From: Tomas Mraz Date: Thu, 5 May 2022 12:45:23 +0000 (+0200) Subject: Add a testcase for OSSL_PROVIDER_unload() being fully effective X-Git-Tag: openssl-3.2.0-alpha1~2683 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=4b4d0ded6df357f76f580b7218abb3fe55f64463;p=thirdparty%2Fopenssl.git Add a testcase for OSSL_PROVIDER_unload() being fully effective Reviewed-by: Matt Caswell Reviewed-by: Richard Levitte Reviewed-by: Paul Dale (Merged from https://github.com/openssl/openssl/pull/18254) --- diff --git a/test/evp_extra_test2.c b/test/evp_extra_test2.c index aadfc6216a8..bdadc30a7e9 100644 --- a/test/evp_extra_test2.c +++ b/test/evp_extra_test2.c @@ -512,6 +512,42 @@ static int test_alternative_default(void) return ok; } +static int test_provider_unload_effective(int testid) +{ + EVP_MD *sha256 = NULL; + OSSL_PROVIDER *provider = NULL; + int ok = 0; + + if (!TEST_ptr(provider = OSSL_PROVIDER_load(NULL, "default")) + || !TEST_ptr(sha256 = EVP_MD_fetch(NULL, "SHA2-256", NULL))) + goto err; + + if (testid > 0) { + OSSL_PROVIDER_unload(provider); + provider = NULL; + EVP_MD_free(sha256); + sha256 = NULL; + } else { + EVP_MD_free(sha256); + sha256 = NULL; + OSSL_PROVIDER_unload(provider); + provider = NULL; + } + + /* + * setup_tests() loaded the "null" provider in the current default, and + * we unloaded it above after the load so we know this fetch should fail. + */ + if (!TEST_ptr_null(sha256 = EVP_MD_fetch(NULL, "SHA2-256", NULL))) + goto err; + + ok = 1; + err: + EVP_MD_free(sha256); + OSSL_PROVIDER_unload(provider); + return ok; +} + static int test_d2i_PrivateKey_ex(int testid) { int ok = 0; @@ -1064,6 +1100,7 @@ int setup_tests(void) ADD_TEST(test_rsa_pss_sign); ADD_TEST(test_evp_md_ctx_dup); ADD_TEST(test_evp_md_ctx_copy); + ADD_ALL_TESTS(test_provider_unload_effective, 2); return 1; }