diff options
author | msvensson@shellback.(none) <> | 2006-04-07 11:35:12 +0200 |
---|---|---|
committer | msvensson@shellback.(none) <> | 2006-04-07 11:35:12 +0200 |
commit | e8723ca453c4bef12083ca7252aef1814cda1458 (patch) | |
tree | 9cad353f5a7f89b9f7ee3d3d7e2de065f3dadab7 /extra/yassl/testsuite | |
parent | cd15f309fb05b8cbfd4f4030c68cf2b9a56672c4 (diff) | |
download | mariadb-git-e8723ca453c4bef12083ca7252aef1814cda1458.tar.gz |
Update yassl to 1.2.2
Diffstat (limited to 'extra/yassl/testsuite')
-rw-r--r-- | extra/yassl/testsuite/input | 107 | ||||
-rw-r--r-- | extra/yassl/testsuite/make.bat | 14 | ||||
-rw-r--r-- | extra/yassl/testsuite/quit | 2 | ||||
-rw-r--r-- | extra/yassl/testsuite/test.hpp | 352 | ||||
-rw-r--r-- | extra/yassl/testsuite/testsuite.cpp | 155 | ||||
-rw-r--r-- | extra/yassl/testsuite/testsuite.dsp | 127 |
6 files changed, 757 insertions, 0 deletions
diff --git a/extra/yassl/testsuite/input b/extra/yassl/testsuite/input new file mode 100644 index 00000000000..d16cbc40750 --- /dev/null +++ b/extra/yassl/testsuite/input @@ -0,0 +1,107 @@ +// testsuite.cpp + +#include "test.hpp" +#include "md5.hpp" + +typedef unsigned char byte; + +void taocrypt_test(void*); +void file_test(char*, byte*); + +void client_test(void*); +void echoclient_test(void*); + +THREAD_RETURN YASSL_API server_test(void*); +THREAD_RETURN YASSL_API echoserver_test(void*); + +int main(int argc, char** argv) +{ + func_args args(argc, argv); + func_args server_args(args); + + // *** Crypto Test *** + taocrypt_test(&args); + assert(args.return_code == 0); + + + // *** Simple yaSSL client server test *** + THREAD_TYPE thread; + + start_thread(server_test, &server_args, &thread); + client_test(&args); + + assert(args.return_code == 0); + join_thread(thread); + assert(server_args.return_code == 0); + + + // *** Echo input yaSSL client server test *** + start_thread(echoserver_test, &server_args, &thread); + func_args echo_args; + + // setup args + echo_args.argc = 3; + echo_args.argv = new char*[echo_args.argc]; + for (int i = 0; i < echo_args.argc; i++) + echo_args.argv[i] = new char[32]; + + strcpy(echo_args.argv[0], "echoclient"); + strcpy(echo_args.argv[1], "input"); + strcpy(echo_args.argv[2], "output"); + remove("output"); + + // make sure OK + echoclient_test(&echo_args); + assert(echo_args.return_code == 0); + + + // *** Echo quit yaSSL client server test *** + echo_args.argc = 2; + strcpy(echo_args.argv[1], "quit"); + + echoclient_test(&echo_args); + assert(echo_args.return_code == 0); + join_thread(thread); + assert(server_args.return_code == 0); + + + // input output compare + byte input[TaoCrypt::MD5::DIGEST_SIZE]; + byte output[TaoCrypt::MD5::DIGEST_SIZE]; + file_test("input", input); + file_test("output", output); + assert(memcmp(input, output, sizeof(input)) == 0); + + printf("\nAll tests passed!