|  | /* 	$OpenBSD: test_sshbuf_getput_basic.c,v 1.1 2014/04/30 05:32:00 djm Exp $ */ | 
|  | /* | 
|  | * Regress test for sshbuf.h buffer API | 
|  | * | 
|  | * Placed in the public domain | 
|  | */ | 
|  |  | 
|  | #include "includes.h" | 
|  |  | 
|  | #include <sys/types.h> | 
|  | #include <sys/param.h> | 
|  | #include <stdio.h> | 
|  | #ifdef HAVE_STDINT_H | 
|  | # include <stdint.h> | 
|  | #endif | 
|  | #include <stdlib.h> | 
|  | #include <string.h> | 
|  |  | 
|  | #include "../test_helper/test_helper.h" | 
|  | #include "ssherr.h" | 
|  | #include "sshbuf.h" | 
|  |  | 
|  | void sshbuf_getput_basic_tests(void); | 
|  |  | 
|  | void | 
|  | sshbuf_getput_basic_tests(void) | 
|  | { | 
|  | struct sshbuf *p1, *p2; | 
|  | const u_char *cd; | 
|  | u_char *d, d2[32], x[] = { | 
|  | 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x00, 0x99 | 
|  | }; | 
|  | u_int64_t v64; | 
|  | u_int32_t v32; | 
|  | u_int16_t v16; | 
|  | u_char v8; | 
|  | size_t s; | 
|  | char *s2; | 
|  | int r; | 
|  | u_char bn1[] = { 0x00, 0x00, 0x00 }; | 
|  | u_char bn2[] = { 0x00, 0x00, 0x01, 0x02 }; | 
|  | u_char bn3[] = { 0x00, 0x80, 0x09 }; | 
|  | u_char bn_exp1[] = { 0x00, 0x00, 0x00, 0x00 }; | 
|  | u_char bn_exp2[] = { 0x00, 0x00, 0x00, 0x02, 0x01, 0x02 }; | 
|  | u_char bn_exp3[] = { 0x00, 0x00, 0x00, 0x03, 0x00, 0x80, 0x09 }; | 
|  |  | 
|  | TEST_START("PEEK_U64"); | 
|  | ASSERT_U64_EQ(PEEK_U64(x), 0x1122334455667788ULL); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("PEEK_U32"); | 
|  | ASSERT_U32_EQ(PEEK_U32(x), 0x11223344); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("PEEK_U16"); | 
|  | ASSERT_U16_EQ(PEEK_U16(x), 0x1122); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("POKE_U64"); | 
|  | bzero(d2, sizeof(d2)); | 
|  | POKE_U64(d2, 0x1122334455667788ULL); | 
|  | ASSERT_MEM_EQ(d2, x, 8); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("POKE_U32"); | 
|  | bzero(d2, sizeof(d2)); | 
|  | POKE_U32(d2, 0x11223344); | 
|  | ASSERT_MEM_EQ(d2, x, 4); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("POKE_U16"); | 
|  | bzero(d2, sizeof(d2)); | 
|  | POKE_U16(d2, 0x1122); | 
|  | ASSERT_MEM_EQ(d2, x, 2); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_put"); | 
|  | p1 = sshbuf_new(); | 
|  | ASSERT_PTR_NE(p1, NULL); | 
|  | ASSERT_INT_EQ(sshbuf_put(p1, x, 5), 0); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 5); | 
|  | cd = sshbuf_ptr(p1); | 
|  | ASSERT_PTR_NE(cd, NULL); | 
|  | ASSERT_U8_EQ(cd[0], 0x11); | 
|  | ASSERT_U8_EQ(cd[1], 0x22); | 
|  | ASSERT_U8_EQ(cd[2], 0x33); | 
|  | ASSERT_U8_EQ(cd[3], 0x44); | 
|  | ASSERT_U8_EQ(cd[4], 0x55); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_get"); | 
|  | ASSERT_INT_EQ(sshbuf_get(p1, d2, 4), 0); | 
|  | ASSERT_MEM_EQ(d2, x, 4); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 1); | 
|  | ASSERT_U8_EQ(*(sshbuf_ptr(p1)), 0x55); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_get truncated"); | 
|  | r = sshbuf_get(p1, d2, 4); | 
