#ifndef lint
static char *rcsid = "$Id: nameprep.tsy,v 1.1 2003/06/04 00:26:56 marka Exp $";
#endif
/*
* Copyright (c) 2002 Japan Network Information Center.
* All rights reserved.
*
* By using this file, you agree to the terms and conditions set forth bellow.
*
* LICENSE TERMS AND CONDITIONS
*
* The following License Terms and Conditions apply, unless a different
* license is obtained from Japan Network Information Center ("JPNIC"),
* a Japanese association, Kokusai-Kougyou-Kanda Bldg 6F, 2-3-4 Uchi-Kanda,
* Chiyoda-ku, Tokyo 101-0047, Japan.
*
* 1. Use, Modification and Redistribution (including distribution of any
* modified or derived work) in source and/or binary forms is permitted
* under this License Terms and Conditions.
*
* 2. Redistribution of source code must retain the copyright notices as they
* appear in each source code file, this License Terms and Conditions.
*
* 3. Redistribution in binary form must reproduce the Copyright Notice,
* this License Terms and Conditions, in the documentation and/or other
* materials provided with the distribution. For the purposes of binary
* distribution the "Copyright Notice" refers to the following language:
* "Copyright (c) 2000-2002 Japan Network Information Center. All rights reserved."
*
* 4. The name of JPNIC may not be used to endorse or promote products
* derived from this Software without specific prior written approval of
* JPNIC.
*
* 5. Disclaimer/Limitation of Liability: THIS SOFTWARE IS PROVIDED BY JPNIC
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
* PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL JPNIC BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
* OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
* ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
*/
#include <stddef.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <idn/nameprep.h>
#include <idn/log.h>
#include "testutil.h"
#define UCS4_NAME 0x304C /* hiragana letter ga */
#define BUF_SIZE 4
/*
* Sample string for `from' argument for map(),
* and its expected outputs.
*/
static const unsigned long map_from[] = {
0x0041, /* latin capital letter a */
0x0042, /* latin capital letter b */
UCS4_NAME,
0x0000
};
static const unsigned long map_expected[] = {
0x0061, /* latin small letter a */
0x0062, /* latin small letter b */
UCS4_NAME,
0x0000
};
/*
* Sample string for `from' argument for isprohibited().
*/
static const unsigned long check_from[4] = {
UCS4_NAME,
0x00A0, /* no-break space: prohibited character */
0x0221, /* unassigned character */
0x0000
};
#define FROM_UCS4NAME_OFFSET 0
#define FROM_PROH_OFFSET 1
#define FROM_UNAS_OFFSET 2
/*
* Sample string for `from' argument for isunassigned().
*/
static const unsigned long check_from2[4] = {
UCS4_NAME,
0x0221, /* unassigned character */
0x00A0, /* no-break space: prohibited character */
0x0000
};
#define FROM2_UCS4NAME_OFFSET 0
#define FROM2_PROH_OFFSET 2
#define FROM2_UNAS_OFFSET 1
/*
* Sample string for `from' argument for isvalidbidi().
* (It is not a valid bidi label.)
*/
static const unsigned long bidi_from[4] = {
0x05BE, /* hebrew punctuation maqaf */
0x0041, /* latin capital letter a */
0xFEFC, /* arabic ligature lam with alef final form */
0x0000
};
#define BIDIFROM_OFFSET 1
/*
* Empty string.
*/
static const unsigned long ucs4_nullstr[] = {
0x0000
};
//--------------------------------------------------------------------
// Setups and Teardowns.
//--------------------------------------------------------------------
//# SETUP
// group: generic
//--
// Nothing happens.
{
idn_result_t r;
idn_nameprep_t handle = NULL;
}
//# SETUP
// group: check
//--
// Initialize the module and create contexts.
{
idn_result_t r;
idn_nameprep_t handle11 = NULL;
r = idn_nameprep_create("RFC3491", &handle11);
ASSERT_RESULT(r, idn_success);
}
//# TEARDOWN
// group: check
//--
// Destroy contexts.
{
if (handle11 != NULL) {
idn_nameprep_destroy(handle11);
}
}
//# SETUP
// group: quiet
//--
// Set log level to `fatal' to supress log messages.
{
int saved_log_level;
saved_log_level = idn_log_getlevel();
idn_log_setlevel(idn_log_level_fatal);
}
//# TEARDOWN
// group: quiet
//--
// Restore log level.
{
idn_log_setlevel(saved_log_level);
}
//--------------------------------------------------------------------
// Testcases.