\n"); + + // cleanup + for (int j = echo_args.argc; j >= 0; j--) + delete[] echo_args.argv[j]; + delete[] echo_args.argv; + + return 0; +} + + + +void start_thread(THREAD_FUNC fun, func_args* args, THREAD_TYPE* thread) +{ +#ifdef _WIN32 + *thread = _beginthreadex(0, 0, fun, args, 0, 0); +#else + pthread_create(thread, 0, fun, args); +#endif +} + + +void join_thread(THREAD_TYPE thread) +{ +#ifdef _WIN32 + int res = WaitForSingleObject(reinterpret_cast<HANDLE>(thread), INFINITE); + assert(res == WAIT_OBJECT_0); + res = CloseHandle(reinterpret_cast<HANDLE>(thread)); + assert(res); +#else + pthread_join(thread, 0); +#endif +} diff --git a/extra/yassl/testsuite/make.bat b/extra/yassl/testsuite/make.bat new file mode 100644 index 00000000000..d8a55b0d3af --- /dev/null +++ b/extra/yassl/testsuite/make.bat @@ -0,0 +1,14 @@ +# quick and dirty build file for testing different MSDEVs +setlocal + +set myFLAGS= /I../include /I../taocrypt/include /I../mySTL /c /W3 /G6 /O2 /MT /D"WIN32" /D"NO_MAIN_DRIVER" + +cl %myFLAGS% testsuite.cpp +cl %myFLAGS% ../examples/client/client.cpp +cl %myFLAGS% ../examples/echoclient/echoclient.cpp +cl %myFLAGS% ../examples/server/server.cpp +cl %myFLAGS% ../examples/echoserver/echoserver.cpp +cl %myFLAGS% ../taocrypt/test/test.cpp + +link.exe /out:testsuite.exe ../src/yassl.lib ../taocrypt/src/taocrypt.lib testsuite.obj client.obj server.obj echoclient.obj echoserver.obj test.obj advapi32.lib Ws2_32.lib + diff --git a/extra/yassl/testsuite/quit b/extra/yassl/testsuite/quit new file mode 100644 index 00000000000..3db49b3ad12 --- /dev/null +++ b/extra/yassl/testsuite/quit @@ -0,0 +1,2 @@ +quit + diff --git a/extra/yassl/testsuite/test.hpp b/extra/yassl/testsuite/test.hpp new file mode 100644 index 00000000000..79d02b63558 --- /dev/null +++ b/extra/yassl/testsuite/test.hpp @@ -0,0 +1,352 @@ +// test.hpp + +#ifndef yaSSL_TEST_HPP +#define yaSSL_TEST_HPP + +#include "runtime.hpp" +#include "openssl/ssl.h" /* openssl compatibility test */ +#include <stdio.h> +#include <stdlib.h> +#include <assert.h> + +#ifdef _WIN32 + #include <winsock2.h> + #include <process.h> + #define SOCKET_T unsigned int +#else + #include <string.h> + #include <unistd.h> + #include <netinet/in.h> + #include <arpa/inet.h> + #include <sys/ioctl.h> + #include <sys/time.h> + #include <sys/types.h> + #include <sys/socket.h> + #include <pthread.h> + #define SOCKET_T int +#endif /* _WIN32 */ + + +#if defined(__MACH__) || defined(_WIN32) + typedef int socklen_t; +#endif + + +// HPUX doesn't use socklent_t for third parameter to accept +#if !defined(__hpux__) + typedef socklen_t* ACCEPT_THIRD_T; +#else + typedef int* ACCEPT_THIRD_T; +#endif + + +#ifndef _POSIX_THREADS + typedef unsigned int THREAD_RETURN; + typedef unsigned long THREAD_TYPE; + #define YASSL_API __stdcall +#else + typedef void* THREAD_RETURN; + typedef pthread_t THREAD_TYPE; + #define YASSL_API +#endif + + +struct tcp_ready { +#ifdef _POSIX_THREADS + pthread_mutex_t mutex_; + pthread_cond_t cond_; + bool ready_; // predicate + + tcp_ready() : ready_(false) + { + pthread_mutex_init(&mutex_, 0); + pthread_cond_init(&cond_, 0); + } + + ~tcp_ready() + { + pthread_mutex_destroy(&mutex_); + pthread_cond_destroy(&cond_); + } +#endif +}; + + +struct func_args { + int argc; + char** argv; + int return_code; + tcp_ready* signal_; + + func_args(int c = 0, char** v = 0) : argc(c), argv(v) {} + + void SetSignal(tcp_ready* p) { signal_ = p; } +}; + +typedef THREAD_RETURN YASSL_API THREAD_FUNC(void*); + +void