summaryrefslogtreecommitdiff
path: root/sal
diff options
context:
space:
mode:
authorTheo van Klaveren <theo.van.klaveren@gmail.com>2011-03-17 12:53:22 +0100
committerCaolán McNamara <caolanm@redhat.com>2011-03-18 09:34:13 +0000
commit138a5b7d19bd5956e14d4e6114d1aa14b57ad0a2 (patch)
tree112bf137fbf32f65fdede539df28c6d1505668fd /sal
parentada6b6704442595f384e021fc4f9f976b6aec522 (diff)
Make the qa/rtl/rtl_cipher unit test compile again.
Diffstat (limited to 'sal')
-rw-r--r--sal/qa/rtl/cipher/rtl_cipher.cxx112
1 files changed, 59 insertions, 53 deletions
diff --git a/sal/qa/rtl/cipher/rtl_cipher.cxx b/sal/qa/rtl/cipher/rtl_cipher.cxx
index 1fecdb34c4b6..27abd0a3755d 100644
--- a/sal/qa/rtl/cipher/rtl_cipher.cxx
+++ b/sal/qa/rtl/cipher/rtl_cipher.cxx
@@ -30,7 +30,12 @@
// MARKER(update_precomp.py): autogen include statement, do not remove
#include "precompiled_sal.hxx"
-#include <testshl/simpleheader.hxx>
+#include <cstring>
+
+#include <cppunit/TestFixture.h>
+#include <cppunit/extensions/HelperMacros.h>
+#include <cppunit/plugin/TestPlugIn.h>
+
#include <rtl/strbuf.hxx>
#include <rtl/cipher.h>
@@ -47,7 +52,8 @@ rtl::OString createHex(sal_uInt8 *_pKeyBuffer, sal_uInt32 _nKeyLen)
sal_Int32 nValue = (sal_Int32)_pKeyBuffer[i];
if (nValue < 16) // maximul hex value for 1 byte
{
- aBuffer.append( sal_Int32(0), 16 /* radix */ );
+ sal_Int32 nil = sal_Int32(0);
+ aBuffer.append( nil, 16 /* radix */ );
}
aBuffer.append( nValue, 16 /* radix */ );
}
@@ -205,8 +211,8 @@ public:
memset(pArgBuffer, 0, nArgLen);
pArgBuffer[0] = _nArgValue;
- t_print(T_VERBOSE, " init Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr());
- t_print(T_VERBOSE, " init Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr());
+ printf(" init Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr());
+ printf(" init Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr());
rtlCipherError aError = rtl_cipher_init(aCipher, rtl_Cipher_DirectionEncode, pKeyBuffer, nKeyLen, pArgBuffer, nArgLen);
CPPUNIT_ASSERT_MESSAGE("wrong init", aError == rtl_Cipher_E_None);
@@ -223,10 +229,10 @@ public:
/* rtlCipherError */ aError = rtl_cipher_encode(aCipher, pPlainTextBuffer, nPlainTextLen, pCipherBuffer, nCipherLen);
CPPUNIT_ASSERT_MESSAGE("wrong encode", aError == rtl_Cipher_E_None);
- t_print(T_VERBOSE, " Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr());
- t_print(T_VERBOSE, " Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr());
- t_print(T_VERBOSE, " Plain: %s\n", createHex(pPlainTextBuffer, nPlainTextLen).getStr());
- t_print( "Cipher Buf: %s\n", createHex(pCipherBuffer, nCipherLen).getStr());
+ printf(" Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr());
+ printf(" Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr());
+ printf(" Plain: %s\n", createHex(pPlainTextBuffer, nPlainTextLen).getStr());
+ printf( "Cipher Buf: %s\n", createHex(pCipherBuffer, nCipherLen).getStr());
sal_uInt32 nPlainText2Len = 16;
sal_uInt8 *pPlainText2Buffer = new sal_uInt8[ nPlainText2Len ];
@@ -236,10 +242,10 @@ public:
CPPUNIT_ASSERT_MESSAGE("decode should not work", aError != rtl_Cipher_E_None);
// rtl::OString sPlainText2Str((char*)pPlainText2Buffer, nPlainText2Len);
