wolfssl/tests/suites.c

683 lines
20 KiB
C
Raw Normal View History

2017-05-11 14:01:41 +02:00
/* suites.c
*
2018-02-19 12:29:49 +01:00
* Copyright (C) 2006-2017 wolfSSL Inc.
2017-05-11 14:01:41 +02:00
*
* This file is part of wolfSSL.
*
* wolfSSL is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* wolfSSL is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
*/
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif
#include <wolfssl/wolfcrypt/settings.h>
#include <stdlib.h>
#include <stdio.h>
#include <string.h>
#include <wolfssl/ssl.h>
#include <tests/unit.h>
#define MAX_ARGS 40
#define MAX_COMMAND_SZ 240
2018-02-19 12:29:49 +01:00
#define MAX_SUITE_SZ 80
2017-05-11 14:01:41 +02:00
#define NOT_BUILT_IN -123
2018-02-19 12:29:49 +01:00
#if defined(NO_OLD_TLS) || !defined(WOLFSSL_ALLOW_SSLV3) || \
!defined(WOLFSSL_ALLOW_TLSV10)
2017-05-11 14:01:41 +02:00
#define VERSION_TOO_OLD -124
#endif
#include "examples/client/client.h"
#include "examples/server/server.h"
2018-02-19 12:29:49 +01:00
#if !defined(NO_WOLFSSL_SERVER) && !defined(NO_WOLFSSL_CLIENT)
2017-05-11 14:01:41 +02:00
static WOLFSSL_CTX* cipherSuiteCtx = NULL;
static char nonblockFlag[] = "-N";
static char noVerifyFlag[] = "-d";
static char disableEMSFlag[] = "-n";
static char flagSep[] = " ";
#if !defined(USE_WINDOWS_API) && !defined(WOLFSSL_TIRTOS)
static char portFlag[] = "-p";
static char svrPort[] = "0";
#endif
2018-02-19 12:29:49 +01:00
static char forceDefCipherListFlag[] = "-HdefCipherList";
2017-05-11 14:01:41 +02:00
2018-02-19 12:29:49 +01:00
#ifdef WOLFSSL_ASYNC_CRYPT
static int devId = INVALID_DEVID;
#endif
2017-05-11 14:01:41 +02:00
2018-02-19 12:29:49 +01:00
#ifdef VERSION_TOO_OLD
static int GetTlsVersion(const char* line)
2017-05-11 14:01:41 +02:00
{
2018-02-19 12:29:49 +01:00
int version = -1;
2017-05-11 14:01:41 +02:00
const char* find = "-v ";
const char* begin = strstr(line, find);
if (begin) {
begin += 3;
version = atoi(begin);
}
2018-02-19 12:29:49 +01:00
return version;
}
2017-05-11 14:01:41 +02:00
2018-02-19 12:29:49 +01:00
#ifndef WOLFSSL_ALLOW_SSLV3
/* if the protocol version is sslv3 return 1, else 0 */
static int IsSslVersion(const char* line)
{
int version = GetTlsVersion(line);
return (version == 0) ? 1 : 0;
2017-05-11 14:01:41 +02:00
}
#endif /* !WOLFSSL_ALLOW_SSLV3 */
2018-02-19 12:29:49 +01:00
#ifndef WOLFSSL_ALLOW_TLSV10
/* if the protocol version is TLSv1.0 return 1, else 0 */
static int IsTls10Version(const char* line)
{
int version = GetTlsVersion(line);
return (version == 1) ? 1 : 0;
}
#endif /* !WOLFSSL_ALLOW_TLSV10 */
2017-05-11 14:01:41 +02:00
#ifdef NO_OLD_TLS
/* if the protocol version is less than tls 1.2 return 1, else 0 */
static int IsOldTlsVersion(const char* line)
{
2018-02-19 12:29:49 +01:00
int version = GetTlsVersion(line);
return (version < 3) ? 1 : 0;
2017-05-11 14:01:41 +02:00
}
#endif /* NO_OLD_TLS */
2018-02-19 12:29:49 +01:00
#endif /* VERSION_TOO_OLD */
2017-05-11 14:01:41 +02:00
/* if the cipher suite on line is valid store in suite and return 1, else 0 */
static int IsValidCipherSuite(const char* line, char* suite)
{
int found = 0;
int valid = 0;
const char* find = "-l ";
const char* begin = strstr(line, find);
const char* end;
