]> git.ipfire.org Git - thirdparty/openssl.git/blob - test/x509_check_cert_pkey_test.c
003bab86364d3ee112d9a90ffd28529873d8561e
[thirdparty/openssl.git] / test / x509_check_cert_pkey_test.c
1 /*
2 * Copyright 2017 The OpenSSL Project Authors. All Rights Reserved.
3 *
4 * Licensed under the OpenSSL license (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
8 */
9
10 #include <stdio.h>
11 #include <string.h>
12
13 #include <openssl/pem.h>
14 #include <openssl/x509.h>
15 #include "testutil.h"
16
17 /*
18 * c: path of a cert in PEM format
19 * k: path of a key in PEM format
20 * t: API type, "cert" for X509_ and "req" for X509_REQ_ APIs.
21 * e: expected, "ok" for success, "failed" for what should fail.
22 */
23 static int test_x509_check_cert_pkey(const char *c, const char *k,
24 const char *t, const char *e)
25 {
26 BIO *bio = NULL;
27 X509 *x509 = NULL;
28 X509_REQ *x509_req = NULL;
29 EVP_PKEY *pkey = NULL;
30 int ret = 0, type = 0, expected = 0, result = 0;
31
32 /*
33 * we check them first thus if fails we don't need to do
34 * those PEM parsing operations.
35 */
36 if (strcmp(t, "cert") == 0) {
37 type = 1;
38 } else if (strcmp(t, "req") == 0) {
39 type = 2;
40 } else {
41 TEST_error("invalid 'type'");
42 goto failed;
43 }
44
45 if (strcmp(e, "ok") == 0) {
46 expected = 1;
47 } else if (strcmp(e, "failed") == 0) {
48 expected = 0;
49 } else {
50 TEST_error("invalid 'expected'");
51 goto failed;
52 }
53
54 /* process private key */
55 if (!TEST_ptr(bio = BIO_new_file(k, "r")))
56 goto failed;
57
58 if (!TEST_ptr(pkey = PEM_read_bio_PrivateKey(bio, NULL, NULL, NULL)))
59 goto failed;
60
61 BIO_free(bio);
62
63 /* process cert or cert request, use the same local var */
64 if (!TEST_ptr(bio = BIO_new_file(c, "r")))
65 goto failed;
66
67 switch (type) {
68 case 1:
69 x509 = PEM_read_bio_X509(bio, NULL, NULL, NULL);
70 if (x509 == NULL) {
71 TEST_error("read PEM x509 failed");
72 goto failed;
73 }
74
75 result = X509_check_private_key(x509, pkey);
76 break;
77 case 2:
78 x509_req = PEM_read_bio_X509_REQ(bio, NULL, NULL, NULL);
79 if (x509_req == NULL) {
80 TEST_error("read PEM x509 req failed");
81 goto failed;
82 }
83
84 result = X509_REQ_check_private_key(x509_req, pkey);
85 break;
86 default:
87 /* should never be here */
88 break;
89 }
90
91 if (!TEST_int_eq(result, expected)) {
92 TEST_error("check private key: expected: %d, got: %d", expected, result);
93 goto failed;
94 }
95
96 ret = 1;
97 failed:
98 BIO_free(bio);
99 X509_free(x509);
100 X509_REQ_free(x509_req);
101 EVP_PKEY_free(pkey);
102 return ret;
103 }
104
105 int test_main(int argc, char **argv)
106 {
107 if (!TEST_int_eq(argc, 5)) {
108 TEST_info("usage: x509_check_cert_pkey cert.pem|cert.req"
109 " key.pem cert|req <expected>");
110 return 1;
111 }
112
113 return !test_x509_check_cert_pkey(argv[1], argv[2], argv[3], argv[4]);
114 }