1 /* 2 * Copyright 2015-2024 The OpenSSL Project Authors. All Rights Reserved. 3 * 4 * Licensed under the Apache License 2.0 (the "License"). You may not use 5 * this file except in compliance with the License. You can obtain a copy 6 * in the file LICENSE in the source distribution or at 7 * https://www.openssl.org/source/license.html 8 */ 9 10 /* We need to use some deprecated APIs */ 11 #define OPENSSL_SUPPRESS_DEPRECATED 12 13 #include <stdio.h> 14 #include <stdlib.h> 15 #include <string.h> 16 #include <openssl/bio.h> 17 #include <openssl/conf.h> 18 #include <openssl/crypto.h> 19 #include <openssl/err.h> 20 #include <openssl/evp.h> 21 #include <openssl/x509.h> 22 #include <openssl/pem.h> 23 #include <openssl/kdf.h> 24 #include <openssl/provider.h> 25 #include <openssl/core_names.h> 26 #include <openssl/params.h> 27 #include <openssl/param_build.h> 28 #include <openssl/dsa.h> 29 #include <openssl/dh.h> 30 #include <openssl/aes.h> 31 #include <openssl/decoder.h> 32 #include <openssl/rsa.h> 33 #include <openssl/engine.h> 34 #include <openssl/proverr.h> 35 #include "testutil.h" 36 #include "internal/nelem.h" 37 #include "internal/sizes.h" 38 #include "crypto/evp.h" 39 40 #ifdef STATIC_LEGACY 41 OSSL_provider_init_fn ossl_legacy_provider_init; 42 #endif 43 44 static OSSL_LIB_CTX *testctx = NULL; 45 static char *testpropq = NULL; 46 47 static OSSL_PROVIDER *nullprov = NULL; 48 static OSSL_PROVIDER *deflprov = NULL; 49 static OSSL_PROVIDER *lgcyprov = NULL; 50 51 /* 52 * kExampleRSAKeyDER is an RSA private key in ASN.1, DER format. Of course, you 53 * should never use this key anywhere but in an example. 54 */ 55 static const unsigned char kExampleRSAKeyDER[] = { 56 0x30, 0x82, 0x02, 0x5c, 0x02, 0x01, 0x00, 0x02, 0x81, 0x81, 0x00, 0xf8, 57 0xb8, 0x6c, 0x83, 0xb4, 0xbc, 0xd9, 0xa8, 0x57, 0xc0, 0xa5, 0xb4, 0x59, 58 0x76, 0x8c, 0x54, 0x1d, 0x79, 0xeb, 0x22, 0x52, 0x04, 0x7e, 0xd3, 0x37, 59 0xeb, 0x41, 0xfd, 0x83, 0xf9, 0xf0, 0xa6, 0x85, 0x15, 0x34, 0x75, 0x71, 60 0x5a, 0x84, 0xa8, 0x3c, 0xd2, 0xef, 0x5a, 0x4e, 0xd3, 0xde, 0x97, 0x8a, 61 0xdd, 0xff, 0xbb, 0xcf, 0x0a, 0xaa, 0x86, 0x92, 0xbe, 0xb8, 0x50, 0xe4, 62 0xcd, 0x6f, 0x80, 0x33, 0x30, 0x76, 0x13, 0x8f, 0xca, 0x7b, 0xdc, 0xec, 63 0x5a, 0xca, 0x63, 0xc7, 0x03, 0x25, 0xef, 0xa8, 0x8a, 0x83, 0x58, 0x76, 64 0x20, 0xfa, 0x16, 0x77, 0xd7, 0x79, 0x92, 0x63, 0x01, 0x48, 0x1a, 0xd8, 65 0x7b, 0x67, 0xf1, 0x52, 0x55, 0x49, 0x4e, 0xd6, 0x6e, 0x4a, 0x5c, 0xd7, 66 0x7a, 0x37, 0x36, 0x0c, 0xde, 0xdd, 0x8f, 0x44, 0xe8, 0xc2, 0xa7, 0x2c, 67 0x2b, 0xb5, 0xaf, 0x64, 0x4b, 0x61, 0x07, 0x02, 0x03, 0x01, 0x00, 0x01, 68 0x02, 0x81, 0x80, 0x74, 0x88, 0x64, 0x3f, 0x69, 0x45, 0x3a, 0x6d, 0xc7, 69 0x7f, 0xb9, 0xa3, 0xc0, 0x6e, 0xec, 0xdc, 0xd4, 0x5a, 0xb5, 0x32, 0x85, 70 0x5f, 0x19, 0xd4, 0xf8, 0xd4, 0x3f, 0x3c, 0xfa, 0xc2, 0xf6, 0x5f, 0xee, 71 0xe6, 0xba, 0x87, 0x74, 0x2e, 0xc7, 0x0c, 0xd4, 0x42, 0xb8, 0x66, 0x85, 72 0x9c, 0x7b, 0x24, 0x61, 0xaa, 0x16, 0x11, 0xf6, 0xb5, 0xb6, 0xa4, 0x0a, 73 0xc9, 0x55, 0x2e, 0x81, 0xa5, 0x47, 0x61, 0xcb, 0x25, 0x8f, 0xc2, 0x15, 74 0x7b, 0x0e, 0x7c, 0x36, 0x9f, 0x3a, 0xda, 0x58, 0x86, 0x1c, 0x5b, 0x83, 75 0x79, 0xe6, 0x2b, 0xcc, 0xe6, 0xfa, 0x2c, 0x61, 0xf2, 0x78, 0x80, 0x1b, 76 0xe2, 0xf3, 0x9d, 0x39, 0x2b, 0x65, 0x57, 0x91, 0x3d, 0x71, 0x99, 0x73, 77 0xa5, 0xc2, 0x79, 0x20, 0x8c, 0x07, 0x4f, 0xe5, 0xb4, 0x60, 0x1f, 0x99, 78 0xa2, 0xb1, 0x4f, 0x0c, 0xef, 0xbc, 0x59, 0x53, 0x00, 0x7d, 0xb1, 0x02, 79 0x41, 0x00, 0xfc, 0x7e, 0x23, 0x65, 0x70, 0xf8, 0xce, 0xd3, 0x40, 0x41, 80 0x80, 0x6a, 0x1d, 0x01, 0xd6, 0x01, 0xff, 0xb6, 0x1b, 0x3d, 0x3d, 0x59, 81 0x09, 0x33, 0x79, 0xc0, 0x4f, 0xde, 0x96, 0x27, 0x4b, 0x18, 0xc6, 0xd9, 82 0x78, 0xf1, 0xf4, 0x35, 0x46, 0xe9, 0x7c, 0x42, 0x7a, 0x5d, 0x9f, 0xef, 83 0x54, 0xb8, 0xf7, 0x9f, 0xc4, 0x33, 0x6c, 0xf3, 0x8c, 0x32, 0x46, 0x87, 84 0x67, 0x30, 0x7b, 0xa7, 0xac, 0xe3, 0x02, 0x41, 0x00, 0xfc, 0x2c, 0xdf, 85 0x0c, 0x0d, 0x88, 0xf5, 0xb1, 0x92, 0xa8, 0x93, 0x47, 0x63, 0x55, 0xf5, 86 0xca, 0x58, 0x43, 0xba, 0x1c, 0xe5, 0x9e, 0xb6, 0x95, 0x05, 0xcd, 0xb5, 87 0x82, 0xdf, 0xeb, 0x04, 0x53, 0x9d, 0xbd, 0xc2, 0x38, 0x16, 0xb3, 0x62, 88 0xdd, 0xa1, 0x46, 0xdb, 0x6d, 0x97, 0x93, 0x9f, 0x8a, 0xc3, 0x9b, 0x64, 89 0x7e, 0x42, 0xe3, 0x32, 0x57, 0x19, 0x1b, 0xd5, 0x6e, 0x85, 0xfa, 0xb8, 90 0x8d, 0x02, 0x41, 0x00, 0xbc, 0x3d, 0xde, 0x6d, 0xd6, 0x97, 0xe8, 0xba, 91 0x9e, 0x81, 0x37, 0x17, 0xe5, 0xa0, 0x64, 0xc9, 0x00, 0xb7, 0xe7, 0xfe, 92 0xf4, 0x29, 0xd9, 0x2e, 0x43, 0x6b, 0x19, 0x20, 0xbd, 0x99, 0x75, 0xe7, 93 0x76, 0xf8, 0xd3, 0xae, 0xaf, 0x7e, 0xb8, 0xeb, 0x81, 0xf4, 0x9d, 0xfe, 94 0x07, 0x2b, 0x0b, 0x63, 0x0b, 0x5a, 0x55, 0x90, 0x71, 0x7d, 0xf1, 0xdb, 95 0xd9, 0xb1, 0x41, 0x41, 0x68, 0x2f, 0x4e, 0x39, 0x02, 0x40, 0x5a, 0x34, 96 0x66, 0xd8, 0xf5, 0xe2, 0x7f, 0x18, 0xb5, 0x00, 0x6e, 0x26, 0x84, 0x27, 97 0x14, 0x93, 0xfb, 0xfc, 0xc6, 0x0f, 0x5e, 0x27, 0xe6, 0xe1, 0xe9, 0xc0, 98 0x8a, 0xe4, 0x34, 0xda, 0xe9, 0xa2, 0x4b, 0x73, 0xbc, 0x8c, 0xb9, 0xba, 99 0x13, 0x6c, 0x7a, 0x2b, 0x51, 0x84, 0xa3, 0x4a, 0xe0, 0x30, 0x10, 0x06, 100 0x7e, 0xed, 0x17, 0x5a, 0x14, 0x00, 0xc9, 0xef, 0x85, 0xea, 0x52, 0x2c, 101 0xbc, 0x65, 0x02, 0x40, 0x51, 0xe3, 0xf2, 0x83, 0x19, 0x9b, 0xc4, 0x1e, 102 0x2f, 0x50, 0x3d, 0xdf, 0x5a, 0xa2, 0x18, 0xca, 0x5f, 0x2e, 0x49, 0xaf, 103 0x6f, 0xcc, 0xfa, 0x65, 0x77, 0x94, 0xb5, 0xa1, 0x0a, 0xa9, 0xd1, 0x8a, 104 0x39, 0x37, 0xf4, 0x0b, 0xa0, 0xd7, 0x82, 0x27, 0x5e, 0xae, 0x17, 0x17, 105 0xa1, 0x1e, 0x54, 0x34, 0xbf, 0x6e, 0xc4, 0x8e, 0x99, 0x5d, 0x08, 0xf1, 106 0x2d, 0x86, 0x9d, 0xa5, 0x20, 0x1b, 0xe5, 0xdf, 107 }; 108 109 /* 110 * kExampleDSAKeyDER is a DSA private key in ASN.1, DER format. Of course, you 111 * should never use this key anywhere but in an example. 112 */ 113 #ifndef OPENSSL_NO_DSA 114 static const unsigned char kExampleDSAKeyDER[] = { 115 0x30, 0x82, 0x01, 0xba, 0x02, 0x01, 0x00, 0x02, 0x81, 0x81, 0x00, 0x9a, 116 0x05, 0x6d, 0x33, 0xcd, 0x5d, 0x78, 0xa1, 0xbb, 0xcb, 0x7d, 0x5b, 0x8d, 117 0xb4, 0xcc, 0xbf, 0x03, 0x99, 0x64, 0xde, 0x38, 0x78, 0x06, 0x15, 0x2f, 118 0x86, 0x26, 0x77, 0xf3, 0xb1, 0x85, 0x00, 0xed, 0xfc, 0x28, 0x3a, 0x42, 119 0x4d, 0xab, 0xab, 0xdf, 0xbc, 0x9c, 0x16, 0xd0, 0x22, 0x50, 0xd1, 0x38, 120 0xdd, 0x3f, 0x64, 0x05, 0x9e, 0x68, 0x7a, 0x1e, 0xf1, 0x56, 0xbf, 0x1e, 121 0x2c, 0xc5, 0x97, 0x2a, 0xfe, 0x7a, 0x22, 0xdc, 0x6c, 0x68, 0xb8, 0x2e, 122 0x06, 0xdb, 0x41, 0xca, 0x98, 0xd8, 0x54, 0xc7, 0x64, 0x48, 0x24, 0x04, 123 0x20, 0xbc, 0x59, 0xe3, 0x6b, 0xea, 0x7e, 0xfc, 0x7e, 0xc5, 0x4e, 0xd4, 124 0xd8, 0x3a, 0xed, 0xcd, 0x5d, 0x99, 0xb8, 0x5c, 0xa2, 0x8b, 0xbb, 0x0b, 125 0xac, 0xe6, 0x8e, 0x25, 0x56, 0x22, 0x3a, 0x2d, 0x3a, 0x56, 0x41, 0x14, 126 0x1f, 0x1c, 0x8f, 0x53, 0x46, 0x13, 0x85, 0x02, 0x15, 0x00, 0x98, 0x7e, 127 0x92, 0x81, 0x88, 0xc7, 0x3f, 0x70, 0x49, 0x54, 0xf6, 0x76, 0xb4, 0xa3, 128 0x9e, 0x1d, 0x45, 0x98, 0x32, 0x7f, 0x02, 0x81, 0x80, 0x69, 0x4d, 0xef, 129 0x55, 0xff, 0x4d, 0x59, 0x2c, 0x01, 0xfa, 0x6a, 0x38, 0xe0, 0x70, 0x9f, 130 0x9e, 0x66, 0x8e, 0x3e, 0x8c, 0x52, 0x22, 0x9d, 0x15, 0x7e, 0x3c, 0xef, 131 0x4c, 0x7a, 0x61, 0x26, 0xe0, 0x2b, 0x81, 0x3f, 0xeb, 0xaf, 0x35, 0x38, 132 0x8d, 0xfe, 0xed, 0x46, 0xff, 0x5f, 0x03, 0x9b, 0x81, 0x92, 0xe7, 0x6f, 133 0x76, 0x4f, 0x1d, 0xd9, 0xbb, 0x89, 0xc9, 0x3e, 0xd9, 0x0b, 0xf9, 0xf4, 134 0x78, 0x11, 0x59, 0xc0, 0x1d, 0xcd, 0x0e, 0xa1, 0x6f, 0x15, 0xf1, 0x4d, 135 0xc1, 0xc9, 0x22, 0xed, 0x8d, 0xad, 0x67, 0xc5, 0x4b, 0x95, 0x93, 0x86, 136 0xa6, 0xaf, 0x8a, 0xee, 0x06, 0x89, 0x2f, 0x37, 0x7e, 0x64, 0xaa, 0xf6, 137 0xe7, 0xb1, 0x5a, 0x0a, 0x93, 0x95, 0x5d, 0x3e, 0x53, 0x9a, 0xde, 0x8a, 138 0xc2, 0x95, 0x45, 0x81, 0xbe, 0x5c, 0x2f, 0xc2, 0xb2, 0x92, 0x58, 0x19, 139 0x72, 0x80, 0xe9, 0x79, 0xa1, 0x02, 0x81, 0x80, 0x07, 0xd7, 0x62, 0xff, 140 0xdf, 0x1a, 0x3f, 0xed, 0x32, 0xd4, 0xd4, 0x88, 0x7b, 0x2c, 0x63, 0x7f, 141 0x97, 0xdc, 0x44, 0xd4, 0x84, 0xa2, 0xdd, 0x17, 0x16, 0x85, 0x13, 0xe0, 142 0xac, 0x51, 0x8d, 0x29, 0x1b, 0x75, 0x9a, 0xe4, 0xe3, 0x8a, 0x92, 0x69, 143 0x09, 0x03, 0xc5, 0x68, 0xae, 0x5e, 0x94, 0xfe, 0xc9, 0x92, 0x6c, 0x07, 144 0xb4, 0x1e, 0x64, 0x62, 0x87, 0xc6, 0xa4, 0xfd, 0x0d, 0x5f, 0xe5, 0xf9, 145 0x1b, 0x4f, 0x85, 0x5f, 0xae, 0xf3, 0x11, 0xe5, 0x18, 0xd4, 0x4d, 0x79, 146 0x9f, 0xc4, 0x79, 0x26, 0x04, 0x27, 0xf0, 0x0b, 0xee, 0x2b, 0x86, 0x9f, 147 0x86, 0x61, 0xe6, 0x51, 0xce, 0x04, 0x9b, 0x5d, 0x6b, 0x34, 0x43, 0x8c, 148 0x85, 0x3c, 0xf1, 0x51, 0x9b, 0x08, 0x23, 0x1b, 0xf5, 0x7e, 0x33, 0x12, 149 0xea, 0xab, 0x1f, 0xb7, 0x2d, 0xe2, 0x5f, 0xe6, 0x97, 0x99, 0xb5, 0x45, 150 0x16, 0x5b, 0xc3, 0x41, 0x02, 0x14, 0x61, 0xbf, 0x51, 0x60, 0xcf, 0xc8, 151 0xf1, 0x8c, 0x82, 0x97, 0xf2, 0xf4, 0x19, 0xba, 0x2b, 0xf3, 0x16, 0xbe, 152 0x40, 0x48 153 }; 154 #endif 155 156 /* 157 * kExampleBadRSAKeyDER is an RSA private key in ASN.1, DER format. The private 158 * components are not correct. 159 */ 160 static const unsigned char kExampleBadRSAKeyDER[] = { 161 0x30, 0x82, 0x04, 0x27, 0x02, 0x01, 0x00, 0x02, 0x82, 0x01, 0x01, 0x00, 162 0xa6, 0x1a, 0x1e, 0x6e, 0x7b, 0xee, 0xc6, 0x89, 0x66, 0xe7, 0x93, 0xef, 163 0x54, 0x12, 0x68, 0xea, 0xbf, 0x86, 0x2f, 0xdd, 0xd2, 0x79, 0xb8, 0xa9, 164 0x6e, 0x03, 0xc2, 0xa3, 0xb9, 0xa3, 0xe1, 0x4b, 0x2a, 0xb3, 0xf8, 0xb4, 165 0xcd, 0xea, 0xbe, 0x24, 0xa6, 0x57, 0x5b, 0x83, 0x1f, 0x0f, 0xf2, 0xd3, 166 0xb7, 0xac, 0x7e, 0xd6, 0x8e, 0x6e, 0x1e, 0xbf, 0xb8, 0x73, 0x8c, 0x05, 167 0x56, 0xe6, 0x35, 0x1f, 0xe9, 0x04, 0x0b, 0x09, 0x86, 0x7d, 0xf1, 0x26, 168 0x08, 0x99, 0xad, 0x7b, 0xc8, 0x4d, 0x94, 0xb0, 0x0b, 0x8b, 0x38, 0xa0, 169 0x5c, 0x62, 0xa0, 0xab, 0xd3, 0x8f, 0xd4, 0x09, 0x60, 0x72, 0x1e, 0x33, 170 0x50, 0x80, 0x6e, 0x22, 0xa6, 0x77, 0x57, 0x6b, 0x9a, 0x33, 0x21, 0x66, 171 0x87, 0x6e, 0x21, 0x7b, 0xc7, 0x24, 0x0e, 0xd8, 0x13, 0xdf, 0x83, 0xde, 172 0xcd, 0x40, 0x58, 0x1d, 0x84, 0x86, 0xeb, 0xb8, 0x12, 0x4e, 0xd2, 0xfa, 173 0x80, 0x1f, 0xe4, 0xe7, 0x96, 0x29, 0xb8, 0xcc, 0xce, 0x66, 0x6d, 0x53, 174 0xca, 0xb9, 0x5a, 0xd7, 0xf6, 0x84, 0x6c, 0x2d, 0x9a, 0x1a, 0x14, 0x1c, 175 0x4e, 0x93, 0x39, 0xba, 0x74, 0xed, 0xed, 0x87, 0x87, 0x5e, 0x48, 0x75, 176 0x36, 0xf0, 0xbc, 0x34, 0xfb, 0x29, 0xf9, 0x9f, 0x96, 0x5b, 0x0b, 0xa7, 177 0x54, 0x30, 0x51, 0x29, 0x18, 0x5b, 0x7d, 0xac, 0x0f, 0xd6, 0x5f, 0x7c, 178 0xf8, 0x98, 0x8c, 0xd8, 0x86, 0x62, 0xb3, 0xdc, 0xff, 0x0f, 0xff, 0x7a, 179 0xaf, 0x5c, 0x4c, 0x61, 0x49, 0x2e, 0xc8, 0x95, 0x86, 0xc4, 0x0e, 0x87, 180 0xfc, 0x1d, 0xcf, 0x8b, 0x7c, 0x61, 0xf6, 0xd8, 0xd0, 0x69, 0xf6, 0xcd, 181 0x8a, 0x8c, 0xf6, 0x62, 0xa2, 0x56, 0xa9, 0xe3, 0xd1, 0xcf, 0x4d, 0xa0, 182 0xf6, 0x2d, 0x20, 0x0a, 0x04, 0xb7, 0xa2, 0xf7, 0xb5, 0x99, 0x47, 0x18, 183 0x56, 0x85, 0x87, 0xc7, 0x02, 0x03, 0x01, 0x00, 0x01, 0x02, 0x82, 0x01, 184 0x01, 0x00, 0x99, 0x41, 0x38, 0x1a, 0xd0, 0x96, 0x7a, 0xf0, 0x83, 0xd5, 185 0xdf, 0x94, 0xce, 0x89, 0x3d, 0xec, 0x7a, 0x52, 0x21, 0x10, 0x16, 0x06, 186 0xe0, 0xee, 0xd2, 0xe6, 0xfd, 0x4b, 0x7b, 0x19, 0x4d, 0xe1, 0xc0, 0xc0, 187 0xd5, 0x14, 0x5d, 0x79, 0xdd, 0x7e, 0x8b, 0x4b, 0xc6, 0xcf, 0xb0, 0x75, 188 0x52, 0xa3, 0x2d, 0xb1, 0x26, 0x46, 0x68, 0x9c, 0x0a, 0x1a, 0xf2, 0xe1, 189 0x09, 0xac, 0x53, 0x85, 0x8c, 0x36, 0xa9, 0x14, 0x65, 0xea, 0xa0, 0x00, 190 0xcb, 0xe3, 0x3f, 0xc4, 0x2b, 0x61, 0x2e, 0x6b, 0x06, 0x69, 0x77, 0xfd, 191 0x38, 0x7e, 0x1d, 0x3f, 0x92, 0xe7, 0x77, 0x08, 0x19, 0xa7, 0x9d, 0x29, 192 0x2d, 0xdc, 0x42, 0xc6, 0x7c, 0xd7, 0xd3, 0xa8, 0x01, 0x2c, 0xf2, 0xd5, 193 0x82, 0x57, 0xcb, 0x55, 0x3d, 0xe7, 0xaa, 0xd2, 0x06, 0x30, 0x30, 0x05, 194 0xe6, 0xf2, 0x47, 0x86, 0xba, 0xc6, 0x61, 0x64, 0xeb, 0x4f, 0x2a, 0x5e, 195 0x07, 0x29, 0xe0, 0x96, 0xb2, 0x43, 0xff, 0x5f, 0x1a, 0x54, 0x16, 0xcf, 196 0xb5, 0x56, 0x5c, 0xa0, 0x9b, 0x0c, 0xfd, 0xb3, 0xd2, 0xe3, 0x79, 0x1d, 197 0x21, 0xe2, 0xd6, 0x13, 0xc4, 0x74, 0xa6, 0xf5, 0x8e, 0x8e, 0x81, 0xbb, 198 0xb4, 0xad, 0x8a, 0xf0, 0x93, 0x0a, 0xd8, 0x0a, 0x42, 0x36, 0xbc, 0xe5, 199 0x26, 0x2a, 0x0d, 0x5d, 0x57, 0x13, 0xc5, 0x4e, 0x2f, 0x12, 0x0e, 0xef, 200 0xa7, 0x81, 0x1e, 0xc3, 0xa5, 0xdb, 0xc9, 0x24, 0xeb, 0x1a, 0xa1, 0xf9, 201 0xf6, 0xa1, 0x78, 0x98, 0x93, 0x77, 0x42, 0x45, 0x03, 0xe2, 0xc9, 0xa2, 202 0xfe, 0x2d, 0x77, 0xc8, 0xc6, 0xac, 0x9b, 0x98, 0x89, 0x6d, 0x9a, 0xe7, 203 0x61, 0x63, 0xb7, 0xf2, 0xec, 0xd6, 0xb1, 0xa1, 0x6e, 0x0a, 0x1a, 0xff, 204 0xfd, 0x43, 0x28, 0xc3, 0x0c, 0xdc, 0xf2, 0x47, 0x4f, 0x27, 0xaa, 0x99, 205 0x04, 0x8e, 0xac, 0xe8, 0x7c, 0x01, 0x02, 0x04, 0x12, 0x34, 0x56, 0x78, 206 0x02, 0x81, 0x81, 0x00, 0xca, 0x69, 0xe5, 0xbb, 0x3a, 0x90, 0x82, 0xcb, 207 0x82, 0x50, 0x2f, 0x29, 0xe2, 0x76, 0x6a, 0x57, 0x55, 0x45, 0x4e, 0x35, 208 0x18, 0x61, 0xe0, 0x12, 0x70, 0xc0, 0xab, 0xc7, 0x80, 0xa2, 0xd4, 0x46, 209 0x34, 0x03, 0xa0, 0x19, 0x26, 0x23, 0x9e, 0xef, 0x1a, 0xcb, 0x75, 0xd6, 210 0xba, 0x81, 0xf4, 0x7e, 0x52, 0xe5, 0x2a, 0xe8, 0xf1, 0x49, 0x6c, 0x0f, 211 0x1a, 0xa0, 0xf9, 0xc6, 0xe7, 0xec, 0x60, 0xe4, 0xcb, 0x2a, 0xb5, 0x56, 212 0xe9, 0x9c, 0xcd, 0x19, 0x75, 0x92, 0xb1, 0x66, 0xce, 0xc3, 0xd9, 0x3d, 213 0x11, 0xcb, 0xc4, 0x09, 0xce, 0x1e, 0x30, 0xba, 0x2f, 0x60, 0x60, 0x55, 214 0x8d, 0x02, 0xdc, 0x5d, 0xaf, 0xf7, 0x52, 0x31, 0x17, 0x07, 0x53, 0x20, 215 0x33, 0xad, 0x8c, 0xd5, 0x2f, 0x5a, 0xd0, 0x57, 0xd7, 0xd1, 0x80, 0xd6, 216 0x3a, 0x9b, 0x04, 0x4f, 0x35, 0xbf, 0xe7, 0xd5, 0xbc, 0x8f, 0xd4, 0x81, 217 0x02, 0x81, 0x81, 0x00, 0xc0, 0x9f, 0xf8, 0xcd, 0xf7, 0x3f, 0x26, 0x8a, 218 0x3d, 0x4d, 0x2b, 0x0c, 0x01, 0xd0, 0xa2, 0xb4, 0x18, 0xfe, 0xf7, 0x5e, 219 0x2f, 0x06, 0x13, 0xcd, 0x63, 0xaa, 0x12, 0xa9, 0x24, 0x86, 0xe3, 0xf3, 220 0x7b, 0xda, 0x1a, 0x3c, 0xb1, 0x38, 0x80, 0x80, 0xef, 0x64, 0x64, 0xa1, 221 0x9b, 0xfe, 0x76, 0x63, 0x8e, 0x83, 0xd2, 0xd9, 0xb9, 0x86, 0xb0, 0xe6, 222 0xa6, 0x0c, 0x7e, 0xa8, 0x84, 0x90, 0x98, 0x0c, 0x1e, 0xf3, 0x14, 0x77, 223 0xe0, 0x5f, 0x81, 0x08, 0x11, 0x8f, 0xa6, 0x23, 0xc4, 0xba, 0xc0, 0x8a, 224 0xe4, 0xc6, 0xe3, 0x5c, 0xbe, 0xc5, 0xec, 0x2c, 0xb9, 0xd8, 0x8c, 0x4d, 225 0x1a, 0x9d, 0xe7, 0x7c, 0x85, 0x4c, 0x0d, 0x71, 0x4e, 0x72, 0x33, 0x1b, 226 0xfe, 0xa9, 0x17, 0x72, 0x76, 0x56, 0x9d, 0x74, 0x7e, 0x52, 0x67, 0x9a, 227 0x87, 0x9a, 0xdb, 0x30, 0xde, 0xe4, 0x49, 0x28, 0x3b, 0xd2, 0x67, 0xaf, 228 0x02, 0x81, 0x81, 0x00, 0x89, 0x74, 0x9a, 0x8e, 0xa7, 0xb9, 0xa5, 0x28, 229 0xc0, 0x68, 0xe5, 0x6e, 0x63, 0x1c, 0x99, 0x20, 0x8f, 0x86, 0x8e, 0x12, 230 0x9e, 0x69, 0x30, 0xfa, 0x34, 0xd9, 0x92, 0x8d, 0xdb, 0x7c, 0x37, 0xfd, 231 0x28, 0xab, 0x61, 0x98, 0x52, 0x7f, 0x14, 0x1a, 0x39, 0xae, 0xfb, 0x6a, 232 0x03, 0xa3, 0xe6, 0xbd, 0xb6, 0x5b, 0x6b, 0xe5, 0x5e, 0x9d, 0xc6, 0xa5, 233 0x07, 0x27, 0x54, 0x17, 0xd0, 0x3d, 0x84, 0x9b, 0x3a, 0xa0, 0xd9, 0x1e, 234 0x99, 0x6c, 0x63, 0x17, 0xab, 0xf1, 0x1f, 0x49, 0xba, 0x95, 0xe3, 0x3b, 235 0x86, 0x8f, 0x42, 0xa4, 0x89, 0xf5, 0x94, 0x8f, 0x8b, 0x46, 0xbe, 0x84, 236 0xba, 0x4a, 0xbc, 0x0d, 0x5f, 0x46, 0xeb, 0xe8, 0xec, 0x43, 0x8c, 0x1e, 237 0xad, 0x19, 0x69, 0x2f, 0x08, 0x86, 0x7a, 0x3f, 0x7d, 0x0f, 0x07, 0x97, 238 0xf3, 0x9a, 0x7b, 0xb5, 0xb2, 0xc1, 0x8c, 0x95, 0x68, 0x04, 0xa0, 0x81, 239 0x02, 0x81, 0x80, 0x4e, 0xbf, 0x7e, 0x1b, 0xcb, 0x13, 0x61, 0x75, 0x3b, 240 0xdb, 0x59, 0x5f, 0xb1, 0xd4, 0xb8, 0xeb, 0x9e, 0x73, 0xb5, 0xe7, 0xf6, 241 0x89, 0x3d, 0x1c, 0xda, 0xf0, 0x36, 0xff, 0x35, 0xbd, 0x1e, 0x0b, 0x74, 242 0xe3, 0x9e, 0xf0, 0xf2, 0xf7, 0xd7, 0x82, 0xb7, 0x7b, 0x6a, 0x1b, 0x0e, 243 0x30, 0x4a, 0x98, 0x0e, 0xb4, 0xf9, 0x81, 0x07, 0xe4, 0x75, 0x39, 0xe9, 244 0x53, 0xca, 0xbb, 0x5c, 0xaa, 0x93, 0x07, 0x0e, 0xa8, 0x2f, 0xba, 0x98, 245 0x49, 0x30, 0xa7, 0xcc, 0x1a, 0x3c, 0x68, 0x0c, 0xe1, 0xa4, 0xb1, 0x05, 246 0xe6, 0xe0, 0x25, 0x78, 0x58, 0x14, 0x37, 0xf5, 0x1f, 0xe3, 0x22, 0xef, 247 0xa8, 0x0e, 0x22, 0xa0, 0x94, 0x3a, 0xf6, 0xc9, 0x13, 0xe6, 0x06, 0xbf, 248 0x7f, 0x99, 0xc6, 0xcc, 0xd8, 0xc6, 0xbe, 0xd9, 0x2e, 0x24, 0xc7, 0x69, 249 0x8c, 0x95, 0xba, 0xf6, 0x04, 0xb3, 0x0a, 0xf4, 0xcb, 0xf0, 0xce, 250 }; 251 252 /* 253 * kExampleBad2RSAKeyDER is an RSA private key in ASN.1, DER format. All 254 * values are 0. 255 */ 256 static const unsigned char kExampleBad2RSAKeyDER[] = { 257 0x30, 0x1b, 0x02, 0x01, 0x00, 0x02, 0x01, 0x00, 0x02, 0x01, 0x00, 0x02, 258 0x01, 0x00, 0x02, 0x01, 0x00, 0x02, 0x01, 0x00, 0x02, 0x01, 0x00, 0x02, 259 0x01, 0x00, 0x02, 0x01, 0x00 260 }; 261 262 static const unsigned char kMsg[] = { 1, 2, 3, 4 }; 263 264 static const unsigned char kSignature[] = { 265 0xa5, 0xf0, 0x8a, 0x47, 0x5d, 0x3c, 0xb3, 0xcc, 0xa9, 0x79, 0xaf, 0x4d, 266 0x8c, 0xae, 0x4c, 0x14, 0xef, 0xc2, 0x0b, 0x34, 0x36, 0xde, 0xf4, 0x3e, 267 0x3d, 0xbb, 0x4a, 0x60, 0x5c, 0xc8, 0x91, 0x28, 0xda, 0xfb, 0x7e, 0x04, 268 0x96, 0x7e, 0x63, 0x13, 0x90, 0xce, 0xb9, 0xb4, 0x62, 0x7a, 0xfd, 0x09, 269 0x3d, 0xc7, 0x67, 0x78, 0x54, 0x04, 0xeb, 0x52, 0x62, 0x6e, 0x24, 0x67, 270 0xb4, 0x40, 0xfc, 0x57, 0x62, 0xc6, 0xf1, 0x67, 0xc1, 0x97, 0x8f, 0x6a, 271 0xa8, 0xae, 0x44, 0x46, 0x5e, 0xab, 0x67, 0x17, 0x53, 0x19, 0x3a, 0xda, 272 0x5a, 0xc8, 0x16, 0x3e, 0x86, 0xd5, 0xc5, 0x71, 0x2f, 0xfc, 0x23, 0x48, 273 0xd9, 0x0b, 0x13, 0xdd, 0x7b, 0x5a, 0x25, 0x79, 0xef, 0xa5, 0x7b, 0x04, 274 0xed, 0x44, 0xf6, 0x18, 0x55, 0xe4, 0x0a, 0xe9, 0x57, 0x79, 0x5d, 0xd7, 275 0x55, 0xa7, 0xab, 0x45, 0x02, 0x97, 0x60, 0x42, 276 }; 277 278 /* 279 * kExampleRSAKeyPKCS8 is kExampleRSAKeyDER encoded in a PKCS #8 280 * PrivateKeyInfo. 281 */ 282 static const unsigned char kExampleRSAKeyPKCS8[] = { 283 0x30, 0x82, 0x02, 0x76, 0x02, 0x01, 0x00, 0x30, 0x0d, 0x06, 0x09, 0x2a, 284 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x01, 0x05, 0x00, 0x04, 0x82, 285 0x02, 0x60, 0x30, 0x82, 0x02, 0x5c, 0x02, 0x01, 0x00, 0x02, 0x81, 0x81, 286 0x00, 0xf8, 0xb8, 0x6c, 0x83, 0xb4, 0xbc, 0xd9, 0xa8, 0x57, 0xc0, 0xa5, 287 0xb4, 0x59, 0x76, 0x8c, 0x54, 0x1d, 0x79, 0xeb, 0x22, 0x52, 0x04, 0x7e, 288 0xd3, 0x37, 0xeb, 0x41, 0xfd, 0x83, 0xf9, 0xf0, 0xa6, 0x85, 0x15, 0x34, 289 0x75, 0x71, 0x5a, 0x84, 0xa8, 0x3c, 0xd2, 0xef, 0x5a, 0x4e, 0xd3, 0xde, 290 0x97, 0x8a, 0xdd, 0xff, 0xbb, 0xcf, 0x0a, 0xaa, 0x86, 0x92, 0xbe, 0xb8, 291 0x50, 0xe4, 0xcd, 0x6f, 0x80, 0x33, 0x30, 0x76, 0x13, 0x8f, 0xca, 0x7b, 292 0xdc, 0xec, 0x5a, 0xca, 0x63, 0xc7, 0x03, 0x25, 0xef, 0xa8, 0x8a, 0x83, 293 0x58, 0x76, 0x20, 0xfa, 0x16, 0x77, 0xd7, 0x79, 0x92, 0x63, 0x01, 0x48, 294 0x1a, 0xd8, 0x7b, 0x67, 0xf1, 0x52, 0x55, 0x49, 0x4e, 0xd6, 0x6e, 0x4a, 295 0x5c, 0xd7, 0x7a, 0x37, 0x36, 0x0c, 0xde, 0xdd, 0x8f, 0x44, 0xe8, 0xc2, 296 0xa7, 0x2c, 0x2b, 0xb5, 0xaf, 0x64, 0x4b, 0x61, 0x07, 0x02, 0x03, 0x01, 297 0x00, 0x01, 0x02, 0x81, 0x80, 0x74, 0x88, 0x64, 0x3f, 0x69, 0x45, 0x3a, 298 0x6d, 0xc7, 0x7f, 0xb9, 0xa3, 0xc0, 0x6e, 0xec, 0xdc, 0xd4, 0x5a, 0xb5, 299 0x32, 0x85, 0x5f, 0x19, 0xd4, 0xf8, 0xd4, 0x3f, 0x3c, 0xfa, 0xc2, 0xf6, 300 0x5f, 0xee, 0xe6, 0xba, 0x87, 0x74, 0x2e, 0xc7, 0x0c, 0xd4, 0x42, 0xb8, 301 0x66, 0x85, 0x9c, 0x7b, 0x24, 0x61, 0xaa, 0x16, 0x11, 0xf6, 0xb5, 0xb6, 302 0xa4, 0x0a, 0xc9, 0x55, 0x2e, 0x81, 0xa5, 0x47, 0x61, 0xcb, 0x25, 0x8f, 303 0xc2, 0x15, 0x7b, 0x0e, 0x7c, 0x36, 0x9f, 0x3a, 0xda, 0x58, 0x86, 0x1c, 304 0x5b, 0x83, 0x79, 0xe6, 0x2b, 0xcc, 0xe6, 0xfa, 0x2c, 0x61, 0xf2, 0x78, 305 0x80, 0x1b, 0xe2, 0xf3, 0x9d, 0x39, 0x2b, 0x65, 0x57, 0x91, 0x3d, 0x71, 306 0x99, 0x73, 0xa5, 0xc2, 0x79, 0x20, 0x8c, 0x07, 0x4f, 0xe5, 0xb4, 0x60, 307 0x1f, 0x99, 0xa2, 0xb1, 0x4f, 0x0c, 0xef, 0xbc, 0x59, 0x53, 0x00, 0x7d, 308 0xb1, 0x02, 0x41, 0x00, 0xfc, 0x7e, 0x23, 0x65, 0x70, 0xf8, 0xce, 0xd3, 309 0x40, 0x41, 0x80, 0x6a, 0x1d, 0x01, 0xd6, 0x01, 0xff, 0xb6, 0x1b, 0x3d, 310 0x3d, 0x59, 0x09, 0x33, 0x79, 0xc0, 0x4f, 0xde, 0x96, 0x27, 0x4b, 0x18, 311 0xc6, 0xd9, 0x78, 0xf1, 0xf4, 0x35, 0x46, 0xe9, 0x7c, 0x42, 0x7a, 0x5d, 312 0x9f, 0xef, 0x54, 0xb8, 0xf7, 0x9f, 0xc4, 0x33, 0x6c, 0xf3, 0x8c, 0x32, 313 0x46, 0x87, 0x67, 0x30, 0x7b, 0xa7, 0xac, 0xe3, 0x02, 0x41, 0x00, 0xfc, 314 0x2c, 0xdf, 0x0c, 0x0d, 0x88, 0xf5, 0xb1, 0x92, 0xa8, 0x93, 0x47, 0x63, 315 0x55, 0xf5, 0xca, 0x58, 0x43, 0xba, 0x1c, 0xe5, 0x9e, 0xb6, 0x95, 0x05, 316 0xcd, 0xb5, 0x82, 0xdf, 0xeb, 0x04, 0x53, 0x9d, 0xbd, 0xc2, 0x38, 0x16, 317 0xb3, 0x62, 0xdd, 0xa1, 0x46, 0xdb, 0x6d, 0x97, 0x93, 0x9f, 0x8a, 0xc3, 318 0x9b, 0x64, 0x7e, 0x42, 0xe3, 0x32, 0x57, 0x19, 0x1b, 0xd5, 0x6e, 0x85, 319 0xfa, 0xb8, 0x8d, 0x02, 0x41, 0x00, 0xbc, 0x3d, 0xde, 0x6d, 0xd6, 0x97, 320 0xe8, 0xba, 0x9e, 0x81, 0x37, 0x17, 0xe5, 0xa0, 0x64, 0xc9, 0x00, 0xb7, 321 0xe7, 0xfe, 0xf4, 0x29, 0xd9, 0x2e, 0x43, 0x6b, 0x19, 0x20, 0xbd, 0x99, 322 0x75, 0xe7, 0x76, 0xf8, 0xd3, 0xae, 0xaf, 0x7e, 0xb8, 0xeb, 0x81, 0xf4, 323 0x9d, 0xfe, 0x07, 0x2b, 0x0b, 0x63, 0x0b, 0x5a, 0x55, 0x90, 0x71, 0x7d, 324 0xf1, 0xdb, 0xd9, 0xb1, 0x41, 0x41, 0x68, 0x2f, 0x4e, 0x39, 0x02, 0x40, 325 0x5a, 0x34, 0x66, 0xd8, 0xf5, 0xe2, 0x7f, 0x18, 0xb5, 0x00, 0x6e, 0x26, 326 0x84, 0x27, 0x14, 0x93, 0xfb, 0xfc, 0xc6, 0x0f, 0x5e, 0x27, 0xe6, 0xe1, 327 0xe9, 0xc0, 0x8a, 0xe4, 0x34, 0xda, 0xe9, 0xa2, 0x4b, 0x73, 0xbc, 0x8c, 328 0xb9, 0xba, 0x13, 0x6c, 0x7a, 0x2b, 0x51, 0x84, 0xa3, 0x4a, 0xe0, 0x30, 329 0x10, 0x06, 0x7e, 0xed, 0x17, 0x5a, 0x14, 0x00, 0xc9, 0xef, 0x85, 0xea, 330 0x52, 0x2c, 0xbc, 0x65, 0x02, 0x40, 0x51, 0xe3, 0xf2, 0x83, 0x19, 0x9b, 331 0xc4, 0x1e, 0x2f, 0x50, 0x3d, 0xdf, 0x5a, 0xa2, 0x18, 0xca, 0x5f, 0x2e, 332 0x49, 0xaf, 0x6f, 0xcc, 0xfa, 0x65, 0x77, 0x94, 0xb5, 0xa1, 0x0a, 0xa9, 333 0xd1, 0x8a, 0x39, 0x37, 0xf4, 0x0b, 0xa0, 0xd7, 0x82, 0x27, 0x5e, 0xae, 334 0x17, 0x17, 0xa1, 0x1e, 0x54, 0x34, 0xbf, 0x6e, 0xc4, 0x8e, 0x99, 0x5d, 335 0x08, 0xf1, 0x2d, 0x86, 0x9d, 0xa5, 0x20, 0x1b, 0xe5, 0xdf, 336 }; 337 338 #ifndef OPENSSL_NO_EC 339 /* 340 * kExampleECKeyDER is a sample EC private key encoded as an ECPrivateKey 341 * structure. 