|  | ASSERT_INT_EQ(r, SSH_ERR_MESSAGE_INCOMPLETE); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 1); | 
|  | ASSERT_U8_EQ(*(sshbuf_ptr(p1)), 0x55); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_put truncated"); | 
|  | ASSERT_INT_EQ(sshbuf_set_max_size(p1, 4), 0); | 
|  | r = sshbuf_put(p1, x, 5); | 
|  | ASSERT_INT_EQ(r, SSH_ERR_NO_BUFFER_SPACE); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 1); | 
|  | sshbuf_free(p1); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_get_u64"); | 
|  | p1 = sshbuf_new(); | 
|  | ASSERT_PTR_NE(p1, NULL); | 
|  | ASSERT_INT_EQ(sshbuf_put(p1, x, 10), 0); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 10); | 
|  | ASSERT_INT_EQ(sshbuf_get_u64(p1, &v64), 0); | 
|  | ASSERT_U64_EQ(v64, 0x1122334455667788ULL); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 2); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_get_u64 truncated"); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 2); | 
|  | r = sshbuf_get_u64(p1, &v64); | 
|  | ASSERT_INT_EQ(r, SSH_ERR_MESSAGE_INCOMPLETE); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 2); | 
|  | sshbuf_free(p1); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_get_u32"); | 
|  | p1 = sshbuf_new(); | 
|  | ASSERT_PTR_NE(p1, NULL); | 
|  | ASSERT_INT_EQ(sshbuf_put(p1, x, 10), 0); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 10); | 
|  | ASSERT_INT_EQ(sshbuf_get_u32(p1, &v32), 0); | 
|  | ASSERT_U32_EQ(v32, 0x11223344); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 6); | 
|  | ASSERT_INT_EQ(sshbuf_get_u32(p1, &v32), 0); | 
|  | ASSERT_U32_EQ(v32, 0x55667788); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 2); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_get_u32 truncated"); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 2); | 
|  | r = sshbuf_get_u32(p1, &v32); | 
|  | ASSERT_INT_EQ(r, SSH_ERR_MESSAGE_INCOMPLETE); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 2); | 
|  | sshbuf_free(p1); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_get_u16"); | 
|  | p1 = sshbuf_new(); | 
|  | ASSERT_PTR_NE(p1, NULL); | 
|  | ASSERT_INT_EQ(sshbuf_put(p1, x, 9), 0); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 9); | 
|  | ASSERT_INT_EQ(sshbuf_get_u16(p1, &v16), 0); | 
|  | ASSERT_U16_EQ(v16, 0x1122); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 7); | 
|  | ASSERT_INT_EQ(sshbuf_get_u16(p1, &v16), 0); | 
|  | ASSERT_U16_EQ(v16, 0x3344); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 5); | 
|  | ASSERT_INT_EQ(sshbuf_get_u16(p1, &v16), 0); | 
|  | ASSERT_U16_EQ(v16, 0x5566); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 3); | 
|  | ASSERT_INT_EQ(sshbuf_get_u16(p1, &v16), 0); | 
|  | ASSERT_U16_EQ(v16, 0x7788); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 1); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_get_u16 truncated"); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 1); | 
|  | r = sshbuf_get_u16(p1, &v16); | 
|  | ASSERT_INT_EQ(r, SSH_ERR_MESSAGE_INCOMPLETE); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 1); | 
