]>
Commit | Line | Data |
---|---|---|
1bdbdaff | 1 | /* |
3c2bdd7d | 2 | * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved. |
1bdbdaff P |
3 | * Copyright (c) 2019, Oracle and/or its affiliates. All rights reserved. |
4 | * | |
5 | * Licensed under the Apache License 2.0 (the "License"). You may not use | |
6 | * this file except in compliance with the License. You can obtain a copy | |
7 | * in the file LICENSE in the source distribution or at | |
8 | * https://www.openssl.org/source/license.html | |
9 | */ | |
10 | ||
11 | #include <stdarg.h> | |
e0624f0d | 12 | #include <openssl/evp.h> |
1bdbdaff P |
13 | #include "testutil.h" |
14 | #include "internal/nelem.h" | |
15 | #include "internal/property.h" | |
706457b7 | 16 | #include "../crypto/property/property_local.h" |
1bdbdaff | 17 | |
dc010ca6 RL |
18 | /* |
19 | * We make our OSSL_PROVIDER for testing purposes. All we really need is | |
20 | * a pointer. We know that as long as we don't try to use the method | |
21 | * cache flush functions, the provider pointer is merely a pointer being | |
22 | * passed around, and used as a tag of sorts. | |
23 | */ | |
24 | struct ossl_provider_st { | |
25 | int x; | |
26 | }; | |
27 | ||
1bdbdaff P |
28 | static int add_property_names(const char *n, ...) |
29 | { | |
30 | va_list args; | |
31 | int res = 1; | |
32 | ||
33 | va_start(args, n); | |
34 | do { | |
1aedc35f | 35 | if (!TEST_int_ne(ossl_property_name(NULL, n, 1), 0)) |
1bdbdaff P |
36 | res = 0; |
37 | } while ((n = va_arg(args, const char *)) != NULL); | |
38 | va_end(args); | |
39 | return res; | |
40 | } | |
41 | ||
bdbf2df2 P |
42 | static int up_ref(void *p) |
43 | { | |
44 | return 1; | |
45 | } | |
46 | ||
47 | static void down_ref(void *p) | |
48 | { | |
49 | } | |
50 | ||
1bdbdaff P |
51 | static int test_property_string(void) |
52 | { | |
9f6841e9 P |
53 | OSSL_LIB_CTX *ctx; |
54 | OSSL_METHOD_STORE *store = NULL; | |
1bdbdaff P |
55 | int res = 0; |
56 | OSSL_PROPERTY_IDX i, j; | |
57 | ||
9f6841e9 P |
58 | /*- |
59 | * Use our own library context because we depend on ordering from a | |
60 | * pristine state. | |
61 | */ | |
62 | if (TEST_ptr(ctx = OSSL_LIB_CTX_new()) | |
63 | && TEST_ptr(store = ossl_method_store_new(ctx)) | |
64 | && TEST_int_eq(ossl_property_name(ctx, "fnord", 0), 0) | |
65 | && TEST_int_ne(ossl_property_name(ctx, "fnord", 1), 0) | |
66 | && TEST_int_ne(ossl_property_name(ctx, "name", 1), 0) | |
67 | /* Pre loaded names */ | |
68 | && TEST_str_eq(ossl_property_name_str(ctx, 1), "provider") | |
69 | && TEST_str_eq(ossl_property_name_str(ctx, 2), "version") | |
70 | && TEST_str_eq(ossl_property_name_str(ctx, 3), "fips") | |
71 | && TEST_str_eq(ossl_property_name_str(ctx, 4), "output") | |
72 | && TEST_str_eq(ossl_property_name_str(ctx, 5), "input") | |
73 | && TEST_str_eq(ossl_property_name_str(ctx, 6), "structure") | |
74 | /* The names we added */ | |
75 | && TEST_str_eq(ossl_property_name_str(ctx, 7), "fnord") | |
76 | && TEST_str_eq(ossl_property_name_str(ctx, 8), "name") | |
77 | /* Out of range */ | |
78 | && TEST_ptr_null(ossl_property_name_str(ctx, 0)) | |
79 | && TEST_ptr_null(ossl_property_name_str(ctx, 9)) | |
1bdbdaff | 80 | /* Property value checks */ |
9f6841e9 P |
81 | && TEST_int_eq(ossl_property_value(ctx, "fnord", 0), 0) |
82 | && TEST_int_ne(i = ossl_property_value(ctx, "no", 0), 0) | |
83 | && TEST_int_ne(j = ossl_property_value(ctx, "yes", 0), 0) | |
