]>
Commit | Line | Data |
---|---|---|
2c166171 | 1 | /* |
da1c088f | 2 | * Copyright 1999-2023 The OpenSSL Project Authors. All Rights Reserved. |
2c166171 | 3 | * |
909f1a2e | 4 | * Licensed under the Apache License 2.0 (the "License"). You may not use |
2c166171 RL |
5 | * this file except in compliance with the License. You can obtain a copy |
6 | * in the file LICENSE in the source distribution or at | |
7 | * https://www.openssl.org/source/license.html | |
8 | */ | |
9 | ||
10 | /* Internal tests for the asn1 module */ | |
11 | ||
2296cc34 RL |
12 | /* |
13 | * RSA low level APIs are deprecated for public use, but still ok for | |
14 | * internal use. | |
15 | */ | |
16 | #include "internal/deprecated.h" | |
17 | ||
2c166171 RL |
18 | #include <stdio.h> |
19 | #include <string.h> | |
20 | ||
21 | #include <openssl/asn1.h> | |
22 | #include <openssl/evp.h> | |
23 | #include <openssl/objects.h> | |
24 | #include "testutil.h" | |
176db6dc | 25 | #include "internal/nelem.h" |
2c166171 | 26 | |
2c166171 RL |
27 | /********************************************************************** |
28 | * | |
29 | * Test of a_strnid's tbl_standard | |
30 | * | |
31 | ***/ | |
32 | ||
2c166171 RL |
33 | #include "../crypto/asn1/tbl_standard.h" |
34 | ||
899e62d1 | 35 | static int test_tbl_standard(void) |
2c166171 RL |
36 | { |
37 | const ASN1_STRING_TABLE *tmp; | |
38 | int last_nid = -1; | |
39 | size_t i; | |
40 | ||
41 | for (tmp = tbl_standard, i = 0; i < OSSL_NELEM(tbl_standard); i++, tmp++) { | |
42 | if (tmp->nid < last_nid) { | |
43 | last_nid = 0; | |
44 | break; | |
45 | } | |
46 | last_nid = tmp->nid; | |
47 | } | |
48 | ||
8fe3127c P |
49 | if (TEST_int_ne(last_nid, 0)) { |
50 | TEST_info("asn1 tbl_standard: Table order OK"); | |
2c166171 RL |
51 | return 1; |
52 | } | |
53 | ||
a7b68c5b | 54 | TEST_info("asn1 tbl_standard: out of order"); |
2c166171 | 55 | for (tmp = tbl_standard, i = 0; i < OSSL_NELEM(tbl_standard); i++, tmp++) |
a7b68c5b | 56 | TEST_note("asn1 tbl_standard: Index %zu, NID %d, Name=%s", |
8fe3127c | 57 | i, tmp->nid, OBJ_nid2ln(tmp->nid)); |
2c166171 RL |
58 | |
59 | return 0; | |
60 | } | |
61 | ||
2c166171 RL |
62 | /********************************************************************** |
63 | * | |
64 | * Test of ameth_lib's standard_methods | |
65 | * | |
66 | ***/ | |
67 | ||
25f2138b | 68 | #include "crypto/asn1.h" |
2c166171 RL |
69 | #include "../crypto/asn1/standard_methods.h" |
70 | ||
899e62d1 | 71 | static int test_standard_methods(void) |
2c166171 RL |
72 | { |
73 | const EVP_PKEY_ASN1_METHOD **tmp; | |
74 | int last_pkey_id = -1; | |
75 | size_t i; | |
38eca7fe | 76 | int ok = 1; |
2c166171 RL |
77 | |
78 | for (tmp = standard_methods, i = 0; i < OSSL_NELEM(standard_methods); | |
79 | i++, tmp++) { | |
80 | if ((*tmp)->pkey_id < last_pkey_id) { | |
81 | last_pkey_id = 0; | |
82 | break; | |
83 | } | |
84 | last_pkey_id = (*tmp)->pkey_id; | |
38eca7fe RL |
85 | |
86 | /* | |
87 | * One of the following must be true: | |
88 | * | |
89 | * pem_str == NULL AND ASN1_PKEY_ALIAS is set | |
90 | * pem_str != NULL AND ASN1_PKEY_ALIAS is clear | |
91 | * | |
92 | * Anything else is an error and may lead to a corrupt ASN1 method table | |
93 | */ | |
08076910 DMSP |
