#ifdef HAVE_CONFIG_H
#include <config.h>
#endif
#ifndef WOLFSSL_USER_SETTINGS
#include <wolfssl/options.h>
#endif
#include <wolfssl/wolfcrypt/settings.h>
#undef TEST_OPENSSL_COEXIST
#undef OPENSSL_COEXIST
#include <wolfssl/wolfcrypt/types.h>
#include <wolfssl/ssl.h>
#include <wolfssl/test.h>
#include <wolfcrypt/test/test.h>
#ifndef SINGLE_THREADED
#ifdef OPENSSL_EXTRA
#include <wolfssl/openssl/ssl.h>
#endif
#include <wolfssl/wolfcrypt/sha256.h>
#include <wolfssl/wolfcrypt/ecc.h>
#include <examples/echoclient/echoclient.h>
#include <examples/echoserver/echoserver.h>
#include <examples/server/server.h>
#include <examples/client/client.h>
#if defined(HAVE_OCSP) && defined(HAVE_OCSP_RESPONDER) && \
!defined(NO_FILESYSTEM)
#include <examples/ocsp_responder/ocsp_responder.h>
#endif
#include <testsuite/utils.h>
#include <testsuite/utils.c>
#ifndef NO_SHA256
void file_test(const char* file, byte* check);
#endif
#if !defined(NO_WOLFSSL_SERVER) && !defined(NO_WOLFSSL_CLIENT) && \
!defined(NO_TLS)
#ifdef HAVE_STACK_SIZE
static THREAD_RETURN simple_test(func_args *args);
#else
static void simple_test(func_args *args);
#endif
static int test_tls(func_args* server_args);
#if !defined(NO_WOLFSSL_SERVER) && !defined(NO_WOLFSSL_CLIENT) && \
defined(HAVE_CRL) && defined(HAVE_CRL_MONITOR)
static int test_crl_monitor(void);
#endif
#if !defined(NO_WOLFSSL_SERVER) && !defined(NO_WOLFSSL_CLIENT) && \
!defined(NO_TLS) && !defined(NETOS) && defined(HAVE_OCSP) && \
defined(HAVE_OCSP_RESPONDER) && !defined(NO_FILESYSTEM) && \
!defined(NO_RSA) && defined(HAVE_CERTIFICATE_STATUS_REQUEST)
static int test_ocsp_responder(void);
#endif
static void show_ciphers(void);
static void cleanup_output(void);
static int validate_cleanup_output(void);
enum {
NUMARGS = 3
};
static const char *outputName;
#endif
int myoptind = 0;
char* myoptarg = NULL;
#ifndef NO_TESTSUITE_MAIN_DRIVER
static int testsuite_test(int argc, char** argv);
int main(int argc, char** argv)
{
return testsuite_test(argc, argv);
}
#endif
#ifdef HAVE_STACK_SIZE
static void *echoclient_test_wrapper(void* args) {
echoclient_test(args);
#if defined(HAVE_ECC) && defined(FP_ECC) && defined(HAVE_THREAD_LS)
wc_ecc_fp_free();
#endif
return (void *)0;
}
#endif
int testsuite_test(int argc, char** argv)
{
#if !defined(NO_WOLFSSL_SERVER) && !defined(NO_WOLFSSL_CLIENT) && \
!defined(NO_TLS) && \
(!defined(WOLF_CRYPTO_CB_ONLY_RSA) && !defined(WOLF_CRYPTO_CB_ONLY_ECC))
func_args server_args;
tcp_ready ready;
#if !defined(NETOS)
THREAD_TYPE serverThread;
int ret;
#endif
#ifndef USE_WINDOWS_API
const char *tempDir = NULL;
char tempName[128];
int tempName_len;
int tempName_Xnum;
#else
char tempName[] = "fnXXXXXX";
const int tempName_len = 8;
const int tempName_Xnum = 6;
#endif
#ifdef HAVE_STACK_SIZE
void *serverThreadStackContext = NULL;
#endif
#ifndef USE_WINDOWS_API
#ifdef XGETENV
