diff options
author | Theo van Klaveren <theo.van.klaveren@gmail.com> | 2011-03-17 12:53:22 +0100 |
---|---|---|
committer | Caolán McNamara <caolanm@redhat.com> | 2011-03-18 09:34:13 +0000 |
commit | 138a5b7d19bd5956e14d4e6114d1aa14b57ad0a2 (patch) | |
tree | 112bf137fbf32f65fdede539df28c6d1505668fd /sal | |
parent | ada6b6704442595f384e021fc4f9f976b6aec522 (diff) |
Make the qa/rtl/rtl_cipher unit test compile again.
Diffstat (limited to 'sal')
-rw-r--r-- | sal/qa/rtl/cipher/rtl_cipher.cxx | 112 |
1 files changed, 59 insertions, 53 deletions
diff --git a/sal/qa/rtl/cipher/rtl_cipher.cxx b/sal/qa/rtl/cipher/rtl_cipher.cxx index 1fecdb34c4b6..27abd0a3755d 100644 --- a/sal/qa/rtl/cipher/rtl_cipher.cxx +++ b/sal/qa/rtl/cipher/rtl_cipher.cxx @@ -30,7 +30,12 @@ // MARKER(update_precomp.py): autogen include statement, do not remove #include "precompiled_sal.hxx" -#include <testshl/simpleheader.hxx> +#include <cstring> + +#include <cppunit/TestFixture.h> +#include <cppunit/extensions/HelperMacros.h> +#include <cppunit/plugin/TestPlugIn.h> + #include <rtl/strbuf.hxx> #include <rtl/cipher.h> @@ -47,7 +52,8 @@ rtl::OString createHex(sal_uInt8 *_pKeyBuffer, sal_uInt32 _nKeyLen) sal_Int32 nValue = (sal_Int32)_pKeyBuffer[i]; if (nValue < 16) // maximul hex value for 1 byte { - aBuffer.append( sal_Int32(0), 16 /* radix */ ); + sal_Int32 nil = sal_Int32(0); + aBuffer.append( nil, 16 /* radix */ ); } aBuffer.append( nValue, 16 /* radix */ ); } @@ -205,8 +211,8 @@ public: memset(pArgBuffer, 0, nArgLen); pArgBuffer[0] = _nArgValue; - t_print(T_VERBOSE, " init Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr()); - t_print(T_VERBOSE, " init Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr()); + printf(" init Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr()); + printf(" init Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr()); rtlCipherError aError = rtl_cipher_init(aCipher, rtl_Cipher_DirectionEncode, pKeyBuffer, nKeyLen, pArgBuffer, nArgLen); CPPUNIT_ASSERT_MESSAGE("wrong init", aError == rtl_Cipher_E_None); @@ -223,10 +229,10 @@ public: /* rtlCipherError */ aError = rtl_cipher_encode(aCipher, pPlainTextBuffer, nPlainTextLen, pCipherBuffer, nCipherLen); CPPUNIT_ASSERT_MESSAGE("wrong encode", aError == rtl_Cipher_E_None); - t_print(T_VERBOSE, " Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr()); - t_print(T_VERBOSE, " Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr()); - t_print(T_VERBOSE, " Plain: %s\n", createHex(pPlainTextBuffer, nPlainTextLen).getStr()); - t_print( "Cipher Buf: %s\n", createHex(pCipherBuffer, nCipherLen).getStr()); + printf(" Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr()); + printf(" Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr()); + printf(" Plain: %s\n", createHex(pPlainTextBuffer, nPlainTextLen).getStr()); + printf( "Cipher Buf: %s\n", createHex(pCipherBuffer, nCipherLen).getStr()); sal_uInt32 nPlainText2Len = 16; sal_uInt8 *pPlainText2Buffer = new sal_uInt8[ nPlainText2Len ]; @@ -236,10 +242,10 @@ public: CPPUNIT_ASSERT_MESSAGE("decode should not work", aError != rtl_Cipher_E_None); // rtl::OString sPlainText2Str((char*)pPlainText2Buffer, nPlainText2Len); - // t_print(T_VERBOSE, " Plain: %s\n", createHex(pPlainText2Buffer, nPlainText2Len).getStr()); - // t_print(T_VERBOSE, " ascii: %s\n", sPlainText2Str.getStr()); + // printf(" Plain: %s\n", createHex(pPlainText2Buffer, nPlainText2Len).getStr()); + // printf(" ascii: %s\n", sPlainText2Str.getStr()); // - // // t_print(" Buf: %s\n", createHex(pCipherBuffer, nCipherLen).getStr()); + // // printf(" Buf: %s\n", createHex(pCipherBuffer, nCipherLen).getStr()); // // sal_Int32 nCompare = memcmp(pPlainTextBuffer, pPlainText2Buffer, 16); // @@ -271,8 +277,8 @@ public: memset(pArgBuffer, 0, nArgLen); pArgBuffer[0] = _nArgValue; - t_print(T_VERBOSE, " init Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr()); - t_print(T_VERBOSE, " init Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr()); + printf(" init Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr()); + printf(" init Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr()); rtlCipherError aError = rtl_cipher_init(aCipher, rtl_Cipher_DirectionBoth, pKeyBuffer, nKeyLen, pArgBuffer, nArgLen); CPPUNIT_ASSERT_MESSAGE("wrong init", aError == rtl_Cipher_E_None); @@ -289,10 +295,10 @@ public: /* rtlCipherError */ aError = rtl_cipher_encode(aCipher, pPlainTextBuffer, nPlainTextLen, pCipherBuffer, nCipherLen); CPPUNIT_ASSERT_MESSAGE("wrong encode", aError == rtl_Cipher_E_None); - t_print(T_VERBOSE, " Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr()); - t_print(T_VERBOSE, " Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr()); - t_print(T_VERBOSE, " Plain: %s\n", createHex(pPlainTextBuffer, nPlainTextLen).getStr()); - t_print( "Cipher Buf: %s\n", createHex(pCipherBuffer, nCipherLen).getStr()); + printf(" Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr()); + printf(" Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr()); + printf(" Plain: %s\n", createHex(pPlainTextBuffer, nPlainTextLen).getStr()); + printf( "Cipher Buf: %s\n", createHex(pCipherBuffer, nCipherLen).getStr()); sal_uInt32 nPlainText2Len = 16; sal_uInt8 *pPlainText2Buffer = new sal_uInt8[ nPlainText2Len ]; @@ -302,10 +308,10 @@ public: CPPUNIT_ASSERT_MESSAGE("wrong decode", aError == rtl_Cipher_E_None); rtl::OString sPlainText2Str((char*)pPlainText2Buffer, nPlainText2Len); - t_print(T_VERBOSE, " Plain: %s\n", createHex(pPlainText2Buffer, nPlainText2Len).getStr()); - t_print(T_VERBOSE, " as ascii: %s\n", sPlainText2Str.getStr()); + printf(" Plain: %s\n", createHex(pPlainText2Buffer, nPlainText2Len).getStr()); + printf(" as ascii: %s\n", sPlainText2Str.getStr()); - // t_print(" Buf: %s\n", createHex(pCipherBuffer, nCipherLen).getStr()); + // printf(" Buf: %s\n", createHex(pCipherBuffer, nCipherLen).getStr()); sal_Int32 nCompare = memcmp(pPlainTextBuffer, pPlainText2Buffer, 16); @@ -454,8 +460,8 @@ public: memset(pArgBuffer, 0, nArgLen); pArgBuffer[0] = _nArgValue; - t_print(T_VERBOSE, "init Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr()); - t_print(T_VERBOSE, "init Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr()); + printf("init Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr()); + printf("init Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr()); rtlCipherError aError = rtl_cipher_init(aCipher, rtl_Cipher_DirectionEncode, pKeyBuffer, nKeyLen, pArgBuffer, nArgLen); CPPUNIT_ASSERT_MESSAGE("wrong init", aError == rtl_Cipher_E_None); @@ -472,10 +478,10 @@ public: /* rtlCipherError */ aError = rtl_cipher_encode(aCipher, pDataBuffer, nDataLen, pBuffer, nLen); CPPUNIT_ASSERT_MESSAGE("wrong encode", aError == rtl_Cipher_E_None); - t_print(T_VERBOSE, " Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr()); - t_print(T_VERBOSE, " Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr()); - t_print(T_VERBOSE, "Data: %s\n", createHex(pDataBuffer, nDataLen).getStr()); - t_print(T_VERBOSE, " Buf: %s\n", createHex(pBuffer, nLen).getStr()); + printf(" Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr()); + printf(" Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr()); + printf("Data: %s\n", createHex(pDataBuffer, nDataLen).getStr()); + printf(" Buf: %s\n", createHex(pBuffer, nLen).getStr()); delete [] pBuffer; delete [] pDataBuffer; @@ -557,14 +563,14 @@ public: sal_uInt8 *pArgBuffer = new sal_uInt8[ nArgLen ]; memset(pArgBuffer, 0, nArgLen); - t_print(T_VERBOSE, "Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr()); - t_print(T_VERBOSE, "Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr()); + printf("Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr()); + printf("Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr()); rtlCipherError aError = rtl_cipher_init(aCipher, rtl_Cipher_DirectionEncode, pKeyBuffer, nKeyLen, pArgBuffer, nArgLen); CPPUNIT_ASSERT_MESSAGE("wrong init", aError == rtl_Cipher_E_None); - t_print(T_VERBOSE, "Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr()); - t_print(T_VERBOSE, "Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr()); + printf("Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr()); + printf("Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr()); delete [] pArgBuffer; delete [] pKeyBuffer; @@ -586,14 +592,14 @@ public: sal_uInt8 *pArgBuffer = new sal_uInt8[ nArgLen ]; memset(pArgBuffer, 0, nArgLen); - t_print(T_VERBOSE, "Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr()); - t_print(T_VERBOSE, "Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr()); + printf("Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr()); + printf("Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr()); rtlCipherError