testsuite.c 23 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887
  1. /* testsuite.c
  2. *
  3. * Copyright (C) 2006-2023 wolfSSL Inc.
  4. *
  5. * This file is part of wolfSSL.
  6. *
  7. * wolfSSL is free software; you can redistribute it and/or modify
  8. * it under the terms of the GNU General Public License as published by
  9. * the Free Software Foundation; either version 2 of the License, or
  10. * (at your option) any later version.
  11. *
  12. * wolfSSL is distributed in the hope that it will be useful,
  13. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  14. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  15. * GNU General Public License for more details.
  16. *
  17. * You should have received a copy of the GNU General Public License
  18. * along with this program; if not, write to the Free Software
  19. * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
  20. */
  21. #ifdef HAVE_CONFIG_H
  22. #include <config.h>
  23. #endif
  24. #include <wolfssl/wolfcrypt/settings.h>
  25. #include <wolfssl/wolfcrypt/types.h>
  26. #include <wolfssl/ssl.h>
  27. #include <wolfssl/test.h>
  28. #include <wolfcrypt/test/test.h>
  29. #ifndef SINGLE_THREADED
  30. #ifdef OPENSSL_EXTRA
  31. #include <wolfssl/openssl/ssl.h>
  32. #endif
  33. #include <wolfssl/wolfcrypt/sha256.h>
  34. #include <wolfssl/wolfcrypt/ecc.h>
  35. #include <examples/echoclient/echoclient.h>
  36. #include <examples/echoserver/echoserver.h>
  37. #include <examples/server/server.h>
  38. #include <examples/client/client.h>
  39. #ifndef NO_SHA256
  40. void file_test(const char* file, byte* check);
  41. #endif
  42. #if !defined(NO_WOLFSSL_SERVER) && !defined(NO_WOLFSSL_CLIENT)
  43. #ifdef HAVE_STACK_SIZE
  44. static THREAD_RETURN simple_test(func_args *args);
  45. #else
  46. static void simple_test(func_args *args);
  47. #endif
  48. static int test_tls(func_args* server_args);
  49. #if !defined(NO_WOLFSSL_SERVER) && !defined(NO_WOLFSSL_CLIENT) && \
  50. defined(HAVE_CRL) && defined(HAVE_CRL_MONITOR)
  51. static int test_crl_monitor(void);
  52. #endif
  53. static void show_ciphers(void);
  54. static void cleanup_output(void);
  55. static int validate_cleanup_output(void);
  56. enum {
  57. NUMARGS = 3
  58. };
  59. static const char *outputName;
  60. #endif
  61. int myoptind = 0;
  62. char* myoptarg = NULL;
  63. #ifndef NO_TESTSUITE_MAIN_DRIVER
  64. static int testsuite_test(int argc, char** argv);
  65. int main(int argc, char** argv)
  66. {
  67. return testsuite_test(argc, argv);
  68. }
  69. #endif /* NO_TESTSUITE_MAIN_DRIVER */
  70. #ifdef HAVE_STACK_SIZE
  71. /* Wrap TLS echo client to free thread locals. */
  72. static void *echoclient_test_wrapper(void* args) {
  73. echoclient_test(args);
  74. #if defined(HAVE_ECC) && defined(FP_ECC) && defined(HAVE_THREAD_LS)
  75. wc_ecc_fp_free(); /* free per thread cache */
  76. #endif
  77. return (void *)0;
  78. }
  79. #endif
  80. int testsuite_test(int argc, char** argv)