- // t_print(T_VERBOSE, " Plain: %s\n", createHex(pPlainText2Buffer, nPlainText2Len).getStr());
- // t_print(T_VERBOSE, " ascii: %s\n", sPlainText2Str.getStr());
+ // printf(" Plain: %s\n", createHex(pPlainText2Buffer, nPlainText2Len).getStr());
+ // printf(" ascii: %s\n", sPlainText2Str.getStr());
//
- // // t_print(" Buf: %s\n", createHex(pCipherBuffer, nCipherLen).getStr());
+ // // printf(" Buf: %s\n", createHex(pCipherBuffer, nCipherLen).getStr());
//
// sal_Int32 nCompare = memcmp(pPlainTextBuffer, pPlainText2Buffer, 16);
//
@@ -271,8 +277,8 @@ public:
memset(pArgBuffer, 0, nArgLen);
pArgBuffer[0] = _nArgValue;
- t_print(T_VERBOSE, " init Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr());
- t_print(T_VERBOSE, " init Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr());
+ printf(" init Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr());
+ printf(" init Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr());
rtlCipherError aError = rtl_cipher_init(aCipher, rtl_Cipher_DirectionBoth, pKeyBuffer, nKeyLen, pArgBuffer, nArgLen);
CPPUNIT_ASSERT_MESSAGE("wrong init", aError == rtl_Cipher_E_None);
@@ -289,10 +295,10 @@ public:
/* rtlCipherError */ aError = rtl_cipher_encode(aCipher, pPlainTextBuffer, nPlainTextLen, pCipherBuffer, nCipherLen);
CPPUNIT_ASSERT_MESSAGE("wrong encode", aError == rtl_Cipher_E_None);
- t_print(T_VERBOSE, " Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr());
- t_print(T_VERBOSE, " Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr());
- t_print(T_VERBOSE, " Plain: %s\n", createHex(pPlainTextBuffer, nPlainTextLen).getStr());
- t_print( "Cipher Buf: %s\n", createHex(pCipherBuffer, nCipherLen).getStr());
+ printf(" Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr());
+ printf(" Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr());
+ printf(" Plain: %s\n", createHex(pPlainTextBuffer, nPlainTextLen).getStr());
+ printf( "Cipher Buf: %s\n", createHex(pCipherBuffer, nCipherLen).getStr());
sal_uInt32 nPlainText2Len = 16;
sal_uInt8 *pPlainText2Buffer = new sal_uInt8[ nPlainText2Len ];
@@ -302,10 +308,10 @@ public:
CPPUNIT_ASSERT_MESSAGE("wrong decode", aError == rtl_Cipher_E_None);
rtl::OString sPlainText2Str((char*)pPlainText2Buffer, nPlainText2Len);
- t_print(T_VERBOSE, " Plain: %s\n", createHex(pPlainText2Buffer, nPlainText2Len).getStr());
- t_print(T_VERBOSE, " as ascii: %s\n", sPlainText2Str.getStr());
+ printf(" Plain: %s\n", createHex(pPlainText2Buffer, nPlainText2Len).getStr());
+ printf(" as ascii: %s\n", sPlainText2Str.getStr());
- // t_print(" Buf: %s\n", createHex(pCipherBuffer, nCipherLen).getStr());
+ // printf(" Buf: %s\n", createHex(pCipherBuffer, nCipherLen).getStr());
sal_Int32 nCompare = memcmp(pPlainTextBuffer, pPlainText2Buffer, 16);
@@ -454,8 +460,8 @@ public:
memset(pArgBuffer, 0, nArgLen);
pArgBuffer[0] = _nArgValue;
- t_print(T_VERBOSE, "init Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr());
- t_print(T_VERBOSE, "init Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr());
+ printf("init Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr());
+ printf("init Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr());
rtlCipherError aError = rtl_cipher_init(aCipher, rtl_Cipher_DirectionEncode, pKeyBuffer, nKeyLen, pArgBuffer, nArgLen);
