]> git.ipfire.org Git - thirdparty/openssl.git/blob - test/cmp_msg_test.c
Copyright year updates
[thirdparty/openssl.git] / test / cmp_msg_test.c
1 /*
2 * Copyright 2007-2023 The OpenSSL Project Authors. All Rights Reserved.
3 * Copyright Nokia 2007-2019
4 * Copyright Siemens AG 2015-2019
5 *
6 * Licensed under the Apache License 2.0 (the "License"). You may not use
7 * this file except in compliance with the License. You can obtain a copy
8 * in the file LICENSE in the source distribution or at
9 * https://www.openssl.org/source/license.html
10 */
11
12 #include "helpers/cmp_testlib.h"
13
14 static const char *newkey_f;
15 static const char *server_cert_f;
16 static const char *pkcs10_f;
17
18 typedef struct test_fixture {
19 const char *test_case_name;
20 OSSL_CMP_CTX *cmp_ctx;
21 /* for msg create tests */
22 int bodytype;
23 int err_code;
24 /* for certConf */
25 int fail_info;
26 /* for protection tests */
27 OSSL_CMP_MSG *msg;
28 int expected;
29 /* for error and response messages */
30 OSSL_CMP_PKISI *si;
31 } CMP_MSG_TEST_FIXTURE;
32
33 static OSSL_LIB_CTX *libctx = NULL;
34 static OSSL_PROVIDER *default_null_provider = NULL, *provider = NULL;
35
36 static unsigned char ref[CMP_TEST_REFVALUE_LENGTH];
37
38 static void tear_down(CMP_MSG_TEST_FIXTURE *fixture)
39 {
40 OSSL_CMP_CTX_free(fixture->cmp_ctx);
41 OSSL_CMP_MSG_free(fixture->msg);
42 OSSL_CMP_PKISI_free(fixture->si);
43 OPENSSL_free(fixture);
44 }
45
46 #define SET_OPT_UNPROTECTED_SEND(ctx, val) \
47 OSSL_CMP_CTX_set_option((ctx), OSSL_CMP_OPT_UNPROTECTED_SEND, (val))
48 static CMP_MSG_TEST_FIXTURE *set_up(const char *const test_case_name)
49 {
50 CMP_MSG_TEST_FIXTURE *fixture;
51
52 if (!TEST_ptr(fixture = OPENSSL_zalloc(sizeof(*fixture))))
53 return NULL;
54 fixture->test_case_name = test_case_name;
55
56 if (!TEST_ptr(fixture->cmp_ctx = OSSL_CMP_CTX_new(libctx, NULL))
57 || !TEST_true(SET_OPT_UNPROTECTED_SEND(fixture->cmp_ctx, 1))
58 || !TEST_true(OSSL_CMP_CTX_set1_referenceValue(fixture->cmp_ctx,
59 ref, sizeof(ref)))) {
60 tear_down(fixture);
61 return NULL;
62 }
63 return fixture;
64 }
65
66 static EVP_PKEY *newkey = NULL;
67 static X509 *cert = NULL;
68
69 #define EXECUTE_MSG_CREATION_TEST(expr) \
70 do { \
71 OSSL_CMP_MSG *msg = NULL; \
72 int good = fixture->expected != 0 ? \
73 TEST_ptr(msg = (expr)) && TEST_true(valid_asn1_encoding(msg)) : \
74 TEST_ptr_null(msg = (expr)); \
75 \
76 OSSL_CMP_MSG_free(msg); \
77 ERR_print_errors_fp(stderr); \
78 return good; \
79 } while (0)
80
81 /*-
82 * The following tests call a cmp message creation function.
83 * if fixture->expected != 0:
84 * returns 1 if the message is created and syntactically correct.
