From: Matt Caswell Date: Tue, 3 Feb 2026 14:05:54 +0000 (+0000) Subject: Extend the test we have for a low level RSA method to cover DSA X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=1984eab67815650054a423d8918e4688bbb764fa;p=thirdparty%2Fopenssl.git Extend the test we have for a low level RSA method to cover DSA We want to test that if we use a custom DSA_METHOD, then it still works even when we use a provider. Reviewed-by: Shane Lontis Reviewed-by: Tomas Mraz MergeDate: Fri Feb 13 07:58:16 2026 (Merged from https://github.com/openssl/openssl/pull/29960) --- diff --git a/test/build.info b/test/build.info index 78e253e7d99..1af2275403a 100644 --- a/test/build.info +++ b/test/build.info @@ -203,7 +203,7 @@ IF[{- !$disabled{tests} -}] DEFINE[evp_test]=NO_LEGACY_MODULE ENDIF - SOURCE[evp_extra_test]=evp_extra_test.c fake_rsaprov.c fake_pipelineprov.c + SOURCE[evp_extra_test]=evp_extra_test.c fake_rsaprov.c fake_pipelineprov.c helpers/predefined_dsaparams.c INCLUDE[evp_extra_test]=../include ../apps/include \ ../providers/common/include \ ../providers/implementations/include @@ -913,7 +913,7 @@ IF[{- !$disabled{tests} -}] INCLUDE[dsatest]=../include ../apps/include DEPEND[dsatest]=../libcrypto.a libtestutil.a - SOURCE[dsa_no_digest_size_test]=dsa_no_digest_size_test.c + SOURCE[dsa_no_digest_size_test]=dsa_no_digest_size_test.c helpers/predefined_dsaparams.c INCLUDE[dsa_no_digest_size_test]=../include ../apps/include DEPEND[dsa_no_digest_size_test]=../libcrypto.a libtestutil.a diff --git a/test/dsa_no_digest_size_test.c b/test/dsa_no_digest_size_test.c index 2b3af3b182e..4aa87022be2 100644 --- a/test/dsa_no_digest_size_test.c +++ b/test/dsa_no_digest_size_test.c @@ -24,94 +24,10 @@ #ifndef OPENSSL_NO_DSA #include +#include "helpers/predefined_dsaparams.h" static DSA *dsakey; -/* - * These parameters are from test/recipes/04-test_pem_data/dsaparam.pem, - * converted using dsaparam -C - */ -static DSA *load_dsa_params(void) -{ - static unsigned char dsap_2048[] = { - 0xAE, 0x35, 0x7D, 0x4E, 0x1D, 0x96, 0xE2, 0x9F, 0x00, 0x96, - 0x60, 0x5A, 0x6E, 0x4D, 0x07, 0x8D, 0xA5, 0x7C, 0xBC, 0xF9, - 0xAD, 0xD7, 0x9F, 0xD5, 0xE9, 0xEE, 0xA6, 0x33, 0x51, 0xDE, - 0x7B, 0x72, 0xD2, 0x75, 0xAA, 0x71, 0x77, 0xF1, 0x63, 0xFB, - 0xB6, 0xEC, 0x5A, 0xBA, 0x0D, 0x72, 0xA2, 0x1A, 0x1C, 0x64, - 