| // test.c : Defines the entry point for the console application. |
| // |
| |
| #define _CRT_SECURE_NO_WARNINGS |
| |
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <string.h> |
| #include <cose.h> |
| #include <cn-cbor/cn-cbor.h> |
| #include <assert.h> |
| |
| #ifndef _MSC_VER |
| #include <dirent.h> |
| #else |
| #include <windows.h> |
| #endif |
| |
| #include "json.h" |
| |
| #include "test.h" |
| |
| int CFails = 0; |
| |
| |
| typedef struct _NameMap { |
| char * sz; |
| int i; |
| } NameMap; |
| |
| NameMap RgAlgorithmNames[46] = { |
| {"HS256", COSE_Algorithm_HMAC_256_256}, |
| {"HS256/64", COSE_Algorithm_HMAC_256_64}, |
| {"HS384", COSE_Algorithm_HMAC_384_384}, |
| {"HS512", COSE_Algorithm_HMAC_512_512}, |
| {"direct", COSE_Algorithm_Direct}, |
| {"AES-MAC-128/64", COSE_Algorithm_CBC_MAC_128_64}, |
| {"AES-MAC-256/64", COSE_Algorithm_CBC_MAC_256_64}, |
| {"AES-MAC-128/128", COSE_Algorithm_CBC_MAC_128_128}, |
| {"AES-MAC-256/128", COSE_Algorithm_CBC_MAC_256_128}, |
| {"A128KW", COSE_Algorithm_AES_KW_128}, |
| {"A192KW", COSE_Algorithm_AES_KW_192}, |
| {"A256KW", COSE_Algorithm_AES_KW_256}, |
| {"A128GCM", COSE_Algorithm_AES_GCM_128}, |
| {"A192GCM", COSE_Algorithm_AES_GCM_192}, |
| {"A256GCM", COSE_Algorithm_AES_GCM_256}, |
| {"AES-CCM-16-128/64", COSE_Algorithm_AES_CCM_16_64_128}, |
| {"AES-CCM-16-256/64", COSE_Algorithm_AES_CCM_16_64_256}, |
| {"AES-CCM-16-128/128", COSE_Algorithm_AES_CCM_16_128_128}, |
| {"AES-CCM-16-256/128", COSE_Algorithm_AES_CCM_16_128_256}, |
| {"AES-CCM-64-128/64", COSE_Algorithm_AES_CCM_64_64_128}, |
| {"AES-CCM-64-256/64", COSE_Algorithm_AES_CCM_64_64_256}, |
| {"AES-CCM-64-128/128", COSE_Algorithm_AES_CCM_64_128_128}, |
| {"AES-CCM-64-256/128", COSE_Algorithm_AES_CCM_64_128_256}, |
| {"ES256", COSE_Algorithm_ECDSA_SHA_256}, |
| {"ES384", COSE_Algorithm_ECDSA_SHA_384}, |
| {"ES512", COSE_Algorithm_ECDSA_SHA_512}, |
| {"HKDF-HMAC-SHA-256", COSE_Algorithm_Direct_HKDF_HMAC_SHA_256}, |
| {"HKDF-HMAC-SHA-512", COSE_Algorithm_Direct_HKDF_HMAC_SHA_512}, |
| {"HKDF-AES-128", COSE_Algorithm_Direct_HKDF_AES_128}, |
| {"HKDF-AES-256", COSE_Algorithm_Direct_HKDF_AES_256}, |
| {"ECDH-ES", COSE_Algorithm_ECDH_ES_HKDF_256}, |
| {"ECDH-ES-512",COSE_Algorithm_ECDH_ES_HKDF_512}, |
| { "ECDH-SS", COSE_Algorithm_ECDH_SS_HKDF_256 }, |
| { "ECDH-SS-512",COSE_Algorithm_ECDH_SS_HKDF_512 }, |
| { "ECDH-ES+A128KW", COSE_Algorithm_ECDH_ES_A128KW }, |
| { "ECDH-ES+A192KW", COSE_Algorithm_ECDH_ES_A192KW }, |
| { "ECDH-ES+A256KW", COSE_Algorithm_ECDH_ES_A256KW }, |
| {"ECDH-SS+A128KW", COSE_Algorithm_ECDH_SS_A128KW}, |
| { "ECDH-SS+A192KW", COSE_Algorithm_ECDH_SS_A192KW }, |
| { "ECDH-SS+A256KW", COSE_Algorithm_ECDH_SS_A256KW }, |
| { "ECDH-ES-A128KW", COSE_Algorithm_ECDH_ES_A128KW }, |
| { "ECDH-ES-A192KW", COSE_Algorithm_ECDH_ES_A192KW }, |
