2016-10-18 21:16:35 +08:00
|
|
|
/*
|
2018-03-20 21:00:17 +08:00
|
|
|
* Copyright 2016-2018 The OpenSSL Project Authors. All Rights Reserved.
|
2016-10-18 21:16:35 +08:00
|
|
|
*
|
2018-12-06 20:05:25 +08:00
|
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
2016-10-18 21:16:35 +08:00
|
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
|
|
* in the file LICENSE in the source distribution or at
|
|
|
|
* https://www.openssl.org/source/license.html
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <openssl/opensslv.h>
|
2017-05-06 05:39:13 +08:00
|
|
|
#include <openssl/ssl.h>
|
2019-09-28 06:45:46 +08:00
|
|
|
#include <openssl/types.h>
|
2020-11-25 14:56:08 +08:00
|
|
|
#include "simpledynamic.h"
|
2016-10-18 21:16:35 +08:00
|
|
|
|
2018-03-20 01:37:46 +08:00
|
|
|
typedef void DSO;
|
|
|
|
|
2016-10-18 21:16:35 +08:00
|
|
|
typedef const SSL_METHOD * (*TLS_method_t)(void);
|
|
|
|
typedef SSL_CTX * (*SSL_CTX_new_t)(const SSL_METHOD *meth);
|
|
|
|
typedef void (*SSL_CTX_free_t)(SSL_CTX *);
|
2018-11-16 01:41:06 +08:00
|
|
|
typedef int (*OPENSSL_init_crypto_t)(uint64_t, void *);
|
|
|
|
typedef int (*OPENSSL_atexit_t)(void (*handler)(void));
|
2016-10-18 21:16:35 +08:00
|
|
|
typedef unsigned long (*ERR_get_error_t)(void);
|
Switch to MAJOR.MINOR.PATCH versioning and version 3.0.0-dev
We're strictly use version numbers of the form MAJOR.MINOR.PATCH.
Letter releases are things of days past.
The most central change is that we now express the version number with
three macros, one for each part of the version number:
OPENSSL_VERSION_MAJOR
OPENSSL_VERSION_MINOR
OPENSSL_VERSION_PATCH
We also provide two additional macros to express pre-release and build
metadata information (also specified in semantic versioning):
OPENSSL_VERSION_PRE_RELEASE
OPENSSL_VERSION_BUILD_METADATA
To get the library's idea of all those values, we introduce the
following functions:
unsigned int OPENSSL_version_major(void);
unsigned int OPENSSL_version_minor(void);
unsigned int OPENSSL_version_patch(void);
const char *OPENSSL_version_pre_release(void);
const char *OPENSSL_version_build_metadata(void);
Additionally, for shared library versioning (which is out of scope in
semantic versioning, but that we still need):
OPENSSL_SHLIB_VERSION
We also provide a macro that contains the release date. This is not
part of the version number, but is extra information that we want to
be able to display:
OPENSSL_RELEASE_DATE
Finally, also provide the following convenience functions:
const char *OPENSSL_version_text(void);
const char *OPENSSL_version_text_full(void);
The following macros and functions are deprecated, and while currently
existing for backward compatibility, they are expected to disappear:
OPENSSL_VERSION_NUMBER
OPENSSL_VERSION_TEXT
OPENSSL_VERSION
OpenSSL_version_num()
OpenSSL_version()
Also, this function is introduced to replace OpenSSL_version() for all
indexes except for OPENSSL_VERSION:
OPENSSL_info()
For configuration, the option 'newversion-only' is added to disable all
the macros and functions that are mentioned as deprecated above.
Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Matthias St. Pierre <Matthias.St.Pierre@ncp-e.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/7724)
2018-09-27 21:56:35 +08:00
|
|
|
typedef unsigned long (*OPENSSL_version_major_t)(void);
|
|
|
|
typedef unsigned long (*OPENSSL_version_minor_t)(void);
|
|
|
|
typedef unsigned long (*OPENSSL_version_patch_t)(void);
|
2018-03-31 01:17:39 +08:00
|
|
|
typedef DSO * (*DSO_dsobyaddr_t)(void (*addr)(void), int flags);
|
2018-03-20 01:37:46 +08:00
|
|
|
typedef int (*DSO_free_t)(DSO *dso);
|
2016-10-18 21:16:35 +08:00
|
|
|
|
2017-05-06 19:59:18 +08:00
|
|
|
typedef enum test_types_en {
|
|
|
|
CRYPTO_FIRST,
|
|
|
|
SSL_FIRST,
|
2018-03-20 01:37:46 +08:00
|
|
|
JUST_CRYPTO,
|
2018-11-16 01:41:06 +08:00
|
|
|
DSO_REFTEST,
|
|
|
|
NO_ATEXIT
|
2017-05-06 19:59:18 +08:00
|
|
|
} TEST_TYPE;
|
|
|
|
|
|
|
|
static TEST_TYPE test_type;
|
|
|
|
static const char *path_crypto;
|
|
|
|
static const char *path_ssl;
|
2018-11-16 01:41:06 +08:00
|
|
|
static const char *path_atexit;
|
2017-05-06 19:59:18 +08:00
|
|
|
|
2020-11-25 14:56:08 +08:00
|
|
|
#ifdef SD_INIT
|
2017-05-06 05:39:13 +08:00
|
|
|
|
2018-11-16 22:05:14 +08:00
|
|
|
static int atexit_handler_done = 0;
|
|
|
|
|
2018-11-16 01:41:06 +08:00
|
|
|
static void atexit_handler(void)
|
|
|
|
{
|
|
|
|
FILE *atexit_file = fopen(path_atexit, "w");
|
|
|
|
|
|
|
|
if (atexit_file == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
fprintf(atexit_file, "atexit() run\n");
|
|
|
|
fclose(atexit_file);
|
2018-11-16 22:05:14 +08:00
|
|
|
atexit_handler_done++;
|
2018-11-16 01:41:06 +08:00
|
|
|
}
|
|
|
|
|
2017-05-06 05:39:13 +08:00
|
|
|
static int test_lib(void)
|
2016-10-18 21:16:35 +08:00
|
|
|
{
|
2020-11-25 14:56:08 +08:00
|
|
|
SD ssllib = SD_INIT;
|
|
|
|
SD cryptolib = SD_INIT;
|
2016-10-18 21:16:35 +08:00
|
|
|
SSL_CTX *ctx;
|
|
|
|
union {
|
2017-05-06 05:39:13 +08:00
|
|
|
void (*func)(void);
|
2020-11-25 14:56:08 +08:00
|
|
|
SD_SYM sym;
|
2018-11-16 01:41:06 +08:00
|
|
|
} symbols[5];
|
2017-05-06 05:39:13 +08:00
|
|
|
TLS_method_t myTLS_method;
|
|
|
|
SSL_CTX_new_t mySSL_CTX_new;
|
|
|
|
SSL_CTX_free_t mySSL_CTX_free;
|
|
|
|
ERR_get_error_t myERR_get_error;
|
Switch to MAJOR.MINOR.PATCH versioning and version 3.0.0-dev
We're strictly use version numbers of the form MAJOR.MINOR.PATCH.
Letter releases are things of days past.
