mirror of https://github.com/wolfSSL/wolfssl.git
Reorganize utility functions into tests/utils.c and testsuite/utils.c
parent
60c1558142
commit
e02da08192
250
tests/api.c
250
tests/api.c
|
@ -56,6 +56,7 @@
|
|||
|
||||
#include <wolfssl/test.h>
|
||||
#include <tests/utils.h>
|
||||
#include <testsuite/utils.h>
|
||||
|
||||
/* for testing compatibility layer callbacks */
|
||||
#include "examples/server/server.h"
|
||||
|
@ -581,250 +582,6 @@ int testDevId = WOLFSSL_CAAM_DEVID;
|
|||
int testDevId = INVALID_DEVID;
|
||||
#endif
|
||||
|
||||
#if !defined(NO_FILESYSTEM) && !defined(NO_CERTS) && !defined(NO_RSA) && \
|
||||
!defined(NO_WOLFSSL_SERVER) && !defined(NO_WOLFSSL_CLIENT) && \
|
||||
(!defined(WOLFSSL_NO_TLS12) || defined(WOLFSSL_TLS13))
|
||||
|
||||
/* This set of memio functions allows for more fine tuned control of the TLS
|
||||
* connection operations. For new tests, try to use ssl_memio first. */
|
||||
|
||||
/* To dump the memory in gdb use
|
||||
* dump memory client.bin test_ctx.c_buff test_ctx.c_buff+test_ctx.c_len
|
||||
* dump memory server.bin test_ctx.s_buff test_ctx.s_buff+test_ctx.s_len
|
||||
* This can be imported into Wireshark by transforming the file with
|
||||
* od -Ax -tx1 -v client.bin > client.bin.hex
|
||||
* od -Ax -tx1 -v server.bin > server.bin.hex
|
||||
* And then loading test_output.dump.hex into Wireshark using the
|
||||
* "Import from Hex Dump..." option ion and selecting the TCP
|
||||
* encapsulation option.
|
||||
*/
|
||||
|
||||
#define HAVE_MANUAL_MEMIO_TESTS_DEPENDENCIES
|
||||
|
||||
static WC_INLINE int test_memio_write_cb(WOLFSSL *ssl, char *data, int sz,
|
||||
void *ctx)
|
||||
{
|
||||
struct test_memio_ctx *test_ctx;
|
||||
byte *buf;
|
||||
int *len;
|
||||
|
||||
test_ctx = (struct test_memio_ctx*)ctx;
|
||||
|
||||
if (wolfSSL_GetSide(ssl) == WOLFSSL_SERVER_END) {
|
||||
buf = test_ctx->c_buff;
|
||||
len = &test_ctx->c_len;
|
||||
}
|
||||
else {
|
||||
buf = test_ctx->s_buff;
|
||||
len = &test_ctx->s_len;
|
||||
}
|
||||
|
||||
if ((unsigned)(*len + sz) > TEST_MEMIO_BUF_SZ)
|
||||
return WOLFSSL_CBIO_ERR_WANT_WRITE;
|
||||
|
||||
#ifdef WOLFSSL_DUMP_MEMIO_STREAM
|
||||
{
|
||||
char dump_file_name[64];
|
||||
WOLFSSL_BIO *dump_file;
|
||||
sprintf(dump_file_name, "%s/%s.dump", tmpDirName, currentTestName);
|
||||
dump_file = wolfSSL_BIO_new_file(dump_file_name, "a");
|
||||
if (dump_file != NULL) {
|
||||
(void)wolfSSL_BIO_write(dump_file, data, sz);
|
||||
wolfSSL_BIO_free(dump_file);
|
||||
}
|
||||
}
|
||||
#endif
|
||||
XMEMCPY(buf + *len, data, (size_t)sz);
|
||||
*len += sz;
|
||||
|
||||
return sz;
|
||||
}
|
||||
|
||||
static WC_INLINE int test_memio_read_cb(WOLFSSL *ssl, char *data, int sz,
|
||||
void *ctx)
|
||||
{
|
||||
struct test_memio_ctx *test_ctx;
|
||||
int read_sz;
|
||||
byte *buf;
|
||||
int *len;
|
||||
|
||||
test_ctx = (struct test_memio_ctx*)ctx;
|
||||
|
||||
if (wolfSSL_GetSide(ssl) == WOLFSSL_SERVER_END) {
|
||||
buf = test_ctx->s_buff;
|
||||
len = &test_ctx->s_len;
|
||||
}
|
||||
else {
|
||||
buf = test_ctx->c_buff;
|
||||
len = &test_ctx->c_len;
|
||||
}
|
||||
|
||||
if (*len == 0)
|
||||
return WOLFSSL_CBIO_ERR_WANT_READ;
|
||||
|
||||
read_sz = sz < *len ? sz : *len;
|
||||
|
||||
XMEMCPY(data, buf, (size_t)read_sz);
|
||||
XMEMMOVE(buf, buf + read_sz,(size_t) (*len - read_sz));
|
||||
|
||||
*len -= read_sz;
|
||||
|
||||
return read_sz;
|
||||
}
|
||||
|
||||
int test_memio_do_handshake(WOLFSSL *ssl_c, WOLFSSL *ssl_s,