1bdbdaff | 84 | && TEST_int_ne(i, j) |
9f6841e9 P |
85 | && TEST_int_eq(ossl_property_value(ctx, "yes", 1), j) |
86 | && TEST_int_eq(ossl_property_value(ctx, "no", 1), i) | |
87 | && TEST_int_ne(i = ossl_property_value(ctx, "illuminati", 1), 0) | |
88 | && TEST_int_eq(j = ossl_property_value(ctx, "fnord", 1), i + 1) | |
89 | && TEST_int_eq(ossl_property_value(ctx, "fnord", 1), j) | |
90 | /* Pre loaded values */ | |
91 | && TEST_str_eq(ossl_property_value_str(ctx, 1), "yes") | |
92 | && TEST_str_eq(ossl_property_value_str(ctx, 2), "no") | |
93 | /* The value we added */ | |
94 | && TEST_str_eq(ossl_property_value_str(ctx, 3), "illuminati") | |
95 | && TEST_str_eq(ossl_property_value_str(ctx, 4), "fnord") | |
96 | /* Out of range */ | |
97 | && TEST_ptr_null(ossl_property_value_str(ctx, 0)) | |
98 | && TEST_ptr_null(ossl_property_value_str(ctx, 5)) | |
1bdbdaff | 99 | /* Check name and values are distinct */ |
9f6841e9 P |
100 | && TEST_int_eq(ossl_property_value(ctx, "cold", 0), 0) |
101 | && TEST_int_ne(ossl_property_name(ctx, "fnord", 0), | |
102 | ossl_property_value(ctx, "fnord", 0))) | |
1bdbdaff P |
103 | res = 1; |
104 | ossl_method_store_free(store); | |
9f6841e9 | 105 | OSSL_LIB_CTX_free(ctx); |
1bdbdaff P |
106 | return res; |
107 | } | |
108 | ||
109 | static const struct { | |
110 | const char *defn; | |
111 | const char *query; | |
112 | int e; | |
113 | } parser_tests[] = { | |
da89ac0b | 114 | { "", "sky=blue", -1 }, |
1bdbdaff | 115 | { "", "sky!=blue", 1 }, |
da89ac0b | 116 | { "groan", "", 0 }, |
1bdbdaff P |
117 | { "cold=yes", "cold=yes", 1 }, |
118 | { "cold=yes", "cold", 1 }, | |
119 | { "cold=yes", "cold!=no", 1 }, | |
120 | { "groan", "groan=yes", 1 }, | |
da89ac0b P |
121 | { "groan", "groan=no", -1 }, |
122 | { "groan", "groan!=yes", -1 }, | |
123 | { "cold=no", "cold", -1 }, | |
124 | { "cold=no", "?cold", 0 }, | |
1bdbdaff | 125 | { "cold=no", "cold=no", 1 }, |
da89ac0b | 126 | { "groan", "cold", -1 }, |
1bdbdaff P |
127 | { "groan", "cold=no", 1 }, |
128 | { "groan", "cold!=yes", 1 }, | |
da89ac0b P |
129 | { "groan=blue", "groan=yellow", -1 }, |
130 | { "groan=blue", "?groan=yellow", 0 }, | |
1bdbdaff | 131 | { "groan=blue", "groan!=yellow", 1 }, |
da89ac0b | 132 | { "groan=blue", "?groan!=yellow", 1 }, |
1bdbdaff | 133 | { "today=monday, tomorrow=3", "today!=2", 1 }, |
da89ac0b | 134 | { "today=monday, tomorrow=3", "today!='monday'", -1 }, |
1bdbdaff P |
135 | { "today=monday, tomorrow=3", "tomorrow=3", 1 }, |
136 | { "n=0x3", "n=3", 1 }, | |
da89ac0b | 137 | { "n=0x3", "n=-3", -1 }, |
1bdbdaff P |
138 | { "n=0x33", "n=51", 1 }, |
139 | { "n=033", "n=27", 1 }, | |
140 | { "n=0", "n=00", 1 }, | |
141 | { "n=0x0", "n=0", 1 }, | |
da89ac0b P |
142 | { "n=0, sky=blue", "?n=0, sky=blue", 2 }, |
143 | { "n=1, sky=blue", "?n=0, sky=blue", 1 }, | |
1bdbdaff P |
144 | }; |
145 | ||
146 | static int test_property_parse(int n) | |
147 | { | |
148 | OSSL_METHOD_STORE *store; | |
149 | OSSL_PROPERTY_LIST *p = NULL, *q = NULL; | |
150 | int r = 0; | |
151 | ||
1aedc35f | 152 | if (TEST_ptr(store = ossl_method_store_new(NULL)) |
1bdbdaff P |
153 | && add_property_names("sky", "groan", "cold", "today", "tomorrow", "n", |
154 | NULL) | |
1aedc35f | 155 | && TEST_ptr(p = ossl_parse_property(NULL, parser_tests[n].defn)) |
1e08f3ba | 156 | && TEST_ptr(q = ossl_parse_query(NULL, parser_tests[n].query, 0)) |
