Changeset 95219 in vbox for trunk/src/libs/openssl-3.0.3/test/endecode_test.c
- Timestamp:
- Jun 8, 2022 7:43:44 AM (3 years ago)
- svn:sync-xref-src-repo-rev:
- 151730
- Location:
- trunk/src/libs/openssl-3.0.3
- Files:
-
- 2 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/src/libs/openssl-3.0.3
- Property svn:mergeinfo
-
old new 14 14 /vendor/openssl/3.0.1:150323-150324 15 15 /vendor/openssl/3.0.2:150728-150729 16 /vendor/openssl/current:147554-150727 16 /vendor/openssl/3.0.3:151497-151729 17 /vendor/openssl/current:147554-151496
-
- Property svn:mergeinfo
-
trunk/src/libs/openssl-3.0.3/test/endecode_test.c
r94320 r95219 1 1 /* 2 * Copyright 2020-202 1The OpenSSL Project Authors. All Rights Reserved.2 * Copyright 2020-2022 The OpenSSL Project Authors. All Rights Reserved. 3 3 * 4 4 * Licensed under the Apache License 2.0 (the "License"). You may not use … … 144 144 145 145 #define FLAG_DECODE_WITH_TYPE 0x0001 146 #define FLAG_FAIL_IF_FIPS 0x0002 146 147 147 148 static int test_encode_decode(const char *file, const int line, … … 167 168 */ 168 169 if (!TEST_true(encode_cb(file, line, &encoded, &encoded_len, pkey, selection, 169 output_type, output_structure, pass, pcipher)) 170 || !TEST_true(check_cb(file, line, type, encoded, encoded_len)) 170 output_type, output_structure, pass, pcipher))) 171 goto end; 172 173 if ((flags & FLAG_FAIL_IF_FIPS) != 0 && is_fips) { 174 if (TEST_false(decode_cb(file, line, (void **)&pkey2, encoded, 175 encoded_len, output_type, output_structure, 176 (flags & FLAG_DECODE_WITH_TYPE ? type : NULL), 177 selection, pass))) 178 ok = 1; 179 goto end; 180 } 181 182 if (!TEST_true(check_cb(file, line, type, encoded, encoded_len)) 171 183 || !TEST_true(decode_cb(file, line, (void **)&pkey2, encoded, encoded_len, 172 184 output_type, output_structure, … … 522 534 } 523 535 524 static int test_unprotected_via_DER(const char *type, EVP_PKEY *key )536 static int test_unprotected_via_DER(const char *type, EVP_PKEY *key, int fips) 525 537 { 526 538 return test_encode_decode(__FILE__, __LINE__, type, key, … … 530 542 encode_EVP_PKEY_prov, decode_EVP_PKEY_prov, 531 543 test_mem, check_unprotected_PKCS8_DER, 532 dump_der, 0);544 dump_der, fips ? 0 : FLAG_FAIL_IF_FIPS); 533 545 } 534 546 … … 544 556 } 545 557 546 static int test_unprotected_via_PEM(const char *type, EVP_PKEY *key )558 static int test_unprotected_via_PEM(const char *type, EVP_PKEY *key, int fips) 547 559 { 548 560 return test_encode_decode(__FILE__, __LINE__, type, key, … … 552 564 encode_EVP_PKEY_prov, decode_EVP_PKEY_prov, 553 565 test_text, check_unprotected_PKCS8_PEM, 554 dump_pem, 0);566 dump_pem, fips ? 0 : FLAG_FAIL_IF_FIPS); 555 567 } 556 568 … … 699 711 } 700 712 701 static int test_protected_via_DER(const char *type, EVP_PKEY *key )713 static int test_protected_via_DER(const char *type, EVP_PKEY *key, int fips) 702 714 { 703 715 return test_encode_decode(__FILE__, __LINE__, type, key, … … 708 720 encode_EVP_PKEY_prov, decode_EVP_PKEY_prov, 709 721 test_mem, check_protected_PKCS8_DER, 710 dump_der, 0);722 dump_der, fips ? 