mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2024-11-29 18:04:21 +01:00
App data with 1/n-1 splitting in test suite
Counting of the fragments has been shifted from the writing section to the reading. This is more reliable because one reading is made for one fragment and during one write the library can internally divide data into two fragments Signed-off-by: Piotr Nowicki <piotr.nowicki@arm.com>
This commit is contained in:
parent
c31f970a46
commit
438bf3b667
@ -199,12 +199,10 @@ move_handshake_to_state:MBEDTLS_SSL_IS_CLIENT:MBEDTLS_SSL_SERVER_HELLO_VERIFY_RE
|
|||||||
Negative test moving servers ssl to state: NEW_SESSION_TICKET
|
Negative test moving servers ssl to state: NEW_SESSION_TICKET
|
||||||
move_handshake_to_state:MBEDTLS_SSL_IS_SERVER:MBEDTLS_SSL_SERVER_NEW_SESSION_TICKET:0
|
move_handshake_to_state:MBEDTLS_SSL_IS_SERVER:MBEDTLS_SSL_SERVER_NEW_SESSION_TICKET:0
|
||||||
|
|
||||||
# Note - the case below will have to updated, since the test sends no data due to a 1n-1 split against BEAST, that was not expected when preparing the fragment counting code.
|
|
||||||
Handshake, SSL3
|
Handshake, SSL3
|
||||||
depends_on:MBEDTLS_SSL_PROTO_SSL3:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED
|
depends_on:MBEDTLS_SSL_PROTO_SSL3:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED
|
||||||
handshake_version:MBEDTLS_SSL_MINOR_VERSION_0:0
|
handshake_version:MBEDTLS_SSL_MINOR_VERSION_0:0
|
||||||
|
|
||||||
# Note - the case below will have to updated, since the test sends no data due to a 1n-1 split against BEAST, that was not expected when preparing the fragment counting code.
|
|
||||||
Handshake, tls1
|
Handshake, tls1
|
||||||
depends_on:MBEDTLS_SSL_PROTO_TLS1:MBEDTLS_CIPHER_MODE_CBC
|
depends_on:MBEDTLS_SSL_PROTO_TLS1:MBEDTLS_CIPHER_MODE_CBC
|
||||||
handshake_version:MBEDTLS_SSL_MINOR_VERSION_1:0
|
handshake_version:MBEDTLS_SSL_MINOR_VERSION_1:0
|
||||||
|
@ -13,7 +13,8 @@ typedef struct log_pattern
|
|||||||
size_t counter;
|
size_t counter;
|
||||||
} log_pattern;
|
} log_pattern;
|
||||||
|
|
||||||
/* This function can be passed to mbedtls to receive output logs from it. In
|
/*
|
||||||
|
* This function can be passed to mbedtls to receive output logs from it. In
|
||||||
* this case, it will count the instances of a log_pattern in the received
|
* this case, it will count the instances of a log_pattern in the received
|
||||||
* logged messages.
|
* logged messages.
|
||||||
*/
|
*/
|
||||||
@ -1009,17 +1010,15 @@ int mbedtls_move_handshake_to_state( mbedtls_ssl_context *ssl,
|
|||||||
#endif /* MBEDTLS_X509_CRT_PARSE_C */
|
#endif /* MBEDTLS_X509_CRT_PARSE_C */
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Write application data. Increase write counter and fragments counter if
|
* Write application data. Increase write counter if necessary.
|
||||||
* necessary.
|
|
||||||
*/
|
*/
|
||||||
int mbedtls_ssl_write_fragment( mbedtls_ssl_context *ssl, unsigned char *buf,
|
int mbedtls_ssl_write_fragment( mbedtls_ssl_context *ssl, unsigned char *buf,
|
||||||
int buf_len, int *written,
|
int buf_len, int *written,
|
||||||
int *fragments, const int expected_fragments )
|
const int expected_fragments )
|
||||||
{
|
{
|
||||||
int ret = mbedtls_ssl_write( ssl, buf + *written, buf_len - *written );
|
int ret = mbedtls_ssl_write( ssl, buf + *written, buf_len - *written );
|
||||||
if( ret > 0 )
|
if( ret > 0 )
|
||||||
{
|
{
|
||||||
(*fragments)++;
|
|
||||||
*written += ret;
|
*written += ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -1055,15 +1054,16 @@ exit:
|
|||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Read application data and increase read counter if necessary.
|
* Read application data and increase read counter and fragments counter if necessary.