suite[0] = '\0';
if (begin) {
begin += 3;
end = XSTRSTR(begin, " ");
if (end) {
long len = end - begin;
if (len > MAX_SUITE_SZ) {
printf("suite too long!\n");
return 0;
}
XMEMCPY(suite, begin, len);
suite[len] = '\0';
}
else
XSTRNCPY(suite, begin, MAX_SUITE_SZ);
suite[MAX_SUITE_SZ] = '\0';
found = 1;
}
/* if QSH not enabled then do not use QSH suite */
#ifdef HAVE_QSH
if (XSTRNCMP(suite, "QSH", 3) == 0) {
if (wolfSSL_CTX_set_cipher_list(cipherSuiteCtx, suite + 4)
2018-02-19 12:29:49 +01:00
!= WOLFSSL_SUCCESS)
2017-05-11 14:01:41 +02:00
return 0;
}
#endif
if (found) {
2018-02-19 12:29:49 +01:00
if (wolfSSL_CTX_set_cipher_list(cipherSuiteCtx, suite) == WOLFSSL_SUCCESS)
2017-05-11 14:01:41 +02:00
valid = 1;
}
return valid;
}
static int execute_test_case(int svr_argc, char** svr_argv,
int cli_argc, char** cli_argv,
int addNoVerify, int addNonBlocking,
2018-02-19 12:29:49 +01:00
int addDisableEMS, int forceSrvDefCipherList,
int forceCliDefCipherList)
2017-05-11 14:01:41 +02:00
{
#ifdef WOLFSSL_TIRTOS
func_args cliArgs = {0};
func_args svrArgs = {0};
cliArgs.argc = cli_argc;
cliArgs.argv = cli_argv;
svrArgs.argc = svr_argc;
svrArgs.argv = svr_argv;
#else
func_args cliArgs = {cli_argc, cli_argv, 0, NULL, NULL};
func_args svrArgs = {svr_argc, svr_argv, 0, NULL, NULL};
#endif
tcp_ready ready;
THREAD_TYPE serverThread;
char commandLine[MAX_COMMAND_SZ];
char cipherSuite[MAX_SUITE_SZ+1];
int i;
2018-02-19 12:29:49 +01:00
size_t added;
2017-05-11 14:01:41 +02:00
static int tests = 1;
2018-02-19 12:29:49 +01:00
#if !defined(USE_WINDOWS_API) && !defined(WOLFSSL_TIRTOS)
char portNumber[8];
#endif
2017-05-11 14:01:41 +02:00
2018-02-19 12:29:49 +01:00
/* Is Valid Cipher and Version Checks */
/* build command list for the Is checks below */
2017-05-11 14:01:41 +02:00
commandLine[0] = '\0';
2018-02-19 12:29:49 +01:00
added = 0;
for (i = 0; i < svrArgs.argc; i++) {
2017-05-11 14:01:41 +02:00
added += XSTRLEN(svr_argv[i]) + 2;
if (added >= MAX_COMMAND_SZ) {
2018-02-19 12:29:49 +01:00
printf("server command line too long\n");
2017-05-11 14:01:41 +02:00
break;
}
strcat(commandLine, svr_argv[i]);
strcat(commandLine, flagSep);
}
if (IsValidCipherSuite(commandLine, cipherSuite) == 0) {
#ifdef DEBUG_SUITE_TESTS
printf("cipher suite %s not supported in build\n", cipherSuite);
#endif
return NOT_BUILT_IN;
}
#ifndef WOLFSSL_ALLOW_SSLV3
if (IsSslVersion(commandLine) == 1) {
#ifdef DEBUG_SUITE_TESTS
printf("protocol version on line %s is too old\n", commandLine);
#endif
return VERSION_TOO_OLD;
}
#endif
2018-02-19 12:29:49 +01:00
#ifndef WOLFSSL_ALLOW_TLSV10
if (IsTls10Version(commandLine) == 1) {
#ifdef DEBUG_SUITE_TESTS
printf("protocol version on line %s is too old\n", commandLine);
#endif
return VERSION_TOO_OLD;
}
#endif
2017-05-11 14:01:41 +02:00
#ifdef NO_OLD_TLS
if (IsOldTlsVersion(commandLine) == 1) {
#ifdef DEBUG_SUITE_TESTS
printf("protocol version on line %s is too old\n", commandLine);
#endif
return VERSION_TOO_OLD;
}
#endif
2018-02-19 12:29:49 +01:00
/* Build Client Command */
2017-05-11 14:01:41 +02:00
if (addNoVerify) {
2018-02-19 12:29:49 +01:00
printf("repeating test with client cert request off\n");
if (svrArgs.argc >= MAX_ARGS)
2017-05-11 14:01:41 +02:00
