123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136 |
- /*
- * Copyright 2007-2020 The OpenSSL Project Authors. All Rights Reserved.
- * Copyright Nokia 2007-2019
- * Copyright Siemens AG 2015-2019
- *
- * Licensed under the Apache License 2.0 (the "License"). You may not use
- * this file except in compliance with the License. You can obtain a copy
- * in the file LICENSE in the source distribution or at
- * https://www.openssl.org/source/license.html
- */
- #include "cmp_testlib.h"
- #include <openssl/rsa.h> /* needed in case config no-deprecated */
- DEFINE_STACK_OF(X509)
- EVP_PKEY *load_pem_key(const char *file)
- {
- EVP_PKEY *key = NULL;
- BIO *bio = NULL;
- if (!TEST_ptr(bio = BIO_new(BIO_s_file())))
- return NULL;
- if (TEST_int_gt(BIO_read_filename(bio, file), 0))
- (void)TEST_ptr(key = PEM_read_bio_PrivateKey(bio, NULL, NULL, NULL));
- BIO_free(bio);
- return key;
- }
- X509 *load_pem_cert(const char *file)
- {
- X509 *cert = NULL;
- BIO *bio = NULL;
- if (!TEST_ptr(bio = BIO_new(BIO_s_file())))
- return NULL;
- if (TEST_int_gt(BIO_read_filename(bio, file), 0))
- (void)TEST_ptr(cert = PEM_read_bio_X509(bio, NULL, NULL, NULL));
- BIO_free(bio);
- return cert;
- }
- OSSL_CMP_MSG *load_pkimsg(const char *file)
- {
- OSSL_CMP_MSG *msg;
- (void)TEST_ptr((msg = ossl_cmp_msg_load(file)));
- return msg;
- }
- X509_REQ *load_csr(const char *file)
- {
- X509_REQ *csr = NULL;
- BIO *bio = NULL;
- if (!TEST_ptr(file) || !TEST_ptr(bio = BIO_new_file(file, "rb")))
- return NULL;
- (void)TEST_ptr(csr = d2i_X509_REQ_bio(bio, NULL));
- BIO_free(bio);
- return csr;
- }
- EVP_PKEY *gen_rsa(void)
- {
- EVP_PKEY_CTX *ctx = NULL;
- EVP_PKEY *pkey = NULL;
- (void)(TEST_ptr(ctx = EVP_PKEY_CTX_new_id(EVP_PKEY_RSA, NULL))
- && TEST_int_gt(EVP_PKEY_keygen_init(ctx), 0)
- && TEST_int_gt(EVP_PKEY_CTX_set_rsa_keygen_bits(ctx, 2048), 0)
- && TEST_int_gt(EVP_PKEY_keygen(ctx, &pkey), 0));
- EVP_PKEY_CTX_free(ctx);
- return pkey;
- }
- /*
- * Checks whether the syntax of msg conforms to ASN.1
- */
- int valid_asn1_encoding(const OSSL_CMP_MSG *msg)
- {
- return msg != NULL ? i2d_OSSL_CMP_MSG(msg, NULL) > 0 : 0;
- }
- /*
- * Compares two stacks of certificates in the order of their elements.
- * Returns 0 if sk1 and sk2 are equal and another value otherwise
- */
- int STACK_OF_X509_cmp(const STACK_OF(X509) *sk1, const STACK_OF(X509) *sk2)
- {
- int i, res;
- X509 *a, *b;
- if (sk1 == sk2)
- return 0;
- if (sk1 == NULL)
- return -1;
- if (sk2 == NULL)
- return 1;
- if ((res = sk_X509_num(sk1) - sk_X509_num(sk2)))
- return res;
- for (i = 0; i < sk_X509_num(sk1); i++) {
- a = sk_X509_value(sk1, i);
- b = sk_X509_value(sk2, i);
- if (a != b)
- if ((res = X509_cmp(a, b)) != 0)
- return res;
- }
- return 0;
- }
- /*
- * Up refs and push a cert onto sk.
- * Returns the number of certificates on the stack on success
- * Returns -1 or 0 on error
- */
- int STACK_OF_X509_push1(STACK_OF(X509) *sk, X509 *cert)
- {
- int res;
- if (sk == NULL || cert == NULL)
- return -1;
- if (!X509_up_ref(cert))
- return -1;
- res = sk_X509_push(sk, cert);
- if (res <= 0)
- X509_free(cert); /* down-ref */
- return res;
- }
- int print_to_bio_out(const char *func, const char *file, int line,
- OSSL_CMP_severity level, const char *msg)
- {
- return OSSL_CMP_print_to_bio(bio_out, func, file, line, level, msg);
- }
|