|
||||
int max_rounds, int *rounds)
|
||||
{
|
||||
byte handshake_complete = 0, hs_c = 0, hs_s = 0;
|
||||
int ret, err;
|
||||
|
||||
if (rounds != NULL)
|
||||
*rounds = 0;
|
||||
while (!handshake_complete && max_rounds > 0) {
|
||||
if (!hs_c) {
|
||||
wolfSSL_SetLoggingPrefix("client");
|
||||
ret = wolfSSL_connect(ssl_c);
|
||||
wolfSSL_SetLoggingPrefix(NULL);
|
||||
if (ret == WOLFSSL_SUCCESS) {
|
||||
hs_c = 1;
|
||||
}
|
||||
else {
|
||||
err = wolfSSL_get_error(ssl_c, ret);
|
||||
if (err != WOLFSSL_ERROR_WANT_READ &&
|
||||
err != WOLFSSL_ERROR_WANT_WRITE)
|
||||
return -1;
|
||||
}
|
||||
}
|
||||
if (!hs_s) {
|
||||
wolfSSL_SetLoggingPrefix("server");
|
||||
ret = wolfSSL_accept(ssl_s);
|
||||
wolfSSL_SetLoggingPrefix(NULL);
|
||||
if (ret == WOLFSSL_SUCCESS) {
|
||||
hs_s = 1;
|
||||
}
|
||||
else {
|
||||
err = wolfSSL_get_error(ssl_s, ret);
|
||||
if (err != WOLFSSL_ERROR_WANT_READ &&
|
||||
err != WOLFSSL_ERROR_WANT_WRITE)
|
||||
return -1;
|
||||
}
|
||||
}
|
||||
handshake_complete = hs_c && hs_s;
|
||||
max_rounds--;
|
||||
if (rounds != NULL)
|
||||
*rounds = *rounds + 1;
|
||||
}
|
||||
|
||||
if (!handshake_complete)
|
||||
return -1;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int test_memio_setup_ex(struct test_memio_ctx *ctx,
|
||||
WOLFSSL_CTX **ctx_c, WOLFSSL_CTX **ctx_s, WOLFSSL **ssl_c, WOLFSSL **ssl_s,
|
||||
method_provider method_c, method_provider method_s,
|
||||
byte *caCert, int caCertSz, byte *serverCert, int serverCertSz,
|
||||
byte *serverKey, int serverKeySz)
|
||||
{
|
||||
int ret;
|
||||
(void)caCert;
|
||||
(void)caCertSz;
|
||||
(void)serverCert;
|
||||
(void)serverCertSz;
|
||||
(void)serverKey;
|
||||
(void)serverKeySz;
|
||||
|
||||
if (ctx_c != NULL && *ctx_c == NULL) {
|
||||
*ctx_c = wolfSSL_CTX_new(method_c());
|
||||
if (*ctx_c == NULL)
|
||||
return -1;
|
||||
#ifndef NO_CERTS
|
||||
if (caCert == NULL) {
|
||||
ret = wolfSSL_CTX_load_verify_locations(*ctx_c, caCertFile, 0);
|
||||
}
|
||||
else {
|
||||
ret = wolfSSL_CTX_load_verify_buffer(*ctx_c, caCert, (long)caCertSz,
|
||||
WOLFSSL_FILETYPE_ASN1);
|
||||
}
|
||||
if (ret != WOLFSSL_SUCCESS)
|
||||
return -1;
|
||||
#endif /* NO_CERTS */
|
||||
wolfSSL_SetIORecv(*ctx_c, test_memio_read_cb);
|
||||
wolfSSL_SetIOSend(*ctx_c, test_memio_write_cb);
|
||||
if (ctx->c_ciphers != NULL) {
|
||||
ret = wolfSSL_CTX_set_cipher_list(*ctx_c, ctx->c_ciphers);
|
||||
if (ret != WOLFSSL_SUCCESS)
|
||||
return -1;
|
||||
}
|
||||
}
|
||||
|
||||
if (ctx_s != NULL && *ctx_s == NULL) {
|
||||
*ctx_s = wolfSSL_CTX_new(method_s());
|
||||
if (*ctx_s == NULL)
|
||||
return -1;
|
||||
#ifndef NO_CERTS
|
||||
if (serverKey == NULL) {
|
||||
ret = wolfSSL_CTX_use_PrivateKey_file(*ctx_s, svrKeyFile,
|
||||
WOLFSSL_FILETYPE_PEM);
|
||||
}
|
||||
else {
|
||||
ret = wolfSSL_CTX_use_PrivateKey_buffer(*ctx_s, serverKey,
|
||||
(long)serverKeySz, WOLFSSL_FILETYPE_ASN1);
|
||||
}
|
||||
if (ret != WOLFSSL_SUCCESS)
|
||||
return- -1;
|
||||
|
||||
if (serverCert == NULL) {
|
||||
ret = wolfSSL_CTX_use_certificate_file(*ctx_s, svrCertFile,
|
||||
WOLFSSL_FILETYPE_PEM);
|
||||
}
|
||||
else {
|
||||
ret = wolfSSL_CTX_use_certificate_chain_buffer_format(*ctx_s,
|
||||
serverCert, (long)serverCertSz, WOLFSSL_FILETYPE_ASN1);
|
||||
}
|
||||
if (ret != WOLFSSL_SUCCESS)
|
||||
return -1;
|
||||
#endif /* NO_CERTS */
|
||||
wolfSSL_SetIORecv(*ctx_s, test_memio_read_cb);
|
||||
