| /* BEGIN_HEADER */ |
| #include "debug_internal.h" |
| #include "string.h" |
| #include "mbedtls/pk.h" |
| #include <test/ssl_helpers.h> |
| |
| // Use a macro instead of sizeof(mbedtls_ms_time_t) because the expression store |
| // doesn't exclude entries based on depends_on headers, which would cause failures |
| // in builds without MBEDTLS_HAVE_TIME |
| #if defined(MBEDTLS_PLATFORM_MS_TIME_TYPE_MACRO) |
| # define MBEDTLS_MS_TIME_SIZE sizeof(MBEDTLS_PLATFORM_MS_TIME_TYPE_MACRO) |
| #else |
| # define MBEDTLS_MS_TIME_SIZE sizeof(int64_t) |
| #endif |
| |
| struct buffer_data { |
| char buf[2000]; |
| char *ptr; |
| }; |
| |
| #if defined(MBEDTLS_SSL_TLS_C) |
| static void string_debug(void *data, int level, const char *file, int line, const char *str) |
| { |
| struct buffer_data *buffer = (struct buffer_data *) data; |
| char *p = buffer->ptr; |
| ((void) level); |
| |
| memcpy(p, file, strlen(file)); |
| p += strlen(file); |
| |
| *p++ = '('; |
| *p++ = '0' + (line / 1000) % 10; |
| *p++ = '0' + (line / 100) % 10; |
| *p++ = '0' + (line / 10) % 10; |
| *p++ = '0' + (line / 1) % 10; |
| *p++ = ')'; |
| *p++ = ':'; |
| *p++ = ' '; |
| |
| #if defined(MBEDTLS_THREADING_C) |
| /* Skip "thread ID" (up to the first space) as it is not predictable */ |
| while (*str++ != ' ') { |
| ; |
| } |
| #endif |
| |
| memcpy(p, str, strlen(str)); |
| p += strlen(str); |
| |
| /* Detect if debug messages output partial lines and mark them */ |
| if (p[-1] != '\n') { |
| *p++ = '*'; |
| } |
| |
| buffer->ptr = p; |
| } |
| #endif /* MBEDTLS_SSL_TLS_C */ |
| /* END_HEADER */ |
| |
| /* BEGIN_DEPENDENCIES |
| * depends_on:MBEDTLS_DEBUG_C |
| * END_DEPENDENCIES |
| */ |
| |
| /* BEGIN_CASE */ |
| void printf_int_expr(intmax_t smuggle_format_expr, /* TODO: teach test framework about string expressions */ |
| intmax_t sizeof_x, intmax_t x, char *result) |
| { |
| const char *format = (char *) ((uintptr_t) smuggle_format_expr); |
| char *output = NULL; |
| const size_t n = strlen(result); |
| |
| /* Nominal case: buffer just large enough */ |
| TEST_CALLOC(output, n + 1); |
| if ((size_t) sizeof_x <= sizeof(int)) { // Any smaller integers would be promoted to an int due to calling a vararg function |
| TEST_EQUAL(n, mbedtls_snprintf(output, n + 1, format, (int) x)); |
| } else if (sizeof_x == sizeof(long)) { |
| TEST_EQUAL(n, mbedtls_snprintf(output, n + 1, format, (long) x)); |
| } else if (sizeof_x == sizeof(long long)) { |
| TEST_EQUAL(n, mbedtls_snprintf(output, n + 1, format, (long long) x)); |
| } else { |
| TEST_FAIL( |
| "sizeof_x <= sizeof(int) || sizeof_x == sizeof(long) || sizeof_x == sizeof(long long)"); |
| } |
| TEST_MEMORY_COMPARE(result, n + 1, output, n + 1); |
| |
| exit: |
| mbedtls_free(output); |