start_thread(THREAD_FUNC, func_args*, THREAD_TYPE*); +void join_thread(THREAD_TYPE); + +// yaSSL +const char* const yasslIP = "127.0.0.1"; +const unsigned short yasslPort = 11111; + + +// client +const char* const cert = "../certs/client-cert.pem"; +const char* const key = "../certs/client-key.pem"; + +const char* const certSuite = "../../certs/client-cert.pem"; +const char* const keySuite = "../../certs/client-key.pem"; + +const char* const certDebug = "../../../certs/client-cert.pem"; +const char* const keyDebug = "../../../certs/client-key.pem"; + + +// server +const char* const svrCert = "../certs/server-cert.pem"; +const char* const svrKey = "../certs/server-key.pem"; + +const char* const svrCert2 = "../../certs/server-cert.pem"; +const char* const svrKey2 = "../../certs/server-key.pem"; + +const char* const svrCert3 = "../../../certs/server-cert.pem"; +const char* const svrKey3 = "../../../certs/server-key.pem"; + + +// server dsa +const char* const dsaCert = "../certs/dsa-cert.pem"; +const char* const dsaKey = "../certs/dsa512.der"; + +const char* const dsaCert2 = "../../certs/dsa-cert.pem"; +const char* const dsaKey2 = "../../certs/dsa512.der"; + +const char* const dsaCert3 = "../../../certs/dsa-cert.pem"; +const char* const dsaKey3 = "../../../certs/dsa512.der"; + + +// CA +const char* const caCert = "../certs/ca-cert.pem"; +const char* const caCert2 = "../../certs/ca-cert.pem"; +const char* const caCert3 = "../../../certs/ca-cert.pem"; + + +using namespace yaSSL; + + +inline void err_sys(const char* msg) +{ + printf("yassl error: %s\n", msg); + exit(EXIT_FAILURE); +} + + +inline void store_ca(SSL_CTX* ctx) +{ + // To allow testing from serveral dirs + if (SSL_CTX_load_verify_locations(ctx, caCert, 0) != SSL_SUCCESS) + if (SSL_CTX_load_verify_locations(ctx, caCert2, 0) != SSL_SUCCESS) + if (SSL_CTX_load_verify_locations(ctx, caCert3, 0) != SSL_SUCCESS) + err_sys("failed to use certificate: certs/cacert.pem"); + + // load client CA for server verify + if (SSL_CTX_load_verify_locations(ctx, cert, 0) != SSL_SUCCESS) + if (SSL_CTX_load_verify_locations(ctx, certSuite, 0) != SSL_SUCCESS) + if (SSL_CTX_load_verify_locations(ctx, certDebug,0) != SSL_SUCCESS) + err_sys("failed to use certificate: certs/client-cert.pem"); +} + + +// client +inline void set_certs(SSL_CTX* ctx) +{ + store_ca(ctx); + + // To allow testing from serveral dirs + if (SSL_CTX_use_certificate_file(ctx, cert, SSL_FILETYPE_PEM) + != SSL_SUCCESS) + if (SSL_CTX_use_certificate_file(ctx, certSuite, SSL_FILETYPE_PEM) + != SSL_SUCCESS) + if (SSL_CTX_use_certificate_file(ctx, certDebug, SSL_FILETYPE_PEM) + != SSL_SUCCESS) + err_sys("failed to use certificate: certs/client-cert.pem"); + + // To allow testing from several dirs + if (SSL_CTX_use_PrivateKey_file(ctx, key, SSL_FILETYPE_PEM) + != SSL_SUCCESS) + if (SSL_CTX_use_PrivateKey_file(ctx, keySuite, SSL_FILETYPE_PEM) + != SSL_SUCCESS) + if (SSL_CTX_use_PrivateKey_file(ctx,keyDebug,SSL_FILETYPE_PEM) + != SSL_SUCCESS) + err_sys("failed to use key file: certs/client-key.pem"); +} + + +// server +inline void set_serverCerts(SSL_CTX* ctx) +{ + store_ca(ctx); + + // To allow testing from serveral dirs + if (SSL_CTX_use_certificate_file(ctx, svrCert, SSL_FILETYPE_PEM) + != SSL_SUCCESS) + if (SSL_CTX_use_certificate_file(ctx, svrCert2, SSL_FILETYPE_PEM) + != SSL_SUCCESS) + if (SSL_CTX_use_certificate_file(ctx, svrCert3, SSL_FILETYPE_PEM) + != SSL_SUCCESS) + err_sys("failed to use certificate: certs/server-cert.pem"); + + // To allow testing from several dirs + if (SSL_CTX_use_PrivateKey_file(ctx, svrKey, SSL_FILETYPE_PEM) + != SSL_SUCCESS) + if (SSL_CTX_use_PrivateKey_file(ctx, svrKey2, SSL_FILETYPE_PEM) + != SSL_SUCCESS) + if (SSL_CTX_use_PrivateKey_file(ctx, svrKey3,SSL_FILETYPE_PEM) + != SSL_SUCCESS) + err_sys("failed to use key file: certs/server-key.pem"); +} + + +// dsa server +inline void set_dsaServerCerts(SSL_CTX* ctx) +{ + store_ca(ctx); + + // To allow testing from serveral dirs + if (SSL_CTX_use_certificate_file(ctx, dsaCert, SSL_FILETYPE_PEM) + != SSL_SUCCESS) + if (SSL_CTX_use_certificate_file(ctx, dsaCert2, SSL_FILETYPE_PEM) + != SSL_SUCCESS) + if (SSL_CTX_use_certificate_file(ctx, dsaCert3, SSL_FILETYPE_PEM) + != SSL_SUCCESS) + err_sys("failed to use certificate: certs/dsa-cert.pem"); + + // To allow testing from several dirs + if (SSL_CTX_use_PrivateKey_file(ctx, dsaKey, SSL_FILETYPE_ASN1) + != SSL_SUCCESS) + if (SSL_CTX_use_PrivateKey_file(ctx, dsaKey2, SSL_FILETYPE_ASN1) + != SSL_SUCCESS) + if (SSL_CTX_use_PrivateKey_file(ctx, dsaKey3,SSL_FILETYPE_ASN1) + != SSL_SUCCESS) + err_sys("failed to use key file: certs/dsa512.der"); +} + + +inline void set_args(int& argc, char**& argv, func_args& args) +{ + argc = args.argc; + argv = args.argv; + args.return_code = -1; // error state +} + + +inline void tcp_socket(SOCKET_T& sockfd, sockaddr_in& addr) +{ + sockfd = socket(AF_INET, SOCK_STREAM, 0); + memset(&addr, 0, sizeof(addr)); + addr.sin_family = AF_INET; + + addr.sin_port = htons(yasslPort); + addr.sin_addr.s_addr = inet_addr(yasslIP); +} + + +inline void tcp_connect(SOCKET_T& sockfd) +{ + sockaddr_in addr; + tcp_socket(sockfd, addr); + + if (connect(sockfd, (const sockaddr*)&addr, sizeof(addr)) != 0) + err_sys("tcp connect failed"); +} + + +inline void tcp_listen(SOCKET_T& sockfd) +{ + sockaddr_in addr; + tcp_socket(sockfd, addr); + + if (bind(sockfd, (const sockaddr*)&addr, sizeof(addr)) != 0) + err_sys("tcp bind failed"); + if (listen(sockfd, 3) != 0) + err_sys("tcp listen failed"); +} + + +inline void tcp_accept(SOCKET_T& sockfd, int& clientfd, func_args& args) +{ + tcp_listen(sockfd); + + sockaddr_in client; + socklen_t client_len = sizeof(client); + +#if defined(_POSIX_THREADS) && defined(NO_MAIN_DRIVER) + // signal ready to tcp_accept + tcp_ready& ready = *args.signal_; + pthread_mutex_lock(&ready.mutex_); + ready.ready_ = true; + pthread_cond_signal(&ready.cond_); + pthread_mutex_unlock(&ready.mutex_); +#endif + + clientfd = accept(sockfd, (sockaddr*)&client, (ACCEPT_THIRD_T)&client_len); + + if (clientfd == -1) + err_sys("tcp accept failed"); +} + + +inline void showPeer(SSL* ssl) +{ + X509* peer = SSL_get_peer_certificate(ssl); + if (peer) { + char* issuer = X509_NAME_oneline(X509_get_issuer_name(peer), 0, 0); + char* subject = X509_NAME_oneline(X509_get_subject_name(peer), 0, 0); + + printf("peer's cert info:\n"); + printf("issuer is: %s\n", issuer); + printf("subject is: %s\n", subject); + + free(subject); + free(issuer); + } + else + printf("peer has no cert!