123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184 |
- /*
- * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved.
- *
- * Licensed under the Apache License 2.0 (the "License"). You may not use
- * this file except in compliance with the License. You can obtain a copy
- * in the file LICENSE in the source distribution or at
- * https://www.openssl.org/source/license.html
- */
- #include <stdio.h>
- #include <string.h>
- #include <openssl/bn.h>
- #include "crypto/asn1_dsa.h"
- #include "testutil.h"
- static unsigned char t_dsa_sig[] = {
- 0x30, 0x06, /* SEQUENCE tag + length */
- 0x02, 0x01, 0x01, /* INTEGER tag + length + content */
- 0x02, 0x01, 0x02 /* INTEGER tag + length + content */
- };
- static unsigned char t_dsa_sig_extra[] = {
- 0x30, 0x06, /* SEQUENCE tag + length */
- 0x02, 0x01, 0x01, /* INTEGER tag + length + content */
- 0x02, 0x01, 0x02, /* INTEGER tag + length + content */
- 0x05, 0x00 /* NULL tag + length */
- };
- static unsigned char t_dsa_sig_msb[] = {
- 0x30, 0x08, /* SEQUENCE tag + length */
- 0x02, 0x02, 0x00, 0x81, /* INTEGER tag + length + content */
- 0x02, 0x02, 0x00, 0x82 /* INTEGER tag + length + content */
- };
- static unsigned char t_dsa_sig_two[] = {
- 0x30, 0x08, /* SEQUENCE tag + length */
- 0x02, 0x02, 0x01, 0x00, /* INTEGER tag + length + content */
- 0x02, 0x02, 0x02, 0x00 /* INTEGER tag + length + content */
- };
- /*
- * Badly coded ASN.1 INTEGER zero wrapped in a sequence along with another
- * (valid) INTEGER.
- */
- static unsigned char t_invalid_int_zero[] = {
- 0x30, 0x05, /* SEQUENCE tag + length */
- 0x02, 0x00, /* INTEGER tag + length */
- 0x02, 0x01, 0x2a /* INTEGER tag + length */
- };
- /*
- * Badly coded ASN.1 INTEGER (with leading zeros) wrapped in a sequence along
- * with another (valid) INTEGER.
- */
- static unsigned char t_invalid_int[] = {
- 0x30, 0x07, /* SEQUENCE tag + length */
- 0x02, 0x02, 0x00, 0x7f, /* INTEGER tag + length */
- 0x02, 0x01, 0x2a /* INTEGER tag + length */
- };
- /*
- * Negative ASN.1 INTEGER wrapped in a sequence along with another
- * (valid) INTEGER.
- */
- static unsigned char t_neg_int[] = {
- 0x30, 0x06, /* SEQUENCE tag + length */
- 0x02, 0x01, 0xaa, /* INTEGER tag + length */
- 0x02, 0x01, 0x2a /* INTEGER tag + length */
- };
- static unsigned char t_trunc_der[] = {
- 0x30, 0x08, /* SEQUENCE tag + length */
- 0x02, 0x02, 0x00, 0x81, /* INTEGER tag + length */
- 0x02, 0x02, 0x00 /* INTEGER tag + length */
- };
- static unsigned char t_trunc_seq[] = {
- 0x30, 0x07, /* SEQUENCE tag + length */
- 0x02, 0x02, 0x00, 0x81, /* INTEGER tag + length */
- 0x02, 0x02, 0x00, 0x82 /* INTEGER tag + length */
- };
- static int test_decode(void)
- {
- int rv = 0;
- BIGNUM *r;
- BIGNUM *s;
- const unsigned char *pder;
- r = BN_new();
- s = BN_new();
- /* Positive tests */
- pder = t_dsa_sig;
- if (ossl_decode_der_dsa_sig(r, s, &pder, sizeof(t_dsa_sig)) == 0
- || !TEST_ptr_eq(pder, (t_dsa_sig + sizeof(t_dsa_sig)))
- || !TEST_BN_eq_word(r, 1) || !TEST_BN_eq_word(s, 2)) {
- TEST_info("asn1_dsa test_decode: t_dsa_sig failed");
- goto fail;
- }
- BN_clear(r);
- BN_clear(s);
- pder = t_dsa_sig_extra;
- if (ossl_decode_der_dsa_sig(r, s, &pder, sizeof(t_dsa_sig_extra)) == 0
- || !TEST_ptr_eq(pder,
- (t_dsa_sig_extra + sizeof(t_dsa_sig_extra) - 2))
- || !TEST_BN_eq_word(r, 1) || !TEST_BN_eq_word(s, 2)) {
- TEST_info("asn1_dsa test_decode: t_dsa_sig_extra failed");
- goto fail;
- }
- BN_clear(r);
- BN_clear(s);
- pder = t_dsa_sig_msb;
- if (ossl_decode_der_dsa_sig(r, s, &pder, sizeof(t_dsa_sig_msb)) == 0
- || !TEST_ptr_eq(pder, (t_dsa_sig_msb + sizeof(t_dsa_sig_msb)))
- || !TEST_BN_eq_word(r, 0x81) || !TEST_BN_eq_word(s, 0x82)) {
- TEST_info("asn1_dsa test_decode: t_dsa_sig_msb failed");
- goto fail;
- }
- BN_clear(r);
- BN_clear(s);
- pder = t_dsa_sig_two;
- if (ossl_decode_der_dsa_sig(r, s, &pder, sizeof(t_dsa_sig_two)) == 0
- || !TEST_ptr_eq(pder, (t_dsa_sig_two + sizeof(t_dsa_sig_two)))
- || !TEST_BN_eq_word(r, 0x100) || !TEST_BN_eq_word(s, 0x200)) {
- TEST_info("asn1_dsa test_decode: t_dsa_sig_two failed");
- goto fail;
- }
- /* Negative tests */
- pder = t_invalid_int_zero;
- if (ossl_decode_der_dsa_sig(r, s, &pder, sizeof(t_invalid_int_zero)) != 0) {
- TEST_info("asn1_dsa test_decode: Expected t_invalid_int_zero to fail");
- goto fail;
- }
- BN_clear(r);
- BN_clear(s);
- pder = t_invalid_int;
- if (ossl_decode_der_dsa_sig(r, s, &pder, sizeof(t_invalid_int)) != 0) {
- TEST_info("asn1_dsa test_decode: Expected t_invalid_int to fail");
- goto fail;
- }
- BN_clear(r);
- BN_clear(s);
- pder = t_neg_int;
- if (ossl_decode_der_dsa_sig(r, s, &pder, sizeof(t_neg_int)) != 0) {
- TEST_info("asn1_dsa test_decode: Expected t_neg_int to fail");
- goto fail;
- }
- BN_clear(r);
- BN_clear(s);
- pder = t_trunc_der;
- if (ossl_decode_der_dsa_sig(r, s, &pder, sizeof(t_trunc_der)) != 0) {
- TEST_info("asn1_dsa test_decode: Expected fail t_trunc_der");
- goto fail;
- }
- BN_clear(r);
- BN_clear(s);
- pder = t_trunc_seq;
- if (ossl_decode_der_dsa_sig(r, s, &pder, sizeof(t_trunc_seq)) != 0) {
- TEST_info("asn1_dsa test_decode: Expected fail t_trunc_seq");
- goto fail;
- }
- rv = 1;
- fail:
- BN_free(r);
- BN_free(s);
- return rv;
- }
- int setup_tests(void)
- {
- ADD_TEST(test_decode);
- return 1;
- }
|