|
|
@@ -728,6 +728,7 @@ int mbedtls_mock_tcp_recv_msg(void *ctx, unsigned char *buf, size_t buf_len)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED) && \
|
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED) && \
|
|
|
|
|
|
|
|
defined(MBEDTLS_CERTS_C) && \
|
|
|
|
defined(MBEDTLS_ENTROPY_C) && \
|
|
|
|
defined(MBEDTLS_ENTROPY_C) && \
|
|
|
|
defined(MBEDTLS_CTR_DRBG_C)
|
|
|
|
defined(MBEDTLS_CTR_DRBG_C)
|
|
|
|
|
|
|
|
|
|
|
@@ -1041,7 +1042,8 @@ int mbedtls_move_handshake_to_state(mbedtls_ssl_context *ssl,
|
|
|
|
return (max_steps >= 0) ? ret : -1;
|
|
|
|
return (max_steps >= 0) ? ret : -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED && MBEDTLS_ENTROPY_C && MBEDTLS_CTR_DRBG_C */
|
|
|
|
#endif \
|
|
|
|
|
|
|
|
/* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED && MBEDTLS_CERTS_C && MBEDTLS_ENTROPY_C && MBEDTLS_CTR_DRBG_C */
|
|
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
/*
|
|
|
|
* Write application data. Increase write counter if necessary.
|
|
|
|
* Write application data. Increase write counter if necessary.
|
|
|
@@ -1438,7 +1440,9 @@ static int ssl_populate_session(mbedtls_ssl_session *session,
|
|
|
|
memset(session->id, 66, session->id_len);
|
|
|
|
memset(session->id, 66, session->id_len);
|
|
|
|
memset(session->master, 17, sizeof(session->master));
|
|
|
|
memset(session->master, 17, sizeof(session->master));
|
|
|
|
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED) && defined(MBEDTLS_FS_IO)
|
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED) && \
|
|
|
|
|
|
|
|
defined(MBEDTLS_CERTS_C) && \
|
|
|
|
|
|
|
|
defined(MBEDTLS_FS_IO)
|
|
|
|
if (strlen(crt_file) != 0) {
|
|
|
|
if (strlen(crt_file) != 0) {
|
|
|
|
mbedtls_x509_crt tmp_crt;
|
|
|
|
mbedtls_x509_crt tmp_crt;
|
|
|
|
int ret;
|
|
|
|
int ret;
|
|
|
@@ -1479,9 +1483,9 @@ static int ssl_populate_session(mbedtls_ssl_session *session,
|
|
|
|
|
|
|
|
|
|
|
|
mbedtls_x509_crt_free(&tmp_crt);
|
|
|
|
mbedtls_x509_crt_free(&tmp_crt);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#else /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED && MBEDTLS_FS_IO */
|
|
|
|
#else /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED && MBEDTLS_CERTS_C && MBEDTLS_FS_IO */
|
|
|
|
(void) crt_file;
|
|
|
|
(void) crt_file;
|
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED && MBEDTLS_FS_IO */
|
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED && MBEDTLS_CERTS_C && MBEDTLS_FS_IO */
|
|
|
|
session->verify_result = 0xdeadbeef;
|
|
|
|
session->verify_result = 0xdeadbeef;
|
|
|
|
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_CLI_C)
|
|
|
|
#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_CLI_C)
|
|
|
@@ -1648,6 +1652,7 @@ int exchange_data(mbedtls_ssl_context *ssl_1,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED) && \
|
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED) && \
|
|
|
|
|
|
|
|
defined(MBEDTLS_CERTS_C) && \
|
|
|
|
defined(MBEDTLS_ENTROPY_C) && \
|
|
|
|
defined(MBEDTLS_ENTROPY_C) && \
|
|
|
|
defined(MBEDTLS_CTR_DRBG_C)
|
|
|
|
defined(MBEDTLS_CTR_DRBG_C)
|
|
|
|
void perform_handshake(handshake_test_options *options)
|
|
|
|
void perform_handshake(handshake_test_options *options)
|
|
|
@@ -1999,7 +2004,8 @@ exit:
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED && MBEDTLS_ENTROPY_C && MBEDTLS_CTR_DRBG_C */
|
|
|
|
#endif \
|
|
|
|
|
|
|
|
/* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED && MBEDTLS_CERTS_C && MBEDTLS_ENTROPY_C && MBEDTLS_CTR_DRBG_C */
|
|
|
|
|
|
|
|
|
|
|
|
/* END_HEADER */
|
|
|
|
/* END_HEADER */
|
|
|
|
|
|
|
|
|
|
|
@@ -3047,7 +3053,7 @@ void ssl_dtls_replay(data_t *prevs, data_t *new, int ret)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* END_CASE */
|
|
|
|
/* END_CASE */
|
|
|
|
|
|
|
|
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:MBEDTLS_CERTS_C */
