| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141 | 
							- /* BEGIN_HEADER */
 
- #include "mbedtls/pk.h"
 
- #include "mbedtls/pem.h"
 
- #include "mbedtls/oid.h"
 
- /* END_HEADER */
 
- /* BEGIN_DEPENDENCIES
 
-  * depends_on:MBEDTLS_PK_PARSE_C:MBEDTLS_BIGNUM_C
 
-  * END_DEPENDENCIES
 
-  */
 
- /* BEGIN_CASE depends_on:MBEDTLS_RSA_C:MBEDTLS_FS_IO */
 
- void pk_parse_keyfile_rsa( char *key_file, char *password, int result )
 
- {
 
-     mbedtls_pk_context ctx;
 
-     int res;
 
-     char *pwd = password;
 
-     mbedtls_pk_init( &ctx );
 
-     if( strcmp( pwd, "NULL" ) == 0 )
 
-         pwd = NULL;
 
-     res = mbedtls_pk_parse_keyfile( &ctx, key_file, pwd );
 
-     TEST_ASSERT( res == result );
 
-     if( res == 0 )
 
-     {
 
-         mbedtls_rsa_context *rsa;
 
-         TEST_ASSERT( mbedtls_pk_can_do( &ctx, MBEDTLS_PK_RSA ) );
 
-         rsa = mbedtls_pk_rsa( ctx );
 
-         TEST_ASSERT( mbedtls_rsa_check_privkey( rsa ) == 0 );
 
-     }
 
- exit:
 
-     mbedtls_pk_free( &ctx );
 
- }
 
- /* END_CASE */
 
- /* BEGIN_CASE depends_on:MBEDTLS_RSA_C:MBEDTLS_FS_IO */
 
- void pk_parse_public_keyfile_rsa( char *key_file, int result )
 
- {
 
-     mbedtls_pk_context ctx;
 
-     int res;
 
-     mbedtls_pk_init( &ctx );
 
-     res = mbedtls_pk_parse_public_keyfile( &ctx, key_file );
 
-     TEST_ASSERT( res == result );
 
-     if( res == 0 )
 
-     {
 
-         mbedtls_rsa_context *rsa;
 
-         TEST_ASSERT( mbedtls_pk_can_do( &ctx, MBEDTLS_PK_RSA ) );
 
-         rsa = mbedtls_pk_rsa( ctx );
 
-         TEST_ASSERT( mbedtls_rsa_check_pubkey( rsa ) == 0 );
 
-     }
 
- exit:
 
-     mbedtls_pk_free( &ctx );
 
- }
 
- /* END_CASE */
 
- /* BEGIN_CASE depends_on:MBEDTLS_FS_IO:MBEDTLS_ECP_C */
 
- void pk_parse_public_keyfile_ec( char *key_file, int result )
 
- {
 
-     mbedtls_pk_context ctx;
 
-     int res;
 
-     mbedtls_pk_init( &ctx );
 
-     res = mbedtls_pk_parse_public_keyfile( &ctx, key_file );
 
-     TEST_ASSERT( res == result );
 
-     if( res == 0 )
 
-     {
 
-         mbedtls_ecp_keypair *eckey;
 
-         TEST_ASSERT( mbedtls_pk_can_do( &ctx, MBEDTLS_PK_ECKEY ) );
 
-         eckey = mbedtls_pk_ec( ctx );
 
-         TEST_ASSERT( mbedtls_ecp_check_pubkey( &eckey->grp, &eckey->Q ) == 0 );
 
-     }
 
- exit:
 
-     mbedtls_pk_free( &ctx );
 
- }
 
- /* END_CASE */
 
- /* BEGIN_CASE depends_on:MBEDTLS_FS_IO:MBEDTLS_ECP_C */
 
- void pk_parse_keyfile_ec( char *key_file, char *password, int result )
 
- {
 
-     mbedtls_pk_context ctx;
 
-     int res;
 
-     mbedtls_pk_init( &ctx );
 
-     res = mbedtls_pk_parse_keyfile( &ctx, key_file, password );
 
-     TEST_ASSERT( res == result );
 
-     if( res == 0 )
 
-     {
 
-         mbedtls_ecp_keypair *eckey;
 
-         TEST_ASSERT( mbedtls_pk_can_do( &ctx, MBEDTLS_PK_ECKEY ) );
 
-         eckey = mbedtls_pk_ec( ctx );
 
-         TEST_ASSERT( mbedtls_ecp_check_privkey( &eckey->grp, &eckey->d ) == 0 );
 
-     }
 
- exit:
 
-     mbedtls_pk_free( &ctx );
 
- }
 
- /* END_CASE */
 
- /* BEGIN_CASE depends_on:MBEDTLS_RSA_C */
 
- void pk_parse_key_rsa( char *key_data, char *result_str, int result )
 
- {
 
-     mbedtls_pk_context pk;
 
-     unsigned char buf[2000];
 
-     unsigned char output[2000];
 
-     int data_len;
 
-     ((void) result_str);
 
-     mbedtls_pk_init( &pk );
 
-     memset( buf, 0, 2000 );
 
-     memset( output, 0, 2000 );
 
-     data_len = unhexify( buf, key_data );
 
-     TEST_ASSERT( mbedtls_pk_parse_key( &pk, buf, data_len, NULL, 0 ) == ( result ) );
 
-     if( ( result ) == 0 )
 
-     {
 
-         TEST_ASSERT( 1 );
 
-     }
 
- exit:
 
-     mbedtls_pk_free( &pk );
 
- }
 
- /* END_CASE */
 
 
  |