123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276 |
- /*
- * Copyright 1999-2023 The OpenSSL Project Authors. All Rights Reserved.
- *
- * Licensed under the Apache License 2.0 (the "License"). You may not use
- * this file except in compliance with the License. You can obtain a copy
- * in the file LICENSE in the source distribution or at
- * https://www.openssl.org/source/license.html
- */
- /* Internal tests for the asn1 module */
- /*
- * RSA low level APIs are deprecated for public use, but still ok for
- * internal use.
- */
- #include "internal/deprecated.h"
- #include <stdio.h>
- #include <string.h>
- #include <openssl/asn1.h>
- #include <openssl/evp.h>
- #include <openssl/objects.h>
- #include "testutil.h"
- #include "internal/nelem.h"
- /**********************************************************************
- *
- * Test of a_strnid's tbl_standard
- *
- ***/
- #include "../crypto/asn1/tbl_standard.h"
- static int test_tbl_standard(void)
- {
- const ASN1_STRING_TABLE *tmp;
- int last_nid = -1;
- size_t i;
- for (tmp = tbl_standard, i = 0; i < OSSL_NELEM(tbl_standard); i++, tmp++) {
- if (tmp->nid < last_nid) {
- last_nid = 0;
- break;
- }
- last_nid = tmp->nid;
- }
- if (TEST_int_ne(last_nid, 0)) {
- TEST_info("asn1 tbl_standard: Table order OK");
- return 1;
- }
- TEST_info("asn1 tbl_standard: out of order");
- for (tmp = tbl_standard, i = 0; i < OSSL_NELEM(tbl_standard); i++, tmp++)
- TEST_note("asn1 tbl_standard: Index %zu, NID %d, Name=%s",
- i, tmp->nid, OBJ_nid2ln(tmp->nid));
- return 0;
- }
- /**********************************************************************
- *
- * Test of ameth_lib's standard_methods
- *
- ***/
- #include "crypto/asn1.h"
- #include "../crypto/asn1/standard_methods.h"
- static int test_standard_methods(void)
- {
- const EVP_PKEY_ASN1_METHOD **tmp;
- int last_pkey_id = -1;
- size_t i;
- int ok = 1;
- for (tmp = standard_methods, i = 0; i < OSSL_NELEM(standard_methods);
- i++, tmp++) {
- if ((*tmp)->pkey_id < last_pkey_id) {
- last_pkey_id = 0;
- break;
- }
- last_pkey_id = (*tmp)->pkey_id;
- /*
- * One of the following must be true:
- *
- * pem_str == NULL AND ASN1_PKEY_ALIAS is set
- * pem_str != NULL AND ASN1_PKEY_ALIAS is clear
- *
- * Anything else is an error and may lead to a corrupt ASN1 method table
- */
- if (!TEST_true(((*tmp)->pem_str == NULL && ((*tmp)->pkey_flags & ASN1_PKEY_ALIAS) != 0)
- || ((*tmp)->pem_str != NULL && ((*tmp)->pkey_flags & ASN1_PKEY_ALIAS) == 0))) {
- TEST_note("asn1 standard methods: Index %zu, pkey ID %d, Name=%s",
- i, (*tmp)->pkey_id, OBJ_nid2sn((*tmp)->pkey_id));
- ok = 0;
- }
- }
- if (TEST_int_ne(last_pkey_id, 0)) {
- TEST_info("asn1 standard methods: Table order OK");
- return ok;
- }
- TEST_note("asn1 standard methods: out of order");
- for (tmp = standard_methods, i = 0; i < OSSL_NELEM(standard_methods);
- i++, tmp++)
- TEST_note("asn1 standard methods: Index %zu, pkey ID %d, Name=%s",
- i, (*tmp)->pkey_id, OBJ_nid2sn((*tmp)->pkey_id));
- return 0;
- }
- /**********************************************************************
- *
- * Test of that i2d fail on non-existing non-optional items
- *
- ***/
- #include <openssl/rsa.h>
- static int test_empty_nonoptional_content(void)
- {
- RSA *rsa = NULL;
- BIGNUM *n = NULL;
- BIGNUM *e = NULL;
- int ok = 0;
- if (!TEST_ptr(rsa = RSA_new())
- || !TEST_ptr(n = BN_new())
- || !TEST_ptr(e = BN_new())
- || !TEST_true(RSA_set0_key(rsa, n, e, NULL)))
- goto end;
- n = e = NULL; /* They are now "owned" by |rsa| */
- /*
- * This SHOULD fail, as we're trying to encode a public key as a private
- * key. The private key bits MUST be present for a proper RSAPrivateKey.
