diff options
author | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2011-04-04 22:02:27 +0200 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2011-04-04 22:02:27 +0200 |
commit | ef11a5ad23c899f1b739b02aabe983238a9773f2 (patch) | |
tree | 5aa0050c9505e020f9ef3d38131d7ffc518e4807 /tests/mini.c | |
parent | ca41fc31917d97f4a6b9aa8323a1317c1657d9af (diff) | |
download | gnutls-ef11a5ad23c899f1b739b02aabe983238a9773f2.tar.gz |
The mini-* programs were combined.
Diffstat (limited to 'tests/mini.c')
-rw-r--r-- | tests/mini.c | 173 |
1 files changed, 7 insertions, 166 deletions
diff --git a/tests/mini.c b/tests/mini.c index 21f7687837..c43552ada1 100644 --- a/tests/mini.c +++ b/tests/mini.c @@ -29,6 +29,7 @@ #include <string.h> #include <errno.h> #include <gnutls/gnutls.h> +#include "eagain-common.h" #include "utils.h" @@ -38,104 +39,6 @@ tls_log_func (int level, const char *str) fprintf (stderr, "|<%d>| %s", level, str); } -char *to_server; -size_t to_server_len; - -char *to_client; -size_t to_client_len; - -static ssize_t -client_pull (gnutls_transport_ptr_t tr, void *data, size_t len) -{ - if (debug) - success ("client_pull len %d has %d\n", (int) len, (int) to_client_len); - - if (to_client_len < len) - { - gnutls_transport_set_global_errno (EAGAIN); - return -1; - } - - memcpy (data, to_client, len); - - memmove (to_client, to_client + len, to_client_len - len); - to_client_len -= len; - - return len; -} - -static ssize_t -client_push (gnutls_transport_ptr_t tr, const void *data, size_t len) -{ - size_t newlen = to_server_len + len; - char *tmp; - - if (debug) - { - success ("client_push len %d has %d\n", (int) len, (int) to_server_len); - hexprint (data, len); - } - - tmp = realloc (to_server, newlen); - if (!tmp) - { - fail ("Memory allocation failure...\n"); - exit (1); - } - to_server = tmp; - - memcpy (to_server + to_server_len, data, len); - to_server_len = newlen; - - return len; -} - -static ssize_t -server_pull (gnutls_transport_ptr_t tr, void *data, size_t len) -{ - if (debug) - success ("server_pull len %d has %d\n", (int) len, (int) to_server_len); - - if (to_server_len < len) - { - gnutls_transport_set_global_errno (EAGAIN); - return -1; - } - - memcpy (data, to_server, len); - - memmove (to_server, to_server + len, to_server_len - len); - to_server_len -= len; - - return len; -} - -static ssize_t -server_push (gnutls_transport_ptr_t tr, const void *data, size_t len) -{ - size_t newlen = to_client_len + len; - char *tmp; - - if (debug) - { - success ("server_push len %d has %d\n", (int) len, (int) to_client_len); - hexprint (data, len); - } - - tmp = realloc (to_client, newlen); - if (!tmp) - { - fail ("Memory allocation failure...\n"); - exit (1); - } - to_client = tmp; - - memcpy (to_client + to_client_len, data, len); - to_client_len = newlen; - - return len; -} - #define MAX_BUF 1024 #define MSG "Hello TLS" @@ -151,11 +54,11 @@ doit (void) /* Client stuff. */ gnutls_anon_client_credentials_t c_anoncred; gnutls_session_t client; - int n, cret = GNUTLS_E_AGAIN; + int cret = GNUTLS_E_AGAIN; /* Need to enable anonymous KX specifically. */ char buffer[MAX_BUF + 1]; ssize_t ns; - int ret; + int ret, transferred = 0, msglen; /* General init. */ gnutls_global_init (); @@ -183,74 +86,15 @@ doit (void) gnutls_transport_set_push_function (client, client_push); gnutls_transport_set_pull_function (client, client_pull); - do - { - if (cret == GNUTLS_E_AGAIN) - { - if (debug) - success ("loop invoking client:\n"); - cret = gnutls_handshake (client); - if (debug) - success ("client %d: %s\n", cret, gnutls_strerror (cret)); - } - - if (sret == GNUTLS_E_AGAIN) - { - if (debug) - success ("loop invoking server:\n"); - sret = gnutls_handshake (server); - if (debug) - success ("server %d: %s\n", sret, gnutls_strerror (sret)); - } - } - while (cret == GNUTLS_E_AGAIN || sret == GNUTLS_E_AGAIN); + HANDSHAKE(client, server); if (debug) success ("Handshake established\n"); - ns = gnutls_record_send (client, MSG, strlen (MSG)); + msglen = strlen(MSG); + TRANSFER(client, server, MSG, msglen, buffer, MAX_BUF); if (debug) - success ("client: sent %d\n", (int) ns); - - ret = gnutls_record_recv (server, buffer, MAX_BUF); - if (ret == 0) - fail ("server: didn't receive any data\n"); - else if (ret < 0) - fail ("server: error: %s\n", gnutls_strerror (ret)); - else - { - if (debug) - { - printf ("server: received %d: ", ret); - for (n = 0; n < ret; n++) - fputc (buffer[n], stdout); - fputs ("\n", stdout); - } - } - - ns = gnutls_record_send (server, MSG, strlen (MSG)); - if (debug) - success ("server: sent %d\n", (int) ns); - - ret = gnutls_record_recv (client, buffer, MAX_BUF); - if (ret == 0) - { - fail ("client: Peer has closed the TLS connection\n"); - } - else if (ret < 0) - { - fail ("client: Error: %s\n", gnutls_strerror (ret)); - } - else - { - if (debug) - { - printf ("client: received %d: ", ret); - for (n = 0; n < ret; n++) - fputc (buffer[n], stdout); - fputs ("\n", stdout); - } - } + fputs ("\n", stdout); gnutls_bye (client, GNUTLS_SHUT_RDWR); gnutls_bye (server, GNUTLS_SHUT_RDWR); @@ -258,9 +102,6 @@ doit (void) gnutls_deinit (client); gnutls_deinit (server); - free (to_server); - free (to_client); - gnutls_anon_free_client_credentials (c_anoncred); gnutls_anon_free_server_credentials (s_anoncred); |