|
|
|
|
void ssl_set_hostname_twice(char *hostname0, char *hostname1)
|
|
|
|
void ssl_set_hostname_twice(char *hostname0, char *hostname1)
|
|
|
|
{
|
|
|
|
{
|
|
|
|
mbedtls_ssl_context ssl;
|
|
|
|
mbedtls_ssl_context ssl;
|
|
|
@@ -3768,7 +3774,8 @@ void ssl_serialize_session_save_load(int ticket_len, char *crt_file)
|
|
|
|
TEST_ASSERT(memcmp(original.master,
|
|
|
|
TEST_ASSERT(memcmp(original.master,
|
|
|
|
restored.master, sizeof(original.master)) == 0);
|
|
|
|
restored.master, sizeof(original.master)) == 0);
|
|
|
|
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
|
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED) && \
|
|
|
|
|
|
|
|
defined(MBEDTLS_CERTS_C)
|
|
|
|
#if defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
|
|
|
|
#if defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
|
|
|
|
TEST_ASSERT((original.peer_cert == NULL) ==
|
|
|
|
TEST_ASSERT((original.peer_cert == NULL) ==
|
|
|
|
(restored.peer_cert == NULL));
|
|
|
|
(restored.peer_cert == NULL));
|
|
|
@@ -3792,7 +3799,7 @@ void ssl_serialize_session_save_load(int ticket_len, char *crt_file)
|
|
|
|
original.peer_cert_digest_len) == 0);
|
|
|
|
original.peer_cert_digest_len) == 0);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif /* MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
|
|
|
|
#endif /* MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
|
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED */
|
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED && MBEDTLS_CERTS_C */
|
|
|
|
TEST_ASSERT(original.verify_result == restored.verify_result);
|
|
|
|
TEST_ASSERT(original.verify_result == restored.verify_result);
|
|
|
|
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_CLI_C)
|
|
|
|
#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_CLI_C)
|
|
|
@@ -4013,7 +4020,7 @@ void ssl_session_serialize_version_check(int corrupt_major,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* END_CASE */
|
|
|
|
/* END_CASE */
|
|
|
|
|
|
|
|
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:!MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_PKCS1_V15:MBEDTLS_ENTROPY_C:MBEDTLS_ENTROPY_C:MBEDTLS_CTR_DRBG_C:MBEDTLS_SHA256_C */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:MBEDTLS_CERTS_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:!MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_PKCS1_V15:MBEDTLS_ENTROPY_C:MBEDTLS_ENTROPY_C:MBEDTLS_CTR_DRBG_C:MBEDTLS_SHA256_C */
|
|
|
|
void mbedtls_endpoint_sanity(int endpoint_type)
|
|
|
|
void mbedtls_endpoint_sanity(int endpoint_type)
|
|
|
|
{
|
|
|
|
{
|
|
|
|
enum { BUFFSIZE = 1024 };
|
|
|
|
enum { BUFFSIZE = 1024 };
|
|
|
@@ -4036,7 +4043,7 @@ exit:
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* END_CASE */
|
|
|
|
/* END_CASE */
|
|
|
|
|
|
|
|
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:!MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_PKCS1_V15:MBEDTLS_ENTROPY_C:MBEDTLS_ENTROPY_C:MBEDTLS_CTR_DRBG_C:MBEDTLS_ECP_C:MBEDTLS_SHA256_C */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:MBEDTLS_CERTS_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:!MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_PKCS1_V15:MBEDTLS_ENTROPY_C:MBEDTLS_ENTROPY_C:MBEDTLS_CTR_DRBG_C:MBEDTLS_ECP_C:MBEDTLS_SHA256_C */
|
|
|
|
void move_handshake_to_state(int endpoint_type, int state, int need_pass)
|
|
|
|
void move_handshake_to_state(int endpoint_type, int state, int need_pass)
|
|
|
|
{
|
|
|
|
{
|
|
|
|
enum { BUFFSIZE = 1024 };
|
|
|
|
enum { BUFFSIZE = 1024 };
|
|
|
@@ -4078,7 +4085,7 @@ exit:
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* END_CASE */
|
|
|
|
/* END_CASE */
|
|
|
|
|
|
|
|
