423 lines
9.9 KiB
C
423 lines
9.9 KiB
C
|
/* testsuite.c
|
||
|
*
|
||
|
* Copyright (C) 2006-2016 wolfSSL Inc.
|
||
|
*
|
||
|
* This file is part of wolfSSL.
|
||
|
*
|
||
|
* wolfSSL is free software; you can redistribute it and/or modify
|
||
|
* it under the terms of the GNU General Public License as published by
|
||
|
* the Free Software Foundation; either version 2 of the License, or
|
||
|
* (at your option) any later version.
|
||
|
*
|
||
|
* wolfSSL is distributed in the hope that it will be useful,
|
||
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||
|
* GNU General Public License for more details.
|
||
|
*
|
||
|
* You should have received a copy of the GNU General Public License
|
||
|
* along with this program; if not, write to the Free Software
|
||
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
||
|
*/
|
||
|
|
||
|
|
||
|
#ifdef HAVE_CONFIG_H
|
||
|
#include <config.h>
|
||
|
#endif
|
||
|
|
||
|
#include <wolfssl/wolfcrypt/settings.h>
|
||
|
|
||
|
#include <wolfssl/ssl.h>
|
||
|
#include <wolfssl/test.h>
|
||
|
#include "wolfcrypt/test/test.h"
|
||
|
|
||
|
|
||
|
#ifndef SINGLE_THREADED
|
||
|
|
||
|
#include <wolfssl/openssl/ssl.h>
|
||
|
#include <wolfssl/wolfcrypt/sha256.h>
|
||
|
|
||
|
#include "examples/echoclient/echoclient.h"
|
||
|
#include "examples/echoserver/echoserver.h"
|
||
|
#include "examples/server/server.h"
|
||
|
#include "examples/client/client.h"
|
||
|
|
||
|
|
||
|
#ifndef NO_SHA256
|
||
|
void file_test(const char* file, byte* hash);
|
||
|
#endif
|
||
|
|
||
|
void simple_test(func_args*);
|
||
|
|
||
|
enum {
|
||
|
NUMARGS = 3
|
||
|
};
|
||
|
|
||
|
static const char *outputName;
|
||
|
|
||
|
int myoptind = 0;
|
||
|
char* myoptarg = NULL;
|
||
|
|
||
|
#ifndef NO_TESTSUITE_MAIN_DRIVER
|
||
|
|
||
|
static int testsuite_test(int argc, char** argv);
|
||
|
|
||
|
int main(int argc, char** argv)
|
||
|
{
|
||
|
return testsuite_test(argc, argv);
|
||
|
}
|
||
|
|
||
|
#endif /* NO_TESTSUITE_MAIN_DRIVER */
|
||
|
|
||
|
|
||
|
int testsuite_test(int argc, char** argv)
|
||
|
{
|
||
|
func_args server_args;
|
||
|
|
||
|
tcp_ready ready;
|
||
|
THREAD_TYPE serverThread;
|
||
|
|
||
|
#ifndef USE_WINDOWS_API
|
||
|
char tempName[] = "/tmp/output-XXXXXX";
|
||
|
int len = 18;
|
||
|
int num = 6;
|
||
|
#else
|
||
|
char tempName[] = "fnXXXXXX";
|
||
|
int len = 8;
|
||
|
int num = 6;
|
||
|
#endif
|
||
|
|
||
|
#ifdef HAVE_WNR
|
||
|
if (wc_InitNetRandom(wnrConfig, NULL, 5000) != 0) {
|
||
|
err_sys("Whitewood netRandom global config failed");
|
||
|
return -1237;
|
||
|
}
|
||
|
#endif /* HAVE_WNR */
|
||
|
|
||
|
StartTCP();
|
||
|
|
||
|
server_args.argc = argc;
|
||
|
server_args.argv = argv;
|
||
|
|
||
|
wolfSSL_Init();
|
||
|
#if defined(DEBUG_WOLFSSL) && !defined(HAVE_VALGRIND)
|
||
|
wolfSSL_Debugging_ON();
|
||
|
#endif
|
||
|
|
||
|
#if !defined(WOLFSSL_TIRTOS)
|
||