342 */ 343 static const unsigned char kExampleECKeyDER[] = { 344 0x30, 0x77, 0x02, 0x01, 0x01, 0x04, 0x20, 0x07, 0x0f, 0x08, 0x72, 0x7a, 345 0xd4, 0xa0, 0x4a, 0x9c, 0xdd, 0x59, 0xc9, 0x4d, 0x89, 0x68, 0x77, 0x08, 346 0xb5, 0x6f, 0xc9, 0x5d, 0x30, 0x77, 0x0e, 0xe8, 0xd1, 0xc9, 0xce, 0x0a, 347 0x8b, 0xb4, 0x6a, 0xa0, 0x0a, 0x06, 0x08, 0x2a, 0x86, 0x48, 0xce, 0x3d, 348 0x03, 0x01, 0x07, 0xa1, 0x44, 0x03, 0x42, 0x00, 0x04, 0xe6, 0x2b, 0x69, 349 0xe2, 0xbf, 0x65, 0x9f, 0x97, 0xbe, 0x2f, 0x1e, 0x0d, 0x94, 0x8a, 0x4c, 350 0xd5, 0x97, 0x6b, 0xb7, 0xa9, 0x1e, 0x0d, 0x46, 0xfb, 0xdd, 0xa9, 0xa9, 351 0x1e, 0x9d, 0xdc, 0xba, 0x5a, 0x01, 0xe7, 0xd6, 0x97, 0xa8, 0x0a, 0x18, 352 0xf9, 0xc3, 0xc4, 0xa3, 0x1e, 0x56, 0xe2, 0x7c, 0x83, 0x48, 0xdb, 0x16, 353 0x1a, 0x1c, 0xf5, 0x1d, 0x7e, 0xf1, 0x94, 0x2d, 0x4b, 0xcf, 0x72, 0x22, 354 0xc1, 355 }; 356 357 /* 358 * kExampleBadECKeyDER is a sample EC private key encoded as an ECPrivateKey 359 * structure. The private key is equal to the order and will fail to import 360 */ 361 static const unsigned char kExampleBadECKeyDER[] = { 362 0x30, 0x66, 0x02, 0x01, 0x00, 0x30, 0x13, 0x06, 0x07, 0x2A, 0x86, 0x48, 363 0xCE, 0x3D, 0x02, 0x01, 0x06, 0x08, 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x03, 364 0x01, 0x07, 0x04, 0x4C, 0x30, 0x4A, 0x02, 0x01, 0x01, 0x04, 0x20, 0xFF, 365 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x00, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 366 0xFF, 0xFF, 0xFF, 0xBC, 0xE6, 0xFA, 0xAD, 0xA7, 0x17, 0x9E, 0x84, 0xF3, 367 0xB9, 0xCA, 0xC2, 0xFC, 0x63, 0x25, 0x51, 0xA1, 0x23, 0x03, 0x21, 0x00, 368 0x00, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x00, 0xFF, 0xFF, 0xFF, 0xFF, 369 0xFF, 0xFF, 0xFF, 0xFF, 0xBC, 0xE6, 0xFA, 0xAD, 0xA7, 0x17, 0x9E, 0x84, 370 0xF3, 0xB9, 0xCA, 0xC2, 0xFC, 0x63, 0x25, 0x51 371 }; 372 373 /* prime256v1 */ 374 static const unsigned char kExampleECPubKeyDER[] = { 375 0x30, 0x59, 0x30, 0x13, 0x06, 0x07, 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x02, 376 0x01, 0x06, 0x08, 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07, 0x03, 377 0x42, 0x00, 0x04, 0xba, 0xeb, 0x83, 0xfb, 0x3b, 0xb2, 0xff, 0x30, 0x53, 378 0xdb, 0xce, 0x32, 0xf2, 0xac, 0xae, 0x44, 0x0d, 0x3d, 0x13, 0x53, 0xb8, 379 0xd1, 0x68, 0x55, 0xde, 0x44, 0x46, 0x05, 0xa6, 0xc9, 0xd2, 0x04, 0xb7, 380 0xe3, 0xa2, 0x96, 0xc8, 0xb2, 0x5e, 0x22, 0x03, 0xd7, 0x03, 0x7a, 0x8b, 381 0x13, 0x5c, 0x42, 0x49, 0xc2, 0xab, 0x86, 0xd6, 0xac, 0x6b, 0x93, 0x20, 382 0x56, 0x6a, 0xc6, 0xc8, 0xa5, 0x0b, 0xe5 383 }; 384 385 /* 386 * kExampleBadECPubKeyDER is a sample EC public key with a wrong OID 387 * 1.2.840.10045.2.2 instead of 1.2.840.10045.2.1 - EC Public Key 388 */ 389 static const unsigned char kExampleBadECPubKeyDER[] = { 390 0x30, 0x59, 0x30, 0x13, 0x06, 0x07, 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x02, 391 0x02, 0x06, 0x08, 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07, 0x03, 392 0x42, 0x00, 0x04, 0xba, 0xeb, 0x83, 0xfb, 0x3b, 0xb2, 0xff, 0x30, 0x53, 393 0xdb, 0xce, 0x32, 0xf2, 0xac, 0xae, 0x44, 0x0d, 0x3d, 0x13, 0x53, 0xb8, 394 0xd1, 0x68, 0x55, 0xde, 0x44, 0x46, 0x05, 0xa6, 0xc9, 0xd2, 0x04, 0xb7, 395 0xe3, 0xa2, 0x96, 0xc8, 0xb2, 0x5e, 0x22, 0x03, 0xd7, 0x03, 0x7a, 0x8b, 396 0x13, 0x5c, 0x42, 0x49, 0xc2, 0xab, 0x86, 0xd6, 0xac, 0x6b, 0x93, 0x20, 397 0x56, 0x6a, 0xc6, 0xc8, 0xa5, 0x0b, 0xe5 398 }; 399 400 static const unsigned char pExampleECParamDER[] = { 401 0x06, 0x08, 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07 402 }; 403 404 static const unsigned char kExampleED25519KeyDER[] = { 405 0x30, 0x2e, 0x02, 0x01, 0x00, 0x30, 0x05, 0x06, 0x03, 0x2b, 0x65, 0x70, 406 0x04, 0x22, 0x04, 0x20, 0xba, 0x7b, 0xba, 0x20, 0x1b, 0x02, 0x75, 0x3a, 407 0xe8, 0x88, 0xfe, 0x00, 0xcd, 0x8b, 0xc6, 0xf4, 0x5c, 0x47, 0x09, 0x46, 408 0x66, 0xe4, 0x72, 0x85, 0x25, 0x26, 0x5e, 0x12, 0x33, 0x48, 0xf6, 0x50 409 }; 410 411 static const unsigned char kExampleED25519PubKeyDER[] = { 412 0x30, 0x2a, 0x30, 0x05, 0x06, 0x03, 0x2b, 0x65, 0x70, 0x03, 0x21, 0x00, 413 0xf5, 0xc5, 0xeb, 0x52, 0x3e, 0x7d, 0x07, 0x86, 0xb2, 0x55, 0x07, 0x45, 414 0xef, 0x5b, 0x7c, 0x20, 0xe8, 0x66, 0x28, 0x30, 0x3c, 0x8a, 0x82, 0x40, 415 0x97, 0xa3, 0x08, 0xdc, 0x65, 0x80, 0x39, 0x29 416 }; 417 418 # ifndef OPENSSL_NO_DEPRECATED_3_0 419 static const unsigned char kExampleX25519KeyDER[] = { 420 0x30, 0x2e, 0x02, 0x01, 0x00, 0x30, 0x05, 0x06, 0x03, 0x2b, 0x65, 0x6e, 421 0x04, 0x22, 0x04, 0x20, 0xa0, 0x24, 0x3a, 0x31, 0x24, 0xc3, 0x3f, 0xf6, 422 0x7b, 0x96, 0x0b, 0xd4, 0x8f, 0xd1, 0xee, 0x67, 0xf2, 0x9b, 0x88, 0xac, 423 0x50, 0xce, 0x97, 0x36, 0xdd, 0xaf, 0x25, 0xf6, 0x10, 0x34, 0x96, 0x6e 424 }; 425 # endif 426 #endif 427 428 /* kExampleDHKeyDER is a DH private key in ASN.1, DER format. */ 429 #ifndef OPENSSL_NO_DEPRECATED_3_0 430 # ifndef OPENSSL_NO_DH 431 static const unsigned char kExampleDHKeyDER[] = { 432 0x30, 0x82, 0x01, 0x21, 0x02, 0x01, 0x00, 0x30, 0x81, 0x95, 0x06, 0x09, 433 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x03, 0x01, 0x30, 0x81, 0x87, 434 0x02, 0x81, 0x81, 0x00, 0xf7, 0x52, 0xc2, 0x68, 0xcc, 0x66, 0xc4, 0x8d, 435 0x03, 0x3f, 0xfa, 0x9c, 0x52, 0xd0, 0xd8, 0x33, 0xf2, 0xe1, 0xc9, 0x9e, 436 0xb7, 0xe7, 0x6e, 0x90, 0x97, 0xeb, 0x92, 0x91, 0x6a, 0x9a, 0x85, 0x63, 437 0x92, 0x79, 0xab, 0xb6, 0x3d, 0x23, 0x58, 0x5a, 0xe8, 0x45, 0x06, 0x81, 438 0x97, 0x77, 0xe1, 0xcc, 0x34, 0x4e, 0xae, 0x36, 0x80, 0xf2, 0xc4, 0x7f, 439 0x8a, 0x52, 0xb8, 0xdb, 0x58, 0xc8, 0x4b, 0x12, 0x4c, 0xf1, 0x4c, 0x53, 440 0xc1, 0x89, 0x39, 0x8d, 0xb6, 0x06, 0xd8, 0xea, 0x7f, 0x2d, 0x36, 0x53, 441 0x96, 0x29, 0xbe, 0xb6, 0x75, 0xfc, 0xe7, 0xf3, 0x36, 0xd6, 0xf4, 0x8f, 442 0x16, 0xa6, 0xc7, 0xec, 0x7b, 0xce, 0x42, 0x8d, 0x48, 0x2e, 0xb7, 0x74, 443 0x00, 0x11, 0x52, 0x61, 0xb4, 0x19, 0x35, 0xec, 0x5c, 0xe4, 0xbe, 0x34, 444 0xc6, 0x59, 0x64, 0x5e, 0x42, 0x61, 0x70, 0x54, 0xf4, 0xe9, 0x6b, 0x53, 445 0x02, 0x01, 0x02, 0x04, 0x81, 0x83, 0x02, 0x81, 0x80, 0x64, 0xc2, 0xe3, 446 0x09, 0x69, 0x37, 0x3c, 0xd2, 0x4a, 0xba, 0xc3, 0x78, 0x6a, 0x9b, 0x8a, 447 0x2a, 0xdb, 0xe7, 0xe6, 0xc0, 0xfa, 0x3a, 0xbe, 0x39, 0x67, 0xc0, 0xa9, 448 0x2a, 0xf0, 0x0a, 0xc1, 0x53, 0x1c, 0xdb, 0xfa, 0x1a, 0x26, 0x98, 0xb0, 449 0x8c, 0xc6, 0x06, 0x4a, 0xa2, 0x48, 0xd3, 0xa4, 0x3b, 0xbd, 0x05, 0x48, 450 0xea, 0x59, 0xdb, 0x18, 0xa4, 0xca, 0x66, 0xd9, 0x5d, 0xb8, 0x95, 0xd1, 451 0xeb, 0x97, 0x3d, 0x66, 0x97, 0x5c, 0x86, 0x8f, 0x7e, 0x90, 0xd3, 0x43, 452 0xd1, 0xa2, 0x0d, 0xcb, 0xe7, 0xeb, 0x90, 0xea, 0x09, 0x40, 0xb1, 0x6f, 453 0xf7, 0x4c, 0xf2, 0x41, 0x83, 0x1d, 0xd0, 0x76, 0xef, 0xaf, 0x55, 0x6f, 454 0x5d, 0xa9, 0xa3, 0x55, 0x81, 0x2a, 0xd1, 0x5d, 0x9d, 0x22, 0x77, 0x97, 455 0x83, 0xde, 0xad, 0xb6, 0x5d, 0x19, 0xc1, 0x53, 0xec, 0xfb, 0xaf, 0x06, 456 0x2e, 0x87, 0x2a, 0x0b, 0x7a 457 }; 458 # endif 459 #endif 460 461 static const unsigned char kCFBDefaultKey[] = { 462 0x2B, 0x7E, 0x15, 0x16, 0x28, 0xAE, 0xD2, 0xA6, 0xAB, 0xF7, 0x15, 0x88, 463 0x09, 0xCF, 0x4F, 0x3C 464 }; 465 466 static const unsigned char kGCMDefaultKey[32] = { 0 }; 467 468 static const unsigned char kGCMResetKey[] = { 469 0xfe, 0xff, 0xe9, 0x92, 0x86, 0x65, 0x73, 0x1c, 0x6d, 0x6a, 0x8f, 0x94, 470 0x67, 0x30, 0x83, 0x08, 0xfe, 0xff, 0xe9, 0x92, 0x86, 0x65, 0x73, 0x1c, 471 0x6d, 0x6a, 0x8f, 0x94, 0x67, 0x30, 0x83, 0x08 472 }; 473 474 static const unsigned char iCFBIV[] = { 475 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0A, 0x0B, 476 0x0C, 0x0D, 0x0E, 0x0F 477 }; 478 479 static const unsigned char iGCMDefaultIV[12] = { 0 }; 480 481 static const unsigned char iGCMResetIV1[] = { 482 0xca, 0xfe, 0xba, 0xbe, 0xfa, 0xce, 0xdb, 0xad 483 }; 484 485 static const unsigned char iGCMResetIV2[] = { 486 0xca, 0xfe, 0xba, 0xbe, 0xfa, 0xce, 0xdb, 0xad, 0xde, 0xca, 0xf8, 0x88 487 }; 488 489 static const unsigned char cfbPlaintext[] = { 490 0x6B, 0xC1, 0xBE, 0xE2, 0x2E, 0x40, 0x9F, 0x96, 0xE9, 0x3D, 0x7E, 0x11, 491 0x73, 0x93, 0x17, 0x2A 492 }; 493 static const unsigned char cfbPlaintext_partial[] = { 494 0x6B, 0xC1, 0xBE, 0xE2, 0x2E, 0x40, 0x9F, 0x96, 0xE9, 0x3D, 0x7E, 0x11, 495 0x73, 0x93, 0x17, 0x2A, 0x6B, 0xC1, 0xBE, 0xE2, 0x2E, 0x40, 0x9F, 0x96, 496 }; 497 498 static const unsigned char gcmDefaultPlaintext[16] = { 0 }; 499 500 static const unsigned char gcmResetPlaintext[] = { 501 0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5, 0xa5, 0x59, 0x09, 0xc5, 502 0xaf, 0xf5, 0x26, 0x9a, 0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda, 503 0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72, 0x1c, 0x3c, 0x0c, 0x95, 504 0x95, 0x68, 0x09, 0x53, 0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25, 505 0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57, 0xba, 0x63, 0x7b, 0x39 506 }; 507 508 static const unsigned char cfbCiphertext[] = { 509 0x3B, 0x3F, 0xD9, 0x2E, 0xB7, 0x2D, 0xAD, 0x20, 0x33, 0x34, 0x49, 0xF8, 510 0xE8, 0x3C, 0xFB, 0x4A 511 }; 512 513 static const unsigned char cfbCiphertext_partial[] = { 514 0x3B, 0x3F, 0xD9, 0x2E, 0xB7, 0x2D, 0xAD, 0x20, 0x33, 0x34, 0x49, 0xF8, 515 0xE8, 0x3C, 0xFB, 0x4A, 0x0D, 0x4A, 0x71, 0x82, 0x90, 0xF0, 0x9A, 0x35 516 }; 517 518 static const unsigned char ofbCiphertext_partial[] = { 519 0x3B, 0x3F, 0xD9, 0x2E, 0xB7, 0x2D, 0xAD, 0x20, 0x33, 0x34, 0x49, 0xF8, 520 0xE8, 0x3C, 0xFB, 0x4A, 0xB2, 0x65, 0x64, 0x38, 0x26, 0xD2, 0xBC, 0x09 521 }; 522 523 static const unsigned char gcmDefaultCiphertext[] = { 524 0xce, 0xa7, 0x40, 0x3d, 0x4d, 0x60, 0x6b, 0x6e, 0x07, 0x4e, 0xc5, 0xd3, 525 0xba, 0xf3, 0x9d, 0x18 526 }; 527 528 static const unsigned char gcmResetCiphertext1[] = { 529 0xc3, 0x76, 0x2d, 0xf1, 0xca, 0x78, 0x7d, 0x32, 0xae, 0x47, 0xc1, 0x3b, 530 0xf1, 0x98, 0x44, 0xcb, 0xaf, 0x1a, 0xe1, 0x4d, 0x0b, 0x97, 0x6a, 0xfa, 531 0xc5, 0x2f, 0xf7, 0xd7, 0x9b, 0xba, 0x9d, 0xe0, 0xfe, 0xb5, 0x82, 0xd3, 532 0x39, 0x34, 0xa4, 0xf0, 0x95, 0x4c, 0xc2, 0x36, 0x3b, 0xc7, 0x3f, 0x78, 533 0x62, 0xac, 0x43, 0x0e, 0x64, 0xab, 0xe4, 0x99, 0xf4, 0x7c, 0x9b, 0x1f 534 }; 535 536 static const unsigned char gcmResetCiphertext2[] = { 537 0x52, 0x2d, 0xc1, 0xf0, 0x99, 0x56, 0x7d, 0x07, 0xf4, 0x7f, 0x37, 0xa3, 538 0x2a, 0x84, 0x42, 0x7d, 0x64, 0x3a, 0x8c, 0xdc, 0xbf, 0xe5, 0xc0, 0xc9, 539 0x75, 0x98, 0xa2, 0xbd, 0x25, 0x55, 0xd1, 0xaa, 0x8c, 0xb0, 0x8e, 0x48, 540 0x59, 0x0d, 0xbb, 0x3d, 0xa7, 0xb0, 0x8b, 0x10, 0x56, 0x82, 0x88, 0x38, 541 0xc5, 0xf6, 0x1e, 0x63, 0x93, 0xba, 0x7a, 0x0a, 0xbc, 0xc9, 0xf6, 0x62 542 }; 543 544 static const unsigned char gcmAAD[] = { 545 0xfe, 0xed, 0xfa, 0xce, 0xde, 0xad, 0xbe, 0xef, 0xfe, 0xed, 0xfa, 0xce, 546 0xde, 0xad, 0xbe, 0xef, 0xab, 0xad, 0xda, 0xd2 547 }; 548 549 static const unsigned char gcmDefaultTag[] = { 550 0xd0, 0xd1, 0xc8, 0xa7, 0x99, 0x99, 0x6b, 0xf0, 0x26, 0x5b, 0x98, 0xb5, 551 0xd4, 0x8a, 0xb9, 0x19 552 }; 553 554 static const unsigned char gcmResetTag1[] = { 555 0x3a, 0x33, 0x7d, 0xbf, 0x46, 0xa7, 0x92, 0xc4, 0x5e, 0x45, 0x49, 0x13, 556 0xfe, 0x2e, 0xa8, 0xf2 557 }; 558 559 static const unsigned char gcmResetTag2[] = { 560 0x76, 0xfc, 0x6e, 0xce, 0x0f, 0x4e, 0x17, 0x68, 0xcd, 0xdf, 0x88, 0x53, 561 0xbb, 0x2d, 0x55, 0x1b 562 }; 563 564 typedef struct APK_DATA_st { 565 const unsigned char *kder; 566 size_t size; 567 const char *keytype; 568 int evptype; 569 int check; 570 int pub_check; 571 int param_check; 572 int type; /* 0 for private, 1 for public, 2 for params */ 573 } APK_DATA; 574 575 static APK_DATA keydata[] = { 576 {kExampleRSAKeyDER, sizeof(kExampleRSAKeyDER), "RSA", EVP_PKEY_RSA}, 577 {kExampleRSAKeyPKCS8, sizeof(kExampleRSAKeyPKCS8), "RSA", EVP_PKEY_RSA}, 578 #ifndef OPENSSL_NO_EC 579 {kExampleECKeyDER, sizeof(kExampleECKeyDER), "EC", EVP_PKEY_EC} 580 #endif 581 }; 582 583 static APK_DATA keycheckdata[] = { 584 {kExampleRSAKeyDER, sizeof(kExampleRSAKeyDER), "RSA", EVP_PKEY_RSA, 1, 1, 1, 585 0}, 586 {kExampleBadRSAKeyDER, sizeof(kExampleBadRSAKeyDER), "RSA", EVP_PKEY_RSA, 587 0, 1, 1, 0}, 588 {kExampleBad2RSAKeyDER, sizeof(kExampleBad2RSAKeyDER), "RSA", EVP_PKEY_RSA, 589 0, 0, 1 /* Since there are no "params" in an RSA key this passes */, 0}, 590 #ifndef OPENSSL_NO_EC 591 {kExampleECKeyDER, sizeof(kExampleECKeyDER), "EC", EVP_PKEY_EC, 1, 1, 1, 0}, 592 /* group is also associated in our pub key */ 593 {kExampleECPubKeyDER, sizeof(kExampleECPubKeyDER), "EC", EVP_PKEY_EC, 0, 1, 594 1, 1}, 595 {pExampleECParamDER, sizeof(pExampleECParamDER), "EC", EVP_PKEY_EC, 0, 0, 1, 596 2}, 597 {kExampleED25519KeyDER, sizeof(kExampleED25519KeyDER), "ED25519", 598 EVP_PKEY_ED25519, 1, 1, 1, 0}, 599 {kExampleED25519PubKeyDER, sizeof(kExampleED25519PubKeyDER), "ED25519", 600 EVP_PKEY_ED25519, 0, 1, 1, 1}, 601 #endif 602 }; 603 604 static EVP_PKEY *load_example_key(const char *keytype, 605 const unsigned char *data, size_t data_len) 606 { 607 const unsigned char **pdata = &data; 608 EVP_PKEY *pkey = NULL; 609 OSSL_DECODER_CTX *dctx = 610 OSSL_DECODER_CTX_new_for_pkey(&pkey, "DER", NULL, keytype, 0, 611 testctx, testpropq); 612 613 /* |pkey| will be NULL on error */ 614 (void)OSSL_DECODER_from_data(dctx, pdata, &data_len); 615 OSSL_DECODER_CTX_free(dctx); 616 return pkey; 617 } 618 619 static EVP_PKEY *load_example_rsa_key(void) 620 { 621 return load_example_key("RSA", kExampleRSAKeyDER, 622 sizeof(kExampleRSAKeyDER)); 623 } 624 625 #ifndef OPENSSL_NO_DSA 626 static EVP_PKEY *load_example_dsa_key(void) 627 { 628 return load_example_key("DSA", kExampleDSAKeyDER, 629 sizeof(kExampleDSAKeyDER)); 630 } 631 #endif 632 633 #ifndef OPENSSL_NO_EC 634 static EVP_PKEY *load_example_ec_key(void) 635 { 636 return load_example_key("EC", kExampleECKeyDER, 637 sizeof(kExampleECKeyDER)); 638 } 639 #endif 640 641 #ifndef OPENSSL_NO_DEPRECATED_3_0 642 # ifndef OPENSSL_NO_DH 643 static EVP_PKEY *load_example_dh_key(void) 644 { 645 return load_example_key("DH", kExampleDHKeyDER, 646 sizeof(kExampleDHKeyDER)); 647 } 648 # endif 649 650 # ifndef OPENSSL_NO_EC 651 static EVP_PKEY *load_example_ed25519_key(void) 652 { 653 return load_example_key("ED25519", kExampleED25519KeyDER, 654 sizeof(kExampleED25519KeyDER)); 655 } 656 657 static EVP_PKEY *load_example_x25519_key(void) 658 { 659 return load_example_key("X25519", kExampleX25519KeyDER, 660 sizeof(kExampleX25519KeyDER)); 661 } 662 # endif 663 #endif /* OPENSSL_NO_DEPRECATED_3_0 */ 664 665 static EVP_PKEY *load_example_hmac_key(void) 666 { 667 EVP_PKEY *pkey = NULL; 668 unsigned char key[] = { 669 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 670 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 671 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f 672 }; 673 674 pkey = EVP_PKEY_new_raw_private_key_ex(testctx, "HMAC", 675 NULL, key, sizeof(key)); 676 if (!TEST_ptr(pkey)) 677 return NULL; 678 679 return pkey; 680 } 681 682 static int test_EVP_set_default_properties(void) 683 { 684 OSSL_LIB_CTX *ctx; 685 EVP_MD *md = NULL; 686 int res = 0; 687 688 if (!TEST_ptr(ctx = OSSL_LIB_CTX_new()) 689 || !TEST_ptr(md = EVP_MD_fetch(ctx, "sha256", NULL))) 690 goto err; 691 EVP_MD_free(md); 692 md = NULL; 693 694 if (!TEST_true(EVP_set_default_properties(ctx, "provider=fizzbang")) 695 || !TEST_ptr_null(md = EVP_MD_fetch(ctx, "sha256", NULL)) 696 || !TEST_ptr(md = EVP_MD_fetch(ctx, "sha256", "-provider"))) 697 goto err; 698 EVP_MD_free(md); 699 md = NULL; 700 701 if (!TEST_true(EVP_set_default_properties(ctx, NULL)) 702 || !TEST_ptr(md = EVP_MD_fetch(ctx, "sha256", NULL))) 703 goto err; 704 res = 1; 705 err: 706 EVP_MD_free(md); 707 OSSL_LIB_CTX_free(ctx); 708 return res; 709 } 710 711 #if !defined(OPENSSL_NO_DH) || !defined(OPENSSL_NO_DSA) || !defined(OPENSSL_NO_EC) 712 static EVP_PKEY *make_key_fromdata(char *keytype, OSSL_PARAM *params) 713 { 714 EVP_PKEY_CTX *pctx = NULL; 715 EVP_PKEY *tmp_pkey = NULL, *pkey = NULL; 716 717 if (!TEST_ptr(pctx = EVP_PKEY_CTX_new_from_name(testctx, keytype, testpropq))) 718 goto err; 719 if (!TEST_int_gt(EVP_PKEY_fromdata_init(pctx), 0) 720 || !TEST_int_gt(EVP_PKEY_fromdata(pctx, &tmp_pkey, EVP_PKEY_KEYPAIR, 721 params), 0)) 722 goto err; 723 724 if (!TEST_ptr(tmp_pkey)) 725 goto err; 726 727 pkey = tmp_pkey; 728 tmp_pkey = NULL; 729 err: 730 EVP_PKEY_free(tmp_pkey); 731 EVP_PKEY_CTX_free(pctx); 732 return pkey; 733 } 734 735 static int test_selection(EVP_PKEY *pkey, int selection) 736 { 737 int testresult = 0; 738 int ret; 739 BIO *bio = BIO_new(BIO_s_mem()); 740 741 ret = PEM_write_bio_PUBKEY(bio, pkey); 742 if ((selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) { 743 if (!TEST_true(ret)) 744 goto err; 745 } else { 746 if (!TEST_false(ret)) 747 goto err; 748 } 749 ret = PEM_write_bio_PrivateKey_ex(bio, pkey, NULL, NULL, 0, NULL, NULL, 750 testctx, NULL); 751 if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) { 752 if (!TEST_true(ret)) 753 goto err; 754 } else { 755 if (!TEST_false(ret)) 756 goto err; 757 } 758 759 testresult = 1; 760 err: 761 BIO_free(bio); 762 763 return testresult; 764 } 765 #endif /* !OPENSSL_NO_DH || !OPENSSL_NO_DSA || !OPENSSL_NO_EC */ 766 767 /* 768 * Test combinations of private, public, missing and private + public key 769 * params to ensure they are all accepted 770 */ 771 #if !defined(OPENSSL_NO_DH) || !defined(OPENSSL_NO_DSA) 772 static int test_EVP_PKEY_ffc_priv_pub(char *keytype) 773 { 774 OSSL_PARAM_BLD *bld = NULL; 775 OSSL_PARAM *params = NULL; 776 EVP_PKEY *just_params = NULL; 777 EVP_PKEY *params_and_priv = NULL; 778 EVP_PKEY *params_and_pub = NULL; 779 EVP_PKEY *params_and_keypair = NULL; 780 BIGNUM *p = NULL, *q = NULL, *g = NULL, *pub = NULL, *priv = NULL; 781 int ret = 0; 782 783 /* 784 * Setup the parameters for our pkey object. For our purposes they don't 785 * have to actually be *valid* parameters. We just need to set something. 