  81. {
  82. #if !defined(NO_WOLFSSL_SERVER) && !defined(NO_WOLFSSL_CLIENT) && \
  83. (!defined(WOLF_CRYPTO_CB_ONLY_RSA) && !defined(WOLF_CRYPTO_CB_ONLY_ECC))
  84. func_args server_args;
  85. tcp_ready ready;
  86. #if !defined(NETOS)
  87. THREAD_TYPE serverThread;
  88. int ret;
  89. #endif
  90. #ifndef USE_WINDOWS_API
  91. const char *tempDir = NULL;
  92. char tempName[128];
  93. int tempName_len;
  94. int tempName_Xnum;
  95. #else
  96. char tempName[] = "fnXXXXXX";
  97. const int tempName_len = 8;
  98. const int tempName_Xnum = 6;
  99. #endif
  100. #ifdef HAVE_STACK_SIZE
  101. void *serverThreadStackContext = NULL;
  102. #endif
  103. #ifndef USE_WINDOWS_API
  104. #ifdef XGETENV
  105. tempDir = XGETENV("TMPDIR");
  106. if (tempDir == NULL)
  107. #endif
  108. {
  109. tempDir = "/tmp";
  110. }
  111. XSTRLCPY(tempName, tempDir, sizeof(tempName));
  112. XSTRLCAT(tempName, "/testsuite-output-XXXXXX", sizeof(tempName));
  113. tempName_len = (int)XSTRLEN(tempName);
  114. tempName_Xnum = 6;
  115. #endif /* !USE_WINDOWS_API */
  116. #ifdef HAVE_WNR
  117. if (wc_InitNetRandom(wnrConfig, NULL, 5000) != 0) {
  118. err_sys("Whitewood netRandom global config failed");
  119. return -1237;
  120. }
  121. #endif /* HAVE_WNR */
  122. StartTCP();
  123. server_args.argc = argc;
  124. server_args.argv = argv;
  125. wolfSSL_Init();
  126. #if defined(DEBUG_WOLFSSL) && !defined(HAVE_VALGRIND)
  127. wolfSSL_Debugging_ON();
  128. #endif
  129. #if !defined(WOLFSSL_TIRTOS)
  130. ChangeToWolfRoot();
  131. #endif
  132. #ifdef WOLFSSL_TIRTOS
  133. fdOpenSession(Task_self());
  134. #endif
  135. server_args.signal = &ready;
  136. InitTcpReady(&ready);
  137. #ifndef NO_CRYPT_TEST
  138. /* wc_ test */
  139. #ifdef HAVE_STACK_SIZE
  140. StackSizeCheck(&server_args, wolfcrypt_test);
  141. #else
  142. wolfcrypt_test(&server_args);
  143. #endif
  144. if (server_args.return_code != 0) return server_args.return_code;
  145. #endif
  146. /* Simple wolfSSL client server test */
  147. #ifdef HAVE_STACK_SIZE
  148. StackSizeCheck(&server_args, (THREAD_RETURN (*)(void *))simple_test);
  149. #else
  150. simple_test(&server_args);
  151. #endif
  152. if (server_args.return_code != 0) return server_args.return_code;
  153. #if !defined(NETOS)
  154. /* Echo input wolfSSL client server test */
  155. #ifdef HAVE_STACK_SIZE
  156. StackSizeCheck_launch(&server_args, echoserver_test, &serverThread,
  157. &serverThreadStackContext);
  158. #else
  159. start_thread(echoserver_test, &server_args, &serverThread);
  160. #endif
  161. /* Create unique file name */
  162. outputName = mymktemp(tempName, tempName_len, tempName_Xnum);
  163. if (outputName == NULL) {
  164. printf("Could not create unique file name");
  165. return EXIT_FAILURE;
  166. }
  167. ret = test_tls(&server_args);
  168. if (ret != 0) {
  169. cleanup_output();
  170. return ret;
  171. }
  172. /* Server won't quit unless TLS test has worked. */