The most central change is that we now express the version number with
three macros, one for each part of the version number:
OPENSSL_VERSION_MAJOR
OPENSSL_VERSION_MINOR
OPENSSL_VERSION_PATCH
We also provide two additional macros to express pre-release and build
metadata information (also specified in semantic versioning):
OPENSSL_VERSION_PRE_RELEASE
OPENSSL_VERSION_BUILD_METADATA
To get the library's idea of all those values, we introduce the
following functions:
unsigned int OPENSSL_version_major(void);
unsigned int OPENSSL_version_minor(void);
unsigned int OPENSSL_version_patch(void);
const char *OPENSSL_version_pre_release(void);
const char *OPENSSL_version_build_metadata(void);
Additionally, for shared library versioning (which is out of scope in
semantic versioning, but that we still need):
OPENSSL_SHLIB_VERSION
We also provide a macro that contains the release date. This is not
part of the version number, but is extra information that we want to
be able to display:
OPENSSL_RELEASE_DATE
Finally, also provide the following convenience functions:
const char *OPENSSL_version_text(void);
const char *OPENSSL_version_text_full(void);
The following macros and functions are deprecated, and while currently
existing for backward compatibility, they are expected to disappear:
OPENSSL_VERSION_NUMBER
OPENSSL_VERSION_TEXT
OPENSSL_VERSION
OpenSSL_version_num()
OpenSSL_version()
Also, this function is introduced to replace OpenSSL_version() for all
indexes except for OPENSSL_VERSION:
OPENSSL_info()
For configuration, the option 'newversion-only' is added to disable all
the macros and functions that are mentioned as deprecated above.
Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Matthias St. Pierre <Matthias.St.Pierre@ncp-e.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/7724)
2018-09-27 21:56:35 +08:00
|
|
|
OPENSSL_version_major_t myOPENSSL_version_major;
|
|
|
|
OPENSSL_version_minor_t myOPENSSL_version_minor;
|
|
|
|
OPENSSL_version_patch_t myOPENSSL_version_patch;
|
2018-11-16 01:41:06 +08:00
|
|
|
OPENSSL_atexit_t myOPENSSL_atexit;
|
2017-05-06 05:39:13 +08:00
|
|
|
int result = 0;
|
|
|
|
|
|
|
|
switch (test_type) {
|
|
|
|
case JUST_CRYPTO:
|
2018-11-15 22:50:52 +08:00
|
|
|
case DSO_REFTEST:
|
2018-11-16 01:41:06 +08:00
|
|
|
case NO_ATEXIT:
|
2017-05-06 05:39:13 +08:00
|
|
|
case CRYPTO_FIRST:
|
2020-11-25 14:56:08 +08:00
|
|
|
if (!sd_load(path_crypto, &cryptolib, SD_SHLIB)) {
|
2018-11-16 00:59:41 +08:00
|
|
|
fprintf(stderr, "Failed to load libcrypto\n");
|
2017-05-06 05:39:13 +08:00
|
|
|
goto end;
|
2018-11-16 00:59:41 +08:00
|
|
|
}
|
|
|
|
if (test_type != CRYPTO_FIRST)
|
|
|
|
break;
|
|
|
|
/* Fall through */
|
|
|
|
|
2017-05-06 05:39:13 +08:00
|
|
|
case SSL_FIRST:
|
2020-11-25 14:56:08 +08:00
|
|
|
if (!sd_load(path_ssl, &ssllib, SD_SHLIB)) {
|
2018-11-16 00:59:41 +08:00
|
|
|
fprintf(stderr, "Failed to load libssl\n");
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
if (test_type != SSL_FIRST)
|
|
|
|
break;
|
2020-11-25 14:56:08 +08:00
|
|
|