| output = NULL; |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:MBEDTLS_SSL_TLS_C */ |
| void debug_print_msg_threshold(int threshold, int level, char *file, |
| int line, char *result_str) |
| { |
| mbedtls_ssl_context ssl; |
| mbedtls_ssl_config conf; |
| struct buffer_data buffer; |
| |
| MD_PSA_INIT(); |
| |
| mbedtls_ssl_init(&ssl); |
| mbedtls_ssl_config_init(&conf); |
| memset(buffer.buf, 0, 2000); |
| buffer.ptr = buffer.buf; |
| |
| TEST_EQUAL(mbedtls_ssl_config_defaults(&conf, |
| MBEDTLS_SSL_IS_CLIENT, |
| MBEDTLS_SSL_TRANSPORT_STREAM, |
| MBEDTLS_SSL_PRESET_DEFAULT), |
| 0); |
| mbedtls_ssl_conf_rng(&conf, mbedtls_test_random, NULL); |
| mbedtls_ssl_conf_dbg(&conf, string_debug, &buffer); |
| |
| TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0); |
| |
| mbedtls_debug_set_threshold(threshold); |
| |
| mbedtls_debug_print_msg(&ssl, level, file, line, |
| "Text message, 2 == %d", 2); |
| |
| TEST_ASSERT(strcmp(buffer.buf, result_str) == 0); |
| |
| exit: |
| mbedtls_ssl_free(&ssl); |
| mbedtls_ssl_config_free(&conf); |
| MD_PSA_DONE(); |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:MBEDTLS_SSL_TLS_C */ |
| void mbedtls_debug_print_ret(char *file, int line, char *text, int value, |
| char *result_str) |
| { |
| mbedtls_ssl_context ssl; |
| mbedtls_ssl_config conf; |
| struct buffer_data buffer; |
| |
| MD_PSA_INIT(); |
| |
| mbedtls_ssl_init(&ssl); |
| mbedtls_ssl_config_init(&conf); |
| memset(buffer.buf, 0, 2000); |
| buffer.ptr = buffer.buf; |
| |
| TEST_EQUAL(mbedtls_ssl_config_defaults(&conf, |
| MBEDTLS_SSL_IS_CLIENT, |
| MBEDTLS_SSL_TRANSPORT_STREAM, |
| MBEDTLS_SSL_PRESET_DEFAULT), |
| 0); |
| mbedtls_ssl_conf_rng(&conf, mbedtls_test_random, NULL); |
| mbedtls_ssl_conf_dbg(&conf, string_debug, &buffer); |
| |
| TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0); |
| |
| mbedtls_debug_print_ret(&ssl, 0, file, line, text, value); |
| |
| TEST_ASSERT(strcmp(buffer.buf, result_str) == 0); |
| |
| exit: |
| mbedtls_ssl_free(&ssl); |
| mbedtls_ssl_config_free(&conf); |
| MD_PSA_DONE(); |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:MBEDTLS_SSL_TLS_C */ |
| void mbedtls_debug_print_buf(char *file, int line, char *text, |
| data_t *data, char *result_str) |
| { |
| mbedtls_ssl_context ssl; |
| mbedtls_ssl_config conf; |
| struct buffer_data buffer; |
| |
| MD_PSA_INIT(); |
| |
| mbedtls_ssl_init(&ssl); |
| mbedtls_ssl_config_init(&conf); |
| memset(buffer.buf, 0, 2000); |
| buffer.ptr = buffer.buf; |
| |
| TEST_EQUAL(mbedtls_ssl_config_defaults(&conf, |
| MBEDTLS_SSL_IS_CLIENT, |
| MBEDTLS_SSL_TRANSPORT_STREAM, |
| MBEDTLS_SSL_PRESET_DEFAULT), |
| 0); |
| mbedtls_ssl_conf_rng(&conf, mbedtls_test_random, NULL); |