tempDir = XGETENV("TMPDIR");
if (tempDir == NULL)
#endif
{
tempDir = "/tmp";
}
XSTRLCPY(tempName, tempDir, sizeof(tempName));
XSTRLCAT(tempName, "/testsuite-output-XXXXXX", sizeof(tempName));
tempName_len = (int)XSTRLEN(tempName);
tempName_Xnum = 6;
#endif
#ifdef HAVE_WNR
if (wc_InitNetRandom(wnrConfig, NULL, 5000) != 0) {
err_sys("Whitewood netRandom global config failed");
return -1237;
}
#endif
StartTCP();
server_args.argc = argc;
server_args.argv = argv;
wolfSSL_Init();
#if defined(DEBUG_WOLFSSL) && !defined(HAVE_VALGRIND)
wolfSSL_Debugging_ON();
#endif
#if !defined(WOLFSSL_TIRTOS)
ChangeToWolfRoot();
#endif
#ifdef WOLFSSL_TIRTOS
fdOpenSession(Task_self());
#endif
server_args.signal = &ready;
InitTcpReady(&ready);
#ifndef NO_CRYPT_TEST
#ifdef HAVE_STACK_SIZE
StackSizeCheck(&server_args, wolfcrypt_test);
#else
wolfcrypt_test(&server_args);
#endif
if (server_args.return_code != 0) return server_args.return_code;
#endif
#ifdef HAVE_STACK_SIZE
StackSizeCheck(&server_args, (THREAD_RETURN (*)(void *))simple_test);
#else
simple_test(&server_args);
#endif
if (server_args.return_code != 0)
return server_args.return_code;
#if !defined(NETOS)
FreeTcpReady(&ready);
InitTcpReady(&ready);
#ifdef HAVE_STACK_SIZE
StackSizeCheck_launch(&server_args, echoserver_test, &serverThread,
&serverThreadStackContext);
#else
start_thread(echoserver_test, &server_args, &serverThread);
#endif
outputName = mymktemp(tempName, tempName_len, tempName_Xnum);
if (outputName == NULL) {
printf("Could not create unique file name");
return EXIT_FAILURE;
}
ret = test_tls(&server_args);
if (ret != 0) {
cleanup_output();
return ret;
}
#ifdef HAVE_STACK_SIZE
fputs("reaping echoserver_test: ", stdout);
StackSizeCheck_reap(serverThread, serverThreadStackContext);
#else
join_thread(serverThread);
#endif
if (server_args.return_code != 0) {
cleanup_output();
return server_args.return_code;
}
#if !defined(NO_WOLFSSL_SERVER) && !defined(NO_WOLFSSL_CLIENT) && \
defined(HAVE_CRL) && defined(HAVE_CRL_MONITOR)
ret = test_crl_monitor();
if (ret != 0) {
cleanup_output();
return ret;
}
#endif
#if !defined(NO_WOLFSSL_SERVER) && !defined(NO_WOLFSSL_CLIENT) && \
!defined(NO_TLS) && !defined(NETOS) && defined(HAVE_OCSP) && \
defined(HAVE_OCSP_RESPONDER) && !defined(NO_FILESYSTEM) && \
!defined(NO_RSA) && defined(HAVE_CERTIFICATE_STATUS_REQUEST)
ret = test_ocsp_responder();
if (ret != 0) {
cleanup_output();
return ret;
}
#endif
#endif
show_ciphers();
#if !defined(NETOS)
ret = validate_cleanup_output();
if (ret != 0)
return EXIT_FAILURE;
#endif
wolfSSL_Cleanup();
FreeTcpReady(&ready);
#ifdef WOLFSSL_TIRTOS
fdCloseSession(Task_self());
#endif
#ifdef HAVE_WNR
if (wc_FreeNetRandom() < 0)
err_sys("Failed to free netRandom context");
#endif
printf("\nAll tests passed!\n");
#else
(void)argc;
(void)argv;
#endif
return EXIT_SUCCESS;
}
#if !defined(NO_WOLFSSL_SERVER) && !defined(NO_WOLFSSL_CLIENT) && \