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:!MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_PKCS1_V15:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ENTROPY_C:MBEDTLS_CTR_DRBG_C:MBEDTLS_ECP_C:MBEDTLS_SHA256_C:MBEDTLS_CAN_HANDLE_RSA_TEST_KEY */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:MBEDTLS_CERTS_C:!MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_PKCS1_V15:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ENTROPY_C:MBEDTLS_CTR_DRBG_C:MBEDTLS_ECP_C:MBEDTLS_SHA256_C:MBEDTLS_CAN_HANDLE_RSA_TEST_KEY */
|
|
|
|
void handshake_version(int dtls, int client_min_version, int client_max_version,
|
|
|
|
void handshake_version(int dtls, int client_min_version, int client_max_version,
|
|
|
|
int server_min_version, int server_max_version,
|
|
|
|
int server_min_version, int server_max_version,
|
|
|
|
int expected_negotiated_version)
|
|
|
|
int expected_negotiated_version)
|
|
|
@@ -4108,7 +4115,7 @@ void handshake_version(int dtls, int client_min_version, int client_max_version,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* END_CASE */
|
|
|
|
/* END_CASE */
|
|
|
|
|
|
|
|
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:!MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_ENTROPY_C:MBEDTLS_CTR_DRBG_C:MBEDTLS_SHA256_C */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:MBEDTLS_CERTS_C:!MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_ENTROPY_C:MBEDTLS_CTR_DRBG_C:MBEDTLS_SHA256_C */
|
|
|
|
void handshake_psk_cipher(char *cipher, int pk_alg, data_t *psk_str, int dtls)
|
|
|
|
void handshake_psk_cipher(char *cipher, int pk_alg, data_t *psk_str, int dtls)
|
|
|
|
{
|
|
|
|
{
|
|
|
|
handshake_test_options options;
|
|
|
|
handshake_test_options options;
|
|
|
@@ -4126,7 +4133,7 @@ void handshake_psk_cipher(char *cipher, int pk_alg, data_t *psk_str, int dtls)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* END_CASE */
|
|
|
|
/* END_CASE */
|
|
|
|
|
|
|
|
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:!MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_ENTROPY_C:MBEDTLS_CTR_DRBG_C:MBEDTLS_SHA256_C */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:MBEDTLS_CERTS_C:!MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_ENTROPY_C:MBEDTLS_CTR_DRBG_C:MBEDTLS_SHA256_C */
|
|
|
|
void handshake_cipher(char *cipher, int pk_alg, int dtls)
|
|
|
|
void handshake_cipher(char *cipher, int pk_alg, int dtls)
|
|
|
|
{
|
|
|
|
{
|
|
|
|
test_handshake_psk_cipher(cipher, pk_alg, NULL, dtls);
|
|
|
|
test_handshake_psk_cipher(cipher, pk_alg, NULL, dtls);
|
|
|
@@ -4136,7 +4143,7 @@ void handshake_cipher(char *cipher, int pk_alg, int dtls)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* END_CASE */
|
|
|
|
/* END_CASE */
|
|
|
|
|
|
|
|
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:!MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ENTROPY_C:MBEDTLS_CTR_DRBG_C:MBEDTLS_SHA256_C */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:MBEDTLS_CERTS_C:!MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ENTROPY_C:MBEDTLS_CTR_DRBG_C:MBEDTLS_SHA256_C */
|
|
|
|
void app_data(int mfl, int cli_msg_len, int srv_msg_len,
|
|
|
|
void app_data(int mfl, int cli_msg_len, int srv_msg_len,
|
|
|
|
int expected_cli_fragments,
|
|
|
|
int expected_cli_fragments,
|
|
|
|
int expected_srv_fragments, int dtls)
|
|
|
|
int expected_srv_fragments, int dtls)
|
|
|
@@ -4157,7 +4164,7 @@ void app_data(int mfl, int cli_msg_len, int srv_msg_len,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* END_CASE */
|
|
|
|
/* END_CASE */
|
|
|
|
|
|
|
|
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:!MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ENTROPY_C:MBEDTLS_CTR_DRBG_C:MBEDTLS_ECP_C:MBEDTLS_SHA256_C:MBEDTLS_CAN_HANDLE_RSA_TEST_KEY */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:MBEDTLS_CERTS_C:!MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ENTROPY_C:MBEDTLS_CTR_DRBG_C:MBEDTLS_ECP_C:MBEDTLS_SHA256_C:MBEDTLS_CAN_HANDLE_RSA_TEST_KEY */
|
|
|
|
