Merge pull request #7461 from valeriosetti/issue7460-part1
Fixing USE_PSA_INIT/DONE in SSL/X509/PK test suites
This commit is contained in:
commit
f317df98ea
8 changed files with 233 additions and 118 deletions
|
@ -13,7 +13,8 @@ General considerations
|
||||||
|
|
||||||
**Application code:** when this option is enabled, you need to call
|
**Application code:** when this option is enabled, you need to call
|
||||||
`psa_crypto_init()` before calling any function from the SSL/TLS, X.509 or PK
|
`psa_crypto_init()` before calling any function from the SSL/TLS, X.509 or PK
|
||||||
module.
|
modules, except for the various mbedtls_xxx_init() functions which can be called
|
||||||
|
at any time.
|
||||||
|
|
||||||
**Why enable this option:** to fully take advantage of PSA drivers in PK,
|
**Why enable this option:** to fully take advantage of PSA drivers in PK,
|
||||||
X.509 and TLS. For example, enabling this option is what allows use of drivers
|
X.509 and TLS. For example, enabling this option is what allows use of drivers
|
||||||
|
|
|
@ -1931,7 +1931,8 @@
|
||||||
* break backwards compatibility.
|
* break backwards compatibility.
|
||||||
*
|
*
|
||||||
* \warning If you enable this option, you need to call `psa_crypto_init()`
|
* \warning If you enable this option, you need to call `psa_crypto_init()`
|
||||||
* before calling any function from the SSL/TLS, X.509 or PK modules.
|
* before calling any function from the SSL/TLS, X.509 or PK modules, except
|
||||||
|
* for the various mbedtls_xxx_init() functions which can be called at any time.
|
||||||
*
|
*
|
||||||
* \note An important and desirable effect of this option is that it allows
|
* \note An important and desirable effect of this option is that it allows
|
||||||
* PK, X.509 and TLS to take advantage of PSA drivers. For example, enabling
|
* PK, X.509 and TLS to take advantage of PSA drivers. For example, enabling
|
||||||
|
|
|
@ -216,10 +216,9 @@ void pk_psa_utils(int key_is_rsa)
|
||||||
size_t len;
|
size_t len;
|
||||||
mbedtls_pk_debug_item dbg;
|
mbedtls_pk_debug_item dbg;
|
||||||
|
|
||||||
PSA_ASSERT(psa_crypto_init());
|
|
||||||
|
|
||||||
mbedtls_pk_init(&pk);
|
mbedtls_pk_init(&pk);
|
||||||
mbedtls_pk_init(&pk2);
|
mbedtls_pk_init(&pk2);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_ASSERT(psa_crypto_init() == PSA_SUCCESS);
|
TEST_ASSERT(psa_crypto_init() == PSA_SUCCESS);
|
||||||
|
|
||||||
|
@ -314,9 +313,8 @@ void pk_can_do_ext(int opaque_key, int key_type, int key_usage, int key_alg,
|
||||||
mbedtls_svc_key_id_t key = MBEDTLS_SVC_KEY_ID_INIT;
|
mbedtls_svc_key_id_t key = MBEDTLS_SVC_KEY_ID_INIT;
|
||||||
psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
|
psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
|
||||||
|
|
||||||
PSA_ASSERT(psa_crypto_init());
|
|
||||||
|
|
||||||
mbedtls_pk_init(&pk);
|
mbedtls_pk_init(&pk);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
if (opaque_key == 1) {
|
if (opaque_key == 1) {
|
||||||
psa_set_key_usage_flags(&attributes, key_usage);
|
psa_set_key_usage_flags(&attributes, key_usage);
|
||||||
|
@ -362,6 +360,7 @@ void pk_invalid_param()
|
||||||
size_t buf_size = sizeof(buf);
|
size_t buf_size = sizeof(buf);
|
||||||
|
|
||||||
mbedtls_pk_init(&ctx);
|
mbedtls_pk_init(&ctx);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_EQUAL(MBEDTLS_ERR_PK_BAD_INPUT_DATA,
|
TEST_EQUAL(MBEDTLS_ERR_PK_BAD_INPUT_DATA,
|
||||||
mbedtls_pk_verify_restartable(&ctx, MBEDTLS_MD_NONE,
|
mbedtls_pk_verify_restartable(&ctx, MBEDTLS_MD_NONE,
|
||||||
|
@ -397,6 +396,7 @@ void pk_invalid_param()
|
||||||
NULL));
|
NULL));
|
||||||
exit:
|
exit:
|
||||||
mbedtls_pk_free(&ctx);
|
mbedtls_pk_free(&ctx);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -409,6 +409,7 @@ void valid_parameters()
|
||||||
void *options = NULL;
|
void *options = NULL;
|
||||||
|
|
||||||
mbedtls_pk_init(&pk);
|
mbedtls_pk_init(&pk);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_pk_setup(&pk, NULL) ==
|
TEST_ASSERT(mbedtls_pk_setup(&pk, NULL) ==
|
||||||
MBEDTLS_ERR_PK_BAD_INPUT_DATA);
|
MBEDTLS_ERR_PK_BAD_INPUT_DATA);
|
||||||
|
@ -484,6 +485,7 @@ void valid_parameters()
|
||||||
TEST_ASSERT(mbedtls_pk_parse_public_key(&pk, NULL, 0) ==
|
TEST_ASSERT(mbedtls_pk_parse_public_key(&pk, NULL, 0) ==
|
||||||
MBEDTLS_ERR_PK_KEY_INVALID_FORMAT);
|
MBEDTLS_ERR_PK_KEY_INVALID_FORMAT);
|
||||||
#endif /* MBEDTLS_PK_PARSE_C */
|
#endif /* MBEDTLS_PK_PARSE_C */
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -494,6 +496,8 @@ void valid_parameters_pkwrite(data_t *key_data)
|
||||||
|
|
||||||
/* For the write tests to be effective, we need a valid key pair. */
|
/* For the write tests to be effective, we need a valid key pair. */
|
||||||
mbedtls_pk_init(&pk);
|
mbedtls_pk_init(&pk);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_pk_parse_key(&pk,
|
TEST_ASSERT(mbedtls_pk_parse_key(&pk,
|
||||||
key_data->x, key_data->len, NULL, 0,
|
key_data->x, key_data->len, NULL, 0,
|
||||||
mbedtls_test_rnd_std_rand, NULL) == 0);
|
mbedtls_test_rnd_std_rand, NULL) == 0);
|
||||||
|
@ -514,6 +518,7 @@ void valid_parameters_pkwrite(data_t *key_data)
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
mbedtls_pk_free(&pk);
|
mbedtls_pk_free(&pk);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -522,8 +527,8 @@ void pk_utils(int type, int parameter, int bitlen, int len, char *name)
|
||||||
{
|
{
|
||||||
mbedtls_pk_context pk;
|
mbedtls_pk_context pk;
|
||||||
|
|
||||||
USE_PSA_INIT();
|
|
||||||
mbedtls_pk_init(&pk);
|
mbedtls_pk_init(&pk);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_pk_setup(&pk, mbedtls_pk_info_from_type(type)) == 0);
|
TEST_ASSERT(mbedtls_pk_setup(&pk, mbedtls_pk_info_from_type(type)) == 0);
|
||||||
TEST_ASSERT(pk_genkey(&pk, parameter) == 0);
|
TEST_ASSERT(pk_genkey(&pk, parameter) == 0);
|
||||||
|
@ -545,11 +550,10 @@ void mbedtls_pk_check_pair(char *pub_file, char *prv_file, int ret)
|
||||||
{
|
{
|
||||||
mbedtls_pk_context pub, prv, alt;
|
mbedtls_pk_context pub, prv, alt;
|
||||||
|
|
||||||
USE_PSA_INIT();
|
|
||||||
|
|
||||||
mbedtls_pk_init(&pub);
|
mbedtls_pk_init(&pub);
|
||||||
mbedtls_pk_init(&prv);
|
mbedtls_pk_init(&prv);
|
||||||
mbedtls_pk_init(&alt);
|
mbedtls_pk_init(&alt);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
#if defined(MBEDTLS_USE_PSA_CRYPTO)
|
#if defined(MBEDTLS_USE_PSA_CRYPTO)
|
||||||
/* mbedtls_pk_check_pair() returns either PK or ECP error codes depending
|
/* mbedtls_pk_check_pair() returns either PK or ECP error codes depending
|
||||||
|
@ -604,10 +608,8 @@ void pk_rsa_verify_test_vec(data_t *message_str, int digest, int mod,
|
||||||
mbedtls_ecp_set_max_ops(1);
|
mbedtls_ecp_set_max_ops(1);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
USE_PSA_INIT();
|
|
||||||
|
|
||||||
mbedtls_pk_init(&pk);
|
mbedtls_pk_init(&pk);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_pk_setup(&pk, mbedtls_pk_info_from_type(MBEDTLS_PK_RSA)) == 0);
|
TEST_ASSERT(mbedtls_pk_setup(&pk, mbedtls_pk_info_from_type(MBEDTLS_PK_RSA)) == 0);
|
||||||
rsa = mbedtls_pk_rsa(pk);
|
rsa = mbedtls_pk_rsa(pk);
|
||||||
|
@ -646,8 +648,8 @@ void pk_rsa_verify_ext_test_vec(data_t *message_str, int digest,
|
||||||
void *options;
|
void *options;
|
||||||
int ret;
|
int ret;
|
||||||
|
|
||||||
MD_OR_USE_PSA_INIT();
|
|
||||||
mbedtls_pk_init(&pk);
|
mbedtls_pk_init(&pk);
|
||||||
|
MD_OR_USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_pk_setup(&pk, mbedtls_pk_info_from_type(MBEDTLS_PK_RSA)) == 0);
|
TEST_ASSERT(mbedtls_pk_setup(&pk, mbedtls_pk_info_from_type(MBEDTLS_PK_RSA)) == 0);
|
||||||
rsa = mbedtls_pk_rsa(pk);
|
rsa = mbedtls_pk_rsa(pk);
|
||||||
|
@ -735,11 +737,11 @@ void pk_sign_verify_restart(int pk_type, int grp_id, char *d_str,
|
||||||
unsigned char sig[MBEDTLS_ECDSA_MAX_LEN];
|
unsigned char sig[MBEDTLS_ECDSA_MAX_LEN];
|
||||||
size_t slen;
|
size_t slen;
|
||||||
|
|
||||||
USE_PSA_INIT();
|
|
||||||
|
|
||||||
mbedtls_pk_restart_init(&rs_ctx);
|
mbedtls_pk_restart_init(&rs_ctx);
|
||||||
mbedtls_pk_init(&prv);
|
mbedtls_pk_init(&prv);
|
||||||
mbedtls_pk_init(&pub);
|
mbedtls_pk_init(&pub);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
memset(sig, 0, sizeof(sig));
|
memset(sig, 0, sizeof(sig));
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_pk_setup(&prv, mbedtls_pk_info_from_type(pk_type)) == 0);
|
TEST_ASSERT(mbedtls_pk_setup(&prv, mbedtls_pk_info_from_type(pk_type)) == 0);
|
||||||
|
@ -915,12 +917,11 @@ void pk_rsa_encrypt_decrypt_test(data_t *message, int mod,
|
||||||
mbedtls_pk_init(&pk);
|
mbedtls_pk_init(&pk);
|
||||||
mbedtls_mpi_init(&N); mbedtls_mpi_init(&P);
|
mbedtls_mpi_init(&N); mbedtls_mpi_init(&P);
|
||||||
mbedtls_mpi_init(&Q); mbedtls_mpi_init(&E);
|
mbedtls_mpi_init(&Q); mbedtls_mpi_init(&E);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
memset(&rnd_info, 0, sizeof(mbedtls_test_rnd_pseudo_info));
|
memset(&rnd_info, 0, sizeof(mbedtls_test_rnd_pseudo_info));
|
||||||
memset(output, 0, sizeof(output));
|
memset(output, 0, sizeof(output));
|
||||||
|
|
||||||
USE_PSA_INIT();
|
|
||||||
|
|
||||||
/* encryption test */
|
/* encryption test */
|
||||||
|
|
||||||
/* init pk-rsa context */
|
/* init pk-rsa context */
|
||||||
|
@ -988,15 +989,13 @@ void pk_rsa_decrypt_test_vec(data_t *cipher, int mod,
|
||||||
mbedtls_pk_context pk;
|
mbedtls_pk_context pk;
|
||||||
size_t olen;
|
size_t olen;
|
||||||
|
|
||||||
USE_PSA_INIT();
|
|
||||||
|
|
||||||
mbedtls_pk_init(&pk);
|
mbedtls_pk_init(&pk);
|
||||||
mbedtls_mpi_init(&N); mbedtls_mpi_init(&P);
|
mbedtls_mpi_init(&N); mbedtls_mpi_init(&P);
|
||||||
mbedtls_mpi_init(&Q); mbedtls_mpi_init(&E);
|
mbedtls_mpi_init(&Q); mbedtls_mpi_init(&E);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
memset(&rnd_info, 0, sizeof(mbedtls_test_rnd_pseudo_info));
|
memset(&rnd_info, 0, sizeof(mbedtls_test_rnd_pseudo_info));
|
||||||
|
|
||||||
|
|
||||||
/* init pk-rsa context */
|
/* init pk-rsa context */
|
||||||
TEST_ASSERT(mbedtls_pk_setup(&pk, mbedtls_pk_info_from_type(MBEDTLS_PK_RSA)) == 0);
|
TEST_ASSERT(mbedtls_pk_setup(&pk, mbedtls_pk_info_from_type(MBEDTLS_PK_RSA)) == 0);
|
||||||
rsa = mbedtls_pk_rsa(pk);
|
rsa = mbedtls_pk_rsa(pk);
|
||||||
|
@ -1045,11 +1044,10 @@ void pk_wrap_rsa_decrypt_test_vec(data_t *cipher, int mod,
|
||||||
mbedtls_svc_key_id_t key_id;
|
mbedtls_svc_key_id_t key_id;
|
||||||
size_t olen;
|
size_t olen;
|
||||||
|
|
||||||
USE_PSA_INIT();
|
|
||||||
|
|
||||||
mbedtls_pk_init(&pk);
|
mbedtls_pk_init(&pk);
|
||||||
mbedtls_mpi_init(&N); mbedtls_mpi_init(&P);
|
mbedtls_mpi_init(&N); mbedtls_mpi_init(&P);
|
||||||
mbedtls_mpi_init(&Q); mbedtls_mpi_init(&E);
|
mbedtls_mpi_init(&Q); mbedtls_mpi_init(&E);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
memset(&rnd_info, 0, sizeof(mbedtls_test_rnd_pseudo_info));
|
memset(&rnd_info, 0, sizeof(mbedtls_test_rnd_pseudo_info));
|
||||||
|
|
||||||
|
@ -1107,6 +1105,7 @@ void pk_ec_nocrypt(int type)
|
||||||
int ret = MBEDTLS_ERR_PK_TYPE_MISMATCH;
|
int ret = MBEDTLS_ERR_PK_TYPE_MISMATCH;
|
||||||
|
|
||||||
mbedtls_pk_init(&pk);
|
mbedtls_pk_init(&pk);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
memset(&rnd_info, 0, sizeof(mbedtls_test_rnd_pseudo_info));
|
memset(&rnd_info, 0, sizeof(mbedtls_test_rnd_pseudo_info));
|
||||||
memset(output, 0, sizeof(output));
|
memset(output, 0, sizeof(output));
|
||||||
|
@ -1124,6 +1123,7 @@ void pk_ec_nocrypt(int type)
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
mbedtls_pk_free(&pk);
|