0 : FLAG_FAIL_IF_FIPS); 711 723 } 712 724 … … 722 734 } 723 735 724 static int test_protected_via_PEM(const char *type, EVP_PKEY *key )736 static int test_protected_via_PEM(const char *type, EVP_PKEY *key, int fips) 725 737 { 726 738 return test_encode_decode(__FILE__, __LINE__, type, key, … … 731 743 encode_EVP_PKEY_prov, decode_EVP_PKEY_prov, 732 744 test_text, check_protected_PKCS8_PEM, 733 dump_pem, 0);745 dump_pem, fips ? 0 : FLAG_FAIL_IF_FIPS); 734 746 } 735 747 … … 792 804 } 793 805 794 static int test_public_via_DER(const char *type, EVP_PKEY *key )806 static int test_public_via_DER(const char *type, EVP_PKEY *key, int fips) 795 807 { 796 808 return test_encode_decode(__FILE__, __LINE__, type, key, … … 799 811 "DER", "SubjectPublicKeyInfo", NULL, NULL, 800 812 encode_EVP_PKEY_prov, decode_EVP_PKEY_prov, 801 test_mem, check_public_DER, dump_der, 0); 813 test_mem, check_public_DER, dump_der, 814 fips ? 0 : FLAG_FAIL_IF_FIPS); 802 815 } 803 816 … … 813 826 } 814 827 815 static int test_public_via_PEM(const char *type, EVP_PKEY *key )828 static int test_public_via_PEM(const char *type, EVP_PKEY *key, int fips) 816 829 { 817 830 return test_encode_decode(__FILE__, __LINE__, type, key, … … 820 833 "PEM", "SubjectPublicKeyInfo", NULL, NULL, 821 834 encode_EVP_PKEY_prov, decode_EVP_PKEY_prov, 822 test_text, check_public_PEM, dump_pem, 0); 835 test_text, check_public_PEM, dump_pem, 836 fips ? 0 : FLAG_FAIL_IF_FIPS); 823 837 } 824 838 … … 865 879 EVP_PKEY_free(key_##KEYTYPE) 866 880 867 #define IMPLEMENT_TEST_SUITE(KEYTYPE, KEYTYPEstr )\881 #define IMPLEMENT_TEST_SUITE(KEYTYPE, KEYTYPEstr, fips) \ 868 882 static int test_unprotected_##KEYTYPE##_via_DER(void) \ 869 883 { \ 870 return test_unprotected_via_DER(KEYTYPEstr, key_##KEYTYPE );\884 return test_unprotected_via_DER(KEYTYPEstr, key_##KEYTYPE, fips); \ 871 885 } \ 872 886 static int test_unprotected_##KEYTYPE##_via_PEM(void) \ 873 887 { \ 874 return test_unprotected_via_PEM(KEYTYPEstr, key_##KEYTYPE );\888 return test_unprotected_via_PEM(KEYTYPEstr, key_##KEYTYPE, fips); \ 875 889 } \ 876 890 static int test_protected_##KEYTYPE##_via_DER(void) \ 877 891 { \ 878 return test_protected_via_DER(KEYTYPEstr, key_##KEYTYPE );\892 return test_protected_via_DER(KEYTYPEstr, key_##KEYTYPE, fips); \ 879 893 } \ 880 894 static int test_protected_##KEYTYPE##_via_PEM(void) \ 881 895 { \ 882 return test_protected_via_PEM(KEYTYPEstr, key_##KEYTYPE );\896 return test_protected_via_PEM(KEYTYPEstr, key_##KEYTYPE, fips); \ 883 897 } \ 884 898 static int test_public_##KEYTYPE##_via_DER(void) \ 885 899 { \ 886 return test_public_via_DER(KEYTYPEstr, key_##KEYTYPE );\900 return test_public_via_DER(KEYTYPEstr, key_##KEYTYPE, fips); \ 887 901 } \ 888 902 static int