|  | /* | 
|  | * Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved. | 
|  | * | 
|  | * Licensed under the OpenSSL license (the "License").  You may not use | 
|  | * this file except in compliance with the License.  You can obtain a copy | 
|  | * in the file LICENSE in the source distribution or at | 
|  | * https://www.openssl.org/source/license.html | 
|  | */ | 
|  |  | 
|  | #include "test_config.h" | 
|  |  | 
|  | #include <stdio.h> | 
|  | #include <stdlib.h> | 
|  | #include <string.h> | 
|  |  | 
|  | #include <memory> | 
|  |  | 
|  | #include <openssl/evp.h> | 
|  |  | 
|  | namespace { | 
|  |  | 
|  | template <typename T> | 
|  | struct Flag { | 
|  | const char *flag; | 
|  | T TestConfig::*member; | 
|  | }; | 
|  |  | 
|  | // FindField looks for the flag in |flags| that matches |flag|. If one is found, | 
|  | // it returns a pointer to the corresponding field in |config|. Otherwise, it | 
|  | // returns NULL. | 
|  | template<typename T, size_t N> | 
|  | T *FindField(TestConfig *config, const Flag<T> (&flags)[N], const char *flag) { | 
|  | for (size_t i = 0; i < N; i++) { | 
|  | if (strcmp(flag, flags[i].flag) == 0) { | 
|  | return &(config->*(flags[i].member)); | 
|  | } | 
|  | } | 
|  | return NULL; | 
|  | } | 
|  |  | 
|  | const Flag<bool> kBoolFlags[] = { | 
|  | { "-server", &TestConfig::is_server }, | 
|  | { "-dtls", &TestConfig::is_dtls }, | 
|  | { "-fallback-scsv", &TestConfig::fallback_scsv }, | 
|  | { "-require-any-client-certificate", | 
|  | &TestConfig::require_any_client_certificate }, | 
|  | { "-async", &TestConfig::async }, | 
|  | { "-write-different-record-sizes", | 
|  | &TestConfig::write_different_record_sizes }, | 
|  | { "-partial-write", &TestConfig::partial_write }, | 
|  | { "-no-tls13", &TestConfig::no_tls13 }, | 
|  | { "-no-tls12", &TestConfig::no_tls12 }, | 
|  | { "-no-tls11", &TestConfig::no_tls11 }, | 
|  | { "-no-tls1", &TestConfig::no_tls1 }, | 
|  | { "-no-ssl3", &TestConfig::no_ssl3 }, | 
|  | { "-shim-writes-first", &TestConfig::shim_writes_first }, | 
|  | { "-expect-session-miss", &TestConfig::expect_session_miss }, | 
|  | { "-decline-alpn", &TestConfig::decline_alpn }, | 
|  | { "-expect-extended-master-secret", | 
|  | &TestConfig::expect_extended_master_secret }, | 
|  | { "-implicit-handshake", &TestConfig::implicit_handshake }, | 
|  | { "-handshake-never-done", &TestConfig::handshake_never_done }, | 
|  | { "-use-export-context", &TestConfig::use_export_context }, | 
|  | { "-expect-ticket-renewal", &TestConfig::expect_ticket_renewal }, | 
|  | { "-expect-no-session", &TestConfig::expect_no_session }, | 
|  | { "-use-ticket-callback", &TestConfig::use_ticket_callback }, | 
|  | { "-renew-ticket", &TestConfig::renew_ticket }, | 
|  | { "-enable-client-custom-extension", | 
|  | &TestConfig::enable_client_custom_extension }, | 
|  | { "-enable-server-custom-extension", | 
|  | &TestConfig::enable_server_custom_extension }, | 
|  | { "-custom-extension-skip", &TestConfig::custom_extension_skip }, | 
|  | { "-custom-extension-fail-add", &TestConfig::custom_extension_fail_add }, | 
|  | { "-check-close-notify", &TestConfig::check_close_notify }, | 
|  | { "-shim-shuts-down", &TestConfig::shim_shuts_down }, | 
|  | { "-verify-fail", &TestConfig::verify_fail }, | 
|  | { "-verify-peer", &TestConfig::verify_peer }, | 
|  | { "-expect-verify-result", &TestConfig::expect_verify_result }, | 
|  | { "-renegotiate-freely", &TestConfig::renegotiate_freely }, | 
|  | { "-p384-only", &TestConfig::p384_only }, | 
|  | { "-enable-all-curves", &TestConfig::enable_all_curves }, | 
|  | { "-use-sparse-dh-prime", &TestConfig::use_sparse_dh_prime }, | 
|  | { "-use-old-client-cert-callback", | 
|  | &TestConfig::use_old_client_cert_callback }, | 
|  | { "-use-null-client-ca-list", &TestConfig::use_null_client_ca_list }, | 
|  | { "-peek-then-read", &TestConfig::peek_then_read }, | 
|  | }; | 