if (!sd_load(path_crypto, &cryptolib, SD_SHLIB)) {
|
2018-11-16 00:59:41 +08:00
|
|
|
fprintf(stderr, "Failed to load libcrypto\n");
|
2017-05-06 05:39:13 +08:00
|
|
|
goto end;
|
2018-11-16 00:59:41 +08:00
|
|
|
}
|
2017-05-06 05:39:13 +08:00
|
|
|
break;
|
2016-10-18 21:16:35 +08:00
|
|
|
}
|
|
|
|
|
2018-11-16 01:41:06 +08:00
|
|
|
if (test_type == NO_ATEXIT) {
|
|
|
|
OPENSSL_init_crypto_t myOPENSSL_init_crypto;
|
|
|
|
|
2020-11-25 14:56:08 +08:00
|
|
|
if (!sd_sym(cryptolib, "OPENSSL_init_crypto", &symbols[0].sym)) {
|
2018-11-16 01:41:06 +08:00
|
|
|
fprintf(stderr, "Failed to load OPENSSL_init_crypto symbol\n");
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
myOPENSSL_init_crypto = (OPENSSL_init_crypto_t)symbols[0].func;
|
|
|
|
if (!myOPENSSL_init_crypto(OPENSSL_INIT_NO_ATEXIT, NULL)) {
|
|
|
|
fprintf(stderr, "Failed to initialise libcrypto\n");
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (test_type != JUST_CRYPTO
|
|
|
|
&& test_type != DSO_REFTEST
|
|
|
|
&& test_type != NO_ATEXIT) {
|
2020-11-25 14:56:08 +08:00
|
|
|
if (!sd_sym(ssllib, "TLS_method", &symbols[0].sym)
|
|
|
|
|| !sd_sym(ssllib, "SSL_CTX_new", &symbols[1].sym)
|
|
|
|
|| !sd_sym(ssllib, "SSL_CTX_free", &symbols[2].sym)) {
|
2018-11-16 00:59:41 +08:00
|
|
|
fprintf(stderr, "Failed to load libssl symbols\n");
|
2017-05-06 05:39:13 +08:00
|
|
|
goto end;
|
2018-11-16 00:59:41 +08:00
|
|
|
}
|
2017-05-06 05:39:13 +08:00
|
|
|
myTLS_method = (TLS_method_t)symbols[0].func;
|
|
|
|
mySSL_CTX_new = (SSL_CTX_new_t)symbols[1].func;
|
|
|
|
mySSL_CTX_free = (SSL_CTX_free_t)symbols[2].func;
|
2018-11-16 00:59:41 +08:00
|
|
|
ctx = mySSL_CTX_new(myTLS_method());
|
|
|
|
if (ctx == NULL) {
|
|
|
|
fprintf(stderr, "Failed to create SSL_CTX\n");
|
2017-05-06 05:39:13 +08:00
|
|
|
goto end;
|
2018-11-16 00:59:41 +08:00
|
|
|
}
|
2017-05-06 05:39:13 +08:00
|
|
|
mySSL_CTX_free(ctx);
|
2016-10-18 21:16:35 +08:00
|
|
|
}
|
|
|
|
|
2020-11-25 14:56:08 +08:00
|
|
|
if (!sd_sym(cryptolib, "ERR_get_error", &symbols[0].sym)
|
|
|
|
|| !sd_sym(cryptolib, "OPENSSL_version_major", &symbols[1].sym)
|
|
|
|
|| !sd_sym(cryptolib, "OPENSSL_version_minor", &symbols[2].sym)
|
|
|
|
|| !sd_sym(cryptolib, "OPENSSL_version_patch", &symbols[3].sym)
|
|
|
|
|| !sd_sym(cryptolib, "OPENSSL_atexit", &symbols[4].sym)) {
|
2018-11-16 00:59:41 +08:00
|
|
|
fprintf(stderr, "Failed to load libcrypto symbols\n");
|
2017-05-06 05:39:13 +08:00
|
|
|
goto end;
|
2018-11-16 00:59:41 +08:00
|
|
|
}
|
2017-05-06 05:39:13 +08:00
|
|
|
myERR_get_error = (ERR_get_error_t)symbols[0].func;
|
2018-11-16 00:59:41 +08:00
|
|
|
if (myERR_get_error() != 0) {
|
|
|
|
fprintf(stderr, "Unexpected ERR_get_error() response\n");
|
2017-05-06 05:39:13 +08:00
|
|
|
goto end;
|
2018-11-16 00:59:41 +08:00
|
|
|
}
|
2018-03-15 00:31:20 +08:00
|
|
|
|
2018-11-16 00:59:41 +08:00
|
|
|
/* Library and header version should be identical in this test */
|
Switch to MAJOR.MINOR.PATCH versioning and version 3.0.0-dev
We're strictly use version numbers of the form MAJOR.MINOR.PATCH.