printf("server command line too long\n");
2018-02-19 12:29:49 +01:00
else
svr_argv[svrArgs.argc++] = noVerifyFlag;
2017-05-11 14:01:41 +02:00
}
if (addNonBlocking) {
2018-02-19 12:29:49 +01:00
printf("repeating test with non blocking on\n");
if (svrArgs.argc >= MAX_ARGS)
2017-05-11 14:01:41 +02:00
printf("server command line too long\n");
2018-02-19 12:29:49 +01:00
else
svr_argv[svrArgs.argc++] = nonblockFlag;
2017-05-11 14:01:41 +02:00
}
#if !defined(USE_WINDOWS_API) && !defined(WOLFSSL_TIRTOS)
2018-02-19 12:29:49 +01:00
/* add port */
if (svrArgs.argc + 2 > MAX_ARGS)
2017-05-11 14:01:41 +02:00
printf("cannot add the magic port number flag to server\n");
2018-02-19 12:29:49 +01:00
else {
svr_argv[svrArgs.argc++] = portFlag;
svr_argv[svrArgs.argc++] = svrPort;
2017-05-11 14:01:41 +02:00
}
#endif
2018-02-19 12:29:49 +01:00
if (forceSrvDefCipherList) {
if (svrArgs.argc >= MAX_ARGS)
printf("cannot add the force def cipher list flag to server\n");
else
svr_argv[svrArgs.argc++] = forceDefCipherListFlag;
}
2017-05-11 14:01:41 +02:00
2018-02-19 12:29:49 +01:00
/* update server flags list */
2017-05-11 14:01:41 +02:00
commandLine[0] = '\0';
added = 0;
2018-02-19 12:29:49 +01:00
for (i = 0; i < svrArgs.argc; i++) {
added += XSTRLEN(svr_argv[i]) + 2;
2017-05-11 14:01:41 +02:00
if (added >= MAX_COMMAND_SZ) {
2018-02-19 12:29:49 +01:00
printf("server command line too long\n");
2017-05-11 14:01:41 +02:00
break;
}
2018-02-19 12:29:49 +01:00
strcat(commandLine, svr_argv[i]);
2017-05-11 14:01:41 +02:00
strcat(commandLine, flagSep);
}
2018-02-19 12:29:49 +01:00
printf("trying server command line[%d]: %s\n", tests, commandLine);
tests++; /* test count */
2017-05-11 14:01:41 +02:00
InitTcpReady(&ready);
#ifdef WOLFSSL_TIRTOS
fdOpenSession(Task_self());
#endif
/* start server */
svrArgs.signal = &ready;
start_thread(server_test, &svrArgs, &serverThread);
wait_tcp_ready(&svrArgs);
2018-02-19 12:29:49 +01:00
/* Build Client Command */
if (addNonBlocking) {
if (cliArgs.argc >= MAX_ARGS)
printf("cannot add the non block flag to client\n");
else
cli_argv[cliArgs.argc++] = nonblockFlag;
}
if (addDisableEMS) {
printf("repeating test without extended master secret\n");
if (cliArgs.argc >= MAX_ARGS)
printf("cannot add the disable EMS flag to client\n");
else
cli_argv[cliArgs.argc++] = disableEMSFlag;
}
#if !defined(USE_WINDOWS_API) && !defined(WOLFSSL_TIRTOS)
if (ready.port != 0) {
if (cliArgs.argc + 2 > MAX_ARGS)
printf("cannot add the magic port number flag to client\n");
else {
snprintf(portNumber, sizeof(portNumber), "%d", ready.port);
cli_argv[cliArgs.argc++] = portFlag;
cli_argv[cliArgs.argc++] = portNumber;
2017-05-11 14:01:41 +02:00
}
2018-02-19 12:29:49 +01:00
}
#endif
if (forceCliDefCipherList) {
if (cliArgs.argc >= MAX_ARGS)
printf("cannot add the force def cipher list flag to client\n");
else
cli_argv[cliArgs.argc++] = forceDefCipherListFlag;
}
commandLine[0] = '\0';
added = 0;
for (i = 0; i < cliArgs.argc; i++) {
added += XSTRLEN(cli_argv[i]) + 2;
if (added >= MAX_COMMAND_SZ) {
printf("client command line too long\n");
break;
}
strcat(commandLine, cli_argv[i]);
strcat(commandLine, flagSep);
}
printf("trying client command line[%d]: %s\n", tests, commandLine);