wolfSSL_SetIOSend(*ctx_s, test_memio_write_cb);
|
||||
if (ctx->s_ciphers != NULL) {
|
||||
ret = wolfSSL_CTX_set_cipher_list(*ctx_s, ctx->s_ciphers);
|
||||
if (ret != WOLFSSL_SUCCESS)
|
||||
return -1;
|
||||
}
|
||||
}
|
||||
|
||||
if (ctx_c != NULL && ssl_c != NULL) {
|
||||
*ssl_c = wolfSSL_new(*ctx_c);
|
||||
if (*ssl_c == NULL)
|
||||
return -1;
|
||||
wolfSSL_SetIOWriteCtx(*ssl_c, ctx);
|
||||
wolfSSL_SetIOReadCtx(*ssl_c, ctx);
|
||||
}
|
||||
if (ctx_s != NULL && ssl_s != NULL) {
|
||||
*ssl_s = wolfSSL_new(*ctx_s);
|
||||
if (*ssl_s == NULL)
|
||||
return -1;
|
||||
wolfSSL_SetIOWriteCtx(*ssl_s, ctx);
|
||||
wolfSSL_SetIOReadCtx(*ssl_s, ctx);
|
||||
#if !defined(NO_DH)
|
||||
SetDH(*ssl_s);
|
||||
#endif
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int test_memio_setup(struct test_memio_ctx *ctx,
|
||||
WOLFSSL_CTX **ctx_c, WOLFSSL_CTX **ctx_s, WOLFSSL **ssl_c, WOLFSSL **ssl_s,
|
||||
method_provider method_c, method_provider method_s)
|
||||
{
|
||||
return test_memio_setup_ex(ctx, ctx_c, ctx_s, ssl_c, ssl_s, method_c,
|
||||
method_s, NULL, 0, NULL, 0, NULL, 0);
|
||||
}
|
||||
#endif
|
||||
|
||||
/*----------------------------------------------------------------------------*
|
||||
| BIO with fixed read/write size
|
||||
*----------------------------------------------------------------------------*/
|
||||
|
@ -98204,6 +97961,11 @@ static int test_get_signature_nid(void)
|
|||
TGSN_TLS13_ED448("ED448", NID_ED448, NID_sha512),
|
||||
#endif
|
||||
};
|
||||
/* These correspond to WOLFSSL_SSLV3...WOLFSSL_DTLSV1_3 */
|
||||
const char* tls_desc[] = {
|
||||
"SSLv3", "TLSv1.0", "TLSv1.1", "TLSv1.2", "TLSv1.3",
|
||||
"DTLSv1.0", "DTLSv1.2", "DTLSv1.3"
|
||||
};
|
||||
|
||||
printf("\n");
|
||||
|
||||
|
|
|
@ -8,6 +8,8 @@ noinst_PROGRAMS += tests/unit.test
|
|||
tests_unit_test_SOURCES = \
|
||||
tests/unit.c \
|
||||
tests/api.c \
|
||||
tests/utils.c \
|
||||
testsuite/utils.c \
|
||||
tests/suites.c \
|
||||
tests/hash.c \
|
||||
tests/w64wrapper.c \
|
||||
|
|
|
@ -0,0 +1,273 @@
|
|||
/* utils.c
|
||||
*
|
||||
* Copyright (C) 2006-2025 wolfSSL Inc.
|
||||
*
|
||||
* This file is part of wolfSSL.
|
||||
*
|
||||
* wolfSSL is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* wolfSSL is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
||||
*/
|
||||
|
||||
#ifdef HAVE_CONFIG_H
|
||||
#include <config.h>
|
||||
#endif
|
||||
|
||||
#if !defined(WOLFSSL_USER_SETTINGS) && !defined(WOLFSSL_NO_OPTIONS_H)
|
||||
#include <wolfssl/options.h>
|
||||
#endif
|
||||
#include <wolfssl/wolfcrypt/settings.h>
|
||||
|
||||
#include <wolfssl/wolfcrypt/settings.h>
|
||||
#include <tests/utils.h>
|
||||
#include <tests/unit.h>
|
||||
|
||||
#ifdef HAVE_MANUAL_MEMIO_TESTS_DEPENDENCIES
|
||||
|
||||
/* This set of memio functions allows for more fine tuned control of the TLS
|
||||
* connection operations. For new tests, try to use ssl_memio first. */
|
||||
|
||||
/* To dump the memory in gdb use
|
||||
* dump memory client.bin test_ctx.c_buff test_ctx.c_buff+test_ctx.c_len
|
||||
* dump memory server.bin test_ctx.s_buff test_ctx.s_buff+test_ctx.s_len
|
||||
* This can be imported into Wireshark by transforming the file with
|
||||
* od -Ax -tx1 -v client.bin > client.bin.hex
|
||||
* od -Ax -tx1 -v server.bin > server.bin.hex
|
||||
* And then loading test_output.dump.hex into Wireshark using the
|
||||
* "Import from Hex Dump..." option ion and selecting the TCP
|
||||
* encapsulation option.