786 */ 787 if (!TEST_ptr(p = BN_new()) 788 || !TEST_ptr(q = BN_new()) 789 || !TEST_ptr(g = BN_new()) 790 || !TEST_ptr(pub = BN_new()) 791 || !TEST_ptr(priv = BN_new())) 792 goto err; 793 794 /* Test !priv and !pub */ 795 if (!TEST_ptr(bld = OSSL_PARAM_BLD_new()) 796 || !TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_FFC_P, p)) 797 || !TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_FFC_Q, q)) 798 || !TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_FFC_G, g))) 799 goto err; 800 if (!TEST_ptr(params = OSSL_PARAM_BLD_to_param(bld)) 801 || !TEST_ptr(just_params = make_key_fromdata(keytype, params))) 802 goto err; 803 804 OSSL_PARAM_free(params); 805 OSSL_PARAM_BLD_free(bld); 806 params = NULL; 807 bld = NULL; 808 809 if (!test_selection(just_params, OSSL_KEYMGMT_SELECT_ALL_PARAMETERS) 810 || test_selection(just_params, OSSL_KEYMGMT_SELECT_KEYPAIR)) 811 goto err; 812 813 /* Test priv and !pub */ 814 if (!TEST_ptr(bld = OSSL_PARAM_BLD_new()) 815 || !TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_FFC_P, p)) 816 || !TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_FFC_Q, q)) 817 || !TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_FFC_G, g)) 818 || !TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_PRIV_KEY, 819 priv))) 820 goto err; 821 if (!TEST_ptr(params = OSSL_PARAM_BLD_to_param(bld)) 822 || !TEST_ptr(params_and_priv = make_key_fromdata(keytype, params))) 823 goto err; 824 825 OSSL_PARAM_free(params); 826 OSSL_PARAM_BLD_free(bld); 827 params = NULL; 828 bld = NULL; 829 830 if (!test_selection(params_and_priv, OSSL_KEYMGMT_SELECT_PRIVATE_KEY) 831 || test_selection(params_and_priv, OSSL_KEYMGMT_SELECT_PUBLIC_KEY)) 832 goto err; 833 834 /* Test !priv and pub */ 835 if (!TEST_ptr(bld = OSSL_PARAM_BLD_new()) 836 || !TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_FFC_P, p)) 837 || !TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_FFC_Q, q)) 838 || !TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_FFC_G, g)) 839 || !TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_PUB_KEY, 840 pub))) 841 goto err; 842 if (!TEST_ptr(params = OSSL_PARAM_BLD_to_param(bld)) 843 || !TEST_ptr(params_and_pub = make_key_fromdata(keytype, params))) 844 goto err; 845 846 OSSL_PARAM_free(params); 847 OSSL_PARAM_BLD_free(bld); 848 params = NULL; 849 bld = NULL; 850 851 if (!test_selection(params_and_pub, OSSL_KEYMGMT_SELECT_PUBLIC_KEY) 852 || test_selection(params_and_pub, OSSL_KEYMGMT_SELECT_PRIVATE_KEY)) 853 goto err; 854 855 /* Test priv and pub */ 856 if (!TEST_ptr(bld = OSSL_PARAM_BLD_new()) 857 || !TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_FFC_P, p)) 858 || !TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_FFC_Q, q)) 859 || !TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_FFC_G, g)) 860 || !TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_PUB_KEY, 861 pub)) 862 || !TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_PRIV_KEY, 863 priv))) 864 goto err; 865 if (!TEST_ptr(params = OSSL_PARAM_BLD_to_param(bld)) 866 || !TEST_ptr(params_and_keypair = make_key_fromdata(keytype, params))) 867 goto err; 868 869 if (!test_selection(params_and_keypair, EVP_PKEY_KEYPAIR)) 870 goto err; 871 872 ret = 1; 873 err: 874 OSSL_PARAM_free(params); 875 OSSL_PARAM_BLD_free(bld); 876 EVP_PKEY_free(just_params); 877 EVP_PKEY_free(params_and_priv); 878 EVP_PKEY_free(params_and_pub); 879 EVP_PKEY_free(params_and_keypair); 880 BN_free(p); 881 BN_free(q); 882 BN_free(g); 883 BN_free(pub); 884 BN_free(priv); 885 886 return ret; 887 } 888 #endif /* !OPENSSL_NO_DH || !OPENSSL_NO_DSA */ 889 890 /* 891 * Test combinations of private, public, missing and private + public key 892 * params to ensure they are all accepted for EC keys 893 */ 894 #ifndef OPENSSL_NO_EC 895 static unsigned char ec_priv[] = { 896 0xe9, 0x25, 0xf7, 0x66, 0x58, 0xa4, 0xdd, 0x99, 0x61, 0xe7, 0xe8, 0x23, 897 0x85, 0xc2, 0xe8, 0x33, 0x27, 0xc5, 0x5c, 0xeb, 0xdb, 0x43, 0x9f, 0xd5, 898 0xf2, 0x5a, 0x75, 0x55, 0xd0, 0x2e, 0x6d, 0x16 899 }; 900 static unsigned char ec_pub[] = { 901 0x04, 0xad, 0x11, 0x90, 0x77, 0x4b, 0x46, 0xee, 0x72, 0x51, 0x15, 0x97, 902 0x4a, 0x6a, 0xa7, 0xaf, 0x59, 0xfa, 0x4b, 0xf2, 0x41, 0xc8, 0x3a, 0x81, 903 0x23, 0xb6, 0x90, 0x04, 0x6c, 0x67, 0x66, 0xd0, 0xdc, 0xf2, 0x15, 0x1d, 904 0x41, 0x61, 0xb7, 0x95, 0x85, 0x38, 0x5a, 0x84, 0x56, 0xe8, 0xb3, 0x0e, 905 0xf5, 0xc6, 0x5d, 0xa4, 0x54, 0x26, 0xb0, 0xf7, 0xa5, 0x4a, 0x33, 0xf1, 906 0x08, 0x09, 0xb8, 0xdb, 0x03 907 }; 908 909 static int test_EC_priv_pub(void) 910 { 911 OSSL_PARAM_BLD *bld = NULL; 912 OSSL_PARAM *params = NULL; 913 EVP_PKEY *just_params = NULL; 914 EVP_PKEY *params_and_priv = NULL; 915 EVP_PKEY *params_and_pub = NULL; 916 EVP_PKEY *params_and_keypair = NULL; 917 BIGNUM *priv = NULL; 918 int ret = 0; 919 unsigned char *encoded = NULL; 920 size_t len = 0; 921 unsigned char buffer[128]; 922 923 /* 924 * Setup the parameters for our pkey object. For our purposes they don't 925 * have to actually be *valid* parameters. We just need to set something. 926 */ 927 if (!TEST_ptr(priv = BN_bin2bn(ec_priv, sizeof(ec_priv), NULL))) 928 goto err; 929 930 /* Test !priv and !pub */ 931 if (!TEST_ptr(bld = OSSL_PARAM_BLD_new()) 932 || !TEST_true(OSSL_PARAM_BLD_push_utf8_string(bld, 933 OSSL_PKEY_PARAM_GROUP_NAME, 934 "P-256", 0))) 935 goto err; 936 if (!TEST_ptr(params = OSSL_PARAM_BLD_to_param(bld)) 937 || !TEST_ptr(just_params = make_key_fromdata("EC", params))) 938 goto err; 939 940 OSSL_PARAM_free(params); 941 OSSL_PARAM_BLD_free(bld); 942 params = NULL; 943 bld = NULL; 944 945 if (!test_selection(just_params, OSSL_KEYMGMT_SELECT_ALL_PARAMETERS) 946 || test_selection(just_params, OSSL_KEYMGMT_SELECT_KEYPAIR)) 947 goto err; 948 949 /* Test priv and !pub */ 950 if (!TEST_ptr(bld = OSSL_PARAM_BLD_new()) 951 || !TEST_true(OSSL_PARAM_BLD_push_utf8_string(bld, 952 OSSL_PKEY_PARAM_GROUP_NAME, 953 "P-256", 0)) 954 || !TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_PRIV_KEY, 955 priv))) 956 goto err; 957 if (!TEST_ptr(params = OSSL_PARAM_BLD_to_param(bld)) 958 || !TEST_ptr(params_and_priv = make_key_fromdata("EC", params))) 959 goto err; 960 961 OSSL_PARAM_free(params); 962 OSSL_PARAM_BLD_free(bld); 963 params = NULL; 964 bld = NULL; 965 966 /* 967 * We indicate only parameters here, in spite of having built a key that 968 * has a private part, because the PEM_write_bio_PrivateKey_ex call is 969 * expected to fail because it does not support exporting a private EC 970 * key without a corresponding public key 971 */ 972 if (!test_selection(params_and_priv, OSSL_KEYMGMT_SELECT_ALL_PARAMETERS) 973 || test_selection(params_and_priv, OSSL_KEYMGMT_SELECT_PUBLIC_KEY)) 974 goto err; 975 976 /* Test !priv and pub */ 977 if (!TEST_ptr(bld = OSSL_PARAM_BLD_new()) 978 || !TEST_true(OSSL_PARAM_BLD_push_utf8_string(bld, 979 OSSL_PKEY_PARAM_GROUP_NAME, 980 "P-256", 0)) 981 || !TEST_true(OSSL_PARAM_BLD_push_octet_string(bld, 982 OSSL_PKEY_PARAM_PUB_KEY, 983 ec_pub, sizeof(ec_pub)))) 984 goto err; 985 if (!TEST_ptr(params = OSSL_PARAM_BLD_to_param(bld)) 986 || !TEST_ptr(params_and_pub = make_key_fromdata("EC", params))) 987 goto err; 988 989 OSSL_PARAM_free(params); 990 OSSL_PARAM_BLD_free(bld); 991 params = NULL; 992 bld = NULL; 993 994 if (!test_selection(params_and_pub, OSSL_KEYMGMT_SELECT_PUBLIC_KEY) 995 || test_selection(params_and_pub, OSSL_KEYMGMT_SELECT_PRIVATE_KEY)) 996 goto err; 997 998 /* Test priv and pub */ 999 if (!TEST_ptr(bld = OSSL_PARAM_BLD_new()) 1000 || !TEST_true(OSSL_PARAM_BLD_push_utf8_string(bld, 1001 OSSL_PKEY_PARAM_GROUP_NAME, 1002 "P-256", 0)) 1003 || !TEST_true(OSSL_PARAM_BLD_push_octet_string(bld, 1004 OSSL_PKEY_PARAM_PUB_KEY, 1005 ec_pub, sizeof(ec_pub))) 1006 || !TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_PRIV_KEY, 1007 priv))) 1008 goto err; 1009 if (!TEST_ptr(params = OSSL_PARAM_BLD_to_param(bld)) 1010 || !TEST_ptr(params_and_keypair = make_key_fromdata("EC", params))) 1011 goto err; 1012 1013 if (!test_selection(params_and_keypair, EVP_PKEY_KEYPAIR)) 1014 goto err; 1015 1016 /* Try key equality */ 1017 if (!TEST_int_gt(EVP_PKEY_parameters_eq(just_params, just_params), 0) 1018 || !TEST_int_gt(EVP_PKEY_parameters_eq(just_params, params_and_pub), 1019 0) 1020 || !TEST_int_gt(EVP_PKEY_parameters_eq(just_params, params_and_priv), 1021 0) 1022 || !TEST_int_gt(EVP_PKEY_parameters_eq(just_params, params_and_keypair), 1023 0) 1024 || !TEST_int_gt(EVP_PKEY_eq(params_and_pub, params_and_pub), 0) 1025 || !TEST_int_gt(EVP_PKEY_eq(params_and_priv, params_and_priv), 0) 1026 || !TEST_int_gt(EVP_PKEY_eq(params_and_keypair, params_and_pub), 0) 1027 || !TEST_int_gt(EVP_PKEY_eq(params_and_keypair, params_and_priv), 0)) 1028 goto err; 1029 1030 /* Positive and negative testcase for EVP_PKEY_get1_encoded_public_key */ 1031 if (!TEST_int_gt(EVP_PKEY_get1_encoded_public_key(params_and_pub, &encoded), 0)) 1032 goto err; 1033 OPENSSL_free(encoded); 1034 encoded = NULL; 1035 if (!TEST_int_eq(EVP_PKEY_get1_encoded_public_key(just_params, &encoded), 0)) { 1036 OPENSSL_free(encoded); 1037 encoded = NULL; 1038 goto err; 1039 } 1040 1041 /* Positive and negative testcase for EVP_PKEY_get_octet_string_param */ 1042 if (!TEST_int_eq(EVP_PKEY_get_octet_string_param(params_and_pub, 1043 OSSL_PKEY_PARAM_ENCODED_PUBLIC_KEY, 1044 buffer, sizeof(buffer), &len), 1) 1045 || !TEST_int_eq(len, 65)) 1046 goto err; 1047 1048 len = 0; 1049 if (!TEST_int_eq(EVP_PKEY_get_octet_string_param(params_and_pub, 1050 OSSL_PKEY_PARAM_ENCODED_PUBLIC_KEY, 1051 NULL, 0, &len), 1) 1052 || !TEST_int_eq(len, 65)) 1053 goto err; 1054 1055 /* too-short buffer len*/ 1056 if (!TEST_int_eq(EVP_PKEY_get_octet_string_param(params_and_pub, 1057 OSSL_PKEY_PARAM_ENCODED_PUBLIC_KEY, 1058 buffer, 10, &len), 0)) 1059 goto err; 1060 1061 ret = 1; 1062 err: 1063 OSSL_PARAM_free(params); 1064 OSSL_PARAM_BLD_free(bld); 1065 EVP_PKEY_free(just_params); 1066 EVP_PKEY_free(params_and_priv); 1067 EVP_PKEY_free(params_and_pub); 1068 EVP_PKEY_free(params_and_keypair); 1069 BN_free(priv); 1070 1071 return ret; 1072 } 1073 1074 /* Test that using a legacy EC key with only a private key in it works */ 1075 # ifndef OPENSSL_NO_DEPRECATED_3_0 1076 static int test_EC_priv_only_legacy(void) 1077 { 1078 BIGNUM *priv = NULL; 1079 int ret = 0; 1080 EC_KEY *eckey = NULL; 1081 EVP_PKEY *pkey = NULL, *dup_pk = NULL; 1082 EVP_MD_CTX *ctx = NULL; 1083 1084 /* Create the low level EC_KEY */ 1085 if (!TEST_ptr(priv = BN_bin2bn(ec_priv, sizeof(ec_priv), NULL))) 1086 goto err; 1087 1088 eckey = EC_KEY_new_by_curve_name(NID_X9_62_prime256v1); 1089 if (!TEST_ptr(eckey)) 1090 goto err; 1091 1092 if (!TEST_true(EC_KEY_set_private_key(eckey, priv))) 1093 goto err; 1094 1095 pkey = EVP_PKEY_new(); 1096 if (!TEST_ptr(pkey)) 1097 goto err; 1098 1099 if (!TEST_true(EVP_PKEY_assign_EC_KEY(pkey, eckey))) 1100 goto err; 1101 eckey = NULL; 1102 1103 for (;;) { 1104 ret = 0; 1105 ctx = EVP_MD_CTX_new(); 1106 if (!TEST_ptr(ctx)) 1107 goto err; 1108 1109 /* 1110 * The EVP_DigestSignInit function should create the key on the 1111 * provider side which is sufficient for this test. 1112 */ 1113 if (!TEST_true(EVP_DigestSignInit_ex(ctx, NULL, NULL, testctx, 1114 testpropq, pkey, NULL))) 1115 goto err; 1116 EVP_MD_CTX_free(ctx); 1117 ctx = NULL; 1118 1119 if (dup_pk != NULL) 1120 break; 1121 1122 if (!TEST_ptr(dup_pk = EVP_PKEY_dup(pkey))) 1123 goto err; 1124 /* EVP_PKEY_eq() returns -2 with missing public keys */ 1125 ret = TEST_int_eq(EVP_PKEY_eq(pkey, dup_pk), -2); 1126 EVP_PKEY_free(pkey); 1127 pkey = dup_pk; 1128 if (!ret) 1129 goto err; 1130 } 1131 ret = 1; 1132 1133 err: 1134 EVP_MD_CTX_free(ctx); 1135 EVP_PKEY_free(pkey); 1136 EC_KEY_free(eckey); 1137 BN_free(priv); 1138 1139 return ret; 1140 } 1141 # endif /* OPENSSL_NO_DEPRECATED_3_0 */ 1142 #endif /* OPENSSL_NO_EC */ 1143 1144 static int test_EVP_PKEY_sign(int tst) 1145 { 1146 int ret = 0; 1147 EVP_PKEY *pkey = NULL; 1148 unsigned char *sig = NULL; 1149 size_t sig_len = 0, shortsig_len = 1; 1150 EVP_PKEY_CTX *ctx = NULL; 1151 unsigned char tbs[] = { 1152 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 1153 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13 1154 }; 1155 1156 if (tst == 0 ) { 1157 if (!TEST_ptr(pkey = load_example_rsa_key())) 1158 goto out; 1159 } else if (tst == 1) { 1160 #ifndef OPENSSL_NO_DSA 1161 if (!TEST_ptr(pkey = load_example_dsa_key())) 1162 goto out; 1163 #else 1164 ret = 1; 1165 goto out; 1166 #endif 1167 } else { 1168 #ifndef OPENSSL_NO_EC 1169 if (!TEST_ptr(pkey = load_example_ec_key())) 1170 goto out; 1171 #else 1172 ret = 1; 1173 goto out; 1174 #endif 1175 } 1176 1177 ctx = EVP_PKEY_CTX_new_from_pkey(testctx, pkey, NULL); 1178 if (!TEST_ptr(ctx) 1179 || !TEST_int_gt(EVP_PKEY_sign_init(ctx), 0) 1180 || !TEST_int_gt(EVP_PKEY_sign(ctx, NULL, &sig_len, tbs, 1181 sizeof(tbs)), 0)) 1182 goto out; 1183 sig = OPENSSL_malloc(sig_len); 1184 if (!TEST_ptr(sig) 1185 /* Test sending a signature buffer that is too short is rejected */ 1186 || !TEST_int_le(EVP_PKEY_sign(ctx, sig, &shortsig_len, tbs, 1187 sizeof(tbs)), 0) 1188 || !TEST_int_gt(EVP_PKEY_sign(ctx, sig, &sig_len, tbs, sizeof(tbs)), 1189 0) 1190 /* Test the signature round-trips */ 1191 || !TEST_int_gt(EVP_PKEY_verify_init(ctx), 0) 1192 || !TEST_int_gt(EVP_PKEY_verify(ctx, sig, sig_len, tbs, sizeof(tbs)), 1193 0)) 1194 goto out; 1195 1196 ret = 1; 1197 out: 1198 EVP_PKEY_CTX_free(ctx); 1199 OPENSSL_free(sig); 1200 EVP_PKEY_free(pkey); 1201 return ret; 1202 } 1203 1204 #ifndef OPENSSL_NO_DEPRECATED_3_0 1205 static int test_EVP_PKEY_sign_with_app_method(int tst) 1206 { 1207 int ret = 0; 1208 EVP_PKEY *pkey = NULL; 1209 RSA *rsa = NULL; 1210 RSA_METHOD *rsa_meth = NULL; 1211 #ifndef OPENSSL_NO_DSA 1212 DSA *dsa = NULL; 1213 DSA_METHOD *dsa_meth = NULL; 1214 #endif 1215 unsigned char *sig = NULL; 1216 size_t sig_len = 0, shortsig_len = 1; 1217 EVP_PKEY_CTX *ctx = NULL; 1218 unsigned char tbs[] = { 1219 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 1220 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13 1221 }; 1222 1223 if (tst == 0) { 1224 if (!TEST_ptr(pkey = load_example_rsa_key())) 1225 goto out; 1226 if (!TEST_ptr(rsa_meth = RSA_meth_dup(RSA_get_default_method()))) 1227 goto out; 1228 1229 if (!TEST_ptr(rsa = EVP_PKEY_get1_RSA(pkey)) 1230 || !TEST_int_gt(RSA_set_method(rsa, rsa_meth), 0) 1231 || !TEST_int_gt(EVP_PKEY_assign_RSA(pkey, rsa), 0)) 1232 goto out; 1233 rsa = NULL; /* now owned by the pkey */ 1234 } else { 1235 #ifndef OPENSSL_NO_DSA 1236 if (!TEST_ptr(pkey = load_example_dsa_key())) 1237 goto out; 1238 if (!TEST_ptr(dsa_meth = DSA_meth_dup(DSA_get_default_method()))) 1239 goto out; 1240 1241 if (!TEST_ptr(dsa = EVP_PKEY_get1_DSA(pkey)) 1242 || !TEST_int_gt(DSA_set_method(dsa, dsa_meth), 0) 1243 || !TEST_int_gt(EVP_PKEY_assign_DSA(pkey, dsa), 0)) 1244 goto out; 1245 dsa = NULL; /* now owned by the pkey */ 1246 #else 1247 ret = 1; 1248 goto out; 1249 #endif 1250 } 1251 1252 ctx = EVP_PKEY_CTX_new_from_pkey(testctx, pkey, NULL); 1253 if (!TEST_ptr(ctx) 1254 || !TEST_int_gt(EVP_PKEY_sign_init(ctx), 0) 1255 || !TEST_int_gt(EVP_PKEY_sign(ctx, NULL, &sig_len, tbs, 1256 sizeof(tbs)), 0)) 1257 goto out; 1258 sig = OPENSSL_malloc(sig_len); 1259 if (!TEST_ptr(sig) 1260 /* Test sending a signature buffer that is too short is rejected */ 1261 || !TEST_int_le(EVP_PKEY_sign(ctx, sig, &shortsig_len, tbs, 1262 sizeof(tbs)), 0) 1263 || !TEST_int_gt(EVP_PKEY_sign(ctx, sig, &sig_len, tbs, sizeof(tbs)), 1264 0) 1265 /* Test the signature round-trips */ 1266 || !TEST_int_gt(EVP_PKEY_verify_init(ctx), 0) 1267 || !TEST_int_gt(EVP_PKEY_verify(ctx, sig, sig_len, tbs, sizeof(tbs)), 1268 0)) 1269 goto out; 1270 1271 ret = 1; 1272 out: 1273 EVP_PKEY_CTX_free(ctx); 1274 OPENSSL_free(sig); 1275 EVP_PKEY_free(pkey); 1276 RSA_free(rsa); 1277 RSA_meth_free(rsa_meth); 1278 #ifndef OPENSSL_NO_DSA 1279 DSA_free(dsa); 1280 DSA_meth_free(dsa_meth); 1281 #endif 1282 return ret; 1283 } 1284 #endif /* !OPENSSL_NO_DEPRECATED_3_0 */ 1285 1286 /* 1287 * n = 0 => test using legacy cipher 1288 * n = 1 => test using fetched cipher 1289 */ 1290 static int test_EVP_Enveloped(int n) 1291 { 1292 int ret = 0; 1293 EVP_CIPHER_CTX *ctx = NULL; 1294 EVP_PKEY *keypair = NULL; 1295 unsigned char *kek = NULL; 1296 unsigned char iv[EVP_MAX_IV_LENGTH]; 1297 static const unsigned char msg[] = { 1, 2, 3, 4, 5, 6, 7, 8 }; 1298 int len, kek_len, ciphertext_len, plaintext_len; 1299 unsigned char ciphertext[32], plaintext[16]; 1300 EVP_CIPHER *type = NULL; 1301 1302 if (nullprov != NULL) 1303 return TEST_skip("Test does not support a non-default library context"); 1304 1305 if (n == 0) 1306 type = (EVP_CIPHER *)EVP_aes_256_cbc(); 1307 else if (!TEST_ptr(type = EVP_CIPHER_fetch(testctx, "AES-256-CBC", 1308 testpropq))) 1309 goto err; 1310 1311 if (!TEST_ptr(keypair = load_example_rsa_key()) 1312 || !TEST_ptr(kek = OPENSSL_zalloc(EVP_PKEY_get_size(keypair))) 1313 || !TEST_ptr(ctx = EVP_CIPHER_CTX_new()) 1314 || !TEST_true(EVP_SealInit(ctx, type, &kek, &kek_len, iv, 1315 &keypair, 1)) 1316 || !TEST_true(EVP_SealUpdate(ctx, ciphertext, &ciphertext_len, 1317 msg, sizeof(msg))) 1318 || !TEST_true(EVP_SealFinal(ctx, ciphertext + ciphertext_len, 1319 &len))) 1320 goto err; 1321 1322 ciphertext_len += len; 1323 1324 if (!TEST_true(EVP_OpenInit(ctx, type, kek, kek_len, iv, keypair)) 1325 || !TEST_true(EVP_OpenUpdate(ctx, plaintext, &plaintext_len, 1326 ciphertext, ciphertext_len)) 1327 || !TEST_true(EVP_OpenFinal(ctx, plaintext + plaintext_len, &len))) 1328 goto err; 1329 1330 plaintext_len += len; 1331 if (!TEST_mem_eq(msg, sizeof(msg), plaintext, plaintext_len)) 1332 goto err; 1333 1334 ret = 1; 1335 err: 1336 if (n != 0) 1337 EVP_CIPHER_free(type); 1338 OPENSSL_free(kek); 1339 EVP_PKEY_free(keypair); 1340 EVP_CIPHER_CTX_free(ctx); 1341 return ret; 1342 } 1343 1344 /* 1345 * Test 0: Standard calls to EVP_DigestSignInit/Update/Final (Implicit fetch digest, RSA) 1346 * Test 1: Standard calls to EVP_DigestSignInit/Update/Final (Implicit fetch digest, DSA) 1347 * Test 2: Standard calls to EVP_DigestSignInit/Update/Final (Implicit fetch digest, HMAC) 1348 * Test 3: Standard calls to EVP_DigestSignInit/Update/Final (Explicit fetch digest, RSA) 1349 * Test 4: Standard calls to EVP_DigestSignInit/Update/Final (Explicit fetch digest, DSA) 1350 * Test 5: Standard calls to EVP_DigestSignInit/Update/Final (Explicit fetch diegst, HMAC) 1351 * Test 6: Use an MD BIO to do the Update calls instead (RSA) 1352 * Test 7: Use an MD BIO to do the Update calls instead (DSA) 1353 * Test 8: Use an MD BIO to do the Update calls instead (HMAC) 1354 * Test 9: Use EVP_DigestSign (Implicit fetch digest, RSA, short sig) 1355 * Test 10: Use EVP_DigestSign (Implicit fetch digest, DSA, short sig) 1356 * Test 11: Use EVP_DigestSign (Implicit fetch digest, HMAC, short sig) 1357 * Test 12: Use EVP_DigestSign (Implicit fetch digest, RSA) 1358 * Test 13: Use EVP_DigestSign (Implicit fetch digest, DSA) 1359 * Test 14: Use EVP_DigestSign (Implicit fetch digest, HMAC) 1360 * Test 15-29: Same as above with reinitialization 1361 */ 1362 static int test_EVP_DigestSignInit(int tst) 1363 { 1364 int ret = 0; 1365 EVP_PKEY *pkey = NULL; 1366 unsigned char *sig = NULL, *sig2 = NULL; 1367 size_t sig_len = 0, sig2_len = 0, shortsig_len = 1; 1368 EVP_MD_CTX *md_ctx = NULL, *md_ctx_verify = NULL; 1369 EVP_MD_CTX *a_md_ctx = NULL, *a_md_ctx_verify = NULL; 1370 BIO *mdbio = NULL, *membio = NULL; 1371 size_t written; 1372 const EVP_MD *md; 1373 EVP_MD *mdexp = NULL; 1374 int reinit = 0; 1375 1376 if (nullprov != NULL) 1377 return TEST_skip("Test does not support a non-default library context"); 1378 1379 if (tst >= 15) { 1380 reinit = 1; 1381 tst -= 15; 1382 } 1383 1384 if (tst >= 6 && tst <= 8) { 1385 membio = BIO_new(BIO_s_mem()); 1386 mdbio = BIO_new(BIO_f_md()); 1387 if (!TEST_ptr(membio) || !TEST_ptr(mdbio)) 1388 goto out; 1389 BIO_push(mdbio, membio); 1390 if (!TEST_int_gt(BIO_get_md_ctx(mdbio, &md_ctx), 0)) 1391 goto out; 1392 } else { 1393 if (!TEST_ptr(a_md_ctx = md_ctx = EVP_MD_CTX_new()) 1394 || !TEST_ptr(a_md_ctx_verify = md_ctx_verify = EVP_MD_CTX_new())) 1395 goto out; 1396 } 1397 1398 if (tst % 3 == 0) { 1399 if (!TEST_ptr(pkey = load_example_rsa_key())) 1400 goto out; 1401 } else if (tst % 3 == 1) { 1402 #ifndef OPENSSL_NO_DSA 1403 if (!TEST_ptr(pkey = load_example_dsa_key())) 1404 goto out; 1405 #else 1406 ret = 1; 1407 goto out; 1408 #endif 1409 } else { 1410 if (!TEST_ptr(pkey = load_example_hmac_key())) 1411 goto out; 1412 } 1413 1414 if (tst >= 3 && tst <= 5) 1415 md = mdexp = EVP_MD_fetch(NULL, "SHA256", NULL); 1416 else 1417 md = EVP_sha256(); 1418 1419 if (!TEST_true(EVP_DigestSignInit(md_ctx, NULL, md, NULL, pkey))) 1420 goto out; 1421 1422 if (reinit && !TEST_true(EVP_DigestSignInit(md_ctx, NULL, NULL, NULL, NULL))) 1423 goto out; 1424 1425 if (tst >= 6 && tst <= 8) { 1426 if (!BIO_write_ex(mdbio, kMsg, sizeof(kMsg), &written)) 1427 goto out; 1428 } else if (tst < 6) { 1429 if (!TEST_true(EVP_DigestSignUpdate(md_ctx, kMsg, sizeof(kMsg)))) 1430 goto out; 1431 } 1432 1433 if (tst >= 9) { 1434 /* Determine the size of the signature. */ 1435 if (!TEST_true(EVP_DigestSign(md_ctx, NULL, &sig_len, kMsg, 1436 sizeof(kMsg))) 1437 || !TEST_ptr(sig = OPENSSL_malloc(sig_len))) 1438 goto out; 1439 if (tst <= 11) { 1440 /* Test that supply a short sig buffer fails */ 1441 if (!TEST_false(EVP_DigestSign(md_ctx, sig, &shortsig_len, kMsg, 1442 sizeof(kMsg)))) 1443 goto out; 1444 /* 1445 * We end here because once EVP_DigestSign() has failed you should 1446 * not call it again without re-initing the ctx 1447 */ 1448 ret = 1; 1449 goto out; 1450 } 1451 if (!TEST_true(EVP_DigestSign(md_ctx, sig, &sig_len, kMsg, 1452 sizeof(kMsg)))) 1453 goto out; 1454 } else { 1455 /* Determine the size of the signature. */ 1456 if (!TEST_true(EVP_DigestSignFinal(md_ctx, NULL, &sig_len)) 1457 || !TEST_ptr(sig = OPENSSL_malloc(sig_len)) 1458 /* 1459 * Trying to create a signature with a deliberately short 1460 * buffer should fail. 1461 */ 1462 || !TEST_false(EVP_DigestSignFinal(md_ctx, sig, &shortsig_len)) 1463 || !TEST_true(EVP_DigestSignFinal(md_ctx, sig, &sig_len))) 1464 goto out; 1465 } 1466 1467 /* 1468 * Ensure that the signature round-trips (Verification isn't supported for 1469 * HMAC via EVP_DigestVerify*) 1470 */ 1471 if (tst % 3 != 2) { 1472 if (tst >= 6 && tst <= 8) { 1473 if (!TEST_int_gt(BIO_reset(mdbio), 0) 1474 || !TEST_int_gt(BIO_get_md_ctx(mdbio, &md_ctx_verify), 0)) 1475 goto out; 1476 } 1477 1478 if (!TEST_true(EVP_DigestVerifyInit(md_ctx_verify, NULL, md, 1479 NULL, pkey))) 1480 goto out; 1481 1482 if (tst >= 6 && tst <= 8) { 1483 if (!TEST_true(BIO_write_ex(mdbio, kMsg, sizeof(kMsg), &written))) 1484 goto out; 1485 } else { 1486 if (!TEST_true(EVP_DigestVerifyUpdate(md_ctx_verify, kMsg, 1487 sizeof(kMsg)))) 1488 goto out; 1489 } 1490 if (!TEST_int_gt(EVP_DigestVerifyFinal(md_ctx_verify, sig, sig_len), 0)) 1491 goto out; 1492 1493 /* Multiple calls to EVP_DigestVerifyFinal should work */ 1494 if (!TEST_int_gt(EVP_DigestVerifyFinal(md_ctx_verify, sig, sig_len), 0)) 1495 goto out; 1496 } else { 1497 /* 1498 * For HMAC a doubled call to DigestSignFinal should produce the same 1499 * value as finalization should not happen. 1500 */ 1501 if (!TEST_true(EVP_DigestSignFinal(md_ctx, NULL, &sig2_len)) 1502 || !TEST_ptr(sig2 = OPENSSL_malloc(sig2_len)) 1503 || !TEST_true(EVP_DigestSignFinal(md_ctx, sig2, &sig2_len))) 1504 goto out; 1505 1506 if (!TEST_mem_eq(sig, sig_len, sig2, sig2_len)) 1507 goto out; 1508 } 1509 1510 ret = 1; 1511 1512 out: 1513 BIO_free(membio); 1514 BIO_free(mdbio); 1515 EVP_MD_CTX_free(a_md_ctx); 1516 EVP_MD_CTX_free(a_md_ctx_verify); 1517 EVP_PKEY_free(pkey); 1518 OPENSSL_free(sig); 1519 OPENSSL_free(sig2); 1520 EVP_MD_free(mdexp); 1521 1522 return ret; 1523 } 1524 1525 static int test_EVP_DigestVerifyInit(void) 1526 { 1527 int ret = 0; 1528 EVP_PKEY *pkey = NULL; 1529 EVP_MD_CTX *md_ctx = NULL; 1530 1531 if (nullprov != NULL) 1532 return TEST_skip("Test does not support a non-default library context"); 1533 1534 if (!TEST_ptr(md_ctx = EVP_MD_CTX_new()) 1535 || !TEST_ptr(pkey = load_example_rsa_key())) 1536 goto out; 1537 1538 if (!TEST_true(EVP_DigestVerifyInit(md_ctx, NULL, EVP_sha256(), NULL, pkey)) 1539 || !TEST_true(EVP_DigestVerifyUpdate(md_ctx, kMsg, sizeof(kMsg))) 1540 || !TEST_int_gt(EVP_DigestVerifyFinal(md_ctx, kSignature, 1541 sizeof(kSignature)), 0)) 1542 goto out; 1543 1544 /* test with reinitialization */ 1545 if (!TEST_true(EVP_DigestVerifyInit(md_ctx, NULL, NULL, NULL, NULL)) 1546 || !TEST_true(EVP_DigestVerifyUpdate(md_ctx, kMsg, sizeof(kMsg))) 1547 || !TEST_int_gt(EVP_DigestVerifyFinal(md_ctx, kSignature, 1548 sizeof(kSignature)), 0)) 1549 goto out; 1550 ret = 1; 1551 1552 out: 1553 EVP_MD_CTX_free(md_ctx); 1554 EVP_PKEY_free(pkey); 1555 return ret; 1556 } 1557 1558 #ifndef OPENSSL_NO_SIPHASH 1559 /* test SIPHASH MAC via EVP_PKEY with non-default parameters and reinit */ 1560 static int test_siphash_digestsign(void) 1561 { 1562 unsigned char key[16]; 1563 unsigned char buf[8], digest[8]; 1564 unsigned char expected[8] = { 1565 0x6d, 0x3e, 0x54, 0xc2, 0x2f, 0xf1, 0xfe, 0xe2 1566 }; 1567 EVP_PKEY *pkey = NULL; 1568 EVP_MD_CTX *mdctx = NULL; 1569 EVP_PKEY_CTX *ctx = NULL; 1570 int ret = 0; 1571 size_t len = 8; 1572 1573 if (nullprov != NULL) 1574 return TEST_skip("Test does not support a non-default library context"); 1575 1576 memset(buf, 0, 8); 1577 memset(key, 1, 16); 1578 if (!TEST_ptr(pkey = EVP_PKEY_new_raw_private_key(EVP_PKEY_SIPHASH, NULL, 1579 key, 16))) 1580 goto out; 1581 1582 if (!TEST_ptr(mdctx = EVP_MD_CTX_create())) 1583 goto out; 1584 1585 if (!TEST_true(EVP_DigestSignInit(mdctx, &ctx, NULL, NULL, pkey))) 1586 goto out; 1587 if (!TEST_int_eq(EVP_PKEY_CTX_ctrl(ctx, -1, EVP_PKEY_OP_SIGNCTX, 1588 EVP_PKEY_CTRL_SET_DIGEST_SIZE, 1589 8, NULL), 1)) 1590 goto out; 1591 /* reinitialize */ 1592 if (!TEST_true(EVP_DigestSignInit(mdctx, NULL, NULL, NULL, NULL))) 1593 goto out; 1594 if (!TEST_true(EVP_DigestSignUpdate(mdctx, buf, 8))) 1595 goto out; 1596 if (!TEST_true(EVP_DigestSignFinal(mdctx, digest, &len))) 1597 goto out; 1598 if (!TEST_mem_eq(digest, len, expected, sizeof(expected))) 1599 goto out; 1600 1601 ret = 1; 1602 out: 1603 EVP_PKEY_free(pkey); 1604 EVP_MD_CTX_free(mdctx); 1605 return ret; 1606 } 1607 #endif 1608 1609 /* 1610 * Test corner cases of EVP_DigestInit/Update/Final API call behavior. 1611 */ 1612 static int test_EVP_Digest(void) 1613 { 1614 int ret = 0; 1615 EVP_MD_CTX *md_ctx = NULL; 1616 unsigned char md[EVP_MAX_MD_SIZE]; 1617 EVP_MD *sha256 = NULL; 1618 EVP_MD *shake256 = NULL; 1619 1620 if (!TEST_ptr(md_ctx = EVP_MD_CTX_new())) 1621 goto out; 1622 1623 if (!TEST_ptr(sha256 = EVP_MD_fetch(testctx, "sha256", testpropq)) 1624 || !TEST_ptr(shake256 = EVP_MD_fetch(testctx, "shake256", testpropq))) 1625 goto out; 1626 1627 if (!TEST_true(EVP_DigestInit_ex(md_ctx, sha256, NULL)) 1628 || !TEST_true(EVP_DigestUpdate(md_ctx, kMsg, sizeof(kMsg))) 1629 || !TEST_true(EVP_DigestFinal(md_ctx, md, NULL)) 1630 /* EVP_DigestFinal resets the EVP_MD_CTX. */ 1631 || !TEST_ptr_eq(EVP_MD_CTX_get0_md(md_ctx), NULL)) 1632 goto out; 1633 1634 if (!TEST_true(EVP_DigestInit_ex(md_ctx, sha256, NULL)) 1635 || !TEST_true(EVP_DigestUpdate(md_ctx, kMsg, sizeof(kMsg))) 1636 || !TEST_true(EVP_DigestFinal_ex(md_ctx, md, NULL)) 1637 /* EVP_DigestFinal_ex does not reset the EVP_MD_CTX. */ 1638 || !TEST_ptr(EVP_MD_CTX_get0_md(md_ctx)) 1639 /* 1640 * EVP_DigestInit_ex with NULL type should work on 1641 * pre-initialized context. 1642 */ 1643 || !TEST_true(EVP_DigestInit_ex(md_ctx, NULL, NULL))) 1644 goto out; 1645 1646 if (!TEST_true(EVP_DigestInit_ex(md_ctx, shake256, NULL)) 1647 || !TEST_true(EVP_DigestUpdate(md_ctx, kMsg, sizeof(kMsg))) 1648 || !TEST_true(EVP_DigestFinalXOF(md_ctx, md, sizeof(md))) 1649 /* EVP_DigestFinalXOF does not reset the EVP_MD_CTX. */ 1650 || !TEST_ptr(EVP_MD_CTX_get0_md(md_ctx)) 1651 || !TEST_true(EVP_DigestInit_ex(md_ctx, NULL, NULL))) 1652 goto out; 1653 ret = 1; 1654 1655 out: 1656 EVP_MD_CTX_free(md_ctx); 1657 EVP_MD_free(sha256); 1658 EVP_MD_free(shake256); 1659 return ret; 1660 } 1661 1662 static int test_EVP_md_null(void) 1663 { 1664 int ret = 0; 1665 EVP_MD_CTX *md_ctx = NULL; 1666 const EVP_MD *md_null = EVP_md_null(); 1667 unsigned char md_value[EVP_MAX_MD_SIZE]; 1668 unsigned int md_len = sizeof(md_value); 1669 1670 if (nullprov != NULL) 1671 return TEST_skip("Test does not support a non-default library context"); 1672 1673 if (!TEST_ptr(md_null) 1674 || !TEST_ptr(md_ctx = EVP_MD_CTX_new())) 1675 goto out; 1676 1677 if (!TEST_true(EVP_DigestInit_ex(md_ctx, md_null, NULL)) 1678 || !TEST_true(EVP_DigestUpdate(md_ctx, "test", 4)) 1679 || !TEST_true(EVP_DigestFinal_ex(md_ctx, md_value, &md_len))) 1680 goto out; 1681 1682 if (!TEST_uint_eq(md_len, 0)) 1683 goto out; 1684 1685 ret = 1; 1686 out: 1687 EVP_MD_CTX_free(md_ctx); 1688 return ret; 1689 } 1690 1691 static int test_d2i_AutoPrivateKey(int i) 1692 { 1693 int ret = 0; 1694 const unsigned char *p; 1695 EVP_PKEY *pkey = NULL; 1696 const APK_DATA *ak = &keydata[i]; 1697 const unsigned char *input = ak->kder; 1698 size_t input_len = ak->size; 1699 int expected_id = ak->evptype; 1700 1701 p = input; 1702 if (!TEST_ptr(pkey = d2i_AutoPrivateKey(NULL, &p, input_len)) 1703 || !TEST_ptr_eq(p, input + input_len) 1704 || !TEST_int_eq(EVP_PKEY_get_id(pkey), expected_id)) 1705 goto done; 1706 1707 ret = 1; 1708 1709 done: 1710 EVP_PKEY_free(pkey); 1711 return ret; 1712 } 1713 1714 #ifndef OPENSSL_NO_EC 1715 1716 static const unsigned char ec_public_sect163k1_validxy[] = { 1717 0x30, 0x40, 0x30, 0x10, 0x06, 0x07, 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x02, 1718 0x01, 0x06, 0x05, 0x2b, 0x81, 0x04, 0x00, 0x01, 0x03, 0x2c, 0x00, 0x04, 1719 0x02, 0x84, 0x58, 0xa6, 0xd4, 0xa0, 0x35, 0x2b, 0xae, 0xf0, 0xc0, 0x69, 1720 0x05, 0xcf, 0x2a, 0x50, 0x33, 0xf9, 0xe3, 0x92, 0x79, 0x02, 0xd1, 0x7b, 1721 0x9f, 0x22, 0x00, 0xf0, 0x3b, 0x0e, 0x5d, 0x2e, 0xb7, 0x23, 0x24, 0xf3, 1722 0x6a, 0xd8, 0x17, 0x65, 0x41, 0x2f 1723 }; 1724 1725 static const unsigned char ec_public_sect163k1_badx[] = { 1726 0x30, 0x40, 0x30, 0x10, 0x06, 0x07, 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x02, 1727 0x01, 0x06, 0x05, 0x2b, 0x81, 0x04, 0x00, 0x01, 0x03, 0x2c, 0x00, 0x04, 1728 0x0a, 0x84, 0x58, 0xa6, 0xd4, 0xa0, 0x35, 0x2b, 0xae, 0xf0, 0xc0, 0x69, 1729 0x05, 0xcf, 0x2a, 0x50, 0x33, 0xf9, 0xe3, 0x92, 0xb0, 0x02, 0xd1, 0x7b, 1730 0x9f, 0x22, 0x00, 0xf0, 0x3b, 0x0e, 0x5d, 0x2e, 0xb7, 0x23, 0x24, 0xf3, 1731 0x6a, 0xd8, 0x17, 0x65, 0x41, 0x2f 1732 }; 1733 1734 static const unsigned char ec_public_sect163k1_bady[] = { 1735 0x30, 0x40, 0x30, 0x10, 0x06, 0x07, 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x02, 1736 0x01, 0x06, 0x05, 0x2b, 0x81, 0x04, 0x00, 0x01, 0x03, 0x2c, 0x00, 0x04, 1737 0x02, 0x84, 0x58, 0xa6, 0xd4, 0xa0, 0x35, 0x2b, 0xae, 0xf0, 0xc0, 0x69, 1738 0x05, 0xcf, 0x2a, 0x50, 0x33, 0xf9, 0xe3, 0x92, 0x79, 0x0a, 0xd1, 0x7b, 1739 0x9f, 0x22, 0x00, 0xf0, 0x3b, 0x0e, 0x5d, 0x2e, 0xb7, 0x23, 0x24, 0xf3, 1740 0x6a, 0xd8, 0x17, 0x65, 0x41, 0xe6 1741 }; 1742 1743 static struct ec_der_pub_keys_st { 1744 const unsigned char *der; 1745 size_t len; 1746 int valid; 1747 } ec_der_pub_keys[] = { 1748 { ec_public_sect163k1_validxy, sizeof(ec_public_sect163k1_validxy), 1 }, 1749 { ec_public_sect163k1_badx, sizeof(ec_public_sect163k1_badx), 0 }, 1750 { ec_public_sect163k1_bady, sizeof(ec_public_sect163k1_bady), 0 }, 1751 }; 1752 1753 /* 1754 * Tests the range of the decoded EC char2 public point. 1755 * See ec_GF2m_simple_oct2point(). 1756 */ 1757 static int test_invalide_ec_char2_pub_range_decode(int id) 1758 { 1759 int ret = 0; 1760 EVP_PKEY *pkey; 1761 1762 pkey = load_example_key("EC", ec_der_pub_keys[id].der, 1763 ec_der_pub_keys[id].len); 1764 1765 ret = (ec_der_pub_keys[id].valid && TEST_ptr(pkey)) 1766 || TEST_ptr_null(pkey); 1767 EVP_PKEY_free(pkey); 1768 return ret; 1769 } 1770 1771 /* Tests loading a bad key in PKCS8 format */ 1772 static int test_EVP_PKCS82PKEY(void) 1773 { 1774 int ret = 0; 1775 const unsigned char *derp = kExampleBadECKeyDER; 1776 PKCS8_PRIV_KEY_INFO *p8inf = NULL; 1777 EVP_PKEY *pkey = NULL; 1778 1779 if (!TEST_ptr(p8inf = d2i_PKCS8_PRIV_KEY_INFO(NULL, &derp, 1780 sizeof(kExampleBadECKeyDER)))) 1781 goto done; 1782 1783 if (!TEST_ptr_eq(derp, 1784 kExampleBadECKeyDER + sizeof(kExampleBadECKeyDER))) 1785 goto done; 1786 1787 if (!TEST_ptr_null(pkey = EVP_PKCS82PKEY(p8inf))) 1788 goto done; 1789 1790 ret = 1; 1791 1792 done: 1793 PKCS8_PRIV_KEY_INFO_free(p8inf); 1794 EVP_PKEY_free(pkey); 1795 1796 return ret; 1797 } 1798 1799 #endif 1800 static int test_EVP_PKCS82PKEY_wrong_tag(void) 1801 { 1802 EVP_PKEY *pkey = NULL; 1803 EVP_PKEY *pkey2 = NULL; 1804 BIO *membio = NULL; 1805 char *membuf = NULL; 1806 PKCS8_PRIV_KEY_INFO *p8inf = NULL; 1807 int ok = 0; 1808 1809 if (testctx != NULL) 1810 /* test not supported with non-default context */ 1811 return 1; 1812 1813 if (!TEST_ptr(membio = BIO_new(BIO_s_mem())) 1814 || !TEST_ptr(pkey = load_example_rsa_key()) 1815 || !TEST_int_gt(i2d_PKCS8PrivateKey_bio(membio, pkey, NULL, 1816 NULL, 0, NULL, NULL), 1817 0) 1818 || !TEST_int_gt(BIO_get_mem_data(membio, &membuf), 0) 1819 || !TEST_ptr(p8inf = d2i_PKCS8_PRIV_KEY_INFO_bio(membio, NULL)) 1820 || !TEST_ptr(pkey2 = EVP_PKCS82PKEY(p8inf)) 1821 || !TEST_int_eq(ERR_peek_last_error(), 0)) { 1822 goto done; 1823 } 1824 1825 ok = 1; 1826 done: 1827 EVP_PKEY_free(pkey); 1828 EVP_PKEY_free(pkey2); 1829 PKCS8_PRIV_KEY_INFO_free(p8inf); 1830 BIO_free_all(membio); 1831 return ok; 1832 } 1833 1834 /* This uses kExampleRSAKeyDER and kExampleRSAKeyPKCS8 to verify encoding */ 1835 static int test_privatekey_to_pkcs8(void) 1836 { 1837 EVP_PKEY *pkey = NULL; 1838 BIO *membio = NULL; 1839 char *membuf = NULL; 1840 long membuf_len = 0; 1841 int ok = 0; 1842 1843 if (!TEST_ptr(membio = BIO_new(BIO_s_mem())) 1844 || !TEST_ptr(pkey = load_example_rsa_key()) 1845 || !TEST_int_gt(i2d_PKCS8PrivateKey_bio(membio, pkey, NULL, 1846 NULL, 0, NULL, NULL), 1847 0) 1848 || !TEST_int_gt(membuf_len = BIO_get_mem_data(membio, &membuf), 0) 1849 || !TEST_ptr(membuf) 1850 || !TEST_mem_eq(membuf, (size_t)membuf_len, 1851 kExampleRSAKeyPKCS8, sizeof(kExampleRSAKeyPKCS8)) 1852 /* 1853 * We try to write PEM as well, just to see that it doesn't err, but 1854 * assume that the result is correct. 1855 */ 1856 || !TEST_int_gt(PEM_write_bio_PKCS8PrivateKey(membio, pkey, NULL, 1857 NULL, 0, NULL, NULL), 1858 0)) 1859 goto done; 1860 1861 ok = 1; 1862 done: 1863 EVP_PKEY_free(pkey); 1864 BIO_free_all(membio); 1865 return ok; 1866 } 1867 1868 #ifndef OPENSSL_NO_EC 1869 static const struct { 1870 int encoding; 1871 const char *encoding_name; 1872 } ec_encodings[] = { 1873 { OPENSSL_EC_EXPLICIT_CURVE, OSSL_PKEY_EC_ENCODING_EXPLICIT }, 1874 { OPENSSL_EC_NAMED_CURVE, OSSL_PKEY_EC_ENCODING_GROUP } 1875 }; 1876 1877 static int ec_export_get_encoding_cb(const OSSL_PARAM params[], void *arg) 1878 { 1879 const OSSL_PARAM *p; 1880 const char *enc_name = NULL; 1881 int *enc = arg; 1882 size_t i; 1883 1884 *enc = -1; 1885 1886 if (!TEST_ptr(p = OSSL_PARAM_locate_const(params, 1887 OSSL_PKEY_PARAM_EC_ENCODING)) 1888 || !TEST_true(OSSL_PARAM_get_utf8_string_ptr(p, &enc_name))) 1889 return 0; 1890 1891 for (i = 0; i < OSSL_NELEM(ec_encodings); i++) { 1892 if (OPENSSL_strcasecmp(enc_name, ec_encodings[i].encoding_name) == 0) { 1893 *enc = ec_encodings[i].encoding; 1894 break; 1895 } 1896 } 1897 1898 return (*enc != -1); 1899 } 1900 1901 static int test_EC_keygen_with_enc(int idx) 1902 { 1903 EVP_PKEY *params = NULL, *key = NULL; 1904 EVP_PKEY_CTX *pctx = NULL, *kctx = NULL; 1905 int enc; 1906 int ret = 0; 1907 1908 enc = ec_encodings[idx].encoding; 1909 1910 /* Create key parameters */ 1911 if (!TEST_ptr(pctx = EVP_PKEY_CTX_new_from_name(testctx, "EC", NULL)) 1912 || !TEST_int_gt(EVP_PKEY_paramgen_init(pctx), 0) 1913 || !TEST_int_gt(EVP_PKEY_CTX_set_group_name(pctx, "P-256"), 0) 1914 || !TEST_int_gt(EVP_PKEY_CTX_set_ec_param_enc(pctx, enc), 0) 1915 || !TEST_true(EVP_PKEY_paramgen(pctx, ¶ms)) 1916 || !TEST_ptr(params)) 1917 goto done; 1918 1919 /* Create key */ 1920 if (!TEST_ptr(kctx = EVP_PKEY_CTX_new_from_pkey(testctx, params, NULL)) 1921 || !TEST_int_gt(EVP_PKEY_keygen_init(kctx), 0) 1922 || !TEST_true(EVP_PKEY_keygen(kctx, &key)) 1923 || !TEST_ptr(key)) 1924 goto done; 1925 1926 /* Check that the encoding got all the way into the key */ 1927 if (!TEST_true(evp_keymgmt_util_export(key, OSSL_KEYMGMT_SELECT_ALL, 1928 ec_export_get_encoding_cb, &enc)) 1929 || !TEST_int_eq(enc, ec_encodings[idx].encoding)) 1930 goto done; 1931 1932 ret = 1; 1933 done: 1934 EVP_PKEY_free(key); 1935 EVP_PKEY_free(params); 1936 EVP_PKEY_CTX_free(kctx); 1937 EVP_PKEY_CTX_free(pctx); 1938 return ret; 1939 } 1940 #endif 1941 1942 #if !defined(OPENSSL_NO_SM2) 1943 1944 static int test_EVP_SM2_verify(void) 1945 { 1946 const char *pubkey = 1947 "-----BEGIN PUBLIC KEY-----\n" 1948 "MFkwEwYHKoZIzj0CAQYIKoEcz1UBgi0DQgAEp1KLWq1ZE2jmoAnnBJE1LBGxVr18\n" 1949 "YvvqECWCpXfAQ9qUJ+UmthnUPf0iM3SaXKHe6PlLIDyNlWMWb9RUh/yU3g==\n" 1950 "-----END PUBLIC KEY-----\n"; 1951 1952 const char *msg = "message digest"; 1953 const char *id = "ALICE123@YAHOO.COM"; 1954 1955 const uint8_t signature[] = { 1956 0x30, 0x44, 0x02, 0x20, 0x5b, 0xdb, 0xab, 0x81, 0x4f, 0xbb, 1957 0x8b, 0x69, 0xb1, 0x05, 0x9c, 0x99, 0x3b, 0xb2, 0x45, 0x06, 1958 0x4a, 0x30, 0x15, 0x59, 0x84, 0xcd, 0xee, 0x30, 0x60, 0x36, 1959 0x57, 0x87, 0xef, 0x5c, 0xd0, 0xbe, 0x02, 0x20, 0x43, 0x8d, 1960 0x1f, 0xc7, 0x77, 0x72, 0x39, 0xbb, 0x72, 0xe1, 0xfd, 0x07, 1961 0x58, 0xd5, 0x82, 0xc8, 0x2d, 0xba, 0x3b, 0x2c, 0x46, 