Blame SOURCES/libsodium-1.0.18/test/default/misuse.c

ca16be
ca16be
#define TEST_NAME "misuse"
ca16be
#include "cmptest.h"
ca16be
ca16be
#ifdef HAVE_CATCHABLE_ABRT
ca16be
# include <signal.h>
ca16be
ca16be
static void
ca16be
sigabrt_handler_15(int sig)
ca16be
{
ca16be
    (void) sig;
ca16be
    exit(0);
ca16be
}
ca16be
ca16be
# ifndef SODIUM_LIBRARY_MINIMAL
ca16be
static void
ca16be
sigabrt_handler_14(int sig)
ca16be
{
ca16be
    (void) sig;
ca16be
    signal(SIGABRT, sigabrt_handler_15);
ca16be
    assert(crypto_box_curve25519xchacha20poly1305_easy
ca16be
           (guard_page, guard_page, crypto_stream_xchacha20_MESSAGEBYTES_MAX - 1,
ca16be
            guard_page, guard_page, guard_page) == -1);
ca16be
    exit(1);
ca16be
}
ca16be
ca16be
static void
ca16be
sigabrt_handler_13(int sig)
ca16be
{
ca16be
    (void) sig;
ca16be
    signal(SIGABRT, sigabrt_handler_14);
ca16be
    assert(crypto_box_curve25519xchacha20poly1305_easy_afternm
ca16be
           (guard_page, guard_page, crypto_stream_xchacha20_MESSAGEBYTES_MAX - 1,
ca16be
            guard_page, guard_page) == -1);
ca16be
    exit(1);
ca16be
}
ca16be
# endif
ca16be
ca16be
static void
ca16be
sigabrt_handler_12(int sig)
ca16be
{
ca16be
    (void) sig;
ca16be
# ifdef SODIUM_LIBRARY_MINIMAL
ca16be
    signal(SIGABRT, sigabrt_handler_15);
ca16be
# else
ca16be
    signal(SIGABRT, sigabrt_handler_13);
ca16be
# endif
ca16be
    assert(crypto_pwhash_str_alg((char *) guard_page,
ca16be
                                 "", 0U, 1U, 1U, -1) == -1);
ca16be
    exit(1);
ca16be
}
ca16be
ca16be
static void
ca16be
sigabrt_handler_11(int sig)
ca16be
{
ca16be
    (void) sig;
ca16be
    signal(SIGABRT, sigabrt_handler_12);
ca16be
    assert(crypto_box_easy(guard_page, guard_page,
ca16be
                           crypto_stream_xsalsa20_MESSAGEBYTES_MAX,
ca16be
                           guard_page, guard_page, guard_page) == -1);
ca16be
    exit(1);
ca16be
}
ca16be
ca16be
static void
ca16be
sigabrt_handler_10(int sig)
ca16be
{
ca16be
    (void) sig;
ca16be
    signal(SIGABRT, sigabrt_handler_11);
ca16be
    assert(crypto_box_easy_afternm(guard_page, guard_page,
ca16be
                                   crypto_stream_xsalsa20_MESSAGEBYTES_MAX,
ca16be
                                   guard_page, guard_page) == -1);
ca16be
    exit(1);
ca16be
}
ca16be
ca16be
static void
ca16be
sigabrt_handler_9(int sig)
ca16be
{
ca16be
    (void) sig;
ca16be
    signal(SIGABRT, sigabrt_handler_10);
ca16be
    assert(sodium_base642bin(guard_page, 1, (const char *) guard_page, 1,
ca16be
                             NULL, NULL, NULL, -1) == -1);
ca16be
    exit(1);
ca16be
}
ca16be
ca16be
static void
ca16be
sigabrt_handler_8(int sig)
ca16be
{
ca16be
    (void) sig;
ca16be
    signal(SIGABRT, sigabrt_handler_9);
ca16be
    assert(sodium_bin2base64((char *) guard_page, 1, guard_page, 1,
ca16be
                             sodium_base64_VARIANT_ORIGINAL) == NULL);
ca16be
    exit(1);
ca16be
}
ca16be
ca16be
static void
ca16be
sigabrt_handler_7(int sig)
ca16be
{
ca16be
    (void) sig;
ca16be
    signal(SIGABRT, sigabrt_handler_8);
ca16be
    assert(sodium_bin2base64((char *) guard_page, 1,
ca16be
                             guard_page, 1, -1) == NULL);
ca16be
    exit(1);
ca16be
}
ca16be
ca16be
static void
ca16be
sigabrt_handler_6(int sig)
ca16be
{
ca16be
    (void) sig;
ca16be
    signal(SIGABRT, sigabrt_handler_7);
ca16be
    assert(sodium_pad(NULL, guard_page, SIZE_MAX, 16, 1) == -1);
ca16be
    exit(1);
ca16be
}
ca16be
ca16be
static void
ca16be
sigabrt_handler_5(int sig)
ca16be
{
ca16be
    (void) sig;
ca16be
    signal(SIGABRT, sigabrt_handler_6);
ca16be
    assert(crypto_aead_xchacha20poly1305_ietf_encrypt(guard_page, NULL, NULL, UINT64_MAX,
ca16be
                                                      NULL, 0, NULL,
ca16be
                                                      guard_page, guard_page) == -1);
ca16be
    exit(1);
ca16be
}
ca16be
ca16be
static void
ca16be
sigabrt_handler_4(int sig)
ca16be
{
ca16be
    (void) sig;
ca16be
    signal(SIGABRT, sigabrt_handler_5);
ca16be
    assert(crypto_aead_chacha20poly1305_ietf_encrypt(guard_page, NULL, NULL, UINT64_MAX,
ca16be
                                                     NULL, 0, NULL,
ca16be
                                                     guard_page, guard_page) == -1);
ca16be
    exit(1);
ca16be
}
ca16be
ca16be
static void
ca16be
sigabrt_handler_3(int sig)
ca16be
{
ca16be
    (void) sig;
ca16be
    signal(SIGABRT, sigabrt_handler_4);
ca16be
    assert(crypto_aead_chacha20poly1305_encrypt(guard_page, NULL, NULL, UINT64_MAX,
ca16be
                                                NULL, 0, NULL,
ca16be
                                                guard_page, guard_page) == -1);
ca16be
    exit(1);
ca16be
}
ca16be
ca16be
static void
ca16be
sigabrt_handler_2(int sig)
ca16be
{
ca16be
    (void) sig;
ca16be
    signal(SIGABRT, sigabrt_handler_3);
ca16be
#if SIZE_MAX > 0x4000000000ULL
ca16be
    randombytes_buf_deterministic(guard_page, 0x4000000001ULL, guard_page);
ca16be
#else
ca16be
    abort();
ca16be
#endif
ca16be
    exit(1);
ca16be
}
ca16be
ca16be
static void
ca16be
sigabrt_handler_1(int sig)
ca16be
{
ca16be
    (void) sig;
ca16be
    signal(SIGABRT, sigabrt_handler_2);
ca16be
    assert(crypto_kx_server_session_keys(NULL, NULL, guard_page, guard_page,
ca16be
                                         guard_page) == -1);
ca16be
    exit(1);
ca16be
}
ca16be
ca16be
int
ca16be
main(void)
ca16be
{
ca16be
    signal(SIGABRT, sigabrt_handler_1);
ca16be
    assert(crypto_kx_client_session_keys(NULL, NULL, guard_page, guard_page,
ca16be
                                         guard_page) == -1);
ca16be
    return 1;
ca16be
}
ca16be
#else
ca16be
int
ca16be
main(void)
ca16be
{
ca16be
    return 0;
ca16be
}
ca16be
#endif