CPPUNIT_ASSERT_MESSAGE("wrong init", aError == rtl_Cipher_E_None);
@@ -472,10 +478,10 @@ public:
/* rtlCipherError */ aError = rtl_cipher_encode(aCipher, pDataBuffer, nDataLen, pBuffer, nLen);
CPPUNIT_ASSERT_MESSAGE("wrong encode", aError == rtl_Cipher_E_None);
- t_print(T_VERBOSE, " Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr());
- t_print(T_VERBOSE, " Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr());
- t_print(T_VERBOSE, "Data: %s\n", createHex(pDataBuffer, nDataLen).getStr());
- t_print(T_VERBOSE, " Buf: %s\n", createHex(pBuffer, nLen).getStr());
+ printf(" Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr());
+ printf(" Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr());
+ printf("Data: %s\n", createHex(pDataBuffer, nDataLen).getStr());
+ printf(" Buf: %s\n", createHex(pBuffer, nLen).getStr());
delete [] pBuffer;
delete [] pDataBuffer;
@@ -557,14 +563,14 @@ public:
sal_uInt8 *pArgBuffer = new sal_uInt8[ nArgLen ];
memset(pArgBuffer, 0, nArgLen);
- t_print(T_VERBOSE, "Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr());
- t_print(T_VERBOSE, "Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr());
+ printf("Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr());
+ printf("Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr());
rtlCipherError aError = rtl_cipher_init(aCipher, rtl_Cipher_DirectionEncode, pKeyBuffer, nKeyLen, pArgBuffer, nArgLen);
CPPUNIT_ASSERT_MESSAGE("wrong init", aError == rtl_Cipher_E_None);
- t_print(T_VERBOSE, "Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr());
- t_print(T_VERBOSE, "Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr());
+ printf("Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr());
+ printf("Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr());
delete [] pArgBuffer;
delete [] pKeyBuffer;
@@ -586,14 +592,14 @@ public:
sal_uInt8 *pArgBuffer = new sal_uInt8[ nArgLen ];
memset(pArgBuffer, 0, nArgLen);
- t_print(T_VERBOSE, "Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr());
- t_print(T_VERBOSE, "Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr());
+ printf("Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr());
+ printf("Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr());
rtlCipherError aError = rtl_cipher_init(aCipher, rtl_Cipher_DirectionEncode, pKeyBuffer, nKeyLen, pArgBuffer, nArgLen);
CPPUNIT_ASSERT_MESSAGE("wrong init", aError == rtl_Cipher_E_None);
- t_print(T_VERBOSE, "Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr());
- t_print(T_VERBOSE, "Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr());
+ printf("Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr());
+ printf("Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr());
delete [] pArgBuffer;
delete [] pKeyBuffer;
@@ -614,14 +620,14 @@ public:
memset(pArgBuffer, 0, nArgLen);
pArgBuffer[0] = 1;
- t_print(T_VERBOSE, "Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr());
- t_print(T_VERBOSE, "Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr());
+ printf("Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr());
+ printf("Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr());
