420 lines
8.5 KiB
C
Raw Normal View History

2023-11-06 23:46:37 -08:00
/* $OpenBSD: evp_test.c,v 1.7 2023/09/29 06:53:05 tb Exp $ */
/*
* Copyright (c) 2022 Joel Sing <jsing@openbsd.org>
*
* Permission to use, copy, modify, and distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
#include <assert.h>
#include <stdio.h>
#include <openssl/evp.h>
#include <openssl/ossl_typ.h>
#include "evp_local.h"
static int
evp_asn1_method_test(void)
{
const EVP_PKEY_ASN1_METHOD *method;
int count, pkey_id, i;
int failed = 1;
if ((count = EVP_PKEY_asn1_get_count()) < 1) {
fprintf(stderr, "FAIL: failed to get pkey asn1 method count\n");
goto failure;
}
for (i = 0; i < count; i++) {
if ((method = EVP_PKEY_asn1_get0(i)) == NULL) {
fprintf(stderr, "FAIL: failed to get pkey %d\n", i);
goto failure;
}
}
if ((method = EVP_PKEY_asn1_find(NULL, EVP_PKEY_RSA)) == NULL) {
fprintf(stderr, "FAIL: failed to find RSA method\n");
goto failure;
}
if (!EVP_PKEY_asn1_get0_info(&pkey_id, NULL, NULL, NULL, NULL, method)) {
fprintf(stderr, "FAIL: failed to get RSA method info\n");
goto failure;
}
if (pkey_id != EVP_PKEY_RSA) {
fprintf(stderr, "FAIL: method ID mismatch (%d != %d)\n",
pkey_id, EVP_PKEY_RSA);
goto failure;
}
if ((method = EVP_PKEY_asn1_find(NULL, EVP_PKEY_RSA_PSS)) == NULL) {
fprintf(stderr, "FAIL: failed to find RSA-PSS method\n");
goto failure;
}
if (!EVP_PKEY_asn1_get0_info(&pkey_id, NULL, NULL, NULL, NULL, method)) {
fprintf(stderr, "FAIL: failed to get RSA-PSS method info\n");
goto failure;
}
if (pkey_id != EVP_PKEY_RSA_PSS) {
fprintf(stderr, "FAIL: method ID mismatch (%d != %d)\n",
pkey_id, EVP_PKEY_RSA_PSS);
goto failure;
}
if ((method = EVP_PKEY_asn1_find_str(NULL, "RSA", -1)) == NULL) {
fprintf(stderr, "FAIL: failed to find RSA method by str\n");
goto failure;
}
if (!EVP_PKEY_asn1_get0_info(&pkey_id, NULL, NULL, NULL, NULL, method)) {
fprintf(stderr, "FAIL: failed to get RSA method info\n");
goto failure;
}
if (pkey_id != EVP_PKEY_RSA) {
fprintf(stderr, "FAIL: method ID mismatch (%d != %d)\n",
pkey_id, EVP_PKEY_RSA);
goto failure;
}
if ((method = EVP_PKEY_asn1_find_str(NULL, "RSA-PSS", -1)) == NULL) {
fprintf(stderr, "FAIL: failed to find RSA-PSS method\n");
goto failure;
}
if (!EVP_PKEY_asn1_get0_info(&pkey_id, NULL, NULL, NULL, NULL, method)) {
fprintf(stderr, "FAIL: failed to get RSA-PSS method info\n");
goto failure;
}
if (pkey_id != EVP_PKEY_RSA_PSS) {
fprintf(stderr, "FAIL: method ID mismatch (%d != %d)\n",
pkey_id, EVP_PKEY_RSA_PSS);
goto failure;
}
failed = 0;
failure:
return failed;
}
static int
evp_pkey_method_test(void)
{
const EVP_PKEY_METHOD *method;
int pkey_id;
int failed = 1;
if ((method = EVP_PKEY_meth_find(EVP_PKEY_RSA)) == NULL) {
fprintf(stderr, "FAIL: failed to find RSA method\n");
goto failure;
}
EVP_PKEY_meth_get0_info(&pkey_id, NULL, method);
if (pkey_id != EVP_PKEY_RSA) {
fprintf(stderr, "FAIL: method ID mismatch (%d != %d)\n",
pkey_id, EVP_PKEY_RSA);
goto failure;
}
if ((method = EVP_PKEY_meth_find(EVP_PKEY_RSA_PSS)) == NULL) {
fprintf(stderr, "FAIL: failed to find RSA-PSS method\n");
goto failure;
}
EVP_PKEY_meth_get0_info(&pkey_id, NULL, method);
if (pkey_id != EVP_PKEY_RSA_PSS) {
fprintf(stderr, "FAIL: method ID mismatch (%d != %d)\n",
pkey_id, EVP_PKEY_RSA_PSS);
goto failure;
}
failed = 0;
failure:
return failed;
}
static const struct evp_iv_len_test {
const EVP_CIPHER *(*cipher)(void);
int iv_len;
int setlen;
int expect;
} evp_iv_len_tests[] = {
{
.cipher = EVP_aes_128_ccm,
.iv_len = 7,
.setlen = 11,
.expect = 1,
},
{
.cipher = EVP_aes_128_ccm,
.iv_len = 7,
.setlen = 6,
.expect = 0,
},
{
.cipher = EVP_aes_128_ccm,
.iv_len = 7,
.setlen = 13,
.expect = 1,
},
{
.cipher = EVP_aes_128_ccm,
.iv_len = 7,
.setlen = 14,
.expect = 0,
},
{
.cipher = EVP_aes_192_ccm,
.iv_len = 7,