mbedtls_pk_free(&pk);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -1131,14 +1131,15 @@ exit:
|
||||||
void pk_rsa_overflow()
|
void pk_rsa_overflow()
|
||||||
{
|
{
|
||||||
mbedtls_pk_context pk;
|
mbedtls_pk_context pk;
|
||||||
size_t hash_len = SIZE_MAX, sig_len = SIZE_MAX;
|
size_t hash_len = UINT_MAX + 1, sig_len = UINT_MAX + 1;
|
||||||
unsigned char hash[50], sig[100];
|
unsigned char hash[50], sig[100];
|
||||||
|
|
||||||
|
mbedtls_pk_init(&pk);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
memset(hash, 0x2a, sizeof(hash));
|
memset(hash, 0x2a, sizeof(hash));
|
||||||
memset(sig, 0, sizeof(sig));
|
memset(sig, 0, sizeof(sig));
|
||||||
|
|
||||||
mbedtls_pk_init(&pk);
|
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_pk_setup(&pk,
|
TEST_ASSERT(mbedtls_pk_setup(&pk,
|
||||||
mbedtls_pk_info_from_type(MBEDTLS_PK_RSA)) == 0);
|
mbedtls_pk_info_from_type(MBEDTLS_PK_RSA)) == 0);
|
||||||
|
|
||||||
|
@ -1158,6 +1159,7 @@ void pk_rsa_overflow()
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
mbedtls_pk_free(&pk);
|
mbedtls_pk_free(&pk);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -1177,10 +1179,10 @@ void pk_rsa_alt()
|
||||||
size_t sig_len, ciph_len, test_len;
|
size_t sig_len, ciph_len, test_len;
|
||||||
int ret = MBEDTLS_ERR_PK_TYPE_MISMATCH;
|
int ret = MBEDTLS_ERR_PK_TYPE_MISMATCH;
|
||||||
|
|
||||||
USE_PSA_INIT();
|
|
||||||
|
|
||||||
mbedtls_rsa_init(&raw);
|
mbedtls_rsa_init(&raw);
|
||||||
mbedtls_pk_init(&rsa); mbedtls_pk_init(&alt);
|
mbedtls_pk_init(&rsa);
|
||||||
|
mbedtls_pk_init(&alt);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
memset(hash, 0x2a, sizeof(hash));
|
memset(hash, 0x2a, sizeof(hash));
|
||||||
memset(sig, 0, sizeof(sig));
|
memset(sig, 0, sizeof(sig));
|
||||||
|
@ -1274,12 +1276,12 @@ void pk_psa_sign(int parameter_arg,
|
||||||
* - parse it to a PK context and verify the signature this way
|
* - parse it to a PK context and verify the signature this way
|
||||||
*/
|
*/
|
||||||
|
|
||||||
PSA_ASSERT(psa_crypto_init());
|
mbedtls_pk_init(&pk);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
#if defined(MBEDTLS_RSA_C) && defined(MBEDTLS_GENPRIME)
|
#if defined(MBEDTLS_RSA_C) && defined(MBEDTLS_GENPRIME)
|
||||||
if (PSA_KEY_TYPE_IS_RSA(psa_type_arg)) {
|
if (PSA_KEY_TYPE_IS_RSA(psa_type_arg)) {
|
||||||
/* Create legacy RSA public/private key in PK context. */
|
/* Create legacy RSA public/private key in PK context. */
|
||||||
mbedtls_pk_init(&pk);
|
|
||||||
TEST_ASSERT(mbedtls_pk_setup(&pk,
|
TEST_ASSERT(mbedtls_pk_setup(&pk,
|
||||||
mbedtls_pk_info_from_type(MBEDTLS_PK_RSA)) == 0);
|
mbedtls_pk_info_from_type(MBEDTLS_PK_RSA)) == 0);
|
||||||
TEST_ASSERT(mbedtls_rsa_gen_key(mbedtls_pk_rsa(pk),
|
TEST_ASSERT(mbedtls_rsa_gen_key(mbedtls_pk_rsa(pk),
|
||||||
|
@ -1293,7 +1295,6 @@ void pk_psa_sign(int parameter_arg,
|
||||||
mbedtls_ecp_group_id grpid = parameter_arg;
|
mbedtls_ecp_group_id grpid = parameter_arg;
|
||||||
|
|
||||||
/* Create legacy EC public/private key in PK context. */
|
/* Create legacy EC public/private key in PK context. */
|
||||||
mbedtls_pk_init(&pk);
|
|
||||||
TEST_ASSERT(mbedtls_pk_setup(&pk,
|
TEST_ASSERT(mbedtls_pk_setup(&pk,
|
||||||
mbedtls_pk_info_from_type(MBEDTLS_PK_ECKEY)) == 0);
|
mbedtls_pk_info_from_type(MBEDTLS_PK_ECKEY)) == 0);
|
||||||
TEST_ASSERT(pk_genkey(&pk, grpid) == 0);
|
TEST_ASSERT(pk_genkey(&pk, grpid) == 0);
|
||||||
|
@ -1434,8 +1435,8 @@ void pk_psa_sign_ext(int pk_type, int parameter, int key_pk_type, int md_alg)
|
||||||
TEST_ASSERT(mbedtls_pk_verify_ext(key_pk_type, options, &pk, md_alg,
|
TEST_ASSERT(mbedtls_pk_verify_ext(key_pk_type, options, &pk, md_alg,
|
||||||
hash, hash_len, sig, sig_len) == 0);
|
hash, hash_len, sig, sig_len) == 0);
|
||||||
exit:
|
exit:
|
||||||
PSA_DONE();
|
|
||||||
mbedtls_pk_free(&pk);
|
mbedtls_pk_free(&pk);
|
||||||
|
PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
|
|
@ -17,9 +17,8 @@ void pk_parse_keyfile_rsa(char *key_file, char *password, int result)
|
||||||
int res;
|
int res;
|
||||||
char *pwd = password;
|
char *pwd = password;
|
||||||
|
|
||||||
MD_PSA_INIT();
|
|
||||||
|
|
||||||
mbedtls_pk_init(&ctx);
|
mbedtls_pk_init(&ctx);
|
||||||
|
MD_PSA_INIT();
|
||||||
|
|
||||||
if (strcmp(pwd, "NULL") == 0) {
|
if (strcmp(pwd, "NULL") == 0) {
|
||||||
pwd = NULL;
|
pwd = NULL;
|
||||||
|
@ -50,9 +49,8 @@ void pk_parse_public_keyfile_rsa(char *key_file, int result)
|
||||||
mbedtls_pk_context ctx;
|
mbedtls_pk_context ctx;
|
||||||
int res;
|
int res;
|
||||||
|
|
||||||
MD_PSA_INIT();
|
|
||||||
|
|
||||||
mbedtls_pk_init(&ctx);
|
mbedtls_pk_init(&ctx);
|
||||||
|
MD_PSA_INIT();
|
||||||
|
|
||||||
res = mbedtls_pk_parse_public_keyfile(&ctx, key_file);
|
res = mbedtls_pk_parse_public_keyfile(&ctx, key_file);
|
||||||
|
|
||||||
|
@ -78,6 +76,7 @@ void pk_parse_public_keyfile_ec(char *key_file, int result)
|
||||||
int res;
|
int res;
|
||||||
|
|
||||||
mbedtls_pk_init(&ctx);
|
mbedtls_pk_init(&ctx);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
res = mbedtls_pk_parse_public_keyfile(&ctx, key_file);
|
res = mbedtls_pk_parse_public_keyfile(&ctx, key_file);
|
||||||
|
|
||||||
|
@ -92,6 +91,7 @@ void pk_parse_public_keyfile_ec(char *key_file, int result)
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
mbedtls_pk_free(&ctx);
|
mbedtls_pk_free(&ctx);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -101,8 +101,8 @@ void pk_parse_keyfile_ec(char *key_file, char *password, int result)
|
||||||
mbedtls_pk_context ctx;
|
mbedtls_pk_context ctx;
|
||||||
int res;
|
int res;
|
||||||
|
|
||||||
USE_PSA_INIT();
|
|
||||||
mbedtls_pk_init(&ctx);
|
mbedtls_pk_init(&ctx);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
res = mbedtls_pk_parse_keyfile(&ctx, key_file, password,
|
res = mbedtls_pk_parse_keyfile(&ctx, key_file, password,
|
||||||
mbedtls_test_rnd_std_rand, NULL);
|
mbedtls_test_rnd_std_rand, NULL);
|
||||||
|
@ -128,11 +128,13 @@ void pk_parse_key(data_t *buf, int result)
|
||||||
mbedtls_pk_context pk;
|
mbedtls_pk_context pk;
|
||||||
|
|
||||||
mbedtls_pk_init(&pk);
|
mbedtls_pk_init(&pk);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_pk_parse_key(&pk, buf->x, buf->len, NULL, 0,
|
TEST_ASSERT(mbedtls_pk_parse_key(&pk, buf->x, buf->len, NULL, 0,
|
||||||
mbedtls_test_rnd_std_rand, NULL) == result);
|
mbedtls_test_rnd_std_rand, NULL) == result);
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
mbedtls_pk_free(&pk);
|
mbedtls_pk_free(&pk);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
|
@ -36,6 +36,9 @@ static void pk_write_check_common(char *key_file, int is_public_key, int is_der)
|
||||||
size_t buf_len, check_buf_len;
|
size_t buf_len, check_buf_len;
|
||||||
int ret;
|
int ret;
|
||||||
|
|
||||||
|
mbedtls_pk_init(&key);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
/* Note: if mbedtls_pk_load_file() successfully reads the file, then
|
/* Note: if mbedtls_pk_load_file() successfully reads the file, then
|
||||||
it also allocates check_buf, which should be freed on exit */
|
it also allocates check_buf, which should be freed on exit */
|
||||||
TEST_EQUAL(mbedtls_pk_load_file(key_file, &check_buf, &check_buf_len), 0);
|
TEST_EQUAL(mbedtls_pk_load_file(key_file, &check_buf, &check_buf_len), 0);
|
||||||
|
@ -56,7 +59,6 @@ static void pk_write_check_common(char *key_file, int is_public_key, int is_der)
|
||||||
|
|
||||||
ASSERT_ALLOC(buf, check_buf_len);
|
ASSERT_ALLOC(buf, check_buf_len);
|
||||||
|
|
||||||
mbedtls_pk_init(&key);
|
|
||||||
if (is_public_key) {
|
if (is_public_key) {
|
||||||
TEST_EQUAL(mbedtls_pk_parse_public_keyfile(&key, key_file), 0);
|
TEST_EQUAL(mbedtls_pk_parse_public_keyfile(&key, key_file), 0);
|
||||||
if (is_der) {
|
if (is_der) {
|
||||||
|
@ -98,6 +100,7 @@ exit:
|
||||||
mbedtls_free(buf);
|
mbedtls_free(buf);
|
||||||
mbedtls_free(check_buf);
|
mbedtls_free(check_buf);
|
||||||
mbedtls_pk_free(&key);
|
mbedtls_pk_free(&key);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_HEADER */
|
/* END_HEADER */
|
||||||
|
|
||||||
|
|
|
@ -12,6 +12,8 @@
|
||||||
#include <constant_time_internal.h>
|
#include <constant_time_internal.h>
|
||||||
#include <test/constant_flow.h>
|
#include <test/constant_flow.h>
|
||||||
|
|
||||||
|
#define SSL_MESSAGE_QUEUE_INIT { NULL, 0, 0, 0 }
|
||||||
|
|
||||||
/* END_HEADER */
|
/* END_HEADER */
|
||||||
|
|
||||||
/* BEGIN_DEPENDENCIES
|
/* BEGIN_DEPENDENCIES
|
||||||
|
@ -27,6 +29,7 @@ void test_callback_buffer_sanity()
|
||||||
unsigned char input[MSGLEN];
|
unsigned char input[MSGLEN];
|
||||||
unsigned char output[MSGLEN];
|
unsigned char output[MSGLEN];
|
||||||
|
|
||||||
|
USE_PSA_INIT();
|
||||||
memset(input, 0, sizeof(input));
|
memset(input, 0, sizeof(input));
|
||||||
|
|
||||||
/* Make sure calling put and get on NULL buffer results in error. */
|
/* Make sure calling put and get on NULL buffer results in error. */
|
||||||
|
@ -79,8 +82,8 @@ void test_callback_buffer_sanity()
|
||||||
|
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
|
|
||||||
mbedtls_test_ssl_buffer_free(&buf);
|
mbedtls_test_ssl_buffer_free(&buf);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -115,6 +118,7 @@ void test_callback_buffer(int size, int put1, int put1_ret,
|
||||||
size_t i, j, written, read;
|
size_t i, j, written, read;
|
||||||
|
|
||||||
mbedtls_test_ssl_buffer_init(&buf);
|
mbedtls_test_ssl_buffer_init(&buf);
|
||||||
|
USE_PSA_INIT();
|
||||||
TEST_ASSERT(mbedtls_test_ssl_buffer_setup(&buf, size) == 0);
|
TEST_ASSERT(mbedtls_test_ssl_buffer_setup(&buf, size) == 0);
|
||||||
|
|
||||||
/* Check the sanity of input parameters and initialise local variables. That
|
/* Check the sanity of input parameters and initialise local variables. That
|
||||||
|
@ -189,10 +193,10 @@ void test_callback_buffer(int size, int put1, int put1_ret,
|
||||||
}
|
}
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
|
|
||||||
mbedtls_free(input);
|
mbedtls_free(input);
|
||||||
mbedtls_free(output);
|
mbedtls_free(output);
|
||||||
mbedtls_test_ssl_buffer_free(&buf);
|
mbedtls_test_ssl_buffer_free(&buf);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -210,6 +214,7 @@ void ssl_mock_sanity()
|
||||||
mbedtls_test_mock_socket socket;
|
mbedtls_test_mock_socket socket;
|
||||||
|
|
||||||
mbedtls_test_mock_socket_init(&socket);
|
mbedtls_test_mock_socket_init(&socket);
|
||||||
|
USE_PSA_INIT();
|
||||||
TEST_ASSERT(mbedtls_test_mock_tcp_send_b(&socket, message, MSGLEN) < 0);
|
TEST_ASSERT(mbedtls_test_mock_tcp_send_b(&socket, message, MSGLEN) < 0);
|
||||||
mbedtls_test_mock_socket_close(&socket);
|
mbedtls_test_mock_socket_close(&socket);
|
||||||
mbedtls_test_mock_socket_init(&socket);
|
mbedtls_test_mock_socket_init(&socket);
|
||||||
|
@ -224,8 +229,8 @@ void ssl_mock_sanity()
|
||||||
mbedtls_test_mock_socket_close(&socket);
|
mbedtls_test_mock_socket_close(&socket);
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
|
|
||||||
mbedtls_test_mock_socket_close(&socket);
|
mbedtls_test_mock_socket_close(&socket);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -259,6 +264,7 @@ void ssl_mock_tcp(int blocking)
|
||||||
|
|
||||||
mbedtls_test_mock_socket_init(&client);
|
mbedtls_test_mock_socket_init(&client);
|
||||||
mbedtls_test_mock_socket_init(&server);
|
mbedtls_test_mock_socket_init(&server);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
/* Fill up the buffer with structured data so that unwanted changes
|
/* Fill up the buffer with structured data so that unwanted changes
|
||||||
* can be detected */
|
* can be detected */
