summaryrefslogtreecommitdiff
path: root/tests/pubkey.c
diff options
context:
space:
mode:
authorNIIBE Yutaka <gniibe@fsij.org>2021-12-09 09:47:47 +0900
committerNIIBE Yutaka <gniibe@fsij.org>2021-12-09 09:47:47 +0900
commit7d8403b59a105d2d3e5d0fd9d5d25b7e3b2d2787 (patch)
treedc75473b4721e8588bf8fac1b23f24d7558c2ba5 /tests/pubkey.c
parent5b82f4b4dbf393d0ce901fc9e0c559c488b013cb (diff)
downloadlibgcrypt-7d8403b59a105d2d3e5d0fd9d5d25b7e3b2d2787.tar.gz
tests,fips: Align the use of variable in_fips_mode.
* tests/pubkey.c (check_run): Fix use of pkey and skey. * tests/*.c (in_fips_mode): No initialize by 0. -- There are no cases where *_key_new allocates pkey and skey when IN_FIPS_MODE!=0. Nevertheless, from viewpoint of resource management, calling gcry_sexp_release always is easier for maintenance. Signed-off-by: NIIBE Yutaka <gniibe@fsij.org>
Diffstat (limited to 'tests/pubkey.c')
-rw-r--r--tests/pubkey.c53
1 files changed, 33 insertions, 20 deletions
diff --git a/tests/pubkey.c b/tests/pubkey.c
index 751f508c..c5510d05 100644
--- a/tests/pubkey.c
+++ b/tests/pubkey.c
@@ -728,6 +728,7 @@ check_run (void)
gcry_sexp_t pkey, skey;
int variant;
+ pkey = skey = NULL;
for (variant=0; variant < 3; variant++)
{
if (verbose)
@@ -742,6 +743,7 @@ check_run (void)
check_keys (pkey, skey, 800, variant == 2? GPG_ERR_NO_OBJ : 0);
gcry_sexp_release (pkey);
gcry_sexp_release (skey);
+ pkey = skey = NULL;
}
if (verbose)
@@ -750,6 +752,7 @@ check_run (void)
check_keys (pkey, skey, 800, 0);
gcry_sexp_release (pkey);
gcry_sexp_release (skey);
+ pkey = skey = NULL;
if (verbose)
fprintf (stderr, "Checking generated RSA key (X9.31).\n");
@@ -757,26 +760,25 @@ check_run (void)
check_keys (pkey, skey, 800, 0);
gcry_sexp_release (pkey);
gcry_sexp_release (skey);
+ pkey = skey = NULL;
if (verbose)
fprintf (stderr, "Checking generated Elgamal key.\n");
get_elg_key_new (&pkey, &skey, 0);
if (!in_fips_mode)
- {
- check_keys (pkey, skey, 400, 0);
- gcry_sexp_release (pkey);
- gcry_sexp_release (skey);
- }
+ check_keys (pkey, skey, 400, 0);
+ gcry_sexp_release (pkey);
+ gcry_sexp_release (skey);
+ pkey = skey = NULL;
if (verbose)
fprintf (stderr, "Checking passphrase generated Elgamal key.\n");
get_elg_key_new (&pkey, &skey, 1);
if (!in_fips_mode)
- {
- check_keys (pkey, skey, 800, 0);
- gcry_sexp_release (pkey);
- gcry_sexp_release (skey);
- }
+ check_keys (pkey, skey, 800, 0);
+ gcry_sexp_release (pkey);
+ gcry_sexp_release (skey);
+ pkey = skey = NULL;
if (verbose)
fprintf (stderr, "Generating DSA key.\n");
@@ -784,19 +786,24 @@ check_run (void)
if (!in_fips_mode)
{
/* Fixme: Add a check function for DSA keys. */
- gcry_sexp_release (pkey);
- gcry_sexp_release (skey);
+ ;
}
+ gcry_sexp_release (pkey);
+ gcry_sexp_release (skey);
+ pkey = skey = NULL;
+
if (verbose)
fprintf (stderr, "Generating transient DSA key.\n");
get_dsa_key_new (&pkey, &skey, 1);
if (!in_fips_mode)
{
/* Fixme: Add a check function for DSA keys. */
- gcry_sexp_release (pkey);
- gcry_sexp_release (skey);
+ ;
}
+ gcry_sexp_release (pkey);
+ gcry_sexp_release (skey);
+ pkey = skey = NULL;
if (verbose)
fprintf (stderr, "Generating DSA key (FIPS 186).\n");
@@ -804,9 +811,11 @@ check_run (void)
if (!in_fips_mode)
{
/* Fixme: Add a check function for DSA keys. */
- gcry_sexp_release (pkey);
- gcry_sexp_release (skey);
+ ;
}
+ gcry_sexp_release (pkey);
+ gcry_sexp_release (skey);
+ pkey = skey = NULL;
if (verbose)
fprintf (stderr, "Generating DSA key with given domain.\n");
@@ -814,9 +823,11 @@ check_run (void)
if (!in_fips_mode)
{
/* Fixme: Add a check function for DSA keys. */
- gcry_sexp_release (pkey);
- gcry_sexp_release (skey);
+ ;
}
+ gcry_sexp_release (pkey);
+ gcry_sexp_release (skey);
+ pkey = skey = NULL;
/* We need new test vectors for get_dsa_key_fips186_with_domain_new. */
if (verbose)
@@ -833,9 +844,11 @@ check_run (void)
if (!in_fips_mode)
{
/* Fixme: Add a check function for DSA keys. */
- gcry_sexp_release (pkey);
- gcry_sexp_release (skey);
+ ;
}
+ gcry_sexp_release (pkey);
+ gcry_sexp_release (skey);
+ pkey = skey = NULL;
}