123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908 |
- /*
- * Copyright 2017-2021 The OpenSSL Project Authors. All Rights Reserved.
- *
- * Licensed under the Apache License 2.0 (the "License"). You may not use
- * this file except in compliance with the License. You can obtain a copy
- * in the file LICENSE in the source distribution or at
- * https://www.openssl.org/source/license.html
- */
- #include <stdio.h>
- #include <string.h>
- #include <openssl/rand.h>
- #include <openssl/asn1t.h>
- #include "internal/numbers.h"
- #include "testutil.h"
- #ifdef __GNUC__
- # pragma GCC diagnostic ignored "-Wunused-function"
- # pragma GCC diagnostic ignored "-Wformat"
- #endif
- #ifdef __clang__
- # pragma clang diagnostic ignored "-Wunused-function"
- # pragma clang diagnostic ignored "-Wformat"
- #endif
- /***** Custom test data ******************************************************/
- /*
- * We conduct tests with these arrays for every type we try out.
- * You will find the expected results together with the test structures
- * for each type, further down.
- */
- static unsigned char t_zero[] = {
- 0x00
- };
- static unsigned char t_one[] = {
- 0x01
- };
- static unsigned char t_one_neg[] = {
- 0xff
- };
- static unsigned char t_minus_256[] = {
- 0xff, 0x00
- };
- static unsigned char t_longundef[] = {
- 0x7f, 0xff, 0xff, 0xff
- };
- static unsigned char t_9bytes_1[] = {
- 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff
- };
- static unsigned char t_8bytes_1[] = {
- 0x00, 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
- };
- static unsigned char t_8bytes_2[] = {
- 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff
- };
- static unsigned char t_8bytes_3_pad[] = {
- 0x00, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff
- };
- static unsigned char t_8bytes_4_neg[] = {
- 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
- };
- static unsigned char t_8bytes_5_negpad[] = {
- 0xff, 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
- };
- /* 32-bit long */
- static unsigned char t_5bytes_1[] = {
- 0x01, 0xff, 0xff, 0xff, 0xff
- };
- static unsigned char t_4bytes_1[] = {
- 0x00, 0x80, 0x00, 0x00, 0x00
- };
- /* We make the last byte 0xfe to avoid a clash with ASN1_LONG_UNDEF */
- static unsigned char t_4bytes_2[] = {
- 0x7f, 0xff, 0xff, 0xfe
- };
- static unsigned char t_4bytes_3_pad[] = {
- 0x00, 0x7f, 0xff, 0xff, 0xfe
- };
- static unsigned char t_4bytes_4_neg[] = {
- 0x80, 0x00, 0x00, 0x00
- };
- static unsigned char t_4bytes_5_negpad[] = {
- 0xff, 0x80, 0x00, 0x00, 0x00
- };
- typedef struct {
- unsigned char *bytes1;
- size_t nbytes1;
- unsigned char *bytes2;
- size_t nbytes2;
- } TEST_CUSTOM_DATA;
- #define CUSTOM_DATA(v) \
- { v, sizeof(v), t_one, sizeof(t_one) }, \
- { t_one, sizeof(t_one), v, sizeof(v) }
- static TEST_CUSTOM_DATA test_custom_data[] = {
- CUSTOM_DATA(t_zero),
- CUSTOM_DATA(t_longundef),
- CUSTOM_DATA(t_one),
- CUSTOM_DATA(t_one_neg),
- CUSTOM_DATA(t_minus_256),
- CUSTOM_DATA(t_9bytes_1),
- CUSTOM_DATA(t_8bytes_1),
- CUSTOM_DATA(t_8bytes_2),
- CUSTOM_DATA(t_8bytes_3_pad),
- CUSTOM_DATA(t_8bytes_4_neg),
- CUSTOM_DATA(t_8bytes_5_negpad),
- CUSTOM_DATA(t_5bytes_1),
- CUSTOM_DATA(t_4bytes_1),
- CUSTOM_DATA(t_4bytes_2),
- CUSTOM_DATA(t_4bytes_3_pad),
- CUSTOM_DATA(t_4bytes_4_neg),
- CUSTOM_DATA(t_4bytes_5_negpad),
- };
- /***** Type specific test data ***********************************************/
- /*
- * First, a few utility things that all type specific data can use, or in some
- * cases, MUST use.
- */
- /*
- * For easy creation of arrays of expected data. These macros correspond to
- * the uses of CUSTOM_DATA above.
- */
- #define CUSTOM_EXPECTED_SUCCESS(num, znum) \
- { 0xff, num, 1 }, \
- { 0xff, 1, znum }
- #define CUSTOM_EXPECTED_FAILURE \
- { 0, 0, 0 }, \
- { 0, 0, 0 }
- /*
- * A structure to collect all test information in. There MUST be one instance
- * of this for each test
- */
- typedef int i2d_fn(void *a, unsigned char **pp);
- typedef void *d2i_fn(void **a, unsigned char **pp, long length);
- typedef void ifree_fn(void *a);
- typedef struct {
- ASN1_ITEM_EXP *asn1_type;
- const char *name;
- int skip; /* 1 if this package should be skipped */
- /* An array of structures to compare decoded custom data with */
- void *encode_expectations;
- size_t encode_expectations_size;
- size_t encode_expectations_elem_size;
- /*
- * An array of structures that are encoded into a DER blob, which is
- * then decoded, and result gets compared with the original.
