blob: f4ac368e83a4744d37a385f373faa25ef00c1309 [file] [log] [blame]
Paul Bakker16300582014-04-11 13:28:43 +02001/* BEGIN_HEADER */
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +00002#include "mbedtls/base64.h"
3#include "mbedtls/pem.h"
Andres AGa3b9adb2017-03-01 11:53:29 +00004#include "mbedtls/des.h"
5#include "mbedtls/aes.h"
Przemek Stekiel41b742f2022-08-04 12:13:53 +02006#include "legacy_or_psa.h"
7
Paul Bakker16300582014-04-11 13:28:43 +02008/* END_HEADER */
9
Andres AG9c94b692016-10-24 14:31:54 +010010/* BEGIN_CASE depends_on:MBEDTLS_PEM_WRITE_C */
Azim Khan5fcca462018-06-29 11:05:32 +010011void mbedtls_pem_write_buffer( char * start, char * end, data_t * buf,
Azim Khand30ca132017-06-09 04:32:58 +010012 char * result_str )
Paul Bakker16300582014-04-11 13:28:43 +020013{
Paul Bakkerbd51b262014-07-10 15:26:12 +020014 unsigned char *check_buf = NULL;
Paul Bakker16300582014-04-11 13:28:43 +020015 int ret;
Azim Khanf1aaec92017-05-30 14:23:15 +010016 size_t olen = 0, olen2 = 0;
Paul Bakker16300582014-04-11 13:28:43 +020017
Paul Bakker16300582014-04-11 13:28:43 +020018
Azim Khand30ca132017-06-09 04:32:58 +010019 ret = mbedtls_pem_write_buffer( start, end, buf->x, buf->len, NULL, 0, &olen );
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020020 TEST_ASSERT( ret == MBEDTLS_ERR_BASE64_BUFFER_TOO_SMALL );
Paul Bakker16300582014-04-11 13:28:43 +020021
Manuel Pégourié-Gonnard7551cb92015-05-26 16:04:06 +020022 check_buf = (unsigned char *) mbedtls_calloc( 1, olen );
Paul Bakker16300582014-04-11 13:28:43 +020023 TEST_ASSERT( check_buf != NULL );
24
Azim Khand30ca132017-06-09 04:32:58 +010025 ret = mbedtls_pem_write_buffer( start, end, buf->x, buf->len, check_buf, olen, &olen2 );
Paul Bakker16300582014-04-11 13:28:43 +020026
27 TEST_ASSERT( olen2 <= olen );
28 TEST_ASSERT( olen > strlen( (char*) result_str ) );
29 TEST_ASSERT( ret == 0 );
30 TEST_ASSERT( strncmp( (char *) check_buf, (char *) result_str, olen ) == 0 );
Paul Bakkerbd51b262014-07-10 15:26:12 +020031
32exit:
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020033 mbedtls_free( check_buf );
Paul Bakker16300582014-04-11 13:28:43 +020034}
35/* END_CASE */
Andres AG9c94b692016-10-24 14:31:54 +010036
Przemek Stekielbc0509a2022-08-10 15:10:15 +020037/* BEGIN_CASE depends_on:MBEDTLS_PEM_PARSE_C */
Andres AGa3b9adb2017-03-01 11:53:29 +000038void mbedtls_pem_read_buffer( char *header, char *footer, char *data,
Manuel Pégourié-Gonnard1df23b92022-02-07 12:59:10 +010039 char *pwd, int res, data_t *out )
Andres AG9c94b692016-10-24 14:31:54 +010040{
41 mbedtls_pem_context ctx;
Andres AGa3b9adb2017-03-01 11:53:29 +000042 int ret;
Andres AG9c94b692016-10-24 14:31:54 +010043 size_t use_len = 0;
Andres AGa3b9adb2017-03-01 11:53:29 +000044 size_t pwd_len = strlen( pwd );
Glenn Strauss72bd4e42022-02-04 10:32:17 -050045 const unsigned char *buf;
Andres AG9c94b692016-10-24 14:31:54 +010046
47 mbedtls_pem_init( &ctx );
48
Andres AGa3b9adb2017-03-01 11:53:29 +000049 ret = mbedtls_pem_read_buffer( &ctx, header, footer, (unsigned char *)data,
50 (unsigned char *)pwd, pwd_len, &use_len );
51 TEST_ASSERT( ret == res );
Glenn Strauss72bd4e42022-02-04 10:32:17 -050052 if( ret != 0 )
53 goto exit;
54
Glenn Strauss72bd4e42022-02-04 10:32:17 -050055 use_len = 0;
56 buf = mbedtls_pem_get_buffer( &ctx, &use_len );
Manuel Pégourié-Gonnard1df23b92022-02-07 12:59:10 +010057 TEST_EQUAL( use_len, out->len );
58 TEST_ASSERT( memcmp( out->x, buf, out->len ) == 0 );
Andres AG9c94b692016-10-24 14:31:54 +010059
60exit:
61 mbedtls_pem_free( &ctx );
62}
63/* END_CASE */