|
ChangeToWolfRoot();
|
||
|
#endif
|
||
|
|
||
|
#ifdef WOLFSSL_TIRTOS
|
||
|
fdOpenSession(Task_self());
|
||
|
#endif
|
||
|
|
||
|
server_args.signal = &ready;
|
||
|
InitTcpReady(&ready);
|
||
|
|
||
|
#ifndef NO_CRYPT_TEST
|
||
|
/* wc_ test */
|
||
|
wolfcrypt_test(&server_args);
|
||
|
if (server_args.return_code != 0) return server_args.return_code;
|
||
|
#endif
|
||
|
|
||
|
/* Simple wolfSSL client server test */
|
||
|
simple_test(&server_args);
|
||
|
if (server_args.return_code != 0) return server_args.return_code;
|
||
|
|
||
|
/* Echo input wolfSSL client server test */
|
||
|
start_thread(echoserver_test, &server_args, &serverThread);
|
||
|
wait_tcp_ready(&server_args);
|
||
|
{
|
||
|
func_args echo_args;
|
||
|
char* myArgv[NUMARGS];
|
||
|
|
||
|
char argc0[32];
|
||
|
char argc1[32];
|
||
|
char argc2[32];
|
||
|
|
||
|
myArgv[0] = argc0;
|
||
|
myArgv[1] = argc1;
|
||
|
myArgv[2] = argc2;
|
||
|
|
||
|
echo_args.argc = 3;
|
||
|
echo_args.argv = myArgv;
|
||
|
|
||
|
/* Create unique file name */
|
||
|
outputName = mymktemp(tempName, len, num);
|
||
|
if (outputName == NULL) {
|
||
|
printf("Could not create unique file name");
|
||
|
return EXIT_FAILURE;
|
||
|
}
|
||
|
|
||
|
strcpy(echo_args.argv[0], "echoclient");
|
||
|
strcpy(echo_args.argv[1], "input");
|
||
|
strcpy(echo_args.argv[2], outputName);
|
||
|
|
||
|
/* Share the signal, it has the new port number in it. */
|
||
|
echo_args.signal = server_args.signal;
|
||
|
|
||
|
/* make sure OK */
|
||
|
echoclient_test(&echo_args);
|
||
|
if (echo_args.return_code != 0) return echo_args.return_code;
|
||
|
|
||
|
#ifdef WOLFSSL_DTLS
|
||
|
wait_tcp_ready(&server_args);
|
||
|
#endif
|
||
|
/* send quit to echoserver */
|
||
|
echo_args.argc = 2;
|
||
|
strcpy(echo_args.argv[1], "quit");
|
||
|
|
||
|
echoclient_test(&echo_args);
|
||
|
if (echo_args.return_code != 0) return echo_args.return_code;
|
||
|
join_thread(serverThread);
|
||
|
if (server_args.return_code != 0) return server_args.return_code;
|
||
|
}
|
||
|
|
||
|
/* show ciphers */
|
||
|
{
|
||
|
char ciphers[1024];
|
||
|
XMEMSET(ciphers, 0, sizeof(ciphers));
|
||
|
wolfSSL_get_ciphers(ciphers, sizeof(ciphers)-1);
|
||
|
printf("ciphers = %s\n", ciphers);
|
||
|
}
|
||
|
|
||
|
/* validate output equals input */
|
||
|
{
|
||
|
#ifndef NO_SHA256
|
||
|
byte input[SHA256_DIGEST_SIZE];
|
||
|
byte output[SHA256_DIGEST_SIZE];
|
||
|
|
||
|
file_test("input", input);
|
||
|
file_test(outputName, output);
|
||
|
#endif
|
||
|
remove(outputName);
|
||
|
#ifndef NO_SHA256
|
||
|
if (memcmp(input, output, sizeof(input)) != 0)
|
||
|
return EXIT_FAILURE;
|
||
|
#endif
|
||
|
}
|
||
|
|
||
|
wolfSSL_Cleanup();
|
||
|
FreeTcpReady(&ready);
|
||
|
|
||
|
#ifdef WOLFSSL_TIRTOS
|
||
|
fdCloseSession(Task_self());
|
||
|
#endif
|
||
|
|
||
|
#ifdef HAVE_WNR
|
||
|
if (wc_FreeNetRandom() < 0)
|
||
|
