From 4b4d0ded6df357f76f580b7218abb3fe55f64463 Mon Sep 17 00:00:00 2001 From: Tomas Mraz Date: Thu, 5 May 2022 14:45:23 +0200 Subject: [PATCH] Add a testcase for OSSL_PROVIDER_unload() being fully effective Reviewed-by: Matt Caswell Reviewed-by: Richard Levitte Reviewed-by: Paul Dale (Merged from https://github.com/openssl/openssl/pull/18254) --- test/evp_extra_test2.c | 37 +++++++++++++++++++++++++++++++++++++ 1 file changed, 37 insertions(+) diff --git a/test/evp_extra_test2.c b/test/evp_extra_test2.c index aadfc6216a..bdadc30a7e 100644 --- a/test/evp_extra_test2.c +++ b/test/evp_extra_test2.c @@ -512,6 +512,42 @@ static int test_alternative_default(void) return ok; } +static int test_provider_unload_effective(int testid) +{ + EVP_MD *sha256 = NULL; + OSSL_PROVIDER *provider = NULL; + int ok = 0; + + if (!TEST_ptr(provider = OSSL_PROVIDER_load(NULL, "default")) + || !TEST_ptr(sha256 = EVP_MD_fetch(NULL, "SHA2-256", NULL))) + goto err; + + if (testid > 0) { + OSSL_PROVIDER_unload(provider); + provider = NULL; + EVP_MD_free(sha256); + sha256 = NULL; + } else { + EVP_MD_free(sha256); + sha256 = NULL; + OSSL_PROVIDER_unload(provider); + provider = NULL; + } + + /* + * setup_tests() loaded the "null" provider in the current default, and + * we unloaded it above after the load so we know this fetch should fail. + */ + if (!TEST_ptr_null(sha256 = EVP_MD_fetch(NULL, "SHA2-256", NULL))) + goto err; + + ok = 1; + err: + EVP_MD_free(sha256); + OSSL_PROVIDER_unload(provider); + return ok; +} + static int test_d2i_PrivateKey_ex(int testid) { int ok = 0; @@ -1064,6 +1100,7 @@ int setup_tests(void) ADD_TEST(test_rsa_pss_sign); ADD_TEST(test_evp_md_ctx_dup); ADD_TEST(test_evp_md_ctx_copy); + ADD_ALL_TESTS(test_provider_unload_effective, 2); return 1; } -- 2.34.1