94 | if (!TEST_true(((*tmp)->pem_str == NULL && ((*tmp)->pkey_flags & ASN1_PKEY_ALIAS) != 0) |
95 | || ((*tmp)->pem_str != NULL && ((*tmp)->pkey_flags & ASN1_PKEY_ALIAS) == 0))) { | |
38eca7fe RL |
96 | TEST_note("asn1 standard methods: Index %zu, pkey ID %d, Name=%s", |
97 | i, (*tmp)->pkey_id, OBJ_nid2sn((*tmp)->pkey_id)); | |
98 | ok = 0; | |
99 | } | |
2c166171 RL |
100 | } |
101 | ||
8fe3127c P |
102 | if (TEST_int_ne(last_pkey_id, 0)) { |
103 | TEST_info("asn1 standard methods: Table order OK"); | |
38eca7fe | 104 | return ok; |
2c166171 RL |
105 | } |
106 | ||
a7b68c5b | 107 | TEST_note("asn1 standard methods: out of order"); |
2c166171 RL |
108 | for (tmp = standard_methods, i = 0; i < OSSL_NELEM(standard_methods); |
109 | i++, tmp++) | |
a7b68c5b P |
110 | TEST_note("asn1 standard methods: Index %zu, pkey ID %d, Name=%s", |
111 | i, (*tmp)->pkey_id, OBJ_nid2sn((*tmp)->pkey_id)); | |
2c166171 RL |
112 | |
113 | return 0; | |
114 | } | |
115 | ||
2296cc34 RL |
116 | /********************************************************************** |
117 | * | |
118 | * Test of that i2d fail on non-existing non-optional items | |
119 | * | |
120 | ***/ | |
121 | ||
122 | #include <openssl/rsa.h> | |
123 | ||
124 | static int test_empty_nonoptional_content(void) | |
125 | { | |
126 | RSA *rsa = NULL; | |
127 | BIGNUM *n = NULL; | |
128 | BIGNUM *e = NULL; | |
129 | int ok = 0; | |
130 | ||
131 | if (!TEST_ptr(rsa = RSA_new()) | |
132 | || !TEST_ptr(n = BN_new()) | |
133 | || !TEST_ptr(e = BN_new()) | |
134 | || !TEST_true(RSA_set0_key(rsa, n, e, NULL))) | |
135 | goto end; | |
136 | ||
137 | n = e = NULL; /* They are now "owned" by |rsa| */ | |
138 | ||
139 | /* | |
140 | * This SHOULD fail, as we're trying to encode a public key as a private | |
141 | * key. The private key bits MUST be present for a proper RSAPrivateKey. | |
142 | */ | |
143 | if (TEST_int_le(i2d_RSAPrivateKey(rsa, NULL), 0)) | |
144 | ok = 1; | |
145 | ||
146 | end: | |
147 | RSA_free(rsa); | |
148 | BN_free(n); | |
149 | BN_free(e); | |
150 | return ok; | |
151 | } | |
152 | ||
d07d8057 BB |
153 | /********************************************************************** |
154 | * | |
155 | * Tests of the Unicode code point range | |
156 | * | |
157 | ***/ | |
158 | ||
159 | static int test_unicode(const unsigned char *univ, size_t len, int expected) | |
160 | { | |
161 | const unsigned char *end = univ + len; | |
162 | int ok = 1; | |
163 | ||
164 | for (; univ < end; univ += 4) { | |
165 | if (!TEST_int_eq(ASN1_mbstring_copy(NULL, univ, 4, MBSTRING_UNIV, | |
166 | B_ASN1_UTF8STRING), | |
167 | expected)) | |
168 | ok = 0; | |
169 | } | |
170 | return ok; | |
171 | } | |
172 | ||
173 | static int test_unicode_range(void) | |
174 | { | |
175 | const unsigned char univ_ok[] = "\0\0\0\0" | |
176 | "\0\0\xd7\xff" | |
177 | "\0\0\xe0\x00" | |
178 | "\0\x10\xff\xff"; | |
179 | const unsigned char univ_bad[] = "\0\0\xd8\x00" | |
180 | "\0\0\xdf\xff" | |
181 | "\0\x11\x00\x00" | |
182 | "\x80\x00\x00\x00" | |
183 | "\xff\xff\xff\xff"; | |
184 | int ok = 1; | |
185 | ||
186 | if (!test_unicode(univ_ok, sizeof univ_ok - 1, V_ASN1_UTF8STRING)) | |
187 | ok = 0; | |
188 | if (!test_unicode(univ_bad, sizeof univ_bad - 1, -1)) | |