Letter releases are things of days past.
The most central change is that we now express the version number with
three macros, one for each part of the version number:
OPENSSL_VERSION_MAJOR
OPENSSL_VERSION_MINOR
OPENSSL_VERSION_PATCH
We also provide two additional macros to express pre-release and build
metadata information (also specified in semantic versioning):
OPENSSL_VERSION_PRE_RELEASE
OPENSSL_VERSION_BUILD_METADATA
To get the library's idea of all those values, we introduce the
following functions:
unsigned int OPENSSL_version_major(void);
unsigned int OPENSSL_version_minor(void);
unsigned int OPENSSL_version_patch(void);
const char *OPENSSL_version_pre_release(void);
const char *OPENSSL_version_build_metadata(void);
Additionally, for shared library versioning (which is out of scope in
semantic versioning, but that we still need):
OPENSSL_SHLIB_VERSION
We also provide a macro that contains the release date. This is not
part of the version number, but is extra information that we want to
be able to display:
OPENSSL_RELEASE_DATE
Finally, also provide the following convenience functions:
const char *OPENSSL_version_text(void);
const char *OPENSSL_version_text_full(void);
The following macros and functions are deprecated, and while currently
existing for backward compatibility, they are expected to disappear:
OPENSSL_VERSION_NUMBER
OPENSSL_VERSION_TEXT
OPENSSL_VERSION
OpenSSL_version_num()
OpenSSL_version()
Also, this function is introduced to replace OpenSSL_version() for all
indexes except for OPENSSL_VERSION:
OPENSSL_info()
For configuration, the option 'newversion-only' is added to disable all
the macros and functions that are mentioned as deprecated above.
Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Matthias St. Pierre <Matthias.St.Pierre@ncp-e.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/7724)
2018-09-27 21:56:35 +08:00
|
|
|
myOPENSSL_version_major = (OPENSSL_version_major_t)symbols[1].func;
|
|
|
|
myOPENSSL_version_minor = (OPENSSL_version_minor_t)symbols[2].func;
|
|
|
|
myOPENSSL_version_patch = (OPENSSL_version_patch_t)symbols[3].func;
|
2018-11-16 00:59:41 +08:00
|
|
|
if (myOPENSSL_version_major() != OPENSSL_VERSION_MAJOR
|
|
|
|
|| myOPENSSL_version_minor() != OPENSSL_VERSION_MINOR
|
|
|
|
|| myOPENSSL_version_patch() != OPENSSL_VERSION_PATCH) {
|
|
|
|
fprintf(stderr, "Invalid library version number\n");
|
2017-05-06 05:39:13 +08:00
|
|
|
goto end;
|
2018-11-16 00:59:41 +08:00
|
|
|
}
|
2017-05-06 05:39:13 +08:00
|
|
|
|
2018-11-16 01:41:06 +08:00
|
|
|
myOPENSSL_atexit = (OPENSSL_atexit_t)symbols[4].func;
|
|
|
|
if (!myOPENSSL_atexit(atexit_handler)) {
|
|
|
|
fprintf(stderr, "Failed to register atexit handler\n");
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
|
2018-03-20 01:37:46 +08:00
|
|
|
if (test_type == DSO_REFTEST) {
|
|
|
|
# ifdef DSO_DLFCN
|
2018-03-23 21:18:16 +08:00
|
|
|
DSO_dsobyaddr_t myDSO_dsobyaddr;
|
|
|
|
DSO_free_t myDSO_free;
|
|
|
|
|
2018-03-20 01:37:46 +08:00
|
|
|
/*
|
|
|
|
* This is resembling the code used in ossl_init_base() and
|
|
|
|
* OPENSSL_atexit() to block unloading the library after dlclose().
