Convert thread_test to GTest.

BUG=129

Change-Id: I46e83831dda9a6510c85e387578bd1ce0a86dfc4
Reviewed-on: https://boringssl-review.googlesource.com/16886
Commit-Queue: David Benjamin <davidben@google.com>
Commit-Queue: Adam Langley <agl@google.com>
Reviewed-by: Adam Langley <agl@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
diff --git a/crypto/CMakeLists.txt b/crypto/CMakeLists.txt
index d0e8c70..1fde8e2 100644
--- a/crypto/CMakeLists.txt
+++ b/crypto/CMakeLists.txt
@@ -211,17 +211,6 @@
   target_link_libraries(crypto pthread)
 endif()
 
-add_executable(
-  thread_test
-
-  thread_test.c
-
-  $<TARGET_OBJECTS:test_support>
-)
-
-target_link_libraries(thread_test crypto)
-add_dependencies(all_tests thread_test)
-
 # TODO(davidben): Convert the remaining tests to GTest.
 add_executable(
   crypto_test
@@ -261,6 +250,7 @@
   refcount_test.cc
   rsa_extra/rsa_test.cc
   test/file_test_gtest.cc
+  thread_test.cc
 
   $<TARGET_OBJECTS:crypto_test_data>
   $<TARGET_OBJECTS:gtest_main>
diff --git a/crypto/thread_test.c b/crypto/thread_test.c
deleted file mode 100644
index 95d36c4..0000000
--- a/crypto/thread_test.c
+++ /dev/null
@@ -1,276 +0,0 @@
-/* Copyright (c) 2015, Google Inc.
- *
- * Permission to use, copy, modify, and/or distribute this software for any
- * purpose with or without fee is hereby granted, provided that the above
- * copyright notice and this permission notice appear in all copies.
- *
- * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
- * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
- * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
- * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
- * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
- * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
- * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */
-
-#include "internal.h"
-
-#include <openssl/crypto.h>
-#include <openssl/rand.h>
-
-#include <stdio.h>
-
-
-#if !defined(OPENSSL_NO_THREADS)
-
-#if defined(OPENSSL_WINDOWS)
-
-OPENSSL_MSVC_PRAGMA(warning(push, 3))
-#include <windows.h>
-OPENSSL_MSVC_PRAGMA(warning(pop))
-
-typedef HANDLE thread_t;
-
-static DWORD WINAPI thread_run(LPVOID arg) {
-  void (*thread_func)(void);
-  /* VC really doesn't like casting between data and function pointers. */
-  OPENSSL_memcpy(&thread_func, &arg, sizeof(thread_func));
-  thread_func();
-  return 0;
-}
-
-static int run_thread(thread_t *out_thread, void (*thread_func)(void)) {
-  void *arg;
-  /* VC really doesn't like casting between data and function pointers. */
-  OPENSSL_memcpy(&arg, &thread_func, sizeof(arg));
-
-  *out_thread = CreateThread(NULL /* security attributes */,
-                             0 /* default stack size */, thread_run, arg,
-                             0 /* run immediately */, NULL /* ignore id */);
-  return *out_thread != NULL;
-}
-
-static int wait_for_thread(thread_t thread) {
-  return WaitForSingleObject(thread, INFINITE) == 0;
-}
-
-#else
-
-#include <pthread.h>
-#include <string.h>
-#include <time.h>
-
-typedef pthread_t thread_t;
-
-static void *thread_run(void *arg) {
-  void (*thread_func)(void) = arg;
-  thread_func();
-  return NULL;
-}
-
-static int run_thread(thread_t *out_thread, void (*thread_func)(void)) {
-  return pthread_create(out_thread, NULL /* default attributes */, thread_run,
-                        thread_func) == 0;
-}
-
-static int wait_for_thread(thread_t thread) {
-  return pthread_join(thread, NULL) == 0;
-}
-
-#endif  /* OPENSSL_WINDOWS */
-
-static unsigned g_once_init_called = 0;
-
-static void once_init(void) {
-  g_once_init_called++;
-
-  /* Sleep briefly so one |call_once_thread| instance will call |CRYPTO_once|
-   * while the other is running this function. */
-#if defined(OPENSSL_WINDOWS)
-  Sleep(1 /* milliseconds */);
-#else
-  struct timespec req;
-  OPENSSL_memset(&req, 0, sizeof(req));
-  req.tv_nsec = 1000000;
-  nanosleep(&req, NULL);
-#endif
-}
-
-static CRYPTO_once_t g_test_once = CRYPTO_ONCE_INIT;
-
-static void call_once_thread(void) {
-  CRYPTO_once(&g_test_once, once_init);
-}
-
-static CRYPTO_once_t once_init_value = CRYPTO_ONCE_INIT;
-static CRYPTO_once_t once_bss;
-
-static struct CRYPTO_STATIC_MUTEX mutex_init_value = CRYPTO_STATIC_MUTEX_INIT;
-static struct CRYPTO_STATIC_MUTEX mutex_bss;
-
-static CRYPTO_EX_DATA_CLASS ex_data_class_value = CRYPTO_EX_DATA_CLASS_INIT;
-static CRYPTO_EX_DATA_CLASS ex_data_class_bss;
-
-static int test_once(void) {
-  if (g_once_init_called != 0) {
