diff --git a/test/unittest/src/aes_cipher/crypto_aes_cbc_cipher_test.cpp b/test/unittest/src/aes_cipher/crypto_aes_cbc_cipher_test.cpp index ee082bde9675df53c4354a03626d4f2eb8df2b97..c081dcb27221f23904bdab2249dfb294313b4201 100644 --- a/test/unittest/src/aes_cipher/crypto_aes_cbc_cipher_test.cpp +++ b/test/unittest/src/aes_cipher/crypto_aes_cbc_cipher_test.cpp @@ -57,40 +57,20 @@ HWTEST_F(CryptoAesCbcCipherTest, CryptoAesCbcCipherTest001, TestSize.Level0) ivSpec.iv.len = 16; ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CBC|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_NE(ret, 0); - ret = AesDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } - -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesCbcCipherTest, CryptoAesCbcCipherTest002, TestSize.Level0) @@ -108,40 +88,23 @@ HWTEST_F(CryptoAesCbcCipherTest, CryptoAesCbcCipherTest002, TestSize.Level0) ivSpec.iv.len = 16; ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CBC|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCbcCipherTest, CryptoAesCbcCipherTest003, TestSize.Level0) @@ -159,40 +122,23 @@ HWTEST_F(CryptoAesCbcCipherTest, CryptoAesCbcCipherTest003, TestSize.Level0) ivSpec.iv.len = 16; ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CBC|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCbcCipherTest, CryptoAesCbcCipherTest004, TestSize.Level0) @@ -210,40 +156,20 @@ HWTEST_F(CryptoAesCbcCipherTest, CryptoAesCbcCipherTest004, TestSize.Level0) ivSpec.iv.len = 16; ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CBC|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_NE(ret, 0); - ret = AesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } - -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesCbcCipherTest, CryptoAesCbcCipherTest005, TestSize.Level0) @@ -261,40 +187,23 @@ HWTEST_F(CryptoAesCbcCipherTest, CryptoAesCbcCipherTest005, TestSize.Level0) ivSpec.iv.len = 16; ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CBC|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCbcCipherTest, CryptoAesCbcCipherTest006, TestSize.Level0) @@ -312,40 +221,23 @@ HWTEST_F(CryptoAesCbcCipherTest, CryptoAesCbcCipherTest006, TestSize.Level0) ivSpec.iv.len = 16; ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CBC|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCbcCipherTest, CryptoAesCbcCipherTest007, TestSize.Level0) @@ -360,44 +252,25 @@ HWTEST_F(CryptoAesCbcCipherTest, CryptoAesCbcCipherTest007, TestSize.Level0) HcfSymKey *key = nullptr; ret = GeneratorFile("/data/test_aes.txt", 10 * FILE_BLOCK_SIZE); - if (ret != 0) { - LOGE("GeneratorFile failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = ConvertSymKey("AES128", &key); - if (ret != 0) { - LOGE("ConvertSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CBC|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesMultiBlockEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesMultiBlockDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); + ret = CompareFileContent(); - if (ret != 0) { - LOGE("CompareFileContent failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCbcCipherTest, CryptoAesCbcCipherTest008, TestSize.Level0) @@ -414,32 +287,19 @@ HWTEST_F(CryptoAesCbcCipherTest, CryptoAesCbcCipherTest008, TestSize.Level0) ivSpec.iv.len = AES_IV_LEN; ret = GenerateSymKey("AES192", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES192|CBC|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, &(ivSpec.base), cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, &(ivSpec.base), cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCbcCipherTest, CryptoAesCbcCipherTest009, TestSize.Level0) @@ -456,31 +316,18 @@ HWTEST_F(CryptoAesCbcCipherTest, CryptoAesCbcCipherTest009, TestSize.Level0) ivSpec.iv.len = AES_IV_LEN; ret = GenerateSymKey("AES256", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES256|CBC|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, &(ivSpec.base), cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, &(ivSpec.base), cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } } \ No newline at end of file diff --git a/test/unittest/src/aes_cipher/crypto_aes_ccm_cipher_test.cpp b/test/unittest/src/aes_cipher/crypto_aes_ccm_cipher_test.cpp index 4a91822e0ef3f66de3f69fba2347dad52a8c1fef..846206b8a43e5995d6375eed97f0a4918949b2f7 100644 --- a/test/unittest/src/aes_cipher/crypto_aes_ccm_cipher_test.cpp +++ b/test/unittest/src/aes_cipher/crypto_aes_ccm_cipher_test.cpp @@ -62,37 +62,23 @@ HWTEST_F(CryptoAesCcmCipherTest, CryptoAesCcmCipherTest001, TestSize.Level0) spec.iv.len = sizeof(iv); ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CCM|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); (void)memcpy_s(spec.tag.data, 12, cipherText + cipherTextLen - 12, 12); PrintfHex("ccm tag", spec.tag.data, spec.tag.len); cipherTextLen -= 12; ret = AesDecrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCcmCipherTest, CryptoAesCcmCipherTest002, TestSize.Level0) @@ -115,37 +101,23 @@ HWTEST_F(CryptoAesCcmCipherTest, CryptoAesCcmCipherTest002, TestSize.Level0) spec.iv.len = sizeof(iv); ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CCM|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); (void)memcpy_s(spec.tag.data, 12, cipherText + cipherTextLen - 12, 12); PrintfHex("ccm tag", spec.tag.data, spec.tag.len); cipherTextLen -= 12; ret = AesDecrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCcmCipherTest, CryptoAesCcmCipherTest003, TestSize.Level0) @@ -168,37 +140,23 @@ HWTEST_F(CryptoAesCcmCipherTest, CryptoAesCcmCipherTest003, TestSize.Level0) spec.iv.len = sizeof(iv); ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CCM|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); (void)memcpy_s(spec.tag.data, 12, cipherText + cipherTextLen - 12, 12); PrintfHex("ccm tag", spec.tag.data, spec.tag.len); cipherTextLen -= 12; ret = AesDecrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCcmCipherTest, CryptoAesCcmCipherTest004, TestSize.Level0) @@ -221,37 +179,23 @@ HWTEST_F(CryptoAesCcmCipherTest, CryptoAesCcmCipherTest004, TestSize.Level0) spec.iv.len = sizeof(iv); ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CCM|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); (void)memcpy_s(spec.tag.data, 12, cipherText + cipherTextLen - 12, 12); PrintfHex("ccm tag", spec.tag.data, spec.tag.len); cipherTextLen -= 12; ret = AesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCcmCipherTest, CryptoAesCcmCipherTest005, TestSize.Level0) @@ -274,40 +218,25 @@ HWTEST_F(CryptoAesCcmCipherTest, CryptoAesCcmCipherTest005, TestSize.Level0) spec.iv.len = sizeof(iv); ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CCM|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); (void)memcpy_s(spec.tag.data, 12, cipherText + cipherTextLen - 12, 12); PrintfHex("ccm tag", spec.tag.data, spec.tag.len); cipherTextLen -= 12; ret = AesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } - HWTEST_F(CryptoAesCcmCipherTest, CryptoAesCcmCipherTest006, TestSize.Level0) { int ret = 0; @@ -328,37 +257,23 @@ HWTEST_F(CryptoAesCcmCipherTest, CryptoAesCcmCipherTest006, TestSize.Level0) spec.iv.len = sizeof(iv); ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CCM|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); (void)memcpy_s(spec.tag.data, 12, cipherText + cipherTextLen - 12, 12); PrintfHex("ccm tag", spec.tag.data, spec.tag.len); cipherTextLen -= 12; ret = AesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCcmCipherTest, CryptoAesCcmCipherTest007, TestSize.Level0) @@ -381,36 +296,23 @@ HWTEST_F(CryptoAesCcmCipherTest, CryptoAesCcmCipherTest007, TestSize.Level0) spec.iv.len = sizeof(iv); ret = GenerateSymKey("AES192", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES192|CCM|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, &(spec.base), cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); (void)memcpy_s(spec.tag.data, CCM_TAG_LEN, cipherText + cipherTextLen - CCM_TAG_LEN, CCM_TAG_LEN); PrintfHex("ccm tag", spec.tag.data, spec.tag.len); cipherTextLen -= CCM_TAG_LEN; ret = AesDecrypt(cipher, key, &(spec.base), cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed!"); - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCcmCipherTest, CryptoAesCcmCipherTest008, TestSize.Level0) @@ -433,68 +335,45 @@ HWTEST_F(CryptoAesCcmCipherTest, CryptoAesCcmCipherTest008, TestSize.Level0) spec.iv.len = sizeof(iv); ret = GenerateSymKey("AES256", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES256|CCM|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, &(spec.base), cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); (void)memcpy_s(spec.tag.data, CCM_TAG_LEN, cipherText + cipherTextLen - CCM_TAG_LEN, CCM_TAG_LEN); PrintfHex("ccm tag", spec.tag.data, spec.tag.len); cipherTextLen -= CCM_TAG_LEN; ret = AesDecrypt(cipher, key, &(spec.base), cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed!"); - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCcmCipherTest, CryptoAesCcmCipherTest009, TestSize.Level0) { int ret = 0; - uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; + uint8_t cipherText[CIPHER_TEXT_LEN] = {0}; int cipherTextLen = CIPHER_TEXT_LEN; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CCM|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed!"); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesCcmCipherTest, CryptoAesCcmCipherTest010, TestSize.Level0) @@ -517,26 +396,16 @@ HWTEST_F(CryptoAesCcmCipherTest, CryptoAesCcmCipherTest010, TestSize.Level0) spec.iv.len = sizeof(iv); ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CCM|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, &(spec.base), cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed!"); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesCcmCipherTest, CryptoAesCcmCipherTest011, TestSize.Level0) @@ -559,26 +428,16 @@ HWTEST_F(CryptoAesCcmCipherTest, CryptoAesCcmCipherTest011, TestSize.Level0) spec.iv.len = sizeof(iv); ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CCM|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, &(spec.base), cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed!"); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesCcmCipherTest, CryptoAesCcmCipherTest012, TestSize.Level0) @@ -601,26 +460,16 @@ HWTEST_F(CryptoAesCcmCipherTest, CryptoAesCcmCipherTest012, TestSize.Level0) spec.iv.len = sizeof(iv); ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CCM|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, &(spec.base), cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed!"); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesCcmCipherTest, CryptoAesCcmCipherTest013, TestSize.Level0) @@ -631,24 +480,19 @@ HWTEST_F(CryptoAesCcmCipherTest, CryptoAesCcmCipherTest013, TestSize.Level0) HcfSymKeyGenerator *generator = nullptr; ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto CLEAR_UP; - } - EXPECT_EQ(ret, HCF_SUCCESS); + ASSERT_EQ(ret, 0); + ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); + generator->base.destroy(nullptr); ret = HcfCipherCreate("AES128|CCM|NoPadding", &cipher); - EXPECT_EQ(ret, HCF_SUCCESS); + ASSERT_EQ(ret, 0); + ret = cipher->init(cipher, ENCRYPT_MODE, reinterpret_cast(key), nullptr); - EXPECT_NE(ret, HCF_SUCCESS); - goto CLEAR_UP; -CLEAR_UP: + ASSERT_NE(ret, 0); + HcfObjDestroy(key); HcfObjDestroy(cipher); HcfObjDestroy(generator); diff --git a/test/unittest/src/aes_cipher/crypto_aes_cfb_cipher_test.cpp b/test/unittest/src/aes_cipher/crypto_aes_cfb_cipher_test.cpp index e050c7a62e9c2a495c847151d724ad451a466da4..6c5ff8f6b3d2df0986e6378e3197c26377560af5 100644 --- a/test/unittest/src/aes_cipher/crypto_aes_cfb_cipher_test.cpp +++ b/test/unittest/src/aes_cipher/crypto_aes_cfb_cipher_test.cpp @@ -44,7 +44,6 @@ public: HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest001, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -56,46 +55,28 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest001, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CFB|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest002, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -107,46 +88,28 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest002, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CFB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest003, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -158,47 +121,28 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest003, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CFB|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } - HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest004, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -210,46 +154,28 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest004, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CFB1|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest005, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -261,46 +187,28 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest005, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CFB1|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest006, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -312,45 +220,28 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest006, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - } + ASSERT_EQ(ret, 0); - ret = HcfCipherCreate("AES128|CFB1|PKCS7", &cipher); // CFB1/CFB8/CFB128 bit - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ret = HcfCipherCreate("AES128|CFB1|PKCS7", &cipher); + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest007, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -362,45 +253,28 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest007, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - } + ASSERT_EQ(ret, 0); - ret = HcfCipherCreate("AES128|CFB8|NoPadding", &cipher); // CFB1/CFB8/CFB128 bit - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ret = HcfCipherCreate("AES128|CFB8|NoPadding", &cipher); + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest008, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -412,45 +286,28 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest008, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - } + ASSERT_EQ(ret, 0); - ret = HcfCipherCreate("AES128|CFB8|PKCS5", &cipher); // CFB1/CFB8/CFB128 bit - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ret = HcfCipherCreate("AES128|CFB8|PKCS5", &cipher); + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest009, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -462,45 +319,28 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest009, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - } + ASSERT_EQ(ret, 0); - ret = HcfCipherCreate("AES128|CFB8|PKCS7", &cipher); // CFB1/CFB8/CFB128 bit - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ret = HcfCipherCreate("AES128|CFB8|PKCS7", &cipher); + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest010, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -512,45 +352,28 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest010, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - } + ASSERT_EQ(ret, 0); - ret = HcfCipherCreate("AES128|CFB128|NoPadding", &cipher); // CFB1/CFB8/CFB128 bit - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ret = HcfCipherCreate("AES128|CFB128|NoPadding", &cipher); + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest011, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -562,45 +385,28 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest011, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - } + ASSERT_EQ(ret, 0); - ret = HcfCipherCreate("AES128|CFB128|PKCS5", &cipher); // CFB1/CFB8/CFB128 bit - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ret = HcfCipherCreate("AES128|CFB128|PKCS5", &cipher); + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest012, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -612,45 +418,28 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest012, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - } + ASSERT_EQ(ret, 0); - ret = HcfCipherCreate("AES128|CFB128|PKCS7", &cipher); // CFB1/CFB8/CFB128 bit - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ret = HcfCipherCreate("AES128|CFB128|PKCS7", &cipher); + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest013, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -662,46 +451,28 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest013, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CFB|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest014, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -713,46 +484,28 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest014, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CFB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest015, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -764,47 +517,28 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest015, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CFB|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } - HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest016, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -816,46 +550,28 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest016, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CFB1|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest017, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -867,46 +583,28 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest017, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CFB1|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest018, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -918,45 +616,28 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest018, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - } + ASSERT_EQ(ret, 0); - ret = HcfCipherCreate("AES128|CFB1|PKCS7", &cipher); // CFB1/CFB8/CFB128 bit - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ret = HcfCipherCreate("AES128|CFB1|PKCS7", &cipher); + ASSERT_EQ(ret, 0); ret = AesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest019, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -968,45 +649,28 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest019, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - } + ASSERT_EQ(ret, 0); - ret = HcfCipherCreate("AES128|CFB8|NoPadding", &cipher); // CFB1/CFB8/CFB128 bit - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ret = HcfCipherCreate("AES128|CFB8|NoPadding", &cipher); + ASSERT_EQ(ret, 0); ret = AesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest020, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -1018,45 +682,28 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest020, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - } + ASSERT_EQ(ret, 0); - ret = HcfCipherCreate("AES128|CFB8|PKCS5", &cipher); // CFB1/CFB8/CFB128 bit - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ret = HcfCipherCreate("AES128|CFB8|PKCS5", &cipher); + ASSERT_EQ(ret, 0); ret = AesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest021, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -1068,44 +715,28 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest021, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - } - - ret = HcfCipherCreate("AES128|CFB8|PKCS7", &cipher); // CFB1/CFB8/CFB128 bit - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); + + ret = HcfCipherCreate("AES128|CFB8|PKCS7", &cipher); + ASSERT_EQ(ret, 0); + ret = AesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest022, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -1117,44 +748,28 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest022, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - } - - ret = HcfCipherCreate("AES128|CFB128|NoPadding", &cipher); // CFB1/CFB8/CFB128 bit - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); + + ret = HcfCipherCreate("AES128|CFB128|NoPadding", &cipher); + ASSERT_EQ(ret, 0); + ret = AesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest023, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -1166,44 +781,28 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest023, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - } - - ret = HcfCipherCreate("AES128|CFB128|PKCS5", &cipher); // CFB1/CFB8/CFB128 bit - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); + + ret = HcfCipherCreate("AES128|CFB128|PKCS5", &cipher); + ASSERT_EQ(ret, 0); + ret = AesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest024, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -1215,39 +814,23 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest024, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CFB128|PKCS7", &cipher); // CFB1/CFB8/CFB128 bit - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest025, TestSize.Level0) @@ -1262,48 +845,29 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest025, TestSize.Level0) ivSpec.iv.len = 16; ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CFB|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); + ret = GeneratorFile("/data/test_aes.txt", 10 * FILE_BLOCK_SIZE); - if (ret != 0) { - LOGE("GeneratorFile failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesMultiBlockEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesMultiBlockDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); + ret = CompareFileContent(); - if (ret != 0) { - LOGE("CompareFileContent failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest026, TestSize.Level0) { - int ret = 0; uint8_t iv[AES_IV_LEN] = { 0 }; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; @@ -1314,38 +878,24 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest026, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = AES_IV_LEN; - ret = GenerateSymKey("AES192", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES192", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES192|CFB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, &(ivSpec.base), cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, &(ivSpec.base), cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest027, TestSize.Level0) { - int ret = 0; uint8_t iv[AES_IV_LEN] = { 0 }; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; @@ -1356,38 +906,24 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest027, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = AES_IV_LEN; - ret = GenerateSymKey("AES256", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES256", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES256|CFB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, &(ivSpec.base), cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, &(ivSpec.base), cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest028, TestSize.Level0) { - int ret = 0; uint8_t iv[AES_IV_LEN] = { 0 }; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; @@ -1398,39 +934,24 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest028, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = AES_IV_LEN; - ret = GenerateSymKey("AES192", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES192", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES192|CFB1|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, &(ivSpec.base), cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, &(ivSpec.base), cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } - HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest029, TestSize.Level0) { - int ret = 0; uint8_t iv[AES_IV_LEN] = { 0 }; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; @@ -1441,38 +962,24 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest029, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = AES_IV_LEN; - ret = GenerateSymKey("AES256", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES256", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES256|CFB1|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, &(ivSpec.base), cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, &(ivSpec.base), cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest030, TestSize.Level0) { - int ret = 0; uint8_t iv[AES_IV_LEN] = { 0 }; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; @@ -1483,38 +990,24 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest030, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = AES_IV_LEN; - ret = GenerateSymKey("AES192", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES192", &key); + ASSERT_EQ(ret, 0); - ret = HcfCipherCreate("AES192|CFB8|PKCS5", &cipher); // CFB1/CFB8/CFB128 bit - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ret = HcfCipherCreate("AES192|CFB8|PKCS5", &cipher); + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, &(ivSpec.base), cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, &(ivSpec.base), cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest031, TestSize.Level0) { - int ret = 0; uint8_t iv[AES_IV_LEN] = { 0 }; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; @@ -1525,38 +1018,24 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest031, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = AES_IV_LEN; - ret = GenerateSymKey("AES256", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES256", &key); + ASSERT_EQ(ret, 0); - ret = HcfCipherCreate("AES256|CFB8|PKCS5", &cipher); // CFB1/CFB8/CFB128 bit - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ret = HcfCipherCreate("AES256|CFB8|PKCS5", &cipher); + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, &(ivSpec.base), cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, &(ivSpec.base), cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest032, TestSize.Level0) { - int ret = 0; uint8_t iv[AES_IV_LEN] = { 0 }; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; @@ -1567,33 +1046,20 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest032, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = AES_IV_LEN; - ret = GenerateSymKey("AES192", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES192", &key); + ASSERT_EQ(ret, 0); - ret = HcfCipherCreate("AES192|CFB128|PKCS5", &cipher); // CFB1/CFB8/CFB128 bit - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ret = HcfCipherCreate("AES192|CFB128|PKCS5", &cipher); + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, &(ivSpec.base), cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, &(ivSpec.base), cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest033, TestSize.Level0) @@ -1610,32 +1076,19 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest033, TestSize.Level0) ivSpec.iv.len = AES_IV_LEN; ret = GenerateSymKey("AES256", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); - ret = HcfCipherCreate("AES256|CFB128|PKCS5", &cipher); // CFB1/CFB8/CFB128 bit - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ret = HcfCipherCreate("AES256|CFB128|PKCS5", &cipher); + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, &(ivSpec.base), cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, &(ivSpec.base), cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest034, TestSize.Level0) @@ -1644,26 +1097,17 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest034, TestSize.Level0) HcfCipher *cipher = nullptr; const char *cipherName = "AES128|CFB|NoPadding"; const char *retAlgo = nullptr; + ret = HcfCipherCreate(cipherName, &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); retAlgo = cipher->getAlgorithm(cipher); - if (retAlgo == nullptr) { - LOGE("cipher getAlgorithm failed!"); - ret = HCF_ERR_CRYPTO_OPERATION; - goto CLEAR_UP; - } + ASSERT_NE(retAlgo, nullptr); ret = strcmp(retAlgo, cipherName); - if (ret != 0) { - LOGE("cipher getAlgorithm failed!"); - } -CLEAR_UP: + ASSERT_EQ(ret, 0); + HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest035, TestSize.Level0) @@ -1672,21 +1116,14 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest035, TestSize.Level0) HcfCipher *cipher = nullptr; const char *cipherName = "AES128|CFB|NoPadding"; const char *retAlgo = nullptr; + ret = HcfCipherCreate(cipherName, &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); retAlgo = cipher->getAlgorithm(nullptr); - if (retAlgo == nullptr) { - LOGE("cipher getAlgorithm failed!"); - ret = HCF_ERR_CRYPTO_OPERATION; - } + ASSERT_EQ(retAlgo, nullptr); -CLEAR_UP: HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest036, TestSize.Level0) @@ -1698,27 +1135,16 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest036, TestSize.Level0) const char *retAlgo = nullptr; ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate(cipherName, &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); retAlgo = cipher->getAlgorithm(reinterpret_cast(generator)); - if (retAlgo == nullptr) { - LOGE("cipher getAlgorithm failed!"); - ret = HCF_ERR_CRYPTO_OPERATION; - } + ASSERT_EQ(retAlgo, nullptr); -CLEAR_UP: HcfObjDestroy(generator); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest037, TestSize.Level0) @@ -1730,31 +1156,18 @@ HWTEST_F(CryptoAesCfbCipherTest, CryptoAesCfbCipherTest037, TestSize.Level0) HcfCipher *cipher = nullptr; ret = GenerateSymKey("AES256", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES256|CFB128|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_NE(ret, 0); ret = AesDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } } \ No newline at end of file diff --git a/test/unittest/src/aes_cipher/crypto_aes_cipher_test.cpp b/test/unittest/src/aes_cipher/crypto_aes_cipher_test.cpp index 33c01d7f722f23863ebf01ad8666776c516f0dfa..7ddba3a8bf60cc63774459a727af97beaec4a03b 100644 --- a/test/unittest/src/aes_cipher/crypto_aes_cipher_test.cpp +++ b/test/unittest/src/aes_cipher/crypto_aes_cipher_test.cpp @@ -44,274 +44,162 @@ public: HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest001, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; HcfSymKey *key = nullptr; const char *inputAlgoName = "AES128"; const char *generatorAlgoName = nullptr; - ret = HcfSymKeyGeneratorCreate(inputAlgoName, &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate(inputAlgoName, &generator); + ASSERT_EQ(ret, 0); + ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); - // generator getAlgoName generatorAlgoName = generator->getAlgoName(generator); - if (generatorAlgoName == nullptr) { - LOGE("generator getAlgoName returns nullptr."); - ret = HCF_ERR_CRYPTO_OPERATION; - goto CLEAR_UP; - } + ASSERT_NE(generatorAlgoName, nullptr); + ASSERT_EQ(strcmp(generatorAlgoName, inputAlgoName), 0); - ret = strcmp(generatorAlgoName, inputAlgoName); - if (ret != 0) { - LOGE("generator getAlgoName failed!"); - } -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest002, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; const char *generatorAlgoName = nullptr; const char *inputAlgoName = "AES128"; - ret = HcfSymKeyGeneratorCreate(inputAlgoName, &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate(inputAlgoName, &generator); + ASSERT_EQ(ret, 0); - // generator getAlgoName generatorAlgoName = generator->getAlgoName(nullptr); - if (generatorAlgoName == nullptr) { - LOGE("generator getAlgoName failed!"); - ret = HCF_ERR_CRYPTO_OPERATION; - } + ASSERT_EQ(generatorAlgoName, nullptr); -CLEAR_UP: HcfObjDestroy(generator); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest003, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; HcfSymKey *key = nullptr; const char *generatorAlgoName = nullptr; const char *inputAlgoName = "AES128"; - ret = HcfSymKeyGeneratorCreate(inputAlgoName, &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate(inputAlgoName, &generator); + ASSERT_EQ(ret, 0); + ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); - // generator getAlgoName generatorAlgoName = generator->getAlgoName(reinterpret_cast(key)); - if (generatorAlgoName == nullptr) { - LOGE("generator getAlgoName failed!"); - ret = HCF_ERR_CRYPTO_OPERATION; - } + ASSERT_EQ(generatorAlgoName, nullptr); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(generator); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest004, TestSize.Level0) { - int ret = 0; HcfSymKey *key = nullptr; const char *inputAlgoName = "AES128"; const char *keyAlgoName = nullptr; - ret = GenerateSymKey(inputAlgoName, &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey(inputAlgoName, &key); + ASSERT_EQ(ret, 0); - // key getAlgorithm keyAlgoName = key->key.getAlgorithm(&(key->key)); - if (keyAlgoName == nullptr) { - LOGE("key getAlgorithm returns nullptr."); - ret = HCF_ERR_CRYPTO_OPERATION; - goto CLEAR_UP; - } + ASSERT_NE(keyAlgoName, nullptr); + ASSERT_EQ(strcmp(keyAlgoName, inputAlgoName), 0); - ret = strcmp(keyAlgoName, inputAlgoName); - if (ret != 0) { - LOGE("key getAlgorithm failed!"); - } -CLEAR_UP: HcfObjDestroy(key); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest005, TestSize.Level0) { - int ret = 0; HcfSymKey *key = nullptr; const char *inputAlgoName = "AES128"; const char *keyAlgoName = nullptr; - ret = GenerateSymKey(inputAlgoName, &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey(inputAlgoName, &key); + ASSERT_EQ(ret, 0); - // key getAlgorithm keyAlgoName = key->key.getAlgorithm(nullptr); - if (keyAlgoName == nullptr) { - LOGE("key getAlgorithm returns nullptr."); - ret = HCF_ERR_CRYPTO_OPERATION; - } + ASSERT_EQ(keyAlgoName, nullptr); -CLEAR_UP: HcfObjDestroy(key); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest006, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; HcfSymKey *key = nullptr; const char *inputAlgoName = "AES128"; const char *keyAlgoName = nullptr; - ret = HcfSymKeyGeneratorCreate(inputAlgoName, &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate(inputAlgoName, &generator); + ASSERT_EQ(ret, 0); + ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); - // key getAlgorithm keyAlgoName = key->key.getAlgorithm(reinterpret_cast(generator)); - if (keyAlgoName == nullptr) { - LOGE("key getAlgorithm returns nullptr."); - ret = HCF_ERR_CRYPTO_OPERATION; - } + ASSERT_EQ(keyAlgoName, nullptr); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(generator); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest007, TestSize.Level0) { - int ret = 0; HcfSymKey *key = nullptr; const char *keyFormat = "PKCS#8"; const char *retFormat = nullptr; - ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES128", &key); + ASSERT_EQ(ret, 0); - // key GetFormat retFormat = key->key.getFormat(&(key->key)); - if (retFormat == nullptr) { - LOGE("key GetFormat returns nullptr."); - ret = HCF_ERR_CRYPTO_OPERATION; - goto CLEAR_UP; - } - - ret = strcmp(retFormat, keyFormat); - if (ret != 0) { - LOGE("key GetFormat failed!"); - } + ASSERT_NE(retFormat, nullptr); + ASSERT_EQ(strcmp(retFormat, keyFormat), 0); -CLEAR_UP: HcfObjDestroy(key); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest008, TestSize.Level0) { - int ret = 0; HcfSymKey *key = nullptr; const char *retFormat = nullptr; - ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES128", &key); + ASSERT_EQ(ret, 0); - // key getFormat retFormat = key->key.getFormat(nullptr); - if (retFormat == nullptr) { - LOGE("key GetFormat returns nullptr."); - ret = HCF_ERR_CRYPTO_OPERATION; - } + ASSERT_EQ(retFormat, nullptr); -CLEAR_UP: HcfObjDestroy(key); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest009, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; HcfSymKey *key = nullptr; const char *retFormat = nullptr; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); + ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); - // key getFormat retFormat = key->key.getFormat(reinterpret_cast(generator)); - if (retFormat == nullptr) { - LOGE("key GetFormat returns nullptr."); - ret = HCF_ERR_CRYPTO_OPERATION; - } + ASSERT_EQ(retFormat, nullptr); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(generator); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest010, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; HcfSymKey *key = nullptr; HcfBlob encodedBlob = { 0 }; @@ -321,44 +209,28 @@ HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest010, TestSize.Level0) }; HcfBlob keyTmpBlob = { .data = keyMaterial, .len = KEY_MATERIAL_LEN }; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); + ret = generator->convertSymKey(generator, &keyTmpBlob, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); - // key getEncoded ret = key->key.getEncoded(&(key->key), &encodedBlob); - if (ret != 0) { - LOGE("key GetEncoded failed."); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); - if (encodedBlob.len != keyTmpBlob.len) { - LOGE("key GetEncoded failed!"); - ret = HCF_ERR_CRYPTO_OPERATION; - goto CLEAR_UP; - } - ret = memcmp(encodedBlob.data, keyTmpBlob.data, keyTmpBlob.len); + ASSERT_EQ(encodedBlob.len, keyTmpBlob.len); + ASSERT_EQ(memcmp(encodedBlob.data, keyTmpBlob.data, keyTmpBlob.len), 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(generator); if (encodedBlob.data != nullptr) { HcfFree(encodedBlob.data); encodedBlob.data = nullptr; } - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest011, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; HcfSymKey *key = nullptr; HcfBlob encodedBlob = { 0 }; @@ -368,36 +240,25 @@ HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest011, TestSize.Level0) }; HcfBlob keyTmpBlob = { .data = keyMaterial, .len = KEY_MATERIAL_LEN }; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); + ret = generator->convertSymKey(generator, &keyTmpBlob, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); - // key getEncoded ret = key->key.getEncoded(nullptr, &encodedBlob); - if (ret != 0) { - LOGE("key GetEncoded failed."); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(generator); if (encodedBlob.data != nullptr) { HcfFree(encodedBlob.data); encodedBlob.data = nullptr; } - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest012, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; HcfSymKey *key = nullptr; HcfBlob encodedBlob = { 0 }; @@ -407,36 +268,25 @@ HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest012, TestSize.Level0) }; HcfBlob keyTmpBlob = { .data = keyMaterial, .len = KEY_MATERIAL_LEN }; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); + ret = generator->convertSymKey(generator, &keyTmpBlob, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); - // key getEncoded ret = key->key.getEncoded(reinterpret_cast(generator), &encodedBlob); - if (ret != 0) { - LOGE("key GetEncoded failed."); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(generator); if (encodedBlob.data != nullptr) { HcfFree(encodedBlob.data); encodedBlob.data = nullptr; } - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest013, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; HcfSymKey *key = nullptr; HcfBlob encodedBlob = { 0 }; @@ -448,16 +298,12 @@ HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest013, TestSize.Level0) SymKeyImpl *impl = nullptr; size_t tmpLen = 0; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); + ret = generator->convertSymKey(generator, &keyTmpBlob, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); + impl = reinterpret_cast(key); tmpLen = impl->keyMaterial.len; impl->keyMaterial.len = 0; @@ -465,23 +311,18 @@ HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest013, TestSize.Level0) // key getEncoded ret = key->key.getEncoded(&(key->key), &encodedBlob); impl->keyMaterial.len = tmpLen; - if (ret != 0) { - LOGE("key GetEncoded failed."); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(generator); if (encodedBlob.data != nullptr) { HcfFree(encodedBlob.data); encodedBlob.data = nullptr; } - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest014, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; HcfSymKey *key = nullptr; HcfBlob encodedBlob = { 0 }; @@ -491,134 +332,93 @@ HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest014, TestSize.Level0) }; HcfBlob keyTmpBlob = { .data = keyMaterial, .len = KEY_MATERIAL_LEN }; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); + ret = generator->convertSymKey(generator, &keyTmpBlob, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); key->clearMem(nullptr); ret = key->key.getEncoded(&(key->key), &encodedBlob); - if (ret != 0) { - LOGE("key GetEncoded failed."); - goto CLEAR_UP; - } - if ((encodedBlob.data != nullptr) && (encodedBlob.data[0] != '\0')) { - LOGE("clearMem failed!"); - ret = HCF_ERR_CRYPTO_OPERATION; - } + ASSERT_EQ(ret, 0); + ASSERT_FALSE((encodedBlob.data == nullptr) || (encodedBlob.data[0] == '\0')); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(generator); if (encodedBlob.data != nullptr) { HcfFree(encodedBlob.data); encodedBlob.data = nullptr; } - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest015, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; - ret = HcfSymKeyGeneratorCreate("RSA128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed! Should not select RSA for symKey generator."); - } + int ret = HcfSymKeyGeneratorCreate("RSA128", &generator); + ASSERT_NE(ret, 0); HcfObjDestroy(generator); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest016, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; - ret = HcfSymKeyGeneratorCreate("RSA512", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed! Should not select RSA for symKey generator."); - } + int ret = HcfSymKeyGeneratorCreate("RSA512", &generator); + ASSERT_NE(ret, 0); HcfObjDestroy(generator); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest017, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; - ret = HcfSymKeyGeneratorCreate("", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed! Should not select empty string for symKey generator."); - } + int ret = HcfSymKeyGeneratorCreate("", &generator); + ASSERT_NE(ret, 0); HcfObjDestroy(generator); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest018, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; - ret = HcfSymKeyGeneratorCreate(nullptr, &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed! Should not select nullptr for symKey generator."); - } + int ret = HcfSymKeyGeneratorCreate(nullptr, &generator); + ASSERT_NE(ret, 0); HcfObjDestroy(generator); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest019, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; - ret = HcfSymKeyGeneratorSpiCreate(nullptr, nullptr); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorSpiCreate failed!"); - } + int ret = HcfSymKeyGeneratorSpiCreate(nullptr, nullptr); + ASSERT_NE(ret, 