mirror of
				https://github.com/espressif/esp-idf.git
				synced 2025-11-03 16:41:44 +01:00 
			
		
		
		
	
		
			
				
	
	
		
			129 lines
		
	
	
		
			7.0 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			129 lines
		
	
	
		
			7.0 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
// Copyright 2021 Espressif Systems (Shanghai) PTE LTD
 | 
						|
//
 | 
						|
// Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
// you may not use this file except in compliance with the License.
 | 
						|
// You may obtain a copy of the License at
 | 
						|
 | 
						|
//     http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
//
 | 
						|
// Unless required by applicable law or agreed to in writing, software
 | 
						|
// distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
// See the License for the specific language governing permissions and
 | 
						|
// limitations under the License.
 | 
						|
 | 
						|
#include "test_utils.h"
 | 
						|
#include "esp_tls.h"
 | 
						|
#include "unity.h"
 | 
						|
#include "esp_err.h"
 | 
						|
#include "esp_log.h"
 | 
						|
#if SOC_SHA_SUPPORT_PARALLEL_ENG
 | 
						|
#include "sha/sha_parallel_engine.h"
 | 
						|
#elif SOC_SHA_SUPPORT_DMA
 | 
						|
#include "sha/sha_dma.h"
 | 
						|
#endif
 | 
						|
 | 
						|
const char *test_cert_pem =   "-----BEGIN CERTIFICATE-----\n"\
 | 
						|
                              "MIICrDCCAZQCCQD88gCs5AFs/jANBgkqhkiG9w0BAQsFADAYMRYwFAYDVQQDDA1F\n"\
 | 
						|
                              "U1AtVExTIFRlc3RzMB4XDTIxMDEwNzAxMTc1OVoXDTMxMDEwNTAxMTc1OVowGDEW\n"\
 | 
						|
                              "MBQGA1UEAwwNRVNQLVRMUyBUZXN0czCCASIwDQYJKoZIhvcNAQEBBQADggEPADCC\n"\
 | 
						|
                              "AQoCggEBAMn4KrV9M40PcxDNdmwfFMXI5cydrV3nm1o1QzcDDuYn1YfxoCCcaIc0\n"\
 | 
						|
                              "JgHox948u94z32vnJU5qXVgEvwkD3nWGzWqjkwB1NlnIuF10XQFLa8cIas7Db/hd\n"\
 | 
						|
                              "KygbIbYwhtwQAQFEt0/MiUbA+m+rjzvffV9pDcPRlCOE6pC+X3iC7Ft3aevkEBtR\n"\
 | 
						|
                              "EPPN0sxGx0iFRIsglpDcEKUONYjF46q90LDmjA4EbqvK7XBuXjZ1QRGcQ871/8Ht\n"\
 | 
						|
                              "LzHjZKc5IcIxBVoVNJo0sgHHBOaG7J8x2eAJX8DfK6GseGZDbuptiJyZoj4nmOXx\n"\
 | 
						|
                              "iToEPG08DPlMHy90TDHXZbVeXNHzFV8CAwEAATANBgkqhkiG9w0BAQsFAAOCAQEA\n"\
 | 
						|
                              "n3oD/VONY9WIf0jvlAn62+VheABHFQqMrH02ucDxj0lRlgS4Z6+gRN2ITkzs8eNN\n"\
 | 
						|
                              "UglqVZCjU1mstL10tD8mwH8ShelxTWzHavc+GmAiEQx9C9zpMa7Oa+t6xFZCF6mi\n"\
 | 
						|
                              "c9h+3oNeql7zugcHjFXnlPd+oFhDTzH8R4Y+drZyR5LZsT5SNeEvLs7DEBMHNdKC\n"\
 | 
						|
                              "GOuWb7JNNhZKvNTymfCtM98s+7cbukwPogfWbaI+CjT49v4NOQlHNSN2Ldxpg9eh\n"\
 | 
						|
                              "fDgV8LqpUghnYjpe5lHgEqSZxV57z+amv5DRJNsH5+hB4k6HnRjfjQZqHUPlQ7Bk\n"\
 | 
						|