0xB8, 0xE5, 0x89, 0x09, 0x6D, 0xC9, 0x6F, 0x0B, 0x7F, 0xD2, - 0xCE, 0x9F, 0xEF, 0x87, 0x5A, 0xB6, 0x67, 0x2F, 0xEF, 0xEE, - 0xEB, 0x59, 0xF5, 0x5E, 0xFF, 0xA8, 0x28, 0x84, 0x9E, 0x5B, - 0x37, 0x09, 0x11, 0x80, 0x7C, 0x08, 0x5C, 0xD5, 0xE1, 0x48, - 0x4B, 0xD2, 0x68, 0xFB, 0x3F, 0x9F, 0x2B, 0x6B, 0x6C, 0x0D, - 0x48, 0x1B, 0x1A, 0x80, 0xC2, 0xEB, 0x11, 0x1B, 0x37, 0x79, - 0xD6, 0x8C, 0x8B, 0x72, 0x3E, 0x67, 0xA5, 0x05, 0x0E, 0x41, - 0x8A, 0x9E, 0x35, 0x50, 0xB4, 0xD2, 0x40, 0x27, 0x6B, 0xFD, - 0xE0, 0x64, 0x6B, 0x5B, 0x38, 0x42, 0x94, 0xB5, 0x49, 0xDA, - 0xEF, 0x6E, 0x78, 0x37, 0xCD, 0x30, 0x89, 0xC3, 0x45, 0x50, - 0x7B, 0x9C, 0x8C, 0xE7, 0x1C, 0x98, 0x70, 0x71, 0x5D, 0x79, - 0x5F, 0xEF, 0xE8, 0x94, 0x85, 0x53, 0x3E, 0xEF, 0xA3, 0x2C, - 0xCE, 0x1A, 0xAB, 0x7D, 0xD6, 0x5E, 0x14, 0xCD, 0x51, 0x54, - 0x89, 0x9D, 0x77, 0xE4, 0xF8, 0x22, 0xF0, 0x35, 0x10, 0x75, - 0x05, 0x71, 0x51, 0x4F, 0x8C, 0x4C, 0x5C, 0x0D, 0x2C, 0x2C, - 0xBE, 0x6C, 0x34, 0xEE, 0x12, 0x82, 0x87, 0x03, 0x19, 0x06, - 0x12, 0xA8, 0xAA, 0xF4, 0x0D, 0x3C, 0x49, 0xCC, 0x70, 0x5A, - 0xD8, 0x32, 0xEE, 0x32, 0x50, 0x85, 0x70, 0xE8, 0x18, 0xFD, - 0x74, 0x80, 0x53, 0x32, 0x57, 0xEE, 0x50, 0xC9, 0xAE, 0xEB, - 0xAE, 0xB6, 0x22, 0x32, 0x16, 0x6B, 0x8C, 0x59, 0xDA, 0xEE, - 0x1D, 0x33, 0xDF, 0x4C, 0xA2, 0x3D - }; - static unsigned char dsaq_2048[] = { - 0xAD, 0x2D, 0x6E, 0x17, 0xB0, 0xF3, 0xEB, 0xC7, 0xB8, 0xEE, - 0x95, 0x78, 0xF2, 0x17, 0xF5, 0x33, 0x01, 0x67, 0xBC, 0xDE, - 0x93, 0xFF, 0xEE, 0x40, 0xE8, 0x7F, 0xF1, 0x93, 0x6D, 0x4B, - 0x87, 0x13 - }; - static unsigned char dsag_2048[] = { - 0x66, 0x6F, 0xDA, 0x63, 0xA5, 0x8E, 0xD2, 0x4C, 0xD5, 0x45, - 0x2D, 0x76, 0x5D, 0x5F, 0xCD, 0x4A, 0xB4, 0x1A, 0x42, 0x35, - 0x86, 0x3A, 0x6F, 0xA9, 0xFA, 0x27, 0xAB, 0xDE, 0x03, 0x21, - 0x36, 0x0A, 0x07, 0x29, 0xC9, 0x2F, 0x6D, 0x49, 0xA8, 0xF7, - 0xC6, 0xF4, 0x92, 0xD7, 0x73, 0xC1, 0xD8, 0x76, 0x0E, 0x61, - 0xA7, 0x0B, 0x6E, 0x96, 0xB8, 0xC8, 0xCB, 0x38, 0x35, 0x12, - 0x20, 0x79, 0xA5, 0x08, 0x28, 0x35, 0x5C, 0xBC, 0x52, 0x16, - 0xAF, 0x52, 0xBA, 0x0F, 0xC3, 0xB1, 0x63, 0x12, 0x27, 0x0B, - 0x74, 0xA4, 0x47, 0x43, 0xD6, 0x30, 0xB8, 0x9C, 0x2E, 0x40, - 0x14, 0xCD, 0x99, 0x7F, 0xE8, 0x8E, 0x37, 0xB0, 0xA9, 0x3F, - 0x54, 0xE9, 0x66, 0x22, 0x61, 0x4C, 0xF8, 0x49, 0x03, 0x57, - 0x14, 0x32, 0x1D, 0x37, 0x3D, 0xE2, 0x92, 0xF8, 0x8E, 0xA0, - 