blob: 9546614125fcf46de8bf5328a23db5713d82e827 [file] [log] [blame]
Paul Bakker16300582014-04-11 13:28:43 +02001/* BEGIN_HEADER */
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +00002#include "mbedtls/base64.h"
3#include "mbedtls/pem.h"
Andres AGa3b9adb2017-03-01 11:53:29 +00004#include "mbedtls/des.h"
5#include "mbedtls/aes.h"
Manuel Pégourié-Gonnard07018f92022-09-15 11:29:35 +02006#include "mbedtls/legacy_or_psa.h"
Przemek Stekiel41b742f2022-08-04 12:13:53 +02007
Paul Bakker16300582014-04-11 13:28:43 +02008/* END_HEADER */
9
Andres AG9c94b692016-10-24 14:31:54 +010010/* BEGIN_CASE depends_on:MBEDTLS_PEM_WRITE_C */
Gilles Peskine449bd832023-01-11 14:50:10 +010011void mbedtls_pem_write_buffer(char *start, char *end, data_t *buf,
12 char *result_str)
Paul Bakker16300582014-04-11 13:28:43 +020013{
Paul Bakkerbd51b262014-07-10 15:26:12 +020014 unsigned char *check_buf = NULL;
Paul Bakker16300582014-04-11 13:28:43 +020015 int ret;
Azim Khanf1aaec92017-05-30 14:23:15 +010016 size_t olen = 0, olen2 = 0;
Paul Bakker16300582014-04-11 13:28:43 +020017
Paul Bakker16300582014-04-11 13:28:43 +020018
Gilles Peskine449bd832023-01-11 14:50:10 +010019 ret = mbedtls_pem_write_buffer(start, end, buf->x, buf->len, NULL, 0, &olen);
20 TEST_ASSERT(ret == MBEDTLS_ERR_BASE64_BUFFER_TOO_SMALL);
Paul Bakker16300582014-04-11 13:28:43 +020021
Gilles Peskine449bd832023-01-11 14:50:10 +010022 check_buf = (unsigned char *) mbedtls_calloc(1, olen);
23 TEST_ASSERT(check_buf != NULL);
Paul Bakker16300582014-04-11 13:28:43 +020024
Gilles Peskine449bd832023-01-11 14:50:10 +010025 ret = mbedtls_pem_write_buffer(start, end, buf->x, buf->len, check_buf, olen, &olen2);
Paul Bakker16300582014-04-11 13:28:43 +020026
Gilles Peskine449bd832023-01-11 14:50:10 +010027 TEST_ASSERT(olen2 <= olen);
28 TEST_ASSERT(olen > strlen((char *) result_str));
29 TEST_ASSERT(ret == 0);
30 TEST_ASSERT(strncmp((char *) check_buf, (char *) result_str, olen) == 0);
Paul Bakkerbd51b262014-07-10 15:26:12 +020031
32exit:
Gilles Peskine449bd832023-01-11 14:50:10 +010033 mbedtls_free(check_buf);
Paul Bakker16300582014-04-11 13:28:43 +020034}
35/* END_CASE */
Andres AG9c94b692016-10-24 14:31:54 +010036
Przemek Stekielbc0509a2022-08-10 15:10:15 +020037/* BEGIN_CASE depends_on:MBEDTLS_PEM_PARSE_C */
Gilles Peskine449bd832023-01-11 14:50:10 +010038void mbedtls_pem_read_buffer(char *header, char *footer, char *data,
39 char *pwd, int res, data_t *out)
Andres AG9c94b692016-10-24 14:31:54 +010040{
41 mbedtls_pem_context ctx;
Andres AGa3b9adb2017-03-01 11:53:29 +000042 int ret;
Andres AG9c94b692016-10-24 14:31:54 +010043 size_t use_len = 0;
Gilles Peskine449bd832023-01-11 14:50:10 +010044 size_t pwd_len = strlen(pwd);
Glenn Strauss72bd4e42022-02-04 10:32:17 -050045 const unsigned char *buf;
Andres AG9c94b692016-10-24 14:31:54 +010046
Manuel Pégourié-Gonnard1c2008f2023-03-16 10:20:29 +010047 MD_PSA_INIT();
48
Gilles Peskine449bd832023-01-11 14:50:10 +010049 mbedtls_pem_init(&ctx);
Andres AG9c94b692016-10-24 14:31:54 +010050
Gilles Peskine449bd832023-01-11 14:50:10 +010051 ret = mbedtls_pem_read_buffer(&ctx, header, footer, (unsigned char *) data,
52 (unsigned char *) pwd, pwd_len, &use_len);
53 TEST_ASSERT(ret == res);
54 if (ret != 0) {
Glenn Strauss72bd4e42022-02-04 10:32:17 -050055 goto exit;
Gilles Peskine449bd832023-01-11 14:50:10 +010056 }
Glenn Strauss72bd4e42022-02-04 10:32:17 -050057
Glenn Strauss72bd4e42022-02-04 10:32:17 -050058 use_len = 0;
Gilles Peskine449bd832023-01-11 14:50:10 +010059 buf = mbedtls_pem_get_buffer(&ctx, &use_len);
60 TEST_EQUAL(use_len, out->len);
61 TEST_ASSERT(memcmp(out->x, buf, out->len) == 0);
Andres AG9c94b692016-10-24 14:31:54 +010062
63exit:
Gilles Peskine449bd832023-01-11 14:50:10 +010064 mbedtls_pem_free(&ctx);
Manuel Pégourié-Gonnard1c2008f2023-03-16 10:20:29 +010065 MD_PSA_DONE();
Andres AG9c94b692016-10-24 14:31:54 +010066}
67/* END_CASE */