rtlCipherError aError = rtl_cipher_init(aCipher, rtl_Cipher_DirectionEncode, pKeyBuffer, nKeyLen, pArgBuffer, nArgLen);
CPPUNIT_ASSERT_MESSAGE("wrong init", aError == rtl_Cipher_E_None);
- t_print(T_VERBOSE, "Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr());
- t_print(T_VERBOSE, "Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr());
+ printf("Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr());
+ printf("Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr());
delete [] pArgBuffer;
delete [] pKeyBuffer;
@@ -643,14 +649,14 @@ public:
memset(pArgBuffer, 0, nArgLen);
pArgBuffer[0] = 1;
- t_print(T_VERBOSE, "Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr());
- t_print(T_VERBOSE, "Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr());
+ printf("Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr());
+ printf("Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr());
rtlCipherError aError = rtl_cipher_init(aCipher, rtl_Cipher_DirectionEncode, pKeyBuffer, nKeyLen, pArgBuffer, nArgLen);
CPPUNIT_ASSERT_MESSAGE("wrong init", aError == rtl_Cipher_E_None);
- t_print(T_VERBOSE, "Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr());
- t_print(T_VERBOSE, "Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr());
+ printf("Key: %s\n", createHex(pKeyBuffer, nKeyLen).getStr());
+ printf("Arg: %s\n", createHex(pArgBuffer, nArgLen).getStr());
delete [] pArgBuffer;
delete [] pKeyBuffer;
@@ -697,16 +703,16 @@ public:
// -----------------------------------------------------------------------------
-CPPUNIT_TEST_SUITE_NAMED_REGISTRATION(rtl_cipher::create, "rtl_cipher");
-CPPUNIT_TEST_SUITE_NAMED_REGISTRATION(rtl_cipher::createBF, "rtl_cipher");
-CPPUNIT_TEST_SUITE_NAMED_REGISTRATION(rtl_cipher::decode, "rtl_cipher");
-CPPUNIT_TEST_SUITE_NAMED_REGISTRATION(rtl_cipher::decodeBF, "rtl_cipher");
-CPPUNIT_TEST_SUITE_NAMED_REGISTRATION(rtl_cipher::destroy, "rtl_cipher");
-CPPUNIT_TEST_SUITE_NAMED_REGISTRATION(rtl_cipher::destroyBF, "rtl_cipher");
-CPPUNIT_TEST_SUITE_NAMED_REGISTRATION(rtl_cipher::encode, "rtl_cipher");
-CPPUNIT_TEST_SUITE_NAMED_REGISTRATION(rtl_cipher::encodeBF, "rtl_cipher");
-CPPUNIT_TEST_SUITE_NAMED_REGISTRATION(rtl_cipher::init, "rtl_cipher");
-CPPUNIT_TEST_SUITE_NAMED_REGISTRATION(rtl_cipher::initBF, "rtl_cipher");
+CPPUNIT_TEST_SUITE_REGISTRATION(rtl_cipher::create);
+CPPUNIT_TEST_SUITE_REGISTRATION(rtl_cipher::createBF);
+CPPUNIT_TEST_SUITE_REGISTRATION(rtl_cipher::decode);
+CPPUNIT_TEST_SUITE_REGISTRATION(rtl_cipher::decodeBF);
+CPPUNIT_TEST_SUITE_REGISTRATION(rtl_cipher::destroy);
+CPPUNIT_TEST_SUITE_REGISTRATION(rtl_cipher::destroyBF);
+CPPUNIT_TEST_SUITE_REGISTRATION(rtl_cipher::encode);
+CPPUNIT_TEST_SUITE_REGISTRATION(rtl_cipher::encodeBF);
+CPPUNIT_TEST_SUITE_REGISTRATION(rtl_cipher::init);
+CPPUNIT_TEST_SUITE_REGISTRATION(rtl_cipher::initBF);
} // namespace rtl_cipher
@@ -715,6 +721,6 @@ CPPUNIT_TEST_SUITE_NAMED_REGISTRATION(rtl_cipher::initBF, "rtl_cipher");
// this macro creates an empty function, which will called by the RegisterAllFunctions()
// to let the user the possibility to also register some functions by hand.
-NOADDITIONAL;
+CPPUNIT_PLUGIN_IMPLEMENT();
/* vim:set shiftwidth=4 softtabstop=4 expandtab: */