defined(HAVE_CRL) && defined(HAVE_CRL_MONITOR)
#define CRL_MONITOR_TEST_ROUNDS 6
#define CRL_MONITOR_REM_FILE_ATTEMPTS 20
static int test_crl_monitor(void)
{
func_args server_args;
func_args client_args;
THREAD_TYPE serverThread;
tcp_ready ready;
char buf[128];
char tmpDir[16];
char rounds[4];
char portNum[8];
const char* serverArgv[] = {
"testsuite",
"-A", "certs/ca-cert.pem",
"--crl-dir", tmpDir,
"-C", rounds,
"--quieter",
"-x",
"-p", "0"
};
const char* clientArgv[] = {
"testsuite",
"-C",
"-c", "certs/server-cert.pem",
"-k", "certs/server-key.pem",
"--quieter",
"-H", "exitWithRet",
"-p", portNum
};
int ret = -1;
int i = -1, j;
XMEMSET(tmpDir, '\0', sizeof(tmpDir));
printf("\nRunning CRL monitor test\n");
(void)XSNPRINTF(rounds, sizeof(rounds), "%d", CRL_MONITOR_TEST_ROUNDS);
XMEMSET(&server_args, 0, sizeof(func_args));
XMEMSET(&client_args, 0, sizeof(func_args));
if (create_tmp_dir(tmpDir, sizeof(tmpDir) - 1) == NULL) {
fprintf(stderr, "Failed to create tmp dir");
goto cleanup;
}
server_args.argv = (char**)serverArgv;
server_args.argc = sizeof(serverArgv) / sizeof(*serverArgv);
client_args.signal = server_args.signal = &ready;
client_args.argv = (char**)clientArgv;
client_args.argc = sizeof(clientArgv) / sizeof(*clientArgv);
InitTcpReady(&ready);
start_thread(server_test, &server_args, &serverThread);
wait_tcp_ready(&server_args);
(void)XSNPRINTF(portNum, sizeof(portNum), "%d", server_args.signal->port);
for (i = 0; i < CRL_MONITOR_TEST_ROUNDS; i++) {
int expectFail;
if (i % 2 == 0) {
(void)XSNPRINTF(buf, sizeof(buf), "%s/%s", tmpDir, "crl.pem");
if (STAGE_FILE("certs/crl/crl.pem", buf) != 0) {
fprintf(stderr, "[%d] Failed to copy file to %s\n", i, buf);
goto cleanup;
}
(void)XSNPRINTF(buf, sizeof(buf), "%s/%s", tmpDir, "crl.revoked");
for (j = 0; j < CRL_MONITOR_REM_FILE_ATTEMPTS; j++) {
if (i == 0 || rem_file(buf) == 0)
break;
XSLEEP_MS(100);
}
if (j == CRL_MONITOR_REM_FILE_ATTEMPTS) {
fprintf(stderr, "[%d] Failed to remove file %s\n", i, buf);
goto cleanup;
}
expectFail = 0;
}
else {
(void)XSNPRINTF(buf, sizeof(buf), "%s/%s", tmpDir, "crl.revoked");
if (STAGE_FILE("certs/crl/crl.revoked", buf) != 0) {
fprintf(stderr, "[%d] Failed to copy file to %s\n", i, buf);
goto cleanup;
}
(void)XSNPRINTF(buf, sizeof(buf), "%s/%s", tmpDir, "crl.pem");
for (j = 0; j < CRL_MONITOR_REM_FILE_ATTEMPTS; j++) {
if (rem_file(buf) == 0)
break;
XSLEEP_MS(100);
}
if (j == CRL_MONITOR_REM_FILE_ATTEMPTS) {
fprintf(stderr, "[%d] Failed to remove file %s\n", i, buf);
goto cleanup;
}
#ifndef WOLFSSL_NO_CLIENT_AUTH
expectFail = 1;
#else
expectFail = 0;
#endif
}
XSLEEP_MS(100);
client_args.return_code = 0;
client_test(&client_args);
if (!expectFail) {
if (client_args.return_code != 0) {
fprintf(stderr, "[%d] Incorrect return %d\n", i,
client_args.return_code);
goto cleanup;
}
}
else {
if (client_args.return_code == 0) {