err_sys("Failed to free netRandom context");
|
||
|
#endif /* HAVE_WNR */
|
||
|
|
||
|
printf("\nAll tests passed!\n");
|
||
|
EXIT_TEST(EXIT_SUCCESS);
|
||
|
}
|
||
|
|
||
|
void simple_test(func_args* args)
|
||
|
{
|
||
|
THREAD_TYPE serverThread;
|
||
|
|
||
|
func_args svrArgs;
|
||
|
char *svrArgv[9];
|
||
|
char argc0s[32];
|
||
|
char argc1s[32];
|
||
|
char argc2s[32];
|
||
|
char argc3s[32];
|
||
|
char argc4s[32];
|
||
|
char argc5s[32];
|
||
|
char argc6s[32];
|
||
|
char argc7s[32];
|
||
|
char argc8s[32];
|
||
|
|
||
|
func_args cliArgs;
|
||
|
char *cliArgv[NUMARGS];
|
||
|
char argc0c[32];
|
||
|
char argc1c[32];
|
||
|
char argc2c[32];
|
||
|
|
||
|
svrArgv[0] = argc0s;
|
||
|
svrArgv[1] = argc1s;
|
||
|
svrArgv[2] = argc2s;
|
||
|
svrArgv[3] = argc3s;
|
||
|
svrArgv[4] = argc4s;
|
||
|
svrArgv[5] = argc5s;
|
||
|
svrArgv[6] = argc6s;
|
||
|
svrArgv[7] = argc7s;
|
||
|
svrArgv[8] = argc8s;
|
||
|
cliArgv[0] = argc0c;
|
||
|
cliArgv[1] = argc1c;
|
||
|
cliArgv[2] = argc2c;
|
||
|
|
||
|
svrArgs.argc = 1;
|
||
|
svrArgs.argv = svrArgv;
|
||
|
svrArgs.return_code = 0;
|
||
|
cliArgs.argc = 1;
|
||
|
cliArgs.argv = cliArgv;
|
||
|
cliArgs.return_code = 0;
|
||
|
|
||
|
strcpy(svrArgs.argv[0], "SimpleServer");
|
||
|
#if !defined(USE_WINDOWS_API) && !defined(WOLFSSL_SNIFFER) && \
|
||
|
!defined(WOLFSSL_TIRTOS)
|
||
|
strcpy(svrArgs.argv[svrArgs.argc++], "-p");
|
||
|
strcpy(svrArgs.argv[svrArgs.argc++], "0");
|
||
|
#endif
|
||
|
/* Set the last arg later, when it is known. */
|
||
|
|
||
|
args->return_code = 0;
|
||
|
svrArgs.signal = args->signal;
|
||
|
start_thread(server_test, &svrArgs, &serverThread);
|
||
|
wait_tcp_ready(&svrArgs);
|
||
|
|
||
|
/* Setting the actual port number. */
|
||
|
strcpy(cliArgs.argv[0], "SimpleClient");
|
||
|
#ifndef USE_WINDOWS_API
|
||
|
cliArgs.argc = NUMARGS;
|
||
|
strcpy(cliArgs.argv[1], "-p");
|
||
|
snprintf(cliArgs.argv[2], sizeof(argc2c), "%d", svrArgs.signal->port);
|
||
|
#endif
|
||
|
|
||
|
client_test(&cliArgs);
|
||
|
if (cliArgs.return_code != 0) {
|
||
|
args->return_code = cliArgs.return_code;
|
||
|
return;
|
||
|
}
|
||
|
join_thread(serverThread);
|
||
|
if (svrArgs.return_code != 0) args->return_code = svrArgs.return_code;
|
||
|
}
|
||
|
|
||
|
|
||
|
void wait_tcp_ready(func_args* args)
|
||
|
{
|
||
|
#if defined(_POSIX_THREADS) && !defined(__MINGW32__)
|
||
|
pthread_mutex_lock(&args->signal->mutex);
|
||
|
|
||
|
if (!args->signal->ready)
|
||
|
pthread_cond_wait(&args->signal->cond, &args->signal->mutex);
|
||
|
args->signal->ready = 0; /* reset */
|
||
|
|
||
|
pthread_mutex_unlock(&args->signal->mutex);
|
||
|
#else
|
||
|
(void)args;
|
||
|
#endif
|
||
|
}
|
||
|
|
||
|
|
||
|
void start_thread(THREAD_FUNC fun, func_args* args, THREAD_TYPE* thread)
|
||
|
{
|
||
|
#if defined(_POSIX_THREADS) && !defined(__MINGW32__)
|
||
|
pthread_create(thread, 0, fun, args);
|
||
