/* * Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the OpenSSL license (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include "test_config.h" #include #include #include #include #include namespace { template struct Flag { const char *flag; T TestConfig::*member; }; // FindField looks for the flag in |flags| that matches |flag|. If one is found, // it returns a pointer to the corresponding field in |config|. Otherwise, it // returns NULL. template T *FindField(TestConfig *config, const Flag (&flags)[N], const char *flag) { for (size_t i = 0; i < N; i++) { if (strcmp(flag, flags[i].flag) == 0) { return &(config->*(flags[i].member)); } } return NULL; } const Flag kBoolFlags[] = { { "-server", &TestConfig::is_server }, { "-dtls", &TestConfig::is_dtls }, { "-fallback-scsv", &TestConfig::fallback_scsv }, { "-require-any-client-certificate", &TestConfig::require_any_client_certificate }, { "-async", &TestConfig::async }, { "-write-different-record-sizes", &TestConfig::write_different_record_sizes }, { "-partial-write", &TestConfig::partial_write }, { "-no-tls13", &TestConfig::no_tls13 }, { "-no-tls12", &TestConfig::no_tls12 }, { "-no-tls11", &TestConfig::no_tls11 }, { "-no-tls1", &TestConfig::no_tls1 }, { "-no-ssl3", &TestConfig::no_ssl3 }, { "-shim-writes-first", &TestConfig::shim_writes_first }, { "-expect-session-miss", &TestConfig::expect_session_miss }, { "-decline-alpn", &TestConfig::decline_alpn }, { "-expect-extended-master-secret", &TestConfig::expect_extended_master_secret }, { "-implicit-handshake", &TestConfig::implicit_handshake }, { "-handshake-never-done", &TestConfig::handshake_never_done }, { "-use-export-context", &TestConfig::use_export_context }, { "-expect-ticket-renewal", &TestConfig::expect_ticket_renewal }, { "-expect-no-session", &TestConfig::expect_no_session }, { "-use-ticket-callback", &TestConfig::use_ticket_callback }, { "-renew-ticket", &TestConfig::renew_ticket }, { "-enable-client-custom-extension", &TestConfig::enable_client_custom_extension }, { "-enable-server-custom-extension", &TestConfig::enable_server_custom_extension }, { "-custom-extension-skip", &TestConfig::custom_extension_skip }, { "-custom-extension-fail-add", &TestConfig::custom_extension_fail_add }, { "-check-close-notify", &TestConfig::check_close_notify }, { "-shim-shuts-down", &TestConfig::shim_shuts_down }, { "-verify-fail", &TestConfig::verify_fail }, { "-verify-peer", &TestConfig::verify_peer }, { "-expect-verify-result", &TestConfig::expect_verify_result }, { "-renegotiate-freely", &TestConfig::renegotiate_freely }, { "-p384-only", &TestConfig::p384_only }, { "-enable-all-curves", &TestConfig::enable_all_curves }, { "-use-sparse-dh-prime", &TestConfig::use_sparse_dh_prime }, { "-use-old-client-cert-callback", &TestConfig::use_old_client_cert_callback }, { "-use-null-client-ca-list", &TestConfig::use_null_client_ca_list }, { "-peek-then-read", &TestConfig::peek_then_read }, }; const Flag kStringFlags[] = { { "-key-file", &TestConfig::key_file }, { "-cert-file", &TestConfig::cert_file }, { "-expect-server-name", &TestConfig::expected_server_name }, { "-advertise-npn", &TestConfig::advertise_npn }, { "-expect-next-proto", &TestConfig::expected_next_proto }, { "-select-next-proto", &TestConfig::select_next_proto }, { "-host-name", &TestConfig::host_name }, { "-advertise-alpn", &TestConfig::advertise_alpn }, { "-expect-alpn", &TestConfig::expected_alpn }, { "-expect-advertised-alpn", &TestConfig::expected_advertised_alpn }, { "-select-alpn", &TestConfig::select_alpn }, { "-psk", &TestConfig::psk }, { "-psk-identity", &TestConfig::psk_identity }, { "-srtp-profiles", &TestConfig::srtp_profiles }, { "-cipher", &TestConfig::cipher }, { "-export-label", &TestConfig::export_label }, { "-export-context", &TestConfig::export_context }, }; const Flag kBase64Flags[] = { { "-expect-certificate-types", &TestConfig::expected_certificate_types }, }; const Flag kIntFlags[] = { { "-port", &TestConfig::port }, { "-resume-count", &TestConfig::resume_count }, { "-min-version", &TestConfig::min_version }, { "-max-version", &TestConfig::max_version }, { "-mtu", &TestConfig::mtu }, { "-export-keying-material", &TestConfig::export_keying_material }, { "-expect-total-renegotiations", &TestConfig::expect_total_renegotiations }, { "-max-cert-list", &TestConfig::max_cert_list }, }; } // namespace bool ParseConfig(int argc, char **argv, TestConfig *out_config) { for (int i = 0; i < argc; i++) { bool *bool_field = FindField(out_config, kBoolFlags, argv[i]); if (bool_field != NULL) { *bool_field = true; continue; } std::string *string_field = FindField(out_config, kStringFlags, argv[i]); if (string_field != NULL) { const char *val; i++; if (i >= argc) { fprintf(stderr, "Missing parameter\n"); return false; } /* * Fix up the -cipher argument. runner uses "DEFAULT:NULL-SHA" to enable * the NULL-SHA cipher. However in OpenSSL "DEFAULT" permanently switches * off NULL ciphers, so we use "ALL:NULL-SHA" instead. */ if (strcmp(argv[i - 1], "-cipher") == 0 && strcmp(argv[i], "DEFAULT:NULL-SHA") == 0) val = "ALL:NULL-SHA"; else val = argv[i]; string_field->assign(val); continue; } std::string *base64_field = FindField(out_config, kBase64Flags, argv[i]); if (base64_field != NULL) { i++; if (i >= argc) { fprintf(stderr, "Missing parameter\n"); return false; } std::unique_ptr decoded(new uint8_t[strlen(argv[i])]); int len = EVP_DecodeBlock(decoded.get(), reinterpret_cast(argv[i]), strlen(argv[i])); if (len < 0) { fprintf(stderr, "Invalid base64: %s\n", argv[i]); return false; } base64_field->assign(reinterpret_cast(decoded.get()), len); continue; } int *int_field = FindField(out_config, kIntFlags, argv[i]); if (int_field) { i++; if (i >= argc) { fprintf(stderr, "Missing parameter\n"); return false; } *int_field = atoi(argv[i]); continue; } fprintf(stderr, "Unknown argument: %s\n", argv[i]); exit(89); return false; } return true; }