- */
- void *encdec_data;
- size_t encdec_data_size;
- size_t encdec_data_elem_size;
- /* The i2d function to use with this type */
- i2d_fn *i2d;
- /* The d2i function to use with this type */
- d2i_fn *d2i;
- /* Function to free a decoded structure */
- ifree_fn *ifree;
- } TEST_PACKAGE;
- /* To facilitate the creation of an encdec_data array */
- #define ENCDEC_DATA(num, znum) \
- { 0xff, num, 1 }, { 0xff, 1, znum }
- #define ENCDEC_ARRAY(max, zmax, min, zmin) \
- ENCDEC_DATA(max,zmax), \
- ENCDEC_DATA(min,zmin), \
- ENCDEC_DATA(1, 1), \
- ENCDEC_DATA(-1, -1), \
- ENCDEC_DATA(0, ASN1_LONG_UNDEF)
- #ifndef OPENSSL_NO_DEPRECATED_3_0
- /***** LONG ******************************************************************/
- typedef struct {
- /* If decoding is expected to succeed, set this to 1, otherwise 0 */
- ASN1_BOOLEAN success;
- long test_long;
- long test_zlong;
- } ASN1_LONG_DATA;
- ASN1_SEQUENCE(ASN1_LONG_DATA) = {
- ASN1_SIMPLE(ASN1_LONG_DATA, success, ASN1_BOOLEAN),
- ASN1_SIMPLE(ASN1_LONG_DATA, test_long, LONG),
- ASN1_EXP_OPT(ASN1_LONG_DATA, test_zlong, ZLONG, 0)
- } static_ASN1_SEQUENCE_END(ASN1_LONG_DATA)
- IMPLEMENT_STATIC_ASN1_ENCODE_FUNCTIONS(ASN1_LONG_DATA)
- IMPLEMENT_STATIC_ASN1_ALLOC_FUNCTIONS(ASN1_LONG_DATA)
- static ASN1_LONG_DATA long_expected_32bit[] = {
- /* The following should fail on the second because it's the default */
- { 0xff, 0, 1 }, { 0, 0, 0 }, /* t_zero */
- { 0, 0, 0 }, { 0xff, 1, 0x7fffffff }, /* t_longundef */
- CUSTOM_EXPECTED_SUCCESS(1, 1), /* t_one */
- CUSTOM_EXPECTED_SUCCESS(-1, -1), /* t_one_neg */
- CUSTOM_EXPECTED_SUCCESS(-256, -256), /* t_minus_256 */
- CUSTOM_EXPECTED_FAILURE, /* t_9bytes_1 */
- CUSTOM_EXPECTED_FAILURE, /* t_8bytes_1 */
- CUSTOM_EXPECTED_FAILURE, /* t_8bytes_2 */
- CUSTOM_EXPECTED_FAILURE, /* t_8bytes_3_pad */
- CUSTOM_EXPECTED_FAILURE, /* t_8bytes_4_neg */
- CUSTOM_EXPECTED_FAILURE, /* t_8bytes_5_negpad */
- CUSTOM_EXPECTED_FAILURE, /* t_5bytes_1 */
- CUSTOM_EXPECTED_FAILURE, /* t_4bytes_1 (too large positive) */
- CUSTOM_EXPECTED_SUCCESS(INT32_MAX - 1, INT32_MAX -1), /* t_4bytes_2 */
- CUSTOM_EXPECTED_FAILURE, /* t_4bytes_3_pad (illegal padding) */
- CUSTOM_EXPECTED_SUCCESS(INT32_MIN, INT32_MIN), /* t_4bytes_4_neg */
- CUSTOM_EXPECTED_FAILURE, /* t_4bytes_5_negpad (illegal padding) */
- };
- static ASN1_LONG_DATA long_encdec_data_32bit[] = {
- ENCDEC_ARRAY(LONG_MAX - 1, LONG_MAX, LONG_MIN, LONG_MIN),
- /* Check that default numbers fail */
- { 0, ASN1_LONG_UNDEF, 1 }, { 0, 1, 0 }
- };
- static TEST_PACKAGE long_test_package_32bit = {
- ASN1_ITEM_ref(ASN1_LONG_DATA), "LONG", sizeof(long) != 4,
- long_expected_32bit,
- sizeof(long_expected_32bit), sizeof(long_expected_32bit[0]),
- long_encdec_data_32bit,
- sizeof(long_encdec_data_32bit), sizeof(long_encdec_data_32bit[0]),
- (i2d_fn *)i2d_ASN1_LONG_DATA, (d2i_fn *)d2i_ASN1_LONG_DATA,
- (ifree_fn *)ASN1_LONG_DATA_free
- };
- static ASN1_LONG_DATA long_expected_64bit[] = {
- /* The following should fail on the second because it's the default */
- { 0xff, 0, 1 }, { 0, 0, 0 }, /* t_zero */
- { 0, 0, 0 }, { 0xff, 1, 0x7fffffff }, /* t_longundef */
- CUSTOM_EXPECTED_SUCCESS(1, 1), /* t_one */
- CUSTOM_EXPECTED_SUCCESS(-1, -1), /* t_one_neg */
- CUSTOM_EXPECTED_SUCCESS(-256, -256), /* t_minus_256 */
- CUSTOM_EXPECTED_FAILURE, /* t_9bytes_1 */
- CUSTOM_EXPECTED_FAILURE, /* t_8bytes_1 */
