BEGIN_HEADER #include #include #include int verify_none( void *data, x509_cert *crt, int certificate_depth, int *flags ) { ((void) data); ((void) crt); ((void) certificate_depth); *flags |= BADCERT_OTHER; return 0; } int verify_all( void *data, x509_cert *crt, int certificate_depth, int *flags ) { ((void) data); ((void) crt); ((void) certificate_depth); *flags = 0; return 0; } END_HEADER BEGIN_DEPENDENCIES depends_on:POLARSSL_X509_PARSE_C:POLARSSL_BIGNUM_C END_DEPENDENCIES BEGIN_CASE x509_cert_info:crt_file:result_str { x509_cert crt; char buf[2000]; int res; memset( &crt, 0, sizeof( x509_cert ) ); memset( buf, 0, 2000 ); TEST_ASSERT( x509parse_crtfile( &crt, {crt_file} ) == 0 ); res = x509parse_cert_info( buf, 2000, "", &crt ); x509_free( &crt ); TEST_ASSERT( res != -1 ); TEST_ASSERT( res != -2 ); TEST_ASSERT( strcmp( buf, {result_str} ) == 0 ); } END_CASE BEGIN_CASE x509_crl_info:crl_file:result_str { x509_crl crl; char buf[2000]; int res; memset( &crl, 0, sizeof( x509_crl ) ); memset( buf, 0, 2000 ); TEST_ASSERT( x509parse_crlfile( &crl, {crl_file} ) == 0 ); res = x509parse_crl_info( buf, 2000, "", &crl ); x509_crl_free( &crl ); TEST_ASSERT( res != -1 ); TEST_ASSERT( res != -2 ); TEST_ASSERT( strcmp( buf, {result_str} ) == 0 ); } END_CASE BEGIN_CASE x509_verify:crt_file:ca_file:crl_file:cn_name:result:flags:verify_callback { x509_cert crt; x509_cert ca; x509_crl crl; int flags = 0; int res; memset( &crt, 0, sizeof( x509_cert ) ); memset( &ca, 0, sizeof( x509_cert ) ); memset( &crl, 0, sizeof( x509_crl ) ); TEST_ASSERT( x509parse_crtfile( &crt, {crt_file} ) == 0 ); TEST_ASSERT( x509parse_crtfile( &ca, {ca_file} ) == 0 ); TEST_ASSERT( x509parse_crlfile( &crl, {crl_file} ) == 0 ); res = x509parse_verify( &crt, &ca, &crl, {cn_name}, &flags, {verify_callback}, NULL ); x509_free( &crt ); x509_free( &ca ); x509_crl_free( &crl ); TEST_ASSERT( res == ( {result} ) ); TEST_ASSERT( flags == ( {flags} ) ); } END_CASE BEGIN_CASE x509_dn_gets:crt_file:entity:result_str { x509_cert crt; char buf[2000]; int res; memset( &crt, 0, sizeof( x509_cert ) ); memset( buf, 0, 2000 ); TEST_ASSERT( x509parse_crtfile( &crt, {crt_file} ) == 0 ); res = x509parse_dn_gets( buf, 2000, &crt.{entity} ); x509_free( &crt ); TEST_ASSERT( res != -1 ); TEST_ASSERT( res != -2 ); TEST_ASSERT( strcmp( buf, {result_str} ) == 0 ); } END_CASE BEGIN_CASE x509_time_expired:crt_file:entity:result { x509_cert crt; memset( &crt, 0, sizeof( x509_cert ) ); TEST_ASSERT( x509parse_crtfile( &crt, {crt_file} ) == 0 ); TEST_ASSERT( x509parse_time_expired( &crt.{entity} ) == {result} ); x509_free( &crt ); } END_CASE BEGIN_CASE x509parse_keyfile_rsa:key_file:password:result { rsa_context rsa; int res; memset( &rsa, 0, sizeof( rsa_context ) ); res = x509parse_keyfile_rsa( &rsa, {key_file}, {password} ); TEST_ASSERT( res == {result} ); if( res == 0 ) { TEST_ASSERT( rsa_check_privkey( &rsa ) == 0 ); } rsa_free( &rsa ); } END_CASE BEGIN_CASE x509parse_public_keyfile_rsa:key_file:result { rsa_context rsa; int res; memset( &rsa, 0, sizeof( rsa_context ) ); res = x509parse_public_keyfile_rsa( &rsa, {key_file} ); TEST_ASSERT( res == {result} ); if( res == 0 ) { TEST_ASSERT( rsa_check_pubkey( &rsa ) == 0 ); } rsa_free( &rsa ); } END_CASE BEGIN_CASE x509parse_public_keyfile_ec:key_file:result { ecp_keypair eckey; int res; ecp_keypair_init( &eckey ); res = x509parse_public_keyfile_ec( &eckey, {key_file} ); TEST_ASSERT( res == {result} ); if( res == 0 ) { TEST_ASSERT( ecp_check_pubkey( &eckey.grp, &eckey.Q ) == 0 ); } ecp_keypair_free( &eckey ); } END_CASE BEGIN_CASE x509parse_keyfile_ec:key_file:password:result { ecp_keypair eckey; int res; ecp_keypair_init( &eckey ); res = x509parse_keyfile_ec( &eckey, {key_file}, {password} ); TEST_ASSERT( res == {result} ); if( res == 0 ) { TEST_ASSERT( ecp_check_prvkey( &eckey.grp, &eckey.d ) == 0 ); } ecp_keypair_free( &eckey ); } END_CASE BEGIN_CASE x509parse_crt:crt_data:result_str:result { x509_cert crt; unsigned char buf[2000]; unsigned char output[2000]; int data_len, res; memset( &crt, 0, sizeof( x509_cert ) ); memset( buf, 0, 2000 ); memset( output, 0, 2000 ); data_len = unhexify( buf, {crt_data} ); TEST_ASSERT( x509parse_crt( &crt, buf, data_len ) == ( {result} ) ); if( ( {result} ) == 0 ) { res = x509parse_cert_info( (char *) output, 2000, "", &crt ); TEST_ASSERT( res != -1 ); TEST_ASSERT( res != -2 ); TEST_ASSERT( strcmp( (char *) output, {result_str} ) == 0 ); } x509_free( &crt ); } END_CASE BEGIN_CASE x509parse_crl:crl_data:result_str:result { x509_crl crl; unsigned char buf[2000]; unsigned char output[2000]; int data_len, res; memset( &crl, 0, sizeof( x509_crl ) ); memset( buf, 0, 2000 ); memset( output, 0, 2000 ); data_len = unhexify( buf, {crl_data} ); TEST_ASSERT( x509parse_crl( &crl, buf, data_len ) == ( {result} ) ); if( ( {result} ) == 0 ) { res = x509parse_crl_info( (char *) output, 2000, "", &crl ); TEST_ASSERT( res != -1 ); TEST_ASSERT( res != -2 ); TEST_ASSERT( strcmp( (char *) output, {result_str} ) == 0 ); } x509_crl_free( &crl ); } END_CASE BEGIN_CASE x509parse_key_rsa:key_data:result_str:result { rsa_context rsa; unsigned char buf[2000]; unsigned char output[2000]; int data_len; memset( &rsa, 0, sizeof( rsa_context ) ); memset( buf, 0, 2000 ); memset( output, 0, 2000 ); data_len = unhexify( buf, {key_data} ); TEST_ASSERT( x509parse_key_rsa( &rsa, buf, data_len, NULL, 0 ) == ( {result} ) ); if( ( {result} ) == 0 ) { TEST_ASSERT( 1 ); } rsa_free( &rsa ); } END_CASE BEGIN_CASE x509_selftest: { TEST_ASSERT( x509_self_test( 0 ) == 0 ); } END_CASE