-    fprintf(stderr, "g_once_init_called was non-zero at start.\n");
-    return 0;
-  }
-
-  thread_t thread1, thread2;
-  if (!run_thread(&thread1, call_once_thread) ||
-      !run_thread(&thread2, call_once_thread) ||
-      !wait_for_thread(thread1) ||
-      !wait_for_thread(thread2)) {
-    fprintf(stderr, "thread failed.\n");
-    return 0;
-  }
-
-  CRYPTO_once(&g_test_once, once_init);
-
-  if (g_once_init_called != 1) {
-    fprintf(stderr, "Expected init function to be called once, but found %u.\n",
-            g_once_init_called);
-    return 0;
-  }
-
-  if (FIPS_mode()) {
-    /* Our FIPS tooling currently requires that |CRYPTO_ONCE_INIT|,
-     * |CRYPTO_STATIC_MUTEX_INIT| and |CRYPTO_EX_DATA_CLASS| are all zeros and
-     * so can be placed in the BSS section. */
-    if (OPENSSL_memcmp((void *)&once_init_value, (void *)&once_bss,
-                       sizeof(CRYPTO_once_t)) != 0) {
-      fprintf(stderr, "CRYPTO_ONCE_INIT did not expand to all zeros.\n");
-      return 0;
-    }
-
-    if (OPENSSL_memcmp((void *)&mutex_init_value, (void *)&mutex_bss,
-                       sizeof(struct CRYPTO_STATIC_MUTEX)) != 0) {
-      fprintf(stderr, "CRYPTO_STATIC_MUTEX did not expand to all zeros.\n");
-      return 0;
-    }
-
-    if (OPENSSL_memcmp((void *)&ex_data_class_value, (void *)&ex_data_class_bss,
-                       sizeof(CRYPTO_EX_DATA_CLASS))) {
-      fprintf(stderr,
-              "CRYPTO_EX_DATA_CLASS_INIT did not expand to all zeros.\n");
-      return 0;
-    }
-  }
-
-  return 1;
-}
-
-
-static int g_test_thread_ok = 0;
-static unsigned g_destructor_called_count = 0;
-
-static void thread_local_destructor(void *arg) {
-  if (arg == NULL) {
-    return;
-  }
-
-  unsigned *count = arg;
-  (*count)++;
-}
-
-static void thread_local_test_thread(void) {
-  void *ptr = CRYPTO_get_thread_local(OPENSSL_THREAD_LOCAL_TEST);
-  if (ptr != NULL) {
-    return;
-  }
-
-  if (!CRYPTO_set_thread_local(OPENSSL_THREAD_LOCAL_TEST,
-                               &g_destructor_called_count,
-                               thread_local_destructor)) {
-    return;
-  }
-
-  if (CRYPTO_get_thread_local(OPENSSL_THREAD_LOCAL_TEST) !=
-      &g_destructor_called_count) {
-    return;
-  }
-
-  g_test_thread_ok = 1;
-}
-
-static void thread_local_test2_thread(void) {}
-
-static int test_thread_local(void) {
-  void *ptr = CRYPTO_get_thread_local(OPENSSL_THREAD_LOCAL_TEST);
-  if (ptr != NULL) {
-    fprintf(stderr, "Thread-local data was non-NULL at start.\n");
-  }
-
-  thread_t thread;
-  if (!run_thread(&thread, thread_local_test_thread) ||
-      !wait_for_thread(thread)) {
-    fprintf(stderr, "thread failed.\n");
-    return 0;
-  }
-
-  if (!g_test_thread_ok) {
-    fprintf(stderr, "Thread-local data didn't work in thread.\n");
-    return 0;
-  }
-
-  if (g_destructor_called_count != 1) {
-    fprintf(stderr,
-            "Destructor should have been called once, but actually called %u "
-            "times.\n",
-            g_destructor_called_count);
-    return 0;
-  }
-
-  /* thread_local_test2_thread doesn't do anything, but it tests that the
-   * thread destructor function works even if thread-local storage wasn't used
-   * for a thread. */
-  if (!run_thread(&thread, thread_local_test2_thread) ||
-      !wait_for_thread(thread)) {
-    fprintf(stderr, "thread failed.\n");
-    return 0;
-  }
-
-  return 1;
-}
-
-static void rand_state_test_thread(void) {
-  uint8_t buf[1];
-  RAND_bytes(buf, sizeof(buf));
-}
-
-static int test_rand_state(void) {
-  /* In FIPS mode, rand.c maintains a linked-list of thread-local data because
-   * we're required to clear it on process exit. This test exercises removing a
-   * value from that list. */
-  uint8_t buf[1];
-  RAND_bytes(buf, sizeof(buf));
-
-  thread_t thread;
-  if (!run_thread(&thread, rand_state_test_thread) ||
-      !wait_for_thread(thread)) {
-    fprintf(stderr, "thread failed.\n");
-    return 0;
-  }
-
-  return 1;
-}
-
-int main(int argc, char **argv) {
-  if (!test_once() ||
-      !test_thread_local() ||
-      !test_rand_state()) {
-    return 1;
-  }
-
-  printf("PASS\n");
-  return 0;
-}
-
-#else  /* OPENSSL_NO_THREADS */
-
-int main(int argc, char **argv) {
-  printf("PASS\n");
-  return 0;
-}
-
-#endif
diff --git a/crypto/thread_test.cc b/crypto/thread_test.cc
new file mode 100644
index 0000000..f1b04f3
--- /dev/null
+++ b/crypto/thread_test.cc
@@ -0,0 +1,200 @@
+/* Copyright (c) 2015, Google Inc.