|
|
|
|
* We are not testing this on Windows, because it is done there in a
|
|
|
|
* completely different way. Especially as a call to DSO_dsobyaddr()
|
|
|
|
* will always return an error, because DSO_pathbyaddr() is not
|
|
|
|
* implemented there.
|
|
|
|
*/
|
2020-11-25 14:56:08 +08:00
|
|
|
if (!sd_sym(cryptolib, "DSO_dsobyaddr", &symbols[0].sym)
|
|
|
|
|| !sd_sym(cryptolib, "DSO_free", &symbols[1].sym)) {
|
2018-11-16 00:59:41 +08:00
|
|
|
fprintf(stderr, "Unable to load DSO symbols\n");
|
2018-03-20 01:37:46 +08:00
|
|
|
goto end;
|
2018-11-16 00:59:41 +08:00
|
|
|
}
|
2018-03-20 01:37:46 +08:00
|
|
|
|
|
|
|
myDSO_dsobyaddr = (DSO_dsobyaddr_t)symbols[0].func;
|
|
|
|
myDSO_free = (DSO_free_t)symbols[1].func;
|
|
|
|
|
|
|
|
{
|
|
|
|
DSO *hndl;
|
|
|
|
/* use known symbol from crypto module */
|
2018-11-16 00:59:41 +08:00
|
|
|
hndl = myDSO_dsobyaddr((void (*)(void))myERR_get_error, 0);
|
|
|
|
if (hndl == NULL) {
|
|
|
|
fprintf(stderr, "DSO_dsobyaddr() failed\n");
|
2018-03-20 01:37:46 +08:00
|
|
|
goto end;
|
2018-11-16 00:59:41 +08:00
|
|
|
}
|
2018-03-23 08:05:41 +08:00
|
|
|
myDSO_free(hndl);
|
2018-03-20 01:37:46 +08:00
|
|
|
}
|
|
|
|
# endif /* DSO_DLFCN */
|
|
|
|
}
|
|
|
|
|
2020-11-25 14:56:08 +08:00
|
|
|
if (!sd_close(cryptolib)) {
|
2018-11-16 22:05:14 +08:00
|
|
|
fprintf(stderr, "Failed to close libcrypto\n");
|
|
|
|
goto end;
|
|
|
|
}
|
2018-11-16 00:59:41 +08:00
|
|
|
|
2018-11-16 22:05:14 +08:00
|
|
|
if (test_type == CRYPTO_FIRST || test_type == SSL_FIRST) {
|
2020-11-25 14:56:08 +08:00
|
|
|
if (!sd_close(ssllib)) {
|
2018-11-16 00:59:41 +08:00
|
|
|
fprintf(stderr, "Failed to close libssl\n");
|
|
|
|
goto end;
|
|
|
|
}
|
2018-11-16 22:05:14 +08:00
|
|
|
}
|
2018-11-16 00:59:41 +08:00
|
|
|
|
2018-11-16 22:05:14 +08:00
|
|
|
# if defined(OPENSSL_NO_PINSHARED) \
|
|
|
|
&& defined(__GLIBC__) \
|
|
|
|
&& defined(__GLIBC_PREREQ) \
|
|
|
|
&& defined(OPENSSL_SYS_LINUX)
|
|
|
|
# if __GLIBC_PREREQ(2, 3)
|
|
|
|
/*
|
|
|
|
* If we didn't pin the so then we are hopefully on a platform that supports
|
|
|
|
* running atexit() on so unload. If not we might crash. We know this is
|
|
|
|
* true on linux since glibc 2.2.3
|
|
|
|
*/
|
|
|
|
if (test_type != NO_ATEXIT && atexit_handler_done != 1) {
|
|
|
|
fprintf(stderr, "atexit() handler did not run\n");
|
|
|
|
goto end;
|
2016-10-18 21:16:35 +08:00
|
|
|
}
|
2018-11-16 22:05:14 +08:00
|
|
|
# endif
|
|
|
|
# endif
|
2016-10-18 21:16:35 +08:00
|
|
|
|
2017-05-06 05:39:13 +08:00
|
|
|
result = 1;
|
|
|
|
end:
|
|
|
|
return result;
|
|
|
|
}
|
2017-05-06 19:59:18 +08:00
|
|
|
#endif
|
|
|
|
|
2016-10-18 21:16:35 +08:00
|
|
|
|
2018-11-16 00:59:41 +08:00
|
|
|
/*
|
|
|
|
* shlibloadtest should not use the normal test framework because we don't want
|
|
|
|
* it to link against libcrypto (which the framework uses). The point of the
|
|
|
|
* test is to check dynamic loading and unloading of libcrypto/libssl.