0x6A, 0x66, 0x63, 0xF0, 0xB0, 0x6E, 0x07, 0x2B, 0x3D, 0xBF, - 0xD0, 0x84, 0x6A, 0xAA, 0x1F, 0x30, 0x77, 0x65, 0xE5, 0xFC, - 0xF5, 0xEC, 0x55, 0xCE, 0x73, 0xDB, 0xBE, 0xA7, 0x8D, 0x3A, - 0x9F, 0x7A, 0xED, 0x4F, 0xAF, 0xA2, 0x80, 0x4C, 0x30, 0x9E, - 0x28, 0x49, 0x65, 0x40, 0xF0, 0x03, 0x45, 0x56, 0x99, 0xA2, - 0x93, 0x1B, 0x9C, 0x46, 0xDE, 0xBD, 0xA8, 0xAB, 0x5F, 0x90, - 0x3F, 0xB7, 0x3F, 0xD4, 0x6F, 0x8D, 0x5A, 0x30, 0xE1, 0xD4, - 0x63, 0x3A, 0x6A, 0x7C, 0x8F, 0x24, 0xFC, 0xD9, 0x14, 0x28, - 0x09, 0xE4, 0x84, 0x4E, 0x17, 0x43, 0x56, 0xB8, 0xD4, 0x4B, - 0xA2, 0x29, 0x45, 0xD3, 0x13, 0xF0, 0xC2, 0x76, 0x9B, 0x01, - 0xA0, 0x80, 0x6E, 0x93, 0x63, 0x5E, 0x87, 0x24, 0x20, 0x2A, - 0xFF, 0xBB, 0x9F, 0xA8, 0x99, 0x6C, 0xA7, 0x9A, 0x00, 0xB9, - 0x7D, 0xDA, 0x66, 0xC9, 0xC0, 0x72, 0x72, 0x22, 0x0F, 0x1A, - 0xCC, 0x23, 0xD9, 0xB7, 0x5F, 0x1B - }; - DSA *dsa = DSA_new(); - BIGNUM *p, *q, *g; - - if (dsa == NULL) - return NULL; - if (!DSA_set0_pqg(dsa, p = BN_bin2bn(dsap_2048, sizeof(dsap_2048), NULL), - q = BN_bin2bn(dsaq_2048, sizeof(dsaq_2048), NULL), - g = BN_bin2bn(dsag_2048, sizeof(dsag_2048), NULL))) { - DSA_free(dsa); - BN_free(p); - BN_free(q); - BN_free(g); - return NULL; - } - return dsa; -} - static int genkeys(void) { if (!TEST_ptr(dsakey = load_dsa_params())) diff --git a/test/evp_extra_test.c b/test/evp_extra_test.c index b92678628b6..0082da1006d 100644 --- a/test/evp_extra_test.c +++ b/test/evp_extra_test.c @@ -41,6 +41,10 @@ #include "fake_rsaprov.h" #include "fake_pipelineprov.h" +#ifndef OPENSSL_NO_DSA +#include "helpers/predefined_dsaparams.h" +#endif + #ifdef STATIC_LEGACY OSSL_provider_init_fn ossl_legacy_provider_init; #endif @@ -6288,28 +6292,53 @@ end: return testresult; } -static int priv_enc_hits = 0; -static int (*orig_priv_enc)(int, const unsigned char *, unsigned char *, RSA *, int); +static int sign_hits = 0; + +static int do_sign_with_method(EVP_PKEY *pkey) +{ + const unsigned char msg[] = "Hello, World!"; + unsigned char sig[128]; + unsigned int siglen; + EVP_MD_CTX *ctx = NULL; + int ret = 0; + + sign_hits = 0; + ctx = EVP_MD_CTX_new(); + if (!TEST_ptr(ctx)) + return 0; + if (!TEST_true(EVP_SignInit(ctx, EVP_sha256()))) + goto err; + if (!TEST_true(EVP_SignUpdate(ctx, msg, sizeof(msg) - 1))) + goto err; + if (!TEST_true(EVP_SignFinal(ctx, sig, &siglen, pkey))) + goto