|
||||||
|
@ -317,9 +323,9 @@ void ssl_mock_tcp(int blocking)
|
||||||
TEST_ASSERT(memcmp(message, received, MSGLEN) == 0);
|
TEST_ASSERT(memcmp(message, received, MSGLEN) == 0);
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
|
|
||||||
mbedtls_test_mock_socket_close(&client);
|
mbedtls_test_mock_socket_close(&client);
|
||||||
mbedtls_test_mock_socket_close(&server);
|
mbedtls_test_mock_socket_close(&server);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -357,6 +363,7 @@ void ssl_mock_tcp_interleaving(int blocking)
|
||||||
|
|
||||||
mbedtls_test_mock_socket_init(&client);
|
mbedtls_test_mock_socket_init(&client);
|
||||||
mbedtls_test_mock_socket_init(&server);
|
mbedtls_test_mock_socket_init(&server);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
/* Fill up the buffers with structured data so that unwanted changes
|
/* Fill up the buffers with structured data so that unwanted changes
|
||||||
* can be detected */
|
* can be detected */
|
||||||
|
@ -445,17 +452,18 @@ void ssl_mock_tcp_interleaving(int blocking)
|
||||||
}
|
}
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
|
|
||||||
mbedtls_test_mock_socket_close(&client);
|
mbedtls_test_mock_socket_close(&client);
|
||||||
mbedtls_test_mock_socket_close(&server);
|
mbedtls_test_mock_socket_close(&server);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
/* BEGIN_CASE */
|
/* BEGIN_CASE */
|
||||||
void ssl_message_queue_sanity()
|
void ssl_message_queue_sanity()
|
||||||
{
|
{
|
||||||
mbedtls_test_ssl_message_queue queue;
|
mbedtls_test_ssl_message_queue queue = SSL_MESSAGE_QUEUE_INIT;
|
||||||
|
|
||||||
|
USE_PSA_INIT();
|
||||||
/* Trying to push/pull to an empty queue */
|
/* Trying to push/pull to an empty queue */
|
||||||
TEST_ASSERT(mbedtls_test_ssl_message_queue_push_info(NULL, 1)
|
TEST_ASSERT(mbedtls_test_ssl_message_queue_push_info(NULL, 1)
|
||||||
== MBEDTLS_TEST_ERROR_ARG_NULL);
|
== MBEDTLS_TEST_ERROR_ARG_NULL);
|
||||||
|
@ -468,14 +476,16 @@ void ssl_message_queue_sanity()
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
mbedtls_test_ssl_message_queue_free(&queue);
|
mbedtls_test_ssl_message_queue_free(&queue);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
/* BEGIN_CASE */
|
/* BEGIN_CASE */
|
||||||
void ssl_message_queue_basic()
|
void ssl_message_queue_basic()
|
||||||
{
|
{
|
||||||
mbedtls_test_ssl_message_queue queue;
|
mbedtls_test_ssl_message_queue queue = SSL_MESSAGE_QUEUE_INIT;
|
||||||
|
|
||||||
|
USE_PSA_INIT();
|
||||||
TEST_ASSERT(mbedtls_test_ssl_message_queue_setup(&queue, 3) == 0);
|
TEST_ASSERT(mbedtls_test_ssl_message_queue_setup(&queue, 3) == 0);
|
||||||
|
|
||||||
/* Sanity test - 3 pushes and 3 pops with sufficient space */
|
/* Sanity test - 3 pushes and 3 pops with sufficient space */
|
||||||
|
@ -495,14 +505,16 @@ void ssl_message_queue_basic()
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
mbedtls_test_ssl_message_queue_free(&queue);
|
mbedtls_test_ssl_message_queue_free(&queue);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
/* BEGIN_CASE */
|
/* BEGIN_CASE */
|
||||||
void ssl_message_queue_overflow_underflow()
|
void ssl_message_queue_overflow_underflow()
|
||||||
{
|
{
|
||||||
mbedtls_test_ssl_message_queue queue;
|
mbedtls_test_ssl_message_queue queue = SSL_MESSAGE_QUEUE_INIT;
|
||||||
|
|
||||||
|
USE_PSA_INIT();
|
||||||
TEST_ASSERT(mbedtls_test_ssl_message_queue_setup(&queue, 3) == 0);
|
TEST_ASSERT(mbedtls_test_ssl_message_queue_setup(&queue, 3) == 0);
|
||||||
|
|
||||||
/* 4 pushes (last one with an error), 4 pops (last one with an error) */
|
/* 4 pushes (last one with an error), 4 pops (last one with an error) */
|
||||||
|
@ -521,14 +533,16 @@ void ssl_message_queue_overflow_underflow()
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
mbedtls_test_ssl_message_queue_free(&queue);
|
mbedtls_test_ssl_message_queue_free(&queue);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
/* BEGIN_CASE */
|
/* BEGIN_CASE */
|
||||||
void ssl_message_queue_interleaved()
|
void ssl_message_queue_interleaved()
|
||||||
{
|
{
|
||||||
mbedtls_test_ssl_message_queue queue;
|
mbedtls_test_ssl_message_queue queue = SSL_MESSAGE_QUEUE_INIT;
|
||||||
|
|
||||||
|
USE_PSA_INIT();
|
||||||
TEST_ASSERT(mbedtls_test_ssl_message_queue_setup(&queue, 3) == 0);
|
TEST_ASSERT(mbedtls_test_ssl_message_queue_setup(&queue, 3) == 0);
|
||||||
|
|
||||||
/* Interleaved test - [2 pushes, 1 pop] twice, and then two pops
|
/* Interleaved test - [2 pushes, 1 pop] twice, and then two pops
|
||||||
|
@ -555,16 +569,18 @@ void ssl_message_queue_interleaved()
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
mbedtls_test_ssl_message_queue_free(&queue);
|
mbedtls_test_ssl_message_queue_free(&queue);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
/* BEGIN_CASE */
|
/* BEGIN_CASE */
|
||||||
void ssl_message_queue_insufficient_buffer()
|
void ssl_message_queue_insufficient_buffer()
|
||||||
{
|
{
|
||||||
mbedtls_test_ssl_message_queue queue;
|
mbedtls_test_ssl_message_queue queue = SSL_MESSAGE_QUEUE_INIT;
|
||||||
size_t message_len = 10;
|
size_t message_len = 10;
|
||||||
size_t buffer_len = 5;
|
size_t buffer_len = 5;
|
||||||
|
|
||||||
|
USE_PSA_INIT();
|
||||||
TEST_ASSERT(mbedtls_test_ssl_message_queue_setup(&queue, 1) == 0);
|
TEST_ASSERT(mbedtls_test_ssl_message_queue_setup(&queue, 1) == 0);
|
||||||
|
|
||||||
/* Popping without a sufficient buffer */
|
/* Popping without a sufficient buffer */
|
||||||
|
@ -574,6 +590,7 @@ void ssl_message_queue_insufficient_buffer()
|
||||||
== (int) buffer_len);
|
== (int) buffer_len);
|
||||||
exit:
|
exit:
|
||||||
mbedtls_test_ssl_message_queue_free(&queue);
|
mbedtls_test_ssl_message_queue_free(&queue);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -588,6 +605,7 @@ void ssl_message_mock_uninitialized()
|
||||||
mbedtls_test_message_socket_init(&server_context);
|
mbedtls_test_message_socket_init(&server_context);
|
||||||
mbedtls_test_message_socket_init(&client_context);
|
mbedtls_test_message_socket_init(&client_context);
|
||||||
|
|
||||||
|
USE_PSA_INIT();
|
||||||
/* Send with a NULL context */
|
/* Send with a NULL context */
|
||||||
TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(NULL, message, MSGLEN)
|
TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(NULL, message, MSGLEN)
|
||||||
== MBEDTLS_TEST_ERROR_CONTEXT_ERROR);
|
== MBEDTLS_TEST_ERROR_CONTEXT_ERROR);
|
||||||
|
@ -626,6 +644,7 @@ void ssl_message_mock_uninitialized()
|
||||||
exit:
|
exit:
|
||||||
mbedtls_test_message_socket_close(&server_context);
|
mbedtls_test_message_socket_close(&server_context);
|
||||||
mbedtls_test_message_socket_close(&client_context);
|
mbedtls_test_message_socket_close(&client_context);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -638,8 +657,10 @@ void ssl_message_mock_basic()
|
||||||
unsigned i;
|
unsigned i;
|
||||||
mbedtls_test_ssl_message_queue server_queue, client_queue;
|
mbedtls_test_ssl_message_queue server_queue, client_queue;
|
||||||
mbedtls_test_message_socket_context server_context, client_context;
|
mbedtls_test_message_socket_context server_context, client_context;
|
||||||
|
|
||||||
mbedtls_test_message_socket_init(&server_context);
|
mbedtls_test_message_socket_init(&server_context);
|
||||||
mbedtls_test_message_socket_init(&client_context);
|
mbedtls_test_message_socket_init(&client_context);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_test_message_socket_setup(&server_queue,
|
TEST_ASSERT(mbedtls_test_message_socket_setup(&server_queue,
|
||||||
&client_queue, 1,
|
&client_queue, 1,
|
||||||
|
@ -685,6 +706,7 @@ void ssl_message_mock_basic()
|
||||||
exit:
|
exit:
|
||||||
mbedtls_test_message_socket_close(&server_context);
|
mbedtls_test_message_socket_close(&server_context);
|
||||||
mbedtls_test_message_socket_close(&client_context);
|
mbedtls_test_message_socket_close(&client_context);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -697,8 +719,10 @@ void ssl_message_mock_queue_overflow_underflow()
|
||||||
unsigned i;
|
unsigned i;
|
||||||
mbedtls_test_ssl_message_queue server_queue, client_queue;
|
mbedtls_test_ssl_message_queue server_queue, client_queue;
|
||||||
mbedtls_test_message_socket_context server_context, client_context;
|
mbedtls_test_message_socket_context server_context, client_context;
|
||||||
|
|
||||||
mbedtls_test_message_socket_init(&server_context);
|
mbedtls_test_message_socket_init(&server_context);
|
||||||
mbedtls_test_message_socket_init(&client_context);
|
mbedtls_test_message_socket_init(&client_context);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_test_message_socket_setup(&server_queue,
|
TEST_ASSERT(mbedtls_test_message_socket_setup(&server_queue,
|
||||||
&client_queue, 2,
|
&client_queue, 2,
|
||||||
|
@ -749,6 +773,7 @@ void ssl_message_mock_queue_overflow_underflow()
|
||||||
exit:
|
exit:
|
||||||
mbedtls_test_message_socket_close(&server_context);
|
mbedtls_test_message_socket_close(&server_context);
|
||||||
mbedtls_test_message_socket_close(&client_context);
|
mbedtls_test_message_socket_close(&client_context);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -761,8 +786,10 @@ void ssl_message_mock_socket_overflow()
|
||||||
unsigned i;
|
unsigned i;
|
||||||
mbedtls_test_ssl_message_queue server_queue, client_queue;
|
mbedtls_test_ssl_message_queue server_queue, client_queue;
|
||||||
mbedtls_test_message_socket_context server_context, client_context;
|
mbedtls_test_message_socket_context server_context, client_context;
|
||||||
|
|
||||||
mbedtls_test_message_socket_init(&server_context);
|
mbedtls_test_message_socket_init(&server_context);
|
||||||
mbedtls_test_message_socket_init(&client_context);
|
mbedtls_test_message_socket_init(&client_context);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_test_message_socket_setup(&server_queue,
|
TEST_ASSERT(mbedtls_test_message_socket_setup(&server_queue,
|
||||||
&client_queue, 2,
|
&client_queue, 2,
|
||||||
|
@ -801,6 +828,7 @@ void ssl_message_mock_socket_overflow()
|
||||||
exit:
|
exit:
|
||||||
mbedtls_test_message_socket_close(&server_context);
|
mbedtls_test_message_socket_close(&server_context);
|
||||||
mbedtls_test_message_socket_close(&client_context);
|
mbedtls_test_message_socket_close(&client_context);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -813,8 +841,10 @@ void ssl_message_mock_truncated()
|
||||||
unsigned i;
|
unsigned i;
|
||||||
mbedtls_test_ssl_message_queue server_queue, client_queue;
|
mbedtls_test_ssl_message_queue server_queue, client_queue;
|
||||||
mbedtls_test_message_socket_context server_context, client_context;
|
mbedtls_test_message_socket_context server_context, client_context;
|
||||||
|
|
||||||
mbedtls_test_message_socket_init(&server_context);
|
mbedtls_test_message_socket_init(&server_context);
|
||||||
mbedtls_test_message_socket_init(&client_context);
|
mbedtls_test_message_socket_init(&client_context);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_test_message_socket_setup(&server_queue,
|
TEST_ASSERT(mbedtls_test_message_socket_setup(&server_queue,
|
||||||
&client_queue, 2,
|
&client_queue, 2,
|
||||||
|
@ -865,6 +895,7 @@ void ssl_message_mock_truncated()
|
||||||
exit:
|
exit:
|
||||||
mbedtls_test_message_socket_close(&server_context);
|
mbedtls_test_message_socket_close(&server_context);
|
||||||
mbedtls_test_message_socket_close(&client_context);
|
mbedtls_test_message_socket_close(&client_context);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -877,8 +908,10 @@ void ssl_message_mock_socket_read_error()