fprintf(stderr, "[%d] Expected failure\n", i);
goto cleanup;
}
}
}
join_thread(serverThread);
ret = 0;
cleanup:
if (ret != 0 && i >= 0)
fprintf(stderr, "test_crl_monitor failed on iteration %d\n", i);
(void)XSNPRINTF(buf, sizeof(buf), "%s/%s", tmpDir, "crl.pem");
rem_file(buf);
(void)XSNPRINTF(buf, sizeof(buf), "%s/%s", tmpDir, "crl.revoked");
rem_file(buf);
(void)rem_dir(tmpDir);
return ret;
}
#endif
#if !defined(NO_WOLFSSL_SERVER) && !defined(NO_WOLFSSL_CLIENT) && \
!defined(NO_TLS) && !defined(NETOS) && defined(HAVE_OCSP) && \
defined(HAVE_OCSP_RESPONDER) && !defined(NO_FILESYSTEM) && \
!defined(NO_RSA) && defined(HAVE_CERTIFICATE_STATUS_REQUEST)
static int run_ocsp_responder_test_case(const char* serverCert,
const char* serverKey,
int expectPass)
{
func_args respArgs;
func_args svrArgs;
func_args cliArgs;
THREAD_TYPE respThread;
THREAD_TYPE svrThread;
tcp_ready respReady;
tcp_ready svrReady;
char ocspUrl[64];
char svrPortStr[8];
char* respArgv[12];
char* svrArgv[15];
char* cliArgv[12];
int ret = -1;
respArgv[0] = (char*)"ocsp_responder";
respArgv[1] = (char*)"-p"; respArgv[2] = (char*)"0";
respArgv[3] = (char*)"-n"; respArgv[4] = (char*)"1";
respArgv[5] = (char*)"-c";
respArgv[6] = (char*)"certs/ocsp/intermediate1-ca-cert.pem";
respArgv[7] = (char*)"-k";
respArgv[8] = (char*)"certs/ocsp/intermediate1-ca-key.pem";
respArgv[9] = (char*)"-i";
respArgv[10] = (char*)"certs/ocsp/index-intermediate1-ca-issued-certs.txt";
respArgv[11] = NULL;
XMEMSET(&respArgs, 0, sizeof(respArgs));
InitTcpReady(&respReady);
respArgs.signal = &respReady;
respArgs.argc = 11;
respArgs.argv = respArgv;
start_thread(ocsp_responder_test, &respArgs, &respThread);
wait_tcp_ready(&respArgs);
(void)XSNPRINTF(ocspUrl, sizeof(ocspUrl),
"http://127.0.0.1:%d", (int)respReady.port);
svrArgv[0] = (char*)"testsuite";
svrArgv[1] = (char*)"-c"; svrArgv[2] = (char*)serverCert;
svrArgv[3] = (char*)"-k"; svrArgv[4] = (char*)serverKey;
svrArgv[5] = (char*)"-d";
svrArgv[6] = (char*)"-x";
svrArgv[7] = (char*)"-C"; svrArgv[8] = (char*)"1";
svrArgv[9] = (char*)"-O"; svrArgv[10] = ocspUrl;
svrArgv[11] = (char*)"--quieter";
svrArgv[12] = (char*)"-p"; svrArgv[13] = (char*)"0";
svrArgv[14] = NULL;
XMEMSET(&svrArgs, 0, sizeof(svrArgs));
InitTcpReady(&svrReady);
svrArgs.signal = &svrReady;
svrArgs.argc = 14;
svrArgs.argv = svrArgv;
start_thread(server_test, &svrArgs, &svrThread);
wait_tcp_ready(&svrArgs);
(void)XSNPRINTF(svrPortStr, sizeof(svrPortStr), "%d",
(int)svrArgs.signal->port);
cliArgv[0] = (char*)"testsuite";
cliArgv[1] = (char*)"-A";
cliArgv[2] = (char*)"certs/ocsp/root-ca-cert.pem";
cliArgv[3] = (char*)"-C";
cliArgv[4] = (char*)"-W"; cliArgv[5] = (char*)"1";
cliArgv[6] = (char*)"-H"; cliArgv[7] = (char*)"exitWithRet";
cliArgv[8] = (char*)"--quieter";
cliArgv[9] = (char*)"-p"; cliArgv[10] = svrPortStr;
cliArgv[11] = NULL;