                              "pC4dhDzYsU8L1MN9e2i5Ig==\n"\
 | 
						|
                              "-----END CERTIFICATE-----\n";
 | 
						|
 | 
						|
const char *test_key_pem =    "-----BEGIN PRIVATE KEY-----\n"\
 | 
						|
                              "MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQDJ+Cq1fTOND3MQ\n"\
 | 
						|
                              "zXZsHxTFyOXMna1d55taNUM3Aw7mJ9WH8aAgnGiHNCYB6MfePLveM99r5yVOal1Y\n"\
 | 
						|
                              "BL8JA951hs1qo5MAdTZZyLhddF0BS2vHCGrOw2/4XSsoGyG2MIbcEAEBRLdPzIlG\n"\
 | 
						|
                              "wPpvq487331faQ3D0ZQjhOqQvl94guxbd2nr5BAbURDzzdLMRsdIhUSLIJaQ3BCl\n"\
 | 
						|
                              "DjWIxeOqvdCw5owOBG6ryu1wbl42dUERnEPO9f/B7S8x42SnOSHCMQVaFTSaNLIB\n"\
 | 
						|
                              "xwTmhuyfMdngCV/A3yuhrHhmQ27qbYicmaI+J5jl8Yk6BDxtPAz5TB8vdEwx12W1\n"\
 | 
						|
                              "XlzR8xVfAgMBAAECggEAMPHNF9JRjduynN3N1wHpPM0ks2N6wgkAounJcilxkOES\n"\
 | 
						|
                              "ZDFwBrcgtbMzir7owLijJoQXnsSTS9+G42+zA/JGFOEoIrGlTDUbiMKVu0AZ0dh/\n"\
 | 
						|
                              "M+qcR6MhHWUmsj9w+f/kjqvqMm5+pf4BPn5BspI20eGlNlv1FAFUDw+E8LLR3Bgf\n"\
 | 
						|
                              "6Wl1BfuKHvdIRUd8nnJlDd0eeFap7yI/b2RDdvkOl4ounlKQhwpyJue2fbYJ2Z2v\n"\
 | 
						|
                              "pCIc1Nt3lZv4KE14nBRNH95nfakA+BmIos/pN78QRtSkSQN/9drDik46+t5Bz1Lm\n"\
 | 
						|
                              "kjFaujF73szV9mOx2O1JekziyfSJkVOJGqFSrzeIUQKBgQDvNpade0PlV+4Mh+Ra\n"\
 | 
						|
                              "p66OhsZGisl92GZZztK660pixzXoC6cAllxutBHSmu6GM9ISa5GoXMIgmD8d16p0\n"\
 | 
						|
                              "eXtBHuKysi/0iLkbfl1EtztB8vcChdzT0JCWD2vSqGq3772GT3TV1+2OZFsnpiON\n"\
 | 
						|
                              "3Jy0UbHAclMHZrBknYHEOkpTpQKBgQDYJIBeUya5y0MtvcR+hu+Hku8eJq9Tr8jx\n"\
 | 
						|
                              "Yuw5ihlg9rtsEhiWf8O0gnG9e5RrJiOAHcbDcAFx3AbB8ks8CpZ+7Cu9+Wq0VQND\n"\
 | 
						|
                              "ySJwuWXHZfgPEIvj5MlSuaaYP52k7tAF1HJhP5H8DyHMEkmUaPvk9cYRIQNsnADD\n"\
 | 
						|
                              "a3KDPgjlswKBgQCMTALYCCSRDRojpUvL046wLuF5HAsC0PlucLvtPvRYrKe0Galv\n"\
 | 
						|
                              "0cASeW/+ijmc4iWyAf7itMxyW3ihIwzo1Rrx3ZBt583yaIHQWzOOirypeDtg8mvK\n"\
 | 
						|
                              "mwdBy3ecjIRSrrwEWvOWO9cq7Tb9MRanLB2IMGXFDggeTh7kU/B4ywsutQKBgEpJ\n"\
 | 
						|
                              "uWkyESRYjV1iVO/b9uXVBaSKTUZpK5pzkpdwNKrUArTxP0wy25PmJaunluqA8ECv\n"\
 | 
						|
                              "e0pe69AzfIsaeOtJBFLZX2trF1alxXp93f16a1XuYSTkXgBU+TEap/y6GLfAcPUg\n"\
 | 
						|
                              "ALQWAlns5YPbYTjGIJWgN5RZkXC56bVA79nV737rAoGBAM9swaysVULI6A9lofIH\n"\
 | 
						|
                              "w/AgsIH0SotZt+1d7PJBww4ztrcqt66z56p13mUw0/zsIDxvPrhOS20hv3tymJyM\n"\
 | 
						|