|  | sshbuf_free(p1); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_get_u8"); | 
|  | p1 = sshbuf_new(); | 
|  | ASSERT_PTR_NE(p1, NULL); | 
|  | ASSERT_INT_EQ(sshbuf_put(p1, x, 2), 0); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 2); | 
|  | ASSERT_INT_EQ(sshbuf_get_u8(p1, &v8), 0); | 
|  | ASSERT_U8_EQ(v8, 0x11); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 1); | 
|  | ASSERT_INT_EQ(sshbuf_get_u8(p1, &v8), 0); | 
|  | ASSERT_U8_EQ(v8, 0x22); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 0); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_get_u8 truncated"); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 0); | 
|  | r = sshbuf_get_u8(p1, &v8); | 
|  | ASSERT_INT_EQ(r, SSH_ERR_MESSAGE_INCOMPLETE); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 0); | 
|  | sshbuf_free(p1); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_put_u64"); | 
|  | p1 = sshbuf_new(); | 
|  | ASSERT_PTR_NE(p1, NULL); | 
|  | ASSERT_INT_EQ(sshbuf_put_u64(p1, 0x1122334455667788ULL), 0); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 8); | 
|  | ASSERT_MEM_EQ(sshbuf_ptr(p1), x, 8); | 
|  | sshbuf_free(p1); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_put_u64 exact"); | 
|  | p1 = sshbuf_new(); | 
|  | ASSERT_PTR_NE(p1, NULL); | 
|  | ASSERT_INT_EQ(sshbuf_set_max_size(p1, 8), 0); | 
|  | ASSERT_INT_EQ(sshbuf_put_u64(p1, 0x1122334455667788ULL), 0); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 8); | 
|  | ASSERT_MEM_EQ(sshbuf_ptr(p1), x, 8); | 
|  | sshbuf_free(p1); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_put_u64 limited"); | 
|  | p1 = sshbuf_new(); | 
|  | ASSERT_PTR_NE(p1, NULL); | 
|  | ASSERT_INT_EQ(sshbuf_set_max_size(p1, 7), 0); | 
|  | r = sshbuf_put_u64(p1, 0x1122334455667788ULL); | 
|  | ASSERT_INT_EQ(r, SSH_ERR_NO_BUFFER_SPACE); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 0); | 
|  | sshbuf_free(p1); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_put_u32"); | 
|  | p1 = sshbuf_new(); | 
|  | ASSERT_PTR_NE(p1, NULL); | 
|  | ASSERT_INT_EQ(sshbuf_put_u32(p1, 0x11223344), 0); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 4); | 
|  | ASSERT_MEM_EQ(sshbuf_ptr(p1), x, 4); | 
|  | sshbuf_free(p1); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_put_u32 exact"); | 
|  | p1 = sshbuf_new(); | 
|  | ASSERT_PTR_NE(p1, NULL); | 
|  | ASSERT_INT_EQ(sshbuf_set_max_size(p1, 4), 0); | 
|  | ASSERT_INT_EQ(sshbuf_put_u32(p1, 0x11223344), 0); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 4); | 
|  | ASSERT_MEM_EQ(sshbuf_ptr(p1), x, 4); | 
|  | sshbuf_free(p1); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_put_u32 limited"); | 
|  | p1 = sshbuf_new(); | 
|  | ASSERT_PTR_NE(p1, NULL); | 
|  | ASSERT_INT_EQ(sshbuf_set_max_size(p1, 3), 0); | 
|  | r = sshbuf_put_u32(p1, 0x11223344); | 
|  | ASSERT_INT_EQ(r, SSH_ERR_NO_BUFFER_SPACE); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 0); | 
|  | sshbuf_free(p1); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_put_u16"); | 