|
return;
|
||
|
#elif defined(WOLFSSL_TIRTOS)
|
||
|
/* Initialize the defaults and set the parameters. */
|
||
|
Task_Params taskParams;
|
||
|
Task_Params_init(&taskParams);
|
||
|
taskParams.arg0 = (UArg)args;
|
||
|
taskParams.stackSize = 65535;
|
||
|
*thread = Task_create((Task_FuncPtr)fun, &taskParams, NULL);
|
||
|
if (*thread == NULL) {
|
||
|
printf("Failed to create new Task\n");
|
||
|
}
|
||
|
Task_yield();
|
||
|
#else
|
||
|
*thread = (THREAD_TYPE)_beginthreadex(0, 0, fun, args, 0, 0);
|
||
|
#endif
|
||
|
}
|
||
|
|
||
|
|
||
|
void join_thread(THREAD_TYPE thread)
|
||
|
{
|
||
|
#if defined(_POSIX_THREADS) && !defined(__MINGW32__)
|
||
|
pthread_join(thread, 0);
|
||
|
#elif defined(WOLFSSL_TIRTOS)
|
||
|
while(1) {
|
||
|
if (Task_getMode(thread) == Task_Mode_TERMINATED) {
|
||
|
Task_sleep(5);
|
||
|
break;
|
||
|
}
|
||
|
Task_yield();
|
||
|
}
|
||
|
#else
|
||
|
int res = WaitForSingleObject((HANDLE)thread, INFINITE);
|
||
|
assert(res == WAIT_OBJECT_0);
|
||
|
res = CloseHandle((HANDLE)thread);
|
||
|
assert(res);
|
||
|
(void)res; /* Suppress un-used variable warning */
|
||
|
#endif
|
||
|
}
|
||
|
|
||
|
|
||
|
#ifndef NO_SHA256
|
||
|
void file_test(const char* file, byte* check)
|
||
|
{
|
||
|
FILE* f;
|
||
|
int i = 0, j, ret;
|
||
|
Sha256 sha256;
|
||
|
byte buf[1024];
|
||
|
byte shasum[SHA256_DIGEST_SIZE];
|
||
|
|
||
|
ret = wc_InitSha256(&sha256);
|
||
|
if (ret != 0) {
|
||
|
printf("Can't wc_InitSha256 %d\n", ret);
|
||
|
return;
|
||
|
}
|
||
|
if( !( f = fopen( file, "rb" ) )) {
|
||
|
printf("Can't open %s\n", file);
|
||
|
return;
|
||
|
}
|
||
|
while( ( i = (int)fread(buf, 1, sizeof(buf), f )) > 0 ) {
|
||
|
ret = wc_Sha256Update(&sha256, buf, i);
|
||
|
if (ret != 0) {
|
||
|
printf("Can't wc_Sha256Update %d\n", ret);
|
||
|
fclose(f);
|
||
|
return;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
ret = wc_Sha256Final(&sha256, shasum);
|
||
|
if (ret != 0) {
|
||
|
printf("Can't wc_Sha256Final %d\n", ret);
|
||
|
fclose(f);
|
||
|
return;
|
||
|
}
|
||
|
|
||
|
XMEMCPY(check, shasum, sizeof(shasum));
|
||
|
|
||
|
for(j = 0; j < SHA256_DIGEST_SIZE; ++j )
|
||
|
printf( "%02x", shasum[j] );
|
||
|
|
||
|
printf(" %s\n", file);
|
||
|
|
||
|
fclose(f);
|
||
|
}
|
||
|
#endif
|
||
|
|
||
|
#else /* SINGLE_THREADED */
|
||
|
|
||
|
|
||
|
int myoptind = 0;
|
||
|
char* myoptarg = NULL;
|
||
|
|
||
|
|
||
|
int main(int argc, char** argv)
|
||
|
{
|
||
|
func_args server_args;
|
||
|
|
||
|
server_args.argc = argc;
|
||
|
server_args.argv = argv;
|
||
|
|
||
|
wolfSSL_Init();
|
||
|
ChangeToWolfRoot();
|
||
|
|
||
|
wolfcrypt_test(&server_args);
|
||
|
if (server_args.return_code != 0) return server_args.return_code;
|
||
|
|
||
|
wolfSSL_Cleanup();
|
||
|
printf("\nAll tests passed!\n");
|
||
|
|
||
|
EXIT_TEST(EXIT_SUCCESS);
|
||
|
}
|
||
|
|
||
|
|
||
|
#endif /* SINGLE_THREADED */
|
||
|
|