|
|
|
|
*/
|
|
|
|
int main(int argc, char *argv[])
|
2017-05-06 05:39:13 +08:00
|
|
|
{
|
2018-11-16 00:59:41 +08:00
|
|
|
const char *p;
|
|
|
|
|
2018-11-16 01:41:06 +08:00
|
|
|
if (argc != 5) {
|
|
|
|
fprintf(stderr, "Incorrect number of arguments\n");
|
2018-11-16 00:59:41 +08:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
p = argv[1];
|
2016-10-18 21:16:35 +08:00
|
|
|
|
2017-07-18 09:48:27 +08:00
|
|
|
if (strcmp(p, "-crypto_first") == 0) {
|
2017-05-06 05:39:13 +08:00
|
|
|
test_type = CRYPTO_FIRST;
|
2017-07-18 09:48:27 +08:00
|
|
|
} else if (strcmp(p, "-ssl_first") == 0) {
|
2017-05-06 05:39:13 +08:00
|
|
|
test_type = SSL_FIRST;
|
2017-07-18 09:48:27 +08:00
|
|
|
} else if (strcmp(p, "-just_crypto") == 0) {
|
2017-05-06 05:39:13 +08:00
|
|
|
test_type = JUST_CRYPTO;
|
2018-03-20 01:37:46 +08:00
|
|
|
} else if (strcmp(p, "-dso_ref") == 0) {
|
2018-11-15 22:50:52 +08:00
|
|
|
test_type = DSO_REFTEST;
|
2018-11-16 01:41:06 +08:00
|
|
|
} else if (strcmp(p, "-no_atexit") == 0) {
|
|
|
|
test_type = NO_ATEXIT;
|
2017-05-06 05:39:13 +08:00
|
|
|
} else {
|
2018-11-16 01:41:06 +08:00
|
|
|
fprintf(stderr, "Unrecognised argument\n");
|
2018-11-16 00:59:41 +08:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
path_crypto = argv[2];
|
|
|
|
path_ssl = argv[3];
|
2018-11-16 01:41:06 +08:00
|
|
|
path_atexit = argv[4];
|
2018-11-16 00:59:41 +08:00
|
|
|
if (path_crypto == NULL || path_ssl == NULL) {
|
|
|
|
fprintf(stderr, "Invalid libcrypto/libssl path\n");
|
|
|
|
return 1;
|
2016-10-18 21:16:35 +08:00
|
|
|
}
|
|
|
|
|
2020-11-25 14:56:08 +08:00
|
|
|
#ifdef SD_INIT
|
2018-11-16 00:59:41 +08:00
|
|
|
if (!test_lib())
|
|
|
|
return 1;
|
2017-05-06 19:59:18 +08:00
|
|
|
#endif
|
2018-11-16 00:59:41 +08:00
|
|
|
return 0;
|
2016-10-18 21:16:35 +08:00
|
|
|
}
|