da89ac0b | 157 | && TEST_int_eq(ossl_property_match_count(q, p), parser_tests[n].e)) |
1bdbdaff P |
158 | r = 1; |
159 | ossl_property_free(p); | |
160 | ossl_property_free(q); | |
161 | ossl_method_store_free(store); | |
162 | return r; | |
163 | } | |
164 | ||
1e08f3ba P |
165 | static int test_property_query_value_create(void) |
166 | { | |
167 | OSSL_METHOD_STORE *store; | |
168 | OSSL_PROPERTY_LIST *p = NULL, *q = NULL, *o = NULL; | |
169 | int r = 0; | |
170 | ||
a289d3a4 | 171 | /* The property value used here must not be used in other test cases */ |
1e08f3ba | 172 | if (TEST_ptr(store = ossl_method_store_new(NULL)) |
a289d3a4 TM |
173 | && add_property_names("wood", NULL) |
174 | && TEST_ptr(p = ossl_parse_query(NULL, "wood=oak", 0)) /* undefined */ | |
175 | && TEST_ptr(q = ossl_parse_query(NULL, "wood=oak", 1)) /* creates */ | |
176 | && TEST_ptr(o = ossl_parse_query(NULL, "wood=oak", 0)) /* defined */ | |
1e08f3ba P |
177 | && TEST_int_eq(ossl_property_match_count(q, p), -1) |
178 | && TEST_int_eq(ossl_property_match_count(q, o), 1)) | |
179 | r = 1; | |
180 | ossl_property_free(o); | |
181 | ossl_property_free(p); | |
182 | ossl_property_free(q); | |
183 | ossl_method_store_free(store); | |
184 | return r; | |
185 | } | |
186 | ||
747d1423 P |
187 | static const struct { |
188 | int query; | |
189 | const char *ps; | |
190 | } parse_error_tests[] = { | |
191 | { 0, "n=1, n=1" }, /* duplicate name */ | |
192 | { 0, "n=1, a=hi, n=1" }, /* duplicate name */ | |
193 | { 1, "n=1, a=bye, ?n=0" }, /* duplicate name */ | |
194 | { 0, "a=abc,#@!, n=1" }, /* non-ASCII character located */ | |
195 | { 1, "a='Hello" }, /* Unterminated string */ | |
196 | { 0, "a=\"World" }, /* Unterminated string */ | |
197 | { 1, "a=2, n=012345678" }, /* Bad octal digit */ | |
198 | { 0, "n=0x28FG, a=3" }, /* Bad hex digit */ | |
199 | { 0, "n=145d, a=2" }, /* Bad decimal digit */ | |
200 | { 1, "@='hello'" }, /* Invalid name */ | |
201 | { 1, "n0123456789012345678901234567890123456789" | |
202 | "0123456789012345678901234567890123456789" | |
203 | "0123456789012345678901234567890123456789" | |
204 | "0123456789012345678901234567890123456789=yes" }, /* Name too long */ | |
205 | { 0, ".n=3" }, /* Invalid name */ | |
206 | { 1, "fnord.fnord.=3" } /* Invalid name */ | |
207 | }; | |
208 | ||
209 | static int test_property_parse_error(int n) | |
210 | { | |
211 | OSSL_METHOD_STORE *store; | |
212 | OSSL_PROPERTY_LIST *p = NULL; | |
213 | int r = 0; | |
214 | const char *ps; | |
215 | ||
216 | if (!TEST_ptr(store = ossl_method_store_new(NULL)) | |
217 | || !add_property_names("a", "n", NULL)) | |
218 | goto err; | |
219 | ps = parse_error_tests[n].ps; | |
220 | if (parse_error_tests[n].query) { | |
221 | if (!TEST_ptr_null(p = ossl_parse_query(NULL, ps, 1))) | |
222 | goto err; | |
223 | } else if (!TEST_ptr_null(p = ossl_parse_property(NULL, ps))) { | |
224 | goto err; | |
225 | } | |
226 | r = 1; | |
227 | err: | |
228 | ossl_property_free(p); | |
229 | ossl_method_store_free(store); | |
230 | return r; | |
231 | } | |
232 | ||
1bdbdaff P |
233 | static const struct { |
234 | const char *q_global; | |
235 | const char *q_local; | |
236 | const char *prop; | |
237 | } merge_tests[] = { | |
238 | { "", "colour=blue", "colour=blue" }, | |
239 | { "colour=blue", "", "colour=blue" }, | |
240 | { "colour=red", "colour=blue", "colour=blue" }, | |