\n"); +} + + + +inline DH* set_tmpDH(SSL_CTX* ctx) +{ + static unsigned char dh512_p[] = + { + 0xDA,0x58,0x3C,0x16,0xD9,0x85,0x22,0x89,0xD0,0xE4,0xAF,0x75, + 0x6F,0x4C,0xCA,0x92,0xDD,0x4B,0xE5,0x33,0xB8,0x04,0xFB,0x0F, + 0xED,0x94,0xEF,0x9C,0x8A,0x44,0x03,0xED,0x57,0x46,0x50,0xD3, + 0x69,0x99,0xDB,0x29,0xD7,0x76,0x27,0x6B,0xA2,0xD3,0xD4,0x12, + 0xE2,0x18,0xF4,0xDD,0x1E,0x08,0x4C,0xF6,0xD8,0x00,0x3E,0x7C, + 0x47,0x74,0xE8,0x33, + }; + + static unsigned char dh512_g[] = + { + 0x02, + }; + + DH* dh; + if ( (dh = DH_new()) ) { + dh->p = BN_bin2bn(dh512_p, sizeof(dh512_p), 0); + dh->g = BN_bin2bn(dh512_g, sizeof(dh512_g), 0); + } + if (!dh->p || !dh->g) { + DH_free(dh); + dh = 0; + } + SSL_CTX_set_tmp_dh(ctx, dh); + return dh; +} + + +#endif // yaSSL_TEST_HPP + diff --git a/extra/yassl/testsuite/testsuite.cpp b/extra/yassl/testsuite/testsuite.cpp new file mode 100644 index 00000000000..af988432a86 --- /dev/null +++ b/extra/yassl/testsuite/testsuite.cpp @@ -0,0 +1,155 @@ +// testsuite.cpp + +#include "test.hpp" +#include "md5.hpp" + + +typedef unsigned char byte; + +void taocrypt_test(void*); +void file_test(char*, byte*); + +void client_test(void*); +void echoclient_test(void*); + +THREAD_RETURN YASSL_API server_test(void*); +THREAD_RETURN YASSL_API echoserver_test(void*); + +void wait_tcp_ready(func_args&); + + + +int main(int argc, char** argv) +{ + func_args args(argc, argv); + func_args server_args(argc, argv); + + // *** Crypto Test *** + taocrypt_test(&args); + assert(args.return_code == 0); + + + // *** Simple yaSSL client server test *** + tcp_ready ready; + server_args.SetSignal(&ready); + + THREAD_TYPE serverThread; + start_thread(server_test, &server_args, &serverThread); + wait_tcp_ready(server_args); + + client_test(&args); + assert(args.return_code == 0); + join_thread(serverThread); + assert(server_args.return_code == 0); + + + // *** Echo input yaSSL client server test *** + start_thread(echoserver_test, &server_args, &serverThread); + wait_tcp_ready(server_args); + func_args echo_args; + + // setup args + const int numArgs = 3; + echo_args.argc = numArgs; + char* myArgv[numArgs]; + + char argc0[32]; + char argc1[32]; + char argc2[32]; + + myArgv[0] = argc0; + myArgv[1] = argc1; + myArgv[2] = argc2; + + echo_args.argv = myArgv; + + strcpy(echo_args.argv[0], "echoclient"); + strcpy(echo_args.argv[1], "input"); + strcpy(echo_args.argv[2], "output"); + remove("output"); + + // make sure OK + echoclient_test(&echo_args); + assert(echo_args.return_code == 0); + + + // *** Echo quit yaSSL client server test *** + echo_args.argc = 2; + strcpy(echo_args.argv[1], "quit"); + + echoclient_test(&echo_args); + assert(echo_args.return_code == 0); + join_thread(serverThread); + assert(server_args.return_code == 0); + + + // input output compare + byte input[TaoCrypt::MD5::DIGEST_SIZE]; + byte output[TaoCrypt::MD5::DIGEST_SIZE]; + file_test("input", input); + file_test("output", output); + assert(memcmp(input, output, sizeof(input)) == 0); + + printf("\nAll tests passed!