2017-05-11 14:01:41 +02:00
/* start client */
client_test(&cliArgs);
2018-02-19 12:29:49 +01:00
/* verify results */
2017-05-11 14:01:41 +02:00
if (cliArgs.return_code != 0) {
printf("client_test failed\n");
exit(EXIT_FAILURE);
}
join_thread(serverThread);
2018-02-19 12:29:49 +01:00
if (svrArgs.return_code != 0) {
2017-05-11 14:01:41 +02:00
printf("server_test failed\n");
exit(EXIT_FAILURE);
}
#ifdef WOLFSSL_TIRTOS
fdCloseSession(Task_self());
#endif
FreeTcpReady(&ready);
2018-02-19 12:29:49 +01:00
2017-05-11 14:01:41 +02:00
return 0;
}
static void test_harness(void* vargs)
{
func_args* args = (func_args*)vargs;
char* script;
long sz, len;
int cliMode = 0; /* server or client command flag, server first */
int ret;
FILE* file;
char* svrArgs[MAX_ARGS];
int svrArgsSz;
char* cliArgs[MAX_ARGS];
int cliArgsSz;
char* cursor;
char* comment;
const char* fname = "tests/test.conf";
if (args->argc == 1) {
printf("notice: using default file %s\n", fname);
}
else if(args->argc != 2) {
printf("usage: harness [FILE]\n");
args->return_code = 1;
return;
}
else {
fname = args->argv[1];
}
file = fopen(fname, "rb");
if (file == NULL) {
fprintf(stderr, "unable to open %s\n", fname);
args->return_code = 1;
return;
}
fseek(file, 0, SEEK_END);
sz = ftell(file);
rewind(file);
if (sz <= 0) {
fprintf(stderr, "%s is empty\n", fname);
fclose(file);
args->return_code = 1;
return;
}
script = (char*)malloc(sz+1);
if (script == 0) {
fprintf(stderr, "unable to allocte script buffer\n");
fclose(file);
args->return_code = 1;
return;
}
len = fread(script, 1, sz, file);
if (len != sz) {
fprintf(stderr, "read error\n");
fclose(file);
free(script);
args->return_code = 1;
return;
}
2018-02-19 12:29:49 +01:00
2017-05-11 14:01:41 +02:00
fclose(file);
script[sz] = 0;
cursor = script;
svrArgsSz = 1;
svrArgs[0] = args->argv[0];
cliArgsSz = 1;
cliArgs[0] = args->argv[0];
while (*cursor != 0) {
int do_it = 0;
switch (*cursor) {
case '\n':
/* A blank line triggers test case execution or switches
to client mode if we don't have the client command yet */
if (cliMode == 0)
cliMode = 1; /* switch to client mode processing */
else
do_it = 1; /* Do It, we have server and client */
cursor++;
break;
case '#':
/* Ignore lines that start with a #. */
comment = strsep(&cursor, "\n");
#ifdef DEBUG_SUITE_TESTS
printf("%s\n", comment);
#else
(void)comment;
#endif
break;
case '-':
/* Parameters start with a -. They end in either a newline
* or a space. Capture until either, save in Args list. */
if (cliMode)
cliArgs[cliArgsSz++] = strsep(&cursor, " \n");
else
svrArgs[svrArgsSz++] = strsep(&cursor, " \n");
break;
default:
/* Anything from cursor until end of line that isn't the above
* is data for a paramter. Just up until the next newline in
* the Args list. */
if (cliMode)
cliArgs[cliArgsSz++] = strsep(&cursor, "\n");
else
svrArgs[svrArgsSz++] = strsep(&cursor, "\n");
if (*cursor == 0) /* eof */
2018-02-19 12:29:49 +01:00
do_it = 1;
2017-05-11 14:01:41 +02:00
}
if (svrArgsSz == MAX_ARGS || cliArgsSz == MAX_ARGS) {
fprintf(stderr, "too many arguments, forcing test run\n");
do_it = 1;
}
if (do_it) {
ret = execute_test_case(svrArgsSz, svrArgs,
2018-02-19 12:29:49 +01:00
cliArgsSz, cliArgs, 0, 0, 0, 0, 0);