241 | { "clouds=pink, urn=red", "urn=blue, colour=green", | |
242 | "urn=blue, colour=green, clouds=pink" }, | |
243 | { "pot=gold", "urn=blue", "pot=gold, urn=blue" }, | |
244 | { "night", "day", "day=yes, night=yes" }, | |
245 | { "day", "night", "day=yes, night=yes" }, | |
246 | { "", "", "" }, | |
247 | /* | |
248 | * The following four leave 'day' unspecified in the query, and will match | |
249 | * any definition | |
250 | */ | |
251 | { "day=yes", "-day", "day=no" }, | |
252 | { "day=yes", "-day", "day=yes" }, | |
253 | { "day=yes", "-day", "day=arglebargle" }, | |
254 | { "day=yes", "-day", "pot=sesquioxidizing" }, | |
255 | { "day, night", "-night, day", "day=yes, night=no" }, | |
256 | { "-day", "day=yes", "day=yes" }, | |
257 | }; | |
258 | ||
259 | static int test_property_merge(int n) | |
260 | { | |
261 | OSSL_METHOD_STORE *store; | |
262 | OSSL_PROPERTY_LIST *q_global = NULL, *q_local = NULL; | |
263 | OSSL_PROPERTY_LIST *q_combined = NULL, *prop = NULL; | |
264 | int r = 0; | |
265 | ||
1aedc35f | 266 | if (TEST_ptr(store = ossl_method_store_new(NULL)) |
1bdbdaff P |
267 | && add_property_names("colour", "urn", "clouds", "pot", "day", "night", |
268 | NULL) | |
1aedc35f | 269 | && TEST_ptr(prop = ossl_parse_property(NULL, merge_tests[n].prop)) |
1e08f3ba P |
270 | && TEST_ptr(q_global = ossl_parse_query(NULL, merge_tests[n].q_global, |
271 | 0)) | |
272 | && TEST_ptr(q_local = ossl_parse_query(NULL, merge_tests[n].q_local, 0)) | |
1bdbdaff | 273 | && TEST_ptr(q_combined = ossl_property_merge(q_local, q_global)) |
da89ac0b | 274 | && TEST_int_ge(ossl_property_match_count(q_combined, prop), 0)) |
1bdbdaff P |
275 | r = 1; |
276 | ossl_property_free(q_global); | |
277 | ossl_property_free(q_local); | |
278 | ossl_property_free(q_combined); | |
279 | ossl_property_free(prop); | |
280 | ossl_method_store_free(store); | |
281 | return r; | |
282 | } | |
283 | ||
284 | static int test_property_defn_cache(void) | |
285 | { | |
286 | OSSL_METHOD_STORE *store; | |
287 | OSSL_PROPERTY_LIST *red, *blue; | |
288 | int r = 0; | |
289 | ||
1aedc35f | 290 | if (TEST_ptr(store = ossl_method_store_new(NULL)) |
1bdbdaff | 291 | && add_property_names("red", "blue", NULL) |
1aedc35f MC |
292 | && TEST_ptr(red = ossl_parse_property(NULL, "red")) |
293 | && TEST_ptr(blue = ossl_parse_property(NULL, "blue")) | |
1bdbdaff | 294 | && TEST_ptr_ne(red, blue) |
1aedc35f MC |
295 | && TEST_true(ossl_prop_defn_set(NULL, "red", red)) |
296 | && TEST_true(ossl_prop_defn_set(NULL, "blue", blue)) | |
297 | && TEST_ptr_eq(ossl_prop_defn_get(NULL, "red"), red) | |
298 | && TEST_ptr_eq(ossl_prop_defn_get(NULL, "blue"), blue)) | |
1bdbdaff P |
299 | r = 1; |
300 | ossl_method_store_free(store); | |
301 | return r; | |
302 | } | |
303 | ||
304 | static const struct { | |
305 | const char *defn; | |
306 | const char *query; | |
307 | int e; | |
308 | } definition_tests[] = { | |
309 | { "alpha", "alpha=yes", 1 }, | |
da89ac0b | 310 | { "alpha=no", "alpha", -1 }, |
1bdbdaff | 311 | { "alpha=1", "alpha=1", 1 }, |
da89ac0b P |
312 | { "alpha=2", "alpha=1",-1 }, |
313 | { "alpha", "omega", -1 }, | |
314 | { "alpha", "?omega", 0 }, | |
315 | { "alpha", "?omega=1", 0 }, | |
316 | { "alpha", "?omega=no", 1 }, | |
317 | { "alpha", "?omega=yes", 0 }, | |
318 | { "alpha, omega", "?omega=yes", 1 }, | |
319 | { "alpha, omega", "?omega=no", 0 } | |
1bdbdaff P |
320 | }; |