\n"); + + return 0; +} + + + +void start_thread(THREAD_FUNC fun, func_args* args, THREAD_TYPE* thread) +{ +#ifndef _POSIX_THREADS + *thread = _beginthreadex(0, 0, fun, args, 0, 0); +#else + pthread_create(thread, 0, fun, args); +#endif +} + + +void join_thread(THREAD_TYPE thread) +{ +#ifndef _POSIX_THREADS + int res = WaitForSingleObject(reinterpret_cast<HANDLE>(thread), INFINITE); + assert(res == WAIT_OBJECT_0); + res = CloseHandle(reinterpret_cast<HANDLE>(thread)); + assert(res); +#else + pthread_join(thread, 0); +#endif +} + + + +void wait_tcp_ready(func_args& args) +{ +#ifdef _POSIX_THREADS + pthread_mutex_lock(&args.signal_->mutex_); + + if (!args.signal_->ready_) + pthread_cond_wait(&args.signal_->cond_, &args.signal_->mutex_); + args.signal_->ready_ = false; // reset + + pthread_mutex_unlock(&args.signal_->mutex_); +#endif +} + + +int test_openSSL_des() +{ + /* test des encrypt/decrypt */ + char data[] = "this is my data "; + int dataSz = strlen(data); + DES_key_schedule key[3]; + byte iv[8]; + EVP_BytesToKey(EVP_des_ede3_cbc(), EVP_md5(), NULL, (byte*)data, dataSz, 1, + (byte*)key, iv); + + byte cipher[16]; + DES_ede3_cbc_encrypt((byte*)data, cipher, dataSz, &key[0], &key[8], + &key[16], &iv, true); + byte plain[16]; + DES_ede3_cbc_encrypt(cipher, plain, 16, &key[0], &key[8], &key[16], + &iv, false); + return 0; +} diff --git a/extra/yassl/testsuite/testsuite.dsp b/extra/yassl/testsuite/testsuite.dsp new file mode 100644 index 00000000000..f896aa7f020 --- /dev/null +++ b/extra/yassl/testsuite/testsuite.dsp @@ -0,0 +1,127 @@ +# Microsoft Developer Studio Project File - Name="testsuite" - Package Owner=<4> +# Microsoft Developer Studio Generated Build File, Format Version 6.00 +# ** DO NOT EDIT ** + +# TARGTYPE "Win32 (x86) Console Application" 0x0103 + +CFG=testsuite - Win32 Debug +!MESSAGE This is not a valid makefile. To build this project using NMAKE, +!MESSAGE use the Export Makefile command and run +!MESSAGE +!MESSAGE NMAKE /f "testsuite.mak". +!MESSAGE +!MESSAGE You can specify a configuration when running NMAKE +!MESSAGE by defining the macro CFG on the command line. For example: +!MESSAGE +!MESSAGE NMAKE /f "testsuite.mak" CFG="testsuite - Win32 Debug" +!MESSAGE +!MESSAGE Possible choices for configuration are: +!MESSAGE +!MESSAGE "testsuite - Win32 Release" (based on "Win32 (x86) Console Application") +!MESSAGE "testsuite - Win32 Debug" (based on "Win32 (x86) Console Application") +!MESSAGE + +# Begin Project +# PROP AllowPerConfigDependencies 0 +# PROP Scc_ProjName "" +# PROP Scc_LocalPath "" +CPP=cl.exe +RSC=rc.exe + +!IF "$(CFG)" == "testsuite - Win32 Release" + +# PROP BASE Use_MFC 0 +# PROP BASE Use_Debug_Libraries 0 +# PROP BASE Output_Dir "Release" +# PROP BASE Intermediate_Dir "Release" +# PROP BASE Target_Dir "" +# PROP Use_MFC 0 +# PROP Use_Debug_Libraries 0 +# PROP Output_Dir "Release" +# PROP Intermediate_Dir "Release" +# PROP Ignore_Export_Lib 0 +# PROP Target_Dir "" +# ADD BASE CPP /nologo /W3 /GX /O2 /D "WIN32" /D "NDEBUG" /D "_CONSOLE" /D "_MBCS" /YX /FD /c +# ADD CPP /nologo /MT /W3 /GX- /O2 /I "../taocrypt/include" /I "../include" /I "../mySTL" /D "NDEBUG" /D "WIN32" /D "_CONSOLE" /D "_MBCS" /D "NO_MAIN_DRIVER" /YX /FD /c +# ADD BASE RSC /l 0x409 /d "NDEBUG" +# ADD RSC /l 0x409 /d "NDEBUG" +BSC32=bscmake.exe +# ADD BASE BSC32 /nologo +# ADD BSC32 /nologo +LINK32=link.exe +# ADD BASE LINK32 kernel32.lib user32.lib gdi32.lib winspool.lib comdlg32.lib advapi32.lib shell32.lib ole32.lib oleaut32.lib uuid.lib odbc32.lib odbccp32.lib kernel32.lib user32.lib gdi32.lib winspool.lib comdlg32.lib advapi32.lib shell32.lib ole32.lib oleaut32.lib uuid.lib odbc32.lib odbccp32.lib /nologo /subsystem:console /machine:I386 +# ADD LINK32 kernel32.lib user32.lib gdi32.lib winspool.lib comdlg32.lib advapi32.lib shell32.lib ole32.lib oleaut32.lib uuid.lib odbc32.lib odbccp32.lib Ws2_32.lib /nologo /subsystem:console /machine:I386 /nodefaultlib:"LIBC" +# SUBTRACT LINK32 /nodefaultlib + +!ELSEIF "$(CFG)" == "testsuite - Win32 Debug" + +# PROP BASE Use_MFC 0 +# PROP BASE Use_Debug_Libraries 1 +# PROP BASE Output_Dir "Debug" +# PROP BASE Intermediate_Dir "Debug" +# PROP BASE Target_Dir "" +# PROP Use_MFC 0 +# PROP Use_Debug_Libraries 1 +# PROP Output_Dir "Debug" +# PROP Intermediate_Dir "Debug" +# PROP Ignore_Export_Lib 0 +# PROP Target_Dir "" +# ADD BASE CPP /nologo /W3 /Gm /GX /ZI /Od /D "WIN32" /D "_DEBUG" /D "_CONSOLE" /D "_MBCS" /YX /FD /GZ /c +# ADD CPP /nologo /MTd /W3 /Gm /GX- /ZI /Od /I "../taocrypt/include" /I "../include" /I "../mySTL" /D "_DEBUG" /D "WIN32" /D "_CONSOLE" /D "_MBCS" /D "NO_MAIN_DRIVER" /FR /YX /FD /GZ /c +# ADD BASE RSC /l 0x409 /d "_DEBUG" +# ADD RSC /l 0x409 /d "_DEBUG" +BSC32=bscmake.exe +# ADD BASE BSC32 /nologo +# ADD BSC32 /nologo +LINK32=link.exe +# ADD BASE LINK32 kernel32.lib user32.lib gdi32.lib winspool.lib comdlg32.lib advapi32.lib shell32.lib ole32.lib oleaut32.lib uuid.lib odbc32.lib odbccp32.lib kernel32.lib user32.lib gdi32.lib winspool.lib comdlg32.lib advapi32.lib shell32.lib ole32.lib oleaut32.lib uuid.lib odbc32.lib odbccp32.lib /nologo /subsystem:console /debug /machine:I386 /pdbtype:sept +# ADD LINK32 kernel32.lib user32.lib gdi32.lib winspool.lib comdlg32.lib advapi32.lib shell32.lib ole32.lib oleaut32.lib uuid.lib odbc32.lib odbccp32.lib Ws2_32.lib /nologo /subsystem:console /debug /machine:I386 /nodefaultlib:"LIBCD" /pdbtype:sept + +!ENDIF + +# Begin Target + +# Name "testsuite - Win32 Release" +# Name "testsuite - Win32 Debug" +# Begin Group "Source Files" + +# PROP Default_Filter "cpp;c;cxx;rc;def;r;odl;idl;hpj;bat" +# Begin Source File + +SOURCE=..\examples\client\client.cpp +# End Source File +# Begin Source File + +SOURCE=..\examples\echoclient\echoclient.cpp +# End Source File +# Begin Source File + +SOURCE=..\examples\echoserver\echoserver.cpp +# End Source File +# Begin Source File + +SOURCE=..\examples\server\server.cpp +# End Source File +# Begin Source File + +SOURCE=..\taocrypt\test\test.cpp +# End Source File +# Begin Source File + +SOURCE=.\testsuite.cpp +# End Source File +# End Group +# Begin Group "Header Files" + +# PROP Default_Filter "h;hpp;hxx;hm;inl" +# Begin Source File + +SOURCE=.\test.hpp +# End Source File +# End Group +# Begin Group "Resource Files" + +# PROP Default_Filter "ico;cur;bmp;dlg;rc2;rct;bin;rgs;gif;jpg;jpeg;jpe" +# End Group +# End Target +# End Project |