2017-05-11 14:01:41 +02:00
/* don't repeat if not supported in build */
if (ret == 0) {
2018-02-19 12:29:49 +01:00
/* test with default cipher list on server side */
execute_test_case(svrArgsSz, svrArgs,
cliArgsSz, cliArgs, 0, 0, 0, 1, 0);
/* test with default cipher list on client side */
2017-05-11 14:01:41 +02:00
execute_test_case(svrArgsSz, svrArgs,
2018-02-19 12:29:49 +01:00
cliArgsSz, cliArgs, 0, 0, 0, 0, 1);
execute_test_case(svrArgsSz, svrArgs,
cliArgsSz, cliArgs, 0, 1, 0, 0, 0);
2017-05-11 14:01:41 +02:00
execute_test_case(svrArgsSz, svrArgs,
2018-02-19 12:29:49 +01:00
cliArgsSz, cliArgs, 1, 0, 0, 0, 0);
2017-05-11 14:01:41 +02:00
execute_test_case(svrArgsSz, svrArgs,
2018-02-19 12:29:49 +01:00
cliArgsSz, cliArgs, 1, 1, 0, 0, 0);
2017-05-11 14:01:41 +02:00
#ifdef HAVE_EXTENDED_MASTER
execute_test_case(svrArgsSz, svrArgs,
2018-02-19 12:29:49 +01:00
cliArgsSz, cliArgs, 0, 0, 1, 0, 0);
2017-05-11 14:01:41 +02:00
execute_test_case(svrArgsSz, svrArgs,
2018-02-19 12:29:49 +01:00
cliArgsSz, cliArgs, 0, 1, 1, 0, 0);
2017-05-11 14:01:41 +02:00
execute_test_case(svrArgsSz, svrArgs,
2018-02-19 12:29:49 +01:00
cliArgsSz, cliArgs, 1, 0, 1, 0, 0);
2017-05-11 14:01:41 +02:00
execute_test_case(svrArgsSz, svrArgs,
2018-02-19 12:29:49 +01:00
cliArgsSz, cliArgs, 1, 1, 1, 0, 0);
2017-05-11 14:01:41 +02:00
#endif
}
svrArgsSz = 1;
cliArgsSz = 1;
cliMode = 0;
}
}
free(script);
args->return_code = 0;
}
2018-02-19 12:29:49 +01:00
#endif /* !NO_WOLFSSL_SERVER && !NO_WOLFSSL_CLIENT */
2017-05-11 14:01:41 +02:00
int SuiteTest(void)
{
2018-02-19 12:29:49 +01:00
#if !defined(NO_WOLFSSL_SERVER) && !defined(NO_WOLFSSL_CLIENT)
2017-05-11 14:01:41 +02:00
func_args args;
char argv0[2][80];
char* myArgv[2];
printf(" Begin Cipher Suite Tests\n");
/* setup */
myArgv[0] = argv0[0];
myArgv[1] = argv0[1];
args.argv = myArgv;
strcpy(argv0[0], "SuiteTest");
#ifdef WOLFSSL_STATIC_MEMORY
byte memory[200000];
#endif
(void)test_harness;
cipherSuiteCtx = wolfSSL_CTX_new(wolfTLSv1_2_client_method());
if (cipherSuiteCtx == NULL) {
printf("can't get cipher suite ctx\n");
exit(EXIT_FAILURE);
}
/* load in static memory buffer if enabled */
#ifdef WOLFSSL_STATIC_MEMORY
if (wolfSSL_CTX_load_static_memory(&cipherSuiteCtx, NULL,
memory, sizeof(memory), 0, 1)
2018-02-19 12:29:49 +01:00
!= WOLFSSL_SUCCESS) {
2017-05-11 14:01:41 +02:00
printf("unable to load static memory and create ctx");
2018-02-19 12:29:49 +01:00
args.return_code = EXIT_FAILURE;
goto exit;
2017-05-11 14:01:41 +02:00
}
#endif
2018-02-19 12:29:49 +01:00
#ifdef WOLFSSL_ASYNC_CRYPT
if (wolfAsync_DevOpen(&devId) < 0) {
printf("Async device open failed");
args.return_code = EXIT_FAILURE;
goto exit;
}
wolfSSL_CTX_UseAsync(cipherSuiteCtx, devId);
#endif /* WOLFSSL_ASYNC_CRYPT */
2017-05-11 14:01:41 +02:00
/* default case */
args.argc = 1;
printf("starting default cipher suite tests\n");
test_harness(&args);
if (args.return_code != 0) {
printf("error from script %d\n", args.return_code);
2018-02-19 12:29:49 +01:00
args.return_code = EXIT_FAILURE;
goto exit;
2017-05-11 14:01:41 +02:00
}
/* any extra cases will need another argument */
args.argc = 2;
2018-02-19 12:29:49 +01:00
#ifdef WOLFSSL_TLS13
/* add TLSv13 extra suites */
