[修改] 增加freeRTOS
1. 版本FreeRTOSv202212.01,命名为kernel;
This commit is contained in:
47
kernel/FreeRTOS-Plus/ThirdParty/wolfSSL/wrapper/python/wolfssl/test/conftest.py
vendored
Normal file
47
kernel/FreeRTOS-Plus/ThirdParty/wolfSSL/wrapper/python/wolfssl/test/conftest.py
vendored
Normal file
@ -0,0 +1,47 @@
|
||||
# -*- coding: utf-8 -*-
|
||||
#
|
||||
# conftest.py
|
||||
#
|
||||
# Copyright (C) 2006-2020 wolfSSL Inc.
|
||||
#
|
||||
# This file is part of wolfSSL.
|
||||
#
|
||||
# wolfSSL is free software; you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License as published by
|
||||
# the Free Software Foundation; either version 2 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# wolfSSL is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program; if not, write to the Free Software
|
||||
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
||||
#/
|
||||
|
||||
# pylint: disable=missing-docstring, redefined-outer-name
|
||||
|
||||
import sys
|
||||
import ssl
|
||||
import wolfssl
|
||||
import pytest
|
||||
|
||||
@pytest.fixture
|
||||
def tcp_socket():
|
||||
import socket
|
||||
from contextlib import closing
|
||||
|
||||
with closing(socket.socket(socket.AF_INET, socket.SOCK_STREAM)) as sock:
|
||||
yield sock
|
||||
|
||||
@pytest.fixture(
|
||||
params=[ssl, wolfssl] if sys.version_info.major == 3 else [wolfssl],
|
||||
ids=["ssl", "wolfssl"] if sys.version_info.major == 3 else ["wolfssl"])
|
||||
def ssl_provider(request):
|
||||
return request.param
|
||||
|
||||
@pytest.fixture
|
||||
def ssl_context(ssl_provider):
|
||||
return ssl_provider.SSLContext(ssl_provider.PROTOCOL_SSLv23)
|
||||
66
kernel/FreeRTOS-Plus/ThirdParty/wolfSSL/wrapper/python/wolfssl/test/test_client.py
vendored
Normal file
66
kernel/FreeRTOS-Plus/ThirdParty/wolfSSL/wrapper/python/wolfssl/test/test_client.py
vendored
Normal file
@ -0,0 +1,66 @@
|
||||
# -*- coding: utf-8 -*-
|
||||
#
|
||||
# test_client.py
|
||||
#
|
||||
# Copyright (C) 2006-2020 wolfSSL Inc.
|
||||
#
|
||||
# This file is part of wolfSSL.
|
||||
#
|
||||
# wolfSSL is free software; you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License as published by
|
||||
# the Free Software Foundation; either version 2 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# wolfSSL is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program; if not, write to the Free Software
|
||||
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
||||
#/
|
||||
|
||||
# pylint: disable=missing-docstring, invalid-name, import-error
|
||||
# pylint: disable=redefined-outer-name
|
||||
|
||||
import pytest
|
||||
|
||||
HOST = "www.python.org"
|
||||
PORT = 443
|
||||
CA_CERTS = "certs/ca-digicert-ev.pem"
|
||||
|
||||
@pytest.fixture(
|
||||
params=["wrap_socket", "wrap_socket_with_ca",
|
||||
"wrap_socket_from_context", "ssl_socket"])
|
||||
def secure_socket(request, ssl_provider, tcp_socket):
|
||||
sock = None
|
||||
|
||||
if request.param == "wrap_socket":
|
||||
sock = ssl_provider.wrap_socket(tcp_socket)
|
||||
|
||||
elif request.param == "wrap_socket_with_ca":
|
||||
sock = ssl_provider.wrap_socket(
|
||||
tcp_socket, cert_reqs=ssl_provider.CERT_REQUIRED, ca_certs=CA_CERTS)
|
||||
|
||||
elif request.param == "wrap_socket_from_context":
|
||||
ctx = ssl_provider.SSLContext(ssl_provider.PROTOCOL_TLSv1_2)
|
||||
|
||||
ctx.verify_mode = ssl_provider.CERT_REQUIRED
|
||||
ctx.load_verify_locations(CA_CERTS)
|
||||
|
||||
sock = ctx.wrap_socket(tcp_socket)
|
||||
|
||||
elif request.param == "ssl_socket":
|
||||
sock = ssl_provider.SSLSocket(
|
||||
tcp_socket, cert_reqs=ssl_provider.CERT_REQUIRED, ca_certs=CA_CERTS)
|
||||
|
||||
if sock:
|
||||
yield sock
|
||||
sock.close()
|
||||
|
||||
def test_secure_connection(secure_socket):
|
||||
secure_socket.connect((HOST, PORT))
|
||||
|
||||
secure_socket.write(b"GET / HTTP/1.1\n\n")
|
||||
assert secure_socket.read(4) == b"HTTP"
|
||||
66
kernel/FreeRTOS-Plus/ThirdParty/wolfSSL/wrapper/python/wolfssl/test/test_context.py
vendored
Normal file
66
kernel/FreeRTOS-Plus/ThirdParty/wolfSSL/wrapper/python/wolfssl/test/test_context.py