void app_data_tls(int mfl, int cli_msg_len, int srv_msg_len,
|
|
|
|
void app_data_tls(int mfl, int cli_msg_len, int srv_msg_len,
|
|
|
|
int expected_cli_fragments,
|
|
|
|
int expected_cli_fragments,
|
|
|
|
int expected_srv_fragments)
|
|
|
|
int expected_srv_fragments)
|
|
|
@@ -4169,7 +4176,7 @@ void app_data_tls(int mfl, int cli_msg_len, int srv_msg_len,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* END_CASE */
|
|
|
|
/* END_CASE */
|
|
|
|
|
|
|
|
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:!MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SSL_PROTO_DTLS:MBEDTLS_ENTROPY_C:MBEDTLS_CTR_DRBG_C:MBEDTLS_SHA256_C:MBEDTLS_CAN_HANDLE_RSA_TEST_KEY */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:MBEDTLS_CERTS_C:!MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SSL_PROTO_DTLS:MBEDTLS_ENTROPY_C:MBEDTLS_CTR_DRBG_C:MBEDTLS_SHA256_C:MBEDTLS_CAN_HANDLE_RSA_TEST_KEY */
|
|
|
|
void app_data_dtls(int mfl, int cli_msg_len, int srv_msg_len,
|
|
|
|
void app_data_dtls(int mfl, int cli_msg_len, int srv_msg_len,
|
|
|
|
int expected_cli_fragments,
|
|
|
|
int expected_cli_fragments,
|
|
|
|
int expected_srv_fragments)
|
|
|
|
int expected_srv_fragments)
|
|
|
@@ -4181,7 +4188,7 @@ void app_data_dtls(int mfl, int cli_msg_len, int srv_msg_len,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* END_CASE */
|
|
|
|
/* END_CASE */
|
|
|
|
|
|
|
|
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:!MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SSL_PROTO_DTLS:MBEDTLS_SSL_RENEGOTIATION:MBEDTLS_SSL_CONTEXT_SERIALIZATION:MBEDTLS_ENTROPY_C:MBEDTLS_CTR_DRBG_C:MBEDTLS_SHA256_C:MBEDTLS_CAN_HANDLE_RSA_TEST_KEY */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:MBEDTLS_CERTS_C:!MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SSL_PROTO_DTLS:MBEDTLS_SSL_RENEGOTIATION:MBEDTLS_SSL_CONTEXT_SERIALIZATION:MBEDTLS_ENTROPY_C:MBEDTLS_CTR_DRBG_C:MBEDTLS_SHA256_C:MBEDTLS_CAN_HANDLE_RSA_TEST_KEY */
|
|
|
|
void handshake_serialization()
|
|
|
|
void handshake_serialization()
|
|
|
|
{
|
|
|
|
{
|
|
|
|
handshake_test_options options;
|
|
|
|
handshake_test_options options;
|
|
|
@@ -4195,7 +4202,7 @@ void handshake_serialization()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* END_CASE */
|
|
|
|
/* END_CASE */
|
|
|
|
|
|
|
|
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:!MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_PKCS1_V15:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_DEBUG_C:MBEDTLS_SSL_MAX_FRAGMENT_LENGTH:MBEDTLS_CIPHER_MODE_CBC:MBEDTLS_ENTROPY_C:MBEDTLS_CTR_DRBG_C:MBEDTLS_SHA256_C:MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED*/
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:MBEDTLS_CERTS_C:!MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_PKCS1_V15:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_DEBUG_C:MBEDTLS_SSL_MAX_FRAGMENT_LENGTH:MBEDTLS_CIPHER_MODE_CBC:MBEDTLS_ENTROPY_C:MBEDTLS_CTR_DRBG_C:MBEDTLS_SHA256_C:MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED*/
|
|
|
|
void handshake_fragmentation(int mfl,
|
|
|
|
void handshake_fragmentation(int mfl,
|
|
|
|
int expected_srv_hs_fragmentation,
|
|
|
|
int expected_srv_hs_fragmentation,
|
|
|
|
int expected_cli_hs_fragmentation)
|
|
|
|
int expected_cli_hs_fragmentation)
|
|
|
@@ -4231,7 +4238,7 @@ void handshake_fragmentation(int mfl,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* END_CASE */
|
|
|
|
/* END_CASE */
|
|
|
|
|
|
|
|
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:!MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SSL_PROTO_DTLS:MBEDTLS_SSL_RENEGOTIATION:MBEDTLS_ENTROPY_C:MBEDTLS_CTR_DRBG_C:MBEDTLS_SHA256_C:MBEDTLS_CAN_HANDLE_RSA_TEST_KEY */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:MBEDTLS_CERTS_C:!MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SSL_PROTO_DTLS:MBEDTLS_SSL_RENEGOTIATION:MBEDTLS_ENTROPY_C:MBEDTLS_CTR_DRBG_C:MBEDTLS_SHA256_C:MBEDTLS_CAN_HANDLE_RSA_TEST_KEY */