|
||||
*/
|
||||
|
||||
int test_memio_write_cb(WOLFSSL *ssl, char *data, int sz, void *ctx)
|
||||
{
|
||||
struct test_memio_ctx *test_ctx;
|
||||
byte *buf;
|
||||
int *len;
|
||||
|
||||
test_ctx = (struct test_memio_ctx*)ctx;
|
||||
|
||||
if (wolfSSL_GetSide(ssl) == WOLFSSL_SERVER_END) {
|
||||
buf = test_ctx->c_buff;
|
||||
len = &test_ctx->c_len;
|
||||
}
|
||||
else {
|
||||
buf = test_ctx->s_buff;
|
||||
len = &test_ctx->s_len;
|
||||
}
|
||||
|
||||
if ((unsigned)(*len + sz) > TEST_MEMIO_BUF_SZ)
|
||||
return WOLFSSL_CBIO_ERR_WANT_WRITE;
|
||||
|
||||
#ifdef WOLFSSL_DUMP_MEMIO_STREAM
|
||||
{
|
||||
char dump_file_name[64];
|
||||
WOLFSSL_BIO *dump_file;
|
||||
sprintf(dump_file_name, "%s/%s.dump", tmpDirName, currentTestName);
|
||||
dump_file = wolfSSL_BIO_new_file(dump_file_name, "a");
|
||||
if (dump_file != NULL) {
|
||||
(void)wolfSSL_BIO_write(dump_file, data, sz);
|
||||
wolfSSL_BIO_free(dump_file);
|
||||
}
|
||||
}
|
||||
#endif
|
||||
XMEMCPY(buf + *len, data, (size_t)sz);
|
||||
*len += sz;
|
||||
|
||||
return sz;
|
||||
}
|
||||
|
||||
int test_memio_read_cb(WOLFSSL *ssl, char *data, int sz, void *ctx)
|
||||
{
|
||||
struct test_memio_ctx *test_ctx;
|
||||
int read_sz;
|
||||
byte *buf;
|
||||
int *len;
|
||||
|
||||
test_ctx = (struct test_memio_ctx*)ctx;
|
||||
|
||||
if (wolfSSL_GetSide(ssl) == WOLFSSL_SERVER_END) {
|
||||
buf = test_ctx->s_buff;
|
||||
len = &test_ctx->s_len;
|
||||
}
|
||||
else {
|
||||
buf = test_ctx->c_buff;
|
||||
len = &test_ctx->c_len;
|
||||
}
|
||||
|
||||
if (*len == 0)
|
||||
return WOLFSSL_CBIO_ERR_WANT_READ;
|
||||
|
||||
read_sz = sz < *len ? sz : *len;
|
||||
|
||||
XMEMCPY(data, buf, (size_t)read_sz);
|
||||
XMEMMOVE(buf, buf + read_sz,(size_t) (*len - read_sz));
|
||||
|
||||
*len -= read_sz;
|
||||
|
||||
return read_sz;
|
||||
}
|
||||
|
||||
int test_memio_do_handshake(WOLFSSL *ssl_c, WOLFSSL *ssl_s,
|
||||
int max_rounds, int *rounds)
|
||||
{
|
||||
byte handshake_complete = 0, hs_c = 0, hs_s = 0;
|
||||
int ret, err;
|
||||
|
||||
if (rounds != NULL)
|
||||
*rounds = 0;
|
||||
while (!handshake_complete && max_rounds > 0) {
|
||||
if (!hs_c) {
|
||||
wolfSSL_SetLoggingPrefix("client");
|
||||
ret = wolfSSL_connect(ssl_c);
|
||||
wolfSSL_SetLoggingPrefix(NULL);
|
||||
if (ret == WOLFSSL_SUCCESS) {
|
||||
hs_c = 1;
|
||||
}
|
||||
else {
|
||||
err = wolfSSL_get_error(ssl_c, ret);
|
||||
if (err != WOLFSSL_ERROR_WANT_READ &&
|
||||
err != WOLFSSL_ERROR_WANT_WRITE)
|
||||
return -1;
|
||||
}
|
||||
}
|
||||
if (!hs_s) {
|
||||
wolfSSL_SetLoggingPrefix("server");
|
||||
ret = wolfSSL_accept(ssl_s);
|
||||
wolfSSL_SetLoggingPrefix(NULL);
|
||||
if (ret == WOLFSSL_SUCCESS) {
|
||||
hs_s = 1;
|
||||
}
|
||||
else {
|
||||
err = wolfSSL_get_error(ssl_s, ret);
|
||||
if (err != WOLFSSL_ERROR_WANT_READ &&
|
||||
err != WOLFSSL_ERROR_WANT_WRITE)
|
||||
return -1;
|
||||
}
|
||||
}
|
||||
handshake_complete = hs_c && hs_s;
|
||||
max_rounds--;
|
||||
if (rounds != NULL)
|
||||
*rounds = *rounds + 1;
|
||||
}
|
||||
|
||||
if (!handshake_complete)
|
||||
return -1;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int test_memio_setup_ex(struct test_memio_ctx *ctx,
|
||||
WOLFSSL_CTX **ctx_c, WOLFSSL_CTX **ctx_s, WOLFSSL **ssl_c, WOLFSSL **ssl_s,
|
||||
method_provider method_c, method_provider method_s,
|
||||
byte *caCert, int caCertSz, byte *serverCert, int serverCertSz,
|
||||
byte *serverKey, int serverKeySz)
|
||||
{
|
||||
int ret;
|
||||
(void)caCert;
|
||||
(void)caCertSz;
|
||||
(void)serverCert;
|
||||
(void)serverCertSz;
|
||||
(void)serverKey;
|
||||
(void)serverKeySz;
|
||||
|
||||
if (ctx_c != NULL && *ctx_c == NULL) {
|
||||
*ctx_c = wolfSSL_CTX_new(method_c());
|
||||
if (*ctx_c == NULL)
|
||||
return -1;
|
||||
#ifndef NO_CERTS
|
||||
if (caCert == NULL) {
|
||||
ret = wolfSSL_CTX_load_verify_locations(*ctx_c, caCertFile, 0);
|
||||
}
|
||||
