summaryrefslogtreecommitdiff
path: root/tests/mini.c
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@gnutls.org>2011-04-04 22:02:27 +0200
committerNikos Mavrogiannopoulos <nmav@gnutls.org>2011-04-04 22:02:27 +0200
commitef11a5ad23c899f1b739b02aabe983238a9773f2 (patch)
tree5aa0050c9505e020f9ef3d38131d7ffc518e4807 /tests/mini.c
parentca41fc31917d97f4a6b9aa8323a1317c1657d9af (diff)
downloadgnutls-ef11a5ad23c899f1b739b02aabe983238a9773f2.tar.gz
The mini-* programs were combined.
Diffstat (limited to 'tests/mini.c')
-rw-r--r--tests/mini.c173
1 files changed, 7 insertions, 166 deletions
diff --git a/tests/mini.c b/tests/mini.c
index 21f7687837..c43552ada1 100644
--- a/tests/mini.c
+++ b/tests/mini.c
@@ -29,6 +29,7 @@
#include <string.h>
#include <errno.h>
#include <gnutls/gnutls.h>
+#include "eagain-common.h"
#include "utils.h"
@@ -38,104 +39,6 @@ tls_log_func (int level, const char *str)
fprintf (stderr, "|<%d>| %s", level, str);
}
-char *to_server;
-size_t to_server_len;
-
-char *to_client;
-size_t to_client_len;
-
-static ssize_t
-client_pull (gnutls_transport_ptr_t tr, void *data, size_t len)
-{
- if (debug)
- success ("client_pull len %d has %d\n", (int) len, (int) to_client_len);
-
- if (to_client_len < len)
- {
- gnutls_transport_set_global_errno (EAGAIN);
- return -1;
- }
-
- memcpy (data, to_client, len);
-
- memmove (to_client, to_client + len, to_client_len - len);
- to_client_len -= len;
-
- return len;
-}
-
-static ssize_t
-client_push (gnutls_transport_ptr_t tr, const void *data, size_t len)
-{
- size_t newlen = to_server_len + len;
- char *tmp;
-
- if (debug)
- {
- success ("client_push len %d has %d\n", (int) len, (int) to_server_len);
- hexprint (data, len);
- }
-
- tmp = realloc (to_server, newlen);
- if (!tmp)
- {
- fail ("Memory allocation failure...\n");
- exit (1);
- }
- to_server = tmp;
-
- memcpy (to_server + to_server_len, data, len);
- to_server_len = newlen;
-
- return len;
-}
-
-static ssize_t
-server_pull (gnutls_transport_ptr_t tr, void *data, size_t len)
-{
- if (debug)
- success ("server_pull len %d has %d\n", (int) len, (int) to_server_len);
-
- if (to_server_len < len)
- {
- gnutls_transport_set_global_errno (EAGAIN);
- return -1;
- }
-
- memcpy (data, to_server, len);
-
- memmove (to_server, to_server + len, to_server_len - len);
- to_server_len -= len;
-
- return len;
-}
-
-static ssize_t
-server_push (gnutls_transport_ptr_t tr, const void *data, size_t len)
-{
- size_t newlen = to_client_len + len;
- char *tmp;
-
- if (debug)
- {
- success ("server_push len %d has %d\n", (int) len, (int) to_client_len);
- hexprint (data, len);
- }
-
- tmp = realloc (to_client, newlen);
- if (!tmp)
- {
- fail ("Memory allocation failure...\n");
- exit (1);
- }
- to_client = tmp;
-
- memcpy (to_client + to_client_len, data, len);
- to_client_len = newlen;
-
- return len;
-}
-
#define MAX_BUF 1024
#define MSG "Hello TLS"
@@ -151,11 +54,11 @@ doit (void)
/* Client stuff. */
gnutls_anon_client_credentials_t c_anoncred;
gnutls_session_t client;
- int n, cret = GNUTLS_E_AGAIN;
+ int cret = GNUTLS_E_AGAIN;
/* Need to enable anonymous KX specifically. */
char buffer[MAX_BUF + 1];
ssize_t ns;
- int ret;
+ int ret, transferred = 0, msglen;
/* General init. */
gnutls_global_init ();
@@ -183,74 +86,15 @@ doit (void)
gnutls_transport_set_push_function (client, client_push);
gnutls_transport_set_pull_function (client, client_pull);
- do
- {
- if (cret == GNUTLS_E_AGAIN)
- {
- if (debug)
- success ("loop invoking client:\n");
- cret = gnutls_handshake (client);
- if (debug)
- success ("client %d: %s\n", cret, gnutls_strerror (cret));
- }
-
- if (sret == GNUTLS_E_AGAIN)
- {
- if (debug)
- success ("loop invoking server:\n");
- sret = gnutls_handshake (server);
- if (debug)
- success ("server %d: %s\n", sret, gnutls_strerror (sret));
- }
- }
- while (cret == GNUTLS_E_AGAIN || sret == GNUTLS_E_AGAIN);
+ HANDSHAKE(client, server);
if (debug)
success ("Handshake established\n");
- ns = gnutls_record_send (client, MSG, strlen (MSG));
+ msglen = strlen(MSG);
+ TRANSFER(client, server, MSG, msglen, buffer, MAX_BUF);
if (debug)
- success ("client: sent %d\n", (int) ns);
-
- ret = gnutls_record_recv (server, buffer, MAX_BUF);
- if (ret == 0)
- fail ("server: didn't receive any data\n");
- else if (ret < 0)
- fail ("server: error: %s\n", gnutls_strerror (ret));
- else
- {
- if (debug)
- {
- printf ("server: received %d: ", ret);
- for (n = 0; n < ret; n++)
- fputc (buffer[n], stdout);
- fputs ("\n", stdout);
- }
- }
-
- ns = gnutls_record_send (server, MSG, strlen (MSG));
- if (debug)
- success ("server: sent %d\n", (int) ns);
-
- ret = gnutls_record_recv (client, buffer, MAX_BUF);
- if (ret == 0)
- {
- fail ("client: Peer has closed the TLS connection\n");
- }
- else if (ret < 0)
- {
- fail ("client: Error: %s\n", gnutls_strerror (ret));
- }
- else
- {
- if (debug)
- {
- printf ("client: received %d: ", ret);
- for (n = 0; n < ret; n++)
- fputc (buffer[n], stdout);
- fputs ("\n", stdout);
- }
- }
+ fputs ("\n", stdout);
gnutls_bye (client, GNUTLS_SHUT_RDWR);
gnutls_bye (server, GNUTLS_SHUT_RDWR);
@@ -258,9 +102,6 @@ doit (void)
gnutls_deinit (client);
gnutls_deinit (server);
- free (to_server);
- free (to_client);
-
gnutls_anon_free_client_credentials (c_anoncred);
gnutls_anon_free_server_credentials (s_anoncred);