|  | p1 = sshbuf_new(); | 
|  | ASSERT_PTR_NE(p1, NULL); | 
|  | ASSERT_INT_EQ(sshbuf_put_u16(p1, 0x1122), 0); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 2); | 
|  | ASSERT_MEM_EQ(sshbuf_ptr(p1), x, 2); | 
|  | sshbuf_free(p1); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_put_u16"); | 
|  | p1 = sshbuf_new(); | 
|  | ASSERT_PTR_NE(p1, NULL); | 
|  | ASSERT_INT_EQ(sshbuf_set_max_size(p1, 2), 0); | 
|  | ASSERT_INT_EQ(sshbuf_put_u16(p1, 0x1122), 0); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 2); | 
|  | ASSERT_MEM_EQ(sshbuf_ptr(p1), x, 2); | 
|  | sshbuf_free(p1); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_put_u16 limited"); | 
|  | p1 = sshbuf_new(); | 
|  | ASSERT_PTR_NE(p1, NULL); | 
|  | ASSERT_INT_EQ(sshbuf_set_max_size(p1, 1), 0); | 
|  | r = sshbuf_put_u16(p1, 0x1122); | 
|  | ASSERT_INT_EQ(r, SSH_ERR_NO_BUFFER_SPACE); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 0); | 
|  | sshbuf_free(p1); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_get_string"); | 
|  | p1 = sshbuf_new(); | 
|  | ASSERT_PTR_NE(p1, NULL); | 
|  | ASSERT_INT_EQ(sshbuf_put_u32(p1, sizeof(x)), 0); | 
|  | ASSERT_INT_EQ(sshbuf_put(p1, x, sizeof(x)), 0); | 
|  | ASSERT_INT_EQ(sshbuf_put_u32(p1, sizeof(x)), 0); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), sizeof(x) + 4 + 4); | 
|  | ASSERT_INT_EQ(sshbuf_get_string(p1, &d, &s), 0); | 
|  | ASSERT_SIZE_T_EQ(s, sizeof(x)); | 
|  | ASSERT_MEM_EQ(d, x, sizeof(x)); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 4); | 
|  | free(d); | 
|  | sshbuf_free(p1); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_get_string exact"); | 
|  | p1 = sshbuf_new(); | 
|  | ASSERT_PTR_NE(p1, NULL); | 
|  | ASSERT_INT_EQ(sshbuf_set_max_size(p1, sizeof(x) + 4), 0); | 
|  | ASSERT_INT_EQ(sshbuf_put_u32(p1, sizeof(x)), 0); | 
|  | ASSERT_INT_EQ(sshbuf_put(p1, x, sizeof(x)), 0); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), sizeof(x) + 4); | 
|  | ASSERT_INT_EQ(sshbuf_get_string(p1, &d, &s), 0); | 
|  | ASSERT_SIZE_T_EQ(s, sizeof(x)); | 
|  | ASSERT_MEM_EQ(d, x, sizeof(x)); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 0); | 
|  | free(d); | 
|  | sshbuf_free(p1); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_get_string truncated"); | 
|  | p1 = sshbuf_new(); | 
|  | ASSERT_PTR_NE(p1, NULL); | 
|  | ASSERT_INT_EQ(sshbuf_put_u32(p1, sizeof(x)), 0); | 
|  | ASSERT_INT_EQ(sshbuf_put(p1, x, sizeof(x)), 0); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), sizeof(x) + 4); | 
|  | ASSERT_INT_EQ(sshbuf_consume_end(p1, 1), 0); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), sizeof(x) + 3); | 
|  | r = sshbuf_get_string(p1, &d, &s); | 
|  | ASSERT_INT_EQ(r, SSH_ERR_MESSAGE_INCOMPLETE); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), sizeof(x) + 3); | 
|  | sshbuf_free(p1); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_get_string giant"); | 
|  | p1 = sshbuf_new(); | 
|  | ASSERT_PTR_NE(p1, NULL); | 
|  | ASSERT_INT_EQ(sshbuf_put_u32(p1, 0xffffffff), 0); | 