strcpy(argv0[1], "tests/test-tls13.conf");
printf("starting TLSv13 extra cipher suite tests\n");
test_harness(&args);
if (args.return_code != 0) {
printf("error from script %d\n", args.return_code);
exit(EXIT_FAILURE);
}
#ifdef HAVE_ECC
/* add TLSv13 ECC extra suites */
strcpy(argv0[1], "tests/test-tls13-ecc.conf");
printf("starting TLSv13 ECC extra cipher suite tests\n");
test_harness(&args);
if (args.return_code != 0) {
printf("error from script %d\n", args.return_code);
exit(EXIT_FAILURE);
}
#endif
#endif
#if defined(HAVE_CURVE25519) && defined(HAVE_ED25519)
/* add ED25519 certificate cipher suite tests */
strcpy(argv0[1], "tests/test-ed25519.conf");
printf("starting ED25519 extra cipher suite tests\n");
test_harness(&args);
if (args.return_code != 0) {
printf("error from script %d\n", args.return_code);
exit(EXIT_FAILURE);
}
#endif
2017-05-11 14:01:41 +02:00
#ifdef WOLFSSL_DTLS
/* add dtls extra suites */
strcpy(argv0[1], "tests/test-dtls.conf");
printf("starting dtls extra cipher suite tests\n");
test_harness(&args);
if (args.return_code != 0) {
printf("error from script %d\n", args.return_code);
2018-02-19 12:29:49 +01:00
args.return_code = EXIT_FAILURE;
goto exit;
2017-05-11 14:01:41 +02:00
}
#endif
#ifdef WOLFSSL_SCTP
/* add dtls-sctp extra suites */
strcpy(argv0[1], "tests/test-sctp.conf");
printf("starting dtls-sctp extra cipher suite tests\n");
test_harness(&args);
if (args.return_code != 0) {
printf("error from script %d\n", args.return_code);
2018-02-19 12:29:49 +01:00
args.return_code = EXIT_FAILURE;
goto exit;
2017-05-11 14:01:41 +02:00
}
#endif
#ifndef WC_STRICT_SIG
#if !defined(NO_RSA) && defined(HAVE_ECC) /* testing mixed ECC/RSA cert */
/* add extra signature test suites */
strcpy(argv0[1], "tests/test-sig.conf");
printf("starting sig extra cipher suite tests\n");
test_harness(&args);
if (args.return_code != 0) {
printf("error from script %d\n", args.return_code);
2018-02-19 12:29:49 +01:00
args.return_code = EXIT_FAILURE;
goto exit;
2017-05-11 14:01:41 +02:00
}
#endif /* HAVE_RSA and HAVE_ECC */
#endif /* !WC_STRICT_SIG */
#ifdef HAVE_QSH
/* add QSH extra suites */
strcpy(argv0[1], "tests/test-qsh.conf");
printf("starting qsh extra cipher suite tests\n");
test_harness(&args);
if (args.return_code != 0) {
printf("error from script %d\n", args.return_code);
2018-02-19 12:29:49 +01:00
args.return_code = EXIT_FAILURE;
goto exit;
2017-05-11 14:01:41 +02:00
}
#endif
#ifndef NO_PSK
/* add psk extra suites */
strcpy(argv0[1], "tests/test-psk-no-id.conf");
printf("starting psk no identity extra cipher suite tests\n");
test_harness(&args);
if (args.return_code != 0) {
printf("error from script %d\n", args.return_code);
2018-02-19 12:29:49 +01:00
args.return_code = EXIT_FAILURE;
goto exit;
2017-05-11 14:01:41 +02:00
}
#endif
2018-02-19 12:29:49 +01:00
exit:
2017-05-11 14:01:41 +02:00
printf(" End Cipher Suite Tests\n");
wolfSSL_CTX_free(cipherSuiteCtx);
wolfSSL_Cleanup();
2018-02-19 12:29:49 +01:00
#ifdef WOLFSSL_ASYNC_CRYPT
wolfAsync_DevClose(&devId);
#endif
2017-05-11 14:01:41 +02:00
return args.return_code;
2018-02-19 12:29:49 +01:00
#else
return NOT_COMPILED_IN;
#endif /* !NO_WOLFSSL_SERVER && !NO_WOLFSSL_CLIENT */
2017-05-11 14:01:41 +02:00
}