\r
#include "TestBaseCryptLib.h"\r
\r
-\r
//\r
// Password-protected PEM Key data for RSA Private Key Retrieving (encryption key is "client").\r
// (Generated by OpenSSL utility).\r
// password should match PemPass in this file\r
// $ xxd --include TestKeyPem\r
//\r
-GLOBAL_REMOVE_IF_UNREFERENCED CONST UINT8 TestKeyPem[] = {\r
- 0x2d, 0x2d, 0x2d, 0x2d, 0x2d, 0x42, 0x45, 0x47, 0x49, 0x4e, 0x20, 0x52,\r
+GLOBAL_REMOVE_IF_UNREFERENCED CONST UINT8 TestKeyPem[] = {\r
+ 0x2d, 0x2d, 0x2d, 0x2d, 0x2d, 0x42, 0x45, 0x47, 0x49, 0x4e, 0x20, 0x52,\r
0x53, 0x41, 0x20, 0x50, 0x52, 0x49, 0x56, 0x41, 0x54, 0x45, 0x20, 0x4b,\r
0x45, 0x59, 0x2d, 0x2d, 0x2d, 0x2d, 0x2d, 0x0a, 0x50, 0x72, 0x6f, 0x63,\r
0x2d, 0x54, 0x79, 0x70, 0x65, 0x3a, 0x20, 0x34, 0x2c, 0x45, 0x4e, 0x43,\r
0x2d, 0x2d, 0x2d, 0x2d, 0x2d, 0x45, 0x4e, 0x44, 0x20, 0x52, 0x53, 0x41,\r
0x20, 0x50, 0x52, 0x49, 0x56, 0x41, 0x54, 0x45, 0x20, 0x4b, 0x45, 0x59,\r
0x2d, 0x2d, 0x2d, 0x2d, 0x2d, 0x0a\r
- };\r
+};\r
\r
//\r
// Password for private key retrieving from encrypted PEM ("TestKeyPem").\r
//\r
-GLOBAL_REMOVE_IF_UNREFERENCED CONST CHAR8 *PemPass = "client";\r
+GLOBAL_REMOVE_IF_UNREFERENCED CONST CHAR8 *PemPass = "client";\r
\r
//\r
// Test CA X509 Certificate for X509 Verification Routine (Generated by OpenSSL utility).\r
// use password from PemPass variable in this file\r
// $ xxd --include TestCACert\r
//\r
-GLOBAL_REMOVE_IF_UNREFERENCED CONST UINT8 TestCACert[] = {\r
+GLOBAL_REMOVE_IF_UNREFERENCED CONST UINT8 TestCACert[] = {\r
0x30, 0x82, 0x02, 0x98, 0x30, 0x82, 0x02, 0x01, 0xa0, 0x03, 0x02, 0x01,\r
0x02, 0x02, 0x14, 0x39, 0xde, 0x9e, 0xce, 0x3a, 0x36, 0x11, 0x38, 0x6f,\r
0x64, 0xb4, 0x69, 0xa7, 0x93, 0xdd, 0xff, 0xbd, 0x3e, 0x75, 0x6a, 0x30,\r
// $ openssl x509 -days 10000 -CA TestCACert.pem -CAkey TestKeyPem -req -out TestCert -set_serial 3432 --outform DER -in TestCertCsr\r
// password should be in the PemPass variable\r
// $ xxd --include TestCert\r
-GLOBAL_REMOVE_IF_UNREFERENCED CONST UINT8 TestCert[] = {\r
+GLOBAL_REMOVE_IF_UNREFERENCED CONST UINT8 TestCert[] = {\r
0x30, 0x82, 0x02, 0x31, 0x30, 0x82, 0x01, 0x9a, 0x02, 0x02, 0x0d, 0x68,\r
0x30, 0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01,\r
0x0b, 0x05, 0x00, 0x30, 0x5e, 0x31, 0x0b, 0x30, 0x09, 0x06, 0x03, 0x55,\r
//\r
// Message Hash for Signing & Verification Validation.\r
//\r
-GLOBAL_REMOVE_IF_UNREFERENCED CONST UINT8 MsgHash[] = {\r
+GLOBAL_REMOVE_IF_UNREFERENCED CONST UINT8 MsgHash[] = {\r
0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09,\r
0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09\r
- };\r
+};\r
\r
//\r
// Payload for PKCS#7 Signing & Verification Validation.\r
//\r
-GLOBAL_REMOVE_IF_UNREFERENCED CONST CHAR8 *Payload = "Payload Data for PKCS#7 Signing";\r
-\r
+GLOBAL_REMOVE_IF_UNREFERENCED CONST CHAR8 *Payload = "Payload Data for PKCS#7 Signing";\r
\r
UNIT_TEST_STATUS\r
EFIAPI\r
TestVerifyRsaCertPkcs1SignVerify (\r
- IN UNIT_TEST_CONTEXT Context\r
+ IN UNIT_TEST_CONTEXT Context\r
)\r
{\r
BOOLEAN Status;\r
// X509 Certificate Subject Retrieving.\r
//\r
SubjectSize = 0;\r