err; + /* We expect to see our custom sign function called once */ + if (!TEST_int_eq(sign_hits, 1)) + goto err; + + ret = 1; +err: + EVP_MD_CTX_free(ctx); + return ret; +} + +static int (*orig_rsa_priv_enc)(int, const unsigned char *, unsigned char *, RSA *, int); -static int tst_priv_enc(int flen, const unsigned char *from, unsigned char *to, +static int tst_rsa_priv_enc(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) { - priv_enc_hits++; - return orig_priv_enc(flen, from, to, rsa, padding); + sign_hits++; + return orig_rsa_priv_enc(flen, from, to, rsa, padding); } -/* Test that a low level method still gets used even with a provider */ -static int test_low_level_method(void) +/* Test that a low level RSA method still gets used even with a provider */ +static int test_low_level_rsa_method(void) { - const unsigned char msg[] = "Hello, World!"; - unsigned char sig[128]; - unsigned int siglen; BIGNUM *e = BN_new(); RSA *rsa = NULL; const RSA_METHOD *def = RSA_get_default_method(); RSA_METHOD *method = RSA_meth_dup(def); EVP_PKEY *pkey = NULL; - EVP_MD_CTX *ctx = NULL; int testresult = 0; if (nullprov != NULL) { @@ -6329,8 +6358,8 @@ static int test_low_level_method(void) if (!TEST_true(RSA_generate_key_ex(rsa, 1024, e, NULL))) goto err; - orig_priv_enc = RSA_meth_get_priv_enc(def); - if (!TEST_true(RSA_meth_set_priv_enc(method, tst_priv_enc))) + orig_rsa_priv_enc = RSA_meth_get_priv_enc(def); + if (!TEST_true(RSA_meth_set_priv_enc(method, tst_rsa_priv_enc))) goto err; if (!TEST_true(RSA_set_method(rsa, method))) goto err; @@ -6342,30 +6371,74 @@ static int test_low_level_method(void) goto err; rsa = NULL; - priv_enc_hits = 0; - ctx = EVP_MD_CTX_new(); - if (!TEST_ptr(ctx)) + if (!do_sign_with_method(pkey)) goto err; - if (!TEST_true(EVP_SignInit(ctx, EVP_sha256()))) + + testresult = 1; +err: + BN_free(e); + RSA_free(rsa); + EVP_PKEY_free(pkey); + RSA_meth_free(method); + return testresult; +} + +#ifndef OPENSSL_NO_DSA +static DSA_SIG *(*orig_dsa_sign)(const unsigned char *, int, DSA *); + +static DSA_SIG *tst_dsa_sign(const unsigned char *buf, int len, DSA *dsa) +{ + sign_hits++; + return orig_dsa_sign(buf, len, dsa); +} + +/* Test that a low level DSA method still gets used even with a provider */ +static int test_low_level_dsa_method(void) +{ + DSA *dsa = NULL; + const DSA_METHOD *def = DSA_get_default_method(); + DSA_METHOD *method = DSA_meth_dup(def); + EVP_PKEY *pkey = NULL; + int testresult = 0; + + if (nullprov != NULL) { + testresult = TEST_skip("Test does not support a non-default library context"); goto err; - if (!TEST_true(EVP_SignUpdate(ctx, msg, sizeof(msg) - 1))) + } + + if (!TEST_ptr(method)) goto err; - if (!TEST_true(EVP_SignFinal(ctx, sig, &siglen, pkey))) + + dsa = load_dsa_params(); + if (!TEST_ptr(dsa)) + goto err; + if (!TEST_true(DSA_generate_key(dsa))) + goto err; + + orig_dsa_sign = DSA_meth_get_sign(def); + if (!TEST_true(DSA_meth_set_sign(method, tst_dsa_sign))) + goto err; + if (!TEST_true(DSA_set_method(dsa, method))) goto err; - /* We expect to see our custom private encryption function called once */ - if (!TEST_int_eq(priv_enc_hits, 1)) + pkey = EVP_PKEY_new(); + if (!TEST_ptr(pkey)) + goto err; + if (!TEST_int_gt(EVP_PKEY_assign_DSA(pkey, dsa), 0)) + goto err; + dsa = NULL; + + if (!do_sign_with_method(pkey)) goto err; testresult = 1; err: - BN_free(e); - RSA_free(rsa); + DSA_free(dsa); EVP_PKEY_free(pkey); - RSA_meth_free(method); - EVP_MD_CTX_free(ctx); + DSA_meth_free(method); return testresult; } +#endif int setup_tests(void) { @@ -6539,7 +6612,10 @@ int setup_tests(void) ADD_ALL_TESTS(test_ml_dsa_seed_only, 2); #endif - ADD_TEST(test_low_level_method); + ADD_TEST(test_low_level_rsa_method); +#ifndef OPENSSL_NO_DSA + ADD_TEST(test_low_level_dsa_method); +#endif return 1; } diff --git a/test/helpers/predefined_dsaparams.c b/test/helpers/predefined_dsaparams.c new file mode 100644 index 00000000000..82a760edab5 --- /dev/null +++ b/test/helpers/predefined_dsaparams.c @@ -0,0 +1,107 @@ +/* + * Copyright 2018-2026 The OpenSSL Project Authors. All Rights Reserved. + * + * Licensed under the Apache License 2.0 (the "License"). You may not use + * this file except in compliance with the License. You can obtain a copy + * in the file LICENSE in the source distribution or at + * https://www.openssl.org/source/license.html + */ + +/* + * DSA low level APIs are deprecated for public use, but still ok for + * internal use. + */ +#include "internal/deprecated.h" + +#ifndef OPENSSL_NO_DSA +#include +#include +#include "predefined_dsaparams.h" + +/* + * These parameters are from