|  | ASSERT_INT_EQ(sshbuf_put(p1, x, sizeof(x)), 0); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), sizeof(x) + 4); | 
|  | r = sshbuf_get_string(p1, &d, &s); | 
|  | ASSERT_INT_EQ(r, SSH_ERR_STRING_TOO_LARGE); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), sizeof(x) + 4); | 
|  | sshbuf_free(p1); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_get_cstring giant"); | 
|  | p1 = sshbuf_new(); | 
|  | ASSERT_PTR_NE(p1, NULL); | 
|  | ASSERT_INT_EQ(sshbuf_put_u32(p1, 0xffffffff), 0); | 
|  | ASSERT_INT_EQ(sshbuf_put(p1, x, sizeof(x)), 0); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), sizeof(x) + 4); | 
|  | r = sshbuf_get_cstring(p1, &s2, &s); | 
|  | ASSERT_INT_EQ(r, SSH_ERR_STRING_TOO_LARGE); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), sizeof(x) + 4); | 
|  | sshbuf_free(p1); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_get_cstring embedded \\0"); | 
|  | p1 = sshbuf_new(); | 
|  | ASSERT_PTR_NE(p1, NULL); | 
|  | ASSERT_INT_EQ(sshbuf_put_u32(p1, sizeof(x)), 0); | 
|  | ASSERT_INT_EQ(sshbuf_put(p1, x, sizeof(x)), 0); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), sizeof(x) + 4); | 
|  | r = sshbuf_get_cstring(p1, &s2, NULL); | 
|  | ASSERT_INT_EQ(r, SSH_ERR_INVALID_FORMAT); | 
|  | sshbuf_free(p1); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_get_cstring trailing \\0"); | 
|  | p1 = sshbuf_new(); | 
|  | ASSERT_PTR_NE(p1, NULL); | 
|  | ASSERT_INT_EQ(sshbuf_put_u32(p1, sizeof(x) - 1), 0); | 
|  | ASSERT_INT_EQ(sshbuf_put(p1, x, sizeof(x) - 1), 0); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), sizeof(x) + 4 - 1); | 
|  | ASSERT_INT_EQ(sshbuf_get_cstring(p1, &s2, &s), 0); | 
|  | ASSERT_SIZE_T_EQ(s, sizeof(x) - 1); | 
|  | ASSERT_MEM_EQ(s2, x, s); | 
|  | free(s2); | 
|  | sshbuf_free(p1); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_put_string"); | 
|  | p1 = sshbuf_new(); | 
|  | ASSERT_PTR_NE(p1, NULL); | 
|  | ASSERT_INT_EQ(sshbuf_put_string(p1, x, sizeof(x)), 0); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), sizeof(x) + 4); | 
|  | ASSERT_U32_EQ(PEEK_U32(sshbuf_ptr(p1)), sizeof(x)); | 
|  | ASSERT_MEM_EQ(sshbuf_ptr(p1) + 4, x, sizeof(x)); | 
|  | sshbuf_free(p1); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_put_string limited"); | 
|  | p1 = sshbuf_new(); | 
|  | ASSERT_PTR_NE(p1, NULL); | 
|  | ASSERT_INT_EQ(sshbuf_set_max_size(p1, sizeof(x) + 4 - 1), 0); | 
|  | r = sshbuf_put_string(p1, x, sizeof(x)); | 
|  | ASSERT_INT_EQ(r, SSH_ERR_NO_BUFFER_SPACE); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 0); | 
|  | sshbuf_free(p1); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_put_string giant"); | 
|  | p1 = sshbuf_new(); | 
|  | ASSERT_PTR_NE(p1, NULL); | 
|  | r = sshbuf_put_string(p1, (void *)0x01, 0xfffffffc); | 
|  | ASSERT_INT_EQ(r, SSH_ERR_NO_BUFFER_SPACE); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 0); | 
|  | sshbuf_free(p1); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_putf"); | 
|  | p1 = sshbuf_new(); | 