- Status = X509GetSubjectName (TestCert, sizeof (TestCert), NULL, &SubjectSize);\r
- Subject = (UINT8 *)AllocatePool (SubjectSize);\r
- Status = X509GetSubjectName (TestCert, sizeof (TestCert), Subject, &SubjectSize);\r
+ Status = X509GetSubjectName (TestCert, sizeof (TestCert), NULL, &SubjectSize);\r
+ Subject = (UINT8 *)AllocatePool (SubjectSize);\r
+ Status = X509GetSubjectName (TestCert, sizeof (TestCert), Subject, &SubjectSize);\r
UT_ASSERT_TRUE (Status);\r
\r
//\r
//\r
// Release Resources.\r
//\r
- RsaFree (RsaPubKey);\r
- RsaFree (RsaPrivKey);\r
+ RsaFree (RsaPubKey);\r
+ RsaFree (RsaPrivKey);\r
FreePool (Signature);\r
FreePool (Subject);\r
\r
UNIT_TEST_STATUS\r
EFIAPI\r
TestVerifyPkcs7SignVerify (\r
- IN UNIT_TEST_CONTEXT Context\r
+ IN UNIT_TEST_CONTEXT Context\r
)\r
{\r
BOOLEAN Status;\r
//\r
// Construct Signer Certificate from RAW data.\r
//\r
- Status = X509ConstructCertificate (TestCert, sizeof (TestCert), (UINT8 **) &SignCert);\r
+ Status = X509ConstructCertificate (TestCert, sizeof (TestCert), (UINT8 **)&SignCert);\r
UT_ASSERT_TRUE (Status);\r
UT_ASSERT_NOT_NULL (SignCert);\r
\r
Status = Pkcs7Sign (\r
TestKeyPem,\r
sizeof (TestKeyPem),\r
- (CONST UINT8 *) PemPass,\r
- (UINT8 *) Payload,\r
+ (CONST UINT8 *)PemPass,\r
+ (UINT8 *)Payload,\r
AsciiStrLen (Payload),\r
SignCert,\r
NULL,\r
P7SignedDataSize,\r
TestCACert,\r
sizeof (TestCACert),\r
- (UINT8 *) Payload,\r
+ (UINT8 *)Payload,\r
AsciiStrLen (Payload)\r
);\r
UT_ASSERT_TRUE (Status);\r
if (P7SignedData != NULL) {\r
FreePool (P7SignedData);\r
}\r
+\r
if (SignCert != NULL) {\r
X509Free (SignCert);\r
}\r
return UNIT_TEST_PASSED;\r
}\r
\r
-TEST_DESC mRsaCertTest[] = {\r
- //\r
- // -----Description--------------------------------------Class----------------------Function-----------------Pre---Post--Context\r
- //\r
- {"TestVerifyRsaCertPkcs1SignVerify()", "CryptoPkg.BaseCryptLib.RsaCert", TestVerifyRsaCertPkcs1SignVerify, NULL, NULL, NULL},\r
+TEST_DESC mRsaCertTest[] = {\r
+ //\r
+ // -----Description--------------------------------------Class----------------------Function-----------------Pre---Post--Context\r
+ //\r
+ { "TestVerifyRsaCertPkcs1SignVerify()", "CryptoPkg.BaseCryptLib.RsaCert", TestVerifyRsaCertPkcs1SignVerify, NULL, NULL, NULL },\r
};\r
\r
-UINTN mRsaCertTestNum = ARRAY_SIZE(mRsaCertTest);\r
+UINTN mRsaCertTestNum = ARRAY_SIZE (mRsaCertTest);\r
\r
-TEST_DESC mPkcs7Test[] = {\r
- //\r
- // -----Description--------------------------------------Class----------------------Function-----------------Pre---Post--Context\r
- //\r
- {"TestVerifyPkcs7SignVerify()", "CryptoPkg.BaseCryptLib.Pkcs7", TestVerifyPkcs7SignVerify, NULL, NULL, NULL},\r
+TEST_DESC mPkcs7Test[] = {\r
+ //\r
+ // -----Description--------------------------------------Class----------------------Function-----------------Pre---Post--Context\r
+ //\r
+ { "TestVerifyPkcs7SignVerify()", "CryptoPkg.BaseCryptLib.Pkcs7", TestVerifyPkcs7SignVerify, NULL, NULL, NULL },\r
};\r
\r
-UINTN mPkcs7TestNum = ARRAY_SIZE(mPkcs7Test);\r
+UINTN mPkcs7TestNum = ARRAY_SIZE (mPkcs7Test);\r