123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195 |
- /*
- * Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved.
- *
- * Licensed under the Apache License 2.0 (the "License"). You may not use
- * this file except in compliance with the License. You can obtain a copy
- * in the file LICENSE in the source distribution or at
- * https://www.openssl.org/source/license.html
- */
- #include "test_config.h"
- #include <stdio.h>
- #include <stdlib.h>
- #include <string.h>
- #include <memory>
- #include <openssl/evp.h>
- namespace {
- template <typename T>
- struct Flag {
- const char *flag;
- T TestConfig::*member;
- };
- // FindField looks for the flag in |flags| that matches |flag|. If one is found,
- // it returns a pointer to the corresponding field in |config|. Otherwise, it
- // returns NULL.
- template<typename T, size_t N>
- T *FindField(TestConfig *config, const Flag<T> (&flags)[N], const char *flag) {
- for (size_t i = 0; i < N; i++) {
- if (strcmp(flag, flags[i].flag) == 0) {
- return &(config->*(flags[i].member));
- }
- }
- return NULL;
- }
- const Flag<bool> kBoolFlags[] = {
- { "-server", &TestConfig::is_server },
- { "-dtls", &TestConfig::is_dtls },
- { "-fallback-scsv", &TestConfig::fallback_scsv },
- { "-require-any-client-certificate",
- &TestConfig::require_any_client_certificate },
- { "-async", &TestConfig::async },
- { "-write-different-record-sizes",
- &TestConfig::write_different_record_sizes },
- { "-partial-write", &TestConfig::partial_write },
- { "-no-tls13", &TestConfig::no_tls13 },
- { "-no-tls12", &TestConfig::no_tls12 },
- { "-no-tls11", &TestConfig::no_tls11 },
- { "-no-tls1", &TestConfig::no_tls1 },
- { "-no-ssl3", &TestConfig::no_ssl3 },
- { "-shim-writes-first", &TestConfig::shim_writes_first },
- { "-expect-session-miss", &TestConfig::expect_session_miss },
- { "-decline-alpn", &TestConfig::decline_alpn },
- { "-expect-extended-master-secret",
- &TestConfig::expect_extended_master_secret },
- { "-implicit-handshake", &TestConfig::implicit_handshake },
- { "-handshake-never-done", &TestConfig::handshake_never_done },
- { "-use-export-context", &TestConfig::use_export_context },
- { "-expect-ticket-renewal", &TestConfig::expect_ticket_renewal },
- { "-expect-no-session", &TestConfig::expect_no_session },
- { "-use-ticket-callback", &TestConfig::use_ticket_callback },
- { "-renew-ticket", &TestConfig::renew_ticket },
- { "-enable-client-custom-extension",
- &TestConfig::enable_client_custom_extension },
- { "-enable-server-custom-extension",
- &TestConfig::enable_server_custom_extension },
- { "-custom-extension-skip", &TestConfig::custom_extension_skip },
- { "-custom-extension-fail-add", &TestConfig::custom_extension_fail_add },
- { "-check-close-notify", &TestConfig::check_close_notify },
- { "-shim-shuts-down", &TestConfig::shim_shuts_down },
- { "-verify-fail", &TestConfig::verify_fail },
- { "-verify-peer", &TestConfig::verify_peer },
- { "-expect-verify-result", &TestConfig::expect_verify_result },
- { "-renegotiate-freely", &TestConfig::renegotiate_freely },
- { "-p384-only", &TestConfig::p384_only },
- { "-enable-all-curves", &TestConfig::enable_all_curves },
- { "-use-sparse-dh-prime", &TestConfig::use_sparse_dh_prime },
- { "-use-old-client-cert-callback",
- &TestConfig::use_old_client_cert_callback },