85 * if fixture->expected == 0
86 * returns 1 if message creation returns NULL
87 */
88 static int execute_certreq_create_test(CMP_MSG_TEST_FIXTURE *fixture)
89 {
90 EXECUTE_MSG_CREATION_TEST(ossl_cmp_certreq_new(fixture->cmp_ctx,
91 fixture->bodytype,
92 NULL));
93 }
94
95 static int execute_errormsg_create_test(CMP_MSG_TEST_FIXTURE *fixture)
96 {
97 EXECUTE_MSG_CREATION_TEST(ossl_cmp_error_new(fixture->cmp_ctx, fixture->si,
98 fixture->err_code,
99 "details", 0));
100 }
101
102 static int execute_rr_create_test(CMP_MSG_TEST_FIXTURE *fixture)
103 {
104 EXECUTE_MSG_CREATION_TEST(ossl_cmp_rr_new(fixture->cmp_ctx));
105 }
106
107 static int execute_certconf_create_test(CMP_MSG_TEST_FIXTURE *fixture)
108 {
109 EXECUTE_MSG_CREATION_TEST(ossl_cmp_certConf_new
110 (fixture->cmp_ctx, OSSL_CMP_CERTREQID,
111 fixture->fail_info, NULL));
112 }
113
114 static int execute_genm_create_test(CMP_MSG_TEST_FIXTURE *fixture)
115 {
116 EXECUTE_MSG_CREATION_TEST(ossl_cmp_genm_new(fixture->cmp_ctx));
117 }
118
119 static int execute_pollreq_create_test(CMP_MSG_TEST_FIXTURE *fixture)
120 {
121 EXECUTE_MSG_CREATION_TEST(ossl_cmp_pollReq_new(fixture->cmp_ctx, 4711));
122 }
123
124 static int execute_pkimessage_create_test(CMP_MSG_TEST_FIXTURE *fixture)
125 {
126 EXECUTE_MSG_CREATION_TEST(ossl_cmp_msg_create
127 (fixture->cmp_ctx, fixture->bodytype));
128 }
129
130 static int set1_newPkey(OSSL_CMP_CTX *ctx, EVP_PKEY *pkey)
131 {
132 if (!EVP_PKEY_up_ref(pkey))
133 return 0;
134
135 if (!OSSL_CMP_CTX_set0_newPkey(ctx, 1, pkey)) {
136 EVP_PKEY_free(pkey);
137 return 0;
138 }
139 return 1;
140 }
141
142 static int test_cmp_create_ir_protection_set(void)
143 {
144 OSSL_CMP_CTX *ctx;
145 unsigned char secret[16];
146
147 SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
148
149 ctx = fixture->cmp_ctx;
150 fixture->bodytype = OSSL_CMP_PKIBODY_IR;
151 fixture->err_code = -1;
152 fixture->expected = 1;
153 if (!TEST_int_eq(1, RAND_bytes_ex(libctx, secret, sizeof(secret), 0))
154 || !TEST_true(SET_OPT_UNPROTECTED_SEND(ctx, 0))
155 || !TEST_true(set1_newPkey(ctx, newkey))
156 || !TEST_true(OSSL_CMP_CTX_set1_secretValue(ctx, secret,
157 sizeof(secret)))) {
158 tear_down(fixture);
159 fixture = NULL;
160 }
161 EXECUTE_TEST(execute_certreq_create_test, tear_down);
162 return result;
163 }
164
165 static int test_cmp_create_ir_protection_fails(void)
166 {
167 SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
168 fixture->bodytype = OSSL_CMP_PKIBODY_IR;
169 fixture->err_code = -1;
170 fixture->expected = 0;
171 if (!TEST_true(OSSL_CMP_CTX_set1_pkey(fixture->cmp_ctx, newkey))
172 || !TEST_true(SET_OPT_UNPROTECTED_SEND(fixture->cmp_ctx, 0))
173 /* newkey used by default for signing does not match cert: */
174 || !TEST_true(OSSL_CMP_CTX_set1_cert(fixture->cmp_ctx, cert))) {
175 tear_down(fixture);
176 fixture = NULL;
177 }
178 EXECUTE_TEST(execute_certreq_create_test, tear_down);
179 return result;
180 }
181
182 static int test_cmp_create_cr_without_key(void)
183 {
184 SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
185 fixture->bodytype = OSSL_CMP_PKIBODY_CR;
186 fixture->err_code = -1;