+ *
+ * Permission to use, copy, modify, and/or distribute this software for any
+ * purpose with or without fee is hereby granted, provided that the above
+ * copyright notice and this permission notice appear in all copies.
+ *
+ * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
+ * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
+ * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
+ * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
+ * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
+ * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
+ * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */
+
+#include "internal.h"
+
+#include <gtest/gtest.h>
+
+#include <openssl/crypto.h>
+#include <openssl/rand.h>
+
+#include "test/test_util.h"
+
+
+#if !defined(OPENSSL_NO_THREADS)
+
+#if defined(OPENSSL_WINDOWS)
+
+OPENSSL_MSVC_PRAGMA(warning(push, 3))
+#include <windows.h>
+OPENSSL_MSVC_PRAGMA(warning(pop))
+
+typedef HANDLE thread_t;
+
+static DWORD WINAPI thread_run(LPVOID arg) {
+  void (*thread_func)(void);
+  /* VC really doesn't like casting between data and function pointers. */
+  OPENSSL_memcpy(&thread_func, &arg, sizeof(thread_func));
+  thread_func();
+  return 0;
+}
+
+static int run_thread(thread_t *out_thread, void (*thread_func)(void)) {
+  void *arg;
+  /* VC really doesn't like casting between data and function pointers. */
+  OPENSSL_memcpy(&arg, &thread_func, sizeof(arg));
+
+  *out_thread = CreateThread(NULL /* security attributes */,
+                             0 /* default stack size */, thread_run, arg,
+                             0 /* run immediately */, NULL /* ignore id */);
+  return *out_thread != NULL;
+}
+
+static int wait_for_thread(thread_t thread) {
+  return WaitForSingleObject(thread, INFINITE) == 0;
+}
+
+#else
+
+#include <pthread.h>
+#include <string.h>
+#include <time.h>
+
+typedef pthread_t thread_t;
+
+static void *thread_run(void *arg) {
+  void (*thread_func)(void) = reinterpret_cast<void (*)(void)>(arg);
+  thread_func();
+  return NULL;
+}
+
+static int run_thread(thread_t *out_thread, void (*thread_func)(void)) {
+  return pthread_create(out_thread, NULL /* default attributes */, thread_run,
+                        reinterpret_cast<void *>(thread_func)) == 0;
+}
+
+static int wait_for_thread(thread_t thread) {
+  return pthread_join(thread, NULL) == 0;
+}
+
+#endif  /* OPENSSL_WINDOWS */
+
+static unsigned g_once_init_called = 0;
+
+static void once_init(void) {
+  g_once_init_called++;
+
+  /* Sleep briefly so one |call_once_thread| instance will call |CRYPTO_once|
+   * while the other is running this function. */
+#if defined(OPENSSL_WINDOWS)
+  Sleep(1 /* milliseconds */);
+#else
+  struct timespec req;
+  OPENSSL_memset(&req, 0, sizeof(req));
+  req.tv_nsec = 1000000;
+  nanosleep(&req, NULL);
+#endif
+}
+
+static CRYPTO_once_t g_test_once = CRYPTO_ONCE_INIT;
+
+static void call_once_thread(void) {
+  CRYPTO_once(&g_test_once, once_init);
+}
+
+static CRYPTO_once_t once_init_value = CRYPTO_ONCE_INIT;
+static CRYPTO_once_t once_bss;
+
+static struct CRYPTO_STATIC_MUTEX mutex_init_value = CRYPTO_STATIC_MUTEX_INIT;
+static struct CRYPTO_STATIC_MUTEX mutex_bss;
+
+static CRYPTO_EX_DATA_CLASS ex_data_class_value = CRYPTO_EX_DATA_CLASS_INIT;
+static CRYPTO_EX_DATA_CLASS ex_data_class_bss;
+
+TEST(ThreadTest, Once) {