- CUSTOM_EXPECTED_SUCCESS(LONG_MAX, LONG_MAX), /* t_8bytes_2 */
- CUSTOM_EXPECTED_FAILURE, /* t_8bytes_3_pad (illegal padding) */
- CUSTOM_EXPECTED_SUCCESS(LONG_MIN, LONG_MIN), /* t_8bytes_4_neg */
- CUSTOM_EXPECTED_FAILURE, /* t_8bytes_5_negpad (illegal padding) */
- CUSTOM_EXPECTED_SUCCESS((long)0x1ffffffff, (long)0x1ffffffff), /* t_5bytes_1 */
- CUSTOM_EXPECTED_SUCCESS((long)0x80000000, (long)0x80000000), /* t_4bytes_1 */
- CUSTOM_EXPECTED_SUCCESS(INT32_MAX - 1, INT32_MAX -1), /* t_4bytes_2 */
- CUSTOM_EXPECTED_FAILURE, /* t_4bytes_3_pad (illegal padding) */
- CUSTOM_EXPECTED_SUCCESS(INT32_MIN, INT32_MIN), /* t_4bytes_4_neg */
- CUSTOM_EXPECTED_FAILURE, /* t_4bytes_5_negpad (illegal padding) */
- };
- static ASN1_LONG_DATA long_encdec_data_64bit[] = {
- ENCDEC_ARRAY(LONG_MAX, LONG_MAX, LONG_MIN, LONG_MIN),
- /* Check that default numbers fail */
- { 0, ASN1_LONG_UNDEF, 1 }, { 0, 1, 0 }
- };
- static TEST_PACKAGE long_test_package_64bit = {
- ASN1_ITEM_ref(ASN1_LONG_DATA), "LONG", sizeof(long) != 8,
- long_expected_64bit,
- sizeof(long_expected_64bit), sizeof(long_expected_64bit[0]),
- long_encdec_data_64bit,
- sizeof(long_encdec_data_64bit), sizeof(long_encdec_data_64bit[0]),
- (i2d_fn *)i2d_ASN1_LONG_DATA, (d2i_fn *)d2i_ASN1_LONG_DATA,
- (ifree_fn *)ASN1_LONG_DATA_free
- };
- #endif
- /***** INT32 *****************************************************************/
- typedef struct {
- ASN1_BOOLEAN success;
- int32_t test_int32;
- int32_t test_zint32;
- } ASN1_INT32_DATA;
- ASN1_SEQUENCE(ASN1_INT32_DATA) = {
- ASN1_SIMPLE(ASN1_INT32_DATA, success, ASN1_BOOLEAN),
- ASN1_EMBED(ASN1_INT32_DATA, test_int32, INT32),
- ASN1_EXP_OPT_EMBED(ASN1_INT32_DATA, test_zint32, ZINT32, 0)
- } static_ASN1_SEQUENCE_END(ASN1_INT32_DATA)
- IMPLEMENT_STATIC_ASN1_ENCODE_FUNCTIONS(ASN1_INT32_DATA)
- IMPLEMENT_STATIC_ASN1_ALLOC_FUNCTIONS(ASN1_INT32_DATA)
- static ASN1_INT32_DATA int32_expected[] = {
- CUSTOM_EXPECTED_SUCCESS(0, 0), /* t_zero */
- CUSTOM_EXPECTED_SUCCESS(ASN1_LONG_UNDEF, ASN1_LONG_UNDEF), /* t_zero */
- CUSTOM_EXPECTED_SUCCESS(1, 1), /* t_one */
- CUSTOM_EXPECTED_SUCCESS(-1, -1), /* t_one_neg */
- CUSTOM_EXPECTED_SUCCESS(-256, -256), /* t_minus_256 */
- CUSTOM_EXPECTED_FAILURE, /* t_9bytes_1 */
- CUSTOM_EXPECTED_FAILURE, /* t_8bytes_1 */
- CUSTOM_EXPECTED_FAILURE, /* t_8bytes_2 */
- CUSTOM_EXPECTED_FAILURE, /* t_8bytes_3_pad */
- CUSTOM_EXPECTED_FAILURE, /* t_8bytes_4_neg */
- CUSTOM_EXPECTED_FAILURE, /* t_8bytes_5_negpad */
- CUSTOM_EXPECTED_FAILURE, /* t_5bytes_1 */
- CUSTOM_EXPECTED_FAILURE, /* t_4bytes_1 (too large positive) */
- CUSTOM_EXPECTED_SUCCESS(INT32_MAX - 1, INT32_MAX -1), /* t_4bytes_2 */
- CUSTOM_EXPECTED_FAILURE, /* t_4bytes_3_pad (illegal padding) */
- CUSTOM_EXPECTED_SUCCESS(INT32_MIN, INT32_MIN), /* t_4bytes_4_neg */
- CUSTOM_EXPECTED_FAILURE, /* t_4bytes_5_negpad (illegal padding) */
- };
- static ASN1_INT32_DATA int32_encdec_data[] = {
- ENCDEC_ARRAY(INT32_MAX, INT32_MAX, INT32_MIN, INT32_MIN),
- };
- static TEST_PACKAGE int32_test_package = {
- ASN1_ITEM_ref(ASN1_INT32_DATA), "INT32", 0,
- int32_expected, sizeof(int32_expected), sizeof(int32_expected[0]),
- int32_encdec_data, sizeof(int32_encdec_data), sizeof(int32_encdec_data[0]),
- (i2d_fn *)i2d_ASN1_INT32_DATA, (d2i_fn *)d2i_ASN1_INT32_DATA,
- (ifree_fn *)ASN1_INT32_DATA_free
- };