321 | ||
322 | static int test_definition_compares(int n) | |
323 | { | |
324 | OSSL_METHOD_STORE *store; | |
325 | OSSL_PROPERTY_LIST *d = NULL, *q = NULL; | |
326 | int r; | |
327 | ||
1aedc35f | 328 | r = TEST_ptr(store = ossl_method_store_new(NULL)) |
1bdbdaff | 329 | && add_property_names("alpha", "omega", NULL) |
1aedc35f | 330 | && TEST_ptr(d = ossl_parse_property(NULL, definition_tests[n].defn)) |
1e08f3ba | 331 | && TEST_ptr(q = ossl_parse_query(NULL, definition_tests[n].query, 0)) |
da89ac0b | 332 | && TEST_int_eq(ossl_property_match_count(q, d), definition_tests[n].e); |
1bdbdaff P |
333 | |
334 | ossl_property_free(d); | |
335 | ossl_property_free(q); | |
336 | ossl_method_store_free(store); | |
337 | return r; | |
338 | } | |
339 | ||
340 | static int test_register_deregister(void) | |
341 | { | |
342 | static const struct { | |
343 | int nid; | |
344 | const char *prop; | |
345 | char *impl; | |
346 | } impls[] = { | |
347 | { 6, "position=1", "a" }, | |
348 | { 6, "position=2", "b" }, | |
349 | { 6, "position=3", "c" }, | |
350 | { 6, "position=4", "d" }, | |
351 | }; | |
352 | size_t i; | |
353 | int ret = 0; | |
354 | OSSL_METHOD_STORE *store; | |
dc010ca6 | 355 | OSSL_PROVIDER prov = { 1 }; |
1bdbdaff | 356 | |
1aedc35f | 357 | if (!TEST_ptr(store = ossl_method_store_new(NULL)) |
1bdbdaff P |
358 | || !add_property_names("position", NULL)) |
359 | goto err; | |
360 | ||
361 | for (i = 0; i < OSSL_NELEM(impls); i++) | |
dc010ca6 | 362 | if (!TEST_true(ossl_method_store_add(store, &prov, impls[i].nid, |
c1d56231 | 363 | impls[i].prop, impls[i].impl, |
bdbf2df2 | 364 | &up_ref, &down_ref))) { |
1bdbdaff P |
365 | TEST_note("iteration %zd", i + 1); |
366 | goto err; | |
367 | } | |
368 | ||
369 | /* Deregister in a different order to registration */ | |
370 | for (i = 0; i < OSSL_NELEM(impls); i++) { | |
371 | const size_t j = (1 + i * 3) % OSSL_NELEM(impls); | |
372 | int nid = impls[j].nid; | |
373 | void *impl = impls[j].impl; | |
374 | ||
375 | if (!TEST_true(ossl_method_store_remove(store, nid, impl)) | |
376 | || !TEST_false(ossl_method_store_remove(store, nid, impl))) { | |
377 | TEST_note("iteration %zd, position %zd", i + 1, j + 1); | |
378 | goto err; | |
379 | } | |
380 | } | |
381 | ||
382 | if (TEST_false(ossl_method_store_remove(store, impls[0].nid, impls[0].impl))) | |
383 | ret = 1; | |
384 | err: | |
385 | ossl_method_store_free(store); | |
386 | return ret; | |
387 | } | |
388 | ||
389 | static int test_property(void) | |
390 | { | |
dc010ca6 RL |
391 | static OSSL_PROVIDER fake_provider1 = { 1 }; |
392 | static OSSL_PROVIDER fake_provider2 = { 2 }; | |
393 | static const OSSL_PROVIDER *fake_prov1 = &fake_provider1; | |
394 | static const OSSL_PROVIDER *fake_prov2 = &fake_provider2; | |
1bdbdaff | 395 | static const struct { |
dc010ca6 | 396 | const OSSL_PROVIDER **prov; |
1bdbdaff P |
397 | int nid; |
398 | const char *prop; | |
399 | char *impl; | |
400 | } impls[] = { | |
dc010ca6 RL |
401 | { &fake_prov1, 1, "fast=no, colour=green", "a" }, |
402 | { &fake_prov1, 1, "fast, colour=blue", "b" }, | |
403 | { &fake_prov1, 1, "", "-" }, | |
404 | { &fake_prov2, 9, "sky=blue, furry", "c" }, | |
405 | { &fake_prov2, 3, NULL, "d" }, | |
406 | { &fake_prov2, 6, "sky.colour=blue, sky=green, old.data", "e" }, | |
1bdbdaff P |
407 | }; |
408 | static struct { | |
dc010ca6 | 409 | const OSSL_PROVIDER **prov; |