vendored
Normal file
@ -0,0 +1,66 @@
|
||||
# -*- coding: utf-8 -*-
|
||||
#
|
||||
# test_context.py
|
||||
#
|
||||
# Copyright (C) 2006-2020 wolfSSL Inc.
|
||||
#
|
||||
# This file is part of wolfSSL.
|
||||
#
|
||||
# wolfSSL is free software; you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License as published by
|
||||
# the Free Software Foundation; either version 2 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# wolfSSL is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program; if not, write to the Free Software
|
||||
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
||||
#/
|
||||
|
||||
# pylint: disable=missing-docstring, invalid-name, import-error
|
||||
# pylint: disable=redefined-outer-name
|
||||
|
||||
import pytest
|
||||
|
||||
with open("certs/ca-cert.pem") as ca:
|
||||
_CADATA = ca.read()
|
||||
|
||||
def test_context_creation(ssl_context):
|
||||
assert ssl_context != None
|
||||
|
||||
def test_verify_mode(ssl_provider, ssl_context):
|
||||
with pytest.raises(ValueError):
|
||||
ssl_context.verify_mode = -1
|
||||
|
||||
assert ssl_context.verify_mode == ssl_provider.CERT_NONE
|
||||
|
||||
ssl_context.verify_mode = ssl_provider.CERT_REQUIRED
|
||||
assert ssl_context.verify_mode == ssl_provider.CERT_REQUIRED
|
||||
|
||||
def test_set_ciphers(ssl_context):
|
||||
ssl_context.set_ciphers("DHE-RSA-AES256-SHA256")
|
||||
|
||||
with pytest.raises(Exception):
|
||||
ssl_context.set_ciphers("foo")
|
||||
|
||||
def test_load_cert_chain_raises(ssl_context):
|
||||
with pytest.raises(TypeError):
|
||||
ssl_context.load_cert_chain(None)
|
||||
|
||||
def test_load_cert_chain(ssl_context):
|
||||
ssl_context.load_cert_chain("certs/client-cert.pem",
|
||||
"certs/client-key.pem")
|
||||
|
||||
def test_load_verify_locations_raises(ssl_context):
|
||||
with pytest.raises(TypeError):
|
||||
ssl_context.load_verify_locations(None)
|
||||
|
||||
def test_load_verify_locations_with_cafile(ssl_context):
|
||||
ssl_context.load_verify_locations(cafile="certs/ca-cert.pem")
|
||||
|
||||
def test_load_verify_locations_with_cadata(ssl_provider, ssl_context):
|
||||
ssl_context.load_verify_locations(cadata=_CADATA)
|
||||
59
kernel/FreeRTOS-Plus/ThirdParty/wolfSSL/wrapper/python/wolfssl/test/test_methods.py
vendored
Normal file
59
kernel/FreeRTOS-Plus/ThirdParty/wolfSSL/wrapper/python/wolfssl/test/test_methods.py
vendored
Normal file
@ -0,0 +1,59 @@
|
||||
# -*- coding: utf-8 -*-
|
||||
#
|
||||
# test_methods.py
|
||||
#
|
||||
# Copyright (C) 2006-2020 wolfSSL Inc.
|
||||
#
|
||||
# This file is part of wolfSSL.
|
||||
#
|
||||
# wolfSSL is free software; you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License as published by
|
||||
# the Free Software Foundation; either version 2 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# wolfSSL is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program; if not, write to the Free Software
|
||||
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
||||
#/
|
||||
|
||||
# pylint: disable=missing-docstring, redefined-outer-name, import-error
|
||||
|
||||
import pytest
|
||||
from wolfssl._methods import (WolfSSLMethod, PROTOCOL_SSLv3, PROTOCOL_SSLv23,
|
||||
PROTOCOL_TLS, PROTOCOL_TLSv1, PROTOCOL_TLSv1_1,
|
||||
PROTOCOL_TLSv1_2)
|
||||
from wolfssl._ffi import ffi as _ffi
|
||||
|
||||
@pytest.fixture(
|
||||
params=[-1, PROTOCOL_SSLv3, PROTOCOL_TLSv1, PROTOCOL_TLSv1_1],
|
||||
ids=["invalid", "SSLv3", "TLSv1", "TLSv1_1"])
|
||||
def unsupported_method(request):
|
||||
yield request.param
|
||||
|
||||
@pytest.fixture(
|
||||
params=[PROTOCOL_SSLv23, PROTOCOL_TLS, PROTOCOL_TLSv1_2],
|
||||
ids=["SSLv23", "TLS", "TLSv1_2"])
|
||||
def supported_method(request):
|
||||
yield request.param
|
||||
|
||||
|
||||
def test_unsupported_method(unsupported_method):
|
||||
with pytest.raises(ValueError):
|
||||
WolfSSLMethod(unsupported_method, False)
|
||||
|
||||
with pytest.raises(ValueError):
|
||||
WolfSSLMethod(unsupported_method, True)
|
||||
|
||||
def test_supported_method(supported_method):
|
||||
client = WolfSSLMethod(supported_method, False)
|
||||
server = WolfSSLMethod(supported_method, True)
|
||||
|
||||
assert isinstance(client, WolfSSLMethod)
|
||||
assert isinstance(server, WolfSSLMethod)
|
||||
assert client.native_object != _ffi.NULL
|
||||
assert server.native_object != _ffi.NULL
|
||||
Reference in New Issue
Block a user