- */
- if (TEST_int_le(i2d_RSAPrivateKey(rsa, NULL), 0))
- ok = 1;
- end:
- RSA_free(rsa);
- BN_free(n);
- BN_free(e);
- return ok;
- }
- /**********************************************************************
- *
- * Tests of the Unicode code point range
- *
- ***/
- static int test_unicode(const unsigned char *univ, size_t len, int expected)
- {
- const unsigned char *end = univ + len;
- int ok = 1;
- for (; univ < end; univ += 4) {
- if (!TEST_int_eq(ASN1_mbstring_copy(NULL, univ, 4, MBSTRING_UNIV,
- B_ASN1_UTF8STRING),
- expected))
- ok = 0;
- }
- return ok;
- }
- static int test_unicode_range(void)
- {
- const unsigned char univ_ok[] = "\0\0\0\0"
- "\0\0\xd7\xff"
- "\0\0\xe0\x00"
- "\0\x10\xff\xff";
- const unsigned char univ_bad[] = "\0\0\xd8\x00"
- "\0\0\xdf\xff"
- "\0\x11\x00\x00"
- "\x80\x00\x00\x00"
- "\xff\xff\xff\xff";
- int ok = 1;
- if (!test_unicode(univ_ok, sizeof univ_ok - 1, V_ASN1_UTF8STRING))
- ok = 0;
- if (!test_unicode(univ_bad, sizeof univ_bad - 1, -1))
- ok = 0;
- return ok;
- }
- /**********************************************************************
- *
- * Tests of object creation
- *
- ***/
- static int test_obj_create_once(const char *oid, const char *sn, const char *ln)
- {
- int nid;
- ERR_set_mark();
- nid = OBJ_create(oid, sn, ln);
- if (nid == NID_undef) {
- unsigned long err = ERR_peek_last_error();
- int l = ERR_GET_LIB(err);
- int r = ERR_GET_REASON(err);
- /* If it exists, that's fine, otherwise not */
- if (l != ERR_LIB_OBJ || r != OBJ_R_OID_EXISTS) {
- ERR_clear_last_mark();
- return 0;
- }
- }
- ERR_pop_to_mark();
- return 1;
- }
- static int test_obj_create(void)
- {
- /* Stolen from evp_extra_test.c */
- #define arc "1.3.6.1.4.1.16604.998866."
- #define broken_arc "25."
- #define sn_prefix "custom"
- #define ln_prefix "custom"
- /* Try different combinations of correct object creation */
- if (!TEST_true(test_obj_create_once(NULL, sn_prefix "1", NULL))
- || !TEST_int_ne(OBJ_sn2nid(sn_prefix "1"), NID_undef)
- || !TEST_true(test_obj_create_once(NULL, NULL, ln_prefix "2"))
- || !TEST_int_ne(OBJ_ln2nid(ln_prefix "2"), NID_undef)
- || !TEST_true(test_obj_create_once(NULL, sn_prefix "3", ln_prefix "3"))
- || !TEST_int_ne(OBJ_sn2nid(sn_prefix "3"), NID_undef)
- || !TEST_int_ne(OBJ_ln2nid(ln_prefix "3"), NID_undef)
- || !TEST_true(test_obj_create_once(arc "4", NULL, NULL))
- || !TEST_true(test_obj_create_once(arc "5", sn_prefix "5", NULL))
- || !TEST_int_ne(OBJ_sn2nid(sn_prefix "5"), NID_undef)
- || !TEST_true(test_obj_create_once(arc "6", NULL, ln_prefix "6"))
- || !TEST_int_ne(OBJ_ln2nid(ln_prefix "6"), NID_undef)
- || !TEST_true(test_obj_create_once(arc "7",
- sn_prefix "7", ln_prefix "7"))
- || !TEST_int_ne(OBJ_sn2nid(sn_prefix "7"), NID_undef)
- || !TEST_int_ne(OBJ_ln2nid(ln_prefix "7"), NID_undef))
- return 0;
- if (!TEST_false(test_obj_create_once(NULL, NULL, NULL))
- || !TEST_false(test_obj_create_once(broken_arc "8",
- sn_prefix "8", ln_prefix "8")))
- return 0;
- return 1;
- }
- static int test_obj_nid_undef(void)
- {
- if (!TEST_ptr(OBJ_nid2obj(NID_undef))
- || !TEST_ptr(OBJ_nid2sn(NID_undef))
- || !TEST_ptr(OBJ_nid2ln(NID_undef)))
- return 0;
- return 1;
- }
- int setup_tests(void)
- {
- ADD_TEST(test_tbl_standard);
- ADD_TEST(test_standard_methods);
- ADD_TEST(test_empty_nonoptional_content);
- ADD_TEST(test_unicode_range);
- ADD_TEST(test_obj_create);
- ADD_TEST(test_obj_nid_undef);
- return 1;
- }
|