1bdbdaff P |
410 | int nid; |
411 | const char *prop; | |
412 | char *expected; | |
413 | } queries[] = { | |
dc010ca6 RL |
414 | { &fake_prov1, 1, "fast", "b" }, |
415 | { &fake_prov1, 1, "fast=yes", "b" }, | |
416 | { &fake_prov1, 1, "fast=no, colour=green", "a" }, | |
417 | { &fake_prov1, 1, "colour=blue, fast", "b" }, | |
418 | { &fake_prov1, 1, "colour=blue", "b" }, | |
419 | { &fake_prov2, 9, "furry", "c" }, | |
420 | { &fake_prov2, 6, "sky.colour=blue", "e" }, | |
421 | { &fake_prov2, 6, "old.data", "e" }, | |
422 | { &fake_prov2, 9, "furry=yes, sky=blue", "c" }, | |
423 | { &fake_prov1, 1, "", "a" }, | |
424 | { &fake_prov2, 3, "", "d" }, | |
1bdbdaff P |
425 | }; |
426 | OSSL_METHOD_STORE *store; | |
427 | size_t i; | |
428 | int ret = 0; | |
429 | void *result; | |
430 | ||
1aedc35f | 431 | if (!TEST_ptr(store = ossl_method_store_new(NULL)) |
1bdbdaff P |
432 | || !add_property_names("fast", "colour", "sky", "furry", NULL)) |
433 | goto err; | |
434 | ||
435 | for (i = 0; i < OSSL_NELEM(impls); i++) | |
dc010ca6 RL |
436 | if (!TEST_true(ossl_method_store_add(store, *impls[i].prov, |
437 | impls[i].nid, impls[i].prop, | |
438 | impls[i].impl, | |
bdbf2df2 | 439 | &up_ref, &down_ref))) { |
1bdbdaff P |
440 | TEST_note("iteration %zd", i + 1); |
441 | goto err; | |
442 | } | |
dc010ca6 RL |
443 | /* |
444 | * The first check of queries is with NULL given as provider. All | |
445 | * queries are expected to succeed. | |
446 | */ | |
1bdbdaff | 447 | for (i = 0; i < OSSL_NELEM(queries); i++) { |
dc010ca6 | 448 | const OSSL_PROVIDER *nullprov = NULL; |
1bdbdaff P |
449 | OSSL_PROPERTY_LIST *pq = NULL; |
450 | ||
dc010ca6 RL |
451 | if (!TEST_true(ossl_method_store_fetch(store, |
452 | queries[i].nid, queries[i].prop, | |
453 | &nullprov, &result)) | |
1bdbdaff P |
454 | || !TEST_str_eq((char *)result, queries[i].expected)) { |
455 | TEST_note("iteration %zd", i + 1); | |
456 | ossl_property_free(pq); | |
457 | goto err; | |
458 | } | |
459 | ossl_property_free(pq); | |
460 | } | |
dc010ca6 RL |
461 | /* |
462 | * The second check of queries is with &address1 given as provider. | |
463 | */ | |
464 | for (i = 0; i < OSSL_NELEM(queries); i++) { | |
465 | OSSL_PROPERTY_LIST *pq = NULL; | |
466 | ||
467 | result = NULL; | |
468 | if (queries[i].prov == &fake_prov1) { | |
469 | if (!TEST_true(ossl_method_store_fetch(store, | |
470 | queries[i].nid, | |
471 | queries[i].prop, | |
472 | &fake_prov1, &result)) | |
473 | || !TEST_ptr_eq(fake_prov1, &fake_provider1) | |
474 | || !TEST_str_eq((char *)result, queries[i].expected)) { | |
475 | TEST_note("iteration %zd", i + 1); | |
476 | ossl_property_free(pq); | |
477 | goto err; | |
478 | } | |
479 | } else { | |
480 | if (!TEST_false(ossl_method_store_fetch(store, | |
481 | queries[i].nid, | |
482 | queries[i].prop, | |
483 | &fake_prov1, &result)) | |
484 | || !TEST_ptr_eq(fake_prov1, &fake_provider1) | |
485 | || !TEST_ptr_null(result)) { | |
486 | TEST_note("iteration %zd", i + 1); | |
487 | ossl_property_free(pq); | |
488 | goto err; | |
489 | } | |
490 | } | |
491 | ossl_property_free(pq); | |
492 | } | |
493 | /* | |
494 | * The third check of queries is with &address2 given as provider. | |
495 | */ | |
496 | for (i = 0; i < OSSL_NELEM(queries); i++) { | |
497 | OSSL_PROPERTY_LIST *pq = NULL; | |
498 | ||
499 | result = NULL; | |
500 | if (queries[i].prov == &fake_prov2) { | |