else {
|
||||
ret = wolfSSL_CTX_load_verify_buffer(*ctx_c, caCert, (long)caCertSz,
|
||||
WOLFSSL_FILETYPE_ASN1);
|
||||
}
|
||||
if (ret != WOLFSSL_SUCCESS)
|
||||
return -1;
|
||||
#endif /* NO_CERTS */
|
||||
wolfSSL_SetIORecv(*ctx_c, test_memio_read_cb);
|
||||
wolfSSL_SetIOSend(*ctx_c, test_memio_write_cb);
|
||||
if (ctx->c_ciphers != NULL) {
|
||||
ret = wolfSSL_CTX_set_cipher_list(*ctx_c, ctx->c_ciphers);
|
||||
if (ret != WOLFSSL_SUCCESS)
|
||||
return -1;
|
||||
}
|
||||
}
|
||||
|
||||
if (ctx_s != NULL && *ctx_s == NULL) {
|
||||
*ctx_s = wolfSSL_CTX_new(method_s());
|
||||
if (*ctx_s == NULL)
|
||||
return -1;
|
||||
#ifndef NO_CERTS
|
||||
if (serverKey == NULL) {
|
||||
ret = wolfSSL_CTX_use_PrivateKey_file(*ctx_s, svrKeyFile,
|
||||
WOLFSSL_FILETYPE_PEM);
|
||||
}
|
||||
else {
|
||||
ret = wolfSSL_CTX_use_PrivateKey_buffer(*ctx_s, serverKey,
|
||||
(long)serverKeySz, WOLFSSL_FILETYPE_ASN1);
|
||||
}
|
||||
if (ret != WOLFSSL_SUCCESS)
|
||||
return- -1;
|
||||
|
||||
if (serverCert == NULL) {
|
||||
ret = wolfSSL_CTX_use_certificate_file(*ctx_s, svrCertFile,
|
||||
WOLFSSL_FILETYPE_PEM);
|
||||
}
|
||||
else {
|
||||
ret = wolfSSL_CTX_use_certificate_chain_buffer_format(*ctx_s,
|
||||
serverCert, (long)serverCertSz, WOLFSSL_FILETYPE_ASN1);
|
||||
}
|
||||
if (ret != WOLFSSL_SUCCESS)
|
||||
return -1;
|
||||
#endif /* NO_CERTS */
|
||||
wolfSSL_SetIORecv(*ctx_s, test_memio_read_cb);
|
||||
wolfSSL_SetIOSend(*ctx_s, test_memio_write_cb);
|
||||
if (ctx->s_ciphers != NULL) {
|
||||
ret = wolfSSL_CTX_set_cipher_list(*ctx_s, ctx->s_ciphers);
|
||||
if (ret != WOLFSSL_SUCCESS)
|
||||
return -1;
|
||||
}
|
||||
}
|
||||
|
||||
if (ctx_c != NULL && ssl_c != NULL) {
|
||||
*ssl_c = wolfSSL_new(*ctx_c);
|
||||
if (*ssl_c == NULL)
|
||||
return -1;
|
||||
wolfSSL_SetIOWriteCtx(*ssl_c, ctx);
|
||||
wolfSSL_SetIOReadCtx(*ssl_c, ctx);
|
||||
}
|
||||
if (ctx_s != NULL && ssl_s != NULL) {
|
||||
*ssl_s = wolfSSL_new(*ctx_s);
|
||||
if (*ssl_s == NULL)
|
||||
return -1;
|
||||
wolfSSL_SetIOWriteCtx(*ssl_s, ctx);
|
||||
wolfSSL_SetIOReadCtx(*ssl_s, ctx);
|
||||
#if !defined(NO_DH)
|
||||
SetDH(*ssl_s);
|
||||
#endif
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int test_memio_setup(struct test_memio_ctx *ctx,
|
||||
WOLFSSL_CTX **ctx_c, WOLFSSL_CTX **ctx_s, WOLFSSL **ssl_c, WOLFSSL **ssl_s,
|
||||
method_provider method_c, method_provider method_s)
|
||||
{
|
||||
return test_memio_setup_ex(ctx, ctx_c, ctx_s, ssl_c, ssl_s, method_c,
|
||||
method_s, NULL, 0, NULL, 0, NULL, 0);
|
||||
}
|
||||
|
||||
#endif /* HAVE_MANUAL_MEMIO_TESTS_DEPENDENCIES */
|
||||
|
176
tests/utils.h
176
tests/utils.h
|
@ -18,121 +18,19 @@
|
|||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
||||
*/
|
||||
#ifdef HAVE_CONFIG_H
|
||||
#include <config.h>
|
||||
#endif
|
||||
|
||||
#include <wolfssl/wolfcrypt/settings.h>
|
||||
#include <tests/unit.h>
|
||||
#include <wolfssl/wolfcrypt/types.h>
|
||||
#include <wolfssl/ssl.h>
|
||||
#include <wolfssl/test.h>
|
||||
|
||||
#ifndef NO_FILESYSTEM
|
||||
|
||||
#if defined(_MSC_VER)
|
||||
#include <direct.h>
|
||||
#elif defined(__WATCOMC__)
|
||||
#ifdef __LINUX__
|
||||
#include <unistd.h>
|
||||
#else
|
||||
#include <direct.h>
|
||||
#endif
|
||||
#endif
|
||||
|
||||
#define TMP_DIR_PREFIX "tmpDir-"
|
||||
/* len is length of tmpDir name, assuming
|
||||
* len does not include null terminating character */
|
||||
char* create_tmp_dir(char *tmpDir, int len)
|
||||
{
|
||||
if (len < (int)XSTR_SIZEOF(TMP_DIR_PREFIX))
|
||||
return NULL;
|
||||
|
||||
XMEMCPY(tmpDir, TMP_DIR_PREFIX, XSTR_SIZEOF(TMP_DIR_PREFIX));
|
||||
|
||||
if (mymktemp(tmpDir, len, len - (int)XSTR_SIZEOF(TMP_DIR_PREFIX)) == NULL)
|
||||
return NULL;
|
||||
|
||||
#ifdef _MSC_VER
|
||||
if (_mkdir(tmpDir) != 0)
|
||||
return NULL;
|
||||
#elif defined(__MINGW32__)
|
||||
if (mkdir(tmpDir) != 0)
|
||||
return NULL;
|