- /***** UINT32 ****************************************************************/
- typedef struct {
- ASN1_BOOLEAN success;
- uint32_t test_uint32;
- uint32_t test_zuint32;
- } ASN1_UINT32_DATA;
- ASN1_SEQUENCE(ASN1_UINT32_DATA) = {
- ASN1_SIMPLE(ASN1_UINT32_DATA, success, ASN1_BOOLEAN),
- ASN1_EMBED(ASN1_UINT32_DATA, test_uint32, UINT32),
- ASN1_EXP_OPT_EMBED(ASN1_UINT32_DATA, test_zuint32, ZUINT32, 0)
- } static_ASN1_SEQUENCE_END(ASN1_UINT32_DATA)
- IMPLEMENT_STATIC_ASN1_ENCODE_FUNCTIONS(ASN1_UINT32_DATA)
- IMPLEMENT_STATIC_ASN1_ALLOC_FUNCTIONS(ASN1_UINT32_DATA)
- static ASN1_UINT32_DATA uint32_expected[] = {
- CUSTOM_EXPECTED_SUCCESS(0, 0), /* t_zero */
- CUSTOM_EXPECTED_SUCCESS(ASN1_LONG_UNDEF, ASN1_LONG_UNDEF), /* t_zero */
- CUSTOM_EXPECTED_SUCCESS(1, 1), /* t_one */
- CUSTOM_EXPECTED_FAILURE, /* t_one_neg (illegal negative value) */
- CUSTOM_EXPECTED_FAILURE, /* t_minus_256 (illegal negative value) */
- CUSTOM_EXPECTED_FAILURE, /* t_9bytes_1 */
- CUSTOM_EXPECTED_FAILURE, /* t_8bytes_1 */
- CUSTOM_EXPECTED_FAILURE, /* t_8bytes_2 */
- CUSTOM_EXPECTED_FAILURE, /* t_8bytes_3_pad */
- CUSTOM_EXPECTED_FAILURE, /* t_8bytes_4_neg */
- CUSTOM_EXPECTED_FAILURE, /* t_8bytes_5_negpad */
- CUSTOM_EXPECTED_FAILURE, /* t_5bytes_1 */
- CUSTOM_EXPECTED_SUCCESS(0x80000000, 0x80000000), /* t_4bytes_1 */
- CUSTOM_EXPECTED_SUCCESS(INT32_MAX - 1, INT32_MAX -1), /* t_4bytes_2 */
- CUSTOM_EXPECTED_FAILURE, /* t_4bytes_3_pad (illegal padding) */
- CUSTOM_EXPECTED_FAILURE, /* t_4bytes_4_neg (illegal negative value) */
- CUSTOM_EXPECTED_FAILURE, /* t_4bytes_5_negpad (illegal padding) */
- };
- static ASN1_UINT32_DATA uint32_encdec_data[] = {
- ENCDEC_ARRAY(UINT32_MAX, UINT32_MAX, 0, 0),
- };
- static TEST_PACKAGE uint32_test_package = {
- ASN1_ITEM_ref(ASN1_UINT32_DATA), "UINT32", 0,
- uint32_expected, sizeof(uint32_expected), sizeof(uint32_expected[0]),
- uint32_encdec_data, sizeof(uint32_encdec_data), sizeof(uint32_encdec_data[0]),
- (i2d_fn *)i2d_ASN1_UINT32_DATA, (d2i_fn *)d2i_ASN1_UINT32_DATA,
- (ifree_fn *)ASN1_UINT32_DATA_free
- };
- /***** INT64 *****************************************************************/
- typedef struct {
- ASN1_BOOLEAN success;
- int64_t test_int64;
- int64_t test_zint64;
- } ASN1_INT64_DATA;
- ASN1_SEQUENCE(ASN1_INT64_DATA) = {
- ASN1_SIMPLE(ASN1_INT64_DATA, success, ASN1_BOOLEAN),
- ASN1_EMBED(ASN1_INT64_DATA, test_int64, INT64),
- ASN1_EXP_OPT_EMBED(ASN1_INT64_DATA, test_zint64, ZINT64, 0)
- } static_ASN1_SEQUENCE_END(ASN1_INT64_DATA)
- IMPLEMENT_STATIC_ASN1_ENCODE_FUNCTIONS(ASN1_INT64_DATA)
- IMPLEMENT_STATIC_ASN1_ALLOC_FUNCTIONS(ASN1_INT64_DATA)
- static ASN1_INT64_DATA int64_expected[] = {
- CUSTOM_EXPECTED_SUCCESS(0, 0), /* t_zero */
- CUSTOM_EXPECTED_SUCCESS(ASN1_LONG_UNDEF, ASN1_LONG_UNDEF), /* t_zero */
- CUSTOM_EXPECTED_SUCCESS(1, 1), /* t_one */
- CUSTOM_EXPECTED_SUCCESS(-1, -1), /* t_one_neg */
- CUSTOM_EXPECTED_SUCCESS(-256, -256), /* t_minus_256 */
- CUSTOM_EXPECTED_FAILURE, /* t_9bytes_1 */
- CUSTOM_EXPECTED_FAILURE, /* t_8bytes_1 (too large positive) */
- CUSTOM_EXPECTED_SUCCESS(INT64_MAX, INT64_MAX), /* t_8bytes_2 */
- CUSTOM_EXPECTED_FAILURE, /* t_8bytes_3_pad (illegal padding) */
- CUSTOM_EXPECTED_SUCCESS(INT64_MIN, INT64_MIN), /* t_8bytes_4_neg */
- CUSTOM_EXPECTED_FAILURE, /* t_8bytes_5_negpad (illegal padding) */
- CUSTOM_EXPECTED_SUCCESS(0x1ffffffffULL, 0x1ffffffffULL), /* t_5bytes_1 */