501 | if (!TEST_true(ossl_method_store_fetch(store, | |
502 | queries[i].nid, | |
503 | queries[i].prop, | |
504 | &fake_prov2, &result)) | |
505 | || !TEST_ptr_eq(fake_prov2, &fake_provider2) | |
506 | || !TEST_str_eq((char *)result, queries[i].expected)) { | |
507 | TEST_note("iteration %zd", i + 1); | |
508 | ossl_property_free(pq); | |
509 | goto err; | |
510 | } | |
511 | } else { | |
512 | if (!TEST_false(ossl_method_store_fetch(store, | |
513 | queries[i].nid, | |
514 | queries[i].prop, | |
515 | &fake_prov2, &result)) | |
516 | || !TEST_ptr_eq(fake_prov2, &fake_provider2) | |
517 | || !TEST_ptr_null(result)) { | |
518 | TEST_note("iteration %zd", i + 1); | |
519 | ossl_property_free(pq); | |
520 | goto err; | |
521 | } | |
522 | } | |
523 | ossl_property_free(pq); | |
524 | } | |
1bdbdaff P |
525 | ret = 1; |
526 | err: | |
527 | ossl_method_store_free(store); | |
528 | return ret; | |
529 | } | |
530 | ||
531 | static int test_query_cache_stochastic(void) | |
532 | { | |
533 | const int max = 10000, tail = 10; | |
534 | OSSL_METHOD_STORE *store; | |
535 | int i, res = 0; | |
536 | char buf[50]; | |
537 | void *result; | |
538 | int errors = 0; | |
539 | int v[10001]; | |
dc010ca6 | 540 | OSSL_PROVIDER prov = { 1 }; |
1bdbdaff | 541 | |
1aedc35f | 542 | if (!TEST_ptr(store = ossl_method_store_new(NULL)) |
1bdbdaff P |
543 | || !add_property_names("n", NULL)) |
544 | goto err; | |
545 | ||
546 | for (i = 1; i <= max; i++) { | |
547 | v[i] = 2 * i; | |
548 | BIO_snprintf(buf, sizeof(buf), "n=%d\n", i); | |
dc010ca6 | 549 | if (!TEST_true(ossl_method_store_add(store, &prov, i, buf, "abc", |
bdbf2df2 | 550 | &up_ref, &down_ref)) |
dc010ca6 RL |
551 | || !TEST_true(ossl_method_store_cache_set(store, &prov, i, |
552 | buf, v + i, | |
bdbf2df2 | 553 | &up_ref, &down_ref)) |
dc010ca6 RL |
554 | || !TEST_true(ossl_method_store_cache_set(store, &prov, i, |
555 | "n=1234", "miss", | |
556 | &up_ref, &down_ref))) { | |
1bdbdaff P |
557 | TEST_note("iteration %d", i); |
558 | goto err; | |
559 | } | |
560 | } | |
561 | for (i = 1; i <= max; i++) { | |
562 | BIO_snprintf(buf, sizeof(buf), "n=%d\n", i); | |
dc010ca6 | 563 | if (!ossl_method_store_cache_get(store, NULL, i, buf, &result) |
1bdbdaff P |
564 | || result != v + i) |
565 | errors++; | |
566 | } | |
567 | /* There is a tiny probability that this will fail when it shouldn't */ | |
568 | res = TEST_int_gt(errors, tail) && TEST_int_lt(errors, max - tail); | |
569 | ||
570 | err: | |
571 | ossl_method_store_free(store); | |
572 | return res; | |
573 | } | |
574 | ||
e0624f0d SL |
575 | static int test_fips_mode(void) |
576 | { | |
577 | int ret = 0; | |
b4250010 | 578 | OSSL_LIB_CTX *ctx = NULL; |
e0624f0d | 579 | |
b4250010 | 580 | if (!TEST_ptr(ctx = OSSL_LIB_CTX_new())) |
e0624f0d SL |
581 | goto err; |
582 | ||
583 | ret = TEST_true(EVP_set_default_properties(ctx, "default=yes,fips=yes")) | |
584 | && TEST_true(EVP_default_properties_is_fips_enabled(ctx)) | |
585 | && TEST_true(EVP_set_default_properties(ctx, "fips=no,default=yes")) | |
586 | && TEST_false(EVP_default_properties_is_fips_enabled(ctx)) | |
587 | && TEST_true(EVP_set_default_properties(ctx, "fips=no")) | |
588 | && TEST_false(EVP_default_properties_is_fips_enabled(ctx)) | |
589 | && TEST_true(EVP_set_default_properties(ctx, "fips!=no")) | |
590 | && TEST_true(EVP_default_properties_is_fips_enabled(ctx)) | |
