mirror of
https://github.com/openssl/openssl.git
synced 2024-12-15 06:01:37 +08:00
b940f943a2
Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19703)
136 lines
3.8 KiB
C
136 lines
3.8 KiB
C
/*
|
|
* Copyright 2022 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
|
|
#include <openssl/opensslconf.h>
|
|
#include <openssl/quic.h>
|
|
|
|
#include "helpers/ssltestlib.h"
|
|
#include "testutil.h"
|
|
#include "testutil/output.h"
|
|
|
|
static OSSL_LIB_CTX *libctx = NULL;
|
|
static OSSL_PROVIDER *defctxnull = NULL;
|
|
|
|
static int is_fips = 0;
|
|
|
|
#if 0
|
|
/* TODO(QUIC): Temporarily disabled during front-end I/O API finalization. */
|
|
|
|
/*
|
|
* Test that we read what we've written.
|
|
*/
|
|
static int test_quic_write_read(void)
|
|
{
|
|
SSL_CTX *cctx = NULL, *sctx = NULL;
|
|
SSL *clientquic = NULL, *serverquic = NULL;
|
|
int j, ret = 0;
|
|
char buf[20];
|
|
static char *msg = "A test message";
|
|
size_t msglen = strlen(msg);
|
|
size_t numbytes = 0;
|
|
|
|
if (!TEST_true(create_ssl_ctx_pair(libctx, OSSL_QUIC_server_method(),
|
|
OSSL_QUIC_client_method(),
|
|
0,
|
|
0,
|
|
&sctx, &cctx, NULL, NULL))
|
|
|| !TEST_true(create_ssl_objects(sctx, cctx, &serverquic, &clientquic,
|
|
NULL, NULL))
|
|
|| !TEST_true(create_bare_ssl_connection(serverquic, clientquic,
|
|
SSL_ERROR_NONE, 0, 0)))
|
|
goto end;
|
|
|
|
for (j = 0; j < 2; j++) {
|
|
/* Check that sending and receiving app data is ok */
|
|
if (!TEST_true(SSL_write_ex(clientquic, msg, msglen, &numbytes))
|
|
|| !TEST_true(SSL_read_ex(serverquic, buf, sizeof(buf),
|
|
&numbytes))
|
|
|| !TEST_mem_eq(buf, numbytes, msg, msglen))
|
|
goto end;
|
|
|
|
if (!TEST_true(SSL_write_ex(serverquic, msg, msglen, &numbytes))
|
|
|| !TEST_true(SSL_read_ex(clientquic, buf, sizeof(buf),
|
|
&numbytes))
|
|
|| !TEST_mem_eq(buf, numbytes, msg, msglen))
|
|
goto end;
|
|
}
|
|
|
|
ret = 1;
|
|
|
|
end:
|
|
SSL_free(serverquic);
|
|
SSL_free(clientquic);
|
|
SSL_CTX_free(sctx);
|
|
SSL_CTX_free(cctx);
|
|
|
|
return ret;
|
|
}
|
|
#endif
|
|
|
|
OPT_TEST_DECLARE_USAGE("provider config\n")
|
|
|
|
int setup_tests(void)
|
|
{
|
|
char *modulename;
|
|
char *configfile;
|
|
|
|
libctx = OSSL_LIB_CTX_new();
|
|
if (!TEST_ptr(libctx))
|
|
return 0;
|
|
|
|
defctxnull = OSSL_PROVIDER_load(NULL, "null");
|
|
|
|
/*
|
|
* Verify that the default and fips providers in the default libctx are not
|
|
* available
|
|
*/
|
|
if (!TEST_false(OSSL_PROVIDER_available(NULL, "default"))
|
|
|| !TEST_false(OSSL_PROVIDER_available(NULL, "fips")))
|
|
return 0;
|
|
|
|
if (!test_skip_common_options()) {
|
|
TEST_error("Error parsing test options\n");
|
|
return 0;
|
|
}
|
|
|
|
if (!TEST_ptr(modulename = test_get_argument(0))
|
|
|| !TEST_ptr(configfile = test_get_argument(1)))
|
|
return 0;
|
|
|
|
if (!TEST_true(OSSL_LIB_CTX_load_config(libctx, configfile)))
|
|
return 0;
|
|
|
|
/* Check we have the expected provider available */
|
|
if (!TEST_true(OSSL_PROVIDER_available(libctx, modulename)))
|
|
return 0;
|
|
|
|
/* Check the default provider is not available */
|
|
if (strcmp(modulename, "default") != 0
|
|
&& !TEST_false(OSSL_PROVIDER_available(libctx, "default")))
|
|
return 0;
|
|
|
|
if (strcmp(modulename, "fips") == 0)
|
|
is_fips = 1;
|
|
|
|
/* TODO(QUIC): Temporarily disabled during front-end I/O API finalization. */
|
|
#if 0
|
|
ADD_TEST(test_quic_write_read);
|
|
#endif
|
|
return 1;
|
|
}
|
|
|
|
void cleanup_tests(void)
|
|
{
|
|
OSSL_PROVIDER_unload(defctxnull);
|
|
OSSL_LIB_CTX_free(libctx);
|
|
}
|