- CUSTOM_EXPECTED_SUCCESS(0x80000000, 0x80000000), /* t_4bytes_1 */
- CUSTOM_EXPECTED_SUCCESS(INT32_MAX - 1, INT32_MAX -1), /* t_4bytes_2 */
- CUSTOM_EXPECTED_FAILURE, /* t_4bytes_3_pad (illegal padding) */
- CUSTOM_EXPECTED_SUCCESS(INT32_MIN, INT32_MIN), /* t_4bytes_4_neg */
- CUSTOM_EXPECTED_FAILURE, /* t_4bytes_5_negpad (illegal padding) */
- };
- static ASN1_INT64_DATA int64_encdec_data[] = {
- ENCDEC_ARRAY(INT64_MAX, INT64_MAX, INT64_MIN, INT64_MIN),
- ENCDEC_ARRAY(INT32_MAX, INT32_MAX, INT32_MIN, INT32_MIN),
- };
- static TEST_PACKAGE int64_test_package = {
- ASN1_ITEM_ref(ASN1_INT64_DATA), "INT64", 0,
- int64_expected, sizeof(int64_expected), sizeof(int64_expected[0]),
- int64_encdec_data, sizeof(int64_encdec_data), sizeof(int64_encdec_data[0]),
- (i2d_fn *)i2d_ASN1_INT64_DATA, (d2i_fn *)d2i_ASN1_INT64_DATA,
- (ifree_fn *)ASN1_INT64_DATA_free
- };
- /***** UINT64 ****************************************************************/
- typedef struct {
- ASN1_BOOLEAN success;
- uint64_t test_uint64;
- uint64_t test_zuint64;
- } ASN1_UINT64_DATA;
- ASN1_SEQUENCE(ASN1_UINT64_DATA) = {
- ASN1_SIMPLE(ASN1_UINT64_DATA, success, ASN1_BOOLEAN),
- ASN1_EMBED(ASN1_UINT64_DATA, test_uint64, UINT64),
- ASN1_EXP_OPT_EMBED(ASN1_UINT64_DATA, test_zuint64, ZUINT64, 0)
- } static_ASN1_SEQUENCE_END(ASN1_UINT64_DATA)
- IMPLEMENT_STATIC_ASN1_ENCODE_FUNCTIONS(ASN1_UINT64_DATA)
- IMPLEMENT_STATIC_ASN1_ALLOC_FUNCTIONS(ASN1_UINT64_DATA)
- static ASN1_UINT64_DATA uint64_expected[] = {
- CUSTOM_EXPECTED_SUCCESS(0, 0), /* t_zero */
- CUSTOM_EXPECTED_SUCCESS(ASN1_LONG_UNDEF, ASN1_LONG_UNDEF), /* t_zero */
- CUSTOM_EXPECTED_SUCCESS(1, 1), /* t_one */
- CUSTOM_EXPECTED_FAILURE, /* t_one_neg (illegal negative value) */
- CUSTOM_EXPECTED_FAILURE, /* t_minus_256 (illegal negative value) */
- CUSTOM_EXPECTED_FAILURE, /* t_9bytes_1 */
- CUSTOM_EXPECTED_SUCCESS((uint64_t)INT64_MAX+1, (uint64_t)INT64_MAX+1),
- /* t_8bytes_1 */
- CUSTOM_EXPECTED_SUCCESS(INT64_MAX, INT64_MAX), /* t_8bytes_2 */
- CUSTOM_EXPECTED_FAILURE, /* t_8bytes_3_pad */
- CUSTOM_EXPECTED_FAILURE, /* t_8bytes_4_neg */
- CUSTOM_EXPECTED_FAILURE, /* t_8bytes_5_negpad */
- CUSTOM_EXPECTED_SUCCESS(0x1ffffffffULL, 0x1ffffffffULL), /* t_5bytes_1 */
- CUSTOM_EXPECTED_SUCCESS(0x80000000, 0x80000000), /* t_4bytes_1 */
- CUSTOM_EXPECTED_SUCCESS(INT32_MAX - 1, INT32_MAX -1), /* t_4bytes_2 */
- CUSTOM_EXPECTED_FAILURE, /* t_4bytes_3_pad (illegal padding) */
- CUSTOM_EXPECTED_FAILURE, /* t_4bytes_4_neg (illegal negative value) */
- CUSTOM_EXPECTED_FAILURE, /* t_4bytes_5_negpad (illegal padding) */
- };
- static ASN1_UINT64_DATA uint64_encdec_data[] = {
- ENCDEC_ARRAY(UINT64_MAX, UINT64_MAX, 0, 0),
- };
- static TEST_PACKAGE uint64_test_package = {
- ASN1_ITEM_ref(ASN1_UINT64_DATA), "UINT64", 0,
- uint64_expected, sizeof(uint64_expected), sizeof(uint64_expected[0]),
- uint64_encdec_data, sizeof(uint64_encdec_data), sizeof(uint64_encdec_data[0]),
- (i2d_fn *)i2d_ASN1_UINT64_DATA, (d2i_fn *)d2i_ASN1_UINT64_DATA,
- (ifree_fn *)ASN1_UINT64_DATA_free
- };
- /***** General testing functions *********************************************/
- /* Template structure to map onto any test data structure */
- typedef struct {
- ASN1_BOOLEAN success;
- unsigned char bytes[1]; /* In reality, there's more */
- } EXPECTED;
- /*
- * do_decode returns a tristate:
- *
- * -1 Couldn't decode
- * 0 decoded structure wasn't what was expected (failure)
- * 1 decoded structure was what was expected (success)
- */
- static int do_decode(unsigned char *bytes, long nbytes,
- const EXPECTED *expected, size_t expected_size,
- const TEST_PACKAGE *package)
- {
- EXPECTED *enctst = NULL;
- const unsigned char *start;
- int ret = 0;
- start = bytes;
- enctst = package->d2i(NULL, &bytes, nbytes);
- if (enctst == NULL) {
- if (expected->success == 0) {
- ret = 1;
- ERR_clear_error();
- } else {
- ret = -1;
- }
- } else {
- if (start + nbytes == bytes
- && memcmp(enctst, expected, expected_size) == 0)
- ret = 1;
- else
- ret = 0;
- }
- package->ifree(enctst);
- return ret;
- }
- /*
- * do_encode returns a tristate:
- *
- * -1 Couldn't encode
- * 0 encoded DER wasn't what was expected (failure)
- * 1 encoded DER was what was expected (success)
- */
- static int do_encode(EXPECTED *input,
- const unsigned char *expected, size_t expected_len,
- const TEST_PACKAGE *package)
- {
- unsigned char *data = NULL;
- int len;
- int ret = 0;
- len = package->i2d(input, &data);
- if (len < 0)
- return -1;
- if ((size_t)len != expected_len
- || memcmp(data, expected, expected_len) != 0) {
- if (input->success == 0) {
- ret = 1;
- ERR_clear_error();
- } else {
- ret = 0;
- }
- } else {
- ret = 1;
- }
- OPENSSL_free(data);
- return ret;
- }
- /* Do an encode/decode round trip */
- static int do_enc_dec(EXPECTED *bytes, long nbytes,
- const TEST_PACKAGE *package)
- {
- unsigned char *data = NULL;
- int len;
- int ret = 0;
- void *p = bytes;
- len = package->i2d(p, &data);
- if (len < 0)
- return -1;
- ret = do_decode(data, len, bytes, nbytes, package);
- OPENSSL_free(data);
- return ret;
- }
- static size_t der_encode_length(size_t len, unsigned char **pp)
- {
- size_t lenbytes;
- OPENSSL_assert(len < 0x8000);
- if (len > 255)
- lenbytes = 3;
- else if (len > 127)
- lenbytes = 2;
- else
- lenbytes = 1;
- if (pp != NULL) {
- if (lenbytes == 1) {
- *(*pp)++ = (unsigned char)len;
- } else {
- *(*pp)++ = (unsigned char)(lenbytes - 1);
- if (lenbytes == 2) {
- *(*pp)++ = (unsigned char)(0x80 | len);
- } else {
- *(*pp)++ = (unsigned char)(0x80 | (len >> 8));
- *(*pp)++ = (unsigned char)(len);
- }
- }
- }
- return lenbytes;
- }
- static size_t make_custom_der(const TEST_CUSTOM_DATA *custom_data,
- unsigned char **encoding, int explicit_default)
- {
- size_t firstbytes, secondbytes = 0, secondbytesinner = 0, seqbytes;
- const unsigned char t_true[] = { V_ASN1_BOOLEAN, 0x01, 0xff };
- unsigned char *p = NULL;
- size_t i;
- /*
- * The first item is just an INTEGER tag, INTEGER length and INTEGER content
- */
- firstbytes =
- 1 + der_encode_length(custom_data->nbytes1, NULL)
- + custom_data->nbytes1;
- for (i = custom_data->nbytes2; i > 0; i--) {
- if (custom_data->bytes2[i - 1] != '\0')
- break;
- }
- if (explicit_default || i > 0) {
- /*
- * The second item is an explicit tag, content length, INTEGER tag,
- * INTEGER length, INTEGER bytes
- */
- secondbytesinner =
- 1 + der_encode_length(custom_data->nbytes2, NULL)
- + custom_data->nbytes2;
- secondbytes =
- 1 + der_encode_length(secondbytesinner, NULL) + secondbytesinner;
- }
- /*
- * The whole sequence is the sequence tag, content length, BOOLEAN true
- * (copied from t_true), the first (firstbytes) and second (secondbytes)
