mirror of https://github.com/openssl/openssl.git
				
				
				
			
		
			
				
	
	
		
			174 lines
		
	
	
		
			4.9 KiB
		
	
	
	
		
			C
		
	
	
	
			
		
		
	
	
			174 lines
		
	
	
		
			4.9 KiB
		
	
	
	
		
			C
		
	
	
	
| /*
 | |
|  * Copyright 2023 The OpenSSL Project Authors. All Rights Reserved.
 | |
|  *
 | |
|  * Licensed under the Apache License 2.0 (the "License").  You may not use
 | |
|  * this file except in compliance with the License.  You can obtain a copy
 | |
|  * in the file LICENSE in the source distribution or at
 | |
|  * https://www.openssl.org/source/license.html
 | |
|  */
 | |
| 
 | |
| #include <openssl/pem.h>
 | |
| #include <openssl/core_names.h>
 | |
| #include <openssl/self_test.h>
 | |
| #include "testutil.h"
 | |
| 
 | |
| typedef enum OPTION_choice {
 | |
|     OPT_ERR = -1,
 | |
|     OPT_EOF = 0,
 | |
|     OPT_PROVIDER_NAME,
 | |
|     OPT_CONFIG_FILE,
 | |
|     OPT_PAIRWISETEST,
 | |
|     OPT_DSAPARAM,
 | |
|     OPT_TEST_ENUM
 | |
| } OPTION_CHOICE;
 | |
| 
 | |
| struct self_test_arg {
 | |
|     const char *type;
 | |
| };
 | |
| 
 | |
| static OSSL_LIB_CTX *libctx = NULL;
 | |
| static char *pairwise_name = NULL;
 | |
| static char *dsaparam_file = NULL;
 | |
| static struct self_test_arg self_test_args = { 0 };
 | |
| 
 | |
| const OPTIONS *test_get_options(void)
 | |
| {
 | |
|     static const OPTIONS test_options[] = {
 | |
|         OPT_TEST_OPTIONS_DEFAULT_USAGE,
 | |
|         { "config", OPT_CONFIG_FILE, '<',
 | |
|           "The configuration file to use for the libctx" },
 | |
|         { "pairwise", OPT_PAIRWISETEST, 's',
 | |
|           "Test keygen pairwise test failures" },
 | |
|         { "dsaparam", OPT_DSAPARAM, 's', "DSA param file" },
 | |
|         { NULL }
 | |
|     };
 | |
|     return test_options;
 | |
| }
 | |
| 
 | |
| static int self_test_on_pairwise_fail(const OSSL_PARAM params[], void *arg)
 | |
| {
 | |
|     struct self_test_arg *args = arg;
 | |
|     const OSSL_PARAM *p = NULL;
 | |
|     const char *type = NULL, *phase = NULL;
 | |
| 
 | |
|     p = OSSL_PARAM_locate_const(params, OSSL_PROV_PARAM_SELF_TEST_PHASE);
 | |
|     if (p == NULL || p->data_type != OSSL_PARAM_UTF8_STRING)
 | |
|         return 0;
 | |
|     phase = (const char *)p->data;
 | |
|     if (strcmp(phase, OSSL_SELF_TEST_PHASE_CORRUPT) == 0) {
 | |
|         p = OSSL_PARAM_locate_const(params, OSSL_PROV_PARAM_SELF_TEST_TYPE);
 | |
|         if (p == NULL || p->data_type != OSSL_PARAM_UTF8_STRING)
 | |
|             return 0;
 | |
|         type = (const char *)p->data;
 | |
|         if (strcmp(type, args->type) == 0)
 | |
|             return 0;
 | |
|     }
 | |
|     return 1;
 | |
| }
 | |
| 
 | |
| static int setup_selftest_pairwise_failure(const char *type)
 | |
| {
 | |
|     int ret = 0;
 | |
|     OSSL_PROVIDER *prov = NULL;
 | |
| 
 | |
|     if (!TEST_ptr(prov = OSSL_PROVIDER_load(libctx, "fips")))
 | |
|         goto err;
 | |
| 
 | |
|     /* Setup a callback that corrupts the pairwise self tests and causes failures */
 | |
|     self_test_args.type = type;
 | |
|     OSSL_SELF_TEST_set_callback(libctx, self_test_on_pairwise_fail, &self_test_args);
 | |
| 
 | |
|     ret = 1;
 | |
| err:
 | |