0x24, 1962 0xe3, 0x50, 0xff, 0x04, 0xc7, 0xa0, 0x71, 0x9f, 0xa4, 0x70 1963 }; 1964 1965 int rc = 0; 1966 BIO *bio = NULL; 1967 EVP_PKEY *pkey = NULL; 1968 EVP_MD_CTX *mctx = NULL; 1969 EVP_PKEY_CTX *pctx = NULL; 1970 EVP_MD *sm3 = NULL; 1971 1972 bio = BIO_new_mem_buf(pubkey, strlen(pubkey)); 1973 if (!TEST_true(bio != NULL)) 1974 goto done; 1975 1976 pkey = PEM_read_bio_PUBKEY_ex(bio, NULL, NULL, NULL, testctx, testpropq); 1977 if (!TEST_true(pkey != NULL)) 1978 goto done; 1979 1980 if (!TEST_true(EVP_PKEY_is_a(pkey, "SM2"))) 1981 goto done; 1982 1983 if (!TEST_ptr(mctx = EVP_MD_CTX_new())) 1984 goto done; 1985 1986 if (!TEST_ptr(pctx = EVP_PKEY_CTX_new_from_pkey(testctx, pkey, testpropq))) 1987 goto done; 1988 1989 EVP_MD_CTX_set_pkey_ctx(mctx, pctx); 1990 1991 if (!TEST_ptr(sm3 = EVP_MD_fetch(testctx, "sm3", testpropq))) 1992 goto done; 1993 1994 if (!TEST_true(EVP_DigestVerifyInit(mctx, NULL, sm3, NULL, pkey))) 1995 goto done; 1996 1997 if (!TEST_int_gt(EVP_PKEY_CTX_set1_id(pctx, id, strlen(id)), 0)) 1998 goto done; 1999 2000 if (!TEST_true(EVP_DigestVerifyUpdate(mctx, msg, strlen(msg)))) 2001 goto done; 2002 2003 if (!TEST_int_gt(EVP_DigestVerifyFinal(mctx, signature, sizeof(signature)), 0)) 2004 goto done; 2005 rc = 1; 2006 2007 done: 2008 BIO_free(bio); 2009 EVP_PKEY_free(pkey); 2010 EVP_PKEY_CTX_free(pctx); 2011 EVP_MD_CTX_free(mctx); 2012 EVP_MD_free(sm3); 2013 return rc; 2014 } 2015 2016 static int test_EVP_SM2(void) 2017 { 2018 int ret = 0; 2019 EVP_PKEY *pkey = NULL; 2020 EVP_PKEY *pkeyparams = NULL; 2021 EVP_PKEY_CTX *pctx = NULL; 2022 EVP_PKEY_CTX *kctx = NULL; 2023 EVP_PKEY_CTX *sctx = NULL; 2024 size_t sig_len = 0; 2025 unsigned char *sig = NULL; 2026 EVP_MD_CTX *md_ctx = NULL; 2027 EVP_MD_CTX *md_ctx_verify = NULL; 2028 EVP_PKEY_CTX *cctx = NULL; 2029 EVP_MD *check_md = NULL; 2030 2031 uint8_t ciphertext[128]; 2032 size_t ctext_len = sizeof(ciphertext); 2033 2034 uint8_t plaintext[8]; 2035 size_t ptext_len = sizeof(plaintext); 2036 2037 uint8_t sm2_id[] = {1, 2, 3, 4, 'l', 'e', 't', 't', 'e', 'r'}; 2038 2039 OSSL_PARAM sparams[2] = {OSSL_PARAM_END, OSSL_PARAM_END}; 2040 OSSL_PARAM gparams[2] = {OSSL_PARAM_END, OSSL_PARAM_END}; 2041 int i; 2042 char mdname[OSSL_MAX_NAME_SIZE]; 2043 2044 if (!TEST_ptr(pctx = EVP_PKEY_CTX_new_from_name(testctx, 2045 "SM2", testpropq))) 2046 goto done; 2047 2048 if (!TEST_true(EVP_PKEY_paramgen_init(pctx) == 1)) 2049 goto done; 2050 2051 if (!TEST_int_gt(EVP_PKEY_CTX_set_ec_paramgen_curve_nid(pctx, NID_sm2), 0)) 2052 goto done; 2053 2054 if (!TEST_true(EVP_PKEY_paramgen(pctx, &pkeyparams))) 2055 goto done; 2056 2057 if (!TEST_ptr(kctx = EVP_PKEY_CTX_new_from_pkey(testctx, 2058 pkeyparams, testpropq))) 2059 goto done; 2060 2061 if (!TEST_int_gt(EVP_PKEY_keygen_init(kctx), 0)) 2062 goto done; 2063 2064 if (!TEST_true(EVP_PKEY_keygen(kctx, &pkey))) 2065 goto done; 2066 2067 if (!TEST_ptr(md_ctx = EVP_MD_CTX_new())) 2068 goto done; 2069 2070 if (!TEST_ptr(md_ctx_verify = EVP_MD_CTX_new())) 2071 goto done; 2072 2073 if (!TEST_ptr(sctx = EVP_PKEY_CTX_new_from_pkey(testctx, pkey, testpropq))) 2074 goto done; 2075 2076 EVP_MD_CTX_set_pkey_ctx(md_ctx, sctx); 2077 EVP_MD_CTX_set_pkey_ctx(md_ctx_verify, sctx); 2078 2079 if (!TEST_ptr(check_md = EVP_MD_fetch(testctx, "sm3", testpropq))) 2080 goto done; 2081 2082 if (!TEST_true(EVP_DigestSignInit(md_ctx, NULL, check_md, NULL, pkey))) 2083 goto done; 2084 2085 if (!TEST_int_gt(EVP_PKEY_CTX_set1_id(sctx, sm2_id, sizeof(sm2_id)), 0)) 2086 goto done; 2087 2088 if (!TEST_true(EVP_DigestSignUpdate(md_ctx, kMsg, sizeof(kMsg)))) 2089 goto done; 2090 2091 /* Determine the size of the signature. */ 2092 if (!TEST_true(EVP_DigestSignFinal(md_ctx, NULL, &sig_len))) 2093 goto done; 2094 2095 if (!TEST_ptr(sig = OPENSSL_malloc(sig_len))) 2096 goto done; 2097 2098 if (!TEST_true(EVP_DigestSignFinal(md_ctx, sig, &sig_len))) 2099 goto done; 2100 2101 /* Ensure that the signature round-trips. */ 2102 2103 if (!TEST_true(EVP_DigestVerifyInit(md_ctx_verify, NULL, check_md, NULL, 2104 pkey))) 2105 goto done; 2106 2107 if (!TEST_int_gt(EVP_PKEY_CTX_set1_id(sctx, sm2_id, sizeof(sm2_id)), 0)) 2108 goto done; 2109 2110 if (!TEST_true(EVP_DigestVerifyUpdate(md_ctx_verify, kMsg, sizeof(kMsg)))) 2111 goto done; 2112 2113 if (!TEST_int_gt(EVP_DigestVerifyFinal(md_ctx_verify, sig, sig_len), 0)) 2114 goto done; 2115 2116 /* 2117 * Try verify again with non-matching 0 length id but ensure that it can 2118 * be set on the context and overrides the previous value. 2119 */ 2120 2121 if (!TEST_true(EVP_DigestVerifyInit(md_ctx_verify, NULL, check_md, NULL, 2122 pkey))) 2123 goto done; 2124 2125 if (!TEST_int_gt(EVP_PKEY_CTX_set1_id(sctx, NULL, 0), 0)) 2126 goto done; 2127 2128 if (!TEST_true(EVP_DigestVerifyUpdate(md_ctx_verify, kMsg, sizeof(kMsg)))) 2129 goto done; 2130 2131 if (!TEST_int_eq(EVP_DigestVerifyFinal(md_ctx_verify, sig, sig_len), 0)) 2132 goto done; 2133 2134 /* now check encryption/decryption */ 2135 2136 gparams[0] = OSSL_PARAM_construct_utf8_string(OSSL_ASYM_CIPHER_PARAM_DIGEST, 2137 mdname, sizeof(mdname)); 2138 for (i = 0; i < 2; i++) { 2139 const char *mdnames[] = { 2140 #ifndef OPENSSL_NO_SM3 2141 "SM3", 2142 #else 2143 NULL, 2144 #endif 2145 "SHA2-256" }; 2146 EVP_PKEY_CTX_free(cctx); 2147 2148 if (mdnames[i] == NULL) 2149 continue; 2150 2151 sparams[0] = 2152 OSSL_PARAM_construct_utf8_string(OSSL_ASYM_CIPHER_PARAM_DIGEST, 2153 (char *)mdnames[i], 0); 2154 2155 if (!TEST_ptr(cctx = EVP_PKEY_CTX_new_from_pkey(testctx, 2156 pkey, testpropq))) 2157 goto done; 2158 2159 if (!TEST_true(EVP_PKEY_encrypt_init(cctx))) 2160 goto done; 2161 2162 if (!TEST_true(EVP_PKEY_CTX_set_params(cctx, sparams))) 2163 goto done; 2164 2165 if (!TEST_true(EVP_PKEY_encrypt(cctx, ciphertext, &ctext_len, kMsg, 2166 sizeof(kMsg)))) 2167 goto done; 2168 2169 if (!TEST_int_gt(EVP_PKEY_decrypt_init(cctx), 0)) 2170 goto done; 2171 2172 if (!TEST_true(EVP_PKEY_CTX_set_params(cctx, sparams))) 2173 goto done; 2174 2175 if (!TEST_int_gt(EVP_PKEY_decrypt(cctx, plaintext, &ptext_len, ciphertext, 2176 ctext_len), 0)) 2177 goto done; 2178 2179 if (!TEST_true(EVP_PKEY_CTX_get_params(cctx, gparams))) 2180 goto done; 2181 2182 /* 2183 * Test we're still using the digest we think we are. 2184 * Because of aliases, the easiest is to fetch the digest and 2185 * check the name with EVP_MD_is_a(). 2186 */ 2187 EVP_MD_free(check_md); 2188 if (!TEST_ptr(check_md = EVP_MD_fetch(testctx, mdname, testpropq))) 2189 goto done; 2190 if (!TEST_true(EVP_MD_is_a(check_md, mdnames[i]))) { 2191 TEST_info("Fetched md %s isn't %s", mdname, mdnames[i]); 2192 goto done; 2193 } 2194 2195 if (!TEST_true(ptext_len == sizeof(kMsg))) 2196 goto done; 2197 2198 if (!TEST_true(memcmp(plaintext, kMsg, sizeof(kMsg)) == 0)) 2199 goto done; 2200 } 2201 2202 ret = 1; 2203 done: 2204 EVP_PKEY_CTX_free(pctx); 2205 EVP_PKEY_CTX_free(kctx); 2206 EVP_PKEY_CTX_free(sctx); 2207 EVP_PKEY_CTX_free(cctx); 2208 EVP_PKEY_free(pkey); 2209 EVP_PKEY_free(pkeyparams); 2210 EVP_MD_CTX_free(md_ctx); 2211 EVP_MD_CTX_free(md_ctx_verify); 2212 EVP_MD_free(check_md); 2213 OPENSSL_free(sig); 2214 return ret; 2215 } 2216 2217 #endif 2218 2219 static struct keys_st { 2220 int type; 2221 char *priv; 2222 char *pub; 2223 } keys[] = { 2224 { 2225 EVP_PKEY_HMAC, "0123456789", NULL 2226 }, 2227 { 2228 EVP_PKEY_HMAC, "", NULL 2229 #ifndef OPENSSL_NO_POLY1305 2230 }, { 2231 EVP_PKEY_POLY1305, "01234567890123456789012345678901", NULL 2232 #endif 2233 #ifndef OPENSSL_NO_SIPHASH 2234 }, { 2235 EVP_PKEY_SIPHASH, "0123456789012345", NULL 2236 #endif 2237 }, 2238 #ifndef OPENSSL_NO_EC 2239 { 2240 EVP_PKEY_X25519, "01234567890123456789012345678901", 2241 "abcdefghijklmnopqrstuvwxyzabcdef" 2242 }, { 2243 EVP_PKEY_ED25519, "01234567890123456789012345678901", 2244 "abcdefghijklmnopqrstuvwxyzabcdef" 2245 }, { 2246 EVP_PKEY_X448, 2247 "01234567890123456789012345678901234567890123456789012345", 2248 "abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcd" 2249 }, { 2250 EVP_PKEY_ED448, 2251 "012345678901234567890123456789012345678901234567890123456", 2252 "abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcde" 2253 } 2254 #endif 2255 }; 2256 2257 static int test_set_get_raw_keys_int(int tst, int pub, int uselibctx) 2258 { 2259 int ret = 0; 2260 unsigned char buf[80]; 2261 unsigned char *in; 2262 size_t inlen, len = 0, shortlen = 1; 2263 EVP_PKEY *pkey; 2264 2265 /* Check if this algorithm supports public keys */ 2266 if (pub && keys[tst].pub == NULL) 2267 return 1; 2268 2269 memset(buf, 0, sizeof(buf)); 2270 2271 if (pub) { 2272 #ifndef OPENSSL_NO_EC 2273 inlen = strlen(keys[tst].pub); 2274 in = (unsigned char *)keys[tst].pub; 2275 if (uselibctx) { 2276 pkey = EVP_PKEY_new_raw_public_key_ex( 2277 testctx, 2278 OBJ_nid2sn(keys[tst].type), 2279 NULL, 2280 in, 2281 inlen); 2282 } else { 2283 pkey = EVP_PKEY_new_raw_public_key(keys[tst].type, 2284 NULL, 2285 in, 2286 inlen); 2287 } 2288 #else 2289 return 1; 2290 #endif 2291 } else { 2292 inlen = strlen(keys[tst].priv); 2293 in = (unsigned char *)keys[tst].priv; 2294 if (uselibctx) { 2295 pkey = EVP_PKEY_new_raw_private_key_ex( 2296 testctx, OBJ_nid2sn(keys[tst].type), 2297 NULL, 2298 in, 2299 inlen); 2300 } else { 2301 pkey = EVP_PKEY_new_raw_private_key(keys[tst].type, 2302 NULL, 2303 in, 2304 inlen); 2305 } 2306 } 2307 2308 if (!TEST_ptr(pkey) 2309 || !TEST_int_eq(EVP_PKEY_eq(pkey, pkey), 1) 2310 || (!pub && !TEST_true(EVP_PKEY_get_raw_private_key(pkey, NULL, &len))) 2311 || (pub && !TEST_true(EVP_PKEY_get_raw_public_key(pkey, NULL, &len))) 2312 || !TEST_true(len == inlen)) 2313 goto done; 2314 if (tst != 1) { 2315 /* 2316 * Test that supplying a buffer that is too small fails. Doesn't apply 2317 * to HMAC with a zero length key 2318 */ 2319 if ((!pub && !TEST_false(EVP_PKEY_get_raw_private_key(pkey, buf, 2320 &shortlen))) 2321 || (pub && !TEST_false(EVP_PKEY_get_raw_public_key(pkey, buf, 2322 &shortlen)))) 2323 goto done; 2324 } 2325 if ((!pub && !TEST_true(EVP_PKEY_get_raw_private_key(pkey, buf, &len))) 2326 || (pub && !TEST_true(EVP_PKEY_get_raw_public_key(pkey, buf, &len))) 2327 || !TEST_mem_eq(in, inlen, buf, len)) 2328 goto done; 2329 2330 ret = 1; 2331 done: 2332 EVP_PKEY_free(pkey); 2333 return ret; 2334 } 2335 2336 static int test_set_get_raw_keys(int tst) 2337 { 2338 return (nullprov != NULL || test_set_get_raw_keys_int(tst, 0, 0)) 2339 && test_set_get_raw_keys_int(tst, 0, 1) 2340 && (nullprov != NULL || test_set_get_raw_keys_int(tst, 1, 0)) 2341 && test_set_get_raw_keys_int(tst, 1, 1); 2342 } 2343 2344 #ifndef OPENSSL_NO_DEPRECATED_3_0 2345 static int pkey_custom_check(EVP_PKEY *pkey) 2346 { 2347 return 0xbeef; 2348 } 2349 2350 static int pkey_custom_pub_check(EVP_PKEY *pkey) 2351 { 2352 return 0xbeef; 2353 } 2354 2355 static int pkey_custom_param_check(EVP_PKEY *pkey) 2356 { 2357 return 0xbeef; 2358 } 2359 2360 static EVP_PKEY_METHOD *custom_pmeth; 2361 #endif 2362 2363 static int test_EVP_PKEY_check(int i) 2364 { 2365 int ret = 0; 2366 EVP_PKEY *pkey = NULL; 2367 EVP_PKEY_CTX *ctx = NULL; 2368 #ifndef OPENSSL_NO_DEPRECATED_3_0 2369 EVP_PKEY_CTX *ctx2 = NULL; 2370 #endif 2371 const APK_DATA *ak = &keycheckdata[i]; 2372 const unsigned char *input = ak->kder; 2373 size_t input_len = ak->size; 2374 int expected_id = ak->evptype; 2375 int expected_check = ak->check; 2376 int expected_pub_check = ak->pub_check; 2377 int expected_param_check = ak->param_check; 2378 int type = ak->type; 2379 2380 if (!TEST_ptr(pkey = load_example_key(ak->keytype, input, input_len))) 2381 goto done; 2382 if (type == 0 2383 && !TEST_int_eq(EVP_PKEY_get_id(pkey), expected_id)) 2384 goto done; 2385 2386 if (!TEST_ptr(ctx = EVP_PKEY_CTX_new_from_pkey(testctx, pkey, testpropq))) 2387 goto done; 2388 2389 if (!TEST_int_eq(EVP_PKEY_check(ctx), expected_check)) 2390 goto done; 2391 2392 if (!TEST_int_eq(EVP_PKEY_public_check(ctx), expected_pub_check)) 2393 goto done; 2394 2395 if (!TEST_int_eq(EVP_PKEY_param_check(ctx), expected_param_check)) 2396 goto done; 2397 2398 #ifndef OPENSSL_NO_DEPRECATED_3_0 2399 ctx2 = EVP_PKEY_CTX_new_id(0xdefaced, NULL); 2400 /* assign the pkey directly, as an internal test */ 2401 EVP_PKEY_up_ref(pkey); 2402 ctx2->pkey = pkey; 2403 2404 if (!TEST_int_eq(EVP_PKEY_check(ctx2), 0xbeef)) 2405 goto done; 2406 2407 if (!TEST_int_eq(EVP_PKEY_public_check(ctx2), 0xbeef)) 2408 goto done; 2409 2410 if (!TEST_int_eq(EVP_PKEY_param_check(ctx2), 0xbeef)) 2411 goto done; 2412 #endif 2413 2414 ret = 1; 2415 2416 done: 2417 EVP_PKEY_CTX_free(ctx); 2418 #ifndef OPENSSL_NO_DEPRECATED_3_0 2419 EVP_PKEY_CTX_free(ctx2); 2420 #endif 2421 EVP_PKEY_free(pkey); 2422 return ret; 2423 } 2424 2425 #ifndef OPENSSL_NO_CMAC 2426 static int get_cmac_val(EVP_PKEY *pkey, unsigned char *mac) 2427 { 2428 EVP_MD_CTX *mdctx = EVP_MD_CTX_new(); 2429 const char msg[] = "Hello World"; 2430 size_t maclen = AES_BLOCK_SIZE; 2431 int ret = 1; 2432 2433 if (!TEST_ptr(mdctx) 2434 || !TEST_true(EVP_DigestSignInit_ex(mdctx, NULL, NULL, testctx, 2435 testpropq, pkey, NULL)) 2436 || !TEST_true(EVP_DigestSignUpdate(mdctx, msg, sizeof(msg))) 2437 || !TEST_true(EVP_DigestSignFinal(mdctx, mac, &maclen)) 2438 || !TEST_size_t_eq(maclen, AES_BLOCK_SIZE)) 2439 ret = 0; 2440 2441 EVP_MD_CTX_free(mdctx); 2442 2443 return ret; 2444 } 2445 static int test_CMAC_keygen(void) 2446 { 2447 static unsigned char key[] = { 2448 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 2449 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 2450 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f 2451 }; 2452 EVP_PKEY_CTX *kctx = NULL; 2453 int ret = 0; 2454 EVP_PKEY *pkey = NULL; 2455 unsigned char mac[AES_BLOCK_SIZE]; 2456 # if !defined(OPENSSL_NO_DEPRECATED_3_0) 2457 unsigned char mac2[AES_BLOCK_SIZE]; 2458 # endif 2459 2460 if (nullprov != NULL) 2461 return TEST_skip("Test does not support a non-default library context"); 2462 2463 /* 2464 * This is a legacy method for CMACs, but should still work. 2465 * This verifies that it works without an ENGINE. 2466 */ 2467 kctx = EVP_PKEY_CTX_new_id(EVP_PKEY_CMAC, NULL); 2468 2469 /* Test a CMAC key created using the "generated" method */ 2470 if (!TEST_int_gt(EVP_PKEY_keygen_init(kctx), 0) 2471 || !TEST_int_gt(EVP_PKEY_CTX_ctrl(kctx, -1, EVP_PKEY_OP_KEYGEN, 2472 EVP_PKEY_CTRL_CIPHER, 2473 0, (void *)EVP_aes_256_ecb()), 0) 2474 || !TEST_int_gt(EVP_PKEY_CTX_ctrl(kctx, -1, EVP_PKEY_OP_KEYGEN, 2475 EVP_PKEY_CTRL_SET_MAC_KEY, 2476 sizeof(key), (void *)key), 0) 2477 || !TEST_int_gt(EVP_PKEY_keygen(kctx, &pkey), 0) 2478 || !TEST_ptr(pkey) 2479 || !TEST_true(get_cmac_val(pkey, mac))) 2480 goto done; 2481 2482 # if !defined(OPENSSL_NO_DEPRECATED_3_0) 2483 EVP_PKEY_free(pkey); 2484 2485 /* 2486 * Test a CMAC key using the direct method, and compare with the mac 2487 * created above. 2488 */ 2489 pkey = EVP_PKEY_new_CMAC_key(NULL, key, sizeof(key), EVP_aes_256_ecb()); 2490 if (!TEST_ptr(pkey) 2491 || !TEST_true(get_cmac_val(pkey, mac2)) 2492 || !TEST_mem_eq(mac, sizeof(mac), mac2, sizeof(mac2))) 2493 goto done; 2494 # endif 2495 2496 ret = 1; 2497 2498 done: 2499 EVP_PKEY_free(pkey); 2500 EVP_PKEY_CTX_free(kctx); 2501 return ret; 2502 } 2503 #endif 2504 2505 static int test_HKDF(void) 2506 { 2507 EVP_PKEY_CTX *pctx; 2508 unsigned char out[20]; 2509 size_t outlen; 2510 int i, ret = 0; 2511 unsigned char salt[] = "0123456789"; 2512 unsigned char key[] = "012345678901234567890123456789"; 2513 unsigned char info[] = "infostring"; 2514 const unsigned char expected[] = { 2515 0xe5, 0x07, 0x70, 0x7f, 0xc6, 0x78, 0xd6, 0x54, 0x32, 0x5f, 0x7e, 0xc5, 2516 0x7b, 0x59, 0x3e, 0xd8, 0x03, 0x6b, 0xed, 0xca 2517 }; 2518 size_t expectedlen = sizeof(expected); 2519 2520 if (!TEST_ptr(pctx = EVP_PKEY_CTX_new_from_name(testctx, "HKDF", testpropq))) 2521 goto done; 2522 2523 /* We do this twice to test reuse of the EVP_PKEY_CTX */ 2524 for (i = 0; i < 2; i++) { 2525 outlen = sizeof(out); 2526 memset(out, 0, outlen); 2527 2528 if (!TEST_int_gt(EVP_PKEY_derive_init(pctx), 0) 2529 || !TEST_int_gt(EVP_PKEY_CTX_set_hkdf_md(pctx, EVP_sha256()), 0) 2530 || !TEST_int_gt(EVP_PKEY_CTX_set1_hkdf_salt(pctx, salt, 2531 sizeof(salt) - 1), 0) 2532 || !TEST_int_gt(EVP_PKEY_CTX_set1_hkdf_key(pctx, key, 2533 sizeof(key) - 1), 0) 2534 || !TEST_int_gt(EVP_PKEY_CTX_add1_hkdf_info(pctx, info, 2535 sizeof(info) - 1), 0) 2536 || !TEST_int_gt(EVP_PKEY_derive(pctx, out, &outlen), 0) 2537 || !TEST_mem_eq(out, outlen, expected, expectedlen)) 2538 goto done; 2539 } 2540 2541 ret = 1; 2542 2543 done: 2544 EVP_PKEY_CTX_free(pctx); 2545 2546 return ret; 2547 } 2548 2549 static int test_emptyikm_HKDF(void) 2550 { 2551 EVP_PKEY_CTX *pctx; 2552 unsigned char out[20]; 2553 size_t outlen; 2554 int ret = 0; 2555 unsigned char salt[] = "9876543210"; 2556 unsigned char key[] = ""; 2557 unsigned char info[] = "stringinfo"; 2558 const unsigned char expected[] = { 2559 0x68, 0x81, 0xa5, 0x3e, 0x5b, 0x9c, 0x7b, 0x6f, 0x2e, 0xec, 0xc8, 0x47, 2560 0x7c, 0xfa, 0x47, 0x35, 0x66, 0x82, 0x15, 0x30 2561 }; 2562 size_t expectedlen = sizeof(expected); 2563 2564 if (!TEST_ptr(pctx = EVP_PKEY_CTX_new_from_name(testctx, "HKDF", testpropq))) 2565 goto done; 2566 2567 outlen = sizeof(out); 2568 memset(out, 0, outlen); 2569 2570 if (!TEST_int_gt(EVP_PKEY_derive_init(pctx), 0) 2571 || !TEST_int_gt(EVP_PKEY_CTX_set_hkdf_md(pctx, EVP_sha256()), 0) 2572 || !TEST_int_gt(EVP_PKEY_CTX_set1_hkdf_salt(pctx, salt, 2573 sizeof(salt) - 1), 0) 2574 || !TEST_int_gt(EVP_PKEY_CTX_set1_hkdf_key(pctx, key, 2575 sizeof(key) - 1), 0) 2576 || !TEST_int_gt(EVP_PKEY_CTX_add1_hkdf_info(pctx, info, 2577 sizeof(info) - 1), 0) 2578 || !TEST_int_gt(EVP_PKEY_derive(pctx, out, &outlen), 0) 2579 || !TEST_mem_eq(out, outlen, expected, expectedlen)) 2580 goto done; 2581 2582 ret = 1; 2583 2584 done: 2585 EVP_PKEY_CTX_free(pctx); 2586 2587 return ret; 2588 } 2589 2590 static int test_empty_salt_info_HKDF(void) 2591 { 2592 EVP_PKEY_CTX *pctx; 2593 unsigned char out[20]; 2594 size_t outlen; 2595 int ret = 0; 2596 unsigned char salt[] = ""; 2597 unsigned char key[] = "012345678901234567890123456789"; 2598 unsigned char info[] = ""; 2599 const unsigned char expected[] = { 2600 0x67, 0x12, 0xf9, 0x27, 0x8a, 0x8a, 0x3a, 0x8f, 0x7d, 0x2c, 0xa3, 0x6a, 2601 0xaa, 0xe9, 0xb3, 0xb9, 0x52, 0x5f, 0xe0, 0x06, 2602 }; 2603 size_t expectedlen = sizeof(expected); 2604 2605 if (!TEST_ptr(pctx = EVP_PKEY_CTX_new_from_name(testctx, "HKDF", testpropq))) 2606 goto done; 2607 2608 outlen = sizeof(out); 2609 memset(out, 0, outlen); 2610 2611 if (!TEST_int_gt(EVP_PKEY_derive_init(pctx), 0) 2612 || !TEST_int_gt(EVP_PKEY_CTX_set_hkdf_md(pctx, EVP_sha256()), 0) 2613 || !TEST_int_gt(EVP_PKEY_CTX_set1_hkdf_salt(pctx, salt, 2614 sizeof(salt) - 1), 0) 2615 || !TEST_int_gt(EVP_PKEY_CTX_set1_hkdf_key(pctx, key, 2616 sizeof(key) - 1), 0) 2617 || !TEST_int_gt(EVP_PKEY_CTX_add1_hkdf_info(pctx, info, 2618 sizeof(info) - 1), 0) 2619 || !TEST_int_gt(EVP_PKEY_derive(pctx, out, &outlen), 0) 2620 || !TEST_mem_eq(out, outlen, expected, expectedlen)) 2621 goto done; 2622 2623 ret = 1; 2624 2625 done: 2626 EVP_PKEY_CTX_free(pctx); 2627 2628 return ret; 2629 } 2630 2631 #ifndef OPENSSL_NO_EC 