187 fixture->expected = 0;
188 EXECUTE_TEST(execute_certreq_create_test, tear_down);
189 return result;
190 }
191
192 static int test_cmp_create_cr(void)
193 {
194 SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
195 fixture->bodytype = OSSL_CMP_PKIBODY_CR;
196 fixture->err_code = -1;
197 fixture->expected = 1;
198 if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) {
199 tear_down(fixture);
200 fixture = NULL;
201 }
202 EXECUTE_TEST(execute_certreq_create_test, tear_down);
203 return result;
204 }
205
206 static int test_cmp_create_certreq_with_invalid_bodytype(void)
207 {
208 SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
209 fixture->bodytype = OSSL_CMP_PKIBODY_RR;
210 fixture->err_code = -1;
211 fixture->expected = 0;
212 if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) {
213 tear_down(fixture);
214 fixture = NULL;
215 }
216 EXECUTE_TEST(execute_certreq_create_test, tear_down);
217 return result;
218 }
219
220 static int test_cmp_create_p10cr(void)
221 {
222 OSSL_CMP_CTX *ctx;
223 X509_REQ *p10cr = NULL;
224
225 SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
226 ctx = fixture->cmp_ctx;
227 fixture->bodytype = OSSL_CMP_PKIBODY_P10CR;
228 fixture->err_code = CMP_R_ERROR_CREATING_CERTREQ;
229 fixture->expected = 1;
230 if (!TEST_ptr(p10cr = load_csr_der(pkcs10_f, libctx))
231 || !TEST_true(set1_newPkey(ctx, newkey))
232 || !TEST_true(OSSL_CMP_CTX_set1_p10CSR(ctx, p10cr))) {
233 tear_down(fixture);
234 fixture = NULL;
235 }
236 X509_REQ_free(p10cr);
237 EXECUTE_TEST(execute_certreq_create_test, tear_down);
238 return result;
239 }
240
241 static int test_cmp_create_p10cr_null(void)
242 {
243 SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
244 fixture->bodytype = OSSL_CMP_PKIBODY_P10CR;
245 fixture->err_code = CMP_R_ERROR_CREATING_CERTREQ;
246 fixture->expected = 0;
247 if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) {
248 tear_down(fixture);
249 fixture = NULL;
250 }
251 EXECUTE_TEST(execute_certreq_create_test, tear_down);
252 return result;
253 }
254
255 static int test_cmp_create_kur(void)
256 {
257 SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
258 fixture->bodytype = OSSL_CMP_PKIBODY_KUR;
259 fixture->err_code = -1;
260 fixture->expected = 1;
261 if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))
262 || !TEST_true(OSSL_CMP_CTX_set1_oldCert(fixture->cmp_ctx, cert))) {
263 tear_down(fixture);
264 fixture = NULL;
265 }
266 EXECUTE_TEST(execute_certreq_create_test, tear_down);
267 return result;
268 }
269
270 static int test_cmp_create_kur_without_oldcert(void)
271 {
272 SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
273 fixture->bodytype = OSSL_CMP_PKIBODY_KUR;
274 fixture->err_code = -1;
275 fixture->expected = 0;
276 if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) {
277 tear_down(fixture);
278 fixture = NULL;
279 }
280 EXECUTE_TEST(execute_certreq_create_test, tear_down);
281 return result;
282 }
283
284 static int test_cmp_create_certconf(void)
285 {
286 SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
287 fixture->fail_info = 0;
288 fixture->expected = 1;