- * items
- */
- seqbytes =
- 1 + der_encode_length(sizeof(t_true) + firstbytes + secondbytes, NULL)
- + sizeof(t_true) + firstbytes + secondbytes;
- *encoding = p = OPENSSL_malloc(seqbytes);
- if (*encoding == NULL)
- return 0;
- /* Sequence tag */
- *p++ = 0x30;
- der_encode_length(sizeof(t_true) + firstbytes + secondbytes, &p);
- /* ASN1_BOOLEAN TRUE */
- memcpy(p, t_true, sizeof(t_true)); /* Marks decoding success */
- p += sizeof(t_true);
- /* First INTEGER item (non-optional) */
- *p++ = V_ASN1_INTEGER;
- der_encode_length(custom_data->nbytes1, &p);
- memcpy(p, custom_data->bytes1, custom_data->nbytes1);
- p += custom_data->nbytes1;
- if (secondbytes > 0) {
- /* Second INTEGER item (optional) */
- /* Start with the explicit optional tag */
- *p++ = 0xa0;
- der_encode_length(secondbytesinner, &p);
- *p++ = V_ASN1_INTEGER;
- der_encode_length(custom_data->nbytes2, &p);
- memcpy(p, custom_data->bytes2, custom_data->nbytes2);
- p += custom_data->nbytes2;
- }
- OPENSSL_assert(seqbytes == (size_t)(p - *encoding));
- return seqbytes;
- }
- /* Attempt to decode a custom encoding of the test structure */
- static int do_decode_custom(const TEST_CUSTOM_DATA *custom_data,
- const EXPECTED *expected, size_t expected_size,
- const TEST_PACKAGE *package)
- {
- unsigned char *encoding = NULL;
- /*
- * We force the defaults to be explicitly encoded to make sure we test
- * for defaults that shouldn't be present (i.e. we check for failure)
- */
- size_t encoding_length = make_custom_der(custom_data, &encoding, 1);
- int ret;
- if (encoding_length == 0)
- return -1;
- ret = do_decode(encoding, encoding_length, expected, expected_size,
- package);
- OPENSSL_free(encoding);
- return ret;
- }
- /* Attempt to encode the test structure and compare it to custom DER */
- static int do_encode_custom(EXPECTED *input,
- const TEST_CUSTOM_DATA *custom_data,
- const TEST_PACKAGE *package)
- {
- unsigned char *expected = NULL;
- size_t expected_length = make_custom_der(custom_data, &expected, 0);
- int ret;
- if (expected_length == 0)
- return -1;
- ret = do_encode(input, expected, expected_length, package);
- OPENSSL_free(expected);
- return ret;
- }
- static int do_print_item(const TEST_PACKAGE *package)
- {
- #define DATA_BUF_SIZE 256
- const ASN1_ITEM *i = ASN1_ITEM_ptr(package->asn1_type);
- ASN1_VALUE *o;
- int ret;
- OPENSSL_assert(package->encode_expectations_elem_size <= DATA_BUF_SIZE);
- if ((o = OPENSSL_malloc(DATA_BUF_SIZE)) == NULL)
- return 0;
- (void)RAND_bytes((unsigned char*)o,
- (int)package->encode_expectations_elem_size);
- ret = ASN1_item_print(bio_err, o, 0, i, NULL);
- OPENSSL_free(o);
- return ret;
- }
- static int test_intern(const TEST_PACKAGE *package)
- {
- unsigned int i;
- size_t nelems;
- int fail = 0;
- if (package->skip)
- return 1;
- /* Do decode_custom checks */
- nelems = package->encode_expectations_size
- / package->encode_expectations_elem_size;
- OPENSSL_assert(nelems ==
- sizeof(test_custom_data) / sizeof(test_custom_data[0]));
- for (i = 0; i < nelems; i++) {
- size_t pos = i * package->encode_expectations_elem_size;
- EXPECTED *expected
- = (EXPECTED *)&((unsigned char *)package->encode_expectations)[pos];
- switch (do_encode_custom(expected, &test_custom_data[i], package)) {
- case -1:
- if (expected->success) {
- TEST_error("Failed custom encode round trip %u of %s",
