1 #include <stdio.h>
2 
3 #include "nx_secure_tls_api.h"
4 
5 #include "tls_test_utility.h"
6 
7 extern void    test_control_return(UINT status);
8 
9 static NX_SECURE_TLS_SESSION session;
10 
11 void NX_Secure_TLS_ProcessHeader();
12 
13 /* Test cases all taken from RFC 4231. Relevant section numbers included in comments. */
14 
15 #ifdef CTEST
16 void test_application_define(void *first_unused_memory);
test_application_define(void * first_unused_memory)17 void test_application_define(void *first_unused_memory)
18 #else
19 void nx_secure_tls_header_test_application_define(void *first_unused_memory)
20 #endif
21 {
22 
23     /* Print out test information banner.  */
24     printf("NetX Secure Test:   TLS Record header Test.............................");
25 
26     NX_Secure_TLS_ProcessHeader();
27 
28     printf("SUCCESS!\n");
29     test_control_return(0);
30 
31 }
32 
33 
34 static struct {
35   UINT message_type;
36   UINT length;
37   UINT protocol_version;
38   UINT status;
39 } test_data[] =
40         {
41                 { NX_SECURE_TLS_CHANGE_CIPHER_SPEC, 0x1234, 0x0303, NX_SUCCESS },
42                 { NX_SECURE_TLS_ALERT, 0x5a5a, 0x0302, NX_SUCCESS },
43                 { NX_SECURE_TLS_HANDSHAKE, 0x1111, 0x0303, NX_SUCCESS },
44                 { NX_SECURE_TLS_APPLICATION_DATA, 0x0012, 0x0303, NX_SUCCESS },
45         };
46 
47 
48 static NX_PACKET_POOL    pool_0;
49 
50 #define NX_PACKET_POOL_SIZE ((1536 + sizeof(NX_PACKET)) * 32)
51 
52 static ULONG             packet_pool_area[NX_PACKET_POOL_SIZE/sizeof(ULONG) + 64 / sizeof(ULONG)];
53 
54 UCHAR crypto_metadata[16000];
55 extern const NX_SECURE_TLS_CRYPTO nx_crypto_tls_ciphers;
56 
TEST(NX_Secure_TLS,ProcessHeader)57 TEST(NX_Secure_TLS, ProcessHeader)
58 {
59 
60 UINT status;
61 NX_PACKET *packet;
62 UCHAR header_buffer[6];
63 UCHAR header_data[6];
64 USHORT header_size;
65 UINT message_length;
66 USHORT message_type;
67 
68     nx_system_initialize();
69 
70     status =  nx_packet_pool_create(&pool_0, "NetX Main Packet Pool", 1536,  (ULONG*)(((int)packet_pool_area + 64) & ~63) , NX_PACKET_POOL_SIZE);
71 
72     nx_secure_tls_session_create(&session, &nx_crypto_tls_ciphers, crypto_metadata, sizeof(crypto_metadata));
73     nx_secure_tls_session_reset(&session);
74     for(unsigned int i = 0; i < sizeof(test_data) / sizeof(test_data[0]); ++i)
75     {
76 
77         nx_packet_allocate(&pool_0, &packet, NX_TCP_PACKET, NX_NO_WAIT);
78 
79         // Build our test header to pass into the function.
80         header_buffer[0] = test_data[i].message_type;
81         header_buffer[1] = (UCHAR)(test_data[i].protocol_version >> 8);
82         header_buffer[2] = (UCHAR)test_data[i].protocol_version;
83         header_buffer[3] = (UCHAR)(test_data[i].length >> 8);
84         header_buffer[4] = (UCHAR)test_data[i].length;
85         header_size = 5;
86 
87         nx_packet_data_append(packet, header_buffer, 5, &pool_0, NX_NO_WAIT);
88 
89         /* Need to set the protocol version in our TLS session or the processing will fail. */
90         session.nx_secure_tls_protocol_version = test_data[i].protocol_version;
91 
92         status = _nx_secure_tls_process_header(&session, packet, 0, &message_type, &message_length,
93                                               header_data, &header_size);
94         EXPECT_EQ(test_data[i].status, status);
95         EXPECT_EQ(test_data[i].message_type, message_type);
96         EXPECT_EQ(test_data[i].length, message_length);
97 
98         nx_packet_release(packet);
99     }
100 }
101 
102