0); HcfObjDestroy(generator); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest020, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); + ret = generator->generateSymKey(nullptr, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(generator); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest021, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; HcfSymKey *key = nullptr; uint8_t keyMaterial[] = { @@ -627,26 +427,18 @@ HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest021, TestSize.Level0) }; HcfBlob keyTmpBlob = { .data = keyMaterial, .len = KEY_MATERIAL_LEN }; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->convertSymKey(nullptr, &keyTmpBlob, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(generator); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest022, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; HcfSymKey *key = nullptr; uint8_t keyMaterial[] = { @@ -655,132 +447,83 @@ HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest022, TestSize.Level0) }; HcfBlob keyTmpBlob = { .data = keyMaterial, .len = 0 }; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->convertSymKey(generator, &keyTmpBlob, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(generator); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest023, TestSize.Level0) { - int ret = 0; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES128", &key); + ASSERT_EQ(ret, 0); - // allow input without encryption mode. It will pick the last PKCS5, and use default aes128ecb. ret = HcfCipherCreate("AES128|NoPadding|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } -CLEAR_UP: + ASSERT_EQ(ret, 0); + HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest024, TestSize.Level0) { - int ret = 0; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES128", &key); + ASSERT_EQ(ret, 0); - // allow input without encryption mode. It will use default aes128ecb. ret = HcfCipherCreate("AES128|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } -CLEAR_UP: + ASSERT_EQ(ret, 0); + HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest025, TestSize.Level0) { - int ret = 0; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES128", &key); + ASSERT_EQ(ret, 0); - // allow input without encryption mode. It will use default aes128ecb. ret = HcfCipherCreate("AES128", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } -CLEAR_UP: + ASSERT_EQ(ret, 0); + HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest026, TestSize.Level0) @@ -856,30 +599,22 @@ HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest028, TestSize.Level0) HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest029, TestSize.Level0) { - int ret = 0; HcfSymKeyGeneratorSpi *generator = nullptr; HcfSymKey *key = nullptr; SymKeyAttr attr = { .algo = HCF_ALG_AES, .keySize = AES_KEY_SIZE }; - ret = HcfSymKeyGeneratorSpiCreate(&attr, &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorSpiCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorSpiCreate(&attr, &generator); + ASSERT_EQ(ret, 0); + ret = generator->engineGenerateSymmKey(nullptr, &key); - if (ret != 0) { - LOGE("engineGenerateSymmKey failed!"); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(generator); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest030, TestSize.Level0) { - int ret = 0; HcfSymKeyGeneratorSpi *generator = nullptr; HcfSymKey *key = nullptr; uint8_t keyMaterial[] = { @@ -889,19 +624,13 @@ HWTEST_F(CryptoAesCipherTest, CryptoAesCipherTest030, TestSize.Level0) HcfBlob keyTmpBlob = { .data = keyMaterial, .len = KEY_MATERIAL_LEN }; SymKeyAttr attr = { .algo = HCF_ALG_AES, .keySize = AES_KEY_SIZE }; - ret = HcfSymKeyGeneratorSpiCreate(&attr, &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorSpiCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorSpiCreate(&attr, &generator); + ASSERT_EQ(ret, 0); + ret = generator->engineConvertSymmKey(nullptr, &keyTmpBlob, &key); - if (ret != 0) { - LOGE("engineConvertSymmKey failed!"); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(generator); - EXPECT_NE(ret, 0); } } \ No newline at end of file diff --git a/test/unittest/src/aes_cipher/crypto_aes_ctr_cipher_test.cpp b/test/unittest/src/aes_cipher/crypto_aes_ctr_cipher_test.cpp index b6ac45099381cf56d036af835ca159b1068986b6..50d0cc95f842c7cbb6e4d52a0a08d5cc8a791d7f 100644 --- a/test/unittest/src/aes_cipher/crypto_aes_ctr_cipher_test.cpp +++ b/test/unittest/src/aes_cipher/crypto_aes_ctr_cipher_test.cpp @@ -44,7 +44,6 @@ public: HWTEST_F(CryptoAesCtrCipherTest, CryptoAesCtrCipherTest001, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -56,46 +55,28 @@ HWTEST_F(CryptoAesCtrCipherTest, CryptoAesCtrCipherTest001, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CTR|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCtrCipherTest, CryptoAesCtrCipherTest002, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -107,46 +88,28 @@ HWTEST_F(CryptoAesCtrCipherTest, CryptoAesCtrCipherTest002, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CTR|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCtrCipherTest, CryptoAesCtrCipherTest003, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -158,46 +121,28 @@ HWTEST_F(CryptoAesCtrCipherTest, CryptoAesCtrCipherTest003, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CTR|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCtrCipherTest, CryptoAesCtrCipherTest004, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -209,46 +154,28 @@ HWTEST_F(CryptoAesCtrCipherTest, CryptoAesCtrCipherTest004, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CTR|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCtrCipherTest, CryptoAesCtrCipherTest005, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -260,46 +187,28 @@ HWTEST_F(CryptoAesCtrCipherTest, CryptoAesCtrCipherTest005, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CTR|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCtrCipherTest, CryptoAesCtrCipherTest006, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -311,46 +220,28 @@ HWTEST_F(CryptoAesCtrCipherTest, CryptoAesCtrCipherTest006, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CTR|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCtrCipherTest, CryptoAesCtrCipherTest007, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; HcfIvParamsSpec ivSpec = {}; @@ -359,49 +250,30 @@ HWTEST_F(CryptoAesCtrCipherTest, CryptoAesCtrCipherTest007, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = ConvertSymKey("AES128", &key); - if (ret != 0) { - LOGE("ConvertSymKey failed!"); - goto CLEAR_UP; - } + int ret = ConvertSymKey("AES128", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|CTR|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); + ret = GeneratorFile("/data/test_aes.txt", 10 * FILE_BLOCK_SIZE); - if (ret != 0) { - LOGE("GeneratorFile failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesMultiBlockEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesMultiBlockDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); + ret = CompareFileContent(); - if (ret != 0) { - LOGE("CompareFileContent failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCtrCipherTest, CryptoAesCtrCipherTest008, TestSize.Level0) { - int ret = 0; uint8_t iv[AES_IV_LEN] = { 0 }; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; @@ -412,38 +284,24 @@ HWTEST_F(CryptoAesCtrCipherTest, CryptoAesCtrCipherTest008, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = AES_IV_LEN; - ret = GenerateSymKey("AES192", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES192", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES192|CTR|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, &(ivSpec.base), cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, &(ivSpec.base), cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesCtrCipherTest, CryptoAesCtrCipherTest009, TestSize.Level0) { - int ret = 0; uint8_t iv[AES_IV_LEN] = { 0 }; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; @@ -454,32 +312,19 @@ HWTEST_F(CryptoAesCtrCipherTest, CryptoAesCtrCipherTest009, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = AES_IV_LEN; - ret = GenerateSymKey("AES256", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES256", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES256|CTR|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, &(ivSpec.base), cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, &(ivSpec.base), cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } } \ No newline at end of file diff --git a/test/unittest/src/aes_cipher/crypto_aes_ecb_cipher_test.cpp b/test/unittest/src/aes_cipher/crypto_aes_ecb_cipher_test.cpp index 98145637b96414c4e6eaaa3f090e196541641c21..cfbc32cff43300b085ef9a643d686c2ecb3cc418 100644 --- a/test/unittest/src/aes_cipher/crypto_aes_ecb_cipher_test.cpp +++ b/test/unittest/src/aes_cipher/crypto_aes_ecb_cipher_test.cpp @@ -50,7 +50,6 @@ public: */ HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest001, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -58,40 +57,24 @@ HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest001, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|ECB|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_NE(ret, 0); ret = AesDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } -CLEAR_UP: + ASSERT_NE(ret, 0); + HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_NE(ret, 0); } /** @@ -102,98 +85,63 @@ CLEAR_UP: */ HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest002, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; HcfSymKeyGenerator *generator = nullptr; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } -CLEAR_UP: + ASSERT_EQ(ret, 0); + HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest003, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; HcfSymKeyGenerator *generator = nullptr; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|ECB|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest004, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -204,45 +152,27 @@ HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest004, TestSize.Level0) 0x3E, 0xFF, 0x80, 0x53, 0x89, 0xB6, 0xE4, 0xFE }; - ret = ConvertSymKey("AES128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + int ret = ConvertSymKey("AES128", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|ECB|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = memcmp(cipherText, codeCipherText, cipherTextLen); - if (ret != 0) { - LOGE("cipherText compare failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest005, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -250,136 +180,86 @@ HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest005, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|ECB|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_NE(ret, 0); ret = AesNoUpdateDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } -CLEAR_UP: + ASSERT_NE(ret, 0); + HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest006, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; HcfSymKeyGenerator *generator = nullptr; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } -CLEAR_UP: + ASSERT_EQ(ret, 0); + HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest007, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; HcfSymKeyGenerator *generator = nullptr; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|ECB|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest008, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -390,230 +270,145 @@ HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest008, TestSize.Level0) 0x3E, 0xFF, 0x80, 0x53, 0x89, 0xB6, 0xE4, 0xFE }; - ret = ConvertSymKey("AES128", &key); - if (ret != 0) { - LOGE("ConvertSymKey failed!"); - goto CLEAR_UP; - } + int ret = ConvertSymKey("AES128", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|ECB|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = memcmp(cipherText, codeCipherText, cipherTextLen); - if (ret != 0) { - LOGE("cipherText compare failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest009, TestSize.Level0) { - int ret = 0; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = GeneratorFile("/data/test_aes.txt", 10 * FILE_BLOCK_SIZE); - if (ret != 0) { - LOGE("GeneratorFile failed!"); - goto CLEAR_UP; - } + int ret = GeneratorFile("/data/test_aes.txt", 10 * FILE_BLOCK_SIZE); + ASSERT_EQ(ret, 0); + ret = ConvertSymKey("AES128", &key); - if (ret != 0) { - LOGE("ConvertSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|ECB|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesMultiBlockEncrypt(cipher, key, nullptr); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesMultiBlockDecrypt(cipher, key, nullptr); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); + ret = CompareFileContent(); - if (ret != 0) { - LOGE("CompareFileContent failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest010, TestSize.Level0) { - int ret = 0; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = GenerateSymKey("AES192", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES192", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES192|ECB|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_NE(ret, 0); ret = AesDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } -CLEAR_UP: + ASSERT_NE(ret, 0); + HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest011, TestSize.Level0) { - int ret = 0; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = GenerateSymKey("AES192", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES192", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES192|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } + ASSERT_EQ(ret, 0); + key->clearMem(key); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest012, TestSize.Level0) { - int ret = 0; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = GenerateSymKey("AES256", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES256", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES256|ECB|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } + ASSERT_EQ(ret, 0); + key->clearMem(key); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest013, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; HcfSymKey *key = nullptr; HcfCipher *cipher = nullptr; - ret = HcfCipherCreate("AES128|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + int ret = HcfCipherCreate("AES128|ECB|PKCS5", &cipher); + ASSERT_EQ(ret, 0); + ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); + ret = generator->generateSymKey(reinterpret_cast(cipher), &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(generator); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest014, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; HcfSymKey *key = nullptr; uint8_t keyMaterial[] = { @@ -623,535 +418,348 @@ HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest014, TestSize.Level0) HcfBlob keyTmpBlob = { .data = keyMaterial, .len = KEY_MATERIAL_LEN }; HcfCipher *cipher = nullptr; - ret = HcfCipherCreate("AES128|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + int ret = HcfCipherCreate("AES128|ECB|PKCS5", &cipher); + ASSERT_EQ(ret, 0); + ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = generator->convertSymKey(reinterpret_cast(cipher), &keyTmpBlob, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(generator); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest015, TestSize.Level0) { - int ret = 0; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES128", &key); + ASSERT_EQ(ret, 0); // allow input with more than one padding mode. It will pick the last PKCS5. ret = HcfCipherCreate("AES128|ECB|NoPadding|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } -CLEAR_UP: + ASSERT_EQ(ret, 0); + HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest016, TestSize.Level0) { - int ret = 0; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES128", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES256|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); // It is not allowed that AES128 in key is smaller AES256 in cipher. -> now only use the size of input key. ret = AesEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest017, TestSize.Level0) { - int ret = 0; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = GenerateSymKey("AES256", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES256", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest018, TestSize.Level0) { - int ret = 0; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES128", &key); + ASSERT_EQ(ret, 0); + ret = HcfCipherCreate("AES128|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); + ret = cipher->init(nullptr, ENCRYPT_MODE, &(key->key), nullptr); - if (ret != 0) { - LOGE("init failed! Should input cipher when init."); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest019, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; HcfCipher *cipher = nullptr; - ret = HcfCipherCreate("AES128|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + int ret = HcfCipherCreate("AES128|ECB|PKCS5", &cipher); + ASSERT_EQ(ret, 0); ret = cipher->init(cipher, ENCRYPT_MODE, nullptr, nullptr); - if (ret != 0) { - LOGE("init failed! Should input key when init."); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(cipher); HcfObjDestroy(generator); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest020, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; HcfSymKey *key = nullptr; HcfCipher *cipher = nullptr; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); + ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = cipher->init(reinterpret_cast(generator), ENCRYPT_MODE, &(key->key), nullptr); - if (ret != 0) { - LOGE("init failed! Should input key when init."); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); HcfObjDestroy(generator); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest021, TestSize.Level0) { - int ret = 0; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - uint8_t plainText[] = "this is test!"; - HcfBlob input = { .data = plainText, .len = 0 }; + HcfBlob input = { .data = nullptr, .len = 0 }; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; - ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES128", &key); + ASSERT_EQ(ret, 0); + ret = HcfCipherCreate("AES128|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncryptWithInput(cipher, key, &input, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecryptEmptyMsg(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest022, TestSize.Level0) { - int ret = 0; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; HcfBlob input = { .data = nullptr, .len = 0 }; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; - ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES128", &key); + ASSERT_EQ(ret, 0); + ret = HcfCipherCreate("AES128|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncryptWithInput(cipher, key, &input, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecryptEmptyMsg(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest023, TestSize.Level0) { - int ret = 0; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; HcfBlob input = { .data = nullptr, .len = PLAINTEXT_LEN }; HcfBlob output = { .data = nullptr, .len = 0 }; - ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES128", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = cipher->init(cipher, ENCRYPT_MODE, &(key->key), nullptr); - if (ret != 0) { - LOGE("init failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = cipher->update(nullptr, &input, &output); - if (ret != 0) { - LOGE("update failed! Blob data should not be nullptr."); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); if (output.data != nullptr) { HcfFree(output.data); output.data = nullptr; } - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest024, TestSize.Level0) { - int ret = 0; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; HcfBlob input = { .data = nullptr, .len = PLAINTEXT_LEN }; HcfBlob output = { .data = nullptr, .len = 0 }; - ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES128", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = cipher->init(cipher, ENCRYPT_MODE, &(key->key), nullptr); - if (ret != 0) { - LOGE("init failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = cipher->update(reinterpret_cast(key), &input, &output); - if (ret != 0) { - LOGE("update failed! Blob data should not be nullptr."); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); if (output.data != nullptr) { HcfFree(output.data); output.data = nullptr; } - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest025, TestSize.Level0) { - int ret = 0; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; - ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES128", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateEncWithInput(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecryptEmptyMsg(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest026, TestSize.Level0) { - int ret = 0; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; uint8_t plainText[] = "this is test!"; HcfBlob input = { .data = plainText, .len = PLAINTEXT_LEN }; - ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES128", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = cipher->init(cipher, ENCRYPT_MODE, &(key->key), nullptr); - if (ret != 0) { - LOGE("init failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = cipher->doFinal(cipher, &input, nullptr); - if (ret != 0) { - LOGE("update failed! Blob data should not be nullptr."); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest027, TestSize.Level0) { - int ret = 0; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; uint8_t plainText[] = "this is test!"; HcfBlob input = { .data = plainText, .len = PLAINTEXT_LEN }; HcfBlob output = { .data = nullptr, .len = 0 }; - ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES128", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = cipher->init(cipher, ENCRYPT_MODE, &(key->key), nullptr); - if (ret != 0) { - LOGE("init failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = cipher->doFinal(reinterpret_cast(key), &input, &output); - if (ret != 0) { - LOGE("update failed! Blob data should not be nullptr."); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); if (output.data != nullptr) { HcfFree(output.data); output.data = nullptr; } - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest028, TestSize.Level0) { - int ret = 0; HcfSymKeyGeneratorSpi *generator = nullptr; HcfSymKey *key = nullptr; HcfCipher *cipher = nullptr; SymKeyAttr attr = { .algo = HCF_ALG_AES, .keySize = AES_KEY_SIZE }; - ret = HcfCipherCreate("AES128|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + int ret = HcfCipherCreate("AES128|ECB|PKCS5", &cipher); + ASSERT_EQ(ret, 0); + ret = HcfSymKeyGeneratorSpiCreate(&attr, &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorSpiCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); + ret = generator->engineGenerateSymmKey(reinterpret_cast(cipher), &key); - if (ret != 0) { - LOGE("engineGenerateSymmKey failed!"); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(generator); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest029, TestSize.Level0) { - int ret = 0; HcfSymKeyGeneratorSpi *generator = nullptr; HcfSymKey *key = nullptr; uint8_t keyMaterial[] = { @@ -1162,25 +770,17 @@ HWTEST_F(CryptoAesEcbCipherTest, CryptoAesEcbCipherTest029, TestSize.Level0) HcfCipher *cipher = nullptr; SymKeyAttr attr = { .algo = HCF_ALG_AES, .keySize = AES_KEY_SIZE }; - ret = HcfCipherCreate("AES128|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + int ret = HcfCipherCreate("AES128|ECB|PKCS5", &cipher); + ASSERT_EQ(ret, 0); + ret = HcfSymKeyGeneratorSpiCreate(&attr, &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorSpiCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); + ret = generator->engineConvertSymmKey(reinterpret_cast(cipher), &keyTmpBlob, &key); - if (ret != 0) { - LOGE("engineConvertSymmKey failed!"); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(generator); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } } \ No newline at end of file diff --git a/test/unittest/src/aes_cipher/crypto_aes_gcm_cipher_test.cpp b/test/unittest/src/aes_cipher/crypto_aes_gcm_cipher_test.cpp index 27195c51df69c4ab916247744eeaa89a7d8d81da..3cd5d624c7dcf441167a657224fb427e81895d56 100644 --- a/test/unittest/src/aes_cipher/crypto_aes_gcm_cipher_test.cpp +++ b/test/unittest/src/aes_cipher/crypto_aes_gcm_cipher_test.cpp @@ -44,7 +44,6 @@ public: HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest001, TestSize.Level0) { - int ret = 0; uint8_t aad[8] = {0}; uint8_t tag[16] = {0}; uint8_t iv[12] = {0}; // openssl only support nonce 12 bytes, tag 16bytes @@ -62,43 +61,28 @@ HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest001, TestSize.Level0) spec.iv.data = iv; spec.iv.len = sizeof(iv); - ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES128", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|GCM|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); (void)memcpy_s(spec.tag.data, 16, cipherText + cipherTextLen - 16, 16); PrintfHex("gcm tag", spec.tag.data, spec.tag.len); cipherTextLen -= 16; ret = AesDecrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest002, TestSize.Level0) { - int ret = 0; uint8_t aad[8] = {0}; uint8_t tag[16] = {0}; uint8_t iv[12] = {0}; // openssl only support nonce 12 bytes, tag 16bytes @@ -116,43 +100,28 @@ HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest002, TestSize.Level0) spec.iv.data = iv; spec.iv.len = sizeof(iv); - ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES128", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|GCM|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); (void)memcpy_s(spec.tag.data, 16, cipherText + cipherTextLen - 16, 16); PrintfHex("gcm tag", spec.tag.data, spec.tag.len); cipherTextLen -= 16; ret = AesDecrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest003, TestSize.Level0) { - int ret = 0; uint8_t aad[8] = {0}; uint8_t tag[16] = {0}; uint8_t iv[12] = {0}; // openssl only support nonce 12 bytes, tag 16bytes @@ -170,43 +139,28 @@ HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest003, TestSize.Level0) spec.iv.data = iv; spec.iv.len = sizeof(iv); - ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES128", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|GCM|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); (void)memcpy_s(spec.tag.data, 16, cipherText + cipherTextLen - 16, 16); PrintfHex("gcm tag", spec.tag.data, spec.tag.len); cipherTextLen -= 16; ret = AesDecrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest004, TestSize.Level0) { - int ret = 0; uint8_t aad[8] = {0}; uint8_t tag[16] = {0}; uint8_t iv[12] = {0}; // openssl only support nonce 12 bytes, tag 16bytes @@ -224,43 +178,28 @@ HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest004, TestSize.Level0) spec.iv.data = iv; spec.iv.len = sizeof(iv); - ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES128", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|GCM|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); (void)memcpy_s(spec.tag.data, 16, cipherText + cipherTextLen - 16, 16); PrintfHex("gcm tag", spec.tag.data, spec.tag.len); cipherTextLen -= 16; ret = AesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest005, TestSize.Level0) { - int ret = 0; uint8_t aad[8] = {0}; uint8_t tag[16] = {0}; uint8_t iv[12] = {0}; // openssl only support nonce 12 bytes, tag 16bytes @@ -278,43 +217,28 @@ HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest005, TestSize.Level0) spec.iv.data = iv; spec.iv.len = sizeof(iv); - ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES128", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|GCM|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); (void)memcpy_s(spec.tag.data, 16, cipherText + cipherTextLen - 16, 16); PrintfHex("gcm tag", spec.tag.data, spec.tag.len); cipherTextLen -= 16; ret = AesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest006, TestSize.Level0) { - int ret = 0; uint8_t aad[8] = {0}; uint8_t tag[16] = {0}; uint8_t iv[12] = {0}; // openssl only support nonce 12 bytes, tag 16bytes @@ -332,43 +256,28 @@ HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest006, TestSize.Level0) spec.iv.data = iv; spec.iv.len = sizeof(iv); - ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES128", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|GCM|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); (void)memcpy_s(spec.tag.data, 16, cipherText + cipherTextLen - 16, 16); PrintfHex("gcm tag", spec.tag.data, spec.tag.len); cipherTextLen -= 16; ret = AesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest007, TestSize.Level0) { - int ret = 0; uint8_t aad[GCM_AAD_LEN] = { 0 }; uint8_t tag[GCM_TAG_LEN] = { 0 }; uint8_t iv[GCM_IV_LEN] = { 0 }; // openssl only support nonce 12 bytes, tag 16 bytes @@ -386,42 +295,28 @@ HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest007, TestSize.Level0) spec.iv.data = iv; spec.iv.len = sizeof(iv); - ret = GenerateSymKey("AES192", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES192", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES192|GCM|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, &(spec.base), cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); (void)memcpy_s(spec.tag.data, GCM_TAG_LEN, cipherText + cipherTextLen - GCM_TAG_LEN, GCM_TAG_LEN); PrintfHex("gcm tag", spec.tag.data, spec.tag.len); cipherTextLen -= GCM_TAG_LEN; ret = AesDecrypt(cipher, key, &(spec.base), cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed, ret:%{public}d!", ret); - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest008, TestSize.Level0) { - int ret = 0; uint8_t aad[GCM_AAD_LEN] = { 0 }; uint8_t tag[GCM_TAG_LEN] = { 0 }; uint8_t iv[GCM_IV_LEN] = { 0 }; // openssl only support nonce 12 bytes, tag 16 bytes @@ -439,37 +334,24 @@ HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest008, TestSize.Level0) spec.iv.data = iv; spec.iv.len = sizeof(iv); - ret = GenerateSymKey("AES256", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES256", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES256|GCM|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, &(spec.base), cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); (void)memcpy_s(spec.tag.data, GCM_TAG_LEN, cipherText + cipherTextLen - GCM_TAG_LEN, GCM_TAG_LEN); PrintfHex("gcm tag", spec.tag.data, spec.tag.len); cipherTextLen -= GCM_TAG_LEN; ret = AesDecrypt(cipher, key, &(spec.base), cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed, ret:%{public}d!", ret); - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest009, TestSize.Level0) @@ -503,46 +385,29 @@ HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest010, TestSize.Level0) HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest011, TestSize.Level0) { - int ret = 0; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES128", &key); + ASSERT_EQ(ret, 0); - // CBC, CTR, OFB, CFB enc/dec success, - // GCM, CCM enc/dec failed with params set to nullptr. ret = HcfCipherCreate("AES128|GCM|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_NE(ret, 0); ret = AesDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest012, TestSize.Level0) { - int ret = 0; uint8_t aad[GCM_AAD_LEN] = { 0 }; uint8_t tag[GCM_TAG_LEN] = { 0 }; uint8_t iv[GCM_IV_LEN] = { 0 }; @@ -560,33 +425,21 @@ HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest012, TestSize.Level0) spec.iv.data = iv; spec.iv.len = sizeof(iv); - ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES128", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|GCM|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, &(spec.base), cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed, ret:%{public}d!", ret); - } + ASSERT_EQ(ret, 0); -// now support gcm no aad. -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest013, TestSize.Level0) { - int ret = 0; uint8_t aad[GCM_AAD_LEN] = { 0 }; uint8_t tag[GCM_TAG_LEN] = { 0 }; uint8_t iv[GCM_IV_LEN] = { 0 }; @@ -604,32 +457,21 @@ HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest013, TestSize.Level0) spec.iv.data = nullptr; spec.iv.len = sizeof(iv); - ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES128", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|GCM|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, &(spec.base), cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed, ret:%{public}d!", ret); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest014, TestSize.Level0) { - int ret = 0; uint8_t aad[GCM_AAD_LEN] = { 0 }; uint8_t tag[GCM_TAG_LEN] = { 0 }; uint8_t iv[GCM_IV_LEN] = { 0 }; @@ -647,32 +489,21 @@ HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest014, TestSize.Level0) spec.iv.data = iv; spec.iv.len = sizeof(iv); - ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES128", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|GCM|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, &(spec.base), cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed, ret:%{public}d!", ret); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest015, TestSize.Level0) { - int ret = 0; uint8_t tag[GCM_TAG_LEN] = {0}; uint8_t iv[GCM_IV_LEN] = {0}; uint8_t cipherText[CIPHER_TEXT_LEN] = {0}; @@ -689,43 +520,28 @@ HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest015, TestSize.Level0) spec.iv.data = iv; spec.iv.len = sizeof(iv); - ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES128", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|GCM|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); (void)memcpy_s(spec.tag.data, GCM_TAG_LEN, cipherText + cipherTextLen - GCM_TAG_LEN, GCM_TAG_LEN); PrintfHex("gcm tag", spec.tag.data, spec.tag.len); cipherTextLen -= GCM_TAG_LEN; ret = AesDecrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest016, TestSize.Level0) { - int ret = 0; uint8_t aad[GCM_AAD_LONG_LEN] = { 0 }; uint8_t tag[GCM_TAG_LEN] = {0}; uint8_t iv[GCM_IV_LEN] = {0}; @@ -743,43 +559,28 @@ HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest016, TestSize.Level0) spec.iv.data = iv; spec.iv.len = sizeof(iv); - ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES128", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|GCM|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); (void)memcpy_s(spec.tag.data, GCM_TAG_LEN, cipherText + cipherTextLen - GCM_TAG_LEN, GCM_TAG_LEN); PrintfHex("gcm tag", spec.tag.data, spec.tag.len); cipherTextLen -= GCM_TAG_LEN; ret = AesDecrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest017, TestSize.Level0) { - int ret = 0; uint8_t aad[GCM_AAD_LONG_LEN] = { 0 }; uint8_t tag[GCM_TAG_LEN] = {0}; uint8_t iv[GCM_IV_LONG_LEN] = {0}; @@ -797,43 +598,28 @@ HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest017, TestSize.Level0) spec.iv.data = iv; spec.iv.len = sizeof(iv); - ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES128", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|GCM|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); (void)memcpy_s(spec.tag.data, GCM_TAG_LEN, cipherText + cipherTextLen - GCM_TAG_LEN, GCM_TAG_LEN); PrintfHex("gcm tag", spec.tag.data, spec.tag.len); cipherTextLen -= GCM_TAG_LEN; ret = AesDecrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest018, TestSize.Level0) { - int ret = 0; uint8_t aad[GCM_AAD_SHORT_LEN] = { 0 }; uint8_t tag[GCM_TAG_LEN] = {0}; // openssl only support ivLen [9, 16]; @@ -852,43 +638,28 @@ HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest018, TestSize.Level0) spec.iv.data = iv; spec.iv.len = sizeof(iv); - ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES128", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|GCM|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); (void)memcpy_s(spec.tag.data, GCM_TAG_LEN, cipherText + cipherTextLen - GCM_TAG_LEN, GCM_TAG_LEN); PrintfHex("gcm tag", spec.tag.data, spec.tag.len); cipherTextLen -= GCM_TAG_LEN; ret = AesDecrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest019, TestSize.Level0) { - int ret = 0; uint8_t tag[GCM_TAG_LEN] = {0}; uint8_t iv[GCM_IV_LONG_LEN] = {0}; uint8_t cipherText[CIPHER_TEXT_LEN] = {0}; @@ -905,38 +676,24 @@ HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest019, TestSize.Level0) spec.iv.data = iv; spec.iv.len = sizeof(iv); - ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES128", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|GCM|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); (void)memcpy_s(spec.tag.data, GCM_TAG_LEN, cipherText + cipherTextLen - GCM_TAG_LEN, GCM_TAG_LEN); PrintfHex("gcm tag", spec.tag.data, spec.tag.len); cipherTextLen -= GCM_TAG_LEN; ret = AesDecrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesGcmCipherTest, CryptoAesGcmCipherTest020, TestSize.Level0) diff --git a/test/unittest/src/aes_cipher/crypto_aes_ofb_cipher_test.cpp b/test/unittest/src/aes_cipher/crypto_aes_ofb_cipher_test.cpp index 63cc34a028747a41ca543ae371aa1d86948527e4..b5f360e5c0088dd48848875c64e6261ebe310961 100644 --- a/test/unittest/src/aes_cipher/crypto_aes_ofb_cipher_test.cpp +++ b/test/unittest/src/aes_cipher/crypto_aes_ofb_cipher_test.cpp @@ -44,7 +44,6 @@ public: HWTEST_F(CryptoAesOfbCipherTest, CryptoAesOfbCipherTest001, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -56,46 +55,28 @@ HWTEST_F(CryptoAesOfbCipherTest, CryptoAesOfbCipherTest001, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|OFB|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesOfbCipherTest, CryptoAesOfbCipherTest002, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -107,46 +88,28 @@ HWTEST_F(CryptoAesOfbCipherTest, CryptoAesOfbCipherTest002, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|OFB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesOfbCipherTest, CryptoAesOfbCipherTest003, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -158,45 +121,28 @@ HWTEST_F(CryptoAesOfbCipherTest, CryptoAesOfbCipherTest003, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|OFB|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } -CLEAR_UP: + ASSERT_EQ(ret, 0); + HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesOfbCipherTest, CryptoAesOfbCipherTest004, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -208,46 +154,28 @@ HWTEST_F(CryptoAesOfbCipherTest, CryptoAesOfbCipherTest004, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|OFB|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesOfbCipherTest, CryptoAesOfbCipherTest005, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -259,46 +187,28 @@ HWTEST_F(CryptoAesOfbCipherTest, CryptoAesOfbCipherTest005, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|OFB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesOfbCipherTest, CryptoAesOfbCipherTest006, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -310,45 +220,28 @@ HWTEST_F(CryptoAesOfbCipherTest, CryptoAesOfbCipherTest006, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = HcfSymKeyGeneratorCreate("AES128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("AES128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|OFB|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } -CLEAR_UP: + ASSERT_EQ(ret, 0); + HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesOfbCipherTest, CryptoAesOfbCipherTest007, TestSize.Level0) { - int ret = 0; uint8_t iv[16] = {0}; HcfIvParamsSpec ivSpec = {}; @@ -357,49 +250,30 @@ HWTEST_F(CryptoAesOfbCipherTest, CryptoAesOfbCipherTest007, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 16; - ret = GenerateSymKey("AES128", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES128", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES128|OFB|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); + ret = GeneratorFile("/data/test_aes.txt", 10 * FILE_BLOCK_SIZE); - if (ret != 0) { - LOGE("GeneratorFile failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesMultiBlockEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec); - if (ret != 0) { - LOGE("AesNoUpdateEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesMultiBlockDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec); - if (ret != 0) { - LOGE("AesNoUpdateDecrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); + ret = CompareFileContent(); - if (ret != 0) { - LOGE("CompareFileContent failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesOfbCipherTest, CryptoAesOfbCipherTest008, TestSize.Level0) { - int ret = 0; uint8_t iv[AES_IV_LEN] = { 0 }; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; @@ -410,38 +284,24 @@ HWTEST_F(CryptoAesOfbCipherTest, CryptoAesOfbCipherTest008, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = AES_IV_LEN; - ret = GenerateSymKey("AES192", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES192", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES192|OFB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, &(ivSpec.base), cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, &(ivSpec.base), cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoAesOfbCipherTest, CryptoAesOfbCipherTest009, TestSize.Level0) { - int ret = 0; uint8_t iv[AES_IV_LEN] = { 0 }; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; @@ -452,32 +312,19 @@ HWTEST_F(CryptoAesOfbCipherTest, CryptoAesOfbCipherTest009, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = AES_IV_LEN; - ret = GenerateSymKey("AES256", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("AES256", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("AES256|OFB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesEncrypt(cipher, key, &(ivSpec.base), cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = AesDecrypt(cipher, key, &(ivSpec.base), cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } } \ No newline at end of file diff --git a/test/unittest/src/crypto_3des_cipher_test.cpp b/test/unittest/src/crypto_3des_cipher_test.cpp index 65b6947bd098ad03c3f9fdf9c888ed980b21cfcd..e6b2f498d82aaa8d3078429bc2b63d0eb0f7b20e 100644 --- a/test/unittest/src/crypto_3des_cipher_test.cpp +++ b/test/unittest/src/crypto_3des_cipher_test.cpp @@ -226,7 +226,6 @@ static int32_t DesNoUpdateDecrypt(HcfCipher *cipher, HcfSymKey *key, HcfParamsSp HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest001, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -234,46 +233,25 @@ HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest001, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("3DES192", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("3DES192", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("3DES192|ECB|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("DesEncrypt failed! %{public}d", ret); - goto clearup; - } - - ret = DesDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("DesDecrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_NE(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_NE(ret, 0); } HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest002, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -281,47 +259,28 @@ HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest002, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("3DES192", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("3DES192", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("3DES192|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("DesEncrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("DesDecrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); - -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest003, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -329,47 +288,28 @@ HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest003, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("3DES192", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("3DES192", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("3DES192|ECB|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("DesEncrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("DesDecrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } - HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest004, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -381,46 +321,25 @@ HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest004, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 8; - ret = HcfSymKeyGeneratorCreate("3DES192", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("3DES192", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("3DES192|CBC|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("DesEncrypt failed! %{public}d", ret); - goto clearup; - } - - ret = DesDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("DesDecrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_NE(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_NE(ret, 0); } HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest005, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -432,45 +351,28 @@ HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest005, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 8; - ret = HcfSymKeyGeneratorCreate("3DES192", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("3DES192", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("3DES192|CBC|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("DesEncrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); + ret = DesDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("DesDecrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest006, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -482,45 +384,28 @@ HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest006, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 8; - ret = HcfSymKeyGeneratorCreate("3DES192", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("3DES192", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("3DES192|CBC|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); + ret = DesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("DesEncrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("DesDecrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest007, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -532,47 +417,28 @@ HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest007, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 8; - ret = HcfSymKeyGeneratorCreate("3DES192", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("3DES192", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("3DES192|OFB|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("DesEncrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("DesDecrypt failed! %{public}d", ret); - goto clearup; - } - + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest008, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -584,45 +450,28 @@ HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest008, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 8; - ret = HcfSymKeyGeneratorCreate("3DES192", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("3DES192", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("3DES192|OFB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); + ret = DesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("DesEncrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("DesDecrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest009, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -634,47 +483,28 @@ HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest009, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 8; - ret = HcfSymKeyGeneratorCreate("3DES192", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("3DES192", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("3DES192|OFB|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("DesEncrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("DesDecrypt failed! %{public}d", ret); - goto clearup; - } - + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest010, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -686,46 +516,28 @@ HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest010, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 8; - ret = HcfSymKeyGeneratorCreate("3DES192", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("3DES192", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("3DES192|CFB|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("DesEncrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("DesDecrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest011, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -737,46 +549,28 @@ HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest011, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 8; - ret = HcfSymKeyGeneratorCreate("3DES192", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("3DES192", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("3DES192|CFB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("DesEncrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("DesDecrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest012, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -788,46 +582,28 @@ HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest012, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 8; - ret = HcfSymKeyGeneratorCreate("3DES192", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("3DES192", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("3DES192|CFB|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("DesEncrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("DesDecrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest013, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -835,46 +611,25 @@ HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest013, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("3DES192", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("3DES192", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("3DES192|ECB|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesNoUpdateEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("DesNoUpdateEncrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_NE(ret, 0); - ret = DesNoUpdateDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("DesNoUpdateDecrypt failed! %{public}d", ret); - goto clearup; - } - -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_NE(ret, 0); } HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest014, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -882,47 +637,28 @@ HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest014, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("3DES192", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("3DES192", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("3DES192|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesNoUpdateEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("DesNoUpdateEncrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesNoUpdateDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("DesNoUpdateDecrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); - -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest015, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -930,47 +666,28 @@ HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest015, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("3DES192", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("3DES192", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("3DES192|ECB|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesNoUpdateEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("DesNoUpdateEncrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesNoUpdateDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("DesNoUpdateDecrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } - HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest016, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -982,46 +699,25 @@ HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest016, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 8; - ret = HcfSymKeyGeneratorCreate("3DES192", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("3DES192", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("3DES192|CBC|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("DesNoUpdateEncrypt failed! %{public}d", ret); - goto clearup; - } - - ret = DesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("DesNoUpdateDecrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_NE(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_NE(ret, 0); } HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest017, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -1033,46 +729,28 @@ HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest017, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 8; - ret = HcfSymKeyGeneratorCreate("3DES192", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("3DES192", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("3DES192|CBC|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("DesNoUpdateEncrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("DesNoUpdateDecrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest018, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -1084,46 +762,28 @@ HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest018, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 8; - ret = HcfSymKeyGeneratorCreate("3DES192", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("3DES192", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("3DES192|CBC|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("DesNoUpdateEncrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("DesNoUpdateDecrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest019, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -1135,47 +795,28 @@ HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest019, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 8; - ret = HcfSymKeyGeneratorCreate("3DES192", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("3DES192", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("3DES192|OFB|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("DesNoUpdateEncrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("DesNoUpdateDecrypt failed! %{public}d", ret); - goto clearup; - } - + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest020, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -1187,46 +828,28 @@ HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest020, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 8; - ret = HcfSymKeyGeneratorCreate("3DES192", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("3DES192", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("3DES192|OFB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("DesNoUpdateEncrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("DesNoUpdateDecrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest021, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -1238,47 +861,28 @@ HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest021, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 8; - ret = HcfSymKeyGeneratorCreate("3DES192", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("3DES192", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("3DES192|OFB|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("DesNoUpdateEncrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("DesNoUpdateDecrypt failed! %{public}d", ret); - goto clearup; - } - + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest022, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -1290,46 +894,28 @@ HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest022, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 8; - ret = HcfSymKeyGeneratorCreate("3DES192", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("3DES192", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("3DES192|CFB|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("DesNoUpdateEncrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("DesNoUpdateDecrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest023, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -1341,46 +927,28 @@ HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest023, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 8; - ret = HcfSymKeyGeneratorCreate("3DES192", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("3DES192", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("3DES192|CFB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("DesNoUpdateEncrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("DesNoUpdateDecrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest024, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -1392,46 +960,28 @@ HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest024, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = 8; - ret = HcfSymKeyGeneratorCreate("3DES192", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("3DES192", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("3DES192|CFB|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesNoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("DesNoUpdateEncrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesNoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("DesNoUpdateDecrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest025, TestSize.Level0) { - int ret = 0; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; HcfCipher *cipher = nullptr; @@ -1441,38 +991,24 @@ HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest025, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = DES_IV_LEN; - ret = GenerateDesSymKey(&key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + int ret = GenerateDesSymKey(&key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("3DES192|CFB1|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesEncrypt(cipher, key, &(ivSpec.base), cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("DesEncrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesDecrypt(cipher, key, &(ivSpec.base), cipherText, cipherTextLen); - if (ret != 0) { - LOGE("DesDecrypt failed! %{public}d", ret); - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest026, TestSize.Level0) { - int ret = 0; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; HcfCipher *cipher = nullptr; @@ -1482,38 +1018,24 @@ HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest026, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = DES_IV_LEN; - ret = GenerateDesSymKey(&key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + int ret = GenerateDesSymKey(&key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("3DES192|CFB8|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesEncrypt(cipher, key, &(ivSpec.base), cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("DesEncrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesDecrypt(cipher, key, &(ivSpec.base), cipherText, cipherTextLen); - if (ret != 0) { - LOGE("DesDecrypt failed! %{public}d", ret); - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest027, TestSize.Level0) { - int ret = 0; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; HcfCipher *cipher = nullptr; @@ -1523,207 +1045,135 @@ HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest027, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = DES_IV_LEN; - ret = GenerateDesSymKey(&key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + int ret = GenerateDesSymKey(&key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("3DES192|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesEncrypt(cipher, key, &(ivSpec.base), cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("DesEncrypt failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = DesDecrypt(cipher, key, &(ivSpec.base), cipherText, cipherTextLen); - if (ret != 0) { - LOGE("DesDecrypt failed! %{public}d", ret); - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest028, TestSize.Level0) { - int ret = 0; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = GenerateDesSymKey(&key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + int ret = GenerateDesSymKey(&key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("3DES192|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } - + ASSERT_EQ(ret, 0); + ret = cipher->init(nullptr, ENCRYPT_MODE, &(key->key), nullptr); EXPECT_EQ(ret, HCF_INVALID_PARAMS); -clearup: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest029, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("3DES192", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("3DES192", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("3DES192|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } - + ASSERT_EQ(ret, 0); + ret = cipher->init(reinterpret_cast(generator), ENCRYPT_MODE, &(key->key), nullptr); - if (ret != 0) { - LOGE("init failed! %{public}d", ret); - } + EXPECT_NE(ret, 0); -clearup: HcfObjDestroy(key); HcfObjDestroy(cipher); HcfObjDestroy(generator); - EXPECT_NE(ret, 0); } HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest030, TestSize.Level0) { - int ret = 0; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = GenerateDesSymKey(&key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + int ret = GenerateDesSymKey(&key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("3DES192|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } - + ASSERT_EQ(ret, 0); + ret = cipher->init(cipher, ENCRYPT_MODE, reinterpret_cast(cipher), nullptr); - if (ret != 0) { - LOGE("init failed! %{public}d", ret); - } + EXPECT_NE(ret, 0); -clearup: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest031, TestSize.Level0) { - int ret = 0; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; uint8_t plainText[] = "this is test!"; HcfBlob input = { .data = plainText, .len = PLAINTEXT_LEN }; HcfBlob output = { .data = nullptr, .len = 0 }; - ret = GenerateDesSymKey(&key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + int ret = GenerateDesSymKey(&key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("3DES192|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } - + ASSERT_EQ(ret, 0); + ret = cipher->init(cipher, ENCRYPT_MODE, &(key->key), nullptr); - if (ret != 0) { - LOGE("init failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); + ret = cipher->update(nullptr, &input, &output); EXPECT_EQ(ret, HCF_INVALID_PARAMS); - if (ret != 0) { - LOGE("update failed!"); - } -clearup: - HcfObjDestroy(key); - HcfObjDestroy(cipher); + if (output.data != nullptr) { HcfFree(output.data); output.data = nullptr; } - EXPECT_NE(ret, 0); + HcfObjDestroy(key); + HcfObjDestroy(cipher); } HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest032, TestSize.Level0) { - int ret = 0; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; uint8_t plainText[] = "this is test!"; HcfBlob input = { .data = plainText, .len = PLAINTEXT_LEN }; HcfBlob output = { .data = nullptr, .len = 0 }; - ret = GenerateDesSymKey(&key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + int ret = GenerateDesSymKey(&key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("3DES192|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } - + ASSERT_EQ(ret, 0); + ret = cipher->init(cipher, ENCRYPT_MODE, &(key->key), nullptr); - if (ret != 0) { - LOGE("init failed! %{public}d", ret); - goto clearup; - } - ret = cipher->update(reinterpret_cast(key), &input, &output); - if (ret != 0) { - LOGE("update failed!"); - } -clearup: + ASSERT_EQ(ret, 0); + + ret = cipher->doFinal(reinterpret_cast(key), &input, &output); + EXPECT_NE(ret, 0); + HcfObjDestroy(key); HcfObjDestroy(cipher); if (output.data != nullptr) { HcfFree(output.data); output.data = nullptr; } - EXPECT_NE(ret, 0); } HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest033, TestSize.Level0) @@ -1740,7 +1190,7 @@ HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest033, TestSize.Level0) ret = HcfCipherCreate("3DES192|ECB|PKCS5", &cipher); EXPECT_EQ(ret, HCF_SUCCESS); - + cipher->base.destroy(nullptr); ret = cipher->getCipherSpecString(nullptr, SM2_MD_NAME_STR, nullptr); EXPECT_EQ(ret, HCF_INVALID_PARAMS); @@ -1763,42 +1213,30 @@ HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest033, TestSize.Level0) HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest034, TestSize.Level0) { - int ret = 0; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; uint8_t plainText[] = "this is test!"; HcfBlob input = { .data = plainText, .len = PLAINTEXT_LEN }; HcfBlob output = { .data = nullptr, .len = 0 }; - ret = GenerateDesSymKey(&key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + int ret = GenerateDesSymKey(&key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("3DES192|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } - + ASSERT_EQ(ret, 0); + ret = cipher->init(cipher, ENCRYPT_MODE, &(key->key), nullptr); - if (ret != 0) { - LOGE("init failed! %{public}d", ret); - goto clearup; - } + ASSERT_EQ(ret, 0); + ret = cipher->doFinal(reinterpret_cast(key), &input, &output); - if (ret != 0) { - LOGE("doFinal failed!"); - } -clearup: + EXPECT_NE(ret, 0); + HcfObjDestroy(key); HcfObjDestroy(cipher); if (output.data != nullptr) { HcfFree(output.data); output.data = nullptr; } - EXPECT_NE(ret, 0); } HWTEST_F(Crypto3DesCipherTest, Crypto3DesCipherTest035, TestSize.Level0) diff --git a/test/unittest/src/crypto_sm4_cfb_cipher_test.cpp b/test/unittest/src/crypto_sm4_cfb_cipher_test.cpp index f3320356e86eb38e38cc84f0a670868197387628..f0662ff68ccd2cb2cf27231d96b7750ed61fbc52 100644 --- a/test/unittest/src/crypto_sm4_cfb_cipher_test.cpp +++ b/test/unittest/src/crypto_sm4_cfb_cipher_test.cpp @@ -53,42 +53,24 @@ HWTEST_F(CryptoSM4CfbCipherTest, CryptoSm4CipherTest010, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|CFB|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4Encrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4Decrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4Decrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4CfbCipherTest, CryptoSm4CipherTest011, TestSize.Level0) @@ -101,42 +83,24 @@ HWTEST_F(CryptoSM4CfbCipherTest, CryptoSm4CipherTest011, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|CFB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4Encrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4Decrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4Decrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4CfbCipherTest, CryptoSm4CipherTest012, TestSize.Level0) @@ -149,42 +113,24 @@ HWTEST_F(CryptoSM4CfbCipherTest, CryptoSm4CipherTest012, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|CFB|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4Encrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4Decrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4Decrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4CfbCipherTest, CryptoSm4CipherTest013, TestSize.Level0) @@ -197,42 +143,24 @@ HWTEST_F(CryptoSM4CfbCipherTest, CryptoSm4CipherTest013, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|CFB128|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4Encrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4Decrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4Decrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4CfbCipherTest, CryptoSm4CipherTest014, TestSize.Level0) @@ -245,42 +173,24 @@ HWTEST_F(CryptoSM4CfbCipherTest, CryptoSm4CipherTest014, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|CFB128|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4Encrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4Decrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4Decrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4CfbCipherTest, CryptoSm4CipherTest015, TestSize.Level0) @@ -293,42 +203,24 @@ HWTEST_F(CryptoSM4CfbCipherTest, CryptoSm4CipherTest015, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|CFB128|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4Encrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4Decrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4Decrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4CfbCipherTest, CryptoSm4CipherTest028, TestSize.Level0) @@ -342,40 +234,23 @@ HWTEST_F(CryptoSM4CfbCipherTest, CryptoSm4CipherTest028, TestSize.Level0) HcfSymKey *key = nullptr; ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|CFB|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4NoUpdateEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateEncrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4NoUpdateDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateDecrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4CfbCipherTest, CryptoSm4CipherTest029, TestSize.Level0) @@ -388,42 +263,24 @@ HWTEST_F(CryptoSM4CfbCipherTest, CryptoSm4CipherTest029, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|CFB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4NoUpdateEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateEncrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4NoUpdateDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateDecrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4CfbCipherTest, CryptoSm4CipherTest030, TestSize.Level0) @@ -436,42 +293,24 @@ HWTEST_F(CryptoSM4CfbCipherTest, CryptoSm4CipherTest030, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|CFB|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4NoUpdateEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateEncrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4NoUpdateDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateDecrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4CfbCipherTest, CryptoSm4CipherTest031, TestSize.Level0) @@ -484,42 +323,24 @@ HWTEST_F(CryptoSM4CfbCipherTest, CryptoSm4CipherTest031, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|CFB128|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4NoUpdateEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateEncrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4NoUpdateDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateDecrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4CfbCipherTest, CryptoSm4CipherTest032, TestSize.Level0) @@ -532,42 +353,24 @@ HWTEST_F(CryptoSM4CfbCipherTest, CryptoSm4CipherTest032, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|CFB128|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4NoUpdateEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateEncrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4NoUpdateDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateDecrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4CfbCipherTest, CryptoSm4CipherTest033, TestSize.Level0) @@ -581,141 +384,84 @@ HWTEST_F(CryptoSM4CfbCipherTest, CryptoSm4CipherTest033, TestSize.Level0) HcfSymKey *key = nullptr; ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|CFB128|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4NoUpdateEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateEncrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4NoUpdateDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateDecrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4CfbCipherTest, CryptoSm4CipherTest040, TestSize.Level0) { - int ret = 0; HcfCipher *cipher = nullptr; const char *cipherName = "SM4_128|CFB|NoPadding"; const char *retAlgo = nullptr; - ret = HcfCipherCreate(cipherName, &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + + int ret = HcfCipherCreate(cipherName, &cipher); + ASSERT_EQ(ret, 0); retAlgo = cipher->getAlgorithm(nullptr); - if (retAlgo == nullptr) { - LOGE("cipher getAlgorithm failed!"); - ret = HCF_ERR_CRYPTO_OPERATION; - } + ASSERT_EQ(retAlgo, nullptr); -CLEAR_UP: HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4CfbCipherTest, CryptoSm4CipherTest041, TestSize.Level0) { - int ret = 0; HcfCipher *cipher = nullptr; HcfSymKeyGenerator *generator = nullptr; const char *cipherName = "SM4_128|CFB|NoPadding"; const char *retAlgo = nullptr; - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate(cipherName, &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); retAlgo = cipher->getAlgorithm(reinterpret_cast(generator)); - if (retAlgo == nullptr) { - LOGE("cipher getAlgorithm failed!"); - ret = HCF_ERR_CRYPTO_OPERATION; - } + ASSERT_EQ(retAlgo, nullptr); -CLEAR_UP: HcfObjDestroy(generator); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4CfbCipherTest, CryptoSm4CipherTest042, TestSize.Level0) { - int ret = 0; HcfCipher *cipher = nullptr; - - ret = HcfCipherCreate("SM3|CFB|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed! Should not select SM3 for CFB generator."); - } - + int ret = HcfCipherCreate("SM3|CFB|NoPadding", &cipher); + ASSERT_NE(ret, 0); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4CfbCipherTest, CryptoSm4CipherTest043, TestSize.Level0) { - int ret = 0; HcfCipher *cipher = nullptr; - - // not allow '|' without content, because findAbility will fail for "" input - ret = HcfCipherCreate("SM4_128|CFB|", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed! Should select padding mode for SM4_128 generator."); - } - + int ret = HcfCipherCreate("SM4_128|CFB|", &cipher); + ASSERT_NE(ret, 0); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4CfbCipherTest, CryptoSm4CipherTest047, TestSize.Level0) { - int ret = 0; - - ret = HcfCipherCreate(nullptr, nullptr); - if (ret != 0) { - LOGE("HcfCipherCreate failed! Should not select SM3 for CFB generator."); - } - - EXPECT_NE(ret, 0); + int ret = HcfCipherCreate(nullptr, nullptr); + ASSERT_NE(ret, 0); } HWTEST_F(CryptoSM4CfbCipherTest, CryptoAesCipherTest050, TestSize.Level0) { - int ret = 0; uint8_t aad[8] = {0}; uint8_t tag[12] = {0}; uint8_t iv[16] = {0}; @@ -732,141 +478,82 @@ HWTEST_F(CryptoSM4CfbCipherTest, CryptoAesCipherTest050, TestSize.Level0) spec.iv.data = iv; spec.iv.len = sizeof(iv); - ret = GenerateSymKeyForSm4("SM4_128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKeyForSm4("SM4_128", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|CFB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4Encrypt failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); (void)memcpy_s(spec.tag.data, 12, cipherText + cipherTextLen - 12, 12); - cipherTextLen -= 12; ret = Sm4Decrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4Decrypt failed!"); - goto CLEAR_UP; - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4CfbCipherTest, CryptoAesCipherTest051, TestSize.Level0) { - int ret = 0; HcfCipher *cipher = nullptr; const char *cipherName = "SM4_128|CFB|NoPadding"; const char *retAlgo = nullptr; - ret = HcfCipherCreate(cipherName, &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + + int ret = HcfCipherCreate(cipherName, &cipher); + ASSERT_EQ(ret, 0); retAlgo = cipher->getAlgorithm(cipher); - if (retAlgo == nullptr) { - LOGE("cipher getAlgorithm failed!"); - ret = HCF_ERR_CRYPTO_OPERATION; - goto CLEAR_UP; - } + ASSERT_NE(retAlgo, nullptr); ret = strcmp(retAlgo, cipherName); - if (ret != 0) { - LOGE("cipher getAlgorithm failed!"); - } -CLEAR_UP: + ASSERT_EQ(ret, 0); + HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4CfbCipherTest, CryptoSm4CipherTest082, TestSize.Level0) { - int ret = 0; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = GenerateSymKeyForSm4("AES256", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKeyForSm4("AES256", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|CFB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); // It is not allowed that AES128 in key is smaller AES256 in cipher. -> now only use the size of input key. ret = Sm4Encrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_NE(ret, 0); - ret = Sm4Decrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } - -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4CfbCipherTest, CryptoSm4CipherTest083, TestSize.Level0) { - int ret = 0; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = GenerateSymKeyForSm4("AES256", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKeyForSm4("AES256", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|CFB128|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); // It is not allowed that AES128 in key is smaller AES256 in cipher. -> now only use the size of input key. ret = Sm4Encrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } - - ret = Sm4Decrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } } \ No newline at end of file diff --git a/test/unittest/src/crypto_sm4_cipher_test.cpp b/test/unittest/src/crypto_sm4_cipher_test.cpp index f58c26f6b31abd5a66965766c081ea4fbbe1e8a5..d3a66dcde2774132408d3fac61f8a48f70cab35e 100644 --- a/test/unittest/src/crypto_sm4_cipher_test.cpp +++ b/test/unittest/src/crypto_sm4_cipher_test.cpp @@ -45,7 +45,6 @@ public: HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest004, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -53,47 +52,25 @@ HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest004, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|CBC|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4Encrypt failed! "); - goto clearup; - } + ASSERT_NE(ret, 0); - ret = Sm4Decrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4Decrypt failed! "); - goto clearup; - } - -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest005, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -101,46 +78,28 @@ HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest005, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|CBC|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4Encrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); + ret = Sm4Decrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4Decrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest006, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -148,45 +107,28 @@ HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest006, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|CBC|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); + ret = Sm4Encrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4Encrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4Decrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4Decrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest007, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -194,48 +136,28 @@ HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest007, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|OFB|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4Encrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4Decrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4Decrypt failed! "); - goto clearup; - } - + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest008, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -243,45 +165,28 @@ HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest008, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|OFB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); + ret = Sm4Encrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4Encrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4Decrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4Decrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest009, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -289,47 +194,28 @@ HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest009, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|OFB|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4Encrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4Decrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4Decrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); - -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest016, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -337,47 +223,28 @@ HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest016, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|CTR|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4Encrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4Decrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4Decrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest017, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -385,46 +252,28 @@ HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest017, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|CTR|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4Encrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4Decrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4Decrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest018, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -432,46 +281,28 @@ HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest018, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|CTR|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4Encrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4Decrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4Decrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest022, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -479,47 +310,25 @@ HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest022, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|CBC|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4NoUpdateEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateEncrypt failed! "); - goto clearup; - } - - ret = Sm4NoUpdateDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateDecrypt failed! "); - goto clearup; - } + EXPECT_NE(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest023, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -527,46 +336,28 @@ HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest023, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|CBC|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4NoUpdateEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateEncrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4NoUpdateDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateDecrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest024, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -574,47 +365,28 @@ HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest024, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|CBC|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4NoUpdateEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateEncrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4NoUpdateDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateDecrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest025, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -622,48 +394,28 @@ HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest025, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|OFB|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4NoUpdateEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateEncrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4NoUpdateDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateDecrypt failed! "); - goto clearup; - } - + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest026, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -671,47 +423,28 @@ HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest026, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|OFB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4NoUpdateEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateEncrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4NoUpdateDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateDecrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest027, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -719,42 +452,24 @@ HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest027, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|OFB|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4NoUpdateEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateEncrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4NoUpdateDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateDecrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); - -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest044, TestSize.Level0) @@ -801,7 +516,6 @@ HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest052, TestSize.Level0) HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest055, TestSize.Level0) { - int ret = 0; uint8_t iv[AES_IV_LEN] = { 0 }; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; @@ -812,107 +526,67 @@ HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest055, TestSize.Level0) ivSpec.iv.data = iv; ivSpec.iv.len = AES_IV_LEN; - ret = GenerateSymKeyForSm4("SM4_128", &key); - if (ret != 0) { - LOGE("GenerateSymKeyForSm4 failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKeyForSm4("SM4_128", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|CBC|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, &(ivSpec.base), cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = Sm4Decrypt(cipher, key, &(ivSpec.base), cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest057, TestSize.Level0) { - int