- { "-use-null-client-ca-list", &TestConfig::use_null_client_ca_list },
- { "-peek-then-read", &TestConfig::peek_then_read },
- };
- const Flag<std::string> kStringFlags[] = {
- { "-key-file", &TestConfig::key_file },
- { "-cert-file", &TestConfig::cert_file },
- { "-expect-server-name", &TestConfig::expected_server_name },
- { "-advertise-npn", &TestConfig::advertise_npn },
- { "-expect-next-proto", &TestConfig::expected_next_proto },
- { "-select-next-proto", &TestConfig::select_next_proto },
- { "-host-name", &TestConfig::host_name },
- { "-advertise-alpn", &TestConfig::advertise_alpn },
- { "-expect-alpn", &TestConfig::expected_alpn },
- { "-expect-advertised-alpn", &TestConfig::expected_advertised_alpn },
- { "-select-alpn", &TestConfig::select_alpn },
- { "-psk", &TestConfig::psk },
- { "-psk-identity", &TestConfig::psk_identity },
- { "-srtp-profiles", &TestConfig::srtp_profiles },
- { "-cipher", &TestConfig::cipher },
- { "-export-label", &TestConfig::export_label },
- { "-export-context", &TestConfig::export_context },
- };
- const Flag<std::string> kBase64Flags[] = {
- { "-expect-certificate-types", &TestConfig::expected_certificate_types },
- };
- const Flag<int> kIntFlags[] = {
- { "-port", &TestConfig::port },
- { "-resume-count", &TestConfig::resume_count },
- { "-min-version", &TestConfig::min_version },
- { "-max-version", &TestConfig::max_version },
- { "-mtu", &TestConfig::mtu },
- { "-export-keying-material", &TestConfig::export_keying_material },
- { "-expect-total-renegotiations", &TestConfig::expect_total_renegotiations },
- { "-max-cert-list", &TestConfig::max_cert_list },
- };
- } // namespace
- bool ParseConfig(int argc, char **argv, TestConfig *out_config) {
- for (int i = 0; i < argc; i++) {
- bool *bool_field = FindField(out_config, kBoolFlags, argv[i]);
- if (bool_field != NULL) {
- *bool_field = true;
- continue;
- }
- std::string *string_field = FindField(out_config, kStringFlags, argv[i]);
- if (string_field != NULL) {
- const char *val;
- i++;
- if (i >= argc) {
- fprintf(stderr, "Missing parameter\n");
- return false;
- }
- /*
- * Fix up the -cipher argument. runner uses "DEFAULT:NULL-SHA" to enable
- * the NULL-SHA cipher. However in OpenSSL "DEFAULT" permanently switches
- * off NULL ciphers, so we use "ALL:NULL-SHA" instead.
- */
- if (strcmp(argv[i - 1], "-cipher") == 0
- && strcmp(argv[i], "DEFAULT:NULL-SHA") == 0)
- val = "ALL:NULL-SHA";
- else
- val = argv[i];
- string_field->assign(val);
- continue;
- }
- std::string *base64_field = FindField(out_config, kBase64Flags, argv[i]);
- if (base64_field != NULL) {
- i++;
- if (i >= argc) {
- fprintf(stderr, "Missing parameter\n");
- return false;
- }
- std::unique_ptr<uint8_t[]> decoded(new uint8_t[strlen(argv[i])]);
- int len = EVP_DecodeBlock(decoded.get(),
- reinterpret_cast<const uint8_t *>(argv[i]),
- strlen(argv[i]));
- if (len < 0) {
- fprintf(stderr, "Invalid base64: %s\n", argv[i]);
- return false;
- }
- base64_field->assign(reinterpret_cast<const char *>(decoded.get()), len);
- continue;
- }
- int *int_field = FindField(out_config, kIntFlags, argv[i]);
- if (int_field) {
- i++;
- if (i >= argc) {
- fprintf(stderr, "Missing parameter\n");
- return false;
- }
- *int_field = atoi(argv[i]);
- continue;
- }
- fprintf(stderr, "Unknown argument: %s\n", argv[i]);
- exit(89);
- return false;
- }
- return true;
- }
|