boringssl/crypto/err/err_test.c
David Benjamin a70c75cfc0 Add a CRYPTO_library_init and static-initializer-less build option.
Chromium does not like static initializers, and the CPU logic uses one to
initialize CPU bits. However, the crypto library lacks an explicit
initialization function, which could complicate (no compile-time errors)
porting existing code which uses crypto/, but not ssl/.

Add an explicit CRYPTO_library_init function, but make it a no-op by default.
It only does anything (and is required) if building with
BORINGSSL_NO_STATIC_INITIALIZER.

Change-Id: I6933bdc3447fb382b1f87c788e5b8142d6f3fe39
Reviewed-on: https://boringssl-review.googlesource.com/1770
Reviewed-by: Adam Langley <agl@google.com>
2014-09-12 00:10:53 +00:00

129 lines
3.0 KiB
C

/* Copyright (c) 2014, Google Inc.
*
* Permission to use, copy, modify, and/or distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
* SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
* OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
* CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */
#include <stdio.h>
#include <openssl/crypto.h>
#include <openssl/err.h>
#include <openssl/mem.h>
static int test_overflow(void) {
unsigned i;
for (i = 0; i < ERR_NUM_ERRORS*2; i++) {
ERR_put_error(1, 2, 3, "test", 1);
}
for (i = 0; i < ERR_NUM_ERRORS - 1; i++) {
if (ERR_get_error() == 0) {
fprintf(stderr, "ERR_get_error failed at %u\n", i);
return 0;
}
}
if (ERR_get_error() != 0) {
fprintf(stderr, "ERR_get_error more than the expected number of values.\n");
return 0;
}
return 1;
}
static int test_put_error(void) {
uint32_t packed_error;
int line, flags;
const char *file;
char *data;
if (ERR_get_error() != 0) {
fprintf(stderr, "ERR_get_error returned value before an error was added.\n");
return 0;
}
ERR_put_error(1, 2, 3, "test", 4);
ERR_add_error_data(1, "testing");
packed_error = ERR_get_error_line_data(&file, &line, &data, &flags);
if (strcmp(file, "test") != 0 ||
line != 4 ||
(flags & ERR_FLAG_STRING) == 0 ||
(flags & ERR_FLAG_MALLOCED) == 0 ||
ERR_GET_LIB(packed_error) != 1 ||
ERR_GET_FUNC(packed_error) != 2 ||
ERR_GET_REASON(packed_error) != 3 ||
strcmp(data, "testing") != 0) {
fprintf(stderr, "Bad error data returned.\n");
return 0;
}
OPENSSL_free(data);
return 1;
}
static int test_clear_error(void) {
if (ERR_get_error() != 0) {
fprintf(stderr, "ERR_get_error returned value before an error was added.\n");
return 0;
}
ERR_put_error(1, 2, 3, "test", 4);
ERR_clear_error();
if (ERR_get_error() != 0) {
fprintf(stderr, "Error remained after clearing.\n");
return 0;
}
return 1;
}
static int test_print(void) {
size_t i;
char buf[256];
uint32_t packed_error;
ERR_put_error(1, 2, 3, "test", 4);
ERR_add_error_data(1, "testing");
packed_error = ERR_get_error();
for (i = 0; i <= sizeof(buf); i++) {
ERR_error_string_n(packed_error, buf, i);
}
return 1;
}
static int test_release(void) {
ERR_put_error(1, 2, 3, "test", 4);
ERR_remove_thread_state(NULL);
return 1;
}
int main(void) {
CRYPTO_library_init();
if (!test_overflow() ||
!test_put_error() ||
!test_clear_error() ||
!test_print() ||
!test_release()) {
return 1;
}
printf("PASS\n");
return 0;
}