test_public_##KEYTYPE##_via_PEM(void) \ 889 903 { \ 890 return test_public_via_PEM(KEYTYPEstr, key_##KEYTYPE );\904 return test_public_via_PEM(KEYTYPEstr, key_##KEYTYPE, fips); \ 891 905 } 892 906 … … 962 976 #ifndef OPENSSL_NO_DH 963 977 DOMAIN_KEYS(DH); 964 IMPLEMENT_TEST_SUITE(DH, "DH" )978 IMPLEMENT_TEST_SUITE(DH, "DH", 1) 965 979 IMPLEMENT_TEST_SUITE_PARAMS(DH, "DH") 966 980 DOMAIN_KEYS(DHX); 967 IMPLEMENT_TEST_SUITE(DHX, "X9.42 DH" )981 IMPLEMENT_TEST_SUITE(DHX, "X9.42 DH", 1) 968 982 IMPLEMENT_TEST_SUITE_PARAMS(DHX, "X9.42 DH") 969 983 /* … … 974 988 #ifndef OPENSSL_NO_DSA 975 989 DOMAIN_KEYS(DSA); 976 IMPLEMENT_TEST_SUITE(DSA, "DSA" )990 IMPLEMENT_TEST_SUITE(DSA, "DSA", 1) 977 991 IMPLEMENT_TEST_SUITE_PARAMS(DSA, "DSA") 978 992 IMPLEMENT_TEST_SUITE_LEGACY(DSA, "DSA") … … 985 999 #ifndef OPENSSL_NO_EC 986 1000 DOMAIN_KEYS(EC); 987 IMPLEMENT_TEST_SUITE(EC, "EC" )1001 IMPLEMENT_TEST_SUITE(EC, "EC", 1) 988 1002 IMPLEMENT_TEST_SUITE_PARAMS(EC, "EC") 989 1003 IMPLEMENT_TEST_SUITE_LEGACY(EC, "EC") 990 1004 DOMAIN_KEYS(ECExplicitPrimeNamedCurve); 991 IMPLEMENT_TEST_SUITE(ECExplicitPrimeNamedCurve, "EC" )1005 IMPLEMENT_TEST_SUITE(ECExplicitPrimeNamedCurve, "EC", 1) 992 1006 IMPLEMENT_TEST_SUITE_LEGACY(ECExplicitPrimeNamedCurve, "EC") 993 1007 DOMAIN_KEYS(ECExplicitPrime2G); 994 IMPLEMENT_TEST_SUITE(ECExplicitPrime2G, "EC" )1008 IMPLEMENT_TEST_SUITE(ECExplicitPrime2G, "EC", 0) 995 1009 IMPLEMENT_TEST_SUITE_LEGACY(ECExplicitPrime2G, "EC") 996 1010 # ifndef OPENSSL_NO_EC2M 997 1011 DOMAIN_KEYS(ECExplicitTriNamedCurve); 998 IMPLEMENT_TEST_SUITE(ECExplicitTriNamedCurve, "EC" )1012 IMPLEMENT_TEST_SUITE(ECExplicitTriNamedCurve, "EC", 1) 999 1013 IMPLEMENT_TEST_SUITE_LEGACY(ECExplicitTriNamedCurve, "EC") 1000 1014 DOMAIN_KEYS(ECExplicitTri2G); 1001 IMPLEMENT_TEST_SUITE(ECExplicitTri2G, "EC" )1015 IMPLEMENT_TEST_SUITE(ECExplicitTri2G, "EC", 0) 1002 1016 IMPLEMENT_TEST_SUITE_LEGACY(ECExplicitTri2G, "EC") 1003 1017 # endif 1004 1018 KEYS(ED25519); 1005 IMPLEMENT_TEST_SUITE(ED25519, "ED25519" )1019 IMPLEMENT_TEST_SUITE(ED25519, "ED25519", 1) 1006 1020 KEYS(ED448); 1007 IMPLEMENT_TEST_SUITE(ED448, "ED448" )1021 IMPLEMENT_TEST_SUITE(ED448, "ED448", 1) 1008 1022 KEYS(X25519); 1009 IMPLEMENT_TEST_SUITE(X25519, "X25519" )1023 IMPLEMENT_TEST_SUITE(X25519, "X25519", 1) 1010 1024 KEYS(X448); 1011 IMPLEMENT_TEST_SUITE(X448, "X448" )1025 IMPLEMENT_TEST_SUITE(X448, "X448", 1) 1012 1026 /* 1013 1027 * ED25519, ED448, X25519 and X448 have no support for … … 1016 1030 #endif 1017 1031 KEYS(RSA); 1018 IMPLEMENT_TEST_SUITE(RSA, "RSA" )1032 IMPLEMENT_TEST_SUITE(RSA, "RSA", 1) 1019 1033 IMPLEMENT_TEST_SUITE_LEGACY(RSA, "RSA") 1020 1034 KEYS(RSA_PSS); 1021 IMPLEMENT_TEST_SUITE(RSA_PSS, "RSA-PSS" )1035 IMPLEMENT_TEST_SUITE(RSA_PSS, "RSA-PSS", 1) 1022 1036 /* 1023 1037 * RSA-PSS has no support for PEM_write_bio_PrivateKey_traditional(),
Note:
See TracChangeset
for help on using the changeset viewer.