|  | ASSERT_PTR_NE(p1, NULL); | 
|  | r = sshbuf_putf(p1, "%s %d %x", "hello", 23, 0x5f); | 
|  | ASSERT_INT_EQ(r, 0); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), 11); | 
|  | ASSERT_MEM_EQ(sshbuf_ptr(p1), "hello 23 5f", 11); | 
|  | sshbuf_free(p1); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_putb"); | 
|  | p1 = sshbuf_new(); | 
|  | ASSERT_PTR_NE(p1, NULL); | 
|  | p2 = sshbuf_new(); | 
|  | ASSERT_PTR_NE(p2, NULL); | 
|  | ASSERT_INT_EQ(sshbuf_put(p1, "blahblahblah", 12), 0); | 
|  | ASSERT_INT_EQ(sshbuf_putb(p2, p1), 0); | 
|  | sshbuf_free(p1); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p2), 12); | 
|  | ASSERT_MEM_EQ(sshbuf_ptr(p2), "blahblahblah", 12); | 
|  | sshbuf_free(p2); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_put_bignum2_bytes empty buf"); | 
|  | p1 = sshbuf_new(); | 
|  | ASSERT_PTR_NE(p1, NULL); | 
|  | ASSERT_INT_EQ(sshbuf_put_bignum2_bytes(p1, NULL, 0), 0); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), sizeof(bn_exp1)); | 
|  | ASSERT_MEM_EQ(sshbuf_ptr(p1), bn_exp1, sizeof(bn_exp1)); | 
|  | sshbuf_free(p1); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_put_bignum2_bytes all zeroes"); | 
|  | p1 = sshbuf_new(); | 
|  | ASSERT_PTR_NE(p1, NULL); | 
|  | ASSERT_INT_EQ(sshbuf_put_bignum2_bytes(p1, bn1, sizeof(bn1)), 0); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), sizeof(bn_exp1)); | 
|  | ASSERT_MEM_EQ(sshbuf_ptr(p1), bn_exp1, sizeof(bn_exp1)); | 
|  | sshbuf_free(p1); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_put_bignum2_bytes simple"); | 
|  | p1 = sshbuf_new(); | 
|  | ASSERT_PTR_NE(p1, NULL); | 
|  | ASSERT_INT_EQ(sshbuf_put_bignum2_bytes(p1, bn2+2, sizeof(bn2)-2), 0); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), sizeof(bn_exp2)); | 
|  | ASSERT_MEM_EQ(sshbuf_ptr(p1), bn_exp2, sizeof(bn_exp2)); | 
|  | sshbuf_free(p1); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_put_bignum2_bytes leading zero"); | 
|  | p1 = sshbuf_new(); | 
|  | ASSERT_PTR_NE(p1, NULL); | 
|  | ASSERT_INT_EQ(sshbuf_put_bignum2_bytes(p1, bn2, sizeof(bn2)), 0); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), sizeof(bn_exp2)); | 
|  | ASSERT_MEM_EQ(sshbuf_ptr(p1), bn_exp2, sizeof(bn_exp2)); | 
|  | sshbuf_free(p1); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_put_bignum2_bytes neg"); | 
|  | p1 = sshbuf_new(); | 
|  | ASSERT_PTR_NE(p1, NULL); | 
|  | ASSERT_INT_EQ(sshbuf_put_bignum2_bytes(p1, bn3+1, sizeof(bn3)-1), 0); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), sizeof(bn_exp3)); | 
|  | ASSERT_MEM_EQ(sshbuf_ptr(p1), bn_exp3, sizeof(bn_exp3)); | 
|  | sshbuf_free(p1); | 
|  | TEST_DONE(); | 
|  |  | 
|  | TEST_START("sshbuf_put_bignum2_bytes neg and leading zero"); | 
|  | p1 = sshbuf_new(); | 
|  | ASSERT_PTR_NE(p1, NULL); | 
|  | ASSERT_INT_EQ(sshbuf_put_bignum2_bytes(p1, bn3, sizeof(bn3)), 0); | 
|  | ASSERT_SIZE_T_EQ(sshbuf_len(p1), sizeof(bn_exp3)); | 
|  | ASSERT_MEM_EQ(sshbuf_ptr(p1), bn_exp3, sizeof(bn_exp3)); | 
|  | sshbuf_free(p1); | 
|  | TEST_DONE(); | 
|  | } |