//--------------------------------------------------------------------
//# TESTCASE
// title: idn_nameprep_create() - boundary condition
// group: generic quiet
{
r = idn_nameprep_create("", &handle);
ASSERT_RESULT(r, idn_notfound);
}
//# TESTCASE
// title: idn_nameprep_create() - version is NULL (current nameprep)
// group: generic quiet
{
unsigned long to[BUF_SIZE];
const unsigned long *found;
r = idn_nameprep_create(NULL, &handle);
ASSERT_RESULT(r, idn_success);
r = idn_nameprep_map(handle, map_from, to, BUF_SIZE);
ASSERT_RESULT(r, idn_success);
ASSERT_UCS4STRING(to, map_expected);
r = idn_nameprep_isunassigned(handle, check_from, &found);
ASSERT_RESULT(r, idn_success);
ASSERT_PTR(found, check_from + FROM_UNAS_OFFSET);
r = idn_nameprep_isprohibited(handle, check_from, &found);
ASSERT_RESULT(r, idn_success);
ASSERT_PTR(found, check_from + FROM_PROH_OFFSET);
r = idn_nameprep_isvalidbidi(handle, bidi_from, &found);
ASSERT_RESULT(r, idn_success);
ASSERT_PTR(found, bidi_from + BIDIFROM_OFFSET);
idn_nameprep_destroy(handle);
}
//# TESTCASE
// title: idn_nameprep_create() - nameprep-01
// group: generic quiet
{
r = idn_nameprep_create("nameprep-01", &handle);
ASSERT_RESULT(r, idn_notfound);
}
//# TESTCASE
// title: idn_nameprep_create() - RFC3491
// group: generic
{
r = idn_nameprep_create("RFC3491", &handle);
ASSERT_RESULT(r, idn_success);
idn_nameprep_destroy(handle);
}
//# TESTCASE
// title: idn_nameprep_map() - boundary condition
// group: check
{
unsigned long to[BUF_SIZE];
r = idn_nameprep_map(handle11, ucs4_nullstr, to, 0);
ASSERT_RESULT(r, idn_buffer_overflow);
r = idn_nameprep_map(handle11, ucs4_nullstr, to, 1);
ASSERT_RESULT(r, idn_success);
ASSERT_UCS4STRING(to, ucs4_nullstr);
}
//# TESTCASE
// title: idn_nameprep_map() - RFC3491
// group: check
{
unsigned long to[BUF_SIZE];
r = idn_nameprep_map(handle11, map_from, to, 0);
ASSERT_RESULT(r, idn_buffer_overflow);
r = idn_nameprep_map(handle11, map_from, to, BUF_SIZE - 1);
ASSERT_RESULT(r, idn_buffer_overflow);
r = idn_nameprep_map(handle11, map_from, to, BUF_SIZE);
ASSERT_RESULT(r, idn_success);
ASSERT_UCS4STRING(to, map_expected);
}
//# TESTCASE
// title: idn_nameprep_isunassigned() - boundary condition
// group: check
{
const unsigned long *found;
r = idn_nameprep_isunassigned(handle11, ucs4_nullstr, &found);
ASSERT_RESULT(r, idn_success);
ASSERT_PTR(found, NULL);
}
//# TESTCASE
// title: idn_nameprep_isunassigned() - RFC3491
// group: check
{
const unsigned long *found;
r = idn_nameprep_isunassigned(handle11, check_from, &found);
ASSERT_RESULT(r, idn_success);
ASSERT_PTR(found, check_from + FROM_UNAS_OFFSET);
r = idn_nameprep_isunassigned(handle11, check_from2, &found);
ASSERT_RESULT(r, idn_success);
ASSERT_PTR(found, check_from2 + FROM2_UNAS_OFFSET);
}
//# TESTCASE
// title: idn_nameprep_isprohibited() - boundary condition
// group: check
{
const unsigned long *found;
r = idn_nameprep_isprohibited(handle11, ucs4_nullstr, &found);
ASSERT_RESULT(r, idn_success);
ASSERT_PTR(found, NULL);
}
//# TESTCASE
// title: idn_nameprep_isprohibited() - RFC3491
// group: check
{
const unsigned long *found;
r = idn_nameprep_isprohibited(handle11, check_from, &found);
ASSERT_RESULT(r, idn_success);
ASSERT_PTR(found, check_from + FROM_PROH_OFFSET);
r = idn_nameprep_isprohibited(handle11, check_from2, &found);
ASSERT_RESULT(r, idn_success);
ASSERT_PTR(found, check_from2 + FROM2_PROH_OFFSET);
}
//# TESTCASE
// title: idn_nameprep_isvalidbidi() - boundary condition
// group: check
{
const unsigned long *found;
r = idn_nameprep_isvalidbidi(handle11, ucs4_nullstr, &found);
ASSERT_RESULT(r, idn_success);
ASSERT_PTR(found, NULL);
}
//# TESTCASE
// title: idn_nameprep_isvalidbidi() - RFC3491
// group: check
{
const unsigned long *found;
r = idn_nameprep_isvalidbidi(handle11, bidi_from, &found);
ASSERT_RESULT(r, idn_success);
ASSERT_PTR(found, bidi_from + BIDIFROM_OFFSET);
r = idn_nameprep_isvalidbidi(handle11, check_from2, &found);
ASSERT_RESULT(r, idn_success);
ASSERT_PTR(found, NULL);
}