                              "v3bwMnszsoZ1Kkj881GmnFtpMb6cwPfkbRJuY5DHfTdRhq+Tik5uYdRthlWM92Sf\n"\
 | 
						|
                              "Aogx44Fozd1t2hYcozPuZD4s\n"\
 | 
						|
                              "-----END PRIVATE KEY-----\n";
 | 
						|
 | 
						|
 | 
						|
static void test_leak_setup(const char *file, long line)
 | 
						|
{
 | 
						|
    uint8_t mac[6];
 | 
						|
    struct timeval te;
 | 
						|
    gettimeofday(&te, NULL); // get current time
 | 
						|
    esp_read_mac(mac, ESP_MAC_WIFI_STA);
 | 
						|
    printf("%s:%ld: time=%ld.%lds, mac:" MACSTR "\n", file, line, te.tv_sec, te.tv_usec, MAC2STR(mac));
 | 
						|
    // Execute esp_sha operation to allocate internal SHA semaphore memory
 | 
						|
    // which is considered as leaked otherwise
 | 
						|
    const uint8_t input_buffer[64];
 | 
						|
    uint8_t output_buffer[64];
 | 
						|
    esp_sha(SHA2_512, input_buffer, sizeof(input_buffer), output_buffer);
 | 
						|
    unity_reset_leak_checks();
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
TEST_CASE("esp-tls init deinit", "[esp-tls][leaks=0]")
 | 
						|
{
 | 
						|
    test_leak_setup(__FILE__, __LINE__);
 | 
						|
    struct esp_tls *tls = esp_tls_init();
 | 
						|
    TEST_ASSERT_NOT_NULL(tls);
 | 
						|
    int ret = esp_tls_conn_destroy(tls);
 | 
						|
    TEST_ASSERT_EQUAL(0, ret);
 | 
						|
}
 | 
						|
 | 
						|
TEST_CASE("esp-tls global_ca_store set free", "[esp-tls][leaks=0]")
 | 
						|
{
 | 
						|
    test_leak_setup(__FILE__, __LINE__);
 | 
						|
    esp_err_t ret = esp_tls_init_global_ca_store();
 | 
						|
    TEST_ASSERT_EQUAL(ESP_OK, ret);
 | 
						|
    ret = esp_tls_set_global_ca_store((const unsigned char *)test_cert_pem, strlen(test_cert_pem) + 1);
 | 
						|
    TEST_ASSERT_EQUAL(ESP_OK, ret);
 | 
						|
    esp_tls_free_global_ca_store();
 | 
						|
}
 | 
						|
 | 
						|
#ifdef CONFIG_ESP_TLS_SERVER
 | 
						|
TEST_CASE("esp_tls_server session create delete", "[esp-tls][leaks=0]")
 | 
						|
{
 | 
						|
    test_leak_setup(__FILE__, __LINE__);
 | 
						|
    struct esp_tls *tls = esp_tls_init();
 | 
						|
    TEST_ASSERT_NOT_NULL(tls);
 | 
						|
    esp_tls_cfg_server_t cfg = {
 | 
						|
        .servercert_buf = (const unsigned char *)test_cert_pem,
 | 
						|
        .servercert_bytes = strlen(test_cert_pem) + 1,
 | 
						|
        .serverkey_buf = (const unsigned char *)test_key_pem,
 | 
						|
        .serverkey_bytes = strlen(test_key_pem) + 1,
 | 
						|
    };
 | 
						|
    // The call is going to fail at the time of TLS handshake (no internet),
 | 
						|
    // but the internal memory for the TLS connection will be allocated.
 | 
						|
    int ret = esp_tls_server_session_create(&cfg, -1, tls);
 | 
						|
    TEST_ASSERT_LESS_THAN_INT(0, ret);
 | 
						|
    // free the allocated memory.
 | 
						|
    esp_tls_server_session_delete(tls);
 | 
						|
}
 | 
						|
#endif
 |