mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2025-08-10 05:03:02 +03:00
142 lines
5.2 KiB
C
142 lines
5.2 KiB
C
/*
|
|
* Test dynamic loading of libmbed*
|
|
*
|
|
* Copyright The Mbed TLS Contributors
|
|
* SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
|
|
*/
|
|
|
|
#define MBEDTLS_DECLARE_PRIVATE_IDENTIFIERS
|
|
|
|
#include "mbedtls/build_info.h"
|
|
|
|
#include "mbedtls/platform.h"
|
|
|
|
#if defined(MBEDTLS_X509_CRT_PARSE_C)
|
|
#include "mbedtls/x509_crt.h"
|
|
#endif
|
|
|
|
#if defined(__APPLE__)
|
|
#define SO_SUFFIX ".dylib"
|
|
#else
|
|
#define SO_SUFFIX ".so"
|
|
#endif
|
|
|
|
#define MBEDCRYPTO_SO_FILENAME "libmbedcrypto" SO_SUFFIX
|
|
#define TFPSACRYPTO_SO_FILENAME "libtfpsacrypto" SO_SUFFIX
|
|
#define X509_SO_FILENAME "libmbedx509" SO_SUFFIX
|
|
#define TLS_SO_FILENAME "libmbedtls" SO_SUFFIX
|
|
|
|
#include <dlfcn.h>
|
|
|
|
#define CHECK_DLERROR(function, argument) \
|
|
do \
|
|
{ \
|
|
char *CHECK_DLERROR_error = dlerror(); \
|
|
if (CHECK_DLERROR_error != NULL) \
|
|
{ \
|
|
fprintf(stderr, "Dynamic loading error for %s(%s): %s\n", \
|
|
function, argument, CHECK_DLERROR_error); \
|
|
mbedtls_exit(MBEDTLS_EXIT_FAILURE); \
|
|
} \
|
|
} \
|
|
while (0)
|
|
|
|
int main(void)
|
|
{
|
|
#if defined(MBEDTLS_MD_C) || defined(MBEDTLS_SSL_TLS_C)
|
|
unsigned n;
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_SSL_TLS_C)
|
|
void *tls_so = dlopen(TLS_SO_FILENAME, RTLD_NOW);
|
|
CHECK_DLERROR("dlopen", TLS_SO_FILENAME);
|
|
#pragma GCC diagnostic push
|
|
/* dlsym() returns an object pointer which is meant to be used as a
|
|
* function pointer. This has undefined behavior in standard C, so
|
|
* "gcc -std=c99 -pedantic" complains about it, but it is perfectly
|
|
* fine on platforms that have dlsym(). */
|
|
#pragma GCC diagnostic ignored "-Wpedantic"
|
|
const int *(*ssl_list_ciphersuites)(void) =
|
|
dlsym(tls_so, "mbedtls_ssl_list_ciphersuites");
|
|
#pragma GCC diagnostic pop
|
|
CHECK_DLERROR("dlsym", "mbedtls_ssl_list_ciphersuites");
|
|
const int *ciphersuites = ssl_list_ciphersuites();
|
|
for (n = 0; ciphersuites[n] != 0; n++) {/* nothing to do, we're just counting */
|
|
;
|
|
}
|
|
mbedtls_printf("dlopen(%s): %u ciphersuites\n",
|
|
TLS_SO_FILENAME, n);
|
|
dlclose(tls_so);
|
|
CHECK_DLERROR("dlclose", TLS_SO_FILENAME);
|
|
#endif /* MBEDTLS_SSL_TLS_C */
|
|
|
|
#if defined(MBEDTLS_X509_CRT_PARSE_C)
|
|
void *x509_so = dlopen(X509_SO_FILENAME, RTLD_NOW);
|
|
CHECK_DLERROR("dlopen", X509_SO_FILENAME);
|
|
const mbedtls_x509_crt_profile *profile =
|
|
dlsym(x509_so, "mbedtls_x509_crt_profile_default");
|
|
CHECK_DLERROR("dlsym", "mbedtls_x509_crt_profile_default");
|
|
mbedtls_printf("dlopen(%s): Allowed md mask: %08x\n",
|
|
X509_SO_FILENAME, (unsigned) profile->allowed_mds);
|
|
dlclose(x509_so);
|
|
CHECK_DLERROR("dlclose", X509_SO_FILENAME);
|
|
#endif /* MBEDTLS_X509_CRT_PARSE_C */
|
|
|
|
#if defined(MBEDTLS_MD_C)
|
|
const char *crypto_so_filename = NULL;
|
|
void *crypto_so = dlopen(MBEDCRYPTO_SO_FILENAME, RTLD_NOW);
|
|
if (dlerror() == NULL) {
|
|
crypto_so_filename = MBEDCRYPTO_SO_FILENAME;
|
|
} else {
|
|
crypto_so = dlopen(TFPSACRYPTO_SO_FILENAME, RTLD_NOW);
|
|
CHECK_DLERROR("dlopen", TFPSACRYPTO_SO_FILENAME);
|
|
crypto_so_filename = TFPSACRYPTO_SO_FILENAME;
|
|
}
|
|
#pragma GCC diagnostic push
|
|
/* dlsym() returns an object pointer which is meant to be used as a
|
|
* function pointer. This has undefined behavior in standard C, so
|
|
* "gcc -std=c99 -pedantic" complains about it, but it is perfectly
|
|
* fine on platforms that have dlsym(). */
|
|
#pragma GCC diagnostic ignored "-Wpedantic"
|
|
psa_status_t (*dyn_psa_crypto_init)(void) =
|
|
dlsym(crypto_so, "psa_crypto_init");
|
|
psa_status_t (*dyn_psa_hash_compute)(psa_algorithm_t, const uint8_t *, size_t, uint8_t *,
|
|
size_t, size_t *) =
|
|
dlsym(crypto_so, "psa_hash_compute");
|
|
|
|
#pragma GCC diagnostic pop
|
|
/* Demonstrate hashing a message with PSA Crypto */
|
|
|
|
CHECK_DLERROR("dlsym", "psa_crypto_init");
|
|
CHECK_DLERROR("dlsym", "psa_hash_compute");
|
|
|
|
psa_status_t status = dyn_psa_crypto_init();
|
|
if (status != PSA_SUCCESS) {
|
|
mbedtls_fprintf(stderr, "psa_crypto_init failed: %d\n", (int) status);
|
|
mbedtls_exit(MBEDTLS_EXIT_FAILURE);
|
|
}
|
|
|
|
const uint8_t input[] = "hello world";
|
|
uint8_t hash[32]; // Buffer to hold the output hash
|
|
size_t hash_len = 0;
|
|
|
|
status = dyn_psa_hash_compute(PSA_ALG_SHA_256,
|
|
input, sizeof(input) - 1,
|
|
hash, sizeof(hash),
|
|
&hash_len);
|
|
if (status != PSA_SUCCESS) {
|
|
mbedtls_fprintf(stderr, "psa_hash_compute failed: %d\n", (int) status);
|
|
mbedtls_exit(MBEDTLS_EXIT_FAILURE);
|
|
}
|
|
|
|
mbedtls_printf("dlopen(%s): psa_hash_compute succeeded. SHA-256 output length: %zu\n",
|
|
crypto_so_filename, hash_len);
|
|
|
|
|
|
dlclose(crypto_so);
|
|
CHECK_DLERROR("dlclose", crypto_so_filename);
|
|
#endif /* MBEDTLS_MD_C */
|
|
|
|
return 0;
|
|
}
|