| mbedtls_ssl_conf_dbg(&conf, string_debug, &buffer); |
| |
| TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0); |
| |
| mbedtls_debug_print_buf(&ssl, 0, file, line, text, data->x, data->len); |
| |
| TEST_ASSERT(strcmp(buffer.buf, result_str) == 0); |
| |
| exit: |
| mbedtls_ssl_free(&ssl); |
| mbedtls_ssl_config_free(&conf); |
| MD_PSA_DONE(); |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:MBEDTLS_SSL_TLS_C:MBEDTLS_FS_IO:MBEDTLS_X509_CRT_PARSE_C:!MBEDTLS_X509_REMOVE_INFO */ |
| void mbedtls_debug_print_crt(char *crt_file, char *file, int line, |
| char *prefix, char *result_str) |
| { |
| mbedtls_x509_crt crt; |
| mbedtls_ssl_context ssl; |
| mbedtls_ssl_config conf; |
| struct buffer_data buffer; |
| |
| mbedtls_ssl_init(&ssl); |
| mbedtls_ssl_config_init(&conf); |
| mbedtls_x509_crt_init(&crt); |
| MD_OR_USE_PSA_INIT(); |
| |
| memset(buffer.buf, 0, 2000); |
| buffer.ptr = buffer.buf; |
| |
| TEST_EQUAL(mbedtls_ssl_config_defaults(&conf, |
| MBEDTLS_SSL_IS_CLIENT, |
| MBEDTLS_SSL_TRANSPORT_STREAM, |
| MBEDTLS_SSL_PRESET_DEFAULT), |
| 0); |
| mbedtls_ssl_conf_rng(&conf, mbedtls_test_random, NULL); |
| mbedtls_ssl_conf_dbg(&conf, string_debug, &buffer); |
| |
| TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0); |
| |
| TEST_ASSERT(mbedtls_x509_crt_parse_file(&crt, crt_file) == 0); |
| mbedtls_debug_print_crt(&ssl, 0, file, line, prefix, &crt); |
| |
| TEST_ASSERT(strcmp(buffer.buf, result_str) == 0); |
| |
| exit: |
| mbedtls_x509_crt_free(&crt); |
| mbedtls_ssl_free(&ssl); |
| mbedtls_ssl_config_free(&conf); |
| MD_OR_USE_PSA_DONE(); |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:MBEDTLS_SSL_TLS_C:MBEDTLS_BIGNUM_C */ |
| void mbedtls_debug_print_mpi(char *value, char *file, int line, |
| char *prefix, char *result_str) |
| { |
| mbedtls_ssl_context ssl; |
| mbedtls_ssl_config conf; |
| struct buffer_data buffer; |
| mbedtls_mpi val; |
| |
| MD_PSA_INIT(); |
| |
| mbedtls_ssl_init(&ssl); |
| mbedtls_ssl_config_init(&conf); |
| mbedtls_mpi_init(&val); |
| memset(buffer.buf, 0, 2000); |
| buffer.ptr = buffer.buf; |
| |
| TEST_EQUAL(mbedtls_ssl_config_defaults(&conf, |
| MBEDTLS_SSL_IS_CLIENT, |
| MBEDTLS_SSL_TRANSPORT_STREAM, |
| MBEDTLS_SSL_PRESET_DEFAULT), |
| 0); |
| mbedtls_ssl_conf_rng(&conf, mbedtls_test_random, NULL); |
| mbedtls_ssl_conf_dbg(&conf, string_debug, &buffer); |
| |
| TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0); |
| |
| TEST_ASSERT(mbedtls_test_read_mpi(&val, value) == 0); |
| |
| mbedtls_debug_print_mpi(&ssl, 0, file, line, prefix, &val); |
| |
| TEST_ASSERT(strcmp(buffer.buf, result_str) == 0); |
| |
| exit: |
| mbedtls_mpi_free(&val); |
| mbedtls_ssl_free(&ssl); |
| mbedtls_ssl_config_free(&conf); |
| MD_PSA_DONE(); |
| } |
| /* END_CASE */ |