189 | ok = 0; | |
190 | return ok; | |
191 | } | |
192 | ||
b79da97c RL |
193 | /********************************************************************** |
194 | * | |
195 | * Tests of object creation | |
196 | * | |
197 | ***/ | |
198 | ||
199 | static int test_obj_create_once(const char *oid, const char *sn, const char *ln) | |
200 | { | |
201 | int nid; | |
202 | ||
203 | ERR_set_mark(); | |
204 | ||
205 | nid = OBJ_create(oid, sn, ln); | |
206 | ||
207 | if (nid == NID_undef) { | |
208 | unsigned long err = ERR_peek_last_error(); | |
209 | int l = ERR_GET_LIB(err); | |
210 | int r = ERR_GET_REASON(err); | |
211 | ||
212 | /* If it exists, that's fine, otherwise not */ | |
213 | if (l != ERR_LIB_OBJ || r != OBJ_R_OID_EXISTS) { | |
214 | ERR_clear_last_mark(); | |
215 | return 0; | |
216 | } | |
217 | } | |
218 | ERR_pop_to_mark(); | |
219 | return 1; | |
220 | } | |
221 | ||
222 | static int test_obj_create(void) | |
223 | { | |
224 | /* Stolen from evp_extra_test.c */ | |
225 | #define arc "1.3.6.1.4.1.16604.998866." | |
226 | #define broken_arc "25." | |
227 | #define sn_prefix "custom" | |
228 | #define ln_prefix "custom" | |
229 | ||
230 | /* Try different combinations of correct object creation */ | |
231 | if (!TEST_true(test_obj_create_once(NULL, sn_prefix "1", NULL)) | |
232 | || !TEST_int_ne(OBJ_sn2nid(sn_prefix "1"), NID_undef) | |
233 | || !TEST_true(test_obj_create_once(NULL, NULL, ln_prefix "2")) | |
234 | || !TEST_int_ne(OBJ_ln2nid(ln_prefix "2"), NID_undef) | |
235 | || !TEST_true(test_obj_create_once(NULL, sn_prefix "3", ln_prefix "3")) | |
236 | || !TEST_int_ne(OBJ_sn2nid(sn_prefix "3"), NID_undef) | |
237 | || !TEST_int_ne(OBJ_ln2nid(ln_prefix "3"), NID_undef) | |
238 | || !TEST_true(test_obj_create_once(arc "4", NULL, NULL)) | |
239 | || !TEST_true(test_obj_create_once(arc "5", sn_prefix "5", NULL)) | |
240 | || !TEST_int_ne(OBJ_sn2nid(sn_prefix "5"), NID_undef) | |
241 | || !TEST_true(test_obj_create_once(arc "6", NULL, ln_prefix "6")) | |
242 | || !TEST_int_ne(OBJ_ln2nid(ln_prefix "6"), NID_undef) | |
243 | || !TEST_true(test_obj_create_once(arc "7", | |
244 | sn_prefix "7", ln_prefix "7")) | |
245 | || !TEST_int_ne(OBJ_sn2nid(sn_prefix "7"), NID_undef) | |
246 | || !TEST_int_ne(OBJ_ln2nid(ln_prefix "7"), NID_undef)) | |
247 | return 0; | |
248 | ||
249 | if (!TEST_false(test_obj_create_once(NULL, NULL, NULL)) | |
250 | || !TEST_false(test_obj_create_once(broken_arc "8", | |
251 | sn_prefix "8", ln_prefix "8"))) | |
252 | return 0; | |
253 | ||
254 | return 1; | |
255 | } | |
256 | ||
908ba3ed TM |
257 | static int test_obj_nid_undef(void) |
258 | { | |
259 | if (!TEST_ptr(OBJ_nid2obj(NID_undef)) | |
260 | || !TEST_ptr(OBJ_nid2sn(NID_undef)) | |
261 | || !TEST_ptr(OBJ_nid2ln(NID_undef))) | |
262 | return 0; | |
263 | ||
264 | return 1; | |
265 | } | |
266 | ||
ad887416 | 267 | int setup_tests(void) |
2c166171 | 268 | { |
308b876d EK |
269 | ADD_TEST(test_tbl_standard); |
270 | ADD_TEST(test_standard_methods); | |
2296cc34 | 271 | ADD_TEST(test_empty_nonoptional_content); |
d07d8057 | 272 | ADD_TEST(test_unicode_range); |
b79da97c | 273 | ADD_TEST(test_obj_create); |
908ba3ed | 274 | ADD_TEST(test_obj_nid_undef); |
ad887416 | 275 | return 1; |
2c166171 | 276 | } |