591 | && TEST_true(EVP_set_default_properties(ctx, "fips=no")) | |
592 | && TEST_false(EVP_default_properties_is_fips_enabled(ctx)) | |
593 | && TEST_true(EVP_set_default_properties(ctx, "fips=no,default=yes")) | |
594 | && TEST_true(EVP_default_properties_enable_fips(ctx, 1)) | |
595 | && TEST_true(EVP_default_properties_is_fips_enabled(ctx)) | |
596 | && TEST_true(EVP_default_properties_enable_fips(ctx, 0)) | |
597 | && TEST_false(EVP_default_properties_is_fips_enabled(ctx)); | |
598 | err: | |
b4250010 | 599 | OSSL_LIB_CTX_free(ctx); |
e0624f0d SL |
600 | return ret; |
601 | } | |
602 | ||
862497a9 P |
603 | static struct { |
604 | const char *in; | |
605 | const char *out; | |
606 | } to_string_tests[] = { | |
607 | { "fips=yes", "fips=yes" }, | |
608 | { "fips!=yes", "fips!=yes" }, | |
609 | { "fips = yes", "fips=yes" }, | |
610 | { "fips", "fips=yes" }, | |
611 | { "fips=no", "fips=no" }, | |
612 | { "-fips", "-fips" }, | |
613 | { "?fips=yes", "?fips=yes" }, | |
614 | { "fips=yes,provider=fips", "fips=yes,provider=fips" }, | |
615 | { "fips = yes , provider = fips", "fips=yes,provider=fips" }, | |
616 | { "fips=yes,provider!=fips", "fips=yes,provider!=fips" }, | |
617 | { "fips=yes,?provider=fips", "fips=yes,?provider=fips" }, | |
618 | { "fips=yes,-provider", "fips=yes,-provider" }, | |
619 | /* foo is an unknown internal name */ | |
620 | { "foo=yes,fips=yes", "fips=yes"}, | |
621 | { "", "" }, | |
622 | { "fips=3", "fips=3" }, | |
623 | { "fips=-3", "fips=-3" }, | |
624 | { NULL, "" } | |
625 | }; | |
626 | ||
627 | static int test_property_list_to_string(int i) | |
ad8570a8 MC |
628 | { |
629 | OSSL_PROPERTY_LIST *pl = NULL; | |
630 | int ret = 0; | |
862497a9 | 631 | size_t bufsize; |
ad8570a8 MC |
632 | char *buf = NULL; |
633 | ||
862497a9 P |
634 | if (to_string_tests[i].in != NULL |
635 | && !TEST_ptr(pl = ossl_parse_query(NULL, to_string_tests[i].in, 1))) | |
636 | goto err; | |
637 | bufsize = ossl_property_list_to_string(NULL, pl, NULL, 0); | |
638 | if (!TEST_size_t_gt(bufsize, 0)) | |
639 | goto err; | |
640 | buf = OPENSSL_malloc(bufsize); | |
641 | if (!TEST_ptr(buf) | |
642 | || !TEST_size_t_eq(ossl_property_list_to_string(NULL, pl, buf, | |
643 | bufsize), | |
644 | bufsize) | |
645 | || !TEST_str_eq(to_string_tests[i].out, buf) | |
646 | || !TEST_size_t_eq(bufsize, strlen(to_string_tests[i].out) + 1)) | |
647 | goto err; | |
ad8570a8 MC |
648 | |
649 | ret = 1; | |
650 | err: | |
651 | OPENSSL_free(buf); | |
652 | ossl_property_free(pl); | |
653 | return ret; | |
654 | } | |
e0624f0d | 655 | |
1bdbdaff P |
656 | int setup_tests(void) |
657 | { | |
658 | ADD_TEST(test_property_string); | |
1e08f3ba | 659 | ADD_TEST(test_property_query_value_create); |
1bdbdaff | 660 | ADD_ALL_TESTS(test_property_parse, OSSL_NELEM(parser_tests)); |
747d1423 | 661 | ADD_ALL_TESTS(test_property_parse_error, OSSL_NELEM(parse_error_tests)); |
1bdbdaff P |
662 | ADD_ALL_TESTS(test_property_merge, OSSL_NELEM(merge_tests)); |
663 | ADD_TEST(test_property_defn_cache); | |
664 | ADD_ALL_TESTS(test_definition_compares, OSSL_NELEM(definition_tests)); | |
665 | ADD_TEST(test_register_deregister); | |
666 | ADD_TEST(test_property); | |
667 | ADD_TEST(test_query_cache_stochastic); | |
e0624f0d | 668 | ADD_TEST(test_fips_mode); |
862497a9 | 669 | ADD_ALL_TESTS(test_property_list_to_string, OSSL_NELEM(to_string_tests)); |
1bdbdaff P |
670 | return 1; |
671 | } |