|
|
|
|
void renegotiation(int legacy_renegotiation)
|
|
|
|
void renegotiation(int legacy_renegotiation)
|
|
|
|
{
|
|
|
|
{
|
|
|
|
handshake_test_options options;
|
|
|
|
handshake_test_options options;
|
|
|
@@ -4247,7 +4254,7 @@ void renegotiation(int legacy_renegotiation)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* END_CASE */
|
|
|
|
/* END_CASE */
|
|
|
|
|
|
|
|
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:!MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ENTROPY_C:MBEDTLS_CTR_DRBG_C:MBEDTLS_SHA256_C */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:MBEDTLS_CERTS_C:!MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ENTROPY_C:MBEDTLS_CTR_DRBG_C:MBEDTLS_SHA256_C */
|
|
|
|
void resize_buffers(int mfl, int renegotiation, int legacy_renegotiation,
|
|
|
|
void resize_buffers(int mfl, int renegotiation, int legacy_renegotiation,
|
|
|
|
int serialize, int dtls, char *cipher)
|
|
|
|
int serialize, int dtls, char *cipher)
|
|
|
|
{
|
|
|
|
{
|
|
|
@@ -4268,7 +4275,7 @@ void resize_buffers(int mfl, int renegotiation, int legacy_renegotiation,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* END_CASE */
|
|
|
|
/* END_CASE */
|
|
|
|
|
|
|
|
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:!MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH:MBEDTLS_SSL_CONTEXT_SERIALIZATION:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SSL_PROTO_DTLS:MBEDTLS_ENTROPY_C:MBEDTLS_CTR_DRBG_C:MBEDTLS_SHA256_C:MBEDTLS_CAN_HANDLE_RSA_TEST_KEY */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:MBEDTLS_CERTS_C:!MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH:MBEDTLS_SSL_CONTEXT_SERIALIZATION:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_SSL_PROTO_DTLS:MBEDTLS_ENTROPY_C:MBEDTLS_CTR_DRBG_C:MBEDTLS_SHA256_C:MBEDTLS_CAN_HANDLE_RSA_TEST_KEY */
|
|
|
|
void resize_buffers_serialize_mfl(int mfl)
|
|
|
|
void resize_buffers_serialize_mfl(int mfl)
|
|
|
|
{
|
|
|
|
{
|
|
|
|
test_resize_buffers(mfl, 0, MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION, 1, 1,
|
|
|
|
test_resize_buffers(mfl, 0, MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION, 1, 1,
|
|
|
@@ -4279,7 +4286,7 @@ void resize_buffers_serialize_mfl(int mfl)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* END_CASE */
|
|
|
|
/* END_CASE */
|
|
|
|
|
|
|
|
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:!MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ENTROPY_C:MBEDTLS_CTR_DRBG_C:MBEDTLS_SHA256_C:MBEDTLS_SSL_RENEGOTIATION:MBEDTLS_CAN_HANDLE_RSA_TEST_KEY */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:MBEDTLS_CERTS_C:!MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_ENTROPY_C:MBEDTLS_CTR_DRBG_C:MBEDTLS_SHA256_C:MBEDTLS_SSL_RENEGOTIATION:MBEDTLS_CAN_HANDLE_RSA_TEST_KEY */
|
|
|
|
void resize_buffers_renegotiate_mfl(int mfl, int legacy_renegotiation,
|
|
|
|
void resize_buffers_renegotiate_mfl(int mfl, int legacy_renegotiation,
|
|
|
|
char *cipher)
|
|
|
|
char *cipher)
|
|
|
|
{
|
|
|
|
{
|
|
|
@@ -4290,7 +4297,7 @@ void resize_buffers_renegotiate_mfl(int mfl, int legacy_renegotiation,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* END_CASE */
|
|
|
|
/* END_CASE */
|
|
|
|
|
|
|
|
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ENTROPY_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_CTR_DRBG_C:MBEDTLS_ECP_C:MBEDTLS_ECDSA_C */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:MBEDTLS_CERTS_C:MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_ENTROPY_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_CTR_DRBG_C:MBEDTLS_ECP_C:MBEDTLS_ECDSA_C */
|
|
|
|
void raw_key_agreement_fail(int bad_server_ecdhe_key)
|
|
|
|
void raw_key_agreement_fail(int bad_server_ecdhe_key)
|
|
|
|
{
|
|
|
|
{
|
|
|
|
enum { BUFFSIZE = 17000 };
|
|
|
|
enum { BUFFSIZE = 17000 };
|
|
|
|