test/recipes/04-test_pem_data/dsaparam.pem, + * converted using dsaparam -C + */ +DSA *load_dsa_params(void) +{ + static unsigned char dsap_2048[] = { + 0xAE, 0x35, 0x7D, 0x4E, 0x1D, 0x96, 0xE2, 0x9F, 0x00, 0x96, + 0x60, 0x5A, 0x6E, 0x4D, 0x07, 0x8D, 0xA5, 0x7C, 0xBC, 0xF9, + 0xAD, 0xD7, 0x9F, 0xD5, 0xE9, 0xEE, 0xA6, 0x33, 0x51, 0xDE, + 0x7B, 0x72, 0xD2, 0x75, 0xAA, 0x71, 0x77, 0xF1, 0x63, 0xFB, + 0xB6, 0xEC, 0x5A, 0xBA, 0x0D, 0x72, 0xA2, 0x1A, 0x1C, 0x64, + 0xB8, 0xE5, 0x89, 0x09, 0x6D, 0xC9, 0x6F, 0x0B, 0x7F, 0xD2, + 0xCE, 0x9F, 0xEF, 0x87, 0x5A, 0xB6, 0x67, 0x2F, 0xEF, 0xEE, + 0xEB, 0x59, 0xF5, 0x5E, 0xFF, 0xA8, 0x28, 0x84, 0x9E, 0x5B, + 0x37, 0x09, 0x11, 0x80, 0x7C, 0x08, 0x5C, 0xD5, 0xE1, 0x48, + 0x4B, 0xD2, 0x68, 0xFB, 0x3F, 0x9F, 0x2B, 0x6B, 0x6C, 0x0D, + 0x48, 0x1B, 0x1A, 0x80, 0xC2, 0xEB, 0x11, 0x1B, 0x37, 0x79, + 0xD6, 0x8C, 0x8B, 0x72, 0x3E, 0x67, 0xA5, 0x05, 0x0E, 0x41, + 0x8A, 0x9E, 0x35, 0x50, 0xB4, 0xD2, 0x40, 0x27, 0x6B, 0xFD, + 0xE0, 0x64, 0x6B, 0x5B, 0x38, 0x42, 0x94, 0xB5, 0x49, 0xDA, + 0xEF, 0x6E, 0x78, 0x37, 0xCD, 0x30, 0x89, 0xC3, 0x45, 0x50, + 0x7B, 0x9C, 0x8C, 0xE7, 0x1C, 0x98, 0x70, 0x71, 0x5D, 0x79, + 0x5F, 0xEF, 0xE8, 0x94, 0x85, 0x53, 0x3E, 0xEF, 0xA3, 0x2C, + 0xCE, 0x1A, 0xAB, 0x7D, 0xD6, 0x5E, 0x14, 0xCD, 0x51, 0x54, + 0x89, 0x9D, 0x77, 0xE4, 0xF8, 0x22, 0xF0, 0x35, 0x10, 0x75, + 0x05, 0x71, 0x51, 0x4F, 0x8C, 0x4C, 0x5C, 0x0D, 0x2C, 0x2C, + 0xBE, 0x6C, 0x34, 0xEE, 0x12, 0x82, 0x87, 0x03, 0x19, 0x06, + 0x12, 0xA8, 0xAA, 0xF4, 0x0D, 0x3C, 0x49, 0xCC, 0x70, 0x5A, + 0xD8, 0x32, 0xEE, 0x32, 0x50, 0x85, 0x70, 0xE8, 0x18, 0xFD, + 0x74, 0x80, 0x53, 0x32, 0x57, 0xEE, 0x50, 0xC9, 0xAE, 0xEB, + 0xAE, 0xB6, 0x22, 0x32, 0x16, 0x6B, 0x8C, 0x59, 0xDA, 0xEE, + 0x1D, 0x33, 0xDF, 0x4C, 0xA2, 0x3D + }; + static unsigned char dsaq_2048[] = { + 0xAD, 0x2D, 0x6E, 0x17, 0xB0, 0xF3, 0xEB, 0xC7, 0xB8, 0xEE, + 0x95, 0x78, 0xF2, 0x17, 0xF5, 0x33, 0x01, 0x67, 0xBC, 0xDE, + 0x93, 0xFF, 0xEE, 0x40, 0xE8, 0x7F, 0xF1, 0x93, 0x6D, 0x4B, + 0x87, 0x13 + }; + static unsigned char dsag_2048[] = { + 0x66, 0x6F, 0xDA, 0x63, 0xA5, 0x8E, 0xD2, 0x4C, 0xD5, 0x45, + 0x2D, 0x76, 0x5D, 0x5F, 0xCD, 0x4A, 0xB4, 0x1A, 0x42, 0x35, + 0x86, 0x3A, 0x6F, 0xA9, 0xFA, 0x27, 0xAB, 0xDE, 0x03, 0x21, + 0x36, 0x0A, 0x07, 0x29, 0xC9, 0x2F, 0x6D, 0x49, 0xA8, 0xF7, + 0xC6, 0xF4, 0x92, 0xD7, 0x73, 0xC1, 0xD8, 0x76, 0x0E, 