289 if (!TEST_true(ossl_cmp_ctx_set0_newCert(fixture->cmp_ctx,
290 X509_dup(cert)))) {
291 tear_down(fixture);
292 fixture = NULL;
293 }
294 EXECUTE_TEST(execute_certconf_create_test, tear_down);
295 return result;
296 }
297
298 static int test_cmp_create_certconf_badAlg(void)
299 {
300 SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
301 fixture->fail_info = 1 << OSSL_CMP_PKIFAILUREINFO_badAlg;
302 fixture->expected = 1;
303 if (!TEST_true(ossl_cmp_ctx_set0_newCert(fixture->cmp_ctx,
304 X509_dup(cert)))) {
305 tear_down(fixture);
306 fixture = NULL;
307 }
308 EXECUTE_TEST(execute_certconf_create_test, tear_down);
309 return result;
310 }
311
312 static int test_cmp_create_certconf_fail_info_max(void)
313 {
314 SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
315 fixture->fail_info = 1 << OSSL_CMP_PKIFAILUREINFO_MAX;
316 fixture->expected = 1;
317 if (!TEST_true(ossl_cmp_ctx_set0_newCert(fixture->cmp_ctx,
318 X509_dup(cert)))) {
319 tear_down(fixture);
320 fixture = NULL;
321 }
322 EXECUTE_TEST(execute_certconf_create_test, tear_down);
323 return result;
324 }
325
326 static int test_cmp_create_error_msg(void)
327 {
328 SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
329 fixture->si = OSSL_CMP_STATUSINFO_new(OSSL_CMP_PKISTATUS_rejection,
330 OSSL_CMP_PKIFAILUREINFO_systemFailure,
331 NULL);
332 fixture->err_code = -1;
333 fixture->expected = 1; /* expected: message creation is successful */
334 if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) {
335 tear_down(fixture);
336 fixture = NULL;
337 }
338 EXECUTE_TEST(execute_errormsg_create_test, tear_down);
339 return result;
340 }
341
342 static int test_cmp_create_pollreq(void)
343 {
344 SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
345 fixture->expected = 1;
346 EXECUTE_TEST(execute_pollreq_create_test, tear_down);
347 return result;
348 }
349
350 static int test_cmp_create_rr(void)
351 {
352 SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
353 fixture->expected = 1;
354 if (!TEST_true(OSSL_CMP_CTX_set1_oldCert(fixture->cmp_ctx, cert))) {
355 tear_down(fixture);
356 fixture = NULL;
357 }
358 EXECUTE_TEST(execute_rr_create_test, tear_down);
359 return result;
360 }
361
362 static int test_cmp_create_genm(void)
363 {
364 OSSL_CMP_ITAV *iv = NULL;
365
366 SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
367 fixture->expected = 1;
368 iv = OSSL_CMP_ITAV_create(OBJ_nid2obj(NID_id_it_implicitConfirm), NULL);
369 if (!TEST_ptr(iv)
370 || !TEST_true(OSSL_CMP_CTX_push0_genm_ITAV(fixture->cmp_ctx, iv))) {
371 OSSL_CMP_ITAV_free(iv);
372 tear_down(fixture);
373 fixture = NULL;
374 }
375
376 EXECUTE_TEST(execute_genm_create_test, tear_down);
377 return result;
378 }
379
380 static int execute_certrep_create(CMP_MSG_TEST_FIXTURE *fixture)
381 {
382 OSSL_CMP_CTX *ctx = fixture->cmp_ctx;
383 OSSL_CMP_CERTREPMESSAGE *crepmsg = OSSL_CMP_CERTREPMESSAGE_new();
384 OSSL_CMP_CERTRESPONSE *read_cresp, *cresp = OSSL_CMP_CERTRESPONSE_new();
385 X509 *certfromresp = NULL;
386 int res = 0;
387
388 if (crepmsg == NULL || cresp == NULL)
389 goto err;
390 if (!ASN1_INTEGER_set(cresp->certReqId, 99))