|  |  | 
|  | const Flag<std::string> kStringFlags[] = { | 
|  | { "-key-file", &TestConfig::key_file }, | 
|  | { "-cert-file", &TestConfig::cert_file }, | 
|  | { "-expect-server-name", &TestConfig::expected_server_name }, | 
|  | { "-advertise-npn", &TestConfig::advertise_npn }, | 
|  | { "-expect-next-proto", &TestConfig::expected_next_proto }, | 
|  | { "-select-next-proto", &TestConfig::select_next_proto }, | 
|  | { "-host-name", &TestConfig::host_name }, | 
|  | { "-advertise-alpn", &TestConfig::advertise_alpn }, | 
|  | { "-expect-alpn", &TestConfig::expected_alpn }, | 
|  | { "-expect-advertised-alpn", &TestConfig::expected_advertised_alpn }, | 
|  | { "-select-alpn", &TestConfig::select_alpn }, | 
|  | { "-psk", &TestConfig::psk }, | 
|  | { "-psk-identity", &TestConfig::psk_identity }, | 
|  | { "-srtp-profiles", &TestConfig::srtp_profiles }, | 
|  | { "-cipher", &TestConfig::cipher }, | 
|  | { "-export-label", &TestConfig::export_label }, | 
|  | { "-export-context", &TestConfig::export_context }, | 
|  | }; | 
|  |  | 
|  | const Flag<std::string> kBase64Flags[] = { | 
|  | { "-expect-certificate-types", &TestConfig::expected_certificate_types }, | 
|  | }; | 
|  |  | 
|  | const Flag<int> kIntFlags[] = { | 
|  | { "-port", &TestConfig::port }, | 
|  | { "-resume-count", &TestConfig::resume_count }, | 
|  | { "-min-version", &TestConfig::min_version }, | 
|  | { "-max-version", &TestConfig::max_version }, | 
|  | { "-mtu", &TestConfig::mtu }, | 
|  | { "-export-keying-material", &TestConfig::export_keying_material }, | 
|  | { "-expect-total-renegotiations", &TestConfig::expect_total_renegotiations }, | 
|  | { "-max-cert-list", &TestConfig::max_cert_list }, | 
|  | }; | 
|  |  | 
|  | }  // namespace | 
|  |  | 
|  | bool ParseConfig(int argc, char **argv, TestConfig *out_config) { | 
|  | for (int i = 0; i < argc; i++) { | 
|  | bool *bool_field = FindField(out_config, kBoolFlags, argv[i]); | 
|  | if (bool_field != NULL) { | 
|  | *bool_field = true; | 
|  | continue; | 
|  | } | 
|  |  | 
|  | std::string *string_field = FindField(out_config, kStringFlags, argv[i]); | 
|  | if (string_field != NULL) { | 
|  | const char *val; | 
|  |  | 
|  | i++; | 
|  | if (i >= argc) { | 
|  | fprintf(stderr, "Missing parameter\n"); | 
|  | return false; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * Fix up the -cipher argument. runner uses "DEFAULT:NULL-SHA" to enable | 
|  | * the NULL-SHA cipher. However in OpenSSL "DEFAULT" permanently switches | 
|  | * off NULL ciphers, so we use "ALL:NULL-SHA" instead. | 
|  | */ | 
|  | if (strcmp(argv[i - 1], "-cipher") == 0 | 
|  | && strcmp(argv[i], "DEFAULT:NULL-SHA") == 0) | 
|  | val = "ALL:NULL-SHA"; | 
|  | else | 
|  | val = argv[i]; | 
|  |  | 
|  | string_field->assign(val); | 
|  | continue; | 
|  | } | 
|  |  | 
|  | std::string *base64_field = FindField(out_config, kBase64Flags, argv[i]); | 
|  | if (base64_field != NULL) { | 
|  | i++; | 
|  | if (i >= argc) { | 
|  | fprintf(stderr, "Missing parameter\n"); | 
|  | return false; | 
|  | } | 
|  | std::unique_ptr<uint8_t[]> decoded(new uint8_t[strlen(argv[i])]); | 
|  | int len = EVP_DecodeBlock(decoded.get(), | 
|  | reinterpret_cast<const uint8_t *>(argv[i]), | 
|  | strlen(argv[i])); | 
|  | if (len < 0) { | 
|  | fprintf(stderr, "Invalid base64: %s\n", argv[i]); | 
|  | return false; | 
|  | } | 
|  | base64_field->assign(reinterpret_cast<const char *>(decoded.get()), len); | 
|  | continue; | 
|  | } | 
|  |  | 
|  | int *int_field = FindField(out_config, kIntFlags, argv[i]); | 
|  | if (int_field) { | 
|  | i++; | 
|  | if (i >= argc) { | 
|  | fprintf(stderr, "Missing parameter\n"); | 
|  | return false; | 
|  | } | 
|  | *int_field = atoi(argv[i]); | 
|  | continue; | 
|  | } | 
|  |  | 
|  | fprintf(stderr, "Unknown argument: %s\n", argv[i]); | 
|  | exit(89); | 
|  | return false; | 
|  | } | 
|  |  | 
|  | return true; | 
|  | } |