||||
#elif defined(__WATCOMC__) && !defined(__LINUX__)
|
||||
if (mkdir(tmpDir) != 0)
|
||||
return NULL;
|
||||
#else
|
||||
if (mkdir(tmpDir, 0700) != 0)
|
||||
return NULL;
|
||||
#endif
|
||||
|
||||
return tmpDir;
|
||||
}
|
||||
|
||||
int rem_dir(const char* dirName)
|
||||
{
|
||||
#ifdef _MSC_VER
|
||||
if (_rmdir(dirName) != 0)
|
||||
return -1;
|
||||
#else
|
||||
if (rmdir(dirName) != 0)
|
||||
return -1;
|
||||
#endif
|
||||
return 0;
|
||||
}
|
||||
|
||||
int rem_file(const char* fileName)
|
||||
{
|
||||
#ifdef _MSC_VER
|
||||
if (_unlink(fileName) != 0)
|
||||
return -1;
|
||||
#else
|
||||
if (unlink(fileName) != 0)
|
||||
return -1;
|
||||
#endif
|
||||
return 0;
|
||||
}
|
||||
|
||||
int copy_file(const char* in, const char* out)
|
||||
{
|
||||
byte buf[100];
|
||||
XFILE inFile = XBADFILE;
|
||||
XFILE outFile = XBADFILE;
|
||||
size_t sz;
|
||||
int ret = -1;
|
||||
|
||||
inFile = XFOPEN(in, "rb");
|
||||
if (inFile == XBADFILE)
|
||||
goto cleanup;
|
||||
|
||||
outFile = XFOPEN(out, "wb");
|
||||
if (outFile == XBADFILE)
|
||||
goto cleanup;
|
||||
|
||||
while ((sz = XFREAD(buf, 1, sizeof(buf), inFile)) != 0) {
|
||||
if (XFERROR(inFile))
|
||||
goto cleanup;
|
||||
if (XFWRITE(buf, 1, sz, outFile) != sz)
|
||||
goto cleanup;
|
||||
if (XFEOF(inFile))
|
||||
break;
|
||||
}
|
||||
|
||||
ret = 0;
|
||||
cleanup:
|
||||
if (inFile != XBADFILE)
|
||||
XFCLOSE(inFile);
|
||||
if (outFile != XBADFILE)
|
||||
XFCLOSE(outFile);
|
||||
return ret;
|
||||
}
|
||||
|
||||
#if defined(__MACH__) || defined(__FreeBSD__)
|
||||
int link_file(const char* in, const char* out)
|
||||
{
|
||||
return link(in, out);
|
||||
}
|
||||
#endif
|
||||
#endif /* !NO_FILESYSTEM */
|
||||
#ifndef TESTS_UTILS_H
|
||||
#define TESTS_UTILS_H
|
||||
|
||||
#if !defined(NO_FILESYSTEM) && !defined(NO_CERTS) && !defined(NO_RSA) && \
|
||||
!defined(NO_WOLFSSL_SERVER) && !defined(NO_WOLFSSL_CLIENT) && \
|
||||
(!defined(WOLFSSL_NO_TLS12) || defined(WOLFSSL_TLS13))
|
||||
#define HAVE_MANUAL_MEMIO_TESTS_DEPENDENCIES
|
||||
#define TEST_MEMIO_BUF_SZ (64 * 1024)
|
||||
struct test_memio_ctx
|
||||
{
|
||||
|
@ -143,6 +41,8 @@ struct test_memio_ctx
|
|||
int s_len;
|
||||
const char* s_ciphers;
|
||||
};
|
||||
int test_memio_write_cb(WOLFSSL *ssl, char *data, int sz, void *ctx);
|
||||
int test_memio_read_cb(WOLFSSL *ssl, char *data, int sz, void *ctx);
|
||||
int test_memio_do_handshake(WOLFSSL *ssl_c, WOLFSSL *ssl_s,
|
||||
int max_rounds, int *rounds);
|
||||
int test_memio_setup(struct test_memio_ctx *ctx,
|
||||
|
@ -153,58 +53,6 @@ int test_memio_setup_ex(struct test_memio_ctx *ctx,
|
|||
method_provider method_c, method_provider method_s,
|
||||
byte *caCert, int caCertSz, byte *serverCert, int serverCertSz,
|
||||
byte *serverKey, int serverKeySz);
|
||||
|
||||
#if !defined(SINGLE_THREADED) && defined(WOLFSSL_COND)
|
||||
void signal_ready(tcp_ready* ready)
|
||||
{
|
||||
THREAD_CHECK_RET(wolfSSL_CondStart(&ready->cond));
|
||||
ready->ready = 1;
|
||||
THREAD_CHECK_RET(wolfSSL_CondSignal(&ready->cond));
|
||||
THREAD_CHECK_RET(wolfSSL_CondEnd(&ready->cond));
|
||||
}
|
||||
#endif
|
||||
|
||||
void wait_tcp_ready(func_args* args)
|
||||
{
|
||||
#if !defined(SINGLE_THREADED) && defined(WOLFSSL_COND)
|
||||
tcp_ready* ready = args->signal;
|
||||
THREAD_CHECK_RET(wolfSSL_CondStart(&ready->cond));
|
||||
if (!ready->ready) {
|
||||
THREAD_CHECK_RET(wolfSSL_CondWait(&ready->cond));
|
||||
}
|
||||
ready->ready = 0; /* reset */
|
||||
THREAD_CHECK_RET(wolfSSL_CondEnd(&ready->cond));
|
||||
#else
|
||||
/* no threading wait or single threaded */
|
||||
(void)args;
|
||||
#endif
|
||||
}
|
||||
|
||||
#ifndef SINGLE_THREADED
|
||||
/* Start a thread.
|
||||
*
|
||||
* @param [in] fun Function to execute in thread.
|
||||
* @param [in] args Object to send to function in thread.
|
||||
* @param [out] thread Handle to thread.
