mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2025-08-08 17:42:09 +03:00
Combine hex parameters in a struct
This commit is contained in:
committed by
Mohammad Azim Khan
parent
5cfc06832e
commit
d30ca130e8
@@ -106,48 +106,33 @@ void ecjpake_selftest( )
|
||||
/* END_CASE */
|
||||
|
||||
/* BEGIN_CASE depends_on:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C */
|
||||
void read_round_one( int role, char * data, int ref_ret )
|
||||
void read_round_one( int role, HexParam_t * msg, int ref_ret )
|
||||
{
|
||||
mbedtls_ecjpake_context ctx;
|
||||
|
||||
const unsigned char * pw = NULL;
|
||||
const size_t pw_len = 0;
|
||||
|
||||
unsigned char *msg;
|
||||
size_t len;
|
||||
|
||||
mbedtls_ecjpake_init( &ctx );
|
||||
|
||||
msg = unhexify_alloc( data, &len );
|
||||
TEST_ASSERT( msg != NULL );
|
||||
|
||||
TEST_ASSERT( mbedtls_ecjpake_setup( &ctx, role,
|
||||
MBEDTLS_MD_SHA256, MBEDTLS_ECP_DP_SECP256R1, pw, pw_len ) == 0 );
|
||||
|
||||
TEST_ASSERT( mbedtls_ecjpake_read_round_one( &ctx, msg, len ) == ref_ret );
|
||||
TEST_ASSERT( mbedtls_ecjpake_read_round_one( &ctx, msg->x, msg->len ) == ref_ret );
|
||||
|
||||
exit:
|
||||
mbedtls_ecjpake_free( &ctx );
|
||||
mbedtls_free( msg );
|
||||
}
|
||||
/* END_CASE */
|
||||
|
||||
/* BEGIN_CASE depends_on:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C */
|
||||
void read_round_two_cli( char * data, int ref_ret )
|
||||
void read_round_two_cli( HexParam_t * msg, int ref_ret )
|
||||
{
|
||||
mbedtls_ecjpake_context ctx;
|
||||
|
||||
const unsigned char * pw = NULL;
|
||||
const size_t pw_len = 0;
|
||||
|
||||
unsigned char *msg;
|
||||
size_t len;
|
||||
|
||||
mbedtls_ecjpake_init( &ctx );
|
||||
|
||||
msg = unhexify_alloc( data, &len );
|
||||
TEST_ASSERT( msg != NULL );
|
||||
|
||||
TEST_ASSERT( mbedtls_ecjpake_setup( &ctx, MBEDTLS_ECJPAKE_CLIENT,
|
||||
MBEDTLS_MD_SHA256, MBEDTLS_ECP_DP_SECP256R1, pw, pw_len ) == 0 );
|
||||
|
||||
@@ -157,30 +142,22 @@ void read_round_two_cli( char * data, int ref_ret )
|
||||
ADD_SIZE( ecjpake_test_X3 ), ADD_SIZE( ecjpake_test_X4 ) )
|
||||
== 0 );
|
||||
|
||||
TEST_ASSERT( mbedtls_ecjpake_read_round_two( &ctx, msg, len ) == ref_ret );
|
||||
TEST_ASSERT( mbedtls_ecjpake_read_round_two( &ctx, msg->x, msg->len ) == ref_ret );
|
||||
|
||||
exit:
|
||||
mbedtls_ecjpake_free( &ctx );
|
||||
mbedtls_free( msg );
|
||||
}
|
||||
/* END_CASE */
|
||||
|
||||
/* BEGIN_CASE depends_on:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_SHA256_C */
|
||||
void read_round_two_srv( char * data, int ref_ret )
|
||||
void read_round_two_srv( HexParam_t * msg, int ref_ret )
|
||||
{
|
||||
mbedtls_ecjpake_context ctx;
|
||||
|
||||
const unsigned char * pw = NULL;
|
||||
const size_t pw_len = 0;
|
||||
|
||||
unsigned char *msg;
|
||||
size_t len;
|
||||
|
||||
mbedtls_ecjpake_init( &ctx );
|
||||
|
||||
msg = unhexify_alloc( data, &len );
|
||||
TEST_ASSERT( msg != NULL );
|
||||
|
||||
TEST_ASSERT( mbedtls_ecjpake_setup( &ctx, MBEDTLS_ECJPAKE_SERVER,
|
||||
MBEDTLS_MD_SHA256, MBEDTLS_ECP_DP_SECP256R1, pw, pw_len ) == 0 );
|
||||
|
||||
@@ -190,10 +167,9 @@ void read_round_two_srv( char * data, int ref_ret )
|
||||
ADD_SIZE( ecjpake_test_X1 ), ADD_SIZE( ecjpake_test_X2 ) )
|
||||
== 0 );
|
||||
|
||||
TEST_ASSERT( mbedtls_ecjpake_read_round_two( &ctx, msg, len ) == ref_ret );
|
||||
TEST_ASSERT( mbedtls_ecjpake_read_round_two( &ctx, msg->x, msg->len ) == ref_ret );
|
||||
|
||||
exit:
|
||||
mbedtls_ecjpake_free( &ctx );
|
||||
mbedtls_free( msg );
|
||||
}
|
||||
/* END_CASE */
|
||||
|
Reference in New Issue
Block a user