asn1_internal_test.c 5.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200
  1. /*
  2. * Copyright 1999-2021 The OpenSSL Project Authors. All Rights Reserved.
  3. *
  4. * Licensed under the Apache License 2.0 (the "License"). You may not use
  5. * this file except in compliance with the License. You can obtain a copy
  6. * in the file LICENSE in the source distribution or at
  7. * https://www.openssl.org/source/license.html
  8. */
  9. /* Internal tests for the asn1 module */
  10. /*
  11. * RSA low level APIs are deprecated for public use, but still ok for
  12. * internal use.
  13. */
  14. #include "internal/deprecated.h"
  15. #include <stdio.h>
  16. #include <string.h>
  17. #include <openssl/asn1.h>
  18. #include <openssl/evp.h>
  19. #include <openssl/objects.h>
  20. #include "testutil.h"
  21. #include "internal/nelem.h"
  22. /**********************************************************************
  23. *
  24. * Test of a_strnid's tbl_standard
  25. *
  26. ***/
  27. #include "../crypto/asn1/tbl_standard.h"
  28. static int test_tbl_standard(void)
  29. {
  30. const ASN1_STRING_TABLE *tmp;
  31. int last_nid = -1;
  32. size_t i;
  33. for (tmp = tbl_standard, i = 0; i < OSSL_NELEM(tbl_standard); i++, tmp++) {
  34. if (tmp->nid < last_nid) {
  35. last_nid = 0;
  36. break;
  37. }
  38. last_nid = tmp->nid;
  39. }
  40. if (TEST_int_ne(last_nid, 0)) {
  41. TEST_info("asn1 tbl_standard: Table order OK");
  42. return 1;
  43. }
  44. TEST_info("asn1 tbl_standard: out of order");
  45. for (tmp = tbl_standard, i = 0; i < OSSL_NELEM(tbl_standard); i++, tmp++)
  46. TEST_note("asn1 tbl_standard: Index %zu, NID %d, Name=%s",
  47. i, tmp->nid, OBJ_nid2ln(tmp->nid));
  48. return 0;
  49. }
  50. /**********************************************************************
  51. *
  52. * Test of ameth_lib's standard_methods
  53. *
  54. ***/
  55. #include "crypto/asn1.h"
  56. #include "../crypto/asn1/standard_methods.h"
  57. static int test_standard_methods(void)
  58. {
  59. const EVP_PKEY_ASN1_METHOD **tmp;
  60. int last_pkey_id = -1;
  61. size_t i;
  62. int ok = 1;
  63. for (tmp = standard_methods, i = 0; i < OSSL_NELEM(standard_methods);
  64. i++, tmp++) {
  65. if ((*tmp)->pkey_id < last_pkey_id) {
  66. last_pkey_id = 0;
  67. break;
  68. }
  69. last_pkey_id = (*tmp)->pkey_id;
  70. /*
  71. * One of the following must be true:
  72. *
  73. * pem_str == NULL AND ASN1_PKEY_ALIAS is set
  74. * pem_str != NULL AND ASN1_PKEY_ALIAS is clear
  75. *
  76. * Anything else is an error and may lead to a corrupt ASN1 method table
  77. */
  78. if (!TEST_true(((*tmp)->pem_str == NULL && ((*tmp)->pkey_flags & ASN1_PKEY_ALIAS) != 0)
  79. || ((*tmp)->pem_str != NULL && ((*tmp)->pkey_flags & ASN1_PKEY_ALIAS) == 0))) {
  80. TEST_note("asn1 standard methods: Index %zu, pkey ID %d, Name=%s",
  81. i, (*tmp)->pkey_id, OBJ_nid2sn((*tmp)->pkey_id));
  82. ok = 0;
  83. }
  84. }
  85. if (TEST_int_ne(last_pkey_id, 0)) {
  86. TEST_info("asn1 standard methods: Table order OK");
  87. return ok;
  88. }
  89. TEST_note("asn1 standard methods: out of order");
  90. for (tmp = standard_methods, i = 0; i < OSSL_NELEM(standard_methods);
  91. i++, tmp++)
  92. TEST_note("asn1 standard methods: Index %zu, pkey ID %d, Name=%s",
  93. i, (*tmp)->pkey_id, OBJ_nid2sn((*tmp)->pkey_id));
  94. return 0;
  95. }
  96. /**********************************************************************
  97. *
  98. * Test of that i2d fail on non-existing non-optional items
  99. *
  100. ***/
  101. #include <openssl/rsa.h>
  102. static int test_empty_nonoptional_content(void)
  103. {
  104. RSA *rsa = NULL;
  105. BIGNUM *n = NULL;
  106. BIGNUM *e = NULL;
  107. int ok = 0;
  108. if (!TEST_ptr(rsa = RSA_new())
  109. || !TEST_ptr(n = BN_new())
  110. || !TEST_ptr(e = BN_new())
  111. || !TEST_true(RSA_set0_key(rsa, n, e, NULL)))
  112. goto end;
  113. n = e = NULL; /* They are now "owned" by |rsa| */
  114. /*
  115. * This SHOULD fail, as we're trying to encode a public key as a private
  116. * key. The private key bits MUST be present for a proper RSAPrivateKey.
  117. */
  118. if (TEST_int_le(i2d_RSAPrivateKey(rsa, NULL), 0))
  119. ok = 1;
  120. end:
  121. RSA_free(rsa);
  122. BN_free(n);
  123. BN_free(e);
  124. return ok;
  125. }
  126. /**********************************************************************
  127. *
  128. * Tests of the Unicode code point range
  129. *
  130. ***/
  131. static int test_unicode(const unsigned char *univ, size_t len, int expected)
  132. {
  133. const unsigned char *end = univ + len;
  134. int ok = 1;
  135. for (; univ < end; univ += 4) {
  136. if (!TEST_int_eq(ASN1_mbstring_copy(NULL, univ, 4, MBSTRING_UNIV,
  137. B_ASN1_UTF8STRING),
  138. expected))
  139. ok = 0;
  140. }
  141. return ok;
  142. }
  143. static int test_unicode_range(void)
  144. {
  145. const unsigned char univ_ok[] = "\0\0\0\0"
  146. "\0\0\xd7\xff"
  147. "\0\0\xe0\x00"
  148. "\0\x10\xff\xff";
  149. const unsigned char univ_bad[] = "\0\0\xd8\x00"
  150. "\0\0\xdf\xff"
  151. "\0\x11\x00\x00"
  152. "\x80\x00\x00\x00"
  153. "\xff\xff\xff\xff";
  154. int ok = 1;
  155. if (!test_unicode(univ_ok, sizeof univ_ok - 1, V_ASN1_UTF8STRING))
  156. ok = 0;
  157. if (!test_unicode(univ_bad, sizeof univ_bad - 1, -1))
  158. ok = 0;
  159. return ok;
  160. }
  161. int setup_tests(void)
  162. {
  163. ADD_TEST(test_tbl_standard);
  164. ADD_TEST(test_standard_methods);
  165. ADD_TEST(test_empty_nonoptional_content);
  166. ADD_TEST(test_unicode_range);
  167. return 1;
  168. }