  173. #ifdef HAVE_STACK_SIZE
  174. fputs("reaping echoserver_test: ", stdout);
  175. StackSizeCheck_reap(serverThread, serverThreadStackContext);
  176. #else
  177. join_thread(serverThread);
  178. #endif
  179. if (server_args.return_code != 0) {
  180. cleanup_output();
  181. return server_args.return_code;
  182. }
  183. #if !defined(NO_WOLFSSL_SERVER) && !defined(NO_WOLFSSL_CLIENT) && \
  184. defined(HAVE_CRL) && defined(HAVE_CRL_MONITOR)
  185. ret = test_crl_monitor();
  186. if (ret != 0) {
  187. cleanup_output();
  188. return ret;
  189. }
  190. #endif
  191. #endif /* !NETOS */
  192. show_ciphers();
  193. #if !defined(NETOS)
  194. ret = validate_cleanup_output();
  195. if (ret != 0)
  196. return EXIT_FAILURE;
  197. #endif
  198. wolfSSL_Cleanup();
  199. FreeTcpReady(&ready);
  200. #ifdef WOLFSSL_TIRTOS
  201. fdCloseSession(Task_self());
  202. #endif
  203. #ifdef HAVE_WNR
  204. if (wc_FreeNetRandom() < 0)
  205. err_sys("Failed to free netRandom context");
  206. #endif /* HAVE_WNR */
  207. printf("\nAll tests passed!\n");
  208. #else
  209. (void)argc;
  210. (void)argv;
  211. #endif /* !NO_WOLFSSL_SERVER && !NO_WOLFSSL_CLIENT */
  212. return EXIT_SUCCESS;
  213. }
  214. #if !defined(NO_WOLFSSL_SERVER) && !defined(NO_WOLFSSL_CLIENT) && \
  215. defined(HAVE_CRL) && defined(HAVE_CRL_MONITOR)
  216. #define CRL_MONITOR_TEST_ROUNDS 6
  217. #define CRL_MONITOR_REM_FILE_ATTEMPTS 20
  218. static int test_crl_monitor(void)
  219. {
  220. func_args server_args;
  221. func_args client_args;
  222. THREAD_TYPE serverThread;
  223. tcp_ready ready;
  224. char buf[128];
  225. char tmpDir[16];
  226. char rounds[4];
  227. const char* serverArgv[] = {
  228. "testsuite",
  229. "-A", "certs/ca-cert.pem",
  230. "--crl-dir", tmpDir,
  231. "-C", rounds,
  232. "--quieter",
  233. "-x"
  234. };
  235. const char* clientArgv[] = {
  236. "testsuite",
  237. "-C",
  238. "-c", "certs/server-cert.pem",
  239. "-k", "certs/server-key.pem",
  240. "--quieter",
  241. "-H", "exitWithRet"
  242. };
  243. int ret = -1;
  244. int i = -1, j;
  245. printf("\nRunning CRL monitor test\n");
  246. sprintf(rounds, "%d", CRL_MONITOR_TEST_ROUNDS);
  247. XMEMSET(&server_args, 0, sizeof(func_args));
  248. XMEMSET(&client_args, 0, sizeof(func_args));
  249. /* Create temp dir */
  250. if (create_tmp_dir(tmpDir, sizeof(tmpDir) - 1) == NULL) {
  251. fprintf(stderr, "Failed to create tmp dir");
  252. goto cleanup;
  253. }
  254. server_args.argv = (char**)serverArgv;
  255. server_args.argc = sizeof(serverArgv) / sizeof(*serverArgv);
  256. client_args.signal = server_args.signal = &ready;
  257. client_args.argv = (char**)clientArgv;
  258. client_args.argc = sizeof(clientArgv) / sizeof(*clientArgv);
  259. InitTcpReady(&ready);
  260. start_thread(server_test, &server_args, &serverThread);
  261. wait_tcp_ready(&server_args);
  262. for (i = 0; i < CRL_MONITOR_TEST_ROUNDS; i++) {
  263. int expectFail;
  264. if (i % 2 == 0) {
