Feature/mbedtls (#84)
* try to import mbedtls and build it * add stubs socket class * some boilterplate, read and write function implemented * more boilterplate / current error in handshake because no CA cert is setup * add something so skip ca verification, can ws curl https://google.com ! * cleanup / close implemented * tweak CMakefiles * typo in include * update readme * disable unittests
This commit is contained in:
committed by
GitHub
parent
ba4a9e1586
commit
06cbebe22e
117
third_party/mbedtls/crypto/tests/suites/test_suite_base64.function
vendored
Normal file
117
third_party/mbedtls/crypto/tests/suites/test_suite_base64.function
vendored
Normal file
@ -0,0 +1,117 @@
|
||||
/* BEGIN_HEADER */
|
||||
#include "mbedtls/base64.h"
|
||||
/* END_HEADER */
|
||||
|
||||
/* BEGIN_DEPENDENCIES
|
||||
* depends_on:MBEDTLS_BASE64_C
|
||||
* END_DEPENDENCIES
|
||||
*/
|
||||
|
||||
/* BEGIN_CASE */
|
||||
void mbedtls_base64_encode( char * src_string, char * dst_string,
|
||||
int dst_buf_size, int result )
|
||||
{
|
||||
unsigned char src_str[1000];
|
||||
unsigned char dst_str[1000];
|
||||
size_t len;
|
||||
|
||||
memset(src_str, 0x00, 1000);
|
||||
memset(dst_str, 0x00, 1000);
|
||||
|
||||
strncpy( (char *) src_str, src_string, sizeof(src_str) - 1 );
|
||||
TEST_ASSERT( mbedtls_base64_encode( dst_str, dst_buf_size, &len, src_str, strlen( (char *) src_str ) ) == result );
|
||||
if( result == 0 )
|
||||
{
|
||||
TEST_ASSERT( strcmp( (char *) dst_str, dst_string ) == 0 );
|
||||
}
|
||||
}
|
||||
/* END_CASE */
|
||||
|
||||
/* BEGIN_CASE */
|
||||
void mbedtls_base64_decode( char * src_string, char * dst_string, int result )
|
||||
{
|
||||
unsigned char src_str[1000];
|
||||
unsigned char dst_str[1000];
|
||||
size_t len;
|
||||
int res;
|
||||
|
||||
memset(src_str, 0x00, 1000);
|
||||
memset(dst_str, 0x00, 1000);
|
||||
|
||||
strncpy( (char *) src_str, src_string, sizeof(src_str) - 1 );
|
||||
res = mbedtls_base64_decode( dst_str, sizeof( dst_str ), &len, src_str, strlen( (char *) src_str ) );
|
||||
TEST_ASSERT( res == result );
|
||||
if( result == 0 )
|
||||
{
|
||||
TEST_ASSERT( strcmp( (char *) dst_str, dst_string ) == 0 );
|
||||
}
|
||||
}
|
||||
/* END_CASE */
|
||||
|
||||
/* BEGIN_CASE */
|
||||
void base64_encode_hex( data_t * src, char * dst, int dst_buf_size,
|
||||
int result )
|
||||
{
|
||||
unsigned char *res = NULL;
|
||||
size_t len;
|
||||
|
||||
res = zero_alloc( dst_buf_size );
|
||||
|
||||
TEST_ASSERT( mbedtls_base64_encode( res, dst_buf_size, &len, src->x, src->len ) == result );
|
||||
if( result == 0 )
|
||||
{
|
||||
TEST_ASSERT( len == strlen( dst ) );
|
||||
TEST_ASSERT( memcmp( dst, res, len ) == 0 );
|
||||
}
|
||||
|
||||
exit:
|
||||
mbedtls_free( res );
|
||||
}
|
||||
/* END_CASE */
|
||||
|
||||
/* BEGIN_CASE */
|
||||
void base64_decode_hex( char * src, data_t * dst, int dst_buf_size,
|
||||
int result )
|
||||
{
|
||||
unsigned char *res = NULL;
|
||||
size_t len;
|
||||
|
||||
res = zero_alloc( dst_buf_size );
|
||||
|
||||
TEST_ASSERT( mbedtls_base64_decode( res, dst_buf_size, &len, (unsigned char *) src,
|
||||
strlen( src ) ) == result );
|
||||
if( result == 0 )
|
||||
{
|
||||
TEST_ASSERT( len == dst->len );
|
||||
TEST_ASSERT( memcmp( dst->x, res, len ) == 0 );
|
||||
}
|
||||
|
||||
exit:
|
||||
mbedtls_free( res );
|
||||
}
|
||||
/* END_CASE */
|
||||
|
||||
/* BEGIN_CASE */
|
||||
void base64_decode_hex_src( data_t * src, char * dst_ref, int result )
|
||||
{
|
||||
unsigned char dst[1000] = { 0 };
|
||||
size_t len;
|
||||
|
||||
TEST_ASSERT( mbedtls_base64_decode( dst, sizeof( dst ), &len, src->x, src->len ) == result );
|
||||
if( result == 0 )
|
||||
{
|
||||
TEST_ASSERT( len == strlen( dst_ref ) );
|
||||
TEST_ASSERT( memcmp( dst, dst_ref, len ) == 0 );
|
||||
}
|
||||
|
||||
exit:
|
||||
;;
|
||||
}
|
||||
/* END_CASE */
|
||||
|
||||
/* BEGIN_CASE depends_on:MBEDTLS_SELF_TEST */
|
||||
void base64_selftest( )
|
||||
{
|
||||
TEST_ASSERT( mbedtls_base64_self_test( 1 ) == 0 );
|
||||
}
|
||||
/* END_CASE */
|
Reference in New Issue
Block a user