This as well for Mimi.

Regards--
Subrata

On Fri, 2009-07-31 at 01:38 -0700, Garrett Cooper wrote: 
> 1. None of the ima C files which required openssl/sha.h were using the
> HAVE_OPENSSL_SHA_H macro define.
> 2. Add tst_resm support.
> 3. Fix some missing includes in ima_mmap.c.
> 4. Remove an unused var.
> 5. Shuffle around some fields in ima_boot_aggregate.c so that it
> compiles with -Wunused and consumes less memory when 1. applies.
> 
> Signed-off-by: Garrett Cooper <[email protected]>
> 
> Index: testcases/kernel/security/integrity/ima/src/ima_boot_aggregate.c
> ===================================================================
> RCS file: 
> /cvsroot/ltp/ltp/testcases/kernel/security/integrity/ima/src/ima_boot_aggregate.c,v
> retrieving revision 1.1
> diff -u -r1.1 ima_boot_aggregate.c
> --- testcases/kernel/security/integrity/ima/src/ima_boot_aggregate.c  31
> Mar 2009 13:58:14 -0000       1.1
> +++ testcases/kernel/security/integrity/ima/src/ima_boot_aggregate.c  31
> Jul 2009 08:37:08 -0000
> @@ -23,14 +23,21 @@
>  #include <fcntl.h>
>  #include <string.h>
>  #include <unistd.h>
> +#include "config.h"
> +#include "test.h"
> +#if HAVE_OPENSSL_SHA_H
>  #include <openssl/sha.h>
> +#endif
> 
>  #define MAX_EVENT_SIZE 500
>  #define EVENT_HEADER_SIZE 32
>  #define MAX_EVENT_DATA_SIZE (MAX_EVENT_SIZE - EVENT_HEADER_SIZE)
>  #define NUM_PCRS 8   /*  PCR registers 0-7 in boot aggregate */
> 
> -static void *display_sha1_digest(char *pcr)
> +char *TCID = "ima_boot_aggregate";
> +int TST_TOTAL = 1;
> +
> +static void display_sha1_digest(unsigned char *pcr)
>  {
>       int i;
> 
> @@ -39,8 +46,10 @@
>       printf("\n");
>  }
> 
> -int main(int argc, char *argv[])
> +int
> +main(int argc, char *argv[])
>  {
> +#if HAVE_OPENSSL_SHA_H
>       unsigned char boot_aggregate[SHA_DIGEST_LENGTH];
>       struct {
>               struct {
> @@ -74,7 +83,7 @@
>               memset(&pcr[i].digest, 0, SHA_DIGEST_LENGTH);
> 
>       /* Extend the pseudo PCRs with the event digest */
> -     while (fread(&event, sizeof event.header, 1, fp)) {
> +     while (fread(&event, sizeof(event.header), 1, fp)) {
>               if (debug) {
>                       printf("%03u ", event.header.pcr);
>                       display_sha1_digest(event.header.digest);
> @@ -105,6 +114,8 @@
> 
>       printf("boot_aggregate:");
>       display_sha1_digest(boot_aggregate);
> -
> -     return 0;
> +#else
> +     tst_resm(TCONF, "System doesn't have openssl/sha.h");
> +#endif
> +     tst_exit();
>  }
> Index: testcases/kernel/security/integrity/ima/src/ima_measure.c
> ===================================================================
> RCS file: 
> /cvsroot/ltp/ltp/testcases/kernel/security/integrity/ima/src/ima_measure.c,v
> retrieving revision 1.1
> diff -u -r1.1 ima_measure.c
> --- testcases/kernel/security/integrity/ima/src/ima_measure.c 31 Mar
> 2009 13:58:14 -0000   1.1
> +++ testcases/kernel/security/integrity/ima/src/ima_measure.c 31 Jul
> 2009 08:37:08 -0000
> @@ -22,18 +22,23 @@
>  #include <fcntl.h>
>  #include <string.h>
>  #include <unistd.h>
> +//#include "config.h"
> +#include "test.h"
> +#if HAVE_OPENSSL_SHA_H
>  #include <openssl/sha.h>
> +#endif
> 
>  #define TCG_EVENT_NAME_LEN_MAX       255
> 
> -static int verbose = 0;
> -static int validate = 0;
> -static int verify = 0;
> +char *TCID = "ima_measure";
> +int TST_TOTAL = 1;
> 
>  #define print_info(format, arg...) \
>       if (verbose) \
>               printf(format, ##arg)
> 
> +#if HAVE_OPENSSL_SHA_H
> +
>  static u_int8_t zero[SHA_DIGEST_LENGTH];
>  static u_int8_t fox[SHA_DIGEST_LENGTH];
> 
> @@ -90,6 +95,8 @@
>       return 0;
>  }
> 
> +#endif
> +
>  /*
>   * ima_measurements.c - calculate the SHA1 aggregate-pcr value based
>   * on the IMA runtime binary measurements.
> @@ -120,13 +127,19 @@
>   * Return code: if verification enabled, returns number of verification
>   *           errors.
>   */
> -int main(int argc, char *argv[])
> +int
> +main(int argc, char *argv[])
>  {
> +
> +#if HAVE_OPENSSL_SHA_H
>       FILE *fp;
>       struct event template;
>       u_int8_t pcr[SHA_DIGEST_LENGTH];
>       int i, count = 0, len;
> -     int failed_count = 0;   /* number of template verifications failed */
> +
> +     int verbose = 0;
> +     int validate = 0;
> +     int verify = 0;
> 
>       if (argc < 2) {
>               printf("format: %s binary_runtime_measurements" \
> @@ -191,12 +204,17 @@
>               print_info(" %s\n", template.ima_data.filename);
> 
>               if (verify)
> -                     failed_count += verify_template_hash(&template);
> +                     if (verify_template_hash(&template) != 0) {
> +                             tst_resm(TFAIL, "Hash failed");
> +                     }
>       }
>       fclose(fp);
> 
>       verbose=1;
>       print_info("PCRAggr (re-calculated):");
>       display_sha1_digest(pcr);
> -     return failed_count;
> +#else
> +     tst_resm(TCONF, "System doesn't have openssl/sha.h");
> +#endif
> +     tst_exit();
>  }
> Index: testcases/kernel/security/integrity/ima/src/ima_mmap.c
> ===================================================================
> RCS file: 
> /cvsroot/ltp/ltp/testcases/kernel/security/integrity/ima/src/ima_mmap.c,v
> retrieving revision 1.2
> diff -u -r1.2 ima_mmap.c
> --- testcases/kernel/security/integrity/ima/src/ima_mmap.c    19 May 2009
> 09:57:42 -0000        1.2
> +++ testcases/kernel/security/integrity/ima/src/ima_mmap.c    31 Jul 2009
> 08:37:08 -0000
> @@ -16,16 +16,20 @@
>   */
>  #include <stdio.h>
>  #include <string.h>
> +#include <unistd.h>
>  #include <sys/stat.h>
>  #include <sys/mman.h>
>  #include <fcntl.h>
> +#include "test.h"
> +
> +char *TCID = "ima_mmap";
> +int TST_TOTAL = 1;
> 
>  int main(int argc, char *argv[])
>  {
>       int fd;
>       void *file;
>       char *filename;
> -     int rc;
> 
>       if (argc != 2)
>               printf("%s: filename\n", argv[1]);
> @@ -48,6 +52,5 @@
>               perror("unmap");
>               return(-1);
>       }
> -
> -     return 0;
> +     tst_exit();
>  }
> 
> ------------------------------------------------------------------------------
> Let Crystal Reports handle the reporting - Free Crystal Reports 2008 30-Day 
> trial. Simplify your report design, integration and deployment - and focus on 
> what you do best, core application coding. Discover what's new with 
> Crystal Reports now.  http://p.sf.net/sfu/bobj-july
> _______________________________________________
> Ltp-list mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/ltp-list


------------------------------------------------------------------------------
Let Crystal Reports handle the reporting - Free Crystal Reports 2008 30-Day 
trial. Simplify your report design, integration and deployment - and focus on 
what you do best, core application coding. Discover what's new with 
Crystal Reports now.  http://p.sf.net/sfu/bobj-july
_______________________________________________
Ltp-list mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/ltp-list

Reply via email to