ret = 0; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = GenerateSymKeyForSm4("SM4_128", &key); - if (ret != 0) { - LOGE("GenerateSymKeyForSm4 failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKeyForSm4("SM4_128", &key); + ASSERT_EQ(ret, 0); - // allow input without encryption mode. It will use default aes128ecb. ret = HcfCipherCreate("SM4_128|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = Sm4Decrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } -CLEAR_UP: + ASSERT_EQ(ret, 0); + HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest060, TestSize.Level0) { - int ret = 0; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = GenerateSymKeyForSm4("SM4_128", &key); - if (ret != 0) { - LOGE("GenerateSymKeyForSm4 failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKeyForSm4("SM4_128", &key); + ASSERT_EQ(ret, 0); // allow input without encryption mode. It will pick the last PKCS5, and use default aes128ecb. ret = HcfCipherCreate("SM4_128|NoPadding|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = Sm4Decrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } -CLEAR_UP: + ASSERT_EQ(ret, 0); + HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest062, TestSize.Level0) @@ -1205,115 +879,64 @@ HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest078, TestSize.Level0) HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest079, TestSize.Level0) { - int ret = 0; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = GenerateSymKeyForSm4("AES256", &key); - if (ret != 0) { - LOGE("GenerateSymKeyForSm4 failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKeyForSm4("AES256", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|CBC|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); // It is not allowed that AES128 in key is smaller AES256 in cipher. -> now only use the size of input key. ret = Sm4Encrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_NE(ret, 0); - ret = Sm4Decrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } - -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest080, TestSize.Level0) { - int ret = 0; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = GenerateSymKeyForSm4("AES256", &key); - if (ret != 0) { - LOGE("GenerateSymKeyForSm4 failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKeyForSm4("AES256", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|CTR|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); // It is not allowed that AES128 in key is smaller AES256 in cipher. -> now only use the size of input key. ret = Sm4Encrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } - - ret = Sm4Decrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4CipherTest, CryptoSm4CipherTest081, TestSize.Level0) { - int ret = 0; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = GenerateSymKeyForSm4("AES256", &key); - if (ret != 0) { - LOGE("GenerateSymKeyForSm4 failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKeyForSm4("AES256", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|OFB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); // It is not allowed that AES128 in key is smaller AES256 in cipher. -> now only use the size of input key. ret = Sm4Encrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } - - ret = Sm4Decrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } } \ No newline at end of file diff --git a/test/unittest/src/crypto_sm4_ecb_cipher_test.cpp b/test/unittest/src/crypto_sm4_ecb_cipher_test.cpp index 59f38941a789c18dffbcc148122ce8ea7528e963..77926ad4134c7af2bfd5c71776706b6f07f98cca 100644 --- a/test/unittest/src/crypto_sm4_ecb_cipher_test.cpp +++ b/test/unittest/src/crypto_sm4_ecb_cipher_test.cpp @@ -45,7 +45,6 @@ public: HWTEST_F(CryptoSM4EcbCipherTest, CryptoSm4CipherTest001, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -53,46 +52,25 @@ HWTEST_F(CryptoSM4EcbCipherTest, CryptoSm4CipherTest001, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|ECB|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4Encrypt failed! "); - goto clearup; - } - - ret = Sm4Decrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4Decrypt failed! "); - goto clearup; - } + ASSERT_NE(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4EcbCipherTest, CryptoSm4CipherTest002, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -100,47 +78,28 @@ HWTEST_F(CryptoSM4EcbCipherTest, CryptoSm4CipherTest002, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4Encrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4Decrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4Decrypt failed! "); - goto clearup; - } - + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4EcbCipherTest, CryptoSm4CipherTest003, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -148,46 +107,28 @@ HWTEST_F(CryptoSM4EcbCipherTest, CryptoSm4CipherTest003, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|ECB|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4Encrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4Decrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4Decrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4EcbCipherTest, CryptoSm4CipherTest019, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -195,46 +136,25 @@ HWTEST_F(CryptoSM4EcbCipherTest, CryptoSm4CipherTest019, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|ECB|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4NoUpdateEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateEncrypt failed! "); - goto clearup; - } + ASSERT_NE(ret, 0); - ret = Sm4NoUpdateDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateDecrypt failed! "); - goto clearup; - } - -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4EcbCipherTest, CryptoSm4CipherTest020, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -242,47 +162,28 @@ HWTEST_F(CryptoSM4EcbCipherTest, CryptoSm4CipherTest020, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4NoUpdateEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateEncrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4NoUpdateDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateDecrypt failed! "); - goto clearup; - } - + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4EcbCipherTest, CryptoSm4CipherTest021, TestSize.Level0) { - int ret = 0; uint8_t cipherText[128] = {0}; int cipherTextLen = 128; @@ -290,287 +191,191 @@ HWTEST_F(CryptoSM4EcbCipherTest, CryptoSm4CipherTest021, TestSize.Level0) HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto clearup; - } + int ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|ECB|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4NoUpdateEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateEncrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); ret = Sm4NoUpdateDecrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateDecrypt failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); -clearup: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); HcfObjDestroy((HcfObjectBase *)generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4EcbCipherTest, CryptoSm4CipherTest034, TestSize.Level0) { - int ret = 0; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = GenerateSm4SymKey(&key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + int ret = GenerateSm4SymKey(&key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } - + ASSERT_EQ(ret, 0); + ret = cipher->init(nullptr, ENCRYPT_MODE, &(key->key), nullptr); - if (ret != 0) { - LOGE("init failed! "); - } + ASSERT_NE(ret, 0); -clearup: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4EcbCipherTest, CryptoSm4CipherTest035, TestSize.Level0) { - int ret = 0; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = GenerateSm4SymKey(&key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + int ret = GenerateSm4SymKey(&key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } - + ASSERT_EQ(ret, 0); + ret = cipher->init(cipher, ENCRYPT_MODE, reinterpret_cast(cipher), nullptr); - if (ret != 0) { - LOGE("init failed! "); - } + ASSERT_NE(ret, 0); -clearup: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4EcbCipherTest, CryptoSm4CipherTest036, TestSize.Level0) { - int ret = 0; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; uint8_t plainText[] = "this is test!"; HcfBlob input = { .data = plainText, .len = PLAINTEXT_LEN }; HcfBlob output = { .data = nullptr, .len = 0 }; - ret = GenerateSm4SymKey(&key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + int ret = GenerateSm4SymKey(&key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } - + ASSERT_EQ(ret, 0); + ret = cipher->init(cipher, ENCRYPT_MODE, &(key->key), nullptr); - if (ret != 0) { - LOGE("init failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); + ret = cipher->update(nullptr, &input, &output); - if (ret != 0) { - LOGE("update failed!"); - } -clearup: + ASSERT_NE(ret, 0); + HcfObjDestroy(key); HcfObjDestroy(cipher); if (output.data != nullptr) { HcfFree(output.data); output.data = nullptr; } - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4EcbCipherTest, CryptoSm4CipherTest037, TestSize.Level0) { - int ret = 0; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; uint8_t plainText[] = "this is test!"; HcfBlob input = { .data = plainText, .len = PLAINTEXT_LEN }; HcfBlob output = { .data = nullptr, .len = 0 }; - ret = GenerateSm4SymKey(&key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + int ret = GenerateSm4SymKey(&key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } - + ASSERT_EQ(ret, 0); + ret = cipher->init(cipher, ENCRYPT_MODE, &(key->key), nullptr); - if (ret != 0) { - LOGE("init failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); + ret = cipher->update(reinterpret_cast(key), &input, &output); - if (ret != 0) { - LOGE("update failed!"); - } -clearup: + ASSERT_NE(ret, 0); + HcfObjDestroy(key); HcfObjDestroy(cipher); if (output.data != nullptr) { HcfFree(output.data); output.data = nullptr; } - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4EcbCipherTest, CryptoSm4CipherTest038, TestSize.Level0) { - int ret = 0; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; uint8_t plainText[] = "this is test!"; HcfBlob input = { .data = plainText, .len = PLAINTEXT_LEN }; HcfBlob output = { .data = nullptr, .len = 0 }; - ret = GenerateSm4SymKey(&key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + int ret = GenerateSm4SymKey(&key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } - + ASSERT_EQ(ret, 0); + ret = cipher->init(cipher, ENCRYPT_MODE, &(key->key), nullptr); - if (ret != 0) { - LOGE("init failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); + ret = cipher->doFinal(nullptr, &input, &output); - if (ret != 0) { - LOGE("doFinal failed!"); - } -clearup: + ASSERT_NE(ret, 0); + HcfObjDestroy(key); HcfObjDestroy(cipher); if (output.data != nullptr) { HcfFree(output.data); output.data = nullptr; } - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4EcbCipherTest, CryptoSm4CipherTest039, TestSize.Level0) { - int ret = 0; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; uint8_t plainText[] = "this is test!"; HcfBlob input = { .data = plainText, .len = PLAINTEXT_LEN }; HcfBlob output = { .data = nullptr, .len = 0 }; - ret = GenerateSm4SymKey(&key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto clearup; - } + int ret = GenerateSm4SymKey(&key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto clearup; - } - + ASSERT_EQ(ret, 0); + ret = cipher->init(cipher, ENCRYPT_MODE, &(key->key), nullptr); - if (ret != 0) { - LOGE("init failed! "); - goto clearup; - } + ASSERT_EQ(ret, 0); + ret = cipher->doFinal(reinterpret_cast(key), &input, &output); - if (ret != 0) { - LOGE("doFinal failed!"); - } -clearup: + ASSERT_NE(ret, 0); + HcfObjDestroy(key); HcfObjDestroy(cipher); if (output.data != nullptr) { HcfFree(output.data); output.data = nullptr; } - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4EcbCipherTest, CryptoSm4CipherTest046, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; HcfCipher *cipher = nullptr; - ret = HcfCipherCreate("SM4_128|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + int ret = HcfCipherCreate("SM4_128|ECB|PKCS5", &cipher); + ASSERT_EQ(ret, 0); ret = cipher->init(cipher, ENCRYPT_MODE, nullptr, nullptr); - if (ret != 0) { - LOGE("init failed! Should input key when init."); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(cipher); HcfObjDestroy(generator); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4EcbCipherTest, CryptoAesCipherTest048, TestSize.Level0) { - int ret = 0; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; uint8_t plainText[] = "this is test!"; @@ -578,245 +383,157 @@ HWTEST_F(CryptoSM4EcbCipherTest, CryptoAesCipherTest048, TestSize.Level0) uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; - ret = GenerateSymKeyForSm4("SM4_128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKeyForSm4("SM4_128", &key); + ASSERT_EQ(ret, 0); + ret = HcfCipherCreate("SM4_128|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = Sm4EncryptWithInput(cipher, key, &input, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4EncryptWithInput failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = Sm4DecryptEmptyMsg(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4EncryptWithInput failed! %{public}d", ret); - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4EcbCipherTest, CryptoAesCipherTest049, TestSize.Level0) { - int ret = 0; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; HcfBlob input = { .data = nullptr, .len = 0 }; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; - ret = GenerateSymKeyForSm4("SM4_128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKeyForSm4("SM4_128", &key); + ASSERT_EQ(ret, 0); + ret = HcfCipherCreate("SM4_128|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = Sm4EncryptWithInput(cipher, key, &input, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4EncryptWithInput failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = Sm4DecryptEmptyMsg(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4DecryptEmptyMsg failed! %{public}d", ret); - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4EcbCipherTest, CryptoSm4CipherTest053, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; HcfSymKey *key = nullptr; HcfCipher *cipher = nullptr; - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); + ASSERT_EQ(ret, 0); + ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = cipher->init(reinterpret_cast(generator), ENCRYPT_MODE, &(key->key), nullptr); - if (ret != 0) { - LOGE("init failed! Should input key when init."); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); HcfObjDestroy(generator); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4EcbCipherTest, CryptoSm4CipherTest054, TestSize.Level0) { - int ret = 0; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; uint8_t plainText[] = "this is test!"; HcfBlob input = { .data = plainText, .len = PLAINTEXT_LEN }; - ret = GenerateSymKeyForSm4("SM4_128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKeyForSm4("SM4_128", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = cipher->init(cipher, ENCRYPT_MODE, &(key->key), nullptr); - if (ret != 0) { - LOGE("init failed!"); - goto CLEAR_UP; - } - + ASSERT_EQ(ret, 0); + ret = cipher->doFinal(cipher, &input, nullptr); - if (ret != 0) { - LOGE("update failed! Blob data should not be nullptr."); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4EcbCipherTest, CryptoSm4CipherTest058, TestSize.Level0) { - int ret = 0; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = GenerateSymKeyForSm4("SM4_128", &key); - if (ret != 0) { - LOGE("GenerateSymKeyForSm4 failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKeyForSm4("SM4_128", &key); + ASSERT_EQ(ret, 0); // allow input with more than one padding mode. It will pick the last PKCS5. ret = HcfCipherCreate("SM4_128|ECB|NoPadding|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = Sm4Decrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } -CLEAR_UP: + ASSERT_EQ(ret, 0); + HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4EcbCipherTest, CryptoSm4CipherTest059, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; HcfSymKey *key = nullptr; HcfCipher *cipher = nullptr; - ret = HcfCipherCreate("SM4_128|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + int ret = HcfCipherCreate("SM4_128|ECB|PKCS5", &cipher); + ASSERT_EQ(ret, 0); + ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!%{public}d", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); + ret = generator->generateSymKey(reinterpret_cast(cipher), &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(generator); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4EcbCipherTest, CryptoSm4CipherTest061, TestSize.Level0) { - int ret = 0; uint8_t cipherText[CIPHER_TEXT_LEN] = { 0 }; int cipherTextLen = CIPHER_TEXT_LEN; HcfCipher *cipher = nullptr; HcfSymKey *key = nullptr; - ret = GenerateSymKeyForSm4("AES256", &key); - if (ret != 0) { - LOGE("GenerateSymKeyForSm4 failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKeyForSm4("AES256", &key); + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); // It is not allowed that AES128 in key is smaller AES256 in cipher. -> now only use the size of input key. ret = Sm4Encrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("AesEncrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_NE(ret, 0); ret = Sm4Decrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("AesDecrypt failed! %{public}d", ret); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } } \ No newline at end of file diff --git a/test/unittest/src/crypto_sm4_gcm_cipher_test.cpp b/test/unittest/src/crypto_sm4_gcm_cipher_test.cpp index 415f68016b3a6aacea8e373d07b01b2b4c9f2da6..112391e5653c97de5f811209de0bc85c3421ce98 100644 --- a/test/unittest/src/crypto_sm4_gcm_cipher_test.cpp +++ b/test/unittest/src/crypto_sm4_gcm_cipher_test.cpp @@ -65,37 +65,23 @@ HWTEST_F(CryptoSM4GcmCipherTest, CryptoSM4GcmCipherTest001, TestSize.Level0) spec.iv.len = sizeof(iv); ret = GenerateSymKey("SM4_128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|GCM|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4Encrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); (void)memcpy_s(spec.tag.data, 16, cipherText + cipherTextLen - 16, 16); PrintfHex("gcm tag", spec.tag.data, spec.tag.len); cipherTextLen -= 16; ret = Sm4Decrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4Decrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4GcmCipherTest, CryptoSM4GcmCipherTest002, TestSize.Level0) @@ -119,37 +105,23 @@ HWTEST_F(CryptoSM4GcmCipherTest, CryptoSM4GcmCipherTest002, TestSize.Level0) spec.iv.len = sizeof(iv); ret = GenerateSymKey("SM4_128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|GCM|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4Encrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); (void)memcpy_s(spec.tag.data, 16, cipherText + cipherTextLen - 16, 16); PrintfHex("gcm tag", spec.tag.data, spec.tag.len); cipherTextLen -= 16; ret = Sm4Decrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4Decrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4GcmCipherTest, CryptoSM4GcmCipherTest003, TestSize.Level0) @@ -173,37 +145,23 @@ HWTEST_F(CryptoSM4GcmCipherTest, CryptoSM4GcmCipherTest003, TestSize.Level0) spec.iv.len = sizeof(iv); ret = GenerateSymKey("SM4_128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|GCM|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4Encrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); (void)memcpy_s(spec.tag.data, 16, cipherText + cipherTextLen - 16, 16); PrintfHex("gcm tag", spec.tag.data, spec.tag.len); cipherTextLen -= 16; ret = Sm4Decrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4Decrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4GcmCipherTest, CryptoSM4GcmCipherTest004, TestSize.Level0) @@ -227,37 +185,23 @@ HWTEST_F(CryptoSM4GcmCipherTest, CryptoSM4GcmCipherTest004, TestSize.Level0) spec.iv.len = sizeof(iv); ret = GenerateSymKey("SM4_128", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|GCM|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = Sm4NoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateEncrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); (void)memcpy_s(spec.tag.data, 16, cipherText + cipherTextLen - 16, 16); PrintfHex("gcm tag", spec.tag.data, spec.tag.len); cipherTextLen -= 16; ret = Sm4NoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateDecrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4GcmCipherTest, CryptoSM4GcmCipherTest005, TestSize.Level0) @@ -281,37 +225,23 @@ HWTEST_F(CryptoSM4GcmCipherTest, CryptoSM4GcmCipherTest005, TestSize.Level0) spec.iv.len = sizeof(iv); ret = GenerateSymKey("SM4_128", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|GCM|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = Sm4NoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateEncrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); (void)memcpy_s(spec.tag.data, 