XMEMSET(&cliArgs, 0, sizeof(cliArgs));
cliArgs.signal = &svrReady;
cliArgs.argc = 11;
cliArgs.argv = cliArgv;
client_test(&cliArgs);
join_thread(svrThread);
join_thread(respThread);
FreeTcpReady(&svrReady);
FreeTcpReady(&respReady);
if (expectPass) {
if (cliArgs.return_code != 0) {
fprintf(stderr, "OCSP stapling test: expected success, "
"client returned %d\n", cliArgs.return_code);
}
else {
ret = 0;
}
}
else {
if (cliArgs.return_code == 0) {
fprintf(stderr, "OCSP stapling test: expected failure "
"(revoked cert), but client returned 0\n");
}
else {
ret = 0;
}
}
return ret;
}
static int test_ocsp_responder(void)
{
int ret;
printf("\nRunning OCSP responder test\n");
ret = run_ocsp_responder_test_case("certs/ocsp/server1-cert.pem",
"certs/ocsp/server1-key.pem", 1);
if (ret != 0) {
fprintf(stderr, "OCSP responder test (good cert) failed\n");
return ret;
}
ret = run_ocsp_responder_test_case("certs/ocsp/server2-cert.pem",
"certs/ocsp/server2-key.pem", 0);
if (ret != 0) {
fprintf(stderr, "OCSP responder test (revoked cert) failed\n");
return ret;
}
return 0;
}
#endif
#if !defined(NO_WOLFSSL_SERVER) && !defined(NO_WOLFSSL_CLIENT) && \
!defined(NO_TLS) && \
(!defined(WOLF_CRYPTO_CB_ONLY_RSA) && !defined(WOLF_CRYPTO_CB_ONLY_ECC))
static int test_tls(func_args* server_args)
{
func_args echo_args;
char* myArgv[NUMARGS];
char arg[3][128];
printf("\nRunning TLS test\n");
myArgv[0] = arg[0];
myArgv[1] = arg[1];
myArgv[2] = arg[2];
echo_args.argc = 3;
echo_args.argv = myArgv;
XSTRLCPY(arg[0], "testsuite", sizeof(arg[0]));
XSTRLCPY(arg[1], "input", sizeof(arg[1]));
XSTRLCPY(arg[2], outputName, sizeof(arg[2]));
echo_args.signal = server_args->signal;
wait_tcp_ready(server_args);
#ifdef HAVE_STACK_SIZE
fputs("echoclient_test #1: ", stdout);
StackSizeCheck(&echo_args, echoclient_test_wrapper);
#else
echoclient_test(&echo_args);
#endif
if (echo_args.return_code != 0)
return echo_args.return_code;
echo_args.argc = 2;
XSTRLCPY(arg[1], "quit", sizeof(arg[1]));
#ifdef HAVE_STACK_SIZE
fputs("echoclient_test #2: ", stdout);
StackSizeCheck(&echo_args, echoclient_test_wrapper);
#else
echoclient_test(&echo_args);
#endif
if (echo_args.return_code != 0)
return echo_args.return_code;
return 0;
}
static void show_ciphers(void)
{
char ciphers[WOLFSSL_CIPHER_LIST_MAX_SIZE];
XMEMSET(ciphers, 0, sizeof(ciphers));
wolfSSL_get_ciphers(ciphers, sizeof(ciphers)-1);
printf("ciphers = %s\n", ciphers);
}
static void cleanup_output(void)
{
int ret = 0;
ret = remove(outputName);
if (ret < 0) {
fprintf(stderr, "remove(%s) failed: %d\n", outputName, ret);
}
}
static int validate_cleanup_output(void)
{
#ifndef NO_SHA256
byte input[WC_SHA256_DIGEST_SIZE];
byte output[WC_SHA256_DIGEST_SIZE];
file_test("input", input);
file_test(outputName, output);
#endif
cleanup_output();
#ifndef NO_SHA256
if (memcmp(input, output, sizeof(input)) != 0)
return 1;
#endif
return 0;
}
