/* testsuite.c * * Copyright (C) 2006-2017 wolfSSL Inc. * * This file is part of wolfSSL. * * wolfSSL is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * wolfSSL is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA */ #ifdef HAVE_CONFIG_H #include #endif #include #include #include #include #ifndef SINGLE_THREADED #ifdef OPENSSL_EXTRA #include #endif #include #include #include #include #include #ifndef NO_SHA256 void file_test(const char* file, byte* hash); #endif #if !defined(NO_WOLFSSL_SERVER) && !defined(NO_WOLFSSL_CLIENT) void simple_test(func_args*); enum { NUMARGS = 3 }; static const char *outputName; #endif int myoptind = 0; char* myoptarg = NULL; #ifndef NO_TESTSUITE_MAIN_DRIVER static int testsuite_test(int argc, char** argv); int main(int argc, char** argv) { return testsuite_test(argc, argv); } #endif /* NO_TESTSUITE_MAIN_DRIVER */ int testsuite_test(int argc, char** argv) { #if !defined(NO_WOLFSSL_SERVER) && !defined(NO_WOLFSSL_CLIENT) func_args server_args; tcp_ready ready; THREAD_TYPE serverThread; #ifndef USE_WINDOWS_API char tempName[] = "/tmp/output-XXXXXX"; int len = 18; int num = 6; #else char tempName[] = "fnXXXXXX"; int len = 8; int num = 6; #endif #ifdef HAVE_WNR if (wc_InitNetRandom(wnrConfig, NULL, 5000) != 0) { err_sys("Whitewood netRandom global config failed"); return -1237; } #endif /* HAVE_WNR */ StartTCP(); server_args.argc = argc; server_args.argv = argv; wolfSSL_Init(); #if defined(DEBUG_WOLFSSL) && !defined(HAVE_VALGRIND) wolfSSL_Debugging_ON(); #endif #if !defined(WOLFSSL_TIRTOS) ChangeToWolfRoot(); #endif #ifdef WOLFSSL_TIRTOS fdOpenSession(Task_self()); #endif server_args.signal = &ready; InitTcpReady(&ready); #ifndef NO_CRYPT_TEST /* wc_ test */ wolfcrypt_test(&server_args); if (server_args.return_code != 0) return server_args.return_code; #endif /* Simple wolfSSL client server test */ simple_test(&server_args); if (server_args.return_code != 0) return server_args.return_code; /* Echo input wolfSSL client server test */ start_thread(echoserver_test, &server_args, &serverThread); wait_tcp_ready(&server_args); { func_args echo_args; char* myArgv[NUMARGS]; char argc0[32]; char argc1[32]; char argc2[32]; myArgv[0] = argc0; myArgv[1] = argc1; myArgv[2] = argc2; echo_args.argc = 3; echo_args.argv = myArgv; /* Create unique file name */ outputName = mymktemp(tempName, len, num); if (outputName == NULL) { printf("Could not create unique file name"); return EXIT_FAILURE; } strcpy(echo_args.argv[0], "echoclient"); strcpy(echo_args.argv[1], "input"); strcpy(echo_args.argv[2], outputName); /* Share the signal, it has the new port number in it. */ echo_args.signal = server_args.signal; /* make sure OK */ echoclient_test(&echo_args); if (echo_args.return_code != 0) return echo_args.return_code; #ifdef WOLFSSL_DTLS wait_tcp_ready(&server_args); #endif /* send quit to echoserver */ echo_args.argc = 2; strcpy(echo_args.argv[1], "quit"); echoclient_test(&echo_args); if (echo_args.return_code != 0) return echo_args.return_code; join_thread(serverThread); if (server_args.return_code != 0) return server_args.return_code; } /* show ciphers */ { char ciphers[1024]; XMEMSET(ciphers, 0, sizeof(ciphers)); wolfSSL_get_ciphers(ciphers, sizeof(ciphers)-1); printf("ciphers = %s\n", ciphers); } /* validate output equals input */ { #ifndef NO_SHA256 byte input[WC_SHA256_DIGEST_SIZE]; byte output[WC_SHA256_DIGEST_SIZE]; file_test("input", input); file_test(outputName, output); #endif remove(outputName); #ifndef NO_SHA256 if (memcmp(input, output, sizeof(input)) != 0) return EXIT_FAILURE; #endif } wolfSSL_Cleanup(); FreeTcpReady(&ready); #ifdef WOLFSSL_TIRTOS fdCloseSession(Task_self()); #endif #ifdef HAVE_WNR if (wc_FreeNetRandom() < 0) err_sys("Failed to free netRandom context"); #endif /* HAVE_WNR */ printf("\nAll tests passed!\n"); #else (void)argc; (void)argv; #endif /* !NO_WOLFSSL_SERVER && !NO_WOLFSSL_CLIENT */ return EXIT_SUCCESS; } #if !defined(NO_WOLFSSL_SERVER) && !defined(NO_WOLFSSL_CLIENT) void simple_test(func_args* args) { THREAD_TYPE serverThread; func_args svrArgs; char *svrArgv[9]; char argc0s[32]; char argc1s[32]; char argc2s[32]; char argc3s[32]; char argc4s[32]; char argc5s[32]; char argc6s[32]; char argc7s[32]; char argc8s[32]; func_args cliArgs; char *cliArgv[NUMARGS]; char argc0c[32]; char argc1c[32]; char argc2c[32]; svrArgv[0] = argc0s; svrArgv[1] = argc1s; svrArgv[2] = argc2s; svrArgv[3] = argc3s; svrArgv[4] = argc4s; svrArgv[5] = argc5s; svrArgv[6] = argc6s; svrArgv[7] = argc7s; svrArgv[8] = argc8s; cliArgv[0] = argc0c; cliArgv[1] = argc1c; cliArgv[2] = argc2c; svrArgs.argc = 1; svrArgs.argv = svrArgv; svrArgs.return_code = 0; cliArgs.argc = 1; cliArgs.argv = cliArgv; cliArgs.return_code = 0; strcpy(svrArgs.argv[0], "SimpleServer"); #if !defined(USE_WINDOWS_API) && !defined(WOLFSSL_SNIFFER) && \ !defined(WOLFSSL_TIRTOS) strcpy(svrArgs.argv[svrArgs.argc++], "-p"); strcpy(svrArgs.argv[svrArgs.argc++], "0"); #endif /* Set the last arg later, when it is known. */ args->return_code = 0; svrArgs.signal = args->signal; start_thread(server_test, &svrArgs, &serverThread); wait_tcp_ready(&svrArgs); /* Setting the actual port number. */ strcpy(cliArgs.argv[0], "SimpleClient"); #ifndef USE_WINDOWS_API cliArgs.argc = NUMARGS; strcpy(cliArgs.argv[1], "-p"); snprintf(cliArgs.argv[2], sizeof(argc2c), "%d", svrArgs.signal->port); #endif client_test(&cliArgs); if (cliArgs.return_code != 0) { args->return_code = cliArgs.return_code; return; } join_thread(serverThread); if (svrArgs.return_code != 0) args->return_code = svrArgs.return_code; } #endif /* !NO_WOLFSSL_SERVER && !NO_WOLFSSL_CLIENT */ void wait_tcp_ready(func_args* args) { #if defined(_POSIX_THREADS) && !defined(__MINGW32__) pthread_mutex_lock(&args->signal->mutex); if (!args->signal->ready) pthread_cond_wait(&args->signal->cond, &args->signal->mutex); args->signal->ready = 0; /* reset */ pthread_mutex_unlock(&args->signal->mutex); #else (void)args; #endif } void start_thread(THREAD_FUNC fun, func_args* args, THREAD_TYPE* thread) { #if defined(_POSIX_THREADS) && !defined(__MINGW32__) pthread_create(thread, 0, fun, args); return; #elif defined(WOLFSSL_TIRTOS) /* Initialize the defaults and set the parameters. */ Task_Params taskParams; Task_Params_init(&taskParams); taskParams.arg0 = (UArg)args; taskParams.stackSize = 65535; *thread = Task_create((Task_FuncPtr)fun, &taskParams, NULL); if (*thread == NULL) { printf("Failed to create new Task\n"); } Task_yield(); #else *thread = (THREAD_TYPE)_beginthreadex(0, 0, fun, args, 0, 0); #endif } void join_thread(THREAD_TYPE thread) { #if defined(_POSIX_THREADS) && !defined(__MINGW32__) pthread_join(thread, 0); #elif defined(WOLFSSL_TIRTOS) while(1) { if (Task_getMode(thread) == Task_Mode_TERMINATED) { Task_sleep(5); break; } Task_yield(); } #else int res = WaitForSingleObject((HANDLE)thread, INFINITE); assert(res == WAIT_OBJECT_0); res = CloseHandle((HANDLE)thread); assert(res); (void)res; /* Suppress un-used variable warning */ #endif } #ifndef NO_SHA256 void file_test(const char* file, byte* check) { FILE* f; int i = 0, j, ret; wc_Sha256 sha256; byte buf[1024]; byte shasum[WC_SHA256_DIGEST_SIZE]; ret = wc_InitSha256(&sha256); if (ret != 0) { printf("Can't wc_InitSha256 %d\n", ret); return; } if( !( f = fopen( file, "rb" ) )) { printf("Can't open %s\n", file); return; } while( ( i = (int)fread(buf, 1, sizeof(buf), f )) > 0 ) { ret = wc_Sha256Update(&sha256, buf, i); if (ret != 0) { printf("Can't wc_Sha256Update %d\n", ret); fclose(f); return; } } ret = wc_Sha256Final(&sha256, shasum); if (ret != 0) { printf("Can't wc_Sha256Final %d\n", ret); fclose(f); return; } XMEMCPY(check, shasum, sizeof(shasum)); for(j = 0; j < WC_SHA256_DIGEST_SIZE; ++j ) printf( "%02x", shasum[j] ); printf(" %s\n", file); fclose(f); } #endif #else /* SINGLE_THREADED */ int myoptind = 0; char* myoptarg = NULL; int main(int argc, char** argv) { func_args server_args; server_args.argc = argc; server_args.argv = argv; wolfSSL_Init(); ChangeToWolfRoot(); wolfcrypt_test(&server_args); if (server_args.return_code != 0) return server_args.return_code; wolfSSL_Cleanup(); printf("\nAll tests passed!\n"); EXIT_TEST(EXIT_SUCCESS); } #endif /* SINGLE_THREADED */