|
||||||
unsigned i;
|
unsigned i;
|
||||||
mbedtls_test_ssl_message_queue server_queue, client_queue;
|
mbedtls_test_ssl_message_queue server_queue, client_queue;
|
||||||
mbedtls_test_message_socket_context server_context, client_context;
|
mbedtls_test_message_socket_context server_context, client_context;
|
||||||
|
|
||||||
mbedtls_test_message_socket_init(&server_context);
|
mbedtls_test_message_socket_init(&server_context);
|
||||||
mbedtls_test_message_socket_init(&client_context);
|
mbedtls_test_message_socket_init(&client_context);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_test_message_socket_setup(&server_queue,
|
TEST_ASSERT(mbedtls_test_message_socket_setup(&server_queue,
|
||||||
&client_queue, 1,
|
&client_queue, 1,
|
||||||
|
@ -923,6 +956,7 @@ void ssl_message_mock_socket_read_error()
|
||||||
exit:
|
exit:
|
||||||
mbedtls_test_message_socket_close(&server_context);
|
mbedtls_test_message_socket_close(&server_context);
|
||||||
mbedtls_test_message_socket_close(&client_context);
|
mbedtls_test_message_socket_close(&client_context);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -935,8 +969,10 @@ void ssl_message_mock_interleaved_one_way()
|
||||||
unsigned i;
|
unsigned i;
|
||||||
mbedtls_test_ssl_message_queue server_queue, client_queue;
|
mbedtls_test_ssl_message_queue server_queue, client_queue;
|
||||||
mbedtls_test_message_socket_context server_context, client_context;
|
mbedtls_test_message_socket_context server_context, client_context;
|
||||||
|
|
||||||
mbedtls_test_message_socket_init(&server_context);
|
mbedtls_test_message_socket_init(&server_context);
|
||||||
mbedtls_test_message_socket_init(&client_context);
|
mbedtls_test_message_socket_init(&client_context);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_test_message_socket_setup(&server_queue,
|
TEST_ASSERT(mbedtls_test_message_socket_setup(&server_queue,
|
||||||
&client_queue, 3,
|
&client_queue, 3,
|
||||||
|
@ -983,6 +1019,7 @@ void ssl_message_mock_interleaved_one_way()
|
||||||
exit:
|
exit:
|
||||||
mbedtls_test_message_socket_close(&server_context);
|
mbedtls_test_message_socket_close(&server_context);
|
||||||
mbedtls_test_message_socket_close(&client_context);
|
mbedtls_test_message_socket_close(&client_context);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -995,8 +1032,10 @@ void ssl_message_mock_interleaved_two_ways()
|
||||||
unsigned i;
|
unsigned i;
|
||||||
mbedtls_test_ssl_message_queue server_queue, client_queue;
|
mbedtls_test_ssl_message_queue server_queue, client_queue;
|
||||||
mbedtls_test_message_socket_context server_context, client_context;
|
mbedtls_test_message_socket_context server_context, client_context;
|
||||||
|
|
||||||
mbedtls_test_message_socket_init(&server_context);
|
mbedtls_test_message_socket_init(&server_context);
|
||||||
mbedtls_test_message_socket_init(&client_context);
|
mbedtls_test_message_socket_init(&client_context);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_test_message_socket_setup(&server_queue,
|
TEST_ASSERT(mbedtls_test_message_socket_setup(&server_queue,
|
||||||
&client_queue, 3,
|
&client_queue, 3,
|
||||||
|
@ -1070,6 +1109,7 @@ void ssl_message_mock_interleaved_two_ways()
|
||||||
exit:
|
exit:
|
||||||
mbedtls_test_message_socket_close(&server_context);
|
mbedtls_test_message_socket_close(&server_context);
|
||||||
mbedtls_test_message_socket_close(&client_context);
|
mbedtls_test_message_socket_close(&client_context);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -1080,10 +1120,9 @@ void ssl_dtls_replay(data_t *prevs, data_t *new, int ret)
|
||||||
mbedtls_ssl_context ssl;
|
mbedtls_ssl_context ssl;
|
||||||
mbedtls_ssl_config conf;
|
mbedtls_ssl_config conf;
|
||||||
|
|
||||||
MD_OR_USE_PSA_INIT();
|
|
||||||
|
|
||||||
mbedtls_ssl_init(&ssl);
|
mbedtls_ssl_init(&ssl);
|
||||||
mbedtls_ssl_config_init(&conf);
|
mbedtls_ssl_config_init(&conf);
|
||||||
|
MD_OR_USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_ssl_config_defaults(&conf,
|
TEST_ASSERT(mbedtls_ssl_config_defaults(&conf,
|
||||||
MBEDTLS_SSL_IS_CLIENT,
|
MBEDTLS_SSL_IS_CLIENT,
|
||||||
|
@ -1112,12 +1151,16 @@ exit:
|
||||||
void ssl_set_hostname_twice(char *hostname0, char *hostname1)
|
void ssl_set_hostname_twice(char *hostname0, char *hostname1)
|
||||||
{
|
{
|
||||||
mbedtls_ssl_context ssl;
|
mbedtls_ssl_context ssl;
|
||||||
|
|
||||||
mbedtls_ssl_init(&ssl);
|
mbedtls_ssl_init(&ssl);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_ssl_set_hostname(&ssl, hostname0) == 0);
|
TEST_ASSERT(mbedtls_ssl_set_hostname(&ssl, hostname0) == 0);
|
||||||
TEST_ASSERT(mbedtls_ssl_set_hostname(&ssl, hostname1) == 0);
|
TEST_ASSERT(mbedtls_ssl_set_hostname(&ssl, hostname1) == 0);
|
||||||
|
|
||||||
|
exit:
|
||||||
mbedtls_ssl_free(&ssl);
|
mbedtls_ssl_free(&ssl);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -1141,11 +1184,11 @@ void ssl_crypt_record(int cipher_type, int hash_id,
|
||||||
size_t const buflen = 512;
|
size_t const buflen = 512;
|
||||||
mbedtls_record rec, rec_backup;
|
mbedtls_record rec, rec_backup;
|
||||||
|
|
||||||
MD_OR_USE_PSA_INIT();
|
|
||||||
|
|
||||||
mbedtls_ssl_init(&ssl);
|
mbedtls_ssl_init(&ssl);
|
||||||
mbedtls_ssl_transform_init(&t0);
|
mbedtls_ssl_transform_init(&t0);
|
||||||
mbedtls_ssl_transform_init(&t1);
|
mbedtls_ssl_transform_init(&t1);
|
||||||
|
MD_OR_USE_PSA_INIT();
|
||||||
|
|
||||||
ret = mbedtls_test_ssl_build_transforms(&t0, &t1, cipher_type, hash_id,
|
ret = mbedtls_test_ssl_build_transforms(&t0, &t1, cipher_type, hash_id,
|
||||||
etm, tag_mode, ver,
|
etm, tag_mode, ver,
|
||||||
(size_t) cid0_len,
|
(size_t) cid0_len,
|
||||||
|
@ -1295,11 +1338,11 @@ void ssl_crypt_record_small(int cipher_type, int hash_id,
|
||||||
int seen_success; /* Indicates if in the current mode we've
|
int seen_success; /* Indicates if in the current mode we've
|
||||||
* already seen a successful test. */
|
* already seen a successful test. */
|
||||||
|
|
||||||
MD_OR_USE_PSA_INIT();
|
|
||||||
|
|
||||||
mbedtls_ssl_init(&ssl);
|
mbedtls_ssl_init(&ssl);
|
||||||
mbedtls_ssl_transform_init(&t0);
|
mbedtls_ssl_transform_init(&t0);
|
||||||
mbedtls_ssl_transform_init(&t1);
|
mbedtls_ssl_transform_init(&t1);
|
||||||
|
MD_OR_USE_PSA_INIT();
|
||||||
|
|
||||||
ret = mbedtls_test_ssl_build_transforms(&t0, &t1, cipher_type, hash_id,
|
ret = mbedtls_test_ssl_build_transforms(&t0, &t1, cipher_type, hash_id,
|
||||||
etm, tag_mode, ver,
|
etm, tag_mode, ver,
|
||||||
(size_t) cid0_len,
|
(size_t) cid0_len,
|
||||||
|
@ -1456,11 +1499,10 @@ void ssl_decrypt_non_etm_cbc(int cipher_type, int hash_id, int trunc_hmac,
|
||||||
int ret;
|
int ret;
|
||||||
const unsigned char pad_max_len = 255; /* Per the standard */
|
const unsigned char pad_max_len = 255; /* Per the standard */
|
||||||
|
|
||||||
MD_OR_USE_PSA_INIT();
|
|
||||||
|
|
||||||
mbedtls_ssl_init(&ssl);
|
mbedtls_ssl_init(&ssl);
|
||||||
mbedtls_ssl_transform_init(&t0);
|
mbedtls_ssl_transform_init(&t0);
|
||||||
mbedtls_ssl_transform_init(&t1);
|
mbedtls_ssl_transform_init(&t1);
|
||||||
|
MD_OR_USE_PSA_INIT();
|
||||||
|
|
||||||
/* Set up transforms with dummy keys */
|
/* Set up transforms with dummy keys */
|
||||||
ret = mbedtls_test_ssl_build_transforms(&t0, &t1, cipher_type, hash_id,
|
ret = mbedtls_test_ssl_build_transforms(&t0, &t1, cipher_type, hash_id,
|
||||||
|
@ -1685,6 +1727,7 @@ void ssl_tls13_hkdf_expand_label(int hash_alg,
|
||||||
ASSERT_COMPARE(dst, (size_t) desired_length,
|
ASSERT_COMPARE(dst, (size_t) desired_length,
|
||||||
expected->x, (size_t) expected->len);
|
expected->x, (size_t) expected->len);
|
||||||
|
|
||||||
|
exit:
|
||||||
PSA_DONE();
|
PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
@ -1738,6 +1781,7 @@ void ssl_tls13_traffic_key_generation(int hash_alg,
|
||||||
expected_server_write_iv->x,
|
expected_server_write_iv->x,
|
||||||
(size_t) desired_iv_len);
|
(size_t) desired_iv_len);
|
||||||
|
|
||||||
|
exit:
|
||||||
PSA_DONE();
|
PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
@ -1782,6 +1826,7 @@ void ssl_tls13_derive_secret(int hash_alg,
|
||||||
ASSERT_COMPARE(dst, desired_length,
|
ASSERT_COMPARE(dst, desired_length,
|
||||||
expected->x, desired_length);
|
expected->x, desired_length);
|
||||||
|
|
||||||
|
exit:
|
||||||
PSA_DONE();
|
PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
@ -1815,6 +1860,7 @@ void ssl_tls13_derive_early_secrets(int hash_alg,
|
||||||
ASSERT_COMPARE(secrets.early_exporter_master_secret, hash_len,
|
ASSERT_COMPARE(secrets.early_exporter_master_secret, hash_len,
|
||||||
exporter_expected->x, exporter_expected->len);
|
exporter_expected->x, exporter_expected->len);
|
||||||
|
|
||||||
|
exit:
|
||||||
PSA_DONE();
|
PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
@ -1848,6 +1894,7 @@ void ssl_tls13_derive_handshake_secrets(int hash_alg,
|
||||||
ASSERT_COMPARE(secrets.server_handshake_traffic_secret, hash_len,
|
ASSERT_COMPARE(secrets.server_handshake_traffic_secret, hash_len,
|
||||||
server_expected->x, server_expected->len);
|
server_expected->x, server_expected->len);
|
||||||
|
|
||||||
|
exit:
|
||||||
PSA_DONE();
|
PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
@ -1885,6 +1932,7 @@ void ssl_tls13_derive_application_secrets(int hash_alg,
|
||||||
ASSERT_COMPARE(secrets.exporter_master_secret, hash_len,
|
ASSERT_COMPARE(secrets.exporter_master_secret, hash_len,
|
||||||
exporter_expected->x, exporter_expected->len);
|
exporter_expected->x, exporter_expected->len);
|
||||||
|
|
||||||
|
exit:
|
||||||
PSA_DONE();
|
PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
@ -1914,6 +1962,7 @@ void ssl_tls13_derive_resumption_secrets(int hash_alg,
|
||||||
ASSERT_COMPARE(secrets.resumption_master_secret, hash_len,
|
ASSERT_COMPARE(secrets.resumption_master_secret, hash_len,
|
||||||
resumption_expected->x, resumption_expected->len);
|
resumption_expected->x, resumption_expected->len);
|
||||||
|
|
||||||
|
exit:
|
||||||
PSA_DONE();
|
PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
@ -1947,6 +1996,7 @@ void ssl_tls13_create_psk_binder(int hash_alg,
|
||||||
ASSERT_COMPARE(binder, hash_len,
|
ASSERT_COMPARE(binder, hash_len,
|
||||||
binder_expected->x, binder_expected->len);
|
binder_expected->x, binder_expected->len);
|
||||||
|
|
||||||
|
exit:
|
||||||
PSA_DONE();
|
PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
@ -1971,8 +2021,6 @@ void ssl_tls13_record_protection(int ciphersuite,
|
||||||
size_t buf_len;
|
size_t buf_len;
|
||||||
int other_endpoint;
|
int other_endpoint;
|
||||||
|
|
||||||
MD_OR_USE_PSA_INIT();
|
|
||||||
|
|
||||||
TEST_ASSERT(endpoint == MBEDTLS_SSL_IS_CLIENT ||
|
TEST_ASSERT(endpoint == MBEDTLS_SSL_IS_CLIENT ||
|
||||||
endpoint == MBEDTLS_SSL_IS_SERVER);
|
endpoint == MBEDTLS_SSL_IS_SERVER);
|
||||||
|
|
||||||
|
@ -2000,6 +2048,7 @@ void ssl_tls13_record_protection(int ciphersuite,
|
||||||
|
|
||||||
mbedtls_ssl_transform_init(&transform_recv);
|
mbedtls_ssl_transform_init(&transform_recv);
|
||||||
mbedtls_ssl_transform_init(&transform_send);
|
mbedtls_ssl_transform_init(&transform_send);
|
||||||
|
MD_OR_USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_ssl_tls13_populate_transform(
|
TEST_ASSERT(mbedtls_ssl_tls13_populate_transform(
|
||||||
&transform_send, endpoint,
|
&transform_send, endpoint,
|
||||||
|
@ -2045,6 +2094,7 @@ void ssl_tls13_record_protection(int ciphersuite,
|
||||||
ASSERT_COMPARE(rec.buf + rec.data_offset, rec.data_len,
|