0x61, + 0xA7, 0x0B, 0x6E, 0x96, 0xB8, 0xC8, 0xCB, 0x38, 0x35, 0x12, + 0x20, 0x79, 0xA5, 0x08, 0x28, 0x35, 0x5C, 0xBC, 0x52, 0x16, + 0xAF, 0x52, 0xBA, 0x0F, 0xC3, 0xB1, 0x63, 0x12, 0x27, 0x0B, + 0x74, 0xA4, 0x47, 0x43, 0xD6, 0x30, 0xB8, 0x9C, 0x2E, 0x40, + 0x14, 0xCD, 0x99, 0x7F, 0xE8, 0x8E, 0x37, 0xB0, 0xA9, 0x3F, + 0x54, 0xE9, 0x66, 0x22, 0x61, 0x4C, 0xF8, 0x49, 0x03, 0x57, + 0x14, 0x32, 0x1D, 0x37, 0x3D, 0xE2, 0x92, 0xF8, 0x8E, 0xA0, + 0x6A, 0x66, 0x63, 0xF0, 0xB0, 0x6E, 0x07, 0x2B, 0x3D, 0xBF, + 0xD0, 0x84, 0x6A, 0xAA, 0x1F, 0x30, 0x77, 0x65, 0xE5, 0xFC, + 0xF5, 0xEC, 0x55, 0xCE, 0x73, 0xDB, 0xBE, 0xA7, 0x8D, 0x3A, + 0x9F, 0x7A, 0xED, 0x4F, 0xAF, 0xA2, 0x80, 0x4C, 0x30, 0x9E, + 0x28, 0x49, 0x65, 0x40, 0xF0, 0x03, 0x45, 0x56, 0x99, 0xA2, + 0x93, 0x1B, 0x9C, 0x46, 0xDE, 0xBD, 0xA8, 0xAB, 0x5F, 0x90, + 0x3F, 0xB7, 0x3F, 0xD4, 0x6F, 0x8D, 0x5A, 0x30, 0xE1, 0xD4, + 0x63, 0x3A, 0x6A, 0x7C, 0x8F, 0x24, 0xFC, 0xD9, 0x14, 0x28, + 0x09, 0xE4, 0x84, 0x4E, 0x17, 0x43, 0x56, 0xB8, 0xD4, 0x4B, + 0xA2, 0x29, 0x45, 0xD3, 0x13, 0xF0, 0xC2, 0x76, 0x9B, 0x01, + 0xA0, 0x80, 0x6E, 0x93, 0x63, 0x5E, 0x87, 0x24, 0x20, 0x2A, + 0xFF, 0xBB, 0x9F, 0xA8, 0x99, 0x6C, 0xA7, 0x9A, 0x00, 0xB9, + 0x7D, 0xDA, 0x66, 0xC9, 0xC0, 0x72, 0x72, 0x22, 0x0F, 0x1A, + 0xCC, 0x23, 0xD9, 0xB7, 0x5F, 0x1B + }; + DSA *dsa = DSA_new(); + BIGNUM *p, *q, *g; + + if (dsa == NULL) + return NULL; + if (!DSA_set0_pqg(dsa, p = BN_bin2bn(dsap_2048, sizeof(dsap_2048), NULL), + q = BN_bin2bn(dsaq_2048, sizeof(dsaq_2048), NULL), + g = BN_bin2bn(dsag_2048, sizeof(dsag_2048), NULL))) { + DSA_free(dsa); + BN_free(p); + BN_free(q); + BN_free(g); + return NULL; + } + return dsa; +} +#else +NON_EMPTY_TRANSLATION_UNIT +#endif /* OPENSSL_NO_DSA */ diff --git a/test/helpers/predefined_dsaparams.h b/test/helpers/predefined_dsaparams.h new file mode 100644 index 00000000000..a01314bb154 --- /dev/null +++ b/test/helpers/predefined_dsaparams.h @@ -0,0 +1,12 @@ +/* + * Copyright 2018-2026 The OpenSSL Project Authors. All Rights Reserved. + * + * Licensed under the Apache License 2.0 (the "License"). You may not use + * this file except in compliance with the License. You can obtain a copy + * in the file LICENSE in the source distribution or at + * https://www.openssl.org/source/license.html + */ + +#include + +DSA *load_dsa_params(void);