1 #include <stdio.h>
2
3 #include "nx_secure_tls_api.h"
4
5 #include "tls_test_utility.h"
6
7 extern void test_control_return(UINT status);
8
9 static NX_SECURE_TLS_SESSION session;
10
11 void NX_Secure_TLS_ProcessHeader();
12
13 /* Test cases all taken from RFC 4231. Relevant section numbers included in comments. */
14
15 #ifdef CTEST
16 void test_application_define(void *first_unused_memory);
test_application_define(void * first_unused_memory)17 void test_application_define(void *first_unused_memory)
18 #else
19 void nx_secure_tls_header_test_application_define(void *first_unused_memory)
20 #endif
21 {
22
23 /* Print out test information banner. */
24 printf("NetX Secure Test: TLS Record header Test.............................");
25
26 NX_Secure_TLS_ProcessHeader();
27
28 printf("SUCCESS!\n");
29 test_control_return(0);
30
31 }
32
33
34 static struct {
35 UINT message_type;
36 UINT length;
37 UINT protocol_version;
38 UINT status;
39 } test_data[] =
40 {
41 { NX_SECURE_TLS_CHANGE_CIPHER_SPEC, 0x1234, 0x0303, NX_SUCCESS },
42 { NX_SECURE_TLS_ALERT, 0x5a5a, 0x0302, NX_SUCCESS },
43 { NX_SECURE_TLS_HANDSHAKE, 0x1111, 0x0303, NX_SUCCESS },
44 { NX_SECURE_TLS_APPLICATION_DATA, 0x0012, 0x0303, NX_SUCCESS },
45 };
46
47
48 static NX_PACKET_POOL pool_0;
49
50 #define NX_PACKET_POOL_SIZE ((1536 + sizeof(NX_PACKET)) * 32)
51
52 static ULONG packet_pool_area[NX_PACKET_POOL_SIZE/sizeof(ULONG) + 64 / sizeof(ULONG)];
53
54 UCHAR crypto_metadata[16000];
55 extern const NX_SECURE_TLS_CRYPTO nx_crypto_tls_ciphers;
56
TEST(NX_Secure_TLS,ProcessHeader)57 TEST(NX_Secure_TLS, ProcessHeader)
58 {
59
60 UINT status;
61 NX_PACKET *packet;
62 UCHAR header_buffer[6];
63 UCHAR header_data[6];
64 USHORT header_size;
65 UINT message_length;
66 USHORT message_type;
67
68 nx_system_initialize();
69
70 status = nx_packet_pool_create(&pool_0, "NetX Main Packet Pool", 1536, (ULONG*)(((int)packet_pool_area + 64) & ~63) , NX_PACKET_POOL_SIZE);
71
72 nx_secure_tls_session_create(&session, &nx_crypto_tls_ciphers, crypto_metadata, sizeof(crypto_metadata));
73 nx_secure_tls_session_reset(&session);
74 for(unsigned int i = 0; i < sizeof(test_data) / sizeof(test_data[0]); ++i)
75 {
76
77 nx_packet_allocate(&pool_0, &packet, NX_TCP_PACKET, NX_NO_WAIT);
78
79 // Build our test header to pass into the function.
80 header_buffer[0] = test_data[i].message_type;
81 header_buffer[1] = (UCHAR)(test_data[i].protocol_version >> 8);
82 header_buffer[2] = (UCHAR)test_data[i].protocol_version;
83 header_buffer[3] = (UCHAR)(test_data[i].length >> 8);
84 header_buffer[4] = (UCHAR)test_data[i].length;
85 header_size = 5;
86
87 nx_packet_data_append(packet, header_buffer, 5, &pool_0, NX_NO_WAIT);
88
89 /* Need to set the protocol version in our TLS session or the processing will fail. */
90 session.nx_secure_tls_protocol_version = test_data[i].protocol_version;
91
92 status = _nx_secure_tls_process_header(&session, packet, 0, &message_type, &message_length,
93 header_data, &header_size);
94 EXPECT_EQ(test_data[i].status, status);
95 EXPECT_EQ(test_data[i].message_type, message_type);
96 EXPECT_EQ(test_data[i].length, message_length);
97
98 nx_packet_release(packet);
99 }
100 }
101
102