ASSERT_COMPARE(rec.buf + rec.data_offset, rec.data_len,
|
||||||
plaintext->x, plaintext->len);
|
plaintext->x, plaintext->len);
|
||||||
|
|
||||||
|
exit:
|
||||||
mbedtls_free(buf);
|
mbedtls_free(buf);
|
||||||
mbedtls_ssl_transform_free(&transform_send);
|
mbedtls_ssl_transform_free(&transform_send);
|
||||||
mbedtls_ssl_transform_free(&transform_recv);
|
mbedtls_ssl_transform_free(&transform_recv);
|
||||||
|
@ -2071,6 +2121,7 @@ void ssl_tls13_key_evolution(int hash_alg,
|
||||||
ASSERT_COMPARE(secret_new, (size_t) expected->len,
|
ASSERT_COMPARE(secret_new, (size_t) expected->len,
|
||||||
expected->x, (size_t) expected->len);
|
expected->x, (size_t) expected->len);
|
||||||
|
|
||||||
|
exit:
|
||||||
PSA_DONE();
|
PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
@ -2114,9 +2165,9 @@ void ssl_serialize_session_save_load(int ticket_len, char *crt_file,
|
||||||
/*
|
/*
|
||||||
* Test that a save-load pair is the identity
|
* Test that a save-load pair is the identity
|
||||||
*/
|
*/
|
||||||
|
|
||||||
mbedtls_ssl_session_init(&original);
|
mbedtls_ssl_session_init(&original);
|
||||||
mbedtls_ssl_session_init(&restored);
|
mbedtls_ssl_session_init(&restored);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
/* Prepare a dummy session to work on */
|
/* Prepare a dummy session to work on */
|
||||||
((void) endpoint_type);
|
((void) endpoint_type);
|
||||||
|
@ -2248,6 +2299,7 @@ exit:
|
||||||
mbedtls_ssl_session_free(&original);
|
mbedtls_ssl_session_free(&original);
|
||||||
mbedtls_ssl_session_free(&restored);
|
mbedtls_ssl_session_free(&restored);
|
||||||
mbedtls_free(buf);
|
mbedtls_free(buf);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -2262,8 +2314,8 @@ void ssl_serialize_session_load_save(int ticket_len, char *crt_file,
|
||||||
/*
|
/*
|
||||||
* Test that a load-save pair is the identity
|
* Test that a load-save pair is the identity
|
||||||
*/
|
*/
|
||||||
|
|
||||||
mbedtls_ssl_session_init(&session);
|
mbedtls_ssl_session_init(&session);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
/* Prepare a dummy session to work on */
|
/* Prepare a dummy session to work on */
|
||||||
((void) endpoint_type);
|
((void) endpoint_type);
|
||||||
|
@ -2310,6 +2362,7 @@ exit:
|
||||||
mbedtls_ssl_session_free(&session);
|
mbedtls_ssl_session_free(&session);
|
||||||
mbedtls_free(buf1);
|
mbedtls_free(buf1);
|
||||||
mbedtls_free(buf2);
|
mbedtls_free(buf2);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -2324,8 +2377,8 @@ void ssl_serialize_session_save_buf_size(int ticket_len, char *crt_file,
|
||||||
/*
|
/*
|
||||||
* Test that session_save() fails cleanly on small buffers
|
* Test that session_save() fails cleanly on small buffers
|
||||||
*/
|
*/
|
||||||
|
|
||||||
mbedtls_ssl_session_init(&session);
|
mbedtls_ssl_session_init(&session);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
/* Prepare dummy session and get serialized size */
|
/* Prepare dummy session and get serialized size */
|
||||||
((void) endpoint_type);
|
((void) endpoint_type);
|
||||||
|
@ -2357,6 +2410,7 @@ void ssl_serialize_session_save_buf_size(int ticket_len, char *crt_file,
|
||||||
exit:
|
exit:
|
||||||
mbedtls_ssl_session_free(&session);
|
mbedtls_ssl_session_free(&session);
|
||||||
mbedtls_free(buf);
|
mbedtls_free(buf);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -2371,8 +2425,8 @@ void ssl_serialize_session_load_buf_size(int ticket_len, char *crt_file,
|
||||||
/*
|
/*
|
||||||
* Test that session_load() fails cleanly on small buffers
|
* Test that session_load() fails cleanly on small buffers
|
||||||
*/
|
*/
|
||||||
|
|
||||||
mbedtls_ssl_session_init(&session);
|
mbedtls_ssl_session_init(&session);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
/* Prepare serialized session data */
|
/* Prepare serialized session data */
|
||||||
((void) endpoint_type);
|
((void) endpoint_type);
|
||||||
|
@ -2410,6 +2464,7 @@ exit:
|
||||||
mbedtls_ssl_session_free(&session);
|
mbedtls_ssl_session_free(&session);
|
||||||
mbedtls_free(good_buf);
|
mbedtls_free(good_buf);
|
||||||
mbedtls_free(bad_buf);
|
mbedtls_free(bad_buf);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -2432,6 +2487,7 @@ void ssl_session_serialize_version_check(int corrupt_major,
|
||||||
corrupt_config == 1 };
|
corrupt_config == 1 };
|
||||||
|
|
||||||
mbedtls_ssl_session_init(&session);
|
mbedtls_ssl_session_init(&session);
|
||||||
|
USE_PSA_INIT();
|
||||||
((void) endpoint_type);
|
((void) endpoint_type);
|
||||||
((void) tls_version);
|
((void) tls_version);
|
||||||
#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
|
#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
|
||||||
|
@ -2484,7 +2540,8 @@ void ssl_session_serialize_version_check(int corrupt_major,
|
||||||
*byte ^= corrupted_bit;
|
*byte ^= corrupted_bit;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
exit:
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -2645,13 +2702,10 @@ exit:
|
||||||
/* BEGIN_CASE depends_on:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_MD_CAN_SHA256 */
|
/* BEGIN_CASE depends_on:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_MD_CAN_SHA256 */
|
||||||
void handshake_cipher(char *cipher, int pk_alg, int dtls)
|
void handshake_cipher(char *cipher, int pk_alg, int dtls)
|
||||||
{
|
{
|
||||||
MD_OR_USE_PSA_INIT();
|
|
||||||
|
|
||||||
test_handshake_psk_cipher(cipher, pk_alg, NULL, dtls);
|
test_handshake_psk_cipher(cipher, pk_alg, NULL, dtls);
|
||||||
|
|
||||||
/* The goto below is used to avoid an "unused label" warning.*/
|
/* The goto below is used to avoid an "unused label" warning.*/
|
||||||
goto exit;
|
goto exit;
|
||||||
MD_OR_USE_PSA_DONE();
|
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -2721,15 +2775,10 @@ void app_data_tls(int mfl, int cli_msg_len, int srv_msg_len,
|
||||||
int expected_cli_fragments,
|
int expected_cli_fragments,
|
||||||
int expected_srv_fragments)
|
int expected_srv_fragments)
|
||||||
{
|
{
|
||||||
MD_OR_USE_PSA_INIT();
|
|
||||||
|
|
||||||
test_app_data(mfl, cli_msg_len, srv_msg_len, expected_cli_fragments,
|
test_app_data(mfl, cli_msg_len, srv_msg_len, expected_cli_fragments,
|
||||||
expected_srv_fragments, 0);
|
expected_srv_fragments, 0);
|
||||||
/* The goto below is used to avoid an "unused label" warning.*/
|
/* The goto below is used to avoid an "unused label" warning.*/
|
||||||
goto exit;
|
goto exit;
|
||||||
|
|
||||||
exit:
|
|
||||||
MD_OR_USE_PSA_DONE();
|
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -2738,15 +2787,10 @@ void app_data_dtls(int mfl, int cli_msg_len, int srv_msg_len,
|
||||||
int expected_cli_fragments,
|
int expected_cli_fragments,
|
||||||
int expected_srv_fragments)
|
int expected_srv_fragments)
|
||||||
{
|
{
|
||||||
MD_OR_USE_PSA_INIT();
|
|
||||||
|
|
||||||
test_app_data(mfl, cli_msg_len, srv_msg_len, expected_cli_fragments,
|
test_app_data(mfl, cli_msg_len, srv_msg_len, expected_cli_fragments,
|
||||||
expected_srv_fragments, 1);
|
expected_srv_fragments, 1);
|
||||||
/* The goto below is used to avoid an "unused label" warning.*/
|
/* The goto below is used to avoid an "unused label" warning.*/
|
||||||
goto exit;
|
goto exit;
|
||||||
|
|
||||||
exit:
|
|
||||||
MD_OR_USE_PSA_DONE();
|
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -2859,7 +2903,6 @@ void resize_buffers_serialize_mfl(int mfl)
|
||||||
{
|
{
|
||||||
test_resize_buffers(mfl, 0, MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION, 1, 1,
|
test_resize_buffers(mfl, 0, MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION, 1, 1,
|
||||||
(char *) "");
|
(char *) "");
|
||||||
|
|
||||||
/* The goto below is used to avoid an "unused label" warning.*/
|
/* The goto below is used to avoid an "unused label" warning.*/
|
||||||
goto exit;
|
goto exit;
|
||||||
}
|
}
|
||||||
|
@ -2870,7 +2913,6 @@ void resize_buffers_renegotiate_mfl(int mfl, int legacy_renegotiation,
|
||||||
char *cipher)
|
char *cipher)
|
||||||
{
|
{
|
||||||
test_resize_buffers(mfl, 1, legacy_renegotiation, 0, 1, cipher);
|
test_resize_buffers(mfl, 1, legacy_renegotiation, 0, 1, cipher);
|
||||||
|
|
||||||
/* The goto below is used to avoid an "unused label" warning.*/
|
/* The goto below is used to avoid an "unused label" warning.*/
|
||||||
goto exit;
|
goto exit;
|
||||||
}
|
}
|
||||||
|
@ -2887,8 +2929,8 @@ void test_multiple_psks()
|
||||||
|
|
||||||
mbedtls_ssl_config conf;
|
mbedtls_ssl_config conf;
|
||||||
|
|
||||||
MD_OR_USE_PSA_INIT();
|
|
||||||
mbedtls_ssl_config_init(&conf);
|
mbedtls_ssl_config_init(&conf);
|
||||||
|
MD_OR_USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_ssl_conf_psk(&conf,
|
TEST_ASSERT(mbedtls_ssl_conf_psk(&conf,
|
||||||
psk0, sizeof(psk0),
|
psk0, sizeof(psk0),
|
||||||
|
@ -2899,9 +2941,7 @@ void test_multiple_psks()
|
||||||
MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE);
|
MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE);
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
|
|
||||||
mbedtls_ssl_config_free(&conf);
|
mbedtls_ssl_config_free(&conf);
|
||||||
|
|
||||||
MD_OR_USE_PSA_DONE();
|
MD_OR_USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
@ -2931,8 +2971,8 @@ void test_multiple_psks_opaque(int mode)
|
||||||
|
|
||||||
mbedtls_ssl_config conf;
|
mbedtls_ssl_config conf;
|
||||||
|
|
||||||
MD_OR_USE_PSA_INIT();
|
|
||||||
mbedtls_ssl_config_init(&conf);
|
mbedtls_ssl_config_init(&conf);
|
||||||
|
MD_OR_USE_PSA_INIT();
|
||||||
|
|
||||||
switch (mode) {
|
switch (mode) {
|
||||||
case 0:
|
case 0:
|
||||||
|
@ -2983,7 +3023,6 @@ void test_multiple_psks_opaque(int mode)
|
||||||
}
|
}
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
|
|
||||||
mbedtls_ssl_config_free(&conf);
|
mbedtls_ssl_config_free(&conf);
|
||||||
MD_OR_USE_PSA_DONE();
|
MD_OR_USE_PSA_DONE();
|
||||||
|
|
||||||
|
@ -2998,10 +3037,9 @@ void conf_version(int endpoint, int transport,
|
||||||
mbedtls_ssl_config conf;
|
mbedtls_ssl_config conf;
|
||||||
mbedtls_ssl_context ssl;
|
mbedtls_ssl_context ssl;
|
||||||
|
|
||||||
MD_OR_USE_PSA_INIT();
|
|
||||||
|
|
||||||
mbedtls_ssl_config_init(&conf);
|
mbedtls_ssl_config_init(&conf);
|
||||||
mbedtls_ssl_init(&ssl);
|
mbedtls_ssl_init(&ssl);
|
||||||
|
MD_OR_USE_PSA_INIT();
|
||||||
|
|
||||||
mbedtls_ssl_conf_endpoint(&conf, endpoint);
|
mbedtls_ssl_conf_endpoint(&conf, endpoint);
|
||||||
mbedtls_ssl_conf_transport(&conf, transport);
|
mbedtls_ssl_conf_transport(&conf, transport);
|
||||||
|
@ -3042,10 +3080,10 @@ void conf_curve()
|
||||||
#endif
|
#endif
|
||||||
mbedtls_ssl_conf_curves(&conf, curve_list);
|
mbedtls_ssl_conf_curves(&conf, curve_list);
|
||||||
|
|
||||||
MD_OR_USE_PSA_INIT();
|
|
||||||
|
|
||||||
mbedtls_ssl_context ssl;
|
mbedtls_ssl_context ssl;
|
||||||
mbedtls_ssl_init(&ssl);
|
mbedtls_ssl_init(&ssl);
|
||||||
|
MD_OR_USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
|
TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
|
||||||
|
|
||||||
TEST_ASSERT(ssl.handshake != NULL && ssl.handshake->group_list != NULL);
|
TEST_ASSERT(ssl.handshake != NULL && ssl.handshake->group_list != NULL);
|
||||||
|
@ -3059,7 +3097,6 @@ void conf_curve()
|
||||||
TEST_EQUAL(iana_tls_group_list[i], ssl.handshake->group_list[i]);
|
TEST_EQUAL(iana_tls_group_list[i], ssl.handshake->group_list[i]);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
mbedtls_ssl_free(&ssl);
|
mbedtls_ssl_free(&ssl);
|
||||||
mbedtls_ssl_config_free(&conf);
|
mbedtls_ssl_config_free(&conf);
|
||||||
|
@ -3083,10 +3120,10 @@ void conf_group()
|
||||||
|
|
||||||