|
||||||
*/
|
*/
|
||||||
int mbedtls_ssl_read_fragment( mbedtls_ssl_context *ssl, unsigned char *buf,
|
int mbedtls_ssl_read_fragment( mbedtls_ssl_context *ssl, unsigned char *buf,
|
||||||
int buf_len, int *read,
|
int buf_len, int *read,
|
||||||
const int expected_fragments )
|
int *fragments, const int expected_fragments )
|
||||||
{
|
{
|
||||||
int ret = mbedtls_ssl_read( ssl, buf + *read, buf_len - *read );
|
int ret = mbedtls_ssl_read( ssl, buf + *read, buf_len - *read );
|
||||||
if( ret > 0 )
|
if( ret > 0 )
|
||||||
{
|
{
|
||||||
|
( *fragments )++;
|
||||||
*read += ret;
|
*read += ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -1552,7 +1552,6 @@ int mbedtls_exchange_data( mbedtls_ssl_context *ssl_1,
|
|||||||
{
|
{
|
||||||
ret = mbedtls_ssl_write_fragment( ssl_1, msg_buf_1,
|
ret = mbedtls_ssl_write_fragment( ssl_1, msg_buf_1,
|
||||||
msg_len_1, &written_1,
|
msg_len_1, &written_1,
|
||||||
&fragments_1,
|
|
||||||
expected_fragments_1 );
|
expected_fragments_1 );
|
||||||
if( expected_fragments_1 == 0 )
|
if( expected_fragments_1 == 0 )
|
||||||
{
|
{
|
||||||
@ -1572,7 +1571,6 @@ int mbedtls_exchange_data( mbedtls_ssl_context *ssl_1,
|
|||||||
{
|
{
|
||||||
ret = mbedtls_ssl_write_fragment( ssl_2, msg_buf_2,
|
ret = mbedtls_ssl_write_fragment( ssl_2, msg_buf_2,
|
||||||
msg_len_2, &written_2,
|
msg_len_2, &written_2,
|
||||||
&fragments_2,
|
|
||||||
expected_fragments_2 );
|
expected_fragments_2 );
|
||||||
if( expected_fragments_2 == 0 )
|
if( expected_fragments_2 == 0 )
|
||||||
{
|
{
|
||||||
@ -1592,7 +1590,8 @@ int mbedtls_exchange_data( mbedtls_ssl_context *ssl_1,
|
|||||||
{
|
{
|
||||||
ret = mbedtls_ssl_read_fragment( ssl_1, in_buf_1,
|
ret = mbedtls_ssl_read_fragment( ssl_1, in_buf_1,
|
||||||
msg_len_2, &read_1,
|
msg_len_2, &read_1,
|
||||||
expected_fragments_1 );
|
&fragments_2,
|
||||||
|
expected_fragments_2 );
|
||||||
TEST_ASSERT( ret == 0 );
|
TEST_ASSERT( ret == 0 );
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -1601,7 +1600,8 @@ int mbedtls_exchange_data( mbedtls_ssl_context *ssl_1,
|
|||||||
{
|
{
|
||||||
ret = mbedtls_ssl_read_fragment( ssl_2, in_buf_2,
|
ret = mbedtls_ssl_read_fragment( ssl_2, in_buf_2,
|
||||||
msg_len_1, &read_2,
|
msg_len_1, &read_2,
|
||||||
expected_fragments_2 );
|
&fragments_1,
|
||||||
|
expected_fragments_1 );
|
||||||
TEST_ASSERT( ret == 0 );
|
TEST_ASSERT( ret == 0 );
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -1799,9 +1799,6 @@ void perform_handshake( handshake_test_options* options )
|
|||||||
#if defined(MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH)
|
#if defined(MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH)
|
||||||
if( options->resize_buffers != 0 )
|
if( options->resize_buffers != 0 )
|
||||||
{
|
{
|
||||||
/* Note - the case below will have to updated, since due to a 1n-1
|
|
||||||
* split against BEAST the fragment count is different
|
|
||||||
* than expected when preparing the fragment counting code. */
|
|
||||||
if( options->version != MBEDTLS_SSL_MINOR_VERSION_0 &&
|
if( options->version != MBEDTLS_SSL_MINOR_VERSION_0 &&
|
||||||
options->version != MBEDTLS_SSL_MINOR_VERSION_1 )
|
options->version != MBEDTLS_SSL_MINOR_VERSION_1 )
|
||||||
{
|
{
|
||||||
@ -3747,14 +3744,13 @@ void handshake_version( int version, int dtls )
|
|||||||
|
|
||||||
options.version = version;
|
options.version = version;
|
||||||
options.dtls = dtls;
|
options.dtls = dtls;
|
||||||
/* Note - the case below will have to updated, since the test sends no data
|
/* By default, SSLv3.0 and TLSv1.0 use 1/n-1 splitting when sending data, so
|
||||||
* due to a 1n-1 split against BEAST, that was not expected when preparing
|
* the number of fragments will be twice as big. */
|
||||||
* the fragment counting code. */
|
|
||||||
if( version == MBEDTLS_SSL_MINOR_VERSION_0 ||
|
if( version == MBEDTLS_SSL_MINOR_VERSION_0 ||
|
||||||
version == MBEDTLS_SSL_MINOR_VERSION_1 )
|
version == MBEDTLS_SSL_MINOR_VERSION_1 )
|
||||||
{
|
{
|
||||||
options.cli_msg_len = 0;
|
options.expected_cli_fragments = 2;
|
||||||
options.srv_msg_len = 0;
|
options.expected_srv_fragments = 2;
|
||||||
}
|
}
|
||||||
perform_handshake( &options );
|
perform_handshake( &options );
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user