+  ASSERT_EQ(0u, g_once_init_called)
+      << "g_once_init_called was non-zero at start.";
+
+  thread_t thread1, thread2;
+  ASSERT_TRUE(run_thread(&thread1, call_once_thread));
+  ASSERT_TRUE(run_thread(&thread2, call_once_thread));
+  ASSERT_TRUE(wait_for_thread(thread1));
+  ASSERT_TRUE(wait_for_thread(thread2));
+
+  CRYPTO_once(&g_test_once, once_init);
+
+  EXPECT_EQ(1u, g_once_init_called);
+}
+
+TEST(ThreadTest, InitZeros) {
+  if (FIPS_mode()) {
+    /* Our FIPS tooling currently requires that |CRYPTO_ONCE_INIT|,
+     * |CRYPTO_STATIC_MUTEX_INIT| and |CRYPTO_EX_DATA_CLASS| are all zeros and
+     * so can be placed in the BSS section. */
+    EXPECT_EQ(Bytes((uint8_t *)&once_bss, sizeof(once_bss)),
+              Bytes((uint8_t *)&once_init_value, sizeof(once_init_value)));
+    EXPECT_EQ(Bytes((uint8_t *)&mutex_bss, sizeof(mutex_bss)),
+              Bytes((uint8_t *)&mutex_init_value, sizeof(mutex_init_value)));
+    EXPECT_EQ(
+        Bytes((uint8_t *)&ex_data_class_bss, sizeof(ex_data_class_bss)),
+        Bytes((uint8_t *)&ex_data_class_value, sizeof(ex_data_class_value)));
+  }
+}
+
+static int g_test_thread_ok = 0;
+static unsigned g_destructor_called_count = 0;
+
+static void thread_local_destructor(void *arg) {
+  if (arg == NULL) {
+    return;
+  }
+
+  unsigned *count = reinterpret_cast<unsigned*>(arg);
+  (*count)++;
+}
+
+TEST(ThreadTest, ThreadLocal) {
+  ASSERT_EQ(nullptr, CRYPTO_get_thread_local(OPENSSL_THREAD_LOCAL_TEST))
+      << "Thread-local data was non-NULL at start.";
+
+  thread_t thread;
+  ASSERT_TRUE(run_thread(&thread, []() {
+    if (CRYPTO_get_thread_local(OPENSSL_THREAD_LOCAL_TEST) != NULL ||
+        !CRYPTO_set_thread_local(OPENSSL_THREAD_LOCAL_TEST,
+                                 &g_destructor_called_count,
+                                 thread_local_destructor) ||
+        CRYPTO_get_thread_local(OPENSSL_THREAD_LOCAL_TEST) !=
+            &g_destructor_called_count) {
+      return;
+    }
+
+    g_test_thread_ok = 1;
+  }));
+  ASSERT_TRUE(wait_for_thread(thread));
+
+  EXPECT_TRUE(g_test_thread_ok) << "Thread-local data didn't work in thread.";
+  EXPECT_EQ(1u, g_destructor_called_count);
+
+  // Create a no-op thread to test test that the thread destructor function
+  // works even if thread-local storage wasn't used for a thread.
+  ASSERT_TRUE(run_thread(&thread, []() {}));
+  ASSERT_TRUE(wait_for_thread(thread));
+}
+
+TEST(ThreadTest, RandState) {
+  /* In FIPS mode, rand.c maintains a linked-list of thread-local data because
+   * we're required to clear it on process exit. This test exercises removing a
+   * value from that list. */
+  uint8_t buf[1];
+  RAND_bytes(buf, sizeof(buf));
+
+  thread_t thread;
+  ASSERT_TRUE(run_thread(&thread, []() {
+    uint8_t buf2[1];
+    RAND_bytes(buf2, sizeof(buf2));
+  }));
+  ASSERT_TRUE(wait_for_thread(thread));
+}
+
+#endif /* !OPENSSL_NO_THREADS */
diff --git a/util/all_tests.json b/util/all_tests.json
index 90f81b1..2cd4745 100644
--- a/util/all_tests.json
+++ b/util/all_tests.json
@@ -8,7 +8,6 @@
 	["crypto/fipsmodule/p256-x86_64_test", "crypto/fipsmodule/ec/p256-x86_64_tests.txt"],
 	["crypto/obj/obj_test"],
 	["crypto/pkcs8/pkcs12_test"],
-	["crypto/thread_test"],
 	["crypto/x509v3/tab_test"],
 	["crypto/x509v3/v3name_test"],
 	["crypto/x509/x509_test"],