From df6a73db58cdd083d9f9da0151012b4b399e4824 Mon Sep 17 00:00:00 2001 From: Tomas Mraz Date: Thu, 5 May 2022 14:45:23 +0200 Subject: [PATCH] Add a testcase for OSSL_PROVIDER_unload() being fully effective --- test/evp_extra_test2.c | 37 +++++++++++++++++++++++++++++++++++++ 1 file changed, 37 insertions(+) diff --git a/test/evp_extra_test2.c b/test/evp_extra_test2.c index aadfc6216a83a..bdadc30a7e9da 100644 --- a/test/evp_extra_test2.c +++ b/test/evp_extra_test2.c @@ -512,6 +512,42 @@ static int test_alternative_default(void) return ok; } +static int test_provider_unload_effective(int testid) +{ + EVP_MD *sha256 = NULL; + OSSL_PROVIDER *provider = NULL; + int ok = 0; + + if (!TEST_ptr(provider = OSSL_PROVIDER_load(NULL, "default")) + || !TEST_ptr(sha256 = EVP_MD_fetch(NULL, "SHA2-256", NULL))) + goto err; + + if (testid > 0) { + OSSL_PROVIDER_unload(provider); + provider = NULL; + EVP_MD_free(sha256); + sha256 = NULL; + } else { + EVP_MD_free(sha256); + sha256 = NULL; + OSSL_PROVIDER_unload(provider); + provider = NULL; + } + + /* + * setup_tests() loaded the "null" provider in the current default, and + * we unloaded it above after the load so we know this fetch should fail. + */ + if (!TEST_ptr_null(sha256 = EVP_MD_fetch(NULL, "SHA2-256", NULL))) + goto err; + + ok = 1; + err: + EVP_MD_free(sha256); + OSSL_PROVIDER_unload(provider); + return ok; +} + static int test_d2i_PrivateKey_ex(int testid) { int ok = 0; @@ -1064,6 +1100,7 @@ int setup_tests(void) ADD_TEST(test_rsa_pss_sign); ADD_TEST(test_evp_md_ctx_dup); ADD_TEST(test_evp_md_ctx_copy); + ADD_ALL_TESTS(test_provider_unload_effective, 2); return 1; }