  265. /* succeed on even rounds */
  266. sprintf(buf, "%s/%s", tmpDir, "crl.pem");
  267. if (copy_file("certs/crl/crl.pem", buf) != 0) {
  268. fprintf(stderr, "[%d] Failed to copy file to %s\n", i, buf);
  269. goto cleanup;
  270. }
  271. sprintf(buf, "%s/%s", tmpDir, "crl.revoked");
  272. /* The monitor can be holding the file handle and this will cause
  273. * the remove call to fail. Let's give the monitor a some time to
  274. * finish up. */
  275. for (j = 0; j < CRL_MONITOR_REM_FILE_ATTEMPTS; j++) {
  276. /* i == 0 since there is nothing to delete in the first round */
  277. if (i == 0 || rem_file(buf) == 0)
  278. break;
  279. XSLEEP_MS(100);
  280. }
  281. if (j == CRL_MONITOR_REM_FILE_ATTEMPTS) {
  282. fprintf(stderr, "[%d] Failed to remove file %s\n", i, buf);
  283. goto cleanup;
  284. }
  285. expectFail = 0;
  286. }
  287. else {
  288. /* fail on odd rounds */
  289. sprintf(buf, "%s/%s", tmpDir, "crl.revoked");
  290. if (copy_file("certs/crl/crl.revoked", buf) != 0) {
  291. fprintf(stderr, "[%d] Failed to copy file to %s\n", i, buf);
  292. goto cleanup;
  293. }
  294. sprintf(buf, "%s/%s", tmpDir, "crl.pem");
  295. /* The monitor can be holding the file handle and this will cause
  296. * the remove call to fail. Let's give the monitor a some time to
  297. * finish up. */
  298. for (j = 0; j < CRL_MONITOR_REM_FILE_ATTEMPTS; j++) {
  299. if (rem_file(buf) == 0)
  300. break;
  301. XSLEEP_MS(100);
  302. }
  303. if (j == CRL_MONITOR_REM_FILE_ATTEMPTS) {
  304. fprintf(stderr, "[%d] Failed to remove file %s\n", i, buf);
  305. goto cleanup;
  306. }
  307. expectFail = 1;
  308. }
  309. /* Give server a moment to register the file change */
  310. XSLEEP_MS(100);
  311. client_args.return_code = 0;
  312. client_test(&client_args);
  313. if (!expectFail) {
  314. if (client_args.return_code != 0) {
  315. fprintf(stderr, "[%d] Incorrect return %d\n", i,
  316. client_args.return_code);
  317. goto cleanup;
  318. }
  319. }
  320. else {
  321. if (client_args.return_code == 0) {
  322. fprintf(stderr, "[%d] Expected failure\n", i);
  323. goto cleanup;
  324. }
  325. }
  326. }
  327. join_thread(serverThread);
  328. ret = 0;
  329. cleanup:
  330. if (ret != 0 && i >= 0)
  331. fprintf(stderr, "test_crl_monitor failed on iteration %d\n", i);
  332. sprintf(buf, "%s/%s", tmpDir, "crl.pem");
  333. rem_file(buf);
  334. sprintf(buf, "%s/%s", tmpDir, "crl.revoked");
  335. rem_file(buf);
  336. (void)rem_dir(tmpDir);
  337. return ret;
  338. }
  339. #endif
  340. #if !defined(NO_WOLFSSL_SERVER) && !defined(NO_WOLFSSL_CLIENT) && \
  341. (!defined(WOLF_CRYPTO_CB_ONLY_RSA) && !defined(WOLF_CRYPTO_CB_ONLY_ECC))
  342. /* Perform a basic TLS handshake.
  343. *
  344. * First connection to echo a file.
  345. * Second to tell TLS server to quit.
  346. *
  347. * @param [in,out] server_args Object sent to server thread.
  348. * @return 0 on success.
  349. * @return echoclient error return code on failure.