mbedtls_ssl_conf_groups(&conf, iana_tls_group_list);
|
mbedtls_ssl_conf_groups(&conf, iana_tls_group_list);
|
||||||
|
|
||||||
MD_OR_USE_PSA_INIT();
|
|
||||||
|
|
||||||
mbedtls_ssl_context ssl;
|
mbedtls_ssl_context ssl;
|
||||||
mbedtls_ssl_init(&ssl);
|
mbedtls_ssl_init(&ssl);
|
||||||
|
MD_OR_USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
|
TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
|
||||||
|
|
||||||
TEST_ASSERT(ssl.conf != NULL && ssl.conf->group_list != NULL);
|
TEST_ASSERT(ssl.conf != NULL && ssl.conf->group_list != NULL);
|
||||||
|
@ -3122,12 +3159,12 @@ void force_bad_session_id_len()
|
||||||
options.srv_log_obj = &srv_pattern;
|
options.srv_log_obj = &srv_pattern;
|
||||||
options.srv_log_fun = mbedtls_test_ssl_log_analyzer;
|
options.srv_log_fun = mbedtls_test_ssl_log_analyzer;
|
||||||
|
|
||||||
MD_OR_USE_PSA_INIT();
|
|
||||||
mbedtls_platform_zeroize(&client, sizeof(client));
|
mbedtls_platform_zeroize(&client, sizeof(client));
|
||||||
mbedtls_platform_zeroize(&server, sizeof(server));
|
mbedtls_platform_zeroize(&server, sizeof(server));
|
||||||
|
|
||||||
mbedtls_test_message_socket_init(&server_context);
|
mbedtls_test_message_socket_init(&server_context);
|
||||||
mbedtls_test_message_socket_init(&client_context);
|
mbedtls_test_message_socket_init(&client_context);
|
||||||
|
MD_OR_USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_test_ssl_endpoint_init(&client, MBEDTLS_SSL_IS_CLIENT,
|
TEST_ASSERT(mbedtls_test_ssl_endpoint_init(&client, MBEDTLS_SSL_IS_CLIENT,
|
||||||
&options, NULL, NULL,
|
&options, NULL, NULL,
|
||||||
|
@ -3181,6 +3218,8 @@ void cookie_parsing(data_t *cookie, int exp_ret)
|
||||||
|
|
||||||
mbedtls_ssl_init(&ssl);
|
mbedtls_ssl_init(&ssl);
|
||||||
mbedtls_ssl_config_init(&conf);
|
mbedtls_ssl_config_init(&conf);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_EQUAL(mbedtls_ssl_config_defaults(&conf, MBEDTLS_SSL_IS_SERVER,
|
TEST_EQUAL(mbedtls_ssl_config_defaults(&conf, MBEDTLS_SSL_IS_SERVER,
|
||||||
MBEDTLS_SSL_TRANSPORT_DATAGRAM,
|
MBEDTLS_SSL_TRANSPORT_DATAGRAM,
|
||||||
MBEDTLS_SSL_PRESET_DEFAULT),
|
MBEDTLS_SSL_PRESET_DEFAULT),
|
||||||
|
@ -3195,8 +3234,10 @@ void cookie_parsing(data_t *cookie, int exp_ret)
|
||||||
&len),
|
&len),
|
||||||
exp_ret);
|
exp_ret);
|
||||||
|
|
||||||
|
exit:
|
||||||
mbedtls_ssl_free(&ssl);
|
mbedtls_ssl_free(&ssl);
|
||||||
mbedtls_ssl_config_free(&conf);
|
mbedtls_ssl_config_free(&conf);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -3205,9 +3246,13 @@ void timing_final_delay_accessor()
|
||||||
{
|
{
|
||||||
mbedtls_timing_delay_context delay_context;
|
mbedtls_timing_delay_context delay_context;
|
||||||
|
|
||||||
|
USE_PSA_INIT();
|
||||||
mbedtls_timing_set_delay(&delay_context, 50, 100);
|
mbedtls_timing_set_delay(&delay_context, 50, 100);
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_timing_get_final_delay(&delay_context) == 100);
|
TEST_ASSERT(mbedtls_timing_get_final_delay(&delay_context) == 100);
|
||||||
|
|
||||||
|
exit:
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -3224,10 +3269,9 @@ void cid_sanity()
|
||||||
|
|
||||||
mbedtls_test_rnd_std_rand(NULL, own_cid, sizeof(own_cid));
|
mbedtls_test_rnd_std_rand(NULL, own_cid, sizeof(own_cid));
|
||||||
|
|
||||||
MD_OR_USE_PSA_INIT();
|
|
||||||
|
|
||||||
mbedtls_ssl_init(&ssl);
|
mbedtls_ssl_init(&ssl);
|
||||||
mbedtls_ssl_config_init(&conf);
|
mbedtls_ssl_config_init(&conf);
|
||||||
|
MD_OR_USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_ssl_config_defaults(&conf,
|
TEST_ASSERT(mbedtls_ssl_config_defaults(&conf,
|
||||||
MBEDTLS_SSL_IS_CLIENT,
|
MBEDTLS_SSL_IS_CLIENT,
|
||||||
|
@ -3383,11 +3427,12 @@ void tls13_server_certificate_msg_invalid_vector_len()
|
||||||
/*
|
/*
|
||||||
* Test set-up
|
* Test set-up
|
||||||
*/
|
*/
|
||||||
MD_OR_USE_PSA_INIT();
|
|
||||||
mbedtls_platform_zeroize(&client_ep, sizeof(client_ep));
|
mbedtls_platform_zeroize(&client_ep, sizeof(client_ep));
|
||||||
mbedtls_platform_zeroize(&server_ep, sizeof(server_ep));
|
mbedtls_platform_zeroize(&server_ep, sizeof(server_ep));
|
||||||
|
|
||||||
mbedtls_test_init_handshake_options(&client_options);
|
mbedtls_test_init_handshake_options(&client_options);
|
||||||
|
MD_OR_USE_PSA_INIT();
|
||||||
|
|
||||||
client_options.pk_alg = MBEDTLS_PK_ECDSA;
|
client_options.pk_alg = MBEDTLS_PK_ECDSA;
|
||||||
ret = mbedtls_test_ssl_endpoint_init(&client_ep, MBEDTLS_SSL_IS_CLIENT,
|
ret = mbedtls_test_ssl_endpoint_init(&client_ep, MBEDTLS_SSL_IS_CLIENT,
|
||||||
&client_options, NULL, NULL, NULL,
|
&client_options, NULL, NULL, NULL,
|
||||||
|
@ -3478,9 +3523,8 @@ void ssl_ecjpake_set_password(int use_opaque_arg)
|
||||||
size_t pwd_len = 0;
|
size_t pwd_len = 0;
|
||||||
int ret;
|
int ret;
|
||||||
|
|
||||||
MD_OR_USE_PSA_INIT();
|
|
||||||
|
|
||||||
mbedtls_ssl_init(&ssl);
|
mbedtls_ssl_init(&ssl);
|
||||||
|
MD_OR_USE_PSA_INIT();
|
||||||
|
|
||||||
/* test with uninitalized SSL context */
|
/* test with uninitalized SSL context */
|
||||||
ECJPAKE_TEST_SET_PASSWORD(MBEDTLS_ERR_SSL_BAD_INPUT_DATA);
|
ECJPAKE_TEST_SET_PASSWORD(MBEDTLS_ERR_SSL_BAD_INPUT_DATA);
|
||||||
|
@ -3617,7 +3661,8 @@ void elliptic_curve_get_properties()
|
||||||
#else
|
#else
|
||||||
TEST_UNAVAILABLE_ECC(30, MBEDTLS_ECP_DP_CURVE448, PSA_ECC_FAMILY_MONTGOMERY, 448);
|
TEST_UNAVAILABLE_ECC(30, MBEDTLS_ECP_DP_CURVE448, PSA_ECC_FAMILY_MONTGOMERY, 448);
|
||||||
#endif
|
#endif
|
||||||
|
goto exit;
|
||||||
|
exit:
|
||||||
MD_OR_USE_PSA_DONE();
|
MD_OR_USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
|
@ -429,12 +429,15 @@ void x509_accessor_ext_types(int ext_type, int has_ext_type)
|
||||||
int expected_result = ext_type & has_ext_type;
|
int expected_result = ext_type & has_ext_type;
|
||||||
|
|
||||||
mbedtls_x509_crt_init(&crt);
|
mbedtls_x509_crt_init(&crt);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
crt.ext_types = ext_type;
|
crt.ext_types = ext_type;
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_x509_crt_has_ext_type(&crt, has_ext_type) == expected_result);
|
TEST_ASSERT(mbedtls_x509_crt_has_ext_type(&crt, has_ext_type) == expected_result);
|
||||||
|
|
||||||
|
exit:
|
||||||
mbedtls_x509_crt_free(&crt);
|
mbedtls_x509_crt_free(&crt);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -463,6 +466,7 @@ void x509_parse_san(char *crt_file, char *result_str, int parse_result)
|
||||||
size_t n = sizeof(buf);
|
size_t n = sizeof(buf);
|
||||||
|
|
||||||
mbedtls_x509_crt_init(&crt);
|
mbedtls_x509_crt_init(&crt);
|
||||||
|
USE_PSA_INIT();
|
||||||
memset(buf, 0, 2000);
|
memset(buf, 0, 2000);
|
||||||
|
|
||||||
TEST_EQUAL(mbedtls_x509_crt_parse_file(&crt, crt_file), parse_result);
|
TEST_EQUAL(mbedtls_x509_crt_parse_file(&crt, crt_file), parse_result);
|
||||||
|
@ -490,8 +494,8 @@ void x509_parse_san(char *crt_file, char *result_str, int parse_result)
|
||||||
TEST_ASSERT(strcmp(buf, result_str) == 0);
|
TEST_ASSERT(strcmp(buf, result_str) == 0);
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
|
|
||||||
mbedtls_x509_crt_free(&crt);
|
mbedtls_x509_crt_free(&crt);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -503,6 +507,7 @@ void x509_cert_info(char *crt_file, char *result_str)
|
||||||
int res;
|
int res;
|
||||||
|
|
||||||
mbedtls_x509_crt_init(&crt);
|
mbedtls_x509_crt_init(&crt);
|
||||||
|
USE_PSA_INIT();
|
||||||
memset(buf, 0, 2000);
|
memset(buf, 0, 2000);
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_x509_crt_parse_file(&crt, crt_file) == 0);
|
TEST_ASSERT(mbedtls_x509_crt_parse_file(&crt, crt_file) == 0);
|
||||||
|
@ -515,6 +520,7 @@ void x509_cert_info(char *crt_file, char *result_str)
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
mbedtls_x509_crt_free(&crt);
|
mbedtls_x509_crt_free(&crt);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -526,6 +532,7 @@ void mbedtls_x509_crl_info(char *crl_file, char *result_str)
|
||||||
int res;
|
int res;
|
||||||
|
|
||||||
mbedtls_x509_crl_init(&crl);
|
mbedtls_x509_crl_init(&crl);
|
||||||
|
USE_PSA_INIT();
|
||||||
memset(buf, 0, 2000);
|
memset(buf, 0, 2000);
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_x509_crl_parse_file(&crl, crl_file) == 0);
|
TEST_ASSERT(mbedtls_x509_crl_parse_file(&crl, crl_file) == 0);
|
||||||
|
@ -538,6 +545,7 @@ void mbedtls_x509_crl_info(char *crl_file, char *result_str)
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
mbedtls_x509_crl_free(&crl);
|
mbedtls_x509_crl_free(&crl);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -548,12 +556,14 @@ void mbedtls_x509_crl_parse(char *crl_file, int result)
|
||||||
char buf[2000];
|
char buf[2000];
|
||||||
|
|
||||||
mbedtls_x509_crl_init(&crl);
|
mbedtls_x509_crl_init(&crl);
|
||||||
|
USE_PSA_INIT();
|
||||||
memset(buf, 0, 2000);
|
memset(buf, 0, 2000);
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_x509_crl_parse_file(&crl, crl_file) == result);
|
TEST_ASSERT(mbedtls_x509_crl_parse_file(&crl, crl_file) == result);
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
mbedtls_x509_crl_free(&crl);
|
mbedtls_x509_crl_free(&crl);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -565,6 +575,7 @@ void mbedtls_x509_csr_info(char *csr_file, char *result_str)
|
||||||
int res;
|
int res;
|
||||||
|
|
||||||
mbedtls_x509_csr_init(&csr);
|
mbedtls_x509_csr_init(&csr);
|
||||||
|
USE_PSA_INIT();
|
||||||
memset(buf, 0, 2000);
|
memset(buf, 0, 2000);
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_x509_csr_parse_file(&csr, csr_file) == 0);
|
TEST_ASSERT(mbedtls_x509_csr_parse_file(&csr, csr_file) == 0);
|
||||||
|
@ -577,6 +588,7 @@ void mbedtls_x509_csr_info(char *csr_file, char *result_str)
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
mbedtls_x509_csr_free(&csr);
|
mbedtls_x509_csr_free(&csr);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -586,6 +598,7 @@ void x509_verify_info(int flags, char *prefix, char *result_str)
|
||||||
char buf[2000];
|
char buf[2000];
|
||||||
int res;
|
int res;
|
||||||
|
|
||||||
|
USE_PSA_INIT();
|
||||||
memset(buf, 0, sizeof(buf));
|
memset(buf, 0, sizeof(buf));
|
||||||
|
|
||||||
res = mbedtls_x509_crt_verify_info(buf, sizeof(buf), prefix, flags);
|
res = mbedtls_x509_crt_verify_info(buf, sizeof(buf), prefix, flags);
|
||||||
|
@ -593,6 +606,9 @@ void x509_verify_info(int flags, char *prefix, char *result_str)
|
||||||
TEST_ASSERT(res >= 0);
|
TEST_ASSERT(res >= 0);
|
||||||
|
|
||||||
TEST_ASSERT(strcmp(buf, result_str) == 0);
|
TEST_ASSERT(strcmp(buf, result_str) == 0);
|
||||||
|
|
||||||
|
exit:
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -616,11 +632,9 @@ void x509_verify_restart(char *crt_file, char *ca_file,
|
||||||
* - x509_verify() for server5 -> test-ca2: ~ 18800
|
* - x509_verify() for server5 -> test-ca2: ~ 18800
|
||||||
* - x509_verify() for server10 -> int-ca3 -> int-ca2: ~ 25500
|
* - x509_verify() for server10 -> int-ca3 -> int-ca2: ~ 25500
|
||||||
*/
|
*/
|
||||||
|
|
||||||
mbedtls_x509_crt_restart_init(&rs_ctx);
|
mbedtls_x509_crt_restart_init(&rs_ctx);
|
||||||
mbedtls_x509_crt_init(&crt);
|
mbedtls_x509_crt_init(&crt);
|
||||||
mbedtls_x509_crt_init(&ca);
|
mbedtls_x509_crt_init(&ca);
|
||||||
|
|
||||||
MD_OR_USE_PSA_INIT();
|
MD_OR_USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_x509_crt_parse_file(&crt, crt_file) == 0);
|
TEST_ASSERT(mbedtls_x509_crt_parse_file(&crt, crt_file) == 0);
|
||||||
|
@ -673,7 +687,6 @@ void x509_verify(char *crt_file, char *ca_file, char *crl_file,
|
||||||
mbedtls_x509_crt_init(&crt);
|
mbedtls_x509_crt_init(&crt);