2632 static int test_X509_PUBKEY_inplace(void) 2633 { 2634 int ret = 0; 2635 X509_PUBKEY *xp = X509_PUBKEY_new_ex(testctx, testpropq); 2636 const unsigned char *p = kExampleECPubKeyDER; 2637 size_t input_len = sizeof(kExampleECPubKeyDER); 2638 2639 if (!TEST_ptr(xp)) 2640 goto done; 2641 if (!TEST_ptr(d2i_X509_PUBKEY(&xp, &p, input_len))) 2642 goto done; 2643 2644 if (!TEST_ptr(X509_PUBKEY_get0(xp))) 2645 goto done; 2646 2647 p = kExampleBadECPubKeyDER; 2648 input_len = sizeof(kExampleBadECPubKeyDER); 2649 2650 if (!TEST_ptr(xp = d2i_X509_PUBKEY(&xp, &p, input_len))) 2651 goto done; 2652 2653 if (!TEST_true(X509_PUBKEY_get0(xp) == NULL)) 2654 goto done; 2655 2656 ret = 1; 2657 2658 done: 2659 X509_PUBKEY_free(xp); 2660 return ret; 2661 } 2662 2663 static int test_X509_PUBKEY_dup(void) 2664 { 2665 int ret = 0; 2666 X509_PUBKEY *xp = NULL, *xq = NULL; 2667 const unsigned char *p = kExampleECPubKeyDER; 2668 size_t input_len = sizeof(kExampleECPubKeyDER); 2669 2670 xp = X509_PUBKEY_new_ex(testctx, testpropq); 2671 if (!TEST_ptr(xp) 2672 || !TEST_ptr(d2i_X509_PUBKEY(&xp, &p, input_len)) 2673 || !TEST_ptr(xq = X509_PUBKEY_dup(xp)) 2674 || !TEST_ptr_ne(xp, xq)) 2675 goto done; 2676 2677 if (!TEST_ptr(X509_PUBKEY_get0(xq)) 2678 || !TEST_ptr(X509_PUBKEY_get0(xp)) 2679 || !TEST_ptr_ne(X509_PUBKEY_get0(xq), X509_PUBKEY_get0(xp))) 2680 goto done; 2681 2682 X509_PUBKEY_free(xq); 2683 xq = NULL; 2684 p = kExampleBadECPubKeyDER; 2685 input_len = sizeof(kExampleBadECPubKeyDER); 2686 2687 if (!TEST_ptr(xp = d2i_X509_PUBKEY(&xp, &p, input_len)) 2688 || !TEST_ptr(xq = X509_PUBKEY_dup(xp))) 2689 goto done; 2690 2691 X509_PUBKEY_free(xp); 2692 xp = NULL; 2693 if (!TEST_true(X509_PUBKEY_get0(xq) == NULL)) 2694 goto done; 2695 2696 ret = 1; 2697 2698 done: 2699 X509_PUBKEY_free(xp); 2700 X509_PUBKEY_free(xq); 2701 return ret; 2702 } 2703 #endif /* OPENSSL_NO_EC */ 2704 2705 /* Test getting and setting parameters on an EVP_PKEY_CTX */ 2706 static int test_EVP_PKEY_CTX_get_set_params(EVP_PKEY *pkey) 2707 { 2708 EVP_MD_CTX *mdctx = NULL; 2709 EVP_PKEY_CTX *ctx = NULL; 2710 const OSSL_PARAM *params; 2711 OSSL_PARAM ourparams[2], *param = ourparams, *param_md; 2712 int ret = 0; 2713 const EVP_MD *md; 2714 char mdname[OSSL_MAX_NAME_SIZE]; 2715 char ssl3ms[48]; 2716 2717 /* Initialise a sign operation */ 2718 ctx = EVP_PKEY_CTX_new_from_pkey(testctx, pkey, testpropq); 2719 if (!TEST_ptr(ctx) 2720 || !TEST_int_gt(EVP_PKEY_sign_init(ctx), 0)) 2721 goto err; 2722 2723 /* 2724 * We should be able to query the parameters now. 2725 */ 2726 params = EVP_PKEY_CTX_settable_params(ctx); 2727 if (!TEST_ptr(params) 2728 || !TEST_ptr(OSSL_PARAM_locate_const(params, 2729 OSSL_SIGNATURE_PARAM_DIGEST))) 2730 goto err; 2731 2732 params = EVP_PKEY_CTX_gettable_params(ctx); 2733 if (!TEST_ptr(params) 2734 || !TEST_ptr(OSSL_PARAM_locate_const(params, 2735 OSSL_SIGNATURE_PARAM_ALGORITHM_ID)) 2736 || !TEST_ptr(OSSL_PARAM_locate_const(params, 2737 OSSL_SIGNATURE_PARAM_DIGEST))) 2738 goto err; 2739 2740 /* 2741 * Test getting and setting params via EVP_PKEY_CTX_set_params() and 2742 * EVP_PKEY_CTX_get_params() 2743 */ 2744 strcpy(mdname, "SHA512"); 2745 param_md = param; 2746 *param++ = OSSL_PARAM_construct_utf8_string(OSSL_SIGNATURE_PARAM_DIGEST, 2747 mdname, 0); 2748 *param++ = OSSL_PARAM_construct_end(); 2749 2750 if (!TEST_true(EVP_PKEY_CTX_set_params(ctx, ourparams))) 2751 goto err; 2752 2753 mdname[0] = '\0'; 2754 *param_md = OSSL_PARAM_construct_utf8_string(OSSL_SIGNATURE_PARAM_DIGEST, 2755 mdname, sizeof(mdname)); 2756 if (!TEST_true(EVP_PKEY_CTX_get_params(ctx, ourparams)) 2757 || !TEST_str_eq(mdname, "SHA512")) 2758 goto err; 2759 2760 /* 2761 * Test the TEST_PKEY_CTX_set_signature_md() and 2762 * TEST_PKEY_CTX_get_signature_md() functions 2763 */ 2764 if (!TEST_int_gt(EVP_PKEY_CTX_set_signature_md(ctx, EVP_sha256()), 0) 2765 || !TEST_int_gt(EVP_PKEY_CTX_get_signature_md(ctx, &md), 0) 2766 || !TEST_ptr_eq(md, EVP_sha256())) 2767 goto err; 2768 2769 /* 2770 * Test getting MD parameters via an associated EVP_PKEY_CTX 2771 */ 2772 mdctx = EVP_MD_CTX_new(); 2773 if (!TEST_ptr(mdctx) 2774 || !TEST_true(EVP_DigestSignInit_ex(mdctx, NULL, "SHA1", testctx, testpropq, 2775 pkey, NULL))) 2776 goto err; 2777 2778 /* 2779 * We now have an EVP_MD_CTX with an EVP_PKEY_CTX inside it. We should be 2780 * able to obtain the digest's settable parameters from the provider. 2781 */ 2782 params = EVP_MD_CTX_settable_params(mdctx); 2783 if (!TEST_ptr(params) 2784 || !TEST_int_eq(strcmp(params[0].key, OSSL_DIGEST_PARAM_SSL3_MS), 0) 2785 /* The final key should be NULL */ 2786 || !TEST_ptr_null(params[1].key)) 2787 goto err; 2788 2789 param = ourparams; 2790 memset(ssl3ms, 0, sizeof(ssl3ms)); 2791 *param++ = OSSL_PARAM_construct_octet_string(OSSL_DIGEST_PARAM_SSL3_MS, 2792 ssl3ms, sizeof(ssl3ms)); 2793 *param++ = OSSL_PARAM_construct_end(); 2794 2795 if (!TEST_true(EVP_MD_CTX_set_params(mdctx, ourparams))) 2796 goto err; 2797 2798 ret = 1; 2799 2800 err: 2801 EVP_MD_CTX_free(mdctx); 2802 EVP_PKEY_CTX_free(ctx); 2803 2804 return ret; 2805 } 2806 2807 #ifndef OPENSSL_NO_DSA 2808 static int test_DSA_get_set_params(void) 2809 { 2810 OSSL_PARAM_BLD *bld = NULL; 2811 OSSL_PARAM *params = NULL; 2812 BIGNUM *p = NULL, *q = NULL, *g = NULL, *pub = NULL, *priv = NULL; 2813 EVP_PKEY_CTX *pctx = NULL; 2814 EVP_PKEY *pkey = NULL; 2815 int ret = 0; 2816 2817 /* 2818 * Setup the parameters for our DSA object. For our purposes they don't 2819 * have to actually be *valid* parameters. We just need to set something. 2820 */ 2821 if (!TEST_ptr(pctx = EVP_PKEY_CTX_new_from_name(testctx, "DSA", NULL)) 2822 || !TEST_ptr(bld = OSSL_PARAM_BLD_new()) 2823 || !TEST_ptr(p = BN_new()) 2824 || !TEST_ptr(q = BN_new()) 2825 || !TEST_ptr(g = BN_new()) 2826 || !TEST_ptr(pub = BN_new()) 2827 || !TEST_ptr(priv = BN_new())) 2828 goto err; 2829 if (!TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_FFC_P, p)) 2830 || !TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_FFC_Q, q)) 2831 || !TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_FFC_G, g)) 2832 || !TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_PUB_KEY, 2833 pub)) 2834 || !TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_PRIV_KEY, 2835 priv))) 2836 goto err; 2837 if (!TEST_ptr(params = OSSL_PARAM_BLD_to_param(bld))) 2838 goto err; 2839 2840 if (!TEST_int_gt(EVP_PKEY_fromdata_init(pctx), 0) 2841 || !TEST_int_gt(EVP_PKEY_fromdata(pctx, &pkey, EVP_PKEY_KEYPAIR, 2842 params), 0)) 2843 goto err; 2844 2845 if (!TEST_ptr(pkey)) 2846 goto err; 2847 2848 ret = test_EVP_PKEY_CTX_get_set_params(pkey); 2849 2850 err: 2851 EVP_PKEY_free(pkey); 2852 EVP_PKEY_CTX_free(pctx); 2853 OSSL_PARAM_free(params); 2854 OSSL_PARAM_BLD_free(bld); 2855 BN_free(p); 2856 BN_free(q); 2857 BN_free(g); 2858 BN_free(pub); 2859 BN_free(priv); 2860 2861 return ret; 2862 } 2863 2864 /* 2865 * Test combinations of private, public, missing and private + public key 2866 * params to ensure they are all accepted 2867 */ 2868 static int test_DSA_priv_pub(void) 2869 { 2870 return test_EVP_PKEY_ffc_priv_pub("DSA"); 2871 } 2872 2873 #endif /* !OPENSSL_NO_DSA */ 2874 2875 static int test_RSA_get_set_params(void) 2876 { 2877 OSSL_PARAM_BLD *bld = NULL; 2878 OSSL_PARAM *params = NULL; 2879 BIGNUM *n = NULL, *e = NULL, *d = NULL; 2880 EVP_PKEY_CTX *pctx = NULL; 2881 EVP_PKEY *pkey = NULL; 2882 int ret = 0; 2883 2884 /* 2885 * Setup the parameters for our RSA object. For our purposes they don't 2886 * have to actually be *valid* parameters. We just need to set something. 2887 */ 2888 if (!TEST_ptr(pctx = EVP_PKEY_CTX_new_from_name(testctx, "RSA", NULL)) 2889 || !TEST_ptr(bld = OSSL_PARAM_BLD_new()) 2890 || !TEST_ptr(n = BN_new()) 2891 || !TEST_ptr(e = BN_new()) 2892 || !TEST_ptr(d = BN_new())) 2893 goto err; 2894 if (!TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_RSA_N, n)) 2895 || !TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_RSA_E, e)) 2896 || !TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_RSA_D, d))) 2897 goto err; 2898 if (!TEST_ptr(params = OSSL_PARAM_BLD_to_param(bld))) 2899 goto err; 2900 2901 if (!TEST_int_gt(EVP_PKEY_fromdata_init(pctx), 0) 2902 || !TEST_int_gt(EVP_PKEY_fromdata(pctx, &pkey, EVP_PKEY_KEYPAIR, 2903 params), 0)) 2904 goto err; 2905 2906 if (!TEST_ptr(pkey)) 2907 goto err; 2908 2909 ret = test_EVP_PKEY_CTX_get_set_params(pkey); 2910 2911 err: 2912 EVP_PKEY_free(pkey); 2913 EVP_PKEY_CTX_free(pctx); 2914 OSSL_PARAM_free(params); 2915 OSSL_PARAM_BLD_free(bld); 2916 BN_free(n); 2917 BN_free(e); 2918 BN_free(d); 2919 2920 return ret; 2921 } 2922 2923 static int test_RSA_OAEP_set_get_params(void) 2924 { 2925 int ret = 0; 2926 EVP_PKEY *key = NULL; 2927 EVP_PKEY_CTX *key_ctx = NULL; 2928 2929 if (nullprov != NULL) 2930 return TEST_skip("Test does not support a non-default library context"); 2931 2932 if (!TEST_ptr(key = load_example_rsa_key()) 2933 || !TEST_ptr(key_ctx = EVP_PKEY_CTX_new_from_pkey(0, key, 0))) 2934 goto err; 2935 2936 { 2937 int padding = RSA_PKCS1_OAEP_PADDING; 2938 OSSL_PARAM params[4]; 2939 2940 params[0] = OSSL_PARAM_construct_int(OSSL_SIGNATURE_PARAM_PAD_MODE, &padding); 2941 params[1] = OSSL_PARAM_construct_utf8_string(OSSL_ASYM_CIPHER_PARAM_OAEP_DIGEST, 2942 OSSL_DIGEST_NAME_SHA2_256, 0); 2943 params[2] = OSSL_PARAM_construct_utf8_string(OSSL_ASYM_CIPHER_PARAM_MGF1_DIGEST, 2944 OSSL_DIGEST_NAME_SHA1, 0); 2945 params[3] = OSSL_PARAM_construct_end(); 2946 2947 if (!TEST_int_gt(EVP_PKEY_encrypt_init_ex(key_ctx, params),0)) 2948 goto err; 2949 } 2950 { 2951 OSSL_PARAM params[3]; 2952 char oaepmd[30] = { '\0' }; 2953 char mgf1md[30] = { '\0' }; 2954 2955 params[0] = OSSL_PARAM_construct_utf8_string(OSSL_ASYM_CIPHER_PARAM_OAEP_DIGEST, 2956 oaepmd, sizeof(oaepmd)); 2957 params[1] = OSSL_PARAM_construct_utf8_string(OSSL_ASYM_CIPHER_PARAM_MGF1_DIGEST, 2958 mgf1md, sizeof(mgf1md)); 2959 params[2] = OSSL_PARAM_construct_end(); 2960 2961 if (!TEST_true(EVP_PKEY_CTX_get_params(key_ctx, params))) 2962 goto err; 2963 2964 if (!TEST_str_eq(oaepmd, OSSL_DIGEST_NAME_SHA2_256) 2965 || !TEST_str_eq(mgf1md, OSSL_DIGEST_NAME_SHA1)) 2966 goto err; 2967 } 2968 2969 ret = 1; 2970 2971 err: 2972 EVP_PKEY_free(key); 2973 EVP_PKEY_CTX_free(key_ctx); 2974 2975 return ret; 2976 } 2977 2978 /* https://github.com/openssl/openssl/issues/21288 */ 2979 static int test_RSA_OAEP_set_null_label(void) 2980 { 2981 int ret = 0; 2982 EVP_PKEY *key = NULL; 2983 EVP_PKEY_CTX *key_ctx = NULL; 2984 2985 if (!TEST_ptr(key = load_example_rsa_key()) 2986 || !TEST_ptr(key_ctx = EVP_PKEY_CTX_new_from_pkey(testctx, key, NULL)) 2987 || !TEST_true(EVP_PKEY_encrypt_init(key_ctx))) 2988 goto err; 2989 2990 if (!TEST_true(EVP_PKEY_CTX_set_rsa_padding(key_ctx, RSA_PKCS1_OAEP_PADDING))) 2991 goto err; 2992 2993 if (!TEST_true(EVP_PKEY_CTX_set0_rsa_oaep_label(key_ctx, OPENSSL_strdup("foo"), 0))) 2994 goto err; 2995 2996 if (!TEST_true(EVP_PKEY_CTX_set0_rsa_oaep_label(key_ctx, NULL, 0))) 2997 goto err; 2998 2999 ret = 1; 3000 3001 err: 3002 EVP_PKEY_free(key); 3003 EVP_PKEY_CTX_free(key_ctx); 3004 3005 return ret; 3006 } 3007 3008 #if !defined(OPENSSL_NO_CHACHA) && !defined(OPENSSL_NO_POLY1305) 3009 static int test_decrypt_null_chunks(void) 3010 { 3011 EVP_CIPHER_CTX* ctx = NULL; 3012 EVP_CIPHER *cipher = NULL; 3013 const unsigned char key[32] = { 3014 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 3015 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 3016 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1 3017 }; 3018 unsigned char iv[12] = { 3019 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b 3020 }; 3021 unsigned char msg[] = "It was the best of times, it was the worst of times"; 3022 unsigned char ciphertext[80]; 3023 unsigned char plaintext[80]; 3024 /* We initialise tmp to a non zero value on purpose */ 3025 int ctlen, ptlen, tmp = 99; 3026 int ret = 0; 3027 const int enc_offset = 10, dec_offset = 20; 3028 3029 if (!TEST_ptr(cipher = EVP_CIPHER_fetch(testctx, "ChaCha20-Poly1305", testpropq)) 3030 || !TEST_ptr(ctx = EVP_CIPHER_CTX_new()) 3031 || !TEST_true(EVP_EncryptInit_ex(ctx, cipher, NULL, 3032 key, iv)) 3033 || !TEST_true(EVP_EncryptUpdate(ctx, ciphertext, &ctlen, msg, 3034 enc_offset)) 3035 /* Deliberate add a zero length update */ 3036 || !TEST_true(EVP_EncryptUpdate(ctx, ciphertext + ctlen, &tmp, NULL, 3037 0)) 3038 || !TEST_int_eq(tmp, 0) 3039 || !TEST_true(EVP_EncryptUpdate(ctx, ciphertext + ctlen, &tmp, 3040 msg + enc_offset, 3041 sizeof(msg) - enc_offset)) 3042 || !TEST_int_eq(ctlen += tmp, sizeof(msg)) 3043 || !TEST_true(EVP_EncryptFinal(ctx, ciphertext + ctlen, &tmp)) 3044 || !TEST_int_eq(tmp, 0)) 3045 goto err; 3046 3047 /* Deliberately initialise tmp to a non zero value */ 3048 tmp = 99; 3049 if (!TEST_true(EVP_DecryptInit_ex(ctx, cipher, NULL, key, iv)) 3050 || !TEST_true(EVP_DecryptUpdate(ctx, plaintext, &ptlen, ciphertext, 3051 dec_offset)) 3052 /* 3053 * Deliberately add a zero length update. We also deliberately do 3054 * this at a different offset than for encryption. 3055 */ 3056 || !TEST_true(EVP_DecryptUpdate(ctx, plaintext + ptlen, &tmp, NULL, 3057 0)) 3058 || !TEST_int_eq(tmp, 0) 3059 || !TEST_true(EVP_DecryptUpdate(ctx, plaintext + ptlen, &tmp, 3060 ciphertext + dec_offset, 3061 ctlen - dec_offset)) 3062 || !TEST_int_eq(ptlen += tmp, sizeof(msg)) 3063 || !TEST_true(EVP_DecryptFinal(ctx, plaintext + ptlen, &tmp)) 3064 || !TEST_int_eq(tmp, 0) 3065 || !TEST_mem_eq(msg, sizeof(msg), plaintext, ptlen)) 3066 goto err; 3067 3068 ret = 1; 3069 err: 3070 EVP_CIPHER_CTX_free(ctx); 3071 EVP_CIPHER_free(cipher); 3072 return ret; 3073 } 3074 #endif /* !defined(OPENSSL_NO_CHACHA) && !defined(OPENSSL_NO_POLY1305) */ 3075 3076 #ifndef OPENSSL_NO_DH 3077 /* 3078 * Test combinations of private, public, missing and private + public key 3079 * params to ensure they are all accepted 3080 */ 3081 static int test_DH_priv_pub(void) 3082 { 3083 return test_EVP_PKEY_ffc_priv_pub("DH"); 3084 } 3085 3086 # ifndef OPENSSL_NO_DEPRECATED_3_0 3087 static int test_EVP_PKEY_set1_DH(void) 3088 { 3089 DH *x942dh = NULL, *noqdh = NULL; 3090 EVP_PKEY *pkey1 = NULL, *pkey2 = NULL; 3091 int ret = 0; 3092 BIGNUM *p, *g = NULL; 3093 BIGNUM *pubkey = NULL; 3094 unsigned char pub[2048 / 8]; 3095 size_t len = 0; 3096 3097 if (!TEST_ptr(p = BN_new()) 3098 || !TEST_ptr(g = BN_new()) 3099 || !TEST_ptr(pubkey = BN_new()) 3100 || !TEST_true(BN_set_word(p, 9999)) 3101 || !TEST_true(BN_set_word(g, 2)) 3102 || !TEST_true(BN_set_word(pubkey, 4321)) 3103 || !TEST_ptr(noqdh = DH_new()) 3104 || !TEST_true(DH_set0_pqg(noqdh, p, NULL, g)) 3105 || !TEST_true(DH_set0_key(noqdh, pubkey, NULL)) 3106 || !TEST_ptr(pubkey = BN_new()) 3107 || !TEST_true(BN_set_word(pubkey, 4321))) 3108 goto err; 3109 p = g = NULL; 3110 3111 x942dh = DH_get_2048_256(); 3112 pkey1 = EVP_PKEY_new(); 3113 pkey2 = EVP_PKEY_new(); 3114 if (!TEST_ptr(x942dh) 3115 || !TEST_ptr(noqdh) 3116 || !TEST_ptr(pkey1) 3117 || !TEST_ptr(pkey2) 3118 || !TEST_true(DH_set0_key(x942dh, pubkey, NULL))) 3119 goto err; 3120 pubkey = NULL; 3121 3122 if (!TEST_true(EVP_PKEY_set1_DH(pkey1, x942dh)) 3123 || !TEST_int_eq(EVP_PKEY_get_id(pkey1), EVP_PKEY_DHX)) 3124 goto err; 3125 3126 if (!TEST_true(EVP_PKEY_get_bn_param(pkey1, OSSL_PKEY_PARAM_PUB_KEY, 3127 &pubkey)) 3128 || !TEST_ptr(pubkey)) 3129 goto err; 3130 3131 if (!TEST_true(EVP_PKEY_set1_DH(pkey2, noqdh)) 3132 || !TEST_int_eq(EVP_PKEY_get_id(pkey2), EVP_PKEY_DH)) 3133 goto err; 3134 3135 if (!TEST_true(EVP_PKEY_get_octet_string_param(pkey2, 3136 OSSL_PKEY_PARAM_PUB_KEY, 3137 pub, sizeof(pub), &len)) 3138 || !TEST_size_t_ne(len, 0)) 3139 goto err; 3140 3141 ret = 1; 3142 err: 3143 BN_free(p); 3144 BN_free(g); 3145 BN_free(pubkey); 3146 EVP_PKEY_free(pkey1); 3147 EVP_PKEY_free(pkey2); 3148 DH_free(x942dh); 3149 DH_free(noqdh); 3150 3151 return ret; 3152 } 3153 # endif /* !OPENSSL_NO_DEPRECATED_3_0 */ 3154 #endif /* !OPENSSL_NO_DH */ 3155 3156 /* 3157 * We test what happens with an empty template. For the sake of this test, 3158 * the template must be ignored, and we know that's the case for RSA keys 3159 * (this might arguably be a misfeature, but that's what we currently do, 3160 * even in provider code, since that's how the legacy RSA implementation 3161 * does things) 3162 */ 3163 static int test_keygen_with_empty_template(int n) 3164 { 3165 EVP_PKEY_CTX *ctx = NULL; 3166 EVP_PKEY *pkey = NULL; 3167 EVP_PKEY *tkey = NULL; 3168 int ret = 0; 3169 3170 if (nullprov != NULL) 3171 return TEST_skip("Test does not support a non-default library context"); 3172 3173 switch (n) { 3174 case 0: 3175 /* We do test with no template at all as well */ 3176 if (!TEST_ptr(ctx = EVP_PKEY_CTX_new_id(EVP_PKEY_RSA, NULL))) 3177 goto err; 3178 break; 3179 case 1: 3180 /* Here we create an empty RSA key that serves as our template */ 3181 if (!TEST_ptr(tkey = EVP_PKEY_new()) 3182 || !TEST_true(EVP_PKEY_set_type(tkey, EVP_PKEY_RSA)) 3183 || !TEST_ptr(ctx = EVP_PKEY_CTX_new(tkey, NULL))) 3184 goto err; 3185 break; 3186 } 3187 3188 if (!TEST_int_gt(EVP_PKEY_keygen_init(ctx), 0) 3189 || !TEST_int_gt(EVP_PKEY_keygen(ctx, &pkey), 0)) 3190 goto err; 3191 3192 ret = 1; 3193 err: 3194 EVP_PKEY_CTX_free(ctx); 3195 EVP_PKEY_free(pkey); 3196 EVP_PKEY_free(tkey); 3197 return ret; 3198 } 3199 3200 /* 3201 * Test that we fail if we attempt to use an algorithm that is not available 3202 * in the current library context (unless we are using an algorithm that 3203 * should be made available via legacy codepaths). 3204 * 3205 * 0: RSA 3206 * 1: SM2 3207 */ 3208 static int test_pkey_ctx_fail_without_provider(int tst) 3209 { 3210 OSSL_LIB_CTX *tmpctx = OSSL_LIB_CTX_new(); 3211 OSSL_PROVIDER *tmpnullprov = NULL; 3212 EVP_PKEY_CTX *pctx = NULL; 3213 const char *keytype = NULL; 3214 int expect_null = 0; 3215 int ret = 0; 3216 3217 if (!TEST_ptr(tmpctx)) 3218 goto err; 3219 3220 tmpnullprov = OSSL_PROVIDER_load(tmpctx, "null"); 3221 if (!TEST_ptr(tmpnullprov)) 3222 goto err; 3223 3224 /* 3225 * We check for certain algos in the null provider. 3226 * If an algo is expected to have a provider keymgmt, contructing an 3227 * EVP_PKEY_CTX is expected to fail (return NULL). 3228 * Otherwise, if it's expected to have legacy support, contructing an 3229 * EVP_PKEY_CTX is expected to succeed (return non-NULL). 3230 */ 3231 switch (tst) { 3232 case 0: 3233 keytype = "RSA"; 3234 expect_null = 1; 3235 break; 3236 case 1: 3237 keytype = "SM2"; 3238 expect_null = 1; 3239 #ifdef OPENSSL_NO_EC 3240 TEST_info("EC disable, skipping SM2 check..."); 3241 goto end; 3242 #endif 3243 #ifdef OPENSSL_NO_SM2 3244 TEST_info("SM2 disable, skipping SM2 check..."); 3245 goto end; 3246 #endif 3247 break; 3248 default: 3249 TEST_error("No test for case %d", tst); 3250 goto err; 3251 } 3252 3253 pctx = EVP_PKEY_CTX_new_from_name(tmpctx, keytype, ""); 3254 if (expect_null ? !TEST_ptr_null(pctx) : !TEST_ptr(pctx)) 3255 goto err; 3256 3257 #if defined(OPENSSL_NO_EC) || defined(OPENSSL_NO_SM2) 3258 end: 3259 #endif 3260 ret = 1; 3261 3262 err: 3263 EVP_PKEY_CTX_free(pctx); 3264 OSSL_PROVIDER_unload(tmpnullprov); 3265 OSSL_LIB_CTX_free(tmpctx); 3266 return ret; 3267 } 3268 3269 static int test_rand_agglomeration(void) 3270 { 3271 EVP_RAND *rand; 3272 EVP_RAND_CTX *ctx; 3273 OSSL_PARAM params[3], *p = params; 3274 int res; 3275 unsigned int step = 7; 3276 static unsigned char seed[] = "It does not matter how slowly you go " 3277 "as long as you do not stop."; 3278 unsigned char out[sizeof(seed)]; 3279 3280 if (!TEST_int_ne(sizeof(seed) % step, 0) 3281 || !TEST_ptr(rand = EVP_RAND_fetch(testctx, "TEST-RAND", testpropq))) 3282 return 0; 3283 ctx = EVP_RAND_CTX_new(rand, NULL); 3284 EVP_RAND_free(rand); 3285 if (!TEST_ptr(ctx)) 3286 return 0; 3287 3288 memset(out, 0, sizeof(out)); 3289 *p++ = OSSL_PARAM_construct_octet_string(OSSL_RAND_PARAM_TEST_ENTROPY, 3290 seed, sizeof(seed)); 3291 *p++ = OSSL_PARAM_construct_uint(OSSL_RAND_PARAM_MAX_REQUEST, &step); 3292 *p = OSSL_PARAM_construct_end(); 3293 res = TEST_true(EVP_RAND_CTX_set_params(ctx, params)) 3294 && TEST_true(EVP_RAND_generate(ctx, out, sizeof(out), 0, 1, NULL, 0)) 3295 && TEST_mem_eq(seed, sizeof(seed), out, sizeof(out)); 3296 EVP_RAND_CTX_free(ctx); 3297 return res; 3298 } 3299 3300 /* 3301 * Test that we correctly return the original or "running" IV after 3302 * an encryption operation. 3303 * Run multiple times for some different relevant algorithms/modes. 3304 */ 3305 static int test_evp_iv_aes(int idx) 3306 { 3307 int ret = 0; 3308 EVP_CIPHER_CTX *ctx = NULL; 3309 unsigned char key[16] = {0x4c, 0x43, 0xdb, 0xdd, 0x42, 0x73, 0x47, 0xd1, 3310 0xe5, 0x62, 0x7d, 0xcd, 0x4d, 0x76, 0x4d, 0x57}; 3311 unsigned char init_iv[EVP_MAX_IV_LENGTH] = 3312 {0x57, 0x71, 0x7d, 0xad, 0xdb, 0x9b, 0x98, 0x82, 3313 0x5a, 0x55, 0x91, 0x81, 0x42, 0xa8, 0x89, 0x34}; 3314 static const unsigned char msg[] = { 1, 2, 3, 4, 5, 6, 7, 8, 3315 9, 10, 11, 12, 13, 14, 15, 16 }; 3316 unsigned char ciphertext[32], oiv[16], iv[16]; 3317 unsigned char *ref_iv; 3318 unsigned char cbc_state[16] = {0x10, 0x2f, 0x05, 0xcc, 0xc2, 0x55, 0x72, 0xb9, 3319 0x88, 0xe6, 0x4a, 0x17, 0x10, 0x74, 0x22, 0x5e}; 3320 3321 unsigned char ofb_state[16] = {0x76, 0xe6, 0x66, 0x61, 0xd0, 0x8a, 0xe4, 0x64, 3322 0xdd, 0x66, 0xbf, 0x00, 0xf0, 0xe3, 0x6f, 0xfd}; 3323 unsigned char cfb_state[16] = {0x77, 0xe4, 0x65, 0x65, 0xd5, 0x8c, 0xe3, 0x6c, 3324 0xd4, 0x6c, 0xb4, 0x0c, 0xfd, 0xed, 0x60, 0xed}; 3325 unsigned char gcm_state[12] = {0x57, 0x71, 0x7d, 0xad, 0xdb, 0x9b, 3326 0x98, 0x82, 0x5a, 0x55, 0x91, 0x81}; 3327 unsigned char ccm_state[7] = {0x57, 0x71, 0x7d, 0xad, 0xdb, 0x9b, 0x98}; 3328 #ifndef OPENSSL_NO_OCB 3329 unsigned char ocb_state[12] = {0x57, 0x71, 0x7d, 0xad, 0xdb, 0x9b, 3330 0x98, 0x82, 0x5a, 0x55, 0x91, 0x81}; 3331 #endif 3332 int len = sizeof(ciphertext); 3333 size_t ivlen, ref_len; 3334 const EVP_CIPHER *type = NULL; 3335 int iv_reset = 0; 3336 3337 if (nullprov != NULL && idx < 6) 3338 return TEST_skip("Test does not support a non-default library context"); 3339 3340 switch(idx) { 3341 case 0: 3342 type = EVP_aes_128_cbc(); 3343 /* FALLTHROUGH */ 3344 case 6: 3345 type = (type != NULL) ? type : 3346 EVP_CIPHER_fetch(testctx, "aes-128-cbc", testpropq); 3347 ref_iv = cbc_state; 3348 ref_len = sizeof(cbc_state); 3349 iv_reset = 1; 3350 break; 3351 case 1: 3352 type = EVP_aes_128_ofb(); 3353 /* FALLTHROUGH */ 3354 case 7: 3355 type = (type != NULL) ? type : 3356 EVP_CIPHER_fetch(testctx, "aes-128-ofb", testpropq); 3357 ref_iv = ofb_state; 3358 ref_len = sizeof(ofb_state); 3359 iv_reset = 1; 3360 break; 3361 case 2: 3362 type = EVP_aes_128_cfb(); 3363 /* FALLTHROUGH */ 3364 case 8: 3365 type = (type != NULL) ? type : 3366 EVP_CIPHER_fetch(testctx, "aes-128-cfb", testpropq); 3367 ref_iv = cfb_state; 3368 ref_len = sizeof(cfb_state); 3369 iv_reset = 1; 3370 break; 3371 case 3: 3372 type = EVP_aes_128_gcm(); 3373 /* FALLTHROUGH */ 3374 case 9: 3375 type = (type != NULL) ? type : 3376 EVP_CIPHER_fetch(testctx, "aes-128-gcm", testpropq); 3377 ref_iv = gcm_state; 3378 ref_len = sizeof(gcm_state); 3379 break; 3380 case 4: 3381 type = EVP_aes_128_ccm(); 3382 /* FALLTHROUGH */ 3383 case 10: 3384 type = (type != NULL) ? type : 3385 EVP_CIPHER_fetch(testctx, "aes-128-ccm", testpropq); 3386 ref_iv = ccm_state; 3387 ref_len = sizeof(ccm_state); 3388 break; 3389 #ifdef OPENSSL_NO_OCB 3390 case 5: 3391 case 11: 3392 return 1; 3393 #else 3394 case 5: 3395 type = EVP_aes_128_ocb(); 3396 /* FALLTHROUGH */ 3397 case 11: 3398 type = (type != NULL) ? type : 3399 EVP_CIPHER_fetch(testctx, "aes-128-ocb", testpropq); 3400 ref_iv = ocb_state; 3401 ref_len = sizeof(ocb_state); 3402 break; 3403 #endif 3404 default: 3405 return 0; 3406 } 3407 3408 if (!TEST_ptr(type) 3409 || !TEST_ptr((ctx = EVP_CIPHER_CTX_new())) 3410 || !TEST_true(EVP_EncryptInit_ex(ctx, type, NULL, key, init_iv)) 3411 || !TEST_true(EVP_EncryptUpdate(ctx, ciphertext, &len, msg, 3412 (int)sizeof(msg))) 3413 || !TEST_true(EVP_CIPHER_CTX_get_original_iv(ctx, oiv, sizeof(oiv))) 3414 || !TEST_true(EVP_CIPHER_CTX_get_updated_iv(ctx, iv, sizeof(iv))) 3415 || !TEST_true(EVP_EncryptFinal_ex(ctx, ciphertext, &len))) 3416 goto err; 3417 ivlen = EVP_CIPHER_CTX_get_iv_length(ctx); 3418 if (!TEST_mem_eq(init_iv, ivlen, oiv, ivlen) 3419 || !TEST_mem_eq(ref_iv, ref_len, iv, ivlen)) 3420 goto err; 3421 3422 /* CBC, OFB, and CFB modes: the updated iv must be reset after reinit */ 3423 if (!TEST_true(EVP_EncryptInit_ex(ctx, NULL, NULL, NULL, NULL)) 3424 || !TEST_true(EVP_CIPHER_CTX_get_updated_iv(ctx, iv, sizeof(iv)))) 3425 goto err; 3426 if (iv_reset) { 3427 if (!TEST_mem_eq(init_iv, ivlen, iv, ivlen)) 3428 goto err; 3429 } else { 3430 if (!TEST_mem_eq(ref_iv, ivlen, iv, ivlen)) 3431 goto err; 3432 } 3433 3434 ret = 1; 3435 err: 3436 EVP_CIPHER_CTX_free(ctx); 3437 if (idx >= 6) 3438 EVP_CIPHER_free((EVP_CIPHER *)type); 3439 return ret; 3440 } 3441 3442 #ifndef OPENSSL_NO_DES 3443 static int test_evp_iv_des(int idx) 3444 { 3445 int ret = 0; 3446 EVP_CIPHER_CTX *ctx = NULL; 3447 static const unsigned char key[24] = { 3448 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef, 3449 0xf1, 0xe0, 0xd3, 0xc2, 0xb5, 0xa4, 0x97, 0x86, 3450 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10 3451 }; 3452 static const unsigned char init_iv[8] = { 3453 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10 3454 }; 3455 static const unsigned char msg[] = { 1, 2, 3, 4, 5, 6, 7, 8, 3456 9, 10, 11, 12, 13, 14, 15, 16 }; 3457 unsigned char ciphertext[32], oiv[8], iv[8]; 3458 unsigned const char *ref_iv; 3459 static const unsigned char cbc_state_des[8] = { 3460 0x4f, 0xa3, 0x85, 0xcd, 0x8b, 0xf3, 0x06, 0x2a 3461 }; 3462 static const unsigned char cbc_state_3des[8] = { 3463 0x35, 0x27, 0x7d, 0x65, 0x6c, 0xfb, 0x50, 0xd9 3464 }; 3465 static const unsigned char ofb_state_des[8] = { 3466 0xa7, 0x0d, 0x1d, 0x45, 0xf9, 0x96, 0x3f, 0x2c 3467 }; 3468 static const unsigned char ofb_state_3des[8] = { 3469 0xab, 0x16, 0x24, 0xbb, 0x5b, 0xac, 0xed, 0x5e 3470 }; 3471 static const unsigned char cfb_state_des[8] = { 3472 0x91, 0xeb, 0x6d, 0x29, 0x4b, 0x08, 0xbd, 0x73 3473 }; 3474 static const unsigned char cfb_state_3des[8] = { 3475 0x34, 0xdd, 0xfb, 0x47, 0x33, 0x1c, 0x61, 0xf7 3476 }; 3477 int len = sizeof(ciphertext); 3478 size_t ivlen, ref_len; 3479 EVP_CIPHER *type = NULL; 3480 3481 if (lgcyprov == NULL && idx < 3) 3482 return TEST_skip("Test requires legacy provider to be loaded"); 3483 3484 switch(idx) { 3485 case 0: 3486 type = EVP_CIPHER_fetch(testctx, "des-cbc", testpropq); 3487 ref_iv = cbc_state_des; 3488 ref_len = sizeof(cbc_state_des); 3489 break; 3490 case 1: 3491 type = EVP_CIPHER_fetch(testctx, "des-ofb", testpropq); 3492 ref_iv = ofb_state_des; 3493 ref_len = sizeof(ofb_state_des); 3494 break; 3495 case 2: 3496 type = EVP_CIPHER_fetch(testctx, "des-cfb", testpropq); 3497 ref_iv = cfb_state_des; 3498 ref_len = sizeof(cfb_state_des); 3499 break; 3500 case 3: 3501 type = EVP_CIPHER_fetch(testctx, "des-ede3-cbc", testpropq); 3502 ref_iv = cbc_state_3des; 3503 ref_len = sizeof(cbc_state_3des); 3504 break; 3505 case 4: 3506 type = EVP_CIPHER_fetch(testctx, "des-ede3-ofb", testpropq); 3507 ref_iv = ofb_state_3des; 3508 ref_len = sizeof(ofb_state_3des); 3509 break; 3510 case 5: 3511 type = EVP_CIPHER_fetch(testctx, "des-ede3-cfb", testpropq); 3512 ref_iv = cfb_state_3des; 3513 ref_len = sizeof(cfb_state_3des); 3514 break; 3515 default: 3516 return 0; 3517 } 3518 3519 if (!TEST_ptr(type) 3520 || !TEST_ptr((ctx = EVP_CIPHER_CTX_new())) 3521 || !TEST_true(EVP_EncryptInit_ex(ctx, type, NULL, key, init_iv)) 3522 || !TEST_true(EVP_EncryptUpdate(ctx, ciphertext, &len, msg, 3523 (int)sizeof(msg))) 3524 || !TEST_true(EVP_CIPHER_CTX_get_original_iv(ctx, oiv, sizeof(oiv))) 3525 || !TEST_true(EVP_CIPHER_CTX_get_updated_iv(ctx, iv, sizeof(iv))) 3526 || !TEST_true(EVP_EncryptFinal_ex(ctx, ciphertext, &len))) 3527 goto err; 3528 ivlen = EVP_CIPHER_CTX_get_iv_length(ctx); 3529 if (!TEST_mem_eq(init_iv, ivlen, oiv, ivlen) 3530 || !TEST_mem_eq(ref_iv, ref_len, iv, ivlen)) 3531 goto err; 3532 3533 if (!TEST_true(EVP_EncryptInit_ex(ctx, NULL, NULL, NULL, NULL)) 3534 || !TEST_true(EVP_CIPHER_CTX_get_updated_iv(ctx, iv, sizeof(iv)))) 3535 goto err; 3536 if (!TEST_mem_eq(init_iv, ivlen, iv, ivlen)) 3537 goto err; 3538 3539 ret = 1; 3540 err: 3541 EVP_CIPHER_CTX_free(ctx); 3542 EVP_CIPHER_free(type); 3543 return ret; 3544 } 3545 #endif 3546 3547 #ifndef OPENSSL_NO_BF 3548 static int test_evp_bf_default_keylen(int idx) 3549 { 3550 int ret = 0; 3551 static const char *algos[4] = { 3552 "bf-ecb", "bf-cbc", "bf-cfb", "bf-ofb" 3553 }; 3554 int ivlen[4] = { 0, 8, 8, 8 }; 3555 EVP_CIPHER *cipher = NULL; 3556 3557 if (lgcyprov == NULL) 3558 return TEST_skip("Test requires legacy provider to be loaded"); 3559 3560 if (!TEST_ptr(cipher = EVP_CIPHER_fetch(testctx, algos[idx], testpropq)) 3561 || !TEST_int_eq(EVP_CIPHER_get_key_length(cipher), 16) 3562 || !TEST_int_eq(EVP_CIPHER_get_iv_length(cipher), ivlen[idx])) 3563 goto err; 3564 3565 ret = 1; 3566 err: 3567 EVP_CIPHER_free(cipher); 3568 return ret; 3569 } 3570 #endif 3571 3572 #ifndef OPENSSL_NO_EC 3573 static int ecpub_nids[] = { 3574 NID_brainpoolP256r1, NID_X9_62_prime256v1, 3575 NID_secp384r1, NID_secp521r1, 3576 # ifndef OPENSSL_NO_EC2M 3577 NID_sect233k1, NID_sect233r1, NID_sect283r1, 3578 NID_sect409k1, NID_sect409r1, NID_sect571k1, NID_sect571r1, 3579 # endif 3580 NID_brainpoolP384r1, NID_brainpoolP512r1 3581 }; 3582 3583 static int test_ecpub(int idx) 3584 { 3585 int ret = 0, len, savelen; 3586 int nid; 3587 unsigned char buf[1024]; 3588 unsigned char *p; 3589 EVP_PKEY *pkey = NULL; 3590 EVP_PKEY_CTX *ctx = NULL; 3591 # ifndef OPENSSL_NO_DEPRECATED_3_0 3592 const unsigned char *q; 3593 EVP_PKEY *pkey2 = NULL; 3594 EC_KEY *ec = NULL; 3595 # endif 3596 3597 if (nullprov != NULL) 3598 return TEST_skip("Test does not support a non-default library context"); 3599 3600 nid = ecpub_nids[idx]; 3601 3602 ctx = EVP_PKEY_CTX_new_id(EVP_PKEY_EC, NULL); 3603 if (!TEST_ptr(ctx) 3604 || !TEST_int_gt(EVP_PKEY_keygen_init(ctx), 0) 3605 || !TEST_int_gt(EVP_PKEY_CTX_set_ec_paramgen_curve_nid(ctx, nid), 0) 3606 || !TEST_true(EVP_PKEY_keygen(ctx, &pkey))) 3607 goto done; 3608 len = i2d_PublicKey(pkey, NULL); 3609 savelen = len; 3610 if (!TEST_int_ge(len, 1) 3611 || !TEST_int_lt(len, 1024)) 3612 goto done; 3613 p = buf; 3614 len = i2d_PublicKey(pkey, &p); 3615 if (!TEST_int_ge(len, 1) 3616 || !TEST_int_eq(len, savelen)) 3617 goto done; 3618 3619 # ifndef OPENSSL_NO_DEPRECATED_3_0 3620 /* Now try to decode the just-created DER. */ 3621 q = buf; 3622 if (!TEST_ptr((pkey2 = EVP_PKEY_new())) 3623 || !TEST_ptr((ec = EC_KEY_new_by_curve_name(nid))) 3624 || !TEST_true(EVP_PKEY_assign_EC_KEY(pkey2, ec))) 3625 goto done; 3626 /* EC_KEY ownership transferred */ 3627 ec = NULL; 3628 if (!TEST_ptr(d2i_PublicKey(EVP_PKEY_EC, &pkey2, &q, savelen))) 3629 goto done; 3630 /* The keys should match. */ 3631 if (!TEST_int_eq(EVP_PKEY_eq(pkey, pkey2), 1)) 3632 goto done; 3633 # endif 3634 3635 ret = 1; 3636 3637 done: 3638 EVP_PKEY_CTX_free(ctx); 3639 EVP_PKEY_free(pkey); 3640 # ifndef OPENSSL_NO_DEPRECATED_3_0 3641 EVP_PKEY_free(pkey2); 3642 EC_KEY_free(ec); 3643 # endif 3644 return ret; 3645 } 3646 #endif 3647 3648 static int test_EVP_rsa_pss_with_keygen_bits(void) 3649 { 3650 int ret = 0; 3651 EVP_PKEY_CTX *ctx = NULL; 3652 EVP_PKEY *pkey = NULL; 3653 EVP_MD *md; 3654 3655 md = EVP_MD_fetch(testctx, "sha256", testpropq); 3656 ret = TEST_ptr(md) 3657 && TEST_ptr((ctx = EVP_PKEY_CTX_new_from_name(testctx, "RSA-PSS", testpropq))) 3658 && TEST_int_gt(EVP_PKEY_keygen_init(ctx), 0) 3659 && TEST_int_gt(EVP_PKEY_CTX_set_rsa_keygen_bits(ctx, 512), 0) 3660 && TEST_int_gt(EVP_PKEY_CTX_set_rsa_pss_keygen_md(ctx, md), 0) 3661 && TEST_true(EVP_PKEY_keygen(ctx, &pkey)); 3662 3663 EVP_MD_free(md); 3664 EVP_PKEY_free(pkey); 3665 EVP_PKEY_CTX_free(ctx); 3666 return ret; 3667 } 3668 3669 static int test_EVP_rsa_pss_set_saltlen(void) 3670 { 3671 int ret = 0; 3672 EVP_PKEY *pkey = NULL; 3673 EVP_PKEY_CTX *pkey_ctx = NULL; 3674 EVP_MD *sha256 = NULL; 3675 EVP_MD_CTX *sha256_ctx = NULL; 3676 int saltlen = 9999; /* buggy EVP_PKEY_CTX_get_rsa_pss_saltlen() didn't update this */ 3677 const int test_value = 32; 3678 3679 ret = TEST_ptr(pkey = load_example_rsa_key()) 3680 && TEST_ptr(sha256 = EVP_MD_fetch(testctx, "sha256", NULL)) 3681 && TEST_ptr(sha256_ctx = EVP_MD_CTX_new()) 3682 && TEST_true(EVP_DigestSignInit(sha256_ctx, &pkey_ctx, sha256, NULL, pkey)) 3683 && TEST_true(EVP_PKEY_CTX_set_rsa_padding(pkey_ctx, RSA_PKCS1_PSS_PADDING)) 3684 && TEST_int_gt(EVP_PKEY_CTX_set_rsa_pss_saltlen(pkey_ctx, test_value), 0) 3685 && TEST_int_gt(EVP_PKEY_CTX_get_rsa_pss_saltlen(pkey_ctx, &saltlen), 0) 3686 && TEST_int_eq(saltlen, test_value); 3687 3688 EVP_MD_CTX_free(sha256_ctx); 3689 EVP_PKEY_free(pkey); 3690 EVP_MD_free(sha256); 3691 3692 return ret; 3693 } 3694 3695 static int success = 1; 3696 static void md_names(const char *name, void *vctx) 3697 { 3698 OSSL_LIB_CTX *ctx = (OSSL_LIB_CTX *)vctx; 3699 /* Force a namemap update */ 3700 EVP_CIPHER *aes128 = EVP_CIPHER_fetch(ctx, "AES-128-CBC", NULL); 3701 3702 if (!TEST_ptr(aes128)) 3703 success = 0; 3704 3705 EVP_CIPHER_free(aes128); 3706 } 3707 3708 /* 3709 * Test that changing the namemap in a user callback works in a names_do_all 3710 * function. 3711 */ 3712 static int test_names_do_all(void) 3713 { 3714 /* We use a custom libctx so that we know the state of the namemap */ 3715 OSSL_LIB_CTX *ctx = OSSL_LIB_CTX_new(); 3716 EVP_MD *sha256 = NULL; 3717 int testresult = 0; 3718 3719 if (!TEST_ptr(ctx)) 3720 goto err; 3721 3722 sha256 = EVP_MD_fetch(ctx, "SHA2-256", NULL); 3723 if (!TEST_ptr(sha256)) 3724 goto err; 3725 3726 /* 3727 * We loop through all the names for a given digest. This should still work 3728 * even if the namemap changes part way through. 3729 */ 3730 if (!TEST_true(EVP_MD_names_do_all(sha256, md_names, ctx))) 3731 goto err; 3732 3733 if (!TEST_true(success)) 3734 goto err; 3735 3736 testresult = 1; 3737 err: 3738 EVP_MD_free(sha256); 3739 OSSL_LIB_CTX_free(ctx); 3740 return testresult; 3741 } 3742 3743 typedef struct { 3744 const char *cipher; 3745 const unsigned char *key; 3746 const unsigned char *iv; 3747 const unsigned char *input; 3748 const unsigned char *expected; 3749 const unsigned char *tag; 3750 size_t ivlen; /* 0 if we do not need to set a specific IV len */ 3751 size_t inlen; 3752 size_t expectedlen; 3753 size_t taglen; 3754 int keyfirst; 3755 int initenc; 3756 int finalenc; 3757 } EVP_INIT_TEST_st; 3758 3759 static const EVP_INIT_TEST_st evp_init_tests[] = { 3760 { 3761 "aes-128-cfb", kCFBDefaultKey, iCFBIV, cfbPlaintext, 3762 cfbCiphertext, NULL, 0, sizeof(cfbPlaintext), sizeof(cfbCiphertext), 3763 0, 1, 0, 1 3764 }, 3765 { 3766 "aes-256-gcm", kGCMDefaultKey, iGCMDefaultIV, gcmDefaultPlaintext, 3767 gcmDefaultCiphertext, gcmDefaultTag, sizeof(iGCMDefaultIV), 3768 sizeof(gcmDefaultPlaintext), sizeof(gcmDefaultCiphertext), 3769 sizeof(gcmDefaultTag), 1, 0, 1 3770 }, 3771 { 3772 "aes-128-cfb", kCFBDefaultKey, iCFBIV, cfbPlaintext, 3773 cfbCiphertext, NULL, 0, sizeof(cfbPlaintext), sizeof(cfbCiphertext), 3774 0, 0, 0, 1 3775 }, 3776 { 3777 "aes-256-gcm", kGCMDefaultKey, iGCMDefaultIV, gcmDefaultPlaintext, 3778 gcmDefaultCiphertext, gcmDefaultTag, sizeof(iGCMDefaultIV), 3779 sizeof(gcmDefaultPlaintext), sizeof(gcmDefaultCiphertext), 3780 sizeof(gcmDefaultTag), 0, 0, 1 3781 }, 3782 { 3783 "aes-128-cfb", kCFBDefaultKey, iCFBIV, cfbCiphertext, 3784 cfbPlaintext, NULL, 0, sizeof(cfbCiphertext), sizeof(cfbPlaintext), 3785 0, 1, 1, 0 3786 }, 3787 { 3788 "aes-256-gcm", kGCMDefaultKey, iGCMDefaultIV, gcmDefaultCiphertext, 3789 gcmDefaultPlaintext, gcmDefaultTag, sizeof(iGCMDefaultIV), 3790 sizeof(gcmDefaultCiphertext), sizeof(gcmDefaultPlaintext), 3791 sizeof(gcmDefaultTag), 1, 1, 0 3792 }, 3793 { 3794 "aes-128-cfb", kCFBDefaultKey, iCFBIV, cfbCiphertext, 3795 cfbPlaintext, NULL, 0, sizeof(cfbCiphertext), sizeof(cfbPlaintext), 3796 0, 0, 1, 0 3797 }, 3798 { 3799 "aes-256-gcm", kGCMDefaultKey, iGCMDefaultIV, gcmDefaultCiphertext, 3800 gcmDefaultPlaintext, gcmDefaultTag, sizeof(iGCMDefaultIV), 3801 sizeof(gcmDefaultCiphertext), sizeof(gcmDefaultPlaintext), 3802 sizeof(gcmDefaultTag), 0, 1, 0 3803 } 3804 }; 3805 3806 /* use same key, iv and plaintext for cfb and ofb */ 3807 static const EVP_INIT_TEST_st evp_reinit_tests[] = { 3808 { 3809 "aes-128-cfb", kCFBDefaultKey, iCFBIV, cfbPlaintext_partial, 3810 cfbCiphertext_partial, NULL, 0, sizeof(cfbPlaintext_partial), 3811 sizeof(cfbCiphertext_partial), 0, 0, 1, 0 3812 }, 3813 { 3814 "aes-128-cfb", kCFBDefaultKey, iCFBIV, cfbCiphertext_partial, 3815 cfbPlaintext_partial, NULL, 0, sizeof(cfbCiphertext_partial), 3816 sizeof(cfbPlaintext_partial), 0, 0, 0, 0 3817 }, 3818 { 3819 "aes-128-ofb", kCFBDefaultKey, iCFBIV, cfbPlaintext_partial, 3820 ofbCiphertext_partial, NULL, 0, sizeof(cfbPlaintext_partial), 3821 sizeof(ofbCiphertext_partial), 0, 0, 1, 0 3822 }, 3823 { 3824 "aes-128-ofb", kCFBDefaultKey, iCFBIV, ofbCiphertext_partial, 3825 cfbPlaintext_partial, NULL, 0, sizeof(ofbCiphertext_partial), 3826 sizeof(cfbPlaintext_partial), 0, 0, 0, 0 3827 }, 3828 }; 3829 3830 static int evp_init_seq_set_iv(EVP_CIPHER_CTX *ctx, const EVP_INIT_TEST_st *t) 3831 { 3832 int res = 0; 3833 3834 if (t->ivlen != 0) { 3835 if (!TEST_int_gt(EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GCM_SET_IVLEN, t->ivlen, NULL), 0)) 3836 goto err; 3837 } 3838 if (!TEST_true(EVP_CipherInit_ex(ctx, NULL, NULL, NULL, t->iv, -1))) 3839 goto err; 3840 res = 1; 3841 err: 3842 return res; 3843 } 3844 3845 /* 3846 * Test step-wise cipher initialization via EVP_CipherInit_ex where the 3847 * arguments are given one at a time and a final adjustment to the enc 3848 * parameter sets the correct operation. 3849 */ 3850 static int test_evp_init_seq(int idx) 3851 { 3852 int outlen1, outlen2; 3853 int testresult = 0; 3854 unsigned char outbuf[1024]; 3855 unsigned char tag[16]; 3856 const EVP_INIT_TEST_st *t = &evp_init_tests[idx]; 3857 EVP_CIPHER_CTX *ctx = NULL; 3858 EVP_CIPHER *type = NULL; 3859 size_t taglen = sizeof(tag); 3860 char *errmsg = NULL; 3861 3862 ctx = EVP_CIPHER_CTX_new(); 3863 if (ctx == NULL) { 3864 errmsg = "CTX_ALLOC"; 3865 goto err; 3866 } 3867 if (!TEST_ptr(type = EVP_CIPHER_fetch(testctx, t->cipher, testpropq))) { 3868 errmsg = "CIPHER_FETCH"; 3869 goto err; 3870 } 3871 if (!TEST_true(EVP_CipherInit_ex(ctx, type, NULL, NULL, NULL, t->initenc))) { 3872 errmsg = "EMPTY_ENC_INIT"; 3873 goto err; 3874 } 3875 if (!TEST_true(EVP_CIPHER_CTX_set_padding(ctx, 0))) { 3876 errmsg = "PADDING"; 3877 goto err; 3878 } 3879 if (t->keyfirst && !TEST_true(EVP_CipherInit_ex(ctx, NULL, NULL, t->key, NULL, -1))) { 3880 errmsg = "KEY_INIT (before iv)"; 3881 goto err; 3882 } 3883 if (!evp_init_seq_set_iv(ctx, t)) { 3884 errmsg = "IV_INIT"; 3885 goto err; 3886 } 3887 if (t->keyfirst == 0 && !TEST_true(EVP_CipherInit_ex(ctx, NULL, NULL, t->key, NULL, -1))) { 3888 errmsg = "KEY_INIT (after iv)"; 3889 goto err; 3890 } 3891 if (!TEST_true(EVP_CipherInit_ex(ctx, NULL, NULL, NULL, NULL, t->finalenc))) { 3892 errmsg = "FINAL_ENC_INIT"; 3893 goto err; 3894 } 3895 if (!TEST_true(EVP_CipherUpdate(ctx, outbuf, &outlen1, t->input, t->inlen))) { 3896 errmsg = "CIPHER_UPDATE"; 3897 goto err; 3898 } 3899 if (t->finalenc == 0 && t->tag != NULL) { 3900 /* Set expected tag */ 3901 if (!TEST_int_gt(EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG, 3902 t->taglen, (void *)t->tag), 0)) { 3903 errmsg = "SET_TAG"; 3904 goto err; 3905 } 3906 } 3907 if (!TEST_true(EVP_CipherFinal_ex(ctx, outbuf + outlen1, &outlen2))) { 3908 errmsg = "CIPHER_FINAL"; 3909 goto err; 3910 } 3911 if (!TEST_mem_eq(t->expected, t->expectedlen, outbuf, outlen1 + outlen2)) { 3912 errmsg = "WRONG_RESULT"; 3913 goto err; 3914 } 3915 if (t->finalenc != 0 && t->tag != NULL) { 3916 if (!TEST_int_gt(EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_GET_TAG, taglen, tag), 0)) { 3917 errmsg = "GET_TAG"; 3918 goto err; 3919 } 3920 if (!TEST_mem_eq(t->tag, t->taglen, tag, taglen)) { 3921 errmsg = "TAG_ERROR"; 3922 goto err; 3923 } 3924 } 3925 testresult = 1; 3926 err: 3927 if (errmsg != NULL) 3928 TEST_info("evp_init_test %d: %s", idx, errmsg); 3929 EVP_CIPHER_CTX_free(ctx); 3930 EVP_CIPHER_free(type); 3931 return testresult; 3932 } 3933 3934 /* 3935 * Test re-initialization of cipher context without changing key or iv. 3936 * The result of both iteration should be the same. 3937 */ 3938 static int test_evp_reinit_seq(int idx) 3939 { 3940 int outlen1, outlen2, outlen_final; 3941 int testresult = 0; 3942 unsigned char outbuf1[1024]; 3943 unsigned char outbuf2[1024]; 3944 const EVP_INIT_TEST_st *t = &evp_reinit_tests[idx]; 3945 EVP_CIPHER_CTX *ctx = NULL; 3946 EVP_CIPHER *type = NULL; 3947 3948 if (!TEST_ptr(ctx = EVP_CIPHER_CTX_new()) 3949 || !TEST_ptr(type = EVP_CIPHER_fetch(testctx, t->cipher, testpropq)) 3950 /* setup cipher context */ 3951 || !TEST_true(EVP_CipherInit_ex2(ctx, type, t->key, t->iv, t->initenc, NULL)) 3952 /* first iteration */ 3953 || !TEST_true(EVP_CipherUpdate(ctx, outbuf1, &outlen1, t->input, t->inlen)) 3954 || !TEST_true(EVP_CipherFinal_ex(ctx, outbuf1, &outlen_final)) 3955 /* check test results iteration 1 */ 3956 || !TEST_mem_eq(t->expected, t->expectedlen, outbuf1, outlen1 + outlen_final) 3957 /* now re-init the context (same cipher, key and iv) */ 3958 || !TEST_true(EVP_CipherInit_ex2(ctx, NULL, NULL, NULL, -1, NULL)) 3959 /* second iteration */ 3960 || !TEST_true(EVP_CipherUpdate(ctx, outbuf2, &outlen2, t->input, t->inlen)) 3961 || !TEST_true(EVP_CipherFinal_ex(ctx, outbuf2, &outlen_final)) 3962 /* check test results iteration 2 */ 3963 || !TEST_mem_eq(t->expected, t->expectedlen, outbuf2, outlen2 + outlen_final)) 3964 goto err; 3965 testresult = 1; 3966 err: 3967 EVP_CIPHER_CTX_free(ctx); 3968 EVP_CIPHER_free(type); 3969 return testresult; 3970 } 3971 3972 typedef struct { 3973 const unsigned char *input; 3974 const unsigned char *expected; 3975 size_t inlen; 3976 size_t expectedlen; 3977 int enc; 3978 } EVP_RESET_TEST_st; 3979 3980 static const EVP_RESET_TEST_st evp_reset_tests[] = { 3981 { 3982 cfbPlaintext, cfbCiphertext, 3983 sizeof(cfbPlaintext), sizeof(cfbCiphertext), 1 3984 }, 3985 { 3986 cfbCiphertext, cfbPlaintext, 3987 sizeof(cfbCiphertext), sizeof(cfbPlaintext), 0 3988 } 3989 }; 3990 3991 /* 3992 * Test a reset of a cipher via EVP_CipherInit_ex after the cipher has already 3993 * been used. 3994 */ 3995 static int test_evp_reset(int idx) 3996 { 3997 const EVP_RESET_TEST_st *t = &evp_reset_tests[idx]; 3998 int outlen1, outlen2; 3999 int testresult = 0; 4000 unsigned char outbuf[1024]; 4001 EVP_CIPHER_CTX *ctx = NULL; 4002 EVP_CIPHER *type = NULL; 4003 char *errmsg = NULL; 4004 4005 if (!TEST_ptr(ctx = EVP_CIPHER_CTX_new())) { 4006 errmsg = "CTX_ALLOC"; 4007 goto err; 4008 } 4009 if (!TEST_ptr(type = EVP_CIPHER_fetch(testctx, "aes-128-cfb", testpropq))) { 4010 errmsg = "CIPHER_FETCH"; 4011 goto err; 4012 } 4013 if (!TEST_true(EVP_CipherInit_ex(ctx, type, NULL, kCFBDefaultKey, iCFBIV, t->enc))) { 4014 errmsg = "CIPHER_INIT"; 4015 goto err; 4016 } 4017 if (!TEST_true(EVP_CIPHER_CTX_set_padding(ctx, 0))) { 4018 errmsg = "PADDING"; 4019 goto err; 4020 } 4021 if (!TEST_true(EVP_CipherUpdate(ctx, outbuf, &outlen1, t->input, t->inlen))) { 4022 errmsg = "CIPHER_UPDATE"; 4023 goto err; 4024 } 4025 if (!TEST_true(EVP_CipherFinal_ex(ctx, outbuf + outlen1, &outlen2))) { 4026 errmsg = "CIPHER_FINAL"; 4027 goto err; 4028 } 4029 if (!TEST_mem_eq(t->expected, t->expectedlen, outbuf, outlen1 + outlen2)) { 4030 errmsg = "WRONG_RESULT"; 4031 goto err; 4032 } 4033 if (!TEST_true(EVP_CipherInit_ex(ctx, NULL, NULL, NULL, NULL, -1))) { 4034 errmsg = "CIPHER_REINIT"; 4035 goto err; 4036 } 4037 if (!TEST_true(EVP_CipherUpdate(ctx, outbuf, &outlen1, t->input, t->inlen))) { 4038 errmsg = "CIPHER_UPDATE (reinit)"; 4039 goto err; 4040 } 4041 if (!TEST_true(EVP_CipherFinal_ex(ctx, outbuf + outlen1, &outlen2))) { 4042 errmsg = "CIPHER_FINAL (reinit)"; 4043 goto err; 4044 } 4045 if (!TEST_mem_eq(t->expected, t->expectedlen, outbuf, outlen1 + outlen2)) { 4046 errmsg = "WRONG_RESULT (reinit)"; 4047 goto err; 4048 } 4049 testresult = 1; 4050 err: 4051 if (errmsg != NULL) 4052 TEST_info("test_evp_reset %d: %s", idx, errmsg); 4053 EVP_CIPHER_CTX_free(ctx); 4054 EVP_CIPHER_free(type); 4055 return testresult; 4056 } 4057 4058 typedef struct { 4059 const char *cipher; 4060 int enc; 4061 } EVP_UPDATED_IV_TEST_st; 4062 4063 static const EVP_UPDATED_IV_TEST_st evp_updated_iv_tests[] = { 4064 { 4065 "aes-128-cfb", 1 4066 }, 4067 { 4068 "aes-128-cfb", 0 4069 }, 4070 { 4071 "aes-128-cfb1", 1 4072 }, 4073 { 4074 "aes-128-cfb1", 0 4075 }, 4076 { 4077 "aes-128-cfb8", 1 4078 }, 4079 { 4080 "aes-128-cfb8", 0 4081 }, 4082 { 4083 "aes-128-ofb", 1 4084 }, 4085 { 4086 "aes-128-ofb", 0 4087 }, 4088 { 4089 "aes-128-ctr", 1 4090 }, 4091 { 4092 "aes-128-ctr", 0 4093 }, 4094 { 4095 "aes-128-cbc", 1 4096 }, 4097 { 4098 "aes-128-cbc", 0 4099 } 4100 }; 4101 4102 /* 4103 * Test that the IV in the context is updated during a crypto operation for CFB 4104 * and OFB. 4105 */ 4106 static int test_evp_updated_iv(int idx) 4107 { 4108 const EVP_UPDATED_IV_TEST_st *t = &evp_updated_iv_tests[idx]; 4109 int outlen1, outlen2; 4110 int testresult = 0; 4111 unsigned char outbuf[1024]; 4112 EVP_CIPHER_CTX *ctx = NULL; 4113 EVP_CIPHER *type = NULL; 4114 unsigned char updated_iv[EVP_MAX_IV_LENGTH]; 4115 int iv_len; 4116 char *errmsg = NULL; 4117 4118 if (!TEST_ptr(ctx = EVP_CIPHER_CTX_new())) { 4119 errmsg = "CTX_ALLOC"; 4120 goto err; 4121 } 4122 if ((type = EVP_CIPHER_fetch(testctx, t->cipher, testpropq)) == NULL) { 4123 TEST_info("cipher %s not supported, skipping", t->cipher); 4124 goto ok; 4125 } 4126 4127 if (!TEST_true(EVP_CipherInit_ex(ctx, type, NULL, kCFBDefaultKey, iCFBIV, t->enc))) { 4128 errmsg = "CIPHER_INIT"; 4129 goto err; 4130 } 4131 if (!TEST_true(EVP_CIPHER_CTX_set_padding(ctx, 0))) { 4132 errmsg = "PADDING"; 4133 goto err; 4134 } 4135 if (!TEST_true(EVP_CipherUpdate(ctx, outbuf, &outlen1, cfbPlaintext, sizeof(cfbPlaintext)))) { 4136 errmsg = "CIPHER_UPDATE"; 4137 goto err; 4138 } 4139 if (!TEST_true(EVP_CIPHER_CTX_get_updated_iv(ctx, updated_iv, sizeof(updated_iv)))) { 4140 errmsg = "CIPHER_CTX_GET_UPDATED_IV"; 4141 goto err; 4142 } 4143 if (!TEST_true(iv_len = EVP_CIPHER_CTX_get_iv_length(ctx))) { 4144 errmsg = "CIPHER_CTX_GET_IV_LEN"; 4145 goto err; 4146 } 4147 if (!TEST_mem_ne(iCFBIV, sizeof(iCFBIV), updated_iv, iv_len)) { 4148 errmsg = "IV_NOT_UPDATED"; 4149 goto err; 4150 } 4151 if (!TEST_true(EVP_CipherFinal_ex(ctx, outbuf + outlen1, &outlen2))) { 4152 errmsg = "CIPHER_FINAL"; 4153 goto err; 4154 } 4155 ok: 4156 testresult = 1; 4157 err: 4158 if (errmsg != NULL) 4159 TEST_info("test_evp_updated_iv %d: %s", idx, errmsg); 4160 EVP_CIPHER_CTX_free(ctx); 4161 EVP_CIPHER_free(type); 4162 return testresult; 4163 } 4164 4165 typedef struct { 4166 const unsigned char *iv1; 4167 const unsigned char *iv2; 4168 const unsigned char *expected1; 4169 const unsigned char *expected2; 4170 const unsigned char *tag1; 4171 const unsigned char *tag2; 4172 size_t ivlen1; 4173 size_t ivlen2; 4174 size_t expectedlen1; 4175 size_t expectedlen2; 4176 } TEST_GCM_IV_REINIT_st; 4177 4178 static const TEST_GCM_IV_REINIT_st gcm_reinit_tests[] = { 4179 { 4180 iGCMResetIV1, iGCMResetIV2, gcmResetCiphertext1, gcmResetCiphertext2, 4181 gcmResetTag1, gcmResetTag2, sizeof(iGCMResetIV1), sizeof(iGCMResetIV2), 4182 sizeof(gcmResetCiphertext1), sizeof(gcmResetCiphertext2) 4183 }, 4184 { 4185 iGCMResetIV2, iGCMResetIV1, gcmResetCiphertext2, gcmResetCiphertext1, 4186 gcmResetTag2, gcmResetTag1, sizeof(iGCMResetIV2), sizeof(iGCMResetIV1), 4187 sizeof(gcmResetCiphertext2), sizeof(gcmResetCiphertext1) 4188 } 4189 }; 4190 4191 static int test_gcm_reinit(int idx) 4192 { 4193 int outlen1, outlen2, outlen3; 4194 int testresult = 0; 4195 unsigned char outbuf[1024]; 4196 unsigned char tag[16]; 4197 const TEST_GCM_IV_REINIT_st *t = &gcm_reinit_tests[idx]; 4198 EVP_CIPHER_CTX *ctx = NULL; 4199 EVP_CIPHER *type = NULL; 4200 size_t taglen = sizeof(tag); 4201 char *errmsg = NULL; 4202 4203 if (!TEST_ptr(ctx = EVP_CIPHER_CTX_new())) { 4204 errmsg = "CTX_ALLOC"; 4205 goto err; 4206 } 4207 if (!TEST_ptr(type = EVP_CIPHER_fetch(testctx, "aes-256-gcm", testpropq))) { 4208 errmsg = "CIPHER_FETCH"; 4209 goto err; 4210 } 4211 if (!TEST_true(EVP_CipherInit_ex(ctx, type, NULL, NULL, NULL, 1))) { 4212 errmsg = "ENC_INIT"; 4213 goto err; 4214 } 4215 if (!TEST_int_gt(EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GCM_SET_IVLEN, t->ivlen1, NULL), 0)) { 4216 errmsg = "SET_IVLEN1"; 4217 goto err; 4218 } 4219 if (!TEST_true(EVP_CipherInit_ex(ctx, NULL, NULL, kGCMResetKey, t->iv1, 1))) { 4220 errmsg = "SET_IV1"; 4221 goto err; 4222 } 4223 if (!TEST_true(EVP_CipherUpdate(ctx, NULL, &outlen3, gcmAAD, sizeof(gcmAAD)))) { 4224 errmsg = "AAD1"; 4225 goto err; 4226 } 4227 EVP_CIPHER_CTX_set_padding(ctx, 0); 4228 if (!TEST_true(EVP_CipherUpdate(ctx, outbuf, &outlen1, gcmResetPlaintext, 4229 sizeof(gcmResetPlaintext)))) { 4230 errmsg = "CIPHER_UPDATE1"; 4231 goto err; 4232 } 4233 if (!TEST_true(EVP_CipherFinal_ex(ctx, outbuf + outlen1, &outlen2))) { 4234 errmsg = "CIPHER_FINAL1"; 4235 goto err; 4236 } 4237 if (!TEST_mem_eq(t->expected1, t->expectedlen1, outbuf, outlen1 + outlen2)) { 4238 errmsg = "WRONG_RESULT1"; 4239 goto err; 4240 } 4241 if (!TEST_int_gt(EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_GET_TAG, taglen, tag), 0)) { 4242 errmsg = "GET_TAG1"; 4243 goto err; 4244 } 4245 if (!TEST_mem_eq(t->tag1, taglen, tag, taglen)) { 4246 errmsg = "TAG_ERROR1"; 4247 goto err; 4248 } 4249 /* Now reinit */ 4250 if (!TEST_int_gt(EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GCM_SET_IVLEN, t->ivlen2, NULL), 0)) { 4251 errmsg = "SET_IVLEN2"; 4252 goto err; 4253 } 4254 if (!TEST_true(EVP_CipherInit_ex(ctx, NULL, NULL, NULL, t->iv2, -1))) { 4255 errmsg = "SET_IV2"; 4256 goto err; 4257 } 4258 if (!TEST_true(EVP_CipherUpdate(ctx, NULL, &outlen3, gcmAAD, sizeof(gcmAAD)))) { 4259 errmsg = "AAD2"; 4260 goto err; 4261 } 4262 if (!TEST_true(EVP_CipherUpdate(ctx, outbuf, &outlen1, gcmResetPlaintext, 4263 sizeof(gcmResetPlaintext)))) { 4264 errmsg = "CIPHER_UPDATE2"; 4265 goto err; 4266 } 4267 if (!TEST_true(EVP_CipherFinal_ex(ctx, outbuf + outlen1, &outlen2))) { 4268 errmsg = "CIPHER_FINAL2"; 4269 goto err; 4270 } 4271 if (!TEST_mem_eq(t->expected2, t->expectedlen2, outbuf, outlen1 + outlen2)) { 4272 errmsg = "WRONG_RESULT2"; 4273 goto err; 4274 } 4275 if (!TEST_int_gt(EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_GET_TAG, taglen, tag), 0)) { 4276 errmsg = "GET_TAG2"; 4277 goto err; 4278 } 4279 if (!TEST_mem_eq(t->tag2, taglen, tag, taglen)) { 4280 errmsg = "TAG_ERROR2"; 4281 goto err; 4282 } 4283 testresult = 1; 4284 err: 4285 if (errmsg != NULL) 4286 TEST_info("evp_init_test %d: %s", idx, errmsg); 4287 EVP_CIPHER_CTX_free(ctx); 4288 EVP_CIPHER_free(type); 4289 return testresult; 4290 } 4291 4292 static const char *ivlen_change_ciphers[] = { 4293 "AES-256-GCM", 4294 #ifndef OPENSSL_NO_OCB 4295 "AES-256-OCB", 4296 #endif 4297 "AES-256-CCM" 4298 }; 4299 4300 /* Negative test for ivlen change after iv being set */ 4301 static int test_ivlen_change(int idx) 4302 { 4303 int outlen; 4304 int res = 0; 4305 unsigned char outbuf[1024]; 4306 static const unsigned char iv[] = { 4307 0x57, 0x71, 0x7d, 0xad, 0xdb, 0x9b, 0x98, 0x82, 4308 0x5a, 0x55, 0x91, 0x81, 0x42, 0xa8, 0x89, 0x34 4309 }; 4310 EVP_CIPHER_CTX *ctx = NULL; 4311 EVP_CIPHER *ciph = NULL; 4312 OSSL_PARAM params[] = { OSSL_PARAM_END, OSSL_PARAM_END }; 4313 size_t ivlen = 13; /* non-default IV length */ 4314 4315 if (!TEST_ptr(ctx = EVP_CIPHER_CTX_new())) 4316 goto err; 4317 4318 if (!TEST_ptr(ciph = EVP_CIPHER_fetch(testctx, ivlen_change_ciphers[idx], 4319 testpropq))) 4320 goto err; 4321 4322 if (!TEST_true(EVP_CipherInit_ex(ctx, ciph, NULL, kGCMDefaultKey, iv, 1))) 4323 goto err; 4324 4325 if (!TEST_true(EVP_CipherUpdate(ctx, outbuf, &outlen, gcmDefaultPlaintext, 4326 sizeof(gcmDefaultPlaintext)))) 4327 goto err; 4328 4329 params[0] = OSSL_PARAM_construct_size_t(OSSL_CIPHER_PARAM_AEAD_IVLEN, 4330 &ivlen); 4331 if (!TEST_true(EVP_CIPHER_CTX_set_params(ctx, params))) 4332 goto err; 4333 4334 ERR_set_mark(); 4335 if (!TEST_false(EVP_CipherUpdate(ctx, outbuf, &outlen, gcmDefaultPlaintext, 4336 sizeof(gcmDefaultPlaintext)))) { 4337 ERR_clear_last_mark(); 4338 goto err; 4339 } 4340 ERR_pop_to_mark(); 4341 4342 res = 1; 4343 err: 4344 EVP_CIPHER_CTX_free(ctx); 4345 EVP_CIPHER_free(ciph); 4346 return res; 4347 } 4348 4349 static const char *keylen_change_ciphers[] = { 4350 #ifndef OPENSSL_NO_BF 4351 "BF-ECB", 4352 #endif 4353 #ifndef OPENSSL_NO_CAST 4354 "CAST5-ECB", 4355 #endif 4356 #ifndef OPENSSL_NO_RC2 4357 "RC2-ECB", 4358 #endif 4359 #ifndef OPENSSL_NO_RC4 4360 "RC4", 4361 #endif 4362 #ifndef OPENSSL_NO_RC5 4363 "RC5-ECB", 4364 #endif 4365 NULL 4366 }; 4367 4368 /* Negative test for keylen change after key was set */ 4369 static int test_keylen_change(int idx) 4370 { 4371 int outlen; 4372 int res = 0; 4373 unsigned char outbuf[1024]; 4374 static const unsigned char key[] = { 4375 0x57, 0x71, 0x7d, 0xad, 0xdb, 0x9b, 0x98, 0x82, 4376 0x5a, 0x55, 0x91, 0x81, 0x42, 0xa8, 0x89, 0x34 4377 }; 4378 EVP_CIPHER_CTX *ctx = NULL; 4379 EVP_CIPHER *ciph = NULL; 4380 OSSL_PARAM params[] = { OSSL_PARAM_END, OSSL_PARAM_END }; 4381 size_t keylen = 12; /* non-default key length */ 4382 4383 if (lgcyprov == NULL) 4384 return TEST_skip("Test requires legacy provider to be loaded"); 4385 4386 if (!TEST_ptr(ctx = EVP_CIPHER_CTX_new())) 4387 goto err; 4388 4389 if (!TEST_ptr(ciph = EVP_CIPHER_fetch(testctx, keylen_change_ciphers[idx], 4390 testpropq))) 4391 goto err; 4392 4393 if (!TEST_true(EVP_CipherInit_ex(ctx, ciph, NULL, key, NULL, 1))) 4394 goto err; 4395 4396 if (!TEST_true(EVP_CipherUpdate(ctx, outbuf, &outlen, gcmDefaultPlaintext, 4397 sizeof(gcmDefaultPlaintext)))) 4398 goto err; 4399 4400 params[0] = OSSL_PARAM_construct_size_t(OSSL_CIPHER_PARAM_KEYLEN, 4401 &keylen); 4402 if (!TEST_true(EVP_CIPHER_CTX_set_params(ctx, params))) 4403 goto err; 4404 4405 ERR_set_mark(); 4406 if (!TEST_false(EVP_CipherUpdate(ctx, outbuf, &outlen, gcmDefaultPlaintext, 4407 sizeof(gcmDefaultPlaintext)))) { 4408 ERR_clear_last_mark(); 4409 goto err; 4410 } 4411 ERR_pop_to_mark(); 4412 4413 res = 1; 4414 err: 4415 EVP_CIPHER_CTX_free(ctx); 4416 EVP_CIPHER_free(ciph); 4417 return res; 4418 } 4419 4420 #ifndef OPENSSL_NO_DEPRECATED_3_0 4421 static EVP_PKEY_METHOD *custom_pmeth = NULL; 4422 static const EVP_PKEY_METHOD *orig_pmeth = NULL; 4423 4424 # define EVP_PKEY_CTRL_MY_COMMAND 9999 4425 4426 static int custom_pmeth_init(EVP_PKEY_CTX *ctx) 4427 { 4428 int (*pinit)(EVP_PKEY_CTX *ctx); 4429 4430 EVP_PKEY_meth_get_init(orig_pmeth, &pinit); 4431 return pinit(ctx); 4432 } 4433 4434 static void custom_pmeth_cleanup(EVP_PKEY_CTX *ctx) 4435 { 4436 void (*pcleanup)(EVP_PKEY_CTX *ctx); 4437 4438 EVP_PKEY_meth_get_cleanup(orig_pmeth, &pcleanup); 4439 pcleanup(ctx); 4440 } 4441 4442 static int custom_pmeth_sign(EVP_PKEY_CTX *ctx, unsigned char *out, 4443 size_t *outlen, const unsigned char *in, 4444 size_t inlen) 4445 { 4446 int (*psign)(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, 4447 const unsigned char *tbs, size_t tbslen); 4448 4449 EVP_PKEY_meth_get_sign(orig_pmeth, NULL, &psign); 4450 return psign(ctx, out, outlen, in, inlen); 4451 } 4452 4453 static int custom_pmeth_digestsign(EVP_MD_CTX *ctx, unsigned char *sig, 4454 size_t *siglen, const unsigned char *tbs, 4455 size_t tbslen) 4456 { 4457 int (*pdigestsign)(EVP_MD_CTX *ctx, unsigned char *sig, size_t *siglen, 4458 const unsigned char *tbs, size_t tbslen); 4459 4460 EVP_PKEY_meth_get_digestsign(orig_pmeth, &pdigestsign); 4461 return pdigestsign(ctx, sig, siglen, tbs, tbslen); 4462 } 4463 4464 static int custom_pmeth_derive(EVP_PKEY_CTX *ctx, unsigned char *key, 4465 size_t *keylen) 4466 { 4467 int (*pderive)(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen); 4468 4469 EVP_PKEY_meth_get_derive(orig_pmeth, NULL, &pderive); 4470 return pderive(ctx, key, keylen); 4471 } 4472 4473 static int custom_pmeth_copy(EVP_PKEY_CTX *dst, const EVP_PKEY_CTX *src) 4474 { 4475 int (*pcopy)(EVP_PKEY_CTX *dst, const EVP_PKEY_CTX *src); 4476 4477 EVP_PKEY_meth_get_copy(orig_pmeth, &pcopy); 4478 return pcopy(dst, src); 4479 } 4480 4481 static int ctrl_called; 4482 4483 static int custom_pmeth_ctrl(EVP_PKEY_CTX *ctx, int type, int p1, void *p2) 4484 { 4485 int (*pctrl)(EVP_PKEY_CTX *ctx, int type, int p1, void *p2); 4486 4487 EVP_PKEY_meth_get_ctrl(orig_pmeth, &pctrl, NULL); 4488 4489 if (type == EVP_PKEY_CTRL_MY_COMMAND) { 4490 ctrl_called = 1; 4491 return 1; 4492 } 4493 4494 return pctrl(ctx, type, p1, p2); 4495 } 4496 4497 static int test_custom_pmeth(int idx) 4498 { 4499 EVP_PKEY_CTX *pctx = NULL; 4500 EVP_MD_CTX *ctx = NULL; 4501 EVP_PKEY *pkey = NULL; 4502 int id, orig_id, orig_flags; 4503 int testresult = 0; 4504 size_t reslen; 4505 unsigned char *res = NULL; 4506 unsigned char msg[] = { 'H', 'e', 'l', 'l', 'o' }; 4507 const EVP_MD *md = EVP_sha256(); 4508 int doderive = 0; 4509 4510 ctrl_called = 0; 4511 4512 /* We call deprecated APIs so this test doesn't support a custom libctx */ 4513 