]> git.ipfire.org Git - thirdparty/openssl.git/blob - test/recipes/91-test_pkey_check.t
threads_pthread.c: change inline to ossl_inline
[thirdparty/openssl.git] / test / recipes / 91-test_pkey_check.t
1 #! /usr/bin/env perl
2 # Copyright 2017-2024 The OpenSSL Project Authors. All Rights Reserved.
3 #
4 # Licensed under the Apache License 2.0 (the "License"). You may not use
5 # this file except in compliance with the License. You can obtain a copy
6 # in the file LICENSE in the source distribution or at
7 # https://www.openssl.org/source/license.html
8
9
10 use strict;
11 use warnings;
12
13 use File::Spec;
14 use OpenSSL::Test qw/:DEFAULT data_file with/;
15 use OpenSSL::Test::Utils;
16
17 sub pkey_check {
18 my $f = shift;
19 my $pubcheck = shift;
20 my @checkopt = ('-check');
21
22 @checkopt = ('-pubcheck', '-pubin') if $pubcheck;
23
24 return run(app(['openssl', 'pkey', @checkopt, '-text',
25 '-in', $f]));
26 }
27
28 sub check_key {
29 my $f = shift;
30 my $should_fail = shift;
31 my $pubcheck = shift;
32 my $str;
33
34
35 $str = "$f should fail validation" if $should_fail;
36 $str = "$f should pass validation" unless $should_fail;
37
38 $f = data_file($f);
39
40 if ( -s $f ) {
41 with({ exit_checker => sub { return shift == $should_fail; } },
42 sub {
43 ok(pkey_check($f, $pubcheck), $str);
44 });
45 } else {
46 fail("Missing file $f");
47 }
48 }
49
50 setup("test_pkey_check");
51
52 my @negative_tests = ();
53
54 push(@negative_tests, (
55 # For EC keys the range for the secret scalar `k` is `1 <= k <= n-1`
56 "ec_p256_bad_0.pem", # `k` set to `n` (equivalent to `0 mod n`, invalid)
57 "ec_p256_bad_1.pem", # `k` set to `n+1` (equivalent to `1 mod n`, invalid)
58 )) unless disabled("ec");
59
60 push(@negative_tests, (
61 # For SM2 keys the range for the secret scalar `k` is `1 <= k < n-1`
62 "sm2_bad_neg1.pem", # `k` set to `n-1` (invalid, because SM2 range)
63 "sm2_bad_0.pem", # `k` set to `n` (equivalent to `0 mod n`, invalid)
64 "sm2_bad_1.pem", # `k` set to `n+1` (equivalent to `1 mod n`, invalid)
65 )) unless disabled("sm2");
66
67 my @positive_tests = ();
68
69 push(@positive_tests, (
70 "dhpkey.pem"
71 )) unless disabled("dh");
72
73 my @negative_pubtests = ("rsapub_17k.pem"); # Too big RSA public key
74
75 push(@negative_pubtests, (
76 "dsapub_noparam.der"
77 )) unless disabled("dsa");
78
79 my @positive_pubtests = ();
80
81 push(@positive_pubtests, (
82 "dsapub.pem"
83 )) unless disabled("dsa");
84
85 plan skip_all => "No tests within the current enabled feature set"
86 unless @negative_tests && @positive_tests
87 && @negative_pubtests && @positive_pubtests;
88
89 plan tests => scalar(@negative_tests) + scalar(@positive_tests)
90 + scalar(@negative_pubtests) + scalar(@positive_pubtests);
91
92 foreach my $t (@negative_tests) {
93 check_key($t, 1, 0);
94 }
95
96 foreach my $t (@positive_tests) {
97 check_key($t, 0, 0);
98 }
99
100 foreach my $t (@negative_pubtests) {
101 check_key($t, 1, 1);
102 }
103
104 foreach my $t (@positive_pubtests) {
105 check_key($t, 0, 1);
106 }