diff options
Diffstat (limited to 'ssl/test/test_config.cc')
-rw-r--r-- | ssl/test/test_config.cc | 54 |
1 files changed, 49 insertions, 5 deletions
diff --git a/ssl/test/test_config.cc b/ssl/test/test_config.cc index 9716227..70543cc 100644 --- a/ssl/test/test_config.cc +++ b/ssl/test/test_config.cc @@ -16,6 +16,9 @@ #include <string.h> +#include <memory> + +#include <openssl/base64.h> namespace { @@ -50,25 +53,37 @@ const BoolFlag kBoolFlags[] = { { "-no-tls1", &TestConfig::no_tls1 }, { "-no-ssl3", &TestConfig::no_ssl3 }, { "-cookie-exchange", &TestConfig::cookie_exchange }, + { "-shim-writes-first", &TestConfig::shim_writes_first }, + { "-tls-d5-bug", &TestConfig::tls_d5_bug }, + { "-expect-session-miss", &TestConfig::expect_session_miss }, }; const size_t kNumBoolFlags = sizeof(kBoolFlags) / sizeof(kBoolFlags[0]); -// TODO(davidben): Some of these should be in a new kBase64Flags to allow NUL -// bytes. const StringFlag kStringFlags[] = { { "-key-file", &TestConfig::key_file }, { "-cert-file", &TestConfig::cert_file }, { "-expect-server-name", &TestConfig::expected_server_name }, - // Conveniently, 00 is not a certificate type. - { "-expect-certificate-types", &TestConfig::expected_certificate_types }, { "-advertise-npn", &TestConfig::advertise_npn }, { "-expect-next-proto", &TestConfig::expected_next_proto }, { "-select-next-proto", &TestConfig::select_next_proto }, + { "-send-channel-id", &TestConfig::send_channel_id }, + { "-host-name", &TestConfig::host_name }, + { "-advertise-alpn", &TestConfig::advertise_alpn }, + { "-expect-alpn", &TestConfig::expected_alpn }, + { "-expect-advertised-alpn", &TestConfig::expected_advertised_alpn }, + { "-select-alpn", &TestConfig::select_alpn }, }; const size_t kNumStringFlags = sizeof(kStringFlags) / sizeof(kStringFlags[0]); +const StringFlag kBase64Flags[] = { + { "-expect-certificate-types", &TestConfig::expected_certificate_types }, + { "-expect-channel-id", &TestConfig::expected_channel_id }, +}; + +const size_t kNumBase64Flags = sizeof(kBase64Flags) / sizeof(kBase64Flags[0]); + } // namespace TestConfig::TestConfig() @@ -86,7 +101,10 @@ TestConfig::TestConfig() no_tls11(false), no_tls1(false), no_ssl3(false), - cookie_exchange(false) { + cookie_exchange(false), + shim_writes_first(false), + tls_d5_bug(false), + expect_session_miss(false) { } bool ParseConfig(int argc, char **argv, TestConfig *out_config) { @@ -117,6 +135,32 @@ bool ParseConfig(int argc, char **argv, TestConfig *out_config) { continue; } + for (j = 0; j < kNumBase64Flags; j++) { + if (strcmp(argv[i], kBase64Flags[j].flag) == 0) { + break; + } + } + if (j < kNumBase64Flags) { + i++; + if (i >= argc) { + fprintf(stderr, "Missing parameter\n"); + return false; + } + size_t len; + if (!EVP_DecodedLength(&len, strlen(argv[i]))) { + fprintf(stderr, "Invalid base64: %s\n", argv[i]); + } + std::unique_ptr<uint8_t[]> decoded(new uint8_t[len]); + if (!EVP_DecodeBase64(decoded.get(), &len, len, + reinterpret_cast<const uint8_t *>(argv[i]), + strlen(argv[i]))) { + fprintf(stderr, "Invalid base64: %s\n", argv[i]); + } + out_config->*(kBase64Flags[j].member) = std::string( + reinterpret_cast<const char *>(decoded.get()), len); + continue; + } + fprintf(stderr, "Unknown argument: %s\n", argv[i]); return false; } |