.setlen = 11,
.expect = 1,
},
{
.cipher = EVP_aes_192_ccm,
.iv_len = 7,
.setlen = 6,
.expect = 0,
},
{
.cipher = EVP_aes_192_ccm,
.iv_len = 7,
.setlen = 13,
.expect = 1,
},
{
.cipher = EVP_aes_192_ccm,
.iv_len = 7,
.setlen = 14,
.expect = 0,
},
{
.cipher = EVP_aes_256_ccm,
.iv_len = 7,
.setlen = 11,
.expect = 1,
},
{
.cipher = EVP_aes_256_ccm,
.iv_len = 7,
.setlen = 6,
.expect = 0,
},
{
.cipher = EVP_aes_256_ccm,
.iv_len = 7,
.setlen = 13,
.expect = 1,
},
{
.cipher = EVP_aes_256_ccm,
.iv_len = 7,
.setlen = 14,
.expect = 0,
},
{
.cipher = EVP_aes_128_gcm,
.iv_len = 12,
.setlen = 16,
.expect = 1,
},
{
.cipher = EVP_aes_128_gcm,
.iv_len = 12,
.setlen = 0,
.expect = 0,
},
{
.cipher = EVP_aes_128_gcm,
.iv_len = 12,
.setlen = 1,
.expect = 1,
},
/* XXX - GCM IV length isn't capped... */
{
.cipher = EVP_aes_128_gcm,
.iv_len = 12,
.setlen = 1024 * 1024,
.expect = 1,
},
{
.cipher = EVP_aes_192_gcm,
.iv_len = 12,
.setlen = 16,
.expect = 1,
},
{
.cipher = EVP_aes_192_gcm,
.iv_len = 12,
.setlen = 0,
.expect = 0,
},
{
.cipher = EVP_aes_192_gcm,
.iv_len = 12,
.setlen = 1,
.expect = 1,
},
/* XXX - GCM IV length isn't capped... */
{
.cipher = EVP_aes_128_gcm,
.iv_len = 12,
.setlen = 1024 * 1024,
.expect = 1,
},
{
.cipher = EVP_aes_256_gcm,
.iv_len = 12,
.setlen = 16,
.expect = 1,
},
{
.cipher = EVP_aes_256_gcm,
.iv_len = 12,
.setlen = 0,
.expect = 0,
},
{
.cipher = EVP_aes_256_gcm,
.iv_len = 12,
.setlen = 1,
.expect = 1,
},
/* XXX - GCM IV length isn't capped... */
{
.cipher = EVP_aes_128_gcm,
.iv_len = 12,
.setlen = 1024 * 1024,
.expect = 1,
},
{
.cipher = EVP_aes_128_ecb,
.iv_len = 0,
.setlen = 11,
.expect = 0,
},
{
.cipher = EVP_chacha20_poly1305,
.iv_len = 12,
.setlen = 11,
.expect = 1,
},
{
.cipher = EVP_chacha20_poly1305,
.iv_len = 12,
.setlen = 12,
.expect = 1,
},
{
.cipher = EVP_chacha20_poly1305,
.iv_len = 12,
.setlen = 13,
.expect = 0,
},
{
.cipher = EVP_chacha20_poly1305,
.iv_len = 12,
.setlen = 1,
.expect = 1,
},
{
.cipher = EVP_chacha20_poly1305,
.iv_len = 12,
.setlen = 0,
.expect = 0,
},
};
#define N_EVP_IV_LEN_TESTS \
(sizeof(evp_iv_len_tests) / sizeof(evp_iv_len_tests[0]))
static int
evp_pkey_iv_len_testcase(const struct evp_iv_len_test *test)
{
const EVP_CIPHER *cipher = test->cipher();
const char *name;
EVP_CIPHER_CTX *ctx;
int ret;
int failure = 1;
assert(cipher != NULL);
name = OBJ_nid2ln(EVP_CIPHER_nid(cipher));
assert(name != NULL);
if ((ctx = EVP_CIPHER_CTX_new()) == NULL) {
fprintf(stderr, "FAIL: %s: EVP_CIPHER_CTX_new()\n", name);
goto failure;
}
if ((ret = EVP_EncryptInit_ex(ctx, cipher, NULL, NULL, NULL)) <= 0) {
fprintf(stderr, "FAIL: %s: EVP_EncryptInit_ex:"
" want %d, got %d\n", name, 1, ret);
goto failure;
}
if ((ret = EVP_CIPHER_CTX_iv_length(ctx)) != test->iv_len) {
fprintf(stderr, "FAIL: %s EVP_CIPHER_CTX_iv_length (before set)"
" want %d, got %d\n", name, test->iv_len, ret);
goto failure;
}
if ((ret = EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_IVLEN,
test->setlen, NULL)) != test->expect) {
fprintf(stderr, "FAIL: %s EVP_CIPHER_CTX_ctrl"
" want %d, got %d\n", name, test->expect, ret);
goto failure;
}
if (test->expect == 0)
goto done;
if ((ret = EVP_CIPHER_CTX_iv_length(ctx)) != test->setlen) {
fprintf(stderr, "FAIL: %s EVP_CIPHER_CTX_iv_length (after set)"
" want %d, got %d\n", name, test->setlen, ret);
goto failure;
}
done:
failure = 0;
failure:
EVP_CIPHER_CTX_free(ctx);
return failure;
}
static int
evp_pkey_iv_len_test(void)
{
size_t i;
int failure = 0;
for (i = 0; i < N_EVP_IV_LEN_TESTS; i++)
failure |= evp_pkey_iv_len_testcase(&evp_iv_len_tests[i]);
return failure;
}
int
main(int argc, char **argv)
{
int failed = 0;
failed |= evp_asn1_method_test();
failed |= evp_pkey_method_test();
failed |= evp_pkey_iv_len_test();
OPENSSL_cleanup();
return failed;
}