|
||||||
mbedtls_x509_crt_init(&ca);
|
mbedtls_x509_crt_init(&ca);
|
||||||
mbedtls_x509_crl_init(&crl);
|
mbedtls_x509_crl_init(&crl);
|
||||||
|
|
||||||
MD_OR_USE_PSA_INIT();
|
MD_OR_USE_PSA_INIT();
|
||||||
|
|
||||||
if (strcmp(cn_name_str, "NULL") != 0) {
|
if (strcmp(cn_name_str, "NULL") != 0) {
|
||||||
|
@ -758,6 +771,7 @@ void x509_verify_ca_cb_failure(char *crt_file, char *ca_file, char *name,
|
||||||
|
|
||||||
mbedtls_x509_crt_init(&crt);
|
mbedtls_x509_crt_init(&crt);
|
||||||
mbedtls_x509_crt_init(&ca);
|
mbedtls_x509_crt_init(&ca);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_x509_crt_parse_file(&crt, crt_file) == 0);
|
TEST_ASSERT(mbedtls_x509_crt_parse_file(&crt, crt_file) == 0);
|
||||||
TEST_ASSERT(mbedtls_x509_crt_parse_file(&ca, ca_file) == 0);
|
TEST_ASSERT(mbedtls_x509_crt_parse_file(&ca, ca_file) == 0);
|
||||||
|
@ -775,6 +789,7 @@ void x509_verify_ca_cb_failure(char *crt_file, char *ca_file, char *name,
|
||||||
exit:
|
exit:
|
||||||
mbedtls_x509_crt_free(&crt);
|
mbedtls_x509_crt_free(&crt);
|
||||||
mbedtls_x509_crt_free(&ca);
|
mbedtls_x509_crt_free(&ca);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -790,10 +805,10 @@ void x509_verify_callback(char *crt_file, char *ca_file, char *name,
|
||||||
|
|
||||||
mbedtls_x509_crt_init(&crt);
|
mbedtls_x509_crt_init(&crt);
|
||||||
mbedtls_x509_crt_init(&ca);
|
mbedtls_x509_crt_init(&ca);
|
||||||
verify_print_init(&vrfy_ctx);
|
|
||||||
|
|
||||||
MD_OR_USE_PSA_INIT();
|
MD_OR_USE_PSA_INIT();
|
||||||
|
|
||||||
|
verify_print_init(&vrfy_ctx);
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_x509_crt_parse_file(&crt, crt_file) == 0);
|
TEST_ASSERT(mbedtls_x509_crt_parse_file(&crt, crt_file) == 0);
|
||||||
TEST_ASSERT(mbedtls_x509_crt_parse_file(&ca, ca_file) == 0);
|
TEST_ASSERT(mbedtls_x509_crt_parse_file(&ca, ca_file) == 0);
|
||||||
|
|
||||||
|
@ -827,6 +842,8 @@ void mbedtls_x509_dn_gets_subject_replace(char *crt_file,
|
||||||
int res = 0;
|
int res = 0;
|
||||||
|
|
||||||
mbedtls_x509_crt_init(&crt);
|
mbedtls_x509_crt_init(&crt);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
memset(buf, 0, 2000);
|
memset(buf, 0, 2000);
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_x509_crt_parse_file(&crt, crt_file) == 0);
|
TEST_ASSERT(mbedtls_x509_crt_parse_file(&crt, crt_file) == 0);
|
||||||
|
@ -844,6 +861,7 @@ void mbedtls_x509_dn_gets_subject_replace(char *crt_file,
|
||||||
}
|
}
|
||||||
exit:
|
exit:
|
||||||
mbedtls_x509_crt_free(&crt);
|
mbedtls_x509_crt_free(&crt);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -855,6 +873,8 @@ void mbedtls_x509_dn_gets(char *crt_file, char *entity, char *result_str)
|
||||||
int res = 0;
|
int res = 0;
|
||||||
|
|
||||||
mbedtls_x509_crt_init(&crt);
|
mbedtls_x509_crt_init(&crt);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
memset(buf, 0, 2000);
|
memset(buf, 0, 2000);
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_x509_crt_parse_file(&crt, crt_file) == 0);
|
TEST_ASSERT(mbedtls_x509_crt_parse_file(&crt, crt_file) == 0);
|
||||||
|
@ -873,18 +893,20 @@ void mbedtls_x509_dn_gets(char *crt_file, char *entity, char *result_str)
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
mbedtls_x509_crt_free(&crt);
|
mbedtls_x509_crt_free(&crt);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
/* BEGIN_CASE depends_on:MBEDTLS_X509_CRT_PARSE_C */
|
/* BEGIN_CASE depends_on:MBEDTLS_X509_CRT_PARSE_C */
|
||||||
void mbedtls_x509_get_name(char *rdn_sequence, int exp_ret)
|
void mbedtls_x509_get_name(char *rdn_sequence, int exp_ret)
|
||||||
{
|
{
|
||||||
unsigned char *name;
|
unsigned char *name = NULL;
|
||||||
unsigned char *p;
|
unsigned char *p;
|
||||||
size_t name_len;
|
size_t name_len;
|
||||||
mbedtls_x509_name head;
|
mbedtls_x509_name head;
|
||||||
int ret;
|
int ret;
|
||||||
|
|
||||||
|
USE_PSA_INIT();
|
||||||
memset(&head, 0, sizeof(head));
|
memset(&head, 0, sizeof(head));
|
||||||
|
|
||||||
name = mbedtls_test_unhexify_alloc(rdn_sequence, &name_len);
|
name = mbedtls_test_unhexify_alloc(rdn_sequence, &name_len);
|
||||||
|
@ -897,7 +919,9 @@ void mbedtls_x509_get_name(char *rdn_sequence, int exp_ret)
|
||||||
|
|
||||||
TEST_EQUAL(ret, exp_ret);
|
TEST_EQUAL(ret, exp_ret);
|
||||||
|
|
||||||
|
exit:
|
||||||
mbedtls_free(name);
|
mbedtls_free(name);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -916,6 +940,7 @@ void mbedtls_x509_dn_get_next(char *name_str,
|
||||||
unsigned char buf[80], *out = NULL, *c;
|
unsigned char buf[80], *out = NULL, *c;
|
||||||
const char *short_name;
|
const char *short_name;
|
||||||
|
|
||||||
|
USE_PSA_INIT();
|
||||||
memset(&parsed, 0, sizeof(parsed));
|
memset(&parsed, 0, sizeof(parsed));
|
||||||
memset(buf, 0, sizeof(buf));
|
memset(buf, 0, sizeof(buf));
|
||||||
c = buf + sizeof(buf);
|
c = buf + sizeof(buf);
|
||||||
|
@ -964,6 +989,7 @@ exit:
|
||||||
mbedtls_free(out);
|
mbedtls_free(out);
|
||||||
mbedtls_asn1_free_named_data_list(&names);
|
mbedtls_asn1_free_named_data_list(&names);
|
||||||
mbedtls_asn1_free_named_data_list_shallow(parsed.next);
|
mbedtls_asn1_free_named_data_list_shallow(parsed.next);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -973,6 +999,7 @@ void mbedtls_x509_time_is_past(char *crt_file, char *entity, int result)
|
||||||
mbedtls_x509_crt crt;
|
mbedtls_x509_crt crt;
|
||||||
|
|
||||||
mbedtls_x509_crt_init(&crt);
|
mbedtls_x509_crt_init(&crt);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_x509_crt_parse_file(&crt, crt_file) == 0);
|
TEST_ASSERT(mbedtls_x509_crt_parse_file(&crt, crt_file) == 0);
|
||||||
|
|
||||||
|
@ -986,6 +1013,7 @@ void mbedtls_x509_time_is_past(char *crt_file, char *entity, int result)
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
mbedtls_x509_crt_free(&crt);
|
mbedtls_x509_crt_free(&crt);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -995,6 +1023,7 @@ void mbedtls_x509_time_is_future(char *crt_file, char *entity, int result)
|
||||||
mbedtls_x509_crt crt;
|
mbedtls_x509_crt crt;
|
||||||
|
|
||||||
mbedtls_x509_crt_init(&crt);
|
mbedtls_x509_crt_init(&crt);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_x509_crt_parse_file(&crt, crt_file) == 0);
|
TEST_ASSERT(mbedtls_x509_crt_parse_file(&crt, crt_file) == 0);
|
||||||
|
|
||||||
|
@ -1008,6 +1037,7 @@ void mbedtls_x509_time_is_future(char *crt_file, char *entity, int result)
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
mbedtls_x509_crt_free(&crt);
|
mbedtls_x509_crt_free(&crt);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -1017,11 +1047,13 @@ void x509parse_crt_file(char *crt_file, int result)
|
||||||
mbedtls_x509_crt crt;
|
mbedtls_x509_crt crt;
|
||||||
|
|
||||||
mbedtls_x509_crt_init(&crt);
|
mbedtls_x509_crt_init(&crt);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_x509_crt_parse_file(&crt, crt_file) == result);
|
TEST_ASSERT(mbedtls_x509_crt_parse_file(&crt, crt_file) == result);
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
mbedtls_x509_crt_free(&crt);
|
mbedtls_x509_crt_free(&crt);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -1037,6 +1069,7 @@ void x509parse_crt(data_t *buf, char *result_str, int result)
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
mbedtls_x509_crt_init(&crt);
|
mbedtls_x509_crt_init(&crt);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_x509_crt_parse_der(&crt, buf->x, buf->len) == (result));
|
TEST_ASSERT(mbedtls_x509_crt_parse_der(&crt, buf->x, buf->len) == (result));
|
||||||
#if !defined(MBEDTLS_X509_REMOVE_INFO)
|
#if !defined(MBEDTLS_X509_REMOVE_INFO)
|
||||||
|
@ -1103,6 +1136,7 @@ void x509parse_crt(data_t *buf, char *result_str, int result)
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
mbedtls_x509_crt_free(&crt);
|
mbedtls_x509_crt_free(&crt);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -1124,6 +1158,7 @@ void x509parse_crt_cb(data_t *buf, char *result_str, int result)
|
||||||
oid.p = (unsigned char *) MBEDTLS_OID_PKIX "\x01\x1F";
|
oid.p = (unsigned char *) MBEDTLS_OID_PKIX "\x01\x1F";
|
||||||
|
|
||||||
mbedtls_x509_crt_init(&crt);
|
mbedtls_x509_crt_init(&crt);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_x509_crt_parse_der_with_ext_cb(&crt, buf->x, buf->len, 0, parse_crt_ext_cb,
|
TEST_ASSERT(mbedtls_x509_crt_parse_der_with_ext_cb(&crt, buf->x, buf->len, 0, parse_crt_ext_cb,
|
||||||
&oid) == (result));
|
&oid) == (result));
|
||||||
|
@ -1157,6 +1192,7 @@ void x509parse_crt_cb(data_t *buf, char *result_str, int result)
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
mbedtls_x509_crt_free(&crt);
|
mbedtls_x509_crt_free(&crt);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -1168,6 +1204,8 @@ void x509parse_crl(data_t *buf, char *result_str, int result)
|
||||||
int res;
|
int res;
|
||||||
|
|
||||||
mbedtls_x509_crl_init(&crl);
|
mbedtls_x509_crl_init(&crl);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
memset(output, 0, 2000);
|
memset(output, 0, 2000);
|
||||||
|
|
||||||
|
|
||||||
|
@ -1183,6 +1221,7 @@ void x509parse_crl(data_t *buf, char *result_str, int result)
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
mbedtls_x509_crl_free(&crl);
|
mbedtls_x509_crl_free(&crl);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -1194,6 +1233,8 @@ void mbedtls_x509_csr_parse(data_t *csr_der, char *ref_out, int ref_ret)
|
||||||
int my_ret;
|
int my_ret;
|
||||||
|
|
||||||
mbedtls_x509_csr_init(&csr);
|
mbedtls_x509_csr_init(&csr);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
memset(my_out, 0, sizeof(my_out));
|
memset(my_out, 0, sizeof(my_out));
|
||||||
|
|
||||||
my_ret = mbedtls_x509_csr_parse_der(&csr, csr_der->x, csr_der->len);
|
my_ret = mbedtls_x509_csr_parse_der(&csr, csr_der->x, csr_der->len);
|
||||||
|
@ -1207,6 +1248,7 @@ void mbedtls_x509_csr_parse(data_t *csr_der, char *ref_out, int ref_ret)
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
mbedtls_x509_csr_free(&csr);
|
mbedtls_x509_csr_free(&csr);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -1218,6 +1260,8 @@ void mbedtls_x509_csr_parse_file(char *csr_file, char *ref_out, int ref_ret)
|
||||||
int my_ret;
|
int my_ret;
|
||||||
|
|
||||||
mbedtls_x509_csr_init(&csr);
|
mbedtls_x509_csr_init(&csr);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
memset(my_out, 0, sizeof(my_out));
|
memset(my_out, 0, sizeof(my_out));
|
||||||
|
|
||||||
my_ret = mbedtls_x509_csr_parse_file(&csr, csr_file);
|
my_ret = mbedtls_x509_csr_parse_file(&csr, csr_file);
|
||||||
|
@ -1231,6 +1275,7 @@ void mbedtls_x509_csr_parse_file(char *csr_file, char *ref_out, int ref_ret)
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
mbedtls_x509_csr_free(&csr);
|
mbedtls_x509_csr_free(&csr);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -1241,6 +1286,7 @@ void mbedtls_x509_crt_parse_path(char *crt_path, int ret, int nb_crt)
|
||||||
int i;
|
int i;
|
||||||
|
|
||||||
mbedtls_x509_crt_init(&chain);
|
mbedtls_x509_crt_init(&chain);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_x509_crt_parse_path(&chain, crt_path) == ret);
|
TEST_ASSERT(mbedtls_x509_crt_parse_path(&chain, crt_path) == ret);
|
||||||
|
|
||||||
|
@ -1255,6 +1301,7 @@ void mbedtls_x509_crt_parse_path(char *crt_path, int ret, int nb_crt)
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
mbedtls_x509_crt_free(&chain);
|
mbedtls_x509_crt_free(&chain);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -1271,10 +1318,8 @@ void mbedtls_x509_crt_verify_max(char *ca_file, char *chain_dir, int nb_int,
|
||||||
* We expect chain_dir to contain certificates 00.crt, 01.crt, etc.
