| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141 | /* BEGIN_HEADER */#include "mbedtls/pk.h"#include "mbedtls/pem.h"#include "mbedtls/oid.h"/* END_HEADER *//* BEGIN_DEPENDENCIES * depends_on:MBEDTLS_PK_PARSE_C:MBEDTLS_BIGNUM_C * END_DEPENDENCIES *//* BEGIN_CASE depends_on:MBEDTLS_RSA_C:MBEDTLS_FS_IO */void pk_parse_keyfile_rsa( char *key_file, char *password, int result ){    mbedtls_pk_context ctx;    int res;    char *pwd = password;    mbedtls_pk_init( &ctx );    if( strcmp( pwd, "NULL" ) == 0 )        pwd = NULL;    res = mbedtls_pk_parse_keyfile( &ctx, key_file, pwd );    TEST_ASSERT( res == result );    if( res == 0 )    {        mbedtls_rsa_context *rsa;        TEST_ASSERT( mbedtls_pk_can_do( &ctx, MBEDTLS_PK_RSA ) );        rsa = mbedtls_pk_rsa( ctx );        TEST_ASSERT( mbedtls_rsa_check_privkey( rsa ) == 0 );    }exit:    mbedtls_pk_free( &ctx );}/* END_CASE *//* BEGIN_CASE depends_on:MBEDTLS_RSA_C:MBEDTLS_FS_IO */void pk_parse_public_keyfile_rsa( char *key_file, int result ){    mbedtls_pk_context ctx;    int res;    mbedtls_pk_init( &ctx );    res = mbedtls_pk_parse_public_keyfile( &ctx, key_file );    TEST_ASSERT( res == result );    if( res == 0 )    {        mbedtls_rsa_context *rsa;        TEST_ASSERT( mbedtls_pk_can_do( &ctx, MBEDTLS_PK_RSA ) );        rsa = mbedtls_pk_rsa( ctx );        TEST_ASSERT( mbedtls_rsa_check_pubkey( rsa ) == 0 );    }exit:    mbedtls_pk_free( &ctx );}/* END_CASE *//* BEGIN_CASE depends_on:MBEDTLS_FS_IO:MBEDTLS_ECP_C */void pk_parse_public_keyfile_ec( char *key_file, int result ){    mbedtls_pk_context ctx;    int res;    mbedtls_pk_init( &ctx );    res = mbedtls_pk_parse_public_keyfile( &ctx, key_file );    TEST_ASSERT( res == result );    if( res == 0 )    {        mbedtls_ecp_keypair *eckey;        TEST_ASSERT( mbedtls_pk_can_do( &ctx, MBEDTLS_PK_ECKEY ) );        eckey = mbedtls_pk_ec( ctx );        TEST_ASSERT( mbedtls_ecp_check_pubkey( &eckey->grp, &eckey->Q ) == 0 );    }exit:    mbedtls_pk_free( &ctx );}/* END_CASE *//* BEGIN_CASE depends_on:MBEDTLS_FS_IO:MBEDTLS_ECP_C */void pk_parse_keyfile_ec( char *key_file, char *password, int result ){    mbedtls_pk_context ctx;    int res;    mbedtls_pk_init( &ctx );    res = mbedtls_pk_parse_keyfile( &ctx, key_file, password );    TEST_ASSERT( res == result );    if( res == 0 )    {        mbedtls_ecp_keypair *eckey;        TEST_ASSERT( mbedtls_pk_can_do( &ctx, MBEDTLS_PK_ECKEY ) );        eckey = mbedtls_pk_ec( ctx );        TEST_ASSERT( mbedtls_ecp_check_privkey( &eckey->grp, &eckey->d ) == 0 );    }exit:    mbedtls_pk_free( &ctx );}/* END_CASE *//* BEGIN_CASE depends_on:MBEDTLS_RSA_C */void pk_parse_key_rsa( char *key_data, char *result_str, int result ){    mbedtls_pk_context pk;    unsigned char buf[2000];    unsigned char output[2000];    int data_len;    ((void) result_str);    mbedtls_pk_init( &pk );    memset( buf, 0, 2000 );    memset( output, 0, 2000 );    data_len = unhexify( buf, key_data );    TEST_ASSERT( mbedtls_pk_parse_key( &pk, buf, data_len, NULL, 0 ) == ( result ) );    if( ( result ) == 0 )    {        TEST_ASSERT( 1 );    }exit:    mbedtls_pk_free( &pk );}/* END_CASE */
 |