| { "ECDH-ES-A256KW", COSE_Algorithm_ECDH_ES_A256KW }, |
| { "ECDH-SS-A128KW", COSE_Algorithm_ECDH_SS_A128KW }, |
| { "ECDH-SS-A192KW", COSE_Algorithm_ECDH_SS_A192KW }, |
| { "ECDH-SS-A256KW", COSE_Algorithm_ECDH_SS_A256KW }, |
| }; |
| |
| |
| NameMap RgCurveNames[3] = { |
| {"P-256", 1}, |
| {"P-384", 2}, |
| {"P-521", 3} |
| }; |
| |
| int MapName(const cn_cbor * p, NameMap * rgMap, unsigned int cMap) |
| { |
| unsigned int i; |
| |
| for (i = 0; i < cMap; i++) { |
| if (strcmp(rgMap[i].sz, p->v.str) == 0) return rgMap[i].i; |
| } |
| |
| assert(false); |
| |
| return 0; |
| } |
| |
| int MapAlgorithmName(const cn_cbor * p) |
| { |
| return MapName(p, RgAlgorithmNames, _countof(RgAlgorithmNames)); |
| } |
| |
| |
| byte fromHex(char c) |
| { |
| if (('0' <= c) && (c <= '9')) return c - '0'; |
| if (('A' <= c) && (c <= 'F')) return c - 'A' + 10; |
| if (('a' <= c) && (c <= 'f')) return c - 'a' + 10; |
| fprintf(stderr, "Invalid hex"); |
| exit(1); |
| } |
| |
| |
| byte * FromHex(const char * rgch, int cch) |
| { |
| byte * pb = malloc(cch / 2); |
| const char * pb2 = rgch; |
| int i; |
| |
| for (i = 0; i < cch; i += 2) { |
| pb[i / 2] = fromHex(pb2[i]) * 16 + fromHex(pb2[i + 1]); |
| } |
| |
| return pb; |
| } |
| |
| byte * GetCBOREncoding(const cn_cbor * pControl, int * pcbEncoded) |
| { |
| const cn_cbor * pOutputs = cn_cbor_mapget_string(pControl, "output"); |
| const cn_cbor * pCBOR; |
| byte * pb = NULL; |
| const byte * pb2; |
| int i; |
| |
| if ((pOutputs == NULL) || (pOutputs->type != CN_CBOR_MAP)) { |
| fprintf(stderr, "Invalid output\n"); |
| exit(1); |
| } |
| |
| pCBOR = cn_cbor_mapget_string(pOutputs, "cbor"); |
| if ((pCBOR == NULL) || (pCBOR->type != CN_CBOR_TEXT)) { |
| fprintf(stderr, "Invalid cbor object"); |
| exit(1); |
| } |
| |
| pb = malloc(pCBOR->length / 2); |
| pb2 = pCBOR->v.bytes; |
| |
| for (i = 0; i < pCBOR->length; i += 2) { |
| pb[i / 2] = fromHex(pb2[i]) * 16 + fromHex(pb2[i + 1]); |
| } |
| |
| *pcbEncoded = (int) (pCBOR->length / 2); |
| return pb; |
| } |
| |
| #define OPERATION_NONE 0 |
| #define OPERATION_BASE64 1 |
| #define OPERATION_IGNORE 2 |
| #define OPERATION_STRING 3 |
| |
| struct { |
| char * szKey; |
| int kty; |
| int operation; |
| int keyNew; |
| } RgStringKeys[7] = { |
| { "kty", 0, OPERATION_IGNORE, 0}, |
| { "kid", 0, OPERATION_NONE, 1}, |
| { "crv", 2, OPERATION_STRING, -1}, |
| { "x", 2, OPERATION_BASE64, -2}, |
| { "y", 2, OPERATION_BASE64, -3}, |
| { "d", 2, OPERATION_BASE64, -4}, |
| { "k", 4, OPERATION_BASE64, -1} |
| }; |
| |
| bool SetAttributes(HCOSE hHandle, const cn_cbor * pAttributes, int which, int msgType, bool fPublicKey) |
| { |
| const cn_cbor * pKey; |
| const cn_cbor * pValue; |
| int keyNew; |
| cn_cbor * pValueNew; |
| bool f = false; |
| |
| if (pAttributes == NULL) return true; |
| if (pAttributes->type != CN_CBOR_MAP) return false; |