aError = rtl_cipher_init(aCipher, rtl_Cipher_DirectionEncode, pKeyBuffer, nKeyLen, pArgBuffer, nArgLen); CPPUNIT_ASSERT_MESSAGE("wrong init", aError == rtl_Cipher_E_None); - t_print(T_VERBOSE, "Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr()); - t_print(T_VERBOSE, "Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr()); + printf("Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr()); + printf("Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr()); delete [] pArgBuffer; delete [] pKeyBuffer; @@ -614,14 +620,14 @@ public: memset(pArgBuffer, 0, nArgLen); pArgBuffer[0] = 1; - t_print(T_VERBOSE, "Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr()); - t_print(T_VERBOSE, "Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr()); + printf("Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr()); + printf("Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr()); rtlCipherError aError = rtl_cipher_init(aCipher, rtl_Cipher_DirectionEncode, pKeyBuffer, nKeyLen, pArgBuffer, nArgLen); CPPUNIT_ASSERT_MESSAGE("wrong init", aError == rtl_Cipher_E_None); - t_print(T_VERBOSE, "Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr()); - t_print(T_VERBOSE, "Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr()); + printf("Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr()); + printf("Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr()); delete [] pArgBuffer; delete [] pKeyBuffer; @@ -643,14 +649,14 @@ public: memset(pArgBuffer, 0, nArgLen); pArgBuffer[0] = 1; - t_print(T_VERBOSE, "Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr()); - t_print(T_VERBOSE, "Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr()); + printf("Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr()); + printf("Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr()); rtlCipherError aError = rtl_cipher_init(aCipher, rtl_Cipher_DirectionEncode, pKeyBuffer, nKeyLen, pArgBuffer, nArgLen); CPPUNIT_ASSERT_MESSAGE("wrong init", aError == rtl_Cipher_E_None); - t_print(T_VERBOSE, "Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr()); - t_print(T_VERBOSE, "Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr()); + printf("Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr()); + printf("Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr()); delete [] pArgBuffer; delete [] pKeyBuffer; @@ -697,16 +703,16 @@ public: // ----------------------------------------------------------------------------- -CPPUNIT_TEST_SUITE_NAMED_REGISTRATION(rtl_cipher::create, "rtl_cipher"); -CPPUNIT_TEST_SUITE_NAMED_REGISTRATION(rtl_cipher::createBF, "rtl_cipher"); -CPPUNIT_TEST_SUITE_NAMED_REGISTRATION(rtl_cipher::decode, "rtl_cipher"); -CPPUNIT_TEST_SUITE_NAMED_REGISTRATION(rtl_cipher::decodeBF, "rtl_cipher"); -CPPUNIT_TEST_SUITE_NAMED_REGISTRATION(rtl_cipher::destroy, "rtl_cipher"); -CPPUNIT_TEST_SUITE_NAMED_REGISTRATION(rtl_cipher::destroyBF, "rtl_cipher"); -CPPUNIT_TEST_SUITE_NAMED_REGISTRATION(rtl_cipher::encode, "rtl_cipher"); -CPPUNIT_TEST_SUITE_NAMED_REGISTRATION(rtl_cipher::encodeBF, "rtl_cipher"); -CPPUNIT_TEST_SUITE_NAMED_REGISTRATION(rtl_cipher::init, "rtl_cipher"); -CPPUNIT_TEST_SUITE_NAMED_REGISTRATION(rtl_cipher::initBF, "rtl_cipher"); +CPPUNIT_TEST_SUITE_REGISTRATION(rtl_cipher::create); +CPPUNIT_TEST_SUITE_REGISTRATION(rtl_cipher::createBF); +CPPUNIT_TEST_SUITE_REGISTRATION(rtl_cipher::decode); +CPPUNIT_TEST_SUITE_REGISTRATION(rtl_cipher::decodeBF); +CPPUNIT_TEST_SUITE_REGISTRATION(rtl_cipher::destroy); +CPPUNIT_TEST_SUITE_REGISTRATION(rtl_cipher::destroyBF); +CPPUNIT_TEST_SUITE_REGISTRATION(rtl_cipher::encode); +CPPUNIT_TEST_SUITE_REGISTRATION(rtl_cipher::encodeBF); +CPPUNIT_TEST_SUITE_REGISTRATION(rtl_cipher::init); +CPPUNIT_TEST_SUITE_REGISTRATION(rtl_cipher::initBF); } // namespace rtl_cipher @@ -715,6 +721,6 @@ CPPUNIT_TEST_SUITE_NAMED_REGISTRATION(rtl_cipher::initBF, "rtl_cipher"); // this macro creates an empty function, which will called by the RegisterAllFunctions() // to let the user the possibility to also register some functions by hand. -NOADDITIONAL; +CPPUNIT_PLUGIN_IMPLEMENT(); /* vim:set shiftwidth=4 softtabstop=4 expandtab: */ |