|
* We expect chain_dir to contain certificates 00.crt, 01.crt, etc.
|
||||||
* with NN.crt signed by NN-1.crt
|
* with NN.crt signed by NN-1.crt
|
||||||
*/
|
*/
|
||||||
|
|
||||||
mbedtls_x509_crt_init(&trusted);
|
mbedtls_x509_crt_init(&trusted);
|
||||||
mbedtls_x509_crt_init(&chain);
|
mbedtls_x509_crt_init(&chain);
|
||||||
|
|
||||||
MD_OR_USE_PSA_INIT();
|
MD_OR_USE_PSA_INIT();
|
||||||
|
|
||||||
/* Load trusted root */
|
/* Load trusted root */
|
||||||
|
@ -1313,7 +1358,6 @@ void mbedtls_x509_crt_verify_chain(char *chain_paths, char *trusted_ca,
|
||||||
|
|
||||||
mbedtls_x509_crt_init(&chain);
|
mbedtls_x509_crt_init(&chain);
|
||||||
mbedtls_x509_crt_init(&trusted);
|
mbedtls_x509_crt_init(&trusted);
|
||||||
|
|
||||||
MD_OR_USE_PSA_INIT();
|
MD_OR_USE_PSA_INIT();
|
||||||
|
|
||||||
while ((act = mystrsep(&chain_paths, " ")) != NULL) {
|
while ((act = mystrsep(&chain_paths, " ")) != NULL) {
|
||||||
|
@ -1353,6 +1397,7 @@ void x509_oid_desc(data_t *buf, char *ref_desc)
|
||||||
const char *desc = NULL;
|
const char *desc = NULL;
|
||||||
int ret;
|
int ret;
|
||||||
|
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
oid.tag = MBEDTLS_ASN1_OID;
|
oid.tag = MBEDTLS_ASN1_OID;
|
||||||
oid.p = buf->x;
|
oid.p = buf->x;
|
||||||
|
@ -1368,6 +1413,9 @@ void x509_oid_desc(data_t *buf, char *ref_desc)
|
||||||
TEST_ASSERT(desc != NULL);
|
TEST_ASSERT(desc != NULL);
|
||||||
TEST_ASSERT(strcmp(desc, ref_desc) == 0);
|
TEST_ASSERT(strcmp(desc, ref_desc) == 0);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
exit:
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -1377,6 +1425,8 @@ void x509_oid_numstr(data_t *oid_buf, char *numstr, int blen, int ret)
|
||||||
mbedtls_x509_buf oid;
|
mbedtls_x509_buf oid;
|
||||||
char num_buf[100];
|
char num_buf[100];
|
||||||
|
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
memset(num_buf, 0x2a, sizeof(num_buf));
|
memset(num_buf, 0x2a, sizeof(num_buf));
|
||||||
|
|
||||||
oid.tag = MBEDTLS_ASN1_OID;
|
oid.tag = MBEDTLS_ASN1_OID;
|
||||||
|
@ -1391,6 +1441,9 @@ void x509_oid_numstr(data_t *oid_buf, char *numstr, int blen, int ret)
|
||||||
TEST_ASSERT(num_buf[ret] == 0);
|
TEST_ASSERT(num_buf[ret] == 0);
|
||||||
TEST_ASSERT(strcmp(num_buf, numstr) == 0);
|
TEST_ASSERT(strcmp(num_buf, numstr) == 0);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
exit:
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -1400,6 +1453,7 @@ void x509_check_key_usage(char *crt_file, int usage, int ret)
|
||||||
mbedtls_x509_crt crt;
|
mbedtls_x509_crt crt;
|
||||||
|
|
||||||
mbedtls_x509_crt_init(&crt);
|
mbedtls_x509_crt_init(&crt);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_x509_crt_parse_file(&crt, crt_file) == 0);
|
TEST_ASSERT(mbedtls_x509_crt_parse_file(&crt, crt_file) == 0);
|
||||||
|
|
||||||
|
@ -1407,6 +1461,7 @@ void x509_check_key_usage(char *crt_file, int usage, int ret)
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
mbedtls_x509_crt_free(&crt);
|
mbedtls_x509_crt_free(&crt);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -1417,7 +1472,7 @@ void x509_check_extended_key_usage(char *crt_file, data_t *oid, int ret
|
||||||
mbedtls_x509_crt crt;
|
mbedtls_x509_crt crt;
|
||||||
|
|
||||||
mbedtls_x509_crt_init(&crt);
|
mbedtls_x509_crt_init(&crt);
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_x509_crt_parse_file(&crt, crt_file) == 0);
|
TEST_ASSERT(mbedtls_x509_crt_parse_file(&crt, crt_file) == 0);
|
||||||
|
|
||||||
|
@ -1426,6 +1481,7 @@ void x509_check_extended_key_usage(char *crt_file, data_t *oid, int ret
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
mbedtls_x509_crt_free(&crt);
|
mbedtls_x509_crt_free(&crt);
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -1438,6 +1494,7 @@ void x509_get_time(int tag, char *time_str, int ret, int year, int mon,
|
||||||
unsigned char *start = buf;
|
unsigned char *start = buf;
|
||||||
unsigned char *end = buf;
|
unsigned char *end = buf;
|
||||||
|
|
||||||
|
USE_PSA_INIT();
|
||||||
memset(&time, 0x00, sizeof(time));
|
memset(&time, 0x00, sizeof(time));
|
||||||
*end = (unsigned char) tag; end++;
|
*end = (unsigned char) tag; end++;
|
||||||
*end = strlen(time_str);
|
*end = strlen(time_str);
|
||||||
|
@ -1455,6 +1512,8 @@ void x509_get_time(int tag, char *time_str, int ret, int year, int mon,
|
||||||
TEST_ASSERT(min == time.min);
|
TEST_ASSERT(min == time.min);
|
||||||
TEST_ASSERT(sec == time.sec);
|
TEST_ASSERT(sec == time.sec);
|
||||||
}
|
}
|
||||||
|
exit:
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -1468,6 +1527,8 @@ void x509_parse_rsassa_pss_params(data_t *params, int params_tag,
|
||||||
mbedtls_md_type_t my_msg_md, my_mgf_md;
|
mbedtls_md_type_t my_msg_md, my_mgf_md;
|
||||||
int my_salt_len;
|
int my_salt_len;
|
||||||
|
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
buf.p = params->x;
|
buf.p = params->x;
|
||||||
buf.len = params->len;
|
buf.len = params->len;
|
||||||
buf.tag = params_tag;
|
buf.tag = params_tag;
|
||||||
|
@ -1484,6 +1545,6 @@ void x509_parse_rsassa_pss_params(data_t *params, int params_tag,
|
||||||
}
|
}
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
;;
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
|
@ -176,10 +176,9 @@ void x509_csr_check(char *key_file, char *cert_req_check_file, int md_type,
|
||||||
memset(&rnd_info, 0x2a, sizeof(mbedtls_test_rnd_pseudo_info));
|
memset(&rnd_info, 0x2a, sizeof(mbedtls_test_rnd_pseudo_info));
|
||||||
|
|
||||||
mbedtls_x509write_csr_init(&req);
|
mbedtls_x509write_csr_init(&req);
|
||||||
|
mbedtls_pk_init(&key);
|
||||||
MD_OR_USE_PSA_INIT();
|
MD_OR_USE_PSA_INIT();
|
||||||
|
|
||||||
mbedtls_pk_init(&key);
|
|
||||||
TEST_ASSERT(mbedtls_pk_parse_keyfile(&key, key_file, NULL,
|
TEST_ASSERT(mbedtls_pk_parse_keyfile(&key, key_file, NULL,
|
||||||
mbedtls_test_rnd_std_rand, NULL) == 0);
|
mbedtls_test_rnd_std_rand, NULL) == 0);
|
||||||
|
|
||||||
|
@ -266,12 +265,11 @@ void x509_csr_check_opaque(char *key_file, int md_type, int key_usage,
|
||||||
const char *subject_name = "C=NL,O=PolarSSL,CN=PolarSSL Server 1";
|
const char *subject_name = "C=NL,O=PolarSSL,CN=PolarSSL Server 1";
|
||||||
mbedtls_test_rnd_pseudo_info rnd_info;
|
mbedtls_test_rnd_pseudo_info rnd_info;
|
||||||
|
|
||||||
memset(&rnd_info, 0x2a, sizeof(mbedtls_test_rnd_pseudo_info));
|
|
||||||
|
|
||||||
mbedtls_x509write_csr_init(&req);
|
mbedtls_x509write_csr_init(&req);
|
||||||
|
|
||||||
MD_OR_USE_PSA_INIT();
|
MD_OR_USE_PSA_INIT();
|
||||||
|
|
||||||
|
memset(&rnd_info, 0x2a, sizeof(mbedtls_test_rnd_pseudo_info));
|
||||||
|
|
||||||
md_alg_psa = mbedtls_hash_info_psa_from_md((mbedtls_md_type_t) md_type);
|
md_alg_psa = mbedtls_hash_info_psa_from_md((mbedtls_md_type_t) md_type);
|
||||||
TEST_ASSERT(md_alg_psa != MBEDTLS_MD_NONE);
|
TEST_ASSERT(md_alg_psa != MBEDTLS_MD_NONE);
|
||||||
|
|
||||||
|
@ -315,7 +313,7 @@ exit:
|
||||||
mbedtls_x509write_csr_free(&req);
|
mbedtls_x509write_csr_free(&req);
|
||||||
mbedtls_pk_free(&key);
|
mbedtls_pk_free(&key);
|
||||||
psa_destroy_key(key_id);
|
psa_destroy_key(key_id);
|
||||||
PSA_DONE();
|
MD_OR_USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -356,13 +354,11 @@ void x509_crt_check(char *subject_key_file, char *subject_pwd,
|
||||||
mbedtls_mpi_init(&serial_mpi);
|
mbedtls_mpi_init(&serial_mpi);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
MD_OR_USE_PSA_INIT();
|
|
||||||
|
|
||||||
mbedtls_pk_init(&subject_key);
|
mbedtls_pk_init(&subject_key);
|
||||||
mbedtls_pk_init(&issuer_key);
|
mbedtls_pk_init(&issuer_key);
|
||||||
mbedtls_pk_init(&issuer_key_alt);
|
mbedtls_pk_init(&issuer_key_alt);
|
||||||
|
|
||||||
mbedtls_x509write_crt_init(&crt);
|
mbedtls_x509write_crt_init(&crt);
|
||||||
|
MD_OR_USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_pk_parse_keyfile(&subject_key, subject_key_file,
|
TEST_ASSERT(mbedtls_pk_parse_keyfile(&subject_key, subject_key_file,
|
||||||
subject_pwd, mbedtls_test_rnd_std_rand, NULL) == 0);
|
subject_pwd, mbedtls_test_rnd_std_rand, NULL) == 0);
|
||||||
|
@ -597,6 +593,7 @@ void x509_set_serial_check()
|
||||||
mbedtls_x509write_cert ctx;
|
mbedtls_x509write_cert ctx;
|
||||||
uint8_t invalid_serial[MBEDTLS_X509_RFC5280_MAX_SERIAL_LEN + 1];
|
uint8_t invalid_serial[MBEDTLS_X509_RFC5280_MAX_SERIAL_LEN + 1];
|
||||||
|
|
||||||
|
USE_PSA_INIT();
|
||||||
memset(invalid_serial, 0x01, sizeof(invalid_serial));
|
memset(invalid_serial, 0x01, sizeof(invalid_serial));
|
||||||
|
|
||||||
#if defined(MBEDTLS_TEST_DEPRECATED) && defined(MBEDTLS_BIGNUM_C)
|
#if defined(MBEDTLS_TEST_DEPRECATED) && defined(MBEDTLS_BIGNUM_C)
|
||||||
|
@ -619,6 +616,7 @@ exit:
|
||||||
#else
|
#else
|
||||||
;
|
;
|
||||||
#endif
|
#endif
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
|
@ -632,6 +630,8 @@ void mbedtls_x509_string_to_names(char *name, char *parsed_name, int result
|
||||||
mbedtls_x509_name parsed, *parsed_cur, *parsed_prv;
|
mbedtls_x509_name parsed, *parsed_cur, *parsed_prv;
|
||||||
unsigned char buf[1024], out[1024], *c;
|
unsigned char buf[1024], out[1024], *c;
|
||||||
|
|
||||||
|
USE_PSA_INIT();
|
||||||
|
|
||||||
memset(&parsed, 0, sizeof(parsed));
|
memset(&parsed, 0, sizeof(parsed));
|
||||||
memset(out, 0, sizeof(out));
|
memset(out, 0, sizeof(out));
|
||||||
memset(buf, 0, sizeof(buf));
|
memset(buf, 0, sizeof(buf));
|
||||||
|
@ -665,5 +665,6 @@ exit:
|
||||||
parsed_cur = parsed_cur->next;
|
parsed_cur = parsed_cur->next;
|
||||||
mbedtls_free(parsed_prv);
|
mbedtls_free(parsed_prv);
|
||||||
}
|
}
|
||||||
|
USE_PSA_DONE();
|
||||||
}
|
}
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue