diff --git a/tests/unit/s2n_signature_scheme_test.c b/tests/unit/s2n_signature_scheme_test.c index a2c6110ce00..0d7c90cab34 100644 --- a/tests/unit/s2n_signature_scheme_test.c +++ b/tests/unit/s2n_signature_scheme_test.c @@ -30,6 +30,10 @@ int main(int argc, char **argv) security_policy_selection[policy_i].security_policy->signature_preferences; for (size_t sig_i = 0; sig_i < sig_prefs->count; sig_i++) { const struct s2n_signature_scheme *const sig_scheme = sig_prefs->signature_schemes[sig_i]; + fprintf(stderr, "sig_scheme: %s (%p)\n", sig_scheme->iana_name, sig_scheme); + fprintf(stderr, "sig_prefs->signature_schemes[sig_i]: %s (%p)\n", + sig_prefs->signature_schemes[sig_i]->iana_name, + sig_prefs->signature_schemes[sig_i]); EXPECT_NOT_EQUAL(sig_scheme->iana_value, 0); EXPECT_NOT_EQUAL(sig_scheme->hash_alg, S2N_HASH_NONE); @@ -57,9 +61,17 @@ int main(int argc, char **argv) bool in_all = false; for (size_t all_i = 0; all_i < all_prefs->count; all_i++) { if (sig_scheme == all_prefs->signature_schemes[all_i]) { + fprintf(stderr, "%s (%p) MATCHES %s (%p)\n", + sig_scheme->iana_name, sig_scheme, + all_prefs->signature_schemes[all_i]->iana_name, all_prefs->signature_schemes[all_i]); in_all = true; + break; } + fprintf(stderr, " %s (%p) does not match %s (%p)\n", + sig_scheme->iana_name, sig_scheme, + all_prefs->signature_schemes[all_i]->iana_name, all_prefs->signature_schemes[all_i]); } + fprintf(stderr, "s2n_ecdsa_sha256 is %p\n", &s2n_ecdsa_sha256); EXPECT_TRUE(in_all); } policy_i++; @@ -77,6 +89,7 @@ int main(int argc, char **argv) for (size_t i = 0; i < all_prefs->count; i++) { if (all_prefs->signature_schemes[i] == &s2n_rsa_pkcs1_md5_sha1) { includes_md5_sha1 = true; + break; } } EXPECT_TRUE(includes_md5_sha1); @@ -91,6 +104,7 @@ int main(int argc, char **argv) for (size_t i = 0; i < all_prefs->count; i++) { if (all_prefs->signature_schemes[i] == &s2n_null_sig_scheme) { includes_null = true; + break; } } EXPECT_FALSE(includes_null);