391 goto err;
392 if ((cresp->certifiedKeyPair = OSSL_CMP_CERTIFIEDKEYPAIR_new()) == NULL)
393 goto err;
394 cresp->certifiedKeyPair->certOrEncCert->type =
395 OSSL_CMP_CERTORENCCERT_CERTIFICATE;
396 if ((cresp->certifiedKeyPair->certOrEncCert->value.certificate =
397 X509_dup(cert)) == NULL
398 || !sk_OSSL_CMP_CERTRESPONSE_push(crepmsg->response, cresp))
399 goto err;
400 cresp = NULL;
401 read_cresp = ossl_cmp_certrepmessage_get0_certresponse(crepmsg, 99);
402 if (!TEST_ptr(read_cresp))
403 goto err;
404 if (!TEST_ptr_null(ossl_cmp_certrepmessage_get0_certresponse(crepmsg, 88)))
405 goto err;
406 certfromresp = ossl_cmp_certresponse_get1_cert(ctx, read_cresp);
407 if (certfromresp == NULL || !TEST_int_eq(X509_cmp(cert, certfromresp), 0))
408 goto err;
409
410 res = 1;
411 err:
412 X509_free(certfromresp);
413 OSSL_CMP_CERTRESPONSE_free(cresp);
414 OSSL_CMP_CERTREPMESSAGE_free(crepmsg);
415 return res;
416 }
417
418 static int test_cmp_create_certrep(void)
419 {
420 SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
421 EXECUTE_TEST(execute_certrep_create, tear_down);
422 return result;
423 }
424
425 static int execute_rp_create(CMP_MSG_TEST_FIXTURE *fixture)
426 {
427 OSSL_CMP_PKISI *si = OSSL_CMP_STATUSINFO_new(33, 44, "a text");
428 X509_NAME *issuer = X509_NAME_new();
429 ASN1_INTEGER *serial = ASN1_INTEGER_new();
430 OSSL_CRMF_CERTID *cid = NULL;
431 OSSL_CMP_MSG *rpmsg = NULL;
432 int res = 0;
433
434 if (si == NULL || issuer == NULL || serial == NULL)
435 goto err;
436
437 if (!X509_NAME_add_entry_by_txt(issuer, "CN", MBSTRING_ASC,
438 (unsigned char *)"The Issuer", -1, -1, 0)
439 || !ASN1_INTEGER_set(serial, 99)
440 || (cid = OSSL_CRMF_CERTID_gen(issuer, serial)) == NULL
441 || (rpmsg = ossl_cmp_rp_new(fixture->cmp_ctx, si, cid, 1)) == NULL)
442 goto err;
443
444 if (!TEST_ptr(ossl_cmp_revrepcontent_get_CertId(rpmsg->body->value.rp, 0)))
445 goto err;
446
447 if (!TEST_ptr(ossl_cmp_revrepcontent_get_pkisi(rpmsg->body->value.rp, 0)))
448 goto err;
449
450 res = 1;
451 err:
452 ASN1_INTEGER_free(serial);
453 X509_NAME_free(issuer);
454 OSSL_CRMF_CERTID_free(cid);
455 OSSL_CMP_PKISI_free(si);
456 OSSL_CMP_MSG_free(rpmsg);
457 return res;
458 }
459
460 static int test_cmp_create_rp(void)
461 {
462 SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
463 EXECUTE_TEST(execute_rp_create, tear_down);
464 return result;
465 }
466
467 static int execute_pollrep_create(CMP_MSG_TEST_FIXTURE *fixture)
468 {
469 OSSL_CMP_MSG *pollrep;
470 int res = 0;
471
472 pollrep = ossl_cmp_pollRep_new(fixture->cmp_ctx, 77, 2000);
473 if (!TEST_ptr(pollrep))
474 return 0;
475 if (!TEST_ptr(ossl_cmp_pollrepcontent_get0_pollrep(pollrep->body->
476 value.pollRep, 77)))
477 goto err;
478 if (!TEST_ptr_null(ossl_cmp_pollrepcontent_get0_pollrep(pollrep->body->
479 value.pollRep, 88)))
480 goto err;
481
482 res = 1;
483 err:
484 OSSL_CMP_MSG_free(pollrep);
485 return res;
486 }
487
488 static int test_cmp_create_pollrep(void)
489 {
490 SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
491 EXECUTE_TEST(execute_pollrep_create, tear_down);
492 return result;
493 }
494
