator = NULL; + HcfAsyKeyGenerator *rsaGenerator = nullptr; res = HcfAsyKeyGeneratorCreate("RSA1024", &rsaGenerator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(rsaGenerator, nullptr); - HcfKeyPair *dupKeyPair = NULL; - res = rsaGenerator->convertKey(eccGenerator, NULL, NULL, NULL, &dupKeyPair); + HcfKeyPair *dupKeyPair = nullptr; + res = rsaGenerator->convertKey(eccGenerator, nullptr, nullptr, nullptr, &dupKeyPair); EXPECT_NE(res, HCF_SUCCESS); EXPECT_EQ(dupKeyPair, nullptr); @@ -882,23 +878,23 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest710, TestSize // convertKey incorrect case: input null generator HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest720, TestSize.Level0) { - HcfAsyKeyGenerator *rsaGenerator = NULL; + HcfAsyKeyGenerator *rsaGenerator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024", &rsaGenerator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(rsaGenerator, nullptr); - HcfKeyPair *keyPair = NULL; - res = rsaGenerator->generateKeyPair(rsaGenerator, NULL, &keyPair); + HcfKeyPair *keyPair = nullptr; + res = rsaGenerator->generateKeyPair(rsaGenerator, nullptr, &keyPair); EXPECT_EQ(res, HCF_SUCCESS); - HcfBlob pubKeyBlob = {.data = NULL, .len = 0}; - HcfBlob priKeyBlob = {.data = NULL, .len = 0}; + HcfBlob pubKeyBlob = {.data = nullptr, .len = 0}; + HcfBlob priKeyBlob = {.data = nullptr, .len = 0}; res = keyPair->pubKey->base.getEncoded((HcfKey *)keyPair->pubKey, &pubKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); res = keyPair->priKey->base.getEncoded((HcfKey *)keyPair->priKey, &priKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); - HcfKeyPair *dupKeyPair = NULL; - res = rsaGenerator->convertKey(NULL, NULL, &pubKeyBlob, &priKeyBlob, &dupKeyPair); + HcfKeyPair *dupKeyPair = nullptr; + res = rsaGenerator->convertKey(nullptr, nullptr, &pubKeyBlob, &priKeyBlob, &dupKeyPair); EXPECT_NE(res, HCF_SUCCESS); EXPECT_EQ(dupKeyPair, nullptr); @@ -911,23 +907,23 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest720, TestSize // convertKey incorrect case: input null dupkeypair HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest730, TestSize.Level0) { - HcfAsyKeyGenerator *rsaGenerator = NULL; + HcfAsyKeyGenerator *rsaGenerator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024", &rsaGenerator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(rsaGenerator, nullptr); - HcfKeyPair *keyPair = NULL; - res = rsaGenerator->generateKeyPair(rsaGenerator, NULL, &keyPair); + HcfKeyPair *keyPair = nullptr; + res = rsaGenerator->generateKeyPair(rsaGenerator, nullptr, &keyPair); EXPECT_EQ(res, HCF_SUCCESS); - HcfBlob pubKeyBlob = {.data = NULL, .len = 0}; - HcfBlob priKeyBlob = {.data = NULL, .len = 0}; + HcfBlob pubKeyBlob = {.data = nullptr, .len = 0}; + HcfBlob priKeyBlob = {.data = nullptr, .len = 0}; res = keyPair->pubKey->base.getEncoded((HcfKey *)keyPair->pubKey, &pubKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); res = keyPair->priKey->base.getEncoded((HcfKey *)keyPair->priKey, &priKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); - HcfKeyPair *dupKeyPair = NULL; - res = rsaGenerator->convertKey(rsaGenerator, NULL, &pubKeyBlob, &priKeyBlob, NULL); + HcfKeyPair *dupKeyPair = nullptr; + res = rsaGenerator->convertKey(rsaGenerator, nullptr, &pubKeyBlob, &priKeyBlob, nullptr); EXPECT_NE(res, HCF_SUCCESS); EXPECT_EQ(dupKeyPair, nullptr); @@ -940,7 +936,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest730, TestSize // Incorrect case: use wrong bits or primes HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest800, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1111", &generator); EXPECT_NE(res, HCF_SUCCESS); EXPECT_EQ(generator, nullptr); @@ -949,7 +945,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest800, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest810, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024|Primessf", &generator); EXPECT_NE(res, HCF_SUCCESS); EXPECT_EQ(generator, nullptr); @@ -959,7 +955,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest810, TestSize // 测试异常释放 HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest820, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024|Primessf", &generator); EXPECT_NE(res, HCF_SUCCESS); EXPECT_EQ(generator, nullptr); @@ -969,12 +965,14 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest820, TestSize // prikey clear mem HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest830, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024", &generator); - HcfKeyPair *keyPair = NULL; - res = generator->generateKeyPair(generator, NULL, &keyPair); + HcfKeyPair *keyPair = nullptr; + res = generator->generateKeyPair(generator, nullptr, &keyPair); + EXPECT_EQ(res, HCF_SUCCESS); + EXPECT_NE(keyPair, nullptr); - keyPair->priKey->clearMem(NULL); + keyPair->priKey->clearMem(nullptr); HcfObjDestroy(generator); HcfObjDestroy(keyPair); @@ -982,10 +980,12 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest830, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest840, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024", &generator); - HcfKeyPair *keyPair = NULL; - res = generator->generateKeyPair(generator, NULL, &keyPair); + HcfKeyPair *keyPair = nullptr; + res = generator->generateKeyPair(generator, nullptr, &keyPair); + EXPECT_EQ(res, HCF_SUCCESS); + EXPECT_NE(keyPair, nullptr); keyPair->priKey->clearMem((HcfPriKey *)keyPair->pubKey); @@ -995,10 +995,12 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest840, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest850, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024", &generator); - HcfKeyPair *keyPair = NULL; - res = generator->generateKeyPair(generator, NULL, &keyPair); + HcfKeyPair *keyPair = nullptr; + res = generator->generateKeyPair(generator, nullptr, &keyPair); + EXPECT_EQ(res, HCF_SUCCESS); + EXPECT_NE(keyPair, nullptr); keyPair->priKey->clearMem(keyPair->priKey); @@ -1009,11 +1011,11 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest850, TestSize // correct case: use destroy function inclass(not HcfObjDestroy) HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest900, TestSize.Level0) { - HcfAsyKeyGenerator *generator = NULL; + HcfAsyKeyGenerator *generator = nullptr; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024|PRIMES_2", &generator); - HcfKeyPair *keyPair = NULL; - res = generator->generateKeyPair(generator, NULL, &keyPair); + HcfKeyPair *keyPair = nullptr; + res = generator->generateKeyPair(generator, nullptr, &keyPair); HcfPubKey *pubkey = keyPair->pubKey; HcfPriKey *prikey = keyPair->priKey; @@ -1021,18 +1023,18 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest900, TestSize EXPECT_EQ(pubkey->base.getFormat((HcfKey *)prikey), nullptr); EXPECT_EQ(prikey->base.getFormat((HcfKey *)pubkey), nullptr); - EXPECT_EQ(pubkey->base.getFormat(NULL), nullptr); - EXPECT_EQ(prikey->base.getFormat(NULL), nullptr); + EXPECT_EQ(pubkey->base.getFormat(nullptr), nullptr); + EXPECT_EQ(prikey->base.getFormat(nullptr), nullptr); EXPECT_EQ(pubkey->base.getAlgorithm((HcfKey *)prikey), nullptr); EXPECT_EQ(prikey->base.getAlgorithm((HcfKey *)pubkey), nullptr); - EXPECT_EQ(pubkey->base.getAlgorithm(NULL), nullptr); - EXPECT_EQ(prikey->base.getAlgorithm(NULL), nullptr); + EXPECT_EQ(pubkey->base.getAlgorithm(nullptr), nullptr); + EXPECT_EQ(prikey->base.getAlgorithm(nullptr), nullptr); - prikey->base.base.destroy(NULL); - pubkey->base.base.destroy(NULL); - keyPair->base.destroy(NULL); + prikey->base.base.destroy(nullptr); + pubkey->base.base.destroy(nullptr); + keyPair->base.destroy(nullptr); prikey->base.base.destroy((HcfObjectBase *)pubkey); pubkey->base.base.destroy((HcfObjectBase *)prikey); -- Gitee From 7b209d38c6c83fb1f2479d87eb278913b8d75d60 Mon Sep 17 00:00:00 2001 From: lanlanlan Date: Sun, 23 Apr 2023 06:14:00 +0000 Subject: [PATCH 2/2] update test/unittest/src/crypto_rsa_asy_key_generator_test.cpp. Signed-off-by: lanlanlan --- .../src/crypto_rsa_asy_key_generator_test.cpp | 324 +++++++++--------- 1 file changed, 162 insertions(+), 162 deletions(-) diff --git a/test/unittest/src/crypto_rsa_asy_key_generator_test.cpp b/test/unittest/src/crypto_rsa_asy_key_generator_test.cpp index ca6baf9..2fb8110 100644 --- a/test/unittest/src/crypto_rsa_asy_key_generator_test.cpp +++ b/test/unittest/src/crypto_rsa_asy_key_generator_test.cpp @@ -40,7 +40,7 @@ void CryptoRsaAsyKeyGeneratorTest::TearDown() {} // HcfAsyKeyGeneratorCreate correct case: no primes HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest100, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA512", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); @@ -53,7 +53,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest100, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest110, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA768", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); @@ -66,7 +66,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest110, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest120, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); @@ -80,7 +80,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest120, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest130, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA2048", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); @@ -93,7 +93,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest130, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest140, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA3072", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); @@ -106,7 +106,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest140, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest150, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA4096", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); @@ -120,7 +120,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest150, TestSize // HcfAsyKeyGeneratorCreate correct case: with primes HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest200, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA512|PRIMES_2", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); @@ -133,7 +133,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest200, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest210, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA768|PRIMES_2", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); @@ -146,7 +146,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest210, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest220, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024|PRIMES_2", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); @@ -159,7 +159,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest220, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest230, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024|PRIMES_3", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); @@ -172,7 +172,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest230, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest240, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA2048|PRIMES_2", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); @@ -185,7 +185,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest240, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest250, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA2048|PRIMES_3", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); @@ -198,7 +198,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest250, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest260, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA3072|PRIMES_3", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); @@ -211,7 +211,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest260, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest270, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA4096|PRIMES_4", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); @@ -225,8 +225,8 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest270, TestSize // HcfAsyKeyGeneratorCreate Incorrect case : algname is null HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest300, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; - HcfResult res = HcfAsyKeyGeneratorCreate(nullptr, &generator); + HcfAsyKeyGenerator *generator = NULL; + HcfResult res = HcfAsyKeyGeneratorCreate(NULL, &generator); EXPECT_NE(res, HCF_SUCCESS); EXPECT_EQ(generator, nullptr); HcfObjDestroy(generator); @@ -234,14 +234,14 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest300, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest301, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("", &generator); EXPECT_NE(res, HCF_SUCCESS); } HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest310, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("111111111111111111111111111111111111111111111111111111111111111111111111" "111111111111111111111111111111111111111111111111111111111111111111111", &generator); EXPECT_NE(res, HCF_SUCCESS); @@ -251,13 +251,13 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest310, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest320, TestSize.Level0) { - HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024", nullptr); + HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024", NULL); EXPECT_NE(res, HCF_SUCCESS); } HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest330, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA12315", &generator); EXPECT_NE(res, HCF_SUCCESS); EXPECT_EQ(generator, nullptr); @@ -266,7 +266,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest330, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest340, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA512|PRIMES_777", &generator); EXPECT_NE(res, HCF_SUCCESS); EXPECT_EQ(generator, nullptr); @@ -275,7 +275,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest340, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest350, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA512|PRIMES_3", &generator); EXPECT_NE(res, HCF_SUCCESS); EXPECT_EQ(generator, nullptr); @@ -284,7 +284,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest350, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest360, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA768|PRIMES_3", &generator); EXPECT_NE(res, HCF_SUCCESS); EXPECT_EQ(generator, nullptr); @@ -293,7 +293,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest360, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest370, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024|PRIMES_4", &generator); EXPECT_NE(res, HCF_SUCCESS); EXPECT_EQ(generator, nullptr); @@ -302,7 +302,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest370, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest380, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA3072|PRIMES_4", &generator); EXPECT_NE(res, HCF_SUCCESS); EXPECT_EQ(generator, nullptr); @@ -311,7 +311,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest380, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest381, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA3072|PRIMES_3", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); @@ -320,7 +320,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest381, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest390, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA4096|PRIMES_5", &generator); EXPECT_NE(res, HCF_SUCCESS); EXPECT_EQ(generator, nullptr); @@ -329,7 +329,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest390, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest391, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA8192|PRIMES_5", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); @@ -338,24 +338,24 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest391, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest400, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); HcfObjDestroy(generator); - generator = nullptr; + generator = NULL; HcfObjDestroy(generator); - HcfObjDestroy(nullptr); + HcfObjDestroy(NULL); } // generateKeyPair correct case HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest500, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024|PRIMES_2", &generator); - HcfKeyPair *keyPair = nullptr; - res = generator->generateKeyPair(generator, nullptr, &keyPair); + HcfKeyPair *keyPair = NULL; + res = generator->generateKeyPair(generator, NULL, &keyPair); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(keyPair, nullptr); @@ -383,11 +383,11 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest500, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest510, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA2048|PRIMES_2", &generator); - HcfKeyPair *keyPair = nullptr; - res = generator->generateKeyPair(generator, nullptr, &keyPair); + HcfKeyPair *keyPair = NULL; + res = generator->generateKeyPair(generator, NULL, &keyPair); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(keyPair, nullptr); @@ -415,14 +415,14 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest510, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest511, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA2048|PRIMES_3", &generator); - HcfKeyPair *keyPair = nullptr; - res = generator->generateKeyPair(generator, nullptr, &keyPair); + HcfKeyPair *keyPair = NULL; + res = generator->generateKeyPair(generator, NULL, &keyPair); - HcfBlob pubKeyBlob; - HcfBlob priKeyBlob; + HcfBlob pubKeyBlob = { .data = nullptr, .len = 0 }; + HcfBlob priKeyBlob = { .data = nullptr, .len = 0 }; HcfPubKey *pubKey = keyPair->pubKey; HcfPriKey *priKey = keyPair->priKey; @@ -438,18 +438,18 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest511, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest512, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA2048|PRIMES_2", &generator); - HcfKeyPair *keyPair = nullptr; - res = generator->generateKeyPair(generator, nullptr, &keyPair); + HcfKeyPair *keyPair = NULL; + res = generator->generateKeyPair(generator, NULL, &keyPair); HcfPubKey *pubKey = keyPair->pubKey; HcfPriKey *priKey = keyPair->priKey; - res = pubKey->base.getEncoded((HcfKey *)priKey, nullptr); + res = pubKey->base.getEncoded((HcfKey *)priKey, NULL); EXPECT_NE(res, HCF_SUCCESS); - res = priKey->base.getEncoded((HcfKey *)pubKey, nullptr); + res = priKey->base.getEncoded((HcfKey *)pubKey, NULL); EXPECT_NE(res, HCF_SUCCESS); HcfObjDestroy(keyPair); HcfObjDestroy(generator); @@ -458,23 +458,23 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest512, TestSize // generateKeyPair conrrect case: use getEncode encode pubkey and prikey HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest520, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); - HcfKeyPair *keyPair = nullptr; - res = generator->generateKeyPair(generator, nullptr, &keyPair); + HcfKeyPair *keyPair = NULL; + res = generator->generateKeyPair(generator, NULL, &keyPair); EXPECT_EQ(res, HCF_SUCCESS); - HcfBlob pubKeyBlob = {.data = nullptr, .len = 0}; - HcfBlob priKeyBlob = {.data = nullptr, .len = 0}; + HcfBlob pubKeyBlob = {.data = NULL, .len = 0}; + HcfBlob priKeyBlob = {.data = NULL, .len = 0}; res = keyPair->pubKey->base.getEncoded((HcfKey *)keyPair->pubKey, &pubKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); res = keyPair->priKey->base.getEncoded((HcfKey *)keyPair->priKey, &priKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); - HcfKeyPair *dupKeyPair = nullptr; - res = generator->convertKey(generator, nullptr, &pubKeyBlob, &priKeyBlob, &dupKeyPair); + HcfKeyPair *dupKeyPair = NULL; + res = generator->convertKey(generator, NULL, &pubKeyBlob, &priKeyBlob, &dupKeyPair); EXPECT_EQ(res, HCF_SUCCESS); HcfPubKey *pubkey = dupKeyPair->pubKey; EXPECT_NE(pubkey->base.getAlgorithm((HcfKey *)pubkey), nullptr); @@ -499,33 +499,33 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest520, TestSize // Test muliti getEncoded and convertKey HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest521, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); - HcfKeyPair *keyPair = nullptr; - res = generator->generateKeyPair(generator, nullptr, &keyPair); + HcfKeyPair *keyPair = NULL; + res = generator->generateKeyPair(generator, NULL, &keyPair); EXPECT_EQ(res, HCF_SUCCESS); - HcfBlob pubKeyBlob1 = {.data = nullptr, .len = 0}; - HcfBlob priKeyBlob1 = {.data = nullptr, .len = 0}; + HcfBlob pubKeyBlob1 = {.data = NULL, .len = 0}; + HcfBlob priKeyBlob1 = {.data = NULL, .len = 0}; res = keyPair->pubKey->base.getEncoded((HcfKey *)keyPair->pubKey, &pubKeyBlob1); EXPECT_EQ(res, HCF_SUCCESS); res = keyPair->priKey->base.getEncoded((HcfKey *)keyPair->priKey, &priKeyBlob1); EXPECT_EQ(res, HCF_SUCCESS); - HcfKeyPair *dupKeyPair1 = nullptr; - res = generator->convertKey(generator, nullptr, &pubKeyBlob1, &priKeyBlob1, &dupKeyPair1); + HcfKeyPair *dupKeyPair1 = NULL; + res = generator->convertKey(generator, NULL, &pubKeyBlob1, &priKeyBlob1, &dupKeyPair1); EXPECT_EQ(res, HCF_SUCCESS); - HcfKeyPair *dupKeyPair2 = nullptr; - HcfBlob pubKeyBlob2 = {.data = nullptr, .len = 0}; - HcfBlob priKeyBlob2 = {.data = nullptr, .len = 0}; + HcfKeyPair *dupKeyPair2 = NULL; + HcfBlob pubKeyBlob2 = {.data = NULL, .len = 0}; + HcfBlob priKeyBlob2 = {.data = NULL, .len = 0}; res = keyPair->pubKey->base.getEncoded((HcfKey *)keyPair->pubKey, &pubKeyBlob2); EXPECT_EQ(res, HCF_SUCCESS); res = keyPair->priKey->base.getEncoded((HcfKey *)keyPair->priKey, &priKeyBlob2); EXPECT_EQ(res, HCF_SUCCESS); - res = generator->convertKey(generator, nullptr, &pubKeyBlob2, &priKeyBlob2, &dupKeyPair2); + res = generator->convertKey(generator, NULL, &pubKeyBlob2, &priKeyBlob2, &dupKeyPair2); EXPECT_EQ(res, HCF_SUCCESS); HcfFree(pubKeyBlob1.data); @@ -541,20 +541,20 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest521, TestSize // generateKeyPair correct case: getEncode encode pubkey HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest530, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA3072|PRIMES_3", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); - HcfKeyPair *keyPair = nullptr; - res = generator->generateKeyPair(generator, nullptr, &keyPair); + HcfKeyPair *keyPair = NULL; + res = generator->generateKeyPair(generator, NULL, &keyPair); EXPECT_EQ(res, HCF_SUCCESS); - HcfBlob pubKeyBlob = {.data = nullptr, .len = 0}; + HcfBlob pubKeyBlob = {.data = NULL, .len = 0}; res = keyPair->pubKey->base.getEncoded((HcfKey *)keyPair->pubKey, &pubKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); - HcfKeyPair *dupKeyPair = nullptr; - res = generator->convertKey(generator, nullptr, &pubKeyBlob, nullptr, &dupKeyPair); + HcfKeyPair *dupKeyPair = NULL; + res = generator->convertKey(generator, NULL, &pubKeyBlob, NULL, &dupKeyPair); EXPECT_EQ(res, HCF_SUCCESS); HcfPubKey *pubkey = dupKeyPair->pubKey; EXPECT_NE(pubkey->base.getAlgorithm((HcfKey *)pubkey), nullptr); @@ -571,20 +571,20 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest530, TestSize // generateKeyPair correct case: getEncode encode prikey HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest540, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); - HcfKeyPair *keyPair = nullptr; - res = generator->generateKeyPair(generator, nullptr, &keyPair); + HcfKeyPair *keyPair = NULL; + res = generator->generateKeyPair(generator, NULL, &keyPair); EXPECT_EQ(res, HCF_SUCCESS); - HcfBlob priKeyBlob = {.data = nullptr, .len = 0}; + HcfBlob priKeyBlob = {.data = NULL, .len = 0}; res = keyPair->priKey->base.getEncoded((HcfKey *)keyPair->priKey, &priKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); - HcfKeyPair *dupKeyPair = nullptr; - res = generator->convertKey(generator, nullptr, nullptr, &priKeyBlob, &dupKeyPair); + HcfKeyPair *dupKeyPair = NULL; + res = generator->convertKey(generator, NULL, NULL, &priKeyBlob, &dupKeyPair); EXPECT_EQ(res, HCF_SUCCESS); HcfPriKey *prikey = dupKeyPair->priKey; @@ -602,23 +602,23 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest540, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest550, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA3072", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); - HcfKeyPair *keyPair = nullptr; - res = generator->generateKeyPair(generator, nullptr, &keyPair); + HcfKeyPair *keyPair = NULL; + res = generator->generateKeyPair(generator, NULL, &keyPair); EXPECT_EQ(res, HCF_SUCCESS); - HcfBlob pubKeyBlob = {.data = nullptr, .len = 0}; - HcfBlob priKeyBlob = {.data = nullptr, .len = 0}; + HcfBlob pubKeyBlob = {.data = NULL, .len = 0}; + HcfBlob priKeyBlob = {.data = NULL, .len = 0}; res = keyPair->pubKey->base.getEncoded((HcfKey *)keyPair->pubKey, &pubKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); res = keyPair->priKey->base.getEncoded((HcfKey *)keyPair->priKey, &priKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); - HcfKeyPair *dupKeyPair = nullptr; - res = generator->convertKey(generator, nullptr, &pubKeyBlob, &priKeyBlob, &dupKeyPair); + HcfKeyPair *dupKeyPair = NULL; + res = generator->convertKey(generator, NULL, &pubKeyBlob, &priKeyBlob, &dupKeyPair); EXPECT_EQ(res, HCF_SUCCESS); HcfPubKey *pubkey = dupKeyPair->pubKey; EXPECT_NE(pubkey->base.getAlgorithm((HcfKey *)pubkey), nullptr); @@ -642,23 +642,23 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest550, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest560, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA4096", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); - HcfKeyPair *keyPair = nullptr; - res = generator->generateKeyPair(generator, nullptr, &keyPair); + HcfKeyPair *keyPair = NULL; + res = generator->generateKeyPair(generator, NULL, &keyPair); EXPECT_EQ(res, HCF_SUCCESS); - HcfBlob pubKeyBlob = {.data = nullptr, .len = 0}; - HcfBlob priKeyBlob = {.data = nullptr, .len = 0}; + HcfBlob pubKeyBlob = {.data = NULL, .len = 0}; + HcfBlob priKeyBlob = {.data = NULL, .len = 0}; res = keyPair->pubKey->base.getEncoded((HcfKey *)keyPair->pubKey, &pubKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); res = keyPair->priKey->base.getEncoded((HcfKey *)keyPair->priKey, &priKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); - HcfKeyPair *dupKeyPair = nullptr; - res = generator->convertKey(generator, nullptr, &pubKeyBlob, &priKeyBlob, &dupKeyPair); + HcfKeyPair *dupKeyPair = NULL; + res = generator->convertKey(generator, NULL, &pubKeyBlob, &priKeyBlob, &dupKeyPair); EXPECT_EQ(res, HCF_SUCCESS); HcfPubKey *pubkey = dupKeyPair->pubKey; EXPECT_NE(pubkey->base.getAlgorithm((HcfKey *)pubkey), nullptr); @@ -682,23 +682,23 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest560, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest570, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA512", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); - HcfKeyPair *keyPair = nullptr; - res = generator->generateKeyPair(generator, nullptr, &keyPair); + HcfKeyPair *keyPair = NULL; + res = generator->generateKeyPair(generator, NULL, &keyPair); EXPECT_EQ(res, HCF_SUCCESS); - HcfBlob pubKeyBlob = {.data = nullptr, .len = 0}; - HcfBlob priKeyBlob = {.data = nullptr, .len = 0}; + HcfBlob pubKeyBlob = {.data = NULL, .len = 0}; + HcfBlob priKeyBlob = {.data = NULL, .len = 0}; res = keyPair->pubKey->base.getEncoded((HcfKey *)keyPair->pubKey, &pubKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); res = keyPair->priKey->base.getEncoded((HcfKey *)keyPair->priKey, &priKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); - HcfKeyPair *dupKeyPair = nullptr; - res = generator->convertKey(generator, nullptr, &pubKeyBlob, &priKeyBlob, &dupKeyPair); + HcfKeyPair *dupKeyPair = NULL; + res = generator->convertKey(generator, NULL, &pubKeyBlob, &priKeyBlob, &dupKeyPair); EXPECT_EQ(res, HCF_SUCCESS); HcfPubKey *pubkey = dupKeyPair->pubKey; EXPECT_NE(pubkey->base.getAlgorithm((HcfKey *)pubkey), nullptr); @@ -722,23 +722,23 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest570, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest580, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA768", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); - HcfKeyPair *keyPair = nullptr; - res = generator->generateKeyPair(generator, nullptr, &keyPair); + HcfKeyPair *keyPair = NULL; + res = generator->generateKeyPair(generator, NULL, &keyPair); EXPECT_EQ(res, HCF_SUCCESS); - HcfBlob pubKeyBlob = {.data = nullptr, .len = 0}; - HcfBlob priKeyBlob = {.data = nullptr, .len = 0}; + HcfBlob pubKeyBlob = {.data = NULL, .len = 0}; + HcfBlob priKeyBlob = {.data = NULL, .len = 0}; res = keyPair->pubKey->base.getEncoded((HcfKey *)keyPair->pubKey, &pubKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); res = keyPair->priKey->base.getEncoded((HcfKey *)keyPair->priKey, &priKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); - HcfKeyPair *dupKeyPair = nullptr; - res = generator->convertKey(generator, nullptr, &pubKeyBlob, &priKeyBlob, &dupKeyPair); + HcfKeyPair *dupKeyPair = NULL; + res = generator->convertKey(generator, NULL, &pubKeyBlob, &priKeyBlob, &dupKeyPair); EXPECT_EQ(res, HCF_SUCCESS); HcfPubKey *pubkey = dupKeyPair->pubKey; EXPECT_NE(pubkey->base.getAlgorithm((HcfKey *)pubkey), nullptr); @@ -763,18 +763,18 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest580, TestSize // generateKeyPair incorrect case: user wrong ECC class, ignore in this version HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest600, TestSize.Level0) { - HcfAsyKeyGenerator *eccGenerator = nullptr; + HcfAsyKeyGenerator *eccGenerator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("ECC224", &eccGenerator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(eccGenerator, nullptr); - HcfAsyKeyGenerator *rsaGenerator = nullptr; + HcfAsyKeyGenerator *rsaGenerator = NULL; res = HcfAsyKeyGeneratorCreate("RSA1024", &rsaGenerator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(rsaGenerator, nullptr); - HcfKeyPair *keyPair = nullptr; - res = rsaGenerator->generateKeyPair(eccGenerator, nullptr, &keyPair); + HcfKeyPair *keyPair = NULL; + res = rsaGenerator->generateKeyPair(eccGenerator, NULL, &keyPair); HcfObjDestroy(keyPair); HcfObjDestroy(eccGenerator); @@ -784,13 +784,13 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest600, TestSize // generateKeyPair incorrect case: generator class is null HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest610, TestSize.Level0) { - HcfAsyKeyGenerator *rsaGenerator = nullptr; + HcfAsyKeyGenerator *rsaGenerator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024", &rsaGenerator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(rsaGenerator, nullptr); - HcfKeyPair *keyPair = nullptr; - res = rsaGenerator->generateKeyPair(nullptr, nullptr, &keyPair); + HcfKeyPair *keyPair = NULL; + res = rsaGenerator->generateKeyPair(NULL, NULL, &keyPair); EXPECT_NE(res, HCF_SUCCESS); EXPECT_EQ(keyPair, nullptr); @@ -800,12 +800,12 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest610, TestSize // generateKeyPair incorrect case: keypair is null HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest620, TestSize.Level0) { - HcfAsyKeyGenerator *rsaGenerator = nullptr; + HcfAsyKeyGenerator *rsaGenerator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024", &rsaGenerator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(rsaGenerator, nullptr); - res = rsaGenerator->generateKeyPair(rsaGenerator, nullptr, nullptr); + res = rsaGenerator->generateKeyPair(rsaGenerator, NULL, NULL); EXPECT_NE(res, HCF_SUCCESS); HcfObjDestroy(rsaGenerator); @@ -814,23 +814,23 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest620, TestSize // convertKey correct case HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest700, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA2048", &generator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(generator, nullptr); - HcfKeyPair *keyPair = nullptr; - res = generator->generateKeyPair(generator, nullptr, &keyPair); + HcfKeyPair *keyPair = NULL; + res = generator->generateKeyPair(generator, NULL, &keyPair); EXPECT_EQ(res, HCF_SUCCESS); - HcfBlob pubKeyBlob = {.data = nullptr, .len = 0}; - HcfBlob priKeyBlob = {.data = nullptr, .len = 0}; + HcfBlob pubKeyBlob = {.data = NULL, .len = 0}; + HcfBlob priKeyBlob = {.data = NULL, .len = 0}; res = keyPair->pubKey->base.getEncoded((HcfKey *)keyPair->pubKey, &pubKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); res = keyPair->priKey->base.getEncoded((HcfKey *)keyPair->priKey, &priKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); - HcfKeyPair *dupKeyPair = nullptr; - res = generator->convertKey(generator, nullptr, &pubKeyBlob, &priKeyBlob, &dupKeyPair); + HcfKeyPair *dupKeyPair = NULL; + res = generator->convertKey(generator, NULL, &pubKeyBlob, &priKeyBlob, &dupKeyPair); EXPECT_EQ(res, HCF_SUCCESS); HcfPubKey *pubkey = dupKeyPair->pubKey; EXPECT_NE(pubkey->base.getAlgorithm((HcfKey *)pubkey), nullptr); @@ -855,18 +855,18 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest700, TestSize // convertKey incorrect case: input ECC class HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest710, TestSize.Level0) { - HcfAsyKeyGenerator *eccGenerator = nullptr; + HcfAsyKeyGenerator *eccGenerator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("ECC224", &eccGenerator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(eccGenerator, nullptr); - HcfAsyKeyGenerator *rsaGenerator = nullptr; + HcfAsyKeyGenerator *rsaGenerator = NULL; res = HcfAsyKeyGeneratorCreate("RSA1024", &rsaGenerator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(rsaGenerator, nullptr); - HcfKeyPair *dupKeyPair = nullptr; - res = rsaGenerator->convertKey(eccGenerator, nullptr, nullptr, nullptr, &dupKeyPair); + HcfKeyPair *dupKeyPair = NULL; + res = rsaGenerator->convertKey(eccGenerator, NULL, NULL, NULL, &dupKeyPair); EXPECT_NE(res, HCF_SUCCESS); EXPECT_EQ(dupKeyPair, nullptr); @@ -878,23 +878,23 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest710, TestSize // convertKey incorrect case: input null generator HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest720, TestSize.Level0) { - HcfAsyKeyGenerator *rsaGenerator = nullptr; + HcfAsyKeyGenerator *rsaGenerator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024", &rsaGenerator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(rsaGenerator, nullptr); - HcfKeyPair *keyPair = nullptr; - res = rsaGenerator->generateKeyPair(rsaGenerator, nullptr, &keyPair); + HcfKeyPair *keyPair = NULL; + res = rsaGenerator->generateKeyPair(rsaGenerator, NULL, &keyPair); EXPECT_EQ(res, HCF_SUCCESS); - HcfBlob pubKeyBlob = {.data = nullptr, .len = 0}; - HcfBlob priKeyBlob = {.data = nullptr, .len = 0}; + HcfBlob pubKeyBlob = {.data = NULL, .len = 0}; + HcfBlob priKeyBlob = {.data = NULL, .len = 0}; res = keyPair->pubKey->base.getEncoded((HcfKey *)keyPair->pubKey, &pubKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); res = keyPair->priKey->base.getEncoded((HcfKey *)keyPair->priKey, &priKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); - HcfKeyPair *dupKeyPair = nullptr; - res = rsaGenerator->convertKey(nullptr, nullptr, &pubKeyBlob, &priKeyBlob, &dupKeyPair); + HcfKeyPair *dupKeyPair = NULL; + res = rsaGenerator->convertKey(NULL, NULL, &pubKeyBlob, &priKeyBlob, &dupKeyPair); EXPECT_NE(res, HCF_SUCCESS); EXPECT_EQ(dupKeyPair, nullptr); @@ -907,23 +907,23 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest720, TestSize // convertKey incorrect case: input null dupkeypair HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest730, TestSize.Level0) { - HcfAsyKeyGenerator *rsaGenerator = nullptr; + HcfAsyKeyGenerator *rsaGenerator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024", &rsaGenerator); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(rsaGenerator, nullptr); - HcfKeyPair *keyPair = nullptr; - res = rsaGenerator->generateKeyPair(rsaGenerator, nullptr, &keyPair); + HcfKeyPair *keyPair = NULL; + res = rsaGenerator->generateKeyPair(rsaGenerator, NULL, &keyPair); EXPECT_EQ(res, HCF_SUCCESS); - HcfBlob pubKeyBlob = {.data = nullptr, .len = 0}; - HcfBlob priKeyBlob = {.data = nullptr, .len = 0}; + HcfBlob pubKeyBlob = {.data = NULL, .len = 0}; + HcfBlob priKeyBlob = {.data = NULL, .len = 0}; res = keyPair->pubKey->base.getEncoded((HcfKey *)keyPair->pubKey, &pubKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); res = keyPair->priKey->base.getEncoded((HcfKey *)keyPair->priKey, &priKeyBlob); EXPECT_EQ(res, HCF_SUCCESS); - HcfKeyPair *dupKeyPair = nullptr; - res = rsaGenerator->convertKey(rsaGenerator, nullptr, &pubKeyBlob, &priKeyBlob, nullptr); + HcfKeyPair *dupKeyPair = NULL; + res = rsaGenerator->convertKey(rsaGenerator, NULL, &pubKeyBlob, &priKeyBlob, NULL); EXPECT_NE(res, HCF_SUCCESS); EXPECT_EQ(dupKeyPair, nullptr); @@ -936,7 +936,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest730, TestSize // Incorrect case: use wrong bits or primes HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest800, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1111", &generator); EXPECT_NE(res, HCF_SUCCESS); EXPECT_EQ(generator, nullptr); @@ -945,7 +945,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest800, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest810, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024|Primessf", &generator); EXPECT_NE(res, HCF_SUCCESS); EXPECT_EQ(generator, nullptr); @@ -955,7 +955,7 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest810, TestSize // 测试异常释放 HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest820, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024|Primessf", &generator); EXPECT_NE(res, HCF_SUCCESS); EXPECT_EQ(generator, nullptr); @@ -965,14 +965,14 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest820, TestSize // prikey clear mem HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest830, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024", &generator); - HcfKeyPair *keyPair = nullptr; - res = generator->generateKeyPair(generator, nullptr, &keyPair); + HcfKeyPair *keyPair = NULL; + res = generator->generateKeyPair(generator, NULL, &keyPair); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(keyPair, nullptr); - keyPair->priKey->clearMem(nullptr); + keyPair->priKey->clearMem(NULL); HcfObjDestroy(generator); HcfObjDestroy(keyPair); @@ -980,10 +980,10 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest830, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest840, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024", &generator); - HcfKeyPair *keyPair = nullptr; - res = generator->generateKeyPair(generator, nullptr, &keyPair); + HcfKeyPair *keyPair = NULL; + res = generator->generateKeyPair(generator, NULL, &keyPair); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(keyPair, nullptr); @@ -995,10 +995,10 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest840, TestSize HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest850, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024", &generator); - HcfKeyPair *keyPair = nullptr; - res = generator->generateKeyPair(generator, nullptr, &keyPair); + HcfKeyPair *keyPair = NULL; + res = generator->generateKeyPair(generator, NULL, &keyPair); EXPECT_EQ(res, HCF_SUCCESS); EXPECT_NE(keyPair, nullptr); @@ -1011,11 +1011,11 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest850, TestSize // correct case: use destroy function inclass(not HcfObjDestroy) HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest900, TestSize.Level0) { - HcfAsyKeyGenerator *generator = nullptr; + HcfAsyKeyGenerator *generator = NULL; HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024|PRIMES_2", &generator); - HcfKeyPair *keyPair = nullptr; - res = generator->generateKeyPair(generator, nullptr, &keyPair); + HcfKeyPair *keyPair = NULL; + res = generator->generateKeyPair(generator, NULL, &keyPair); HcfPubKey *pubkey = keyPair->pubKey; HcfPriKey *prikey = keyPair->priKey; @@ -1023,18 +1023,18 @@ HWTEST_F(CryptoRsaAsyKeyGeneratorTest, CryptoRsaAsyKeyGeneratorTest900, TestSize EXPECT_EQ(pubkey->base.getFormat((HcfKey *)prikey), nullptr); EXPECT_EQ(prikey->base.getFormat((HcfKey *)pubkey), nullptr); - EXPECT_EQ(pubkey->base.getFormat(nullptr), nullptr); - EXPECT_EQ(prikey->base.getFormat(nullptr), nullptr); + EXPECT_EQ(pubkey->base.getFormat(NULL), nullptr); + EXPECT_EQ(prikey->base.getFormat(NULL), nullptr); EXPECT_EQ(pubkey->base.getAlgorithm((HcfKey *)prikey), nullptr); EXPECT_EQ(prikey->base.getAlgorithm((HcfKey *)pubkey), nullptr); - EXPECT_EQ(pubkey->base.getAlgorithm(nullptr), nullptr); - EXPECT_EQ(prikey->base.getAlgorithm(nullptr), nullptr); + EXPECT_EQ(pubkey->base.getAlgorithm(NULL), nullptr); + EXPECT_EQ(prikey->base.getAlgorithm(NULL), nullptr); - prikey->base.base.destroy(nullptr); - pubkey->base.base.destroy(nullptr); - keyPair->base.destroy(nullptr); + prikey->base.base.destroy(NULL); + pubkey->base.base.destroy(NULL); + keyPair->base.destroy(NULL); prikey->base.base.destroy((HcfObjectBase *)pubkey); pubkey->base.base.destroy((HcfObjectBase *)prikey); -- Gitee