- i, package->name);
- TEST_openssl_errors();
- fail++;
- }
- break;
- case 0:
- TEST_error("Custom encode round trip %u of %s mismatch",
- i, package->name);
- TEST_openssl_errors();
- fail++;
- break;
- case 1:
- break;
- default:
- OPENSSL_die("do_encode_custom() return unknown value",
- __FILE__, __LINE__);
- }
- switch (do_decode_custom(&test_custom_data[i], expected,
- package->encode_expectations_elem_size,
- package)) {
- case -1:
- if (expected->success) {
- TEST_error("Failed custom decode round trip %u of %s",
- i, package->name);
- TEST_openssl_errors();
- fail++;
- }
- break;
- case 0:
- TEST_error("Custom decode round trip %u of %s mismatch",
- i, package->name);
- TEST_openssl_errors();
- fail++;
- break;
- case 1:
- break;
- default:
- OPENSSL_die("do_decode_custom() return unknown value",
- __FILE__, __LINE__);
- }
- }
- /* Do enc_dec checks */
- nelems = package->encdec_data_size / package->encdec_data_elem_size;
- for (i = 0; i < nelems; i++) {
- size_t pos = i * package->encdec_data_elem_size;
- EXPECTED *expected
- = (EXPECTED *)&((unsigned char *)package->encdec_data)[pos];
- switch (do_enc_dec(expected, package->encdec_data_elem_size, package)) {
- case -1:
- if (expected->success) {
- TEST_error("Failed encode/decode round trip %u of %s",
- i, package->name);
- TEST_openssl_errors();
- fail++;
- }
- break;
- case 0:
- TEST_error("Encode/decode round trip %u of %s mismatch",
- i, package->name);
- fail++;
- break;
- case 1:
- break;
- default:
- OPENSSL_die("do_enc_dec() return unknown value",
- __FILE__, __LINE__);
- }
- }
- if (!do_print_item(package)) {
- TEST_error("Printing of %s failed", package->name);
- TEST_openssl_errors();
- fail++;
- }
- return fail == 0;
- }
- #ifndef OPENSSL_NO_DEPRECATED_3_0
- static int test_long_32bit(void)
- {
- return test_intern(&long_test_package_32bit);
- }
- static int test_long_64bit(void)
- {
- return test_intern(&long_test_package_64bit);
- }
- #endif
- static int test_int32(void)
- {
- return test_intern(&int32_test_package);
- }
- static int test_uint32(void)
- {
- return test_intern(&uint32_test_package);
- }
- static int test_int64(void)
- {
- return test_intern(&int64_test_package);
- }
- static int test_uint64(void)
- {
- return test_intern(&uint64_test_package);
- }
- typedef struct {
- ASN1_STRING *invalidDirString;
- } INVALIDTEMPLATE;
- ASN1_SEQUENCE(INVALIDTEMPLATE) = {
- /*
- * DirectoryString is a CHOICE type so it must use explicit tagging -
- * but we deliberately use implicit here, which makes this template invalid.
- */
- ASN1_IMP(INVALIDTEMPLATE, invalidDirString, DIRECTORYSTRING, 12)
- } static_ASN1_SEQUENCE_END(INVALIDTEMPLATE)
- IMPLEMENT_STATIC_ASN1_ENCODE_FUNCTIONS(INVALIDTEMPLATE)
- IMPLEMENT_STATIC_ASN1_ALLOC_FUNCTIONS(INVALIDTEMPLATE)
- static int test_invalid_template(void)
- {
- INVALIDTEMPLATE *temp = INVALIDTEMPLATE_new();
- int ret;
- if (!TEST_ptr(temp))
- return 0;
- ret = i2d_INVALIDTEMPLATE(temp, NULL);
- INVALIDTEMPLATE_free(temp);
- /* We expect the i2d operation to fail */
- return ret < 0;
- }
- int setup_tests(void)
- {
- #ifndef OPENSSL_NO_DEPRECATED_3_0
- ADD_TEST(test_long_32bit);
- ADD_TEST(test_long_64bit);
- #endif
- ADD_TEST(test_int32);
- ADD_TEST(test_uint32);
- ADD_TEST(test_int64);
- ADD_TEST(test_uint64);
- ADD_TEST(test_invalid_template);
- return 1;
- }
|