update tests
Signed-off-by: Jerry Yu <jerry.h.yu@arm.com>
This commit is contained in:
parent
ec6d07870d
commit
28547c49ed
2 changed files with 56 additions and 15 deletions
|
@ -1633,6 +1633,7 @@ exit:
|
|||
}
|
||||
#endif /* MBEDTLS_SSL_SOME_SUITES_USE_MAC */
|
||||
|
||||
#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
|
||||
int mbedtls_test_ssl_tls12_populate_session(mbedtls_ssl_session *session,
|
||||
int ticket_len,
|
||||
const char *crt_file)
|
||||
|
@ -1729,6 +1730,7 @@ int mbedtls_test_ssl_tls12_populate_session(mbedtls_ssl_session *session,
|
|||
|
||||
return 0;
|
||||
}
|
||||
#endif /* MBEDTLS_SSL_PROTO_TLS1_2 */
|
||||
|
||||
#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
|
||||
int mbedtls_test_ssl_tls13_populate_session(mbedtls_ssl_session *session,
|
||||
|
@ -1752,14 +1754,14 @@ int mbedtls_test_ssl_tls13_populate_session(mbedtls_ssl_session *session,
|
|||
|
||||
#if defined(MBEDTLS_HAVE_TIME)
|
||||
if (session->endpoint == MBEDTLS_SSL_IS_SERVER) {
|
||||
session->start = mbedtls_time(NULL) - 42;
|
||||
session->ticket_creation = mbedtls_ms_time() - 42;
|
||||
}
|
||||
#endif
|
||||
|
||||
#if defined(MBEDTLS_SSL_CLI_C)
|
||||
if (session->endpoint == MBEDTLS_SSL_IS_CLIENT) {
|
||||
#if defined(MBEDTLS_HAVE_TIME)
|
||||
session->ticket_received = mbedtls_time(NULL) - 40;
|
||||
session->ticket_received = mbedtls_ms_time() - 40;
|
||||
#endif
|
||||
session->ticket_lifetime = 0xfedcba98;
|
||||
|
||||
|
|
|
@ -1943,16 +1943,21 @@ void ssl_serialize_session_save_load(int ticket_len, char *crt_file,
|
|||
/* Prepare a dummy session to work on */
|
||||
((void) endpoint_type);
|
||||
((void) tls_version);
|
||||
((void) ticket_len);
|
||||
((void) crt_file);
|
||||
#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
|
||||
if (tls_version == MBEDTLS_SSL_VERSION_TLS1_3) {
|
||||
TEST_ASSERT(mbedtls_test_ssl_tls13_populate_session(
|
||||
&original, 0, endpoint_type) == 0);
|
||||
} else
|
||||
}
|
||||
#endif
|
||||
{
|
||||
|
||||
#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
|
||||
if (tls_version == MBEDTLS_SSL_VERSION_TLS1_2) {
|
||||
TEST_ASSERT(mbedtls_test_ssl_tls12_populate_session(
|
||||
&original, ticket_len, crt_file) == 0);
|
||||
}
|
||||
#endif
|
||||
|
||||
/* Serialize it */
|
||||
TEST_ASSERT(mbedtls_ssl_session_save(&original, NULL, 0, &len)
|
||||
|
@ -1968,8 +1973,20 @@ void ssl_serialize_session_save_load(int ticket_len, char *crt_file,
|
|||
* Make sure both session structures are identical
|
||||
*/
|
||||
#if defined(MBEDTLS_HAVE_TIME)
|
||||
TEST_ASSERT(original.start == restored.start);
|
||||
#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
|
||||
if (tls_version == MBEDTLS_SSL_VERSION_TLS1_3) {
|
||||
TEST_ASSERT(original.ticket_creation == restored.ticket_creation);
|
||||
}
|
||||
#endif
|
||||
|
||||
#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
|
||||
if (tls_version == MBEDTLS_SSL_VERSION_TLS1_2) {
|
||||
TEST_ASSERT(original.start == restored.start);
|
||||
}
|
||||
#endif
|
||||
|
||||
#endif
|
||||
|
||||
TEST_ASSERT(original.tls_version == restored.tls_version);
|
||||
TEST_ASSERT(original.ciphersuite == restored.ciphersuite);
|
||||
#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
|
||||
|
@ -2049,7 +2066,7 @@ void ssl_serialize_session_save_load(int ticket_len, char *crt_file,
|
|||
|
||||
#if defined(MBEDTLS_HAVE_TIME) && defined(MBEDTLS_SSL_SRV_C)
|
||||
if (endpoint_type == MBEDTLS_SSL_IS_SERVER) {
|
||||
TEST_ASSERT(original.start == restored.start);
|
||||
TEST_ASSERT(original.ticket_creation == restored.ticket_creation);
|
||||
}
|
||||
#endif
|
||||