|     OSSL_PROVIDER_unload(prov);
 | |
|     return ret;
 | |
| }
 | |
| 
 | |
| static int test_keygen_pairwise_failure(void)
 | |
| {
 | |
|     BIO *bio = NULL;
 | |
|     EVP_PKEY_CTX *ctx = NULL;
 | |
|     EVP_PKEY *pParams = NULL;
 | |
|     EVP_PKEY *pkey = NULL;
 | |
|     const char *type = OSSL_SELF_TEST_TYPE_PCT;
 | |
|     int ret = 0;
 | |
| 
 | |
|     if (strcmp(pairwise_name, "rsa") == 0) {
 | |
|         if (!TEST_true(setup_selftest_pairwise_failure(type)))
 | |
|             goto err;
 | |
|         if (!TEST_ptr_null(pkey = EVP_PKEY_Q_keygen(libctx, NULL, "RSA", 2048)))
 | |
|             goto err;
 | |
|     } else if (strncmp(pairwise_name, "ec", 2) == 0) {
 | |
|         if (strcmp(pairwise_name, "eckat") == 0)
 | |
|             type = OSSL_SELF_TEST_TYPE_PCT_KAT;
 | |
|         if (!TEST_true(setup_selftest_pairwise_failure(type)))
 | |
|             goto err;
 | |
|         if (!TEST_ptr_null(pkey = EVP_PKEY_Q_keygen(libctx, NULL, "EC", "P-256")))
 | |
|             goto err;
 | |
|     } else if (strncmp(pairwise_name, "dsa", 3) == 0) {
 | |
|         if (strcmp(pairwise_name, "dsakat") == 0)
 | |
|             type = OSSL_SELF_TEST_TYPE_PCT_KAT;
 | |
|         if (!TEST_true(setup_selftest_pairwise_failure(type)))
 | |
|             goto err;
 | |
|         if (!TEST_ptr(bio = BIO_new_file(dsaparam_file, "r")))
 | |
|             goto err;
 | |
|         if (!TEST_ptr(pParams = PEM_read_bio_Parameters_ex(bio, NULL, libctx, NULL)))
 | |
|             goto err;
 | |
|         if (!TEST_ptr(ctx = EVP_PKEY_CTX_new_from_pkey(libctx, pParams, NULL)))
 | |
|             goto err;
 | |
|         if (!TEST_int_eq(EVP_PKEY_keygen_init(ctx), 1))
 | |
|             goto err;
 | |
|         if (!TEST_int_le(EVP_PKEY_keygen(ctx, &pkey), 0))
 | |
|             goto err;
 | |
|         if (!TEST_ptr_null(pkey))
 | |
|             goto err;
 | |
|     }
 | |
|     ret = 1;
 | |
| err:
 | |
|     EVP_PKEY_free(pkey);
 | |
|     EVP_PKEY_CTX_free(ctx);
 | |
|     BIO_free(bio);
 | |
|     EVP_PKEY_free(pParams);
 | |
|     return ret;
 | |
| }
 | |
| 
 | |
| int setup_tests(void)
 | |
| {
 | |
|     OPTION_CHOICE o;
 | |
|     char *config_file = NULL;
 | |
| 
 | |
|     while ((o = opt_next()) != OPT_EOF) {
 | |
|         switch (o) {
 | |
|         case OPT_CONFIG_FILE:
 | |
|             config_file = opt_arg();
 | |
|             break;
 | |
|         case OPT_PAIRWISETEST:
 | |
|             pairwise_name = opt_arg();
 | |
|             break;
 | |
|         case OPT_DSAPARAM:
 | |
|             dsaparam_file = opt_arg();
 | |
|             break;
 | |
|         case OPT_TEST_CASES:
 | |
|            break;
 | |
|         default:
 | |
|         case OPT_ERR:
 | |
|             return 0;
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     libctx = OSSL_LIB_CTX_new();
 | |
|     if (libctx == NULL)
 | |
|         return 0;
 | |
|     if (!OSSL_LIB_CTX_load_config(libctx, config_file)) {
 | |
|         opt_printf_stderr("Failed to load config\n");
 | |
|         return 0;
 | |
|     }
 | |
|     ADD_TEST(test_keygen_pairwise_failure);
 | |
|     return 1;
 | |
| }
 | |
| 
 | |
| void cleanup_tests(void)
 | |
| {
 | |
|     OSSL_LIB_CTX_free(libctx);
 | |
| }
 |