| |
| for (pKey = pAttributes->first_child; pKey != NULL; pKey = pKey->next->next) { |
| pValue = pKey->next; |
| |
| if (pKey->type != CN_CBOR_TEXT) return false; |
| |
| if (strcmp(pKey->v.str, "alg") == 0) { |
| keyNew = COSE_Header_Algorithm; |
| pValueNew = cn_cbor_int_create(MapAlgorithmName(pValue), CBOR_CONTEXT_PARAM_COMMA NULL); |
| } |
| else if (strcmp(pKey->v.str, "ctyp") == 0) { |
| keyNew = COSE_Header_Content_Type; |
| pValueNew = cn_cbor_clone(pValue, CBOR_CONTEXT_PARAM_COMMA NULL); |
| if (pValueNew == NULL) return false; |
| } |
| else if (strcmp(pKey->v.str, "IV_hex") == 0) { |
| keyNew = COSE_Header_IV; |
| pValueNew = cn_cbor_data_create(FromHex(pValue->v.str, (int) pValue->length), (int) pValue->length / 2, CBOR_CONTEXT_PARAM_COMMA NULL); |
| } |
| else if (strcmp(pKey->v.str, "apu_id") == 0) { |
| keyNew = COSE_Header_KDF_U_name; |
| pValueNew = cn_cbor_data_create(pValue->v.bytes, (int)pValue->length, CBOR_CONTEXT_PARAM_COMMA NULL); |
| if (pValueNew == NULL) return false; |
| |
| } |
| else if (strcmp(pKey->v.str, "apv_id") == 0) { |
| keyNew = COSE_Header_KDF_V_name; |
| pValueNew = cn_cbor_data_create(pValue->v.bytes, (int)pValue->length, CBOR_CONTEXT_PARAM_COMMA NULL); |
| if (pValueNew == NULL) return false; |
| |
| } |
| else if (strcmp(pKey->v.str, "pub_other") == 0) { |
| keyNew = COSE_Header_KDF_PUB_other; |
| pValueNew = cn_cbor_data_create(pValue->v.bytes, (int)pValue->length, CBOR_CONTEXT_PARAM_COMMA NULL); |
| if (pValueNew == NULL) return false; |
| } |
| else if (strcmp(pKey->v.str, "priv_other") == 0) { |
| keyNew = COSE_Header_KDF_PRIV; |
| pValueNew = cn_cbor_data_create(pValue->v.bytes, (int)pValue->length, CBOR_CONTEXT_PARAM_COMMA NULL); |
| if (pValueNew == NULL) return false; |
| } |
| else if (strcmp(pKey->v.str, "spk") == 0) { |
| keyNew = COSE_Header_ECDH_STATIC; |
| pValueNew = BuildKey(pValue, fPublicKey); |
| if (pValueNew == NULL) return false; |
| } |
| else { |
| continue; |
| } |
| |
| switch (msgType) { |
| case Attributes_MAC_protected: |
| f = COSE_Mac_map_put_int((HCOSE_MAC)hHandle, keyNew, pValueNew, which, NULL); |
| break; |
| |
| case Attributes_MAC0_protected: |
| f = COSE_Mac0_map_put_int((HCOSE_MAC0)hHandle, keyNew, pValueNew, which, NULL); |
| break; |
| |
| case Attributes_Recipient_protected: |
| f = COSE_Recipient_map_put((HCOSE_RECIPIENT)hHandle, keyNew, pValueNew, which, NULL); |
| break; |
| |
| case Attributes_Enveloped_protected: |
| f = COSE_Enveloped_map_put_int((HCOSE_ENVELOPED)hHandle, keyNew, pValueNew, which, NULL); |
| break; |
| |
| case Attributes_Encrypt_protected: |
| f = COSE_Encrypt_map_put_int((HCOSE_ENCRYPT)hHandle, keyNew, pValueNew, which, NULL); |
| break; |
| |
| case Attributes_Sign_protected: |
| f = COSE_Sign_map_put((HCOSE_SIGN)hHandle, keyNew, pValueNew, which, NULL); |
| break; |
| |
| case Attributes_Signer_protected: |
| f = COSE_Signer_map_put_int((HCOSE_SIGNER)hHandle, keyNew, pValueNew, which, NULL); |
| break; |
| |
| case Attributes_Sign0_protected: |
| f = COSE_Sign0_map_put_int((HCOSE_SIGN0)hHandle, keyNew, pValueNew, which, NULL); |
| break; |
| |
| } |
| // assert(f); |
| } |
| |
| return true; |
| } |
| |
| bool SetSendingAttributes(HCOSE hMsg, const cn_cbor * pIn, int base) |
| { |
| bool f = false; |
| |
| if (!SetAttributes(hMsg, cn_cbor_mapget_string(pIn, "protected"), COSE_PROTECT_ONLY, base, true)) goto returnError; |
| if (!SetAttributes(hMsg, cn_cbor_mapget_string(pIn, "unprotected"), COSE_UNPROTECT_ONLY, base, true)) goto returnError; |
| if (!SetAttributes(hMsg, cn_cbor_mapget_string(pIn, "unsent"), COSE_DONT_SEND, base, false)) goto returnError; |
| |
| cn_cbor * pExternal = cn_cbor_mapget_string(pIn, "external"); |
| if (pExternal != NULL) { |
| cn_cbor * pcn = cn_cbor_clone(pExternal, CBOR_CONTEXT_PARAM_COMMA NULL); |
| if (pcn == NULL) goto returnError; |
| switch (base) { |
| case Attributes_Encrypt_protected: |
| if (!COSE_Encrypt_SetExternal((HCOSE_ENCRYPT)hMsg, FromHex(pcn->v.str, (int)pcn->length), pcn->length / 2, NULL)) goto returnError; |
| break; |
| |
| case Attributes_Enveloped_protected: |
| if (!COSE_Enveloped_SetExternal((HCOSE_ENVELOPED)hMsg, FromHex(pcn->v.str, (int)pcn->length), pcn->length / 2, NULL)) goto returnError; |
| break; |
| } |
| } |
| |
| f = true; |
| returnError: |
| return f; |
| } |
| |
| bool SetReceivingAttributes(HCOSE hMsg, const cn_cbor * pIn, int base) |
| { |
| bool f = false; |
| |
| if (!SetAttributes(hMsg, cn_cbor_mapget_string(pIn, "unsent"), COSE_DONT_SEND, base, true)) goto returnError; |
| |
| cn_cbor * pExternal = cn_cbor_mapget_string(pIn, "external"); |
| if (pExternal != NULL) { |
| cn_cbor * pcn = cn_cbor_clone(pExternal, CBOR_CONTEXT_PARAM_COMMA NULL); |
| if (pcn == NULL) goto returnError; |
| switch (base) { |
| case Attributes_Encrypt_protected: |
| if (!COSE_Encrypt_SetExternal((HCOSE_ENCRYPT)hMsg, FromHex(pcn->v.str, (int)pcn->length), pcn->length / 2, NULL)) goto returnError; |
| break; |
| |
| case Attributes_Enveloped_protected: |
| if (!COSE_Enveloped_SetExternal((HCOSE_ENVELOPED)hMsg, FromHex(pcn->v.str, (int)pcn->length), pcn->length / 2, NULL)) goto returnError; |
| break; |
| } |
| } |
| |
| f = true; |
| returnError: |
| return f; |
| } |
| |
| cn_cbor * BuildKey(const cn_cbor * pKeyIn, bool fPublicKey) |
| { |
| cn_cbor * pKeyOut = cn_cbor_map_create(CBOR_CONTEXT_PARAM_COMMA NULL); |
| cn_cbor * pKty = cn_cbor_mapget_string(pKeyIn, "kty"); |
| cn_cbor * p; |
| cn_cbor * pKey; |
| cn_cbor * pValue; |
| int i; |
| int kty; |
| unsigned char * pb; |
| size_t cb; |
| |
| if (pKeyOut == NULL) return NULL; |
| |
| if ((pKty == NULL) || (pKty->type != CN_CBOR_TEXT)) return NULL; |
| if (pKty->length == 2) { |
| if (strncmp(pKty->v.str, "EC", 2) == 0) kty = 2; |
| else return NULL; |
| } |
| else if (pKty->length == 3) { |
| if (strncmp(pKty->v.str, "oct", 3) == 0) kty = 4; |
| else return NULL; |
| } |
| else return NULL; |
| |
| p = cn_cbor_int_create(kty, CBOR_CONTEXT_PARAM_COMMA NULL); |
| if (p == NULL) return NULL; |
| if (!cn_cbor_mapput_int(pKeyOut, 1, p, CBOR_CONTEXT_PARAM_COMMA NULL)) return NULL; |
| |
| for (pKey = pKeyIn->first_child; pKey != NULL; pKey = pKey->next->next) { |
| pValue = pKey->next; |
| |
| if (pKey->type == CN_CBOR_TEXT) { |
| for (i = 0; i < 7; i++) { |
| if ((pKey->length == strlen(RgStringKeys[i].szKey)) && |
| (strncmp(pKey->v.str, RgStringKeys[i].szKey, strlen(RgStringKeys[i].szKey)) == 0) && |
| ((RgStringKeys[i].kty == 0) || (RgStringKeys[i].kty == kty))) { |
| switch (RgStringKeys[i].operation) { |
| case OPERATION_NONE: |
| p = cn_cbor_clone(pValue, CBOR_CONTEXT_PARAM_COMMA NULL); |
| if (p == NULL) return NULL; |
| if (!cn_cbor_mapput_int(pKeyOut, RgStringKeys[i].keyNew, p, CBOR_CONTEXT_PARAM_COMMA NULL)) return NULL; |
| break; |
| |
| case OPERATION_BASE64: |
| if ((strcmp(pKey->v.str, "d") == 0) && fPublicKey) continue; |
| |
| pb = base64_decode(pValue->v.str, pValue->length, &cb); |
| p = cn_cbor_data_create(pb, (int)cb, CBOR_CONTEXT_PARAM_COMMA NULL); |
| if (p == NULL) return NULL; |
| if (!cn_cbor_mapput_int(pKeyOut, RgStringKeys[i].keyNew, p, CBOR_CONTEXT_PARAM_COMMA NULL)) return NULL; |
| break; |
| |
| case OPERATION_STRING: |
| p = cn_cbor_int_create(MapName(pValue, RgCurveNames, _countof(RgCurveNames)), CBOR_CONTEXT_PARAM_COMMA NULL); |
| if (p == NULL) return NULL; |
| if (!cn_cbor_mapput_int(pKeyOut, RgStringKeys[i].keyNew, p, CBOR_CONTEXT_PARAM_COMMA NULL)) return NULL; |
| break; |
| } |
| i = 99; |
| } |
| } |
| } |
| } |
| |
| return pKeyOut; |
| } |
| |
| |
| |
| bool cn_cbor_array_replace(cn_cbor * cb_array, cn_cbor * cb_value, int index, CBOR_CONTEXT_COMMA cn_cbor_errback *errp); |
| |
| bool Test_cn_cbor_array_replace() |
| { |
| cn_cbor * pRoot; |
| cn_cbor * pItem; |
| |
| // Cases that are not currently covered |
| // 1. Pass in invalid arguements |
| |
| cn_cbor_array_replace(NULL, NULL, 0, CBOR_CONTEXT_PARAM_COMMA NULL); |
| |
| // 2. Insert 0 item with no items currently in the list |
| pRoot = cn_cbor_array_create(CBOR_CONTEXT_PARAM_COMMA NULL); |
| pItem = cn_cbor_int_create(5, CBOR_CONTEXT_PARAM_COMMA NULL); |
| cn_cbor_array_replace(pRoot, pItem, 0, CBOR_CONTEXT_PARAM_COMMA NULL); |
| |
| // 3. Insert 0 item w/ exactly one item in the list |
| pItem = cn_cbor_int_create(6, CBOR_CONTEXT_PARAM_COMMA NULL); |
| cn_cbor_array_replace(pRoot, pItem, 0, CBOR_CONTEXT_PARAM_COMMA NULL); |
| |
| // 4. The last item in the array |
| pItem = cn_cbor_int_create(7, CBOR_CONTEXT_PARAM_COMMA NULL); |
| cn_cbor_array_replace(pRoot, pItem, 1, CBOR_CONTEXT_PARAM_COMMA NULL); |
| |
| pItem = cn_cbor_int_create(8, CBOR_CONTEXT_PARAM_COMMA NULL); |
| cn_cbor_array_replace(pRoot, pItem, 1, CBOR_CONTEXT_PARAM_COMMA NULL); |
| |
| return true; |
| } |
| |
| |
| void RunCorners() |
| { |
| Test_cn_cbor_array_replace(); |
| MAC_Corners(); |
| MAC0_Corners(); |
| Encrypt_Corners(); |
| Enveloped_Corners(); |
| } |
| |
| void RunMemoryTest(const char * szFileName) |
| { |
| #ifdef USE_CBOR_CONTEXT |
| unsigned int iFail; |
| const cn_cbor * pControl = ParseJson(szFileName); |
| |
| if (pControl == NULL) { |
| CFails += 1; |
| return; |
| } |
| |
| // |
| // To find out what we are doing we need to get the correct item |
| |
| const cn_cbor * pInput = cn_cbor_mapget_string(pControl, "input"); |
| |
| if ((pInput == NULL) || (pInput->type != CN_CBOR_MAP)) { |
| fprintf(stderr, "No or bad input section"); |
| exit(1); |
| } |
| |
| // |
| bool fValidateDone = false; |
| bool fBuildDone = false; |
| |
| for (iFail = 0; !fValidateDone || !fBuildDone; iFail++) { |
| allocator = CreateContext(iFail); |
| |
| if (cn_cbor_mapget_string(pInput, "mac") != NULL) { |
| if (!fValidateDone) { |
| allocator = CreateContext(iFail); |
| CFails = 0; |
| ValidateMAC(pControl); |
| if (CFails == 0) fValidateDone = true; |
| } |
| |
| if (!fBuildDone) { |
| allocator = CreateContext(iFail); |
| CFails = 0; |
| BuildMacMessage(pControl); |
| if (CFails == 0) fBuildDone = true; |
| } |
| } |
| else if (cn_cbor_mapget_string(pInput, "mac0") != NULL) { |
| if (!fValidateDone) { |
| allocator = CreateContext(iFail); |
| CFails = 0; |
| ValidateMac0(pControl); |
| if (CFails == 0) fValidateDone = true; |
| } |
| |
| if (!fBuildDone) { |
| allocator = CreateContext(iFail); |
| CFails = 0; |
| BuildMac0Message(pControl); |
| if (CFails == 0) fBuildDone = true; |
| } |
| } |
| else if (cn_cbor_mapget_string(pInput, "encrypted") != NULL) { |
| if (!fValidateDone) { |
| allocator = CreateContext(iFail); |
| CFails = 0; |
| ValidateEncrypt(pControl); |
| if (CFails == 0) fValidateDone = true; |
| } |
| |
| if (!fBuildDone) { |
| allocator = CreateContext(iFail); |
| CFails = 0; |
| BuildEncryptMessage(pControl); |
| if (CFails == 0) fBuildDone = true; |
| } |
| } |
| else if (cn_cbor_mapget_string(pInput, "enveloped") != NULL) { |
| if (!fValidateDone) { |
| allocator = CreateContext(iFail); |
| CFails = 0; |
| ValidateEnveloped(pControl); |
| if (CFails == 0) fValidateDone = true; |
| } |
| |
| if (!fBuildDone) { |
| allocator = CreateContext(iFail); |
| CFails = 0; |
| BuildEnvelopedMessage(pControl); |
| if (CFails == 0) fBuildDone = true; |
| } |
| } |
| else if (cn_cbor_mapget_string(pInput, "sign") != NULL) { |
| if (!fValidateDone) { |
| allocator = CreateContext(iFail); |
| CFails = 0; |
| ValidateSigned(pControl); |
| if (CFails == 0) fValidateDone = true; |
| } |
| |
| if (!fBuildDone) { |
| allocator = CreateContext(iFail); |
| CFails = 0; |
| BuildSignedMessage(pControl); |
| if (CFails == 0) fBuildDone = true; |
| } |
| } |
| else if (cn_cbor_mapget_string(pInput, "sign0") != NULL) { |
| if (!fValidateDone) { |
| allocator = CreateContext(iFail); |
| CFails = 0; |
| ValidateSign0(pControl); |
| if (CFails == 0) fValidateDone = true; |
| } |
| |
| if (!fBuildDone) { |
| allocator = CreateContext(iFail); |
| CFails = 0; |
| BuildSign0Message(pControl); |
| if (CFails == 0) fBuildDone = true; |
| } |
| } |
| } |
| CFails = 0; |
| allocator = NULL; |
| #else |
| return; |
| #endif |
| } |
| |
| void RunFileTest(const char * szFileName) |
| { |
| const cn_cbor * pControl = NULL; |
| |
| pControl = ParseJson(szFileName); |
| |
| // |
| // If we are given a file name, then process the file name |
| // |
| |
| if (pControl == NULL) { |
| CFails += 1; |
| return; |
| } |
| |
| // To find out what we are doing we need to get the correct item |
| |
| const cn_cbor * pInput = cn_cbor_mapget_string(pControl, "input"); |
| |
| if ((pInput == NULL) || (pInput->type != CN_CBOR_MAP)) { |
| fprintf(stderr, "No or bad input section"); |
| exit(1); |
| } |
| |
| if (cn_cbor_mapget_string(pInput, "mac") != NULL) { |
| ValidateMAC(pControl); |
| BuildMacMessage(pControl); |
| } |
| else if (cn_cbor_mapget_string(pInput, "mac0") != NULL) { |
| ValidateMac0(pControl); |
| BuildMac0Message(pControl); |
| } |
| else if (cn_cbor_mapget_string(pInput, "enveloped") != NULL) { |
| ValidateEnveloped(pControl); |
| BuildEnvelopedMessage(pControl); |
| } |
| else if (cn_cbor_mapget_string(pInput, "sign") != NULL) { |
| ValidateSigned(pControl); |
| BuildSignedMessage(pControl); |
| } |
| else if (cn_cbor_mapget_string(pInput, "sign0") != NULL) { |
| ValidateSign0(pControl); |
| BuildSign0Message(pControl); |
| } |
| else if (cn_cbor_mapget_string(pInput, "encrypted") != NULL) { |
| ValidateEncrypt(pControl); |
| BuildEncryptMessage(pControl); |
| } |
| |
| return; |
| } |
| |
| #ifdef _MSC_VER |
| void RunTestsInDirectory(const char * szDir) |
| { |
| int cFailTotal = 0; |
| WIN32_FIND_DATA FindFileData; |
| HANDLE hFind; |
| char rgchFullName[2 * 1024]; |
| |
| if (strlen(szDir) + 7 >= sizeof(rgchFullName)) { |
| fprintf(stderr, "Buffer overflow error\n"); |
| exit(1); |
| } |
| strcpy(rgchFullName, szDir); |
| strcat(rgchFullName, "\\"); |
| size_t ich = strlen(rgchFullName); |
| strcat(rgchFullName, "*.json"); |
| |
| hFind = FindFirstFile(rgchFullName, &FindFileData); |
| if (hFind == INVALID_HANDLE_VALUE) |
| { |
| printf("FindFirstFile failed (%d)\n", GetLastError()); |
| return; |
| } |
| |
| do { |
| rgchFullName[ich] = 0; |
| if (ich + strlen(FindFileData.cFileName) >= sizeof(rgchFullName)) { |
| fprintf(stderr, "Buffer overflow problem\n"); |
| exit(1); |
| } |
| strcat(rgchFullName, FindFileData.cFileName); |
| printf("Run test '%s'", rgchFullName); |
| |
| CFails = 0; |
| RunFileTest(rgchFullName); |
| if (CFails == 0) printf(" PASS\n"); |
| else printf(" FAILED\n"); |
| cFailTotal += CFails; |
| } while (FindNextFile(hFind, &FindFileData)); |
| |
| FindClose(hFind); |
| |
| CFails = cFailTotal; |
| return; |
| } |
| |
| #else |
| void RunTestsInDirectory(const char * szDir) |
| { |
| DIR * dirp = opendir(szDir); |
| struct dirent * dp; |
| char rgchFullName[2 * 1024]; |
| int ich; |
| int cFailTotal = 0; |
| |
| if (dirp == NULL) { |
| fprintf(stderr, "Cannot open directory '%s'\n", szDir); |
| exit(1); |
| } |
| if (strlen(szDir) >= sizeof(rgchFullName) - 3) { |
| fprintf(stderr, "Buffer overflow problem\n"); |
| exit(1); |
| } |
| strcpy(rgchFullName, szDir); |
| strcat(rgchFullName, "/"); |
| ich = strlen(rgchFullName); |
| |
| while ((dp = readdir(dirp)) != NULL) { |
| int cch = strlen(dp->d_name); |
| if (cch < 4) continue; |
| if (strcmp(dp->d_name, "Triple-01.json") == 0) continue; |
| rgchFullName[ich] = 0; |
| if (ich + strlen(dp->d_name) >= sizeof(rgchFullName) - 2) { |
| fprintf(stderr, "Buffer overflow problem\n"); |
| exit(1); |
| } |
| strcat(rgchFullName, dp->d_name); |
| printf("Run test '%s'", rgchFullName); |
| CFails = 0; |
| RunFileTest(rgchFullName); |
| if (CFails == 0) printf(" PASS\n"); |
| else printf(" FAILED\n"); |
| cFailTotal += CFails; |
| } |
| |
| (void)closedir(dirp); |
| exit(cFailTotal); |
| } |
| #endif // _MSCVER |
| |
| int main(int argc, char ** argv) |
| { |
| int i; |
| const char * szWhere = NULL; |
| bool fDir = false; |
| bool fCorners = false; |
| bool fMemory = false; |
| |
| for (i = 1; i < argc; i++) { |
| printf("arg: '%s'\n", argv[i]); |
| if (argv[i][0] == '-') { |
| if (strcmp(argv[i], "--dir") == 0) { |
| fDir = true; |
| } |
| else if (strcmp(argv[i], "--corners") == 0) { |
| fCorners = true; |
| } |
| else if (strcmp(argv[i], "--memory") == 0) { |
| fMemory = true; |
| } |
| } |
| else { |
| szWhere = argv[i]; |
| } |
| } |
| |
| // |
| // If we are given a file name, then process the file name |
| // |
| |
| if (fMemory) { |
| if (szWhere == NULL) { |
| fprintf(stderr, "Must specify a file name\n"); |
| exit(1); |
| } |
| RunMemoryTest(szWhere); |
| } |
| else if (szWhere != NULL) { |
| if (szWhere == NULL) { |
| fprintf(stderr, "Must specify a file name\n"); |
| exit(1); |
| } |
| if (fDir) RunTestsInDirectory(szWhere); |
| else RunFileTest(szWhere); |
| } |
| else if (fCorners) { |
| RunCorners(); |
| } |
| else { |
| MacMessage(); |
| SignMessage(); |
| EncryptMessage(); |
| } |
| |
| if (CFails > 0) fprintf(stderr, "Failed %d tests\n", CFails); |
| else fprintf(stderr, "SUCCESS\n"); |
| |
| exit(CFails); |
| } |