#ifdef HAVE_STACK_SIZE
static THREAD_RETURN simple_test(func_args* args)
#else
static void simple_test(func_args* args)
#endif
{
THREAD_TYPE serverThread;
int i;
func_args svrArgs;
char *svrArgv[9];
char argvs[9][32];
func_args cliArgs;
char *cliArgv[NUMARGS];
char argvc[3][32];
printf("\nRunning simple test\n");
for (i = 0; i < 9; i++)
svrArgv[i] = argvs[i];
for (i = 0; i < 3; i++)
cliArgv[i] = argvc[i];
XSTRLCPY(argvs[0], "SimpleServer", sizeof(argvs[0]));
svrArgs.argc = 1;
svrArgs.argv = svrArgv;
svrArgs.return_code = 0;
#if !defined(USE_WINDOWS_API) && !defined(WOLFSSL_SNIFFER) && \
!defined(WOLFSSL_TIRTOS)
XSTRLCPY(argvs[svrArgs.argc++], "-p", sizeof(argvs[svrArgs.argc]));
XSTRLCPY(argvs[svrArgs.argc++], "0", sizeof(argvs[svrArgs.argc]));
#endif
args->return_code = 0;
svrArgs.signal = args->signal;
start_thread(server_test, &svrArgs, &serverThread);
wait_tcp_ready(&svrArgs);
XSTRLCPY(argvc[0], "SimpleClient", sizeof(argvc[0]));
cliArgs.argv = cliArgv;
cliArgs.return_code = 0;
#ifndef USE_WINDOWS_API
cliArgs.argc = NUMARGS;
XSTRLCPY(argvc[1], "-p", sizeof(argvc[1]));
(void)snprintf(argvc[2], sizeof(argvc[2]), "%d", (int)svrArgs.signal->port);
#else
cliArgs.argc = 1;
#endif
client_test(&cliArgs);
if (cliArgs.return_code != 0) {
args->return_code = cliArgs.return_code;
#ifdef HAVE_STACK_SIZE
return (THREAD_RETURN)0;
#else
return;
#endif
}
join_thread(serverThread);
if (svrArgs.return_code != 0) args->return_code = svrArgs.return_code;
#ifdef HAVE_STACK_SIZE
return (THREAD_RETURN)0;
#endif
}
#endif
#ifndef NO_SHA256
void file_test(const char* file, byte* check)
{
FILE* f;
int i = 0, j, ret;
wc_Sha256 sha256;
byte buf[1024];
byte shasum[WC_SHA256_DIGEST_SIZE];
ret = wc_InitSha256(&sha256);
if (ret != 0) {
printf("Can't wc_InitSha256 %d\n", ret);
return;
}
if( !( f = fopen( file, "rb" ) )) {
printf("Can't open %s\n", file);
return;
}
while( ( i = (int)fread(buf, 1, sizeof(buf), f )) > 0 ) {
if (ferror(f)) {
printf("I/O error reading %s\n", file);
fclose(f);
return;
}
ret = wc_Sha256Update(&sha256, buf, (word32)i);
if (ret != 0) {
printf("Can't wc_Sha256Update %d\n", ret);
fclose(f);
return;
}
if (feof(f))
break;
}
ret = wc_Sha256Final(&sha256, shasum);
wc_Sha256Free(&sha256);
if (ret != 0) {
printf("Can't wc_Sha256Final %d\n", ret);
fclose(f);
return;
}
XMEMCPY(check, shasum, sizeof(shasum));
for(j = 0; j < WC_SHA256_DIGEST_SIZE; ++j )
printf( "%02x", shasum[j] );
printf(" %s\n", file);
fclose(f);
}
#endif
#else
int myoptind = 0;
char* myoptarg = NULL;
int main(int argc, char** argv)
{
func_args wolfcrypt_test_args;
wolfcrypt_test_args.argc = argc;
wolfcrypt_test_args.argv = argv;
wolfSSL_Init();
ChangeToWolfRoot();
wolfcrypt_test(&wolfcrypt_test_args);
if (wolfcrypt_test_args.return_code != 0)
return wolfcrypt_test_args.return_code;
wolfSSL_Cleanup();
printf("\nAll tests passed!\n");
return EXIT_SUCCESS;
}
#endif