495 static int test_cmp_pkimessage_create(int bodytype)
496 {
497 X509_REQ *p10cr = NULL;
498
499 SETUP_TEST_FIXTURE(CMP_MSG_TEST_FIXTURE, set_up);
500
501 switch (fixture->bodytype = bodytype) {
502 case OSSL_CMP_PKIBODY_P10CR:
503 fixture->expected = 1;
504 p10cr = load_csr_der(pkcs10_f, libctx);
505 if (!TEST_true(OSSL_CMP_CTX_set1_p10CSR(fixture->cmp_ctx, p10cr))) {
506 tear_down(fixture);
507 fixture = NULL;
508 }
509 X509_REQ_free(p10cr);
510 break;
511 case OSSL_CMP_PKIBODY_IR:
512 case OSSL_CMP_PKIBODY_IP:
513 case OSSL_CMP_PKIBODY_CR:
514 case OSSL_CMP_PKIBODY_CP:
515 case OSSL_CMP_PKIBODY_KUR:
516 case OSSL_CMP_PKIBODY_KUP:
517 case OSSL_CMP_PKIBODY_RR:
518 case OSSL_CMP_PKIBODY_RP:
519 case OSSL_CMP_PKIBODY_PKICONF:
520 case OSSL_CMP_PKIBODY_GENM:
521 case OSSL_CMP_PKIBODY_GENP:
522 case OSSL_CMP_PKIBODY_ERROR:
523 case OSSL_CMP_PKIBODY_CERTCONF:
524 case OSSL_CMP_PKIBODY_POLLREQ:
525 case OSSL_CMP_PKIBODY_POLLREP:
526 fixture->expected = 1;
527 break;
528 default:
529 fixture->expected = 0;
530 break;
531 }
532
533 EXECUTE_TEST(execute_pkimessage_create_test, tear_down);
534 return result;
535 }
536
537 void cleanup_tests(void)
538 {
539 EVP_PKEY_free(newkey);
540 X509_free(cert);
541 OSSL_PROVIDER_unload(default_null_provider);
542 OSSL_PROVIDER_unload(provider);
543 OSSL_LIB_CTX_free(libctx);
544 }
545
546 #define USAGE "new.key server.crt pkcs10.der module_name [module_conf_file]\n"
547 OPT_TEST_DECLARE_USAGE(USAGE)
548
549 int setup_tests(void)
550 {
551 if (!test_skip_common_options()) {
552 TEST_error("Error parsing test options\n");
553 return 0;
554 }
555
556 if (!TEST_ptr(newkey_f = test_get_argument(0))
557 || !TEST_ptr(server_cert_f = test_get_argument(1))
558 || !TEST_ptr(pkcs10_f = test_get_argument(2))) {
559 TEST_error("usage: cmp_msg_test %s", USAGE);
560 return 0;
561 }
562
563 if (!test_arg_libctx(&libctx, &default_null_provider, &provider, 3, USAGE))
564 return 0;
565
566 if (!TEST_ptr(newkey = load_pkey_pem(newkey_f, libctx))
567 || !TEST_ptr(cert = load_cert_pem(server_cert_f, libctx))
568 || !TEST_int_eq(1, RAND_bytes_ex(libctx, ref, sizeof(ref), 0))) {
569 cleanup_tests();
570 return 0;
571 }
572
573 /* Message creation tests */
574 ADD_TEST(test_cmp_create_certreq_with_invalid_bodytype);
575 ADD_TEST(test_cmp_create_ir_protection_fails);
576 ADD_TEST(test_cmp_create_ir_protection_set);
577 ADD_TEST(test_cmp_create_error_msg);
578 ADD_TEST(test_cmp_create_certconf);
579 ADD_TEST(test_cmp_create_certconf_badAlg);
580 ADD_TEST(test_cmp_create_certconf_fail_info_max);
581 ADD_TEST(test_cmp_create_kur);
582 ADD_TEST(test_cmp_create_kur_without_oldcert);
583 ADD_TEST(test_cmp_create_cr);
584 ADD_TEST(test_cmp_create_cr_without_key);
585 ADD_TEST(test_cmp_create_p10cr);
586 ADD_TEST(test_cmp_create_p10cr_null);
587 ADD_TEST(test_cmp_create_pollreq);
588 ADD_TEST(test_cmp_create_rr);
589 ADD_TEST(test_cmp_create_rp);
590 ADD_TEST(test_cmp_create_genm);
591 ADD_TEST(test_cmp_create_certrep);
592 ADD_TEST(test_cmp_create_pollrep);
593 ADD_ALL_TESTS_NOSUBTEST(test_cmp_pkimessage_create,
594 OSSL_CMP_PKIBODY_POLLREP + 1);
595 return 1;
596 }