16, cipherText + cipherTextLen - 16, 16); PrintfHex("gcm tag", spec.tag.data, spec.tag.len); cipherTextLen -= 16; ret = Sm4NoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateDecrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4GcmCipherTest, CryptoSM4GcmCipherTest006, TestSize.Level0) @@ -335,37 +265,23 @@ HWTEST_F(CryptoSM4GcmCipherTest, CryptoSM4GcmCipherTest006, TestSize.Level0) spec.iv.len = sizeof(iv); ret = GenerateSymKey("SM4_128", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|GCM|PKCS7", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = Sm4NoUpdateEncrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateEncrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); (void)memcpy_s(spec.tag.data, 16, cipherText + cipherTextLen - 16, 16); PrintfHex("gcm tag", spec.tag.data, spec.tag.len); cipherTextLen -= 16; ret = Sm4NoUpdateDecrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4NoUpdateDecrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4GcmCipherTest, CryptoSM4GcmCipherTest009, TestSize.Level0) @@ -406,34 +322,21 @@ HWTEST_F(CryptoSM4GcmCipherTest, CryptoSM4GcmCipherTest011, TestSize.Level0) HcfSymKey *key = nullptr; ret = GenerateSymKey("SM4_128", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); // CBC, CTR, OFB, CFB enc/dec success, // GCM, CCM enc/dec failed with params set to nullptr. ret = HcfCipherCreate("SM4_128|GCM|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, nullptr, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4Encrypt failed! %{public}d", ret); - goto CLEAR_UP; - } + ASSERT_NE(ret, 0); ret = Sm4Decrypt(cipher, key, nullptr, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4Decrypt failed! %{public}d", ret); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4GcmCipherTest, CryptoSM4GcmCipherTest012, TestSize.Level0) @@ -457,27 +360,16 @@ HWTEST_F(CryptoSM4GcmCipherTest, CryptoSM4GcmCipherTest012, TestSize.Level0) spec.iv.len = sizeof(iv); ret = GenerateSymKey("SM4_128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|GCM|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, &(spec.base), cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4Encrypt failed, ret:%{public}d!", ret); - } + ASSERT_EQ(ret, 0); -// now support gcm no aad. -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4GcmCipherTest, CryptoSM4GcmCipherTest013, TestSize.Level0) @@ -501,26 +393,16 @@ HWTEST_F(CryptoSM4GcmCipherTest, CryptoSM4GcmCipherTest013, TestSize.Level0) spec.iv.len = sizeof(iv); ret = GenerateSymKey("SM4_128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|GCM|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, &(spec.base), cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4Encrypt failed, ret:%{public}d!", ret); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4GcmCipherTest, CryptoSM4GcmCipherTest014, TestSize.Level0) @@ -544,26 +426,16 @@ HWTEST_F(CryptoSM4GcmCipherTest, CryptoSM4GcmCipherTest014, TestSize.Level0) spec.iv.len = sizeof(iv); ret = GenerateSymKey("SM4_128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|GCM|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, &(spec.base), cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4Encrypt failed, ret:%{public}d!", ret); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4GcmCipherTest, CryptoSM4GcmCipherTest015, TestSize.Level0) @@ -586,37 +458,23 @@ HWTEST_F(CryptoSM4GcmCipherTest, CryptoSM4GcmCipherTest015, TestSize.Level0) spec.iv.len = sizeof(iv); ret = GenerateSymKey("SM4_128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|GCM|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4Encrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); (void)memcpy_s(spec.tag.data, GCM_TAG_LEN, cipherText + cipherTextLen - GCM_TAG_LEN, GCM_TAG_LEN); PrintfHex("gcm tag", spec.tag.data, spec.tag.len); cipherTextLen -= GCM_TAG_LEN; ret = Sm4Decrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4Decrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4GcmCipherTest, CryptoSM4GcmCipherTest016, TestSize.Level0) @@ -640,37 +498,23 @@ HWTEST_F(CryptoSM4GcmCipherTest, CryptoSM4GcmCipherTest016, TestSize.Level0) spec.iv.len = sizeof(iv); ret = GenerateSymKey("SM4_128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|GCM|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4Encrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); (void)memcpy_s(spec.tag.data, GCM_TAG_LEN, cipherText + cipherTextLen - GCM_TAG_LEN, GCM_TAG_LEN); PrintfHex("gcm tag", spec.tag.data, spec.tag.len); cipherTextLen -= GCM_TAG_LEN; ret = Sm4Decrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4Decrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4GcmCipherTest, CryptoSM4GcmCipherTest017, TestSize.Level0) @@ -694,37 +538,23 @@ HWTEST_F(CryptoSM4GcmCipherTest, CryptoSM4GcmCipherTest017, TestSize.Level0) spec.iv.len = sizeof(iv); ret = GenerateSymKey("SM4_128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|GCM|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4Encrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); (void)memcpy_s(spec.tag.data, GCM_TAG_LEN, cipherText + cipherTextLen - GCM_TAG_LEN, GCM_TAG_LEN); PrintfHex("gcm tag", spec.tag.data, spec.tag.len); cipherTextLen -= GCM_TAG_LEN; ret = Sm4Decrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4Decrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4GcmCipherTest, CryptoSM4GcmCipherTest018, TestSize.Level0) @@ -749,37 +579,23 @@ HWTEST_F(CryptoSM4GcmCipherTest, CryptoSM4GcmCipherTest018, TestSize.Level0) spec.iv.len = sizeof(iv); ret = GenerateSymKey("SM4_128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|GCM|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4Encrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); (void)memcpy_s(spec.tag.data, GCM_TAG_LEN, cipherText + cipherTextLen - GCM_TAG_LEN, GCM_TAG_LEN); PrintfHex("gcm tag", spec.tag.data, spec.tag.len); cipherTextLen -= GCM_TAG_LEN; ret = Sm4Decrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4Decrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4GcmCipherTest, CryptoSM4GcmCipherTest019, TestSize.Level0) @@ -802,37 +618,23 @@ HWTEST_F(CryptoSM4GcmCipherTest, CryptoSM4GcmCipherTest019, TestSize.Level0) spec.iv.len = sizeof(iv); ret = GenerateSymKey("SM4_128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|GCM|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, &cipherTextLen); - if (ret != 0) { - LOGE("Sm4Encrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); (void)memcpy_s(spec.tag.data, GCM_TAG_LEN, cipherText + cipherTextLen - GCM_TAG_LEN, GCM_TAG_LEN); PrintfHex("gcm tag", spec.tag.data, spec.tag.len); cipherTextLen -= GCM_TAG_LEN; ret = Sm4Decrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, cipherTextLen); - if (ret != 0) { - LOGE("Sm4Decrypt failed, ret:%{public}d!", ret); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); -CLEAR_UP: HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4GcmCipherTest, CryptoSM4GcmCipherTest020, TestSize.Level0) @@ -856,27 +658,21 @@ HWTEST_F(CryptoSM4GcmCipherTest, CryptoSM4GcmCipherTest020, TestSize.Level0) spec.iv.len = sizeof(iv); ret = GenerateSymKey("SM4_128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - HcfObjDestroy((HcfObjectBase *)key); - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|GCM|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - HcfObjDestroy((HcfObjectBase *)key); - HcfObjDestroy((HcfObjectBase *)cipher); - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, &cipherTextLen); - EXPECT_EQ(ret, 0); + ASSERT_EQ(ret, 0); (void)memcpy_s(spec.tag.data, 16, cipherText + cipherTextLen - 16, 16); PrintfHex("gcm tag", spec.tag.data, spec.tag.len); cipherTextLen -= 16; ret = Sm4Decrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, cipherTextLen); - EXPECT_EQ(ret, 0); + ASSERT_EQ(ret, 0); + HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); } @@ -902,27 +698,21 @@ HWTEST_F(CryptoSM4GcmCipherTest, CryptoSM4GcmCipherTest021, TestSize.Level0) spec.iv.len = sizeof(iv); ret = GenerateSymKey("SM4_128", &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - HcfObjDestroy((HcfObjectBase *)key); - } + ASSERT_EQ(ret, 0); ret = HcfCipherCreate("SM4_128|GCM|NoPadding", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - HcfObjDestroy((HcfObjectBase *)key); - HcfObjDestroy((HcfObjectBase *)cipher); - } + ASSERT_EQ(ret, 0); ret = Sm4Encrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, &cipherTextLen); - EXPECT_NE(ret, 0); + ASSERT_NE(ret, 0); (void)memcpy_s(spec.tag.data, 16, cipherText + cipherTextLen - 16, 16); PrintfHex("gcm tag", spec.tag.data, spec.tag.len); cipherTextLen -= 16; ret = Sm4Decrypt(cipher, key, (HcfParamsSpec *)&spec, cipherText, cipherTextLen); - EXPECT_NE(ret, 0); + ASSERT_NE(ret, 0); + HcfObjDestroy((HcfObjectBase *)key); HcfObjDestroy((HcfObjectBase *)cipher); } diff --git a/test/unittest/src/crypto_sm4_generator_test.cpp b/test/unittest/src/crypto_sm4_generator_test.cpp index 264622904209a75ca73e9852a5d3cda102cc9af7..4812e6c6fbe47cf814090d445f1c83db765c4df8 100644 --- a/test/unittest/src/crypto_sm4_generator_test.cpp +++ b/test/unittest/src/crypto_sm4_generator_test.cpp @@ -80,32 +80,19 @@ HWTEST_F(CryptoSM4GeneratorTest, CryptoSm4GeneratorTest001, TestSize.Level0) const char *generatorAlgoName = nullptr; ret = HcfSymKeyGeneratorCreate(inputAlgoName, &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); // generator getAlgoName generatorAlgoName = generator->getAlgoName(generator); - if (generatorAlgoName == nullptr) { - LOGE("generator getAlgoName returns nullptr."); - ret = HCF_ERR_CRYPTO_OPERATION; - goto CLEAR_UP; - } + ASSERT_NE(generatorAlgoName, nullptr); ret = strcmp(generatorAlgoName, inputAlgoName); - if (ret != 0) { - LOGE("generator getAlgoName failed!"); - } -CLEAR_UP: + ASSERT_EQ(ret, 0); + HcfObjDestroy(key); HcfObjDestroy(generator); - EXPECT_EQ(ret, 0); } HWTEST_F(CryptoSM4GeneratorTest, CryptoSm4GeneratorTest002, TestSize.Level0) @@ -116,170 +103,105 @@ HWTEST_F(CryptoSM4GeneratorTest, CryptoSm4GeneratorTest002, TestSize.Level0) const char *inputAlgoName = "SM4_128"; ret = HcfSymKeyGeneratorCreate(inputAlgoName, &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); // generator getAlgoName generatorAlgoName = generator->getAlgoName(nullptr); - if (generatorAlgoName == nullptr) { - LOGE("generator getAlgoName failed!"); - ret = HCF_ERR_CRYPTO_OPERATION; - } + ASSERT_EQ(generatorAlgoName, nullptr); -CLEAR_UP: HcfObjDestroy(generator); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4GeneratorTest, CryptoSm4GeneratorTest003, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; HcfSymKey *key = nullptr; const char *generatorAlgoName = nullptr; const char *inputAlgoName = "SM4_128"; - ret = HcfSymKeyGeneratorCreate(inputAlgoName, &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate(inputAlgoName, &generator); + ASSERT_EQ(ret, 0); ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); // generator getAlgoName generatorAlgoName = generator->getAlgoName(reinterpret_cast(key)); - if (generatorAlgoName == nullptr) { - LOGE("generator getAlgoName failed!"); - ret = HCF_ERR_CRYPTO_OPERATION; - } + ASSERT_EQ(generatorAlgoName, nullptr); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(generator); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4GeneratorTest, CryptoSm4GeneratorTest004, TestSize.Level0) { - int ret = 0; HcfSymKey *key = nullptr; const char *inputAlgoName = "SM4_128"; const char *keyAlgoName = nullptr; - ret = GenerateSymKey(inputAlgoName, &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey(inputAlgoName, &key); + ASSERT_EQ(ret, 0); - // key getAlgorithm keyAlgoName = key->key.getAlgorithm(nullptr); - if (keyAlgoName == nullptr) { - LOGE("key getAlgorithm returns nullptr."); - ret = HCF_ERR_CRYPTO_OPERATION; - } + ASSERT_EQ(keyAlgoName, nullptr); -CLEAR_UP: HcfObjDestroy(key); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4GeneratorTest, CryptoSm4GeneratorTest005, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; HcfSymKey *key = nullptr; const char *inputAlgoName = "SM4_128"; const char *keyAlgoName = nullptr; - ret = HcfSymKeyGeneratorCreate(inputAlgoName, &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate(inputAlgoName, &generator); + ASSERT_EQ(ret, 0); + ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); - // key getAlgorithm keyAlgoName = key->key.getAlgorithm(reinterpret_cast(generator)); - if (keyAlgoName == nullptr) { - LOGE("key getAlgorithm returns nullptr."); - ret = HCF_ERR_CRYPTO_OPERATION; - } + ASSERT_EQ(keyAlgoName, nullptr); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(generator); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4GeneratorTest, CryptoSm4GeneratorTest006, TestSize.Level0) { - int ret = 0; HcfSymKey *key = nullptr; const char *retFormat = nullptr; - ret = GenerateSymKey("SM4_128", &key); - if (ret != 0) { - LOGE("GenerateSymKey failed!"); - goto CLEAR_UP; - } + int ret = GenerateSymKey("SM4_128", &key); + ASSERT_EQ(ret, 0); - // key getFormat retFormat = key->key.getFormat(nullptr); - if (retFormat == nullptr) { - LOGE("key GetFormat returns nullptr."); - ret = HCF_ERR_CRYPTO_OPERATION; - } + ASSERT_EQ(retFormat, nullptr); -CLEAR_UP: HcfObjDestroy(key); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4GeneratorTest, CryptoSm4GeneratorTest007, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; HcfSymKey *key = nullptr; const char *retFormat = nullptr; - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); + ASSERT_EQ(ret, 0); + ret = generator->generateSymKey(generator, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); - // key getFormat retFormat = key->key.getFormat(reinterpret_cast(generator)); - if (retFormat == nullptr) { - LOGE("key GetFormat returns nullptr."); - ret = HCF_ERR_CRYPTO_OPERATION; - } + ASSERT_EQ(retFormat, nullptr); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(generator); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4GeneratorTest, CryptoSm4GeneratorTest008, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; HcfSymKey *key = nullptr; HcfBlob encodedBlob = { 0 }; @@ -289,36 +211,25 @@ HWTEST_F(CryptoSM4GeneratorTest, CryptoSm4GeneratorTest008, TestSize.Level0) }; HcfBlob keyTmpBlob = { .data = keyMaterial, .len = KEY_MATERIAL_LEN }; - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); + ASSERT_EQ(ret, 0); + ret = generator->convertSymKey(generator, &keyTmpBlob, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); - // key getEncoded ret = key->key.getEncoded(nullptr, &encodedBlob); - if (ret != 0) { - LOGE("key GetEncoded failed."); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(generator); if (encodedBlob.data != nullptr) { HcfFree(encodedBlob.data); encodedBlob.data = nullptr; } - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4GeneratorTest, CryptoSm4GeneratorTest009, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; HcfSymKey *key = nullptr; HcfBlob encodedBlob = { 0 }; @@ -328,36 +239,25 @@ HWTEST_F(CryptoSM4GeneratorTest, CryptoSm4GeneratorTest009, TestSize.Level0) }; HcfBlob keyTmpBlob = { .data = keyMaterial, .len = KEY_MATERIAL_LEN }; - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); + ASSERT_EQ(ret, 0); + ret = generator->convertSymKey(generator, &keyTmpBlob, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); - // key getEncoded ret = key->key.getEncoded(reinterpret_cast(generator), &encodedBlob); - if (ret != 0) { - LOGE("key GetEncoded failed."); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(generator); if (encodedBlob.data != nullptr) { HcfFree(encodedBlob.data); encodedBlob.data = nullptr; } - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4GeneratorTest, CryptoSm4GeneratorTest010, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; HcfSymKey *key = nullptr; HcfBlob encodedBlob = { 0 }; @@ -369,40 +269,30 @@ HWTEST_F(CryptoSM4GeneratorTest, CryptoSm4GeneratorTest010, TestSize.Level0) SymKeyImpl *impl = nullptr; size_t tmpLen = 0; - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); + ASSERT_EQ(ret, 0); + ret = generator->convertSymKey(generator, &keyTmpBlob, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); + impl = reinterpret_cast(key); tmpLen = impl->keyMaterial.len; impl->keyMaterial.len = 0; - // key getEncoded ret = key->key.getEncoded(&(key->key), &encodedBlob); impl->keyMaterial.len = tmpLen; - if (ret != 0) { - LOGE("key GetEncoded failed."); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(generator); if (encodedBlob.data != nullptr) { HcfFree(encodedBlob.data); encodedBlob.data = nullptr; } - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4GeneratorTest, CryptoSm4GeneratorTest011, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; HcfSymKey *key = nullptr; HcfBlob encodedBlob = { 0 }; @@ -412,37 +302,24 @@ HWTEST_F(CryptoSM4GeneratorTest, CryptoSm4GeneratorTest011, TestSize.Level0) }; HcfBlob keyTmpBlob = { .data = keyMaterial, .len = KEY_MATERIAL_LEN }; - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); + ASSERT_EQ(ret, 0); + ret = generator->convertSymKey(generator, &keyTmpBlob, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); key->clearMem(nullptr); ret = key->key.getEncoded(&(key->key), &encodedBlob); - if (ret != 0) { - LOGE("key GetEncoded failed."); - goto CLEAR_UP; - } - if ((encodedBlob.data != nullptr) && (encodedBlob.data[0] != '\0')) { - LOGE("clearMem failed!"); - ret = HCF_ERR_CRYPTO_OPERATION; - } + ASSERT_EQ(ret, 0); + ASSERT_FALSE((encodedBlob.data == nullptr) || (encodedBlob.data[0] == '\0')); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(generator); if (encodedBlob.data != nullptr) { HcfFree(encodedBlob.data); encodedBlob.data = nullptr; } - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4GeneratorTest, CryptoSm4GeneratorTest012, TestSize.Level0) @@ -503,58 +380,41 @@ HWTEST_F(CryptoSM4GeneratorTest, CryptoSm4GeneratorTest015, TestSize.Level0) HWTEST_F(CryptoSM4GeneratorTest, CryptoSm4GeneratorTest016, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; HcfSymKey *key = nullptr; - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); + ASSERT_EQ(ret, 0); + ret = generator->generateSymKey(nullptr, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(generator); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4GeneratorTest, CryptoSm4GeneratorTest017, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; HcfSymKey *key = nullptr; HcfCipher *cipher = nullptr; - ret = HcfCipherCreate("SM4_128|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + int ret = HcfCipherCreate("SM4_128|ECB|PKCS5", &cipher); + ASSERT_EQ(ret, 0); + ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); + ret = generator->generateSymKey(reinterpret_cast(cipher), &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(generator); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4GeneratorTest, CryptoSm4GeneratorTest018, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; HcfSymKey *key = nullptr; uint8_t keyMaterial[] = { @@ -563,26 +423,18 @@ HWTEST_F(CryptoSM4GeneratorTest, CryptoSm4GeneratorTest018, TestSize.Level0) }; HcfBlob keyTmpBlob = { .data = keyMaterial, .len = KEY_MATERIAL_LEN }; - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); + ASSERT_EQ(ret, 0); ret = generator->convertSymKey(nullptr, &keyTmpBlob, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(generator); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4GeneratorTest, CryptoSm4GeneratorTest019, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; HcfSymKey *key = nullptr; uint8_t keyMaterial[] = { @@ -592,32 +444,22 @@ HWTEST_F(CryptoSM4GeneratorTest, CryptoSm4GeneratorTest019, TestSize.Level0) HcfBlob keyTmpBlob = { .data = keyMaterial, .len = KEY_MATERIAL_LEN }; HcfCipher *cipher = nullptr; - ret = HcfCipherCreate("SM4_128|ECB|PKCS5", &cipher); - if (ret != 0) { - LOGE("HcfCipherCreate failed!"); - goto CLEAR_UP; - } + int ret = HcfCipherCreate("SM4_128|ECB|PKCS5", &cipher); + ASSERT_EQ(ret, 0); + ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto CLEAR_UP; - } + ASSERT_EQ(ret, 0); ret = generator->convertSymKey(reinterpret_cast(cipher), &keyTmpBlob, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - } + ASSERT_NE(ret, 0); -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(generator); HcfObjDestroy(cipher); - EXPECT_NE(ret, 0); } HWTEST_F(CryptoSM4GeneratorTest, CryptoSm4GeneratorTest020, TestSize.Level0) { - int ret = 0; HcfSymKeyGenerator *generator = nullptr; HcfSymKey *key = nullptr; uint8_t keyMaterial[] = { @@ -626,20 +468,14 @@ HWTEST_F(CryptoSM4GeneratorTest, CryptoSm4GeneratorTest020, TestSize.Level0) }; HcfBlob keyTmpBlob = { .data = keyMaterial, .len = 0 }; - ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); - if (ret != 0) { - LOGE("HcfSymKeyGeneratorCreate failed!"); - goto CLEAR_UP; - } + int ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); + ASSERT_EQ(ret, 0); ret = generator->convertSymKey(generator, &keyTmpBlob, &key); - if (ret != 0) { - LOGE("generateSymKey failed!"); - } + ASSERT_NE(ret, 0); + -CLEAR_UP: HcfObjDestroy(key); HcfObjDestroy(generator); - EXPECT_NE(ret, 0); } } \ No newline at end of file