|
||||
*/
|
||||
void start_thread(THREAD_CB fun, func_args* args, THREAD_TYPE* thread)
|
||||
{
|
||||
THREAD_CHECK_RET(wolfSSL_NewThread(thread, fun, args));
|
||||
}
|
||||
|
||||
|
||||
/* Join thread to wait for completion.
|
||||
*
|
||||
* @param [in] thread Handle to thread.
|
||||
*/
|
||||
void join_thread(THREAD_TYPE thread)
|
||||
{
|
||||
THREAD_CHECK_RET(wolfSSL_JoinThread(thread));
|
||||
}
|
||||
#endif /* SINGLE_THREADED */
|
||||
|
||||
/* These correspond to WOLFSSL_SSLV3...WOLFSSL_DTLSV1_3 */
|
||||
const char* tls_desc[] = {
|
||||
"SSLv3", "TLSv1.0", "TLSv1.1", "TLSv1.2", "TLSv1.3",
|
||||
"DTLSv1.0", "DTLSv1.2", "DTLSv1.3"
|
||||
};
|
||||
#endif /* TESTS_UTILS_H */
|
||||
|
|
|
@ -20,6 +20,7 @@ endif
|
|||
EXTRA_DIST += testsuite/testsuite.sln
|
||||
EXTRA_DIST += testsuite/testsuite.vcproj
|
||||
EXTRA_DIST += testsuite/testsuite.vcxproj
|
||||
EXTRA_DIST += testsuite/utils.h
|
||||
EXTRA_DIST += input
|
||||
EXTRA_DIST += quit
|
||||
DISTCLEANFILES+= testsuite/.libs/testsuite.test
|
||||
|
|
|
@ -52,7 +52,9 @@
|
|||
#include <examples/server/server.h>
|
||||
#include <examples/client/client.h>
|
||||
|
||||
#include "tests/utils.h"
|
||||
#include <testsuite/utils.h>
|
||||
/* include source file to not change all the testsuite build systems */
|
||||
#include <testsuite/utils.c>
|
||||
|
||||
#ifndef NO_SHA256
|
||||
void file_test(const char* file, byte* check);
|
||||
|
|
|
@ -0,0 +1,191 @@
|
|||
/* utils.c
|
||||
*
|
||||
* Copyright (C) 2006-2025 wolfSSL Inc.
|
||||
*
|
||||
* This file is part of wolfSSL.
|
||||
*
|
||||
* wolfSSL is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* wolfSSL is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
||||
*/
|
||||
|
||||
#ifdef HAVE_CONFIG_H
|
||||
#include <config.h>
|
||||
#endif
|
||||
|
||||
#if !defined(WOLFSSL_USER_SETTINGS) && !defined(WOLFSSL_NO_OPTIONS_H)
|
||||
#include <wolfssl/options.h>
|
||||
#endif
|
||||
#include <wolfssl/wolfcrypt/settings.h>
|
||||
|
||||
#include <wolfssl/wolfcrypt/settings.h>
|
||||
#include <testsuite/utils.h>
|
||||
#include <tests/unit.h>
|
||||
|
||||
#ifndef NO_FILESYSTEM
|
||||
|
||||
#if defined(_MSC_VER)
|
||||
#include <direct.h>
|
||||
#elif defined(__WATCOMC__)
|
||||
#ifdef __LINUX__
|
||||
#include <unistd.h>
|
||||
#else
|
||||
#include <direct.h>
|
||||
#endif
|
||||
#endif
|
||||
|
||||
#define TMP_DIR_PREFIX "tmpDir-"
|
||||
/* len is length of tmpDir name, assuming
|
||||
* len does not include null terminating character */
|
||||
char* create_tmp_dir(char *tmpDir, int len)
|
||||
{
|
||||
if (len < (int)XSTR_SIZEOF(TMP_DIR_PREFIX))
|
||||
return NULL;
|
||||
|
||||
XMEMCPY(tmpDir, TMP_DIR_PREFIX, XSTR_SIZEOF(TMP_DIR_PREFIX));
|
||||
|
||||
if (mymktemp(tmpDir, len, len - (int)XSTR_SIZEOF(TMP_DIR_PREFIX)) == NULL)
|
||||
return NULL;
|
||||
|
||||
#ifdef _MSC_VER
|
||||
if (_mkdir(tmpDir) != 0)
|
||||
return NULL;
|
||||
#elif defined(__MINGW32__)
|
||||
if (mkdir(tmpDir) != 0)
|
||||
return NULL;
|
||||
#elif defined(__WATCOMC__) && !defined(__LINUX__)
|
||||
if (mkdir(tmpDir) != 0)
|
||||
return NULL;
|
||||
#else
|
||||
if (mkdir(tmpDir, 0700) != 0)
|
||||
return NULL;
|
||||
#endif
|
||||
|
||||
return tmpDir;
|
||||
}
|
||||
|
||||
int rem_dir(const char* dirName)
|
||||
{
|
||||
#ifdef _MSC_VER
|
||||
if (_rmdir(dirName) != 0)
|
||||
return -1;
|
||||
#else
|
||||
if (rmdir(dirName) != 0)
|
||||
return -1;
|
||||
#endif
|
||||
return 0;
|
||||
}
|
||||
|
||||
int rem_file(const char* fileName)
|
||||
{
|
||||
#ifdef _MSC_VER
|
||||
if (_unlink(fileName) != 0)
|
||||
return -1;
|
||||
#else
|
||||
if (unlink(fileName) != 0)
|
||||
return -1;
|
||||
#endif
|
||||
return 0;
|
||||
}
|
||||
|
||||
int copy_file(const char* in, const char* out)
|
||||
{
|
||||
byte buf[100];
|
||||
XFILE inFile = XBADFILE;
|
||||
XFILE outFile = XBADFILE;
|
||||
size_t sz;
|
||||
int ret = -1;
|
||||
|
||||
inFile = XFOPEN(in, "rb");
|
||||
if (inFile == XBADFILE)
|
||||
goto cleanup;
|
||||
|
||||
outFile = XFOPEN(out, "wb");
|
||||
if (outFile == XBADFILE)
|
||||
goto cleanup;
|
||||
|
||||
while ((sz = XFREAD(buf, 1, sizeof(buf), inFile)) != 0) {
|
||||
if (XFERROR(inFile))
|
||||
goto cleanup;
|
||||
if (XFWRITE(buf, 1, sz, outFile) != sz)
|
||||
goto cleanup;
|
||||
if (XFEOF(inFile))
|
||||
break;
|
||||
}
|
||||
|
||||
ret = 0;
|
||||
cleanup:
|
||||
if (inFile != XBADFILE)
|
||||
XFCLOSE(inFile);
|
||||
if (outFile != XBADFILE)
|
||||
XFCLOSE(outFile);
|
||||
return ret;
|
||||
}
|
||||
|
||||
#if defined(__MACH__) || defined(__FreeBSD__)
|
||||
int link_file(const char* in, const char* out)
|
||||
{
|
||||
return link(in, out);
|
||||
}
|
||||
#endif
|
||||
#endif /* !NO_FILESYSTEM */
|
||||
|
||||
#if !defined(SINGLE_THREADED) && defined(WOLFSSL_COND)
|
||||
void signal_ready(tcp_ready* ready)
|
||||
{
|
||||
THREAD_CHECK_RET(wolfSSL_CondStart(&ready->cond));
|
||||
ready->ready = 1;
|
||||
THREAD_CHECK_RET(wolfSSL_CondSignal(&ready->cond));
|
||||
THREAD_CHECK_RET(wolfSSL_CondEnd(&ready->cond));
|
||||
}
|
||||
#endif
|
||||
|
||||
void wait_tcp_ready(func_args* args)
|
||||
{
|
||||
#if !defined(SINGLE_THREADED) && defined(WOLFSSL_COND)
|
||||
tcp_ready* ready = args->signal;
|
||||
THREAD_CHECK_RET(wolfSSL_CondStart(&ready->cond));
|
||||
if (!ready->ready) {
|
||||
THREAD_CHECK_RET(wolfSSL_CondWait(&ready->cond));
|
||||
}
|
||||
ready->ready = 0; /* reset */
|
||||
THREAD_CHECK_RET(wolfSSL_CondEnd(&ready->cond));
|
||||
#else
|
||||
/* no threading wait or single threaded */
|
||||
(void)args;
|
||||
#endif
|
||||
}
|
||||
|
||||
#ifndef SINGLE_THREADED
|
||||
/* Start a thread.
|
||||
*
|
||||
* @param [in] fun Function to execute in thread.
|
||||
* @param [in] args Object to send to function in thread.
|
||||
* @param [out] thread Handle to thread.
|
||||
*/
|
||||
void start_thread(THREAD_CB fun, func_args* args, THREAD_TYPE* thread)
|
||||
{
|
||||
THREAD_CHECK_RET(wolfSSL_NewThread(thread, fun, args));
|
||||
}
|
||||
|
||||
|
||||
/* Join thread to wait for completion.
|
||||
*
|
||||
* @param [in] thread Handle to thread.
|
||||
*/
|
||||
void join_thread(THREAD_TYPE thread)
|
||||
{
|
||||
THREAD_CHECK_RET(wolfSSL_JoinThread(thread));
|
||||
}
|
||||
#endif /* SINGLE_THREADED */
|
||||
|
|
@ -0,0 +1,40 @@
|
|||
/* utils.h
|
||||
*
|
||||
* Copyright (C) 2006-2025 wolfSSL Inc.
|
||||
*
|
||||
* This file is part of wolfSSL.
|
||||
*
|
||||
* wolfSSL is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* wolfSSL is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
||||
*/
|
||||
|
||||
/* This is a set of utility functions that are used by testsuite.c. They are
|
||||
* also used in api.c but we want to keep the utils for testsuite.c as small
|
||||
* as possible. */
|
||||
|
||||
#ifndef TESTSUITE_UTILS_H
|
||||
#define TESTSUITE_UTILS_H
|
||||
|
||||
/* Return
|
||||
* tmpDir on success
|
||||
* NULL on failure */
|
||||
char* create_tmp_dir(char* tmpDir, int len);
|
||||
/* Remaining functions return
|
||||
* 0 on success
|
||||
* -1 on failure */
|
||||
int rem_dir(const char* dirName);
|
||||
int rem_file(const char* fileName);
|
||||
int copy_file(const char* in, const char* out);
|
||||
|
||||
#endif /* TESTSUITE_UTILS_H */
|
|
@ -680,16 +680,6 @@ void test_wolfSSL_client_server_nofail_ex(callback_functions* client_cb,
|
|||
void test_wolfSSL_client_server_nofail(callback_functions* client_cb,
|
||||
callback_functions* server_cb);
|
||||
|
||||
/* Return
|
||||
* tmpDir on success
|
||||
* NULL on failure */
|
||||
char* create_tmp_dir(char* tmpDir, int len);
|
||||
/* Remaining functions return
|
||||
* 0 on success
|
||||
* -1 on failure */
|
||||
int rem_dir(const char* dirName);
|
||||
int rem_file(const char* fileName);
|
||||
int copy_file(const char* in, const char* out);
|
||||
|
||||
#if defined(__MACH__) || defined(__FreeBSD__)
|
||||
int link_file(const char* in, const char* out);
|
||||
|
|
Loading…
Reference in New Issue