#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_CLI_C)
|
||||
|
@ -2097,16 +2114,22 @@ void ssl_serialize_session_load_save(int ticket_len, char *crt_file,
|
|||
/* Prepare a dummy session to work on */
|
||||
((void) endpoint_type);
|
||||
((void) tls_version);
|
||||
((void) ticket_len);
|
||||
((void) crt_file);
|
||||
#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
|
||||
if (tls_version == MBEDTLS_SSL_VERSION_TLS1_3) {
|
||||
TEST_ASSERT(mbedtls_test_ssl_tls13_populate_session(
|
||||
&session, 0, endpoint_type) == 0);
|
||||
} else
|
||||
}
|
||||
#endif
|
||||
{
|
||||
|
||||
#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
|
||||
if (tls_version == MBEDTLS_SSL_VERSION_TLS1_2) {
|
||||
|
||||
TEST_ASSERT(mbedtls_test_ssl_tls12_populate_session(
|
||||
&session, ticket_len, crt_file) == 0);
|
||||
}
|
||||
#endif
|
||||
|
||||
/* Get desired buffer size for serializing */
|
||||
TEST_ASSERT(mbedtls_ssl_session_save(&session, NULL, 0, &len0)
|
||||
|
@ -2160,16 +2183,22 @@ void ssl_serialize_session_save_buf_size(int ticket_len, char *crt_file,
|
|||
/* Prepare dummy session and get serialized size */
|
||||
((void) endpoint_type);
|
||||
((void) tls_version);
|
||||
((void) ticket_len);
|
||||
((void) crt_file);
|
||||
#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
|
||||
if (tls_version == MBEDTLS_SSL_VERSION_TLS1_3) {
|
||||
TEST_ASSERT(mbedtls_test_ssl_tls13_populate_session(
|
||||
&session, 0, endpoint_type) == 0);
|
||||
} else
|
||||
}
|
||||
#endif
|
||||
{
|
||||
|
||||
#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
|
||||
if (tls_version == MBEDTLS_SSL_VERSION_TLS1_2) {
|
||||
TEST_ASSERT(mbedtls_test_ssl_tls12_populate_session(
|
||||
&session, ticket_len, crt_file) == 0);
|
||||
}
|
||||
#endif
|
||||
|
||||
TEST_ASSERT(mbedtls_ssl_session_save(&session, NULL, 0, &good_len)
|
||||
== MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL);
|
||||
|
||||
|
@ -2209,16 +2238,22 @@ void ssl_serialize_session_load_buf_size(int ticket_len, char *crt_file,
|
|||
/* Prepare serialized session data */
|
||||
((void) endpoint_type);
|
||||
((void) tls_version);
|
||||
((void) ticket_len);
|
||||
((void) crt_file);
|
||||
#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
|
||||
if (tls_version == MBEDTLS_SSL_VERSION_TLS1_3) {
|
||||
TEST_ASSERT(mbedtls_test_ssl_tls13_populate_session(
|
||||
&session, 0, endpoint_type) == 0);
|
||||
} else
|
||||
}
|
||||
#endif
|
||||
{
|
||||
|
||||
#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
|
||||
if (tls_version == MBEDTLS_SSL_VERSION_TLS1_2) {
|
||||
TEST_ASSERT(mbedtls_test_ssl_tls12_populate_session(
|
||||
&session, ticket_len, crt_file) == 0);
|
||||
}
|
||||
#endif
|
||||
|
||||
TEST_ASSERT(mbedtls_ssl_session_save(&session, NULL, 0, &good_len)
|
||||
== MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL);
|
||||
TEST_CALLOC(good_buf, good_len);
|
||||
|
@ -2272,11 +2307,15 @@ void ssl_session_serialize_version_check(int corrupt_major,
|
|||
if (tls_version == MBEDTLS_SSL_VERSION_TLS1_3) {
|
||||
TEST_ASSERT(mbedtls_test_ssl_tls13_populate_session(
|
||||
&session, 0, endpoint_type) == 0);
|
||||
} else
|
||||
}
|
||||
#endif
|
||||
TEST_ASSERT(mbedtls_test_ssl_tls12_populate_session(
|
||||
&session, 0, NULL) == 0);
|
||||
|
||||
#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
|
||||
if (tls_version == MBEDTLS_SSL_VERSION_TLS1_2) {
|
||||
TEST_ASSERT(mbedtls_test_ssl_tls12_populate_session(
|
||||
&session, 0, NULL) == 0);
|
||||
}
|
||||
#endif
|
||||
|
||||
/* Infer length of serialized session. */
|
||||
TEST_ASSERT(mbedtls_ssl_session_save(&session,
|
||||
|
|
Loading…
Reference in a new issue