  350. */
  351. static int test_tls(func_args* server_args)
  352. {
  353. func_args echo_args;
  354. char* myArgv[NUMARGS];
  355. char arg[3][128];
  356. printf("\nRunning TLS test\n");
  357. /* Set up command line arguments for echoclient to send input file
  358. * and write echoed data to temporary output file. */
  359. myArgv[0] = arg[0];
  360. myArgv[1] = arg[1];
  361. myArgv[2] = arg[2];
  362. echo_args.argc = 3;
  363. echo_args.argv = myArgv;
  364. XSTRLCPY(arg[0], "testsuite", sizeof(arg[0]));
  365. XSTRLCPY(arg[1], "input", sizeof(arg[1]));
  366. XSTRLCPY(arg[2], outputName, sizeof(arg[2]));
  367. /* Share the signal, it has the new port number in it. */
  368. echo_args.signal = server_args->signal;
  369. /* Ready to execute client - wait for server to be ready. */
  370. wait_tcp_ready(server_args);
  371. /* Do a client TLS connection. */
  372. #ifdef HAVE_STACK_SIZE
  373. fputs("echoclient_test #1: ", stdout);
  374. StackSizeCheck(&echo_args, echoclient_test_wrapper);
  375. #else
  376. echoclient_test(&echo_args);
  377. #endif
  378. if (echo_args.return_code != 0)
  379. return echo_args.return_code;
  380. #ifdef WOLFSSL_DTLS
  381. /* Ensure server is ready for UDP data. */
  382. wait_tcp_ready(server_args);
  383. #endif
  384. /* Next client connection - send quit to shutdown server. */
  385. echo_args.argc = 2;
  386. XSTRLCPY(arg[1], "quit", sizeof(arg[1]));
  387. /* Do a client TLS connection. */
  388. #ifdef HAVE_STACK_SIZE
  389. fputs("echoclient_test #2: ", stdout);
  390. StackSizeCheck(&echo_args, echoclient_test_wrapper);
  391. #else
  392. echoclient_test(&echo_args);
  393. #endif
  394. if (echo_args.return_code != 0)
  395. return echo_args.return_code;
  396. return 0;
  397. }
  398. /* Show cipher suites available. */
  399. static void show_ciphers(void)
  400. {
  401. char ciphers[WOLFSSL_CIPHER_LIST_MAX_SIZE];
  402. XMEMSET(ciphers, 0, sizeof(ciphers));
  403. wolfSSL_get_ciphers(ciphers, sizeof(ciphers)-1);
  404. printf("ciphers = %s\n", ciphers);
  405. }
  406. /* Cleanup temporary output file. */
  407. static void cleanup_output(void)
  408. {
  409. remove(outputName);
  410. }
  411. /* Validate output equals input using a hash. Remove temporary output file.
  412. *
  413. * @return 0 on success.
  414. * @return 1 on failure.
  415. */
  416. static int validate_cleanup_output(void)
  417. {
  418. #ifndef NO_SHA256
  419. byte input[WC_SHA256_DIGEST_SIZE];
  420. byte output[WC_SHA256_DIGEST_SIZE];
  421. file_test("input", input);
  422. file_test(outputName, output);
  423. #endif
  424. cleanup_output();
  425. #ifndef NO_SHA256
  426. if (memcmp(input, output, sizeof(input)) != 0)
  427. return 1;
  428. #endif
  429. return 0;
  430. }
  431. /* Simple server.
  432. *
  433. * @param [in] args Object for server data in thread.
  434. * @return Return code.
  435. */
  436. #ifdef HAVE_STACK_SIZE
  437. static THREAD_RETURN simple_test(func_args* args)
  438. #else
  439. static void simple_test(func_args* args)
  440. #endif
  441. {
  442. THREAD_TYPE serverThread;
  443. int i;
  444. func_args svrArgs;
  445. char *svrArgv[9];
  446. char argvs[9][32];
  447. func_args cliArgs;
  448. char *cliArgv[NUMARGS];
  449. char argvc[3][32];
  450. printf("\nRunning simple test\n");
  451. for (i = 0; i < 9; i++)
  452. svrArgv[i] = argvs[i];
  453. for (i = 0; i < 3; i++)
  454. cliArgv[i] = argvc[i];
  455. XSTRLCPY(argvs[0], "SimpleServer", sizeof(argvs[0]));
  456. svrArgs.argc = 1;
  457. svrArgs.argv = svrArgv;
  458. svrArgs.return_code = 0;
  459. #if !defined(USE_WINDOWS_API) && !defined(WOLFSSL_SNIFFER) && \
  460. !defined(WOLFSSL_TIRTOS)
  461. XSTRLCPY(argvs[svrArgs.argc++], "-p", sizeof(argvs[svrArgs.argc]));
  462. XSTRLCPY(argvs[svrArgs.argc++], "0", sizeof(argvs[svrArgs.argc]));
  463. #endif
  464. /* Set the last arg later, when it is known. */
  465. args->return_code = 0;
  466. svrArgs.signal = args->signal;
  467. start_thread(server_test, &svrArgs, &serverThread);
  468. wait_tcp_ready(&svrArgs);
  469. /* Setting the actual port number. */
  470. XSTRLCPY(argvc[0], "SimpleClient", sizeof(argvc[0]));
  471. cliArgs.argv = cliArgv;
  472. cliArgs.return_code = 0;
  473. #ifndef USE_WINDOWS_API
  474. cliArgs.argc = NUMARGS;
  475. XSTRLCPY(argvc[1], "-p", sizeof(argvc[1]));
  476. (void)snprintf(argvc[2], sizeof(argvc[2]), "%d", (int)svrArgs.signal->port);
  477. #else
  478. cliArgs.argc = 1;
  479. #endif
  480. client_test(&cliArgs);
  481. if (cliArgs.return_code != 0) {
  482. args->return_code = cliArgs.return_code;
  483. #ifdef HAVE_STACK_SIZE
  484. return (THREAD_RETURN)0;
  485. #else
  486. return;
  487. #endif
  488. }
  489. join_thread(serverThread);
  490. if (svrArgs.return_code != 0) args->return_code = svrArgs.return_code;
  491. #ifdef HAVE_STACK_SIZE
  492. return (THREAD_RETURN)0;
  493. #endif
  494. }
  495. #endif /* !NO_WOLFSSL_SERVER && !NO_WOLFSSL_CLIENT */
  496. /* Wait for the server to be ready for a connection.
  497. *
  498. * @param [in] args Object to send to thread.
  499. */
  500. void wait_tcp_ready(func_args* args)
  501. {
  502. #if defined(HAVE_PTHREAD)
  503. PTHREAD_CHECK_RET(pthread_mutex_lock(&args->signal->mutex));
  504. if (!args->signal->ready)
  505. PTHREAD_CHECK_RET(pthread_cond_wait(&args->signal->cond,
  506. &args->signal->mutex));
  507. args->signal->ready = 0; /* reset */
  508. PTHREAD_CHECK_RET(pthread_mutex_unlock(&args->signal->mutex));
  509. #elif defined(NETOS)
  510. (void)tx_mutex_get(&args->signal->mutex, TX_WAIT_FOREVER);
  511. /* TODO:
  512. * if (!args->signal->ready)
  513. * pthread_cond_wait(&args->signal->cond, &args->signal->mutex);
  514. * args->signal->ready = 0; */
  515. (void)tx_mutex_put(&args->signal->mutex);
  516. #elif defined(USE_WINDOWS_API)
  517. /* Give peer a moment to get running */
  518. #if defined(__MINGW32__) || defined(__MINGW64__)
  519. Sleep(500);
  520. #else
  521. _sleep(500);
  522. #endif
  523. (void)args;
  524. #else
  525. (void)args;
  526. #endif /* thread checks */
  527. }
  528. /* Start a thread.
  529. *
  530. * @param [in] fun Function to executre in thread.
  531. * @param [in] args Object to send to function in thread.
  532. * @param [out] thread Handle to thread.
  533. */
  534. void start_thread(THREAD_CB fun, func_args* args, THREAD_TYPE* thread)
  535. {
  536. #if defined(HAVE_PTHREAD)
  537. PTHREAD_CHECK_RET(pthread_create(thread, 0, fun, args));
  538. return;
  539. #elif defined(WOLFSSL_TIRTOS)
  540. /* Initialize the defaults and set the parameters. */
  541. Task_Params taskParams;
  542. Task_Params_init(&taskParams);
  543. taskParams.arg0 = (UArg)args;
  544. taskParams.stackSize = 65535;
  545. *thread = Task_create((Task_FuncPtr)fun, &taskParams, NULL);
  546. if (*thread == NULL) {
  547. printf("Failed to create new Task\n");
  548. }
  549. Task_yield();
  550. #elif defined(NETOS)
  551. /* This can be adjusted by defining in user_settings.h, will default to 65k
  552. * in the event it is undefined */
  553. #ifndef TESTSUITE_THREAD_STACK_SZ
  554. #define TESTSUITE_THREAD_STACK_SZ 65535
  555. #endif
  556. int result;
  557. static void * TestSuiteThreadStack = NULL;
  558. /* Assume only one additional thread is created concurrently. */
  559. if (TestSuiteThreadStack == NULL)
  560. {
  561. TestSuiteThreadStack = (void *)malloc(TESTSUITE_THREAD_STACK_SZ);
  562. if (TestSuiteThreadStack == NULL)
  563. {
  564. printf ("Stack allocation failure.\n");
  565. return;
  566. }
  567. }
  568. memset (thread, 0, sizeof *thread);
  569. /* first create the idle thread:
  570. * ARGS:
  571. * Param1: pointer to thread
  572. * Param2: name
  573. * Param3 and 4: entry function and input
  574. * Param5: pointer to thread stack
  575. * Param6: stack size
  576. * Param7 and 8: priority level and preempt threshold
  577. * Param9 and 10: time slice and auto-start indicator */
  578. result = tx_thread_create(thread,
  579. "WolfSSL TestSuiteThread",
  580. (entry_functionType)fun, (ULONG)args,
  581. TestSuiteThreadStack,
  582. TESTSUITE_THREAD_STACK_SZ,
  583. 2, 2,
  584. 1, TX_AUTO_START);
  585. if (result != TX_SUCCESS)
  586. {
  587. printf("Ethernet Bypass Application: failed to create idle thread!\n");
  588. }
  589. /* end if NETOS */
  590. #else
  591. /* windows thread type */
  592. *thread = (THREAD_TYPE)_beginthreadex(NULL, 0, fun, args, 0, 0);
  593. #endif /* thread types */
  594. }
  595. /* Join thread to wait for completion.
  596. *
  597. * @param [in] thread Handle to thread.
  598. */
  599. void join_thread(THREAD_TYPE thread)
  600. {
  601. #if defined(HAVE_PTHREAD)
  602. PTHREAD_CHECK_RET(pthread_join(thread, 0));
  603. #elif defined(WOLFSSL_TIRTOS)
  604. while(1) {
  605. if (Task_getMode(thread) == Task_Mode_TERMINATED) {
  606. Task_sleep(5);
  607. break;
  608. }
  609. Task_yield();
  610. }
  611. #elif defined(NETOS)
  612. /* TODO: */
  613. #else
  614. DWORD res = WaitForSingleObject((HANDLE)thread, INFINITE);
  615. assert(res == WAIT_OBJECT_0);
  616. res = CloseHandle((HANDLE)thread);
  617. assert(res);
  618. (void)res; /* Suppress un-used variable warning */
  619. #endif
  620. }
  621. #ifndef NO_FILESYSTEM
  622. #ifdef _MSC_VER
  623. #include <direct.h>
  624. #endif
  625. #define TMP_DIR_PREFIX "tmpDir-"
  626. /* len is length of tmpDir name, assuming
  627. * len does not include null terminating character */
  628. char* create_tmp_dir(char *tmpDir, int len)
  629. {
  630. if (len < (int)XSTR_SIZEOF(TMP_DIR_PREFIX))
  631. return NULL;
  632. XMEMCPY(tmpDir, TMP_DIR_PREFIX, XSTR_SIZEOF(TMP_DIR_PREFIX));
  633. if (mymktemp(tmpDir, len, len - XSTR_SIZEOF(TMP_DIR_PREFIX)) == NULL)
  634. return NULL;
  635. #ifdef _MSC_VER
  636. if (_mkdir(tmpDir) != 0)
  637. return NULL;
  638. #else
  639. if (mkdir(tmpDir, 0700) != 0)
  640. return NULL;
  641. #endif
  642. return tmpDir;
  643. }
  644. int rem_dir(const char* dirName)
  645. {
  646. #ifdef _MSC_VER
  647. if (_rmdir(dirName) != 0)
  648. return -1;
  649. #else
  650. if (rmdir(dirName) != 0)
  651. return -1;
  652. #endif
  653. return 0;
  654. }
  655. int rem_file(const char* fileName)
  656. {
  657. #ifdef _MSC_VER
  658. if (_unlink(fileName) != 0)
  659. return -1;
  660. #else
  661. if (unlink(fileName) != 0)
  662. return -1;
  663. #endif
  664. return 0;
  665. }
  666. int copy_file(const char* in, const char* out)
  667. {
  668. byte buf[100];
  669. XFILE inFile = XBADFILE;
  670. XFILE outFile = XBADFILE;
  671. size_t sz;
  672. int ret = -1;
  673. inFile = XFOPEN(in, "rb");
  674. if (inFile == XBADFILE)
  675. goto cleanup;
  676. outFile = XFOPEN(out, "wb");
  677. if (outFile == XBADFILE)
  678. goto cleanup;
  679. while ((sz = XFREAD(buf, 1, sizeof(buf), inFile)) != 0) {
  680. if (XFWRITE(buf, 1, sz, outFile) != sz)
  681. goto cleanup;
  682. }
  683. ret = 0;
  684. cleanup:
  685. if (inFile != XBADFILE)
  686. XFCLOSE(inFile);
  687. if (outFile != XBADFILE)
  688. XFCLOSE(outFile);
  689. return ret;
  690. }
  691. #endif /* !NO_FILESYSTEM */
  692. #ifndef NO_SHA256
  693. /* Create SHA-256 hash of the file based on filename.
  694. *
  695. * @param [in] file Name of file.
  696. * @parma [out] check Buffer to hold SHA-256 hash.
  697. */
  698. void file_test(const char* file, byte* check)
  699. {
  700. FILE* f;
  701. int i = 0, j, ret;
  702. wc_Sha256 sha256;
  703. byte buf[1024];
  704. byte shasum[WC_SHA256_DIGEST_SIZE];
  705. ret = wc_InitSha256(&sha256);
  706. if (ret != 0) {
  707. printf("Can't wc_InitSha256 %d\n", ret);
  708. return;
  709. }
  710. if( !( f = fopen( file, "rb" ) )) {
  711. printf("Can't open %s\n", file);
  712. return;
  713. }
  714. while( ( i = (int)fread(buf, 1, sizeof(buf), f )) > 0 ) {
  715. ret = wc_Sha256Update(&sha256, buf, i);
  716. if (ret != 0) {
  717. printf("Can't wc_Sha256Update %d\n", ret);
  718. fclose(f);
  719. return;
  720. }
  721. }
  722. ret = wc_Sha256Final(&sha256, shasum);
  723. wc_Sha256Free(&sha256);
  724. if (ret != 0) {
  725. printf("Can't wc_Sha256Final %d\n", ret);
  726. fclose(f);
  727. return;
  728. }
  729. XMEMCPY(check, shasum, sizeof(shasum));
  730. for(j = 0; j < WC_SHA256_DIGEST_SIZE; ++j )
  731. printf( "%02x", shasum[j] );
  732. printf(" %s\n", file);
  733. fclose(f);
  734. }
  735. #endif
  736. #else /* SINGLE_THREADED */
  737. int myoptind = 0;
  738. char* myoptarg = NULL;
  739. int main(int argc, char** argv)
  740. {
  741. func_args wolfcrypt_test_args;
  742. wolfcrypt_test_args.argc = argc;
  743. wolfcrypt_test_args.argv = argv;
  744. wolfSSL_Init();
  745. ChangeToWolfRoot();
  746. /* No TLS - only doing cryptographic algorithm testing. */
  747. wolfcrypt_test(&wolfcrypt_test_args);
  748. if (wolfcrypt_test_args.return_code != 0)
  749. return wolfcrypt_test_args.return_code;
  750. wolfSSL_Cleanup();
  751. printf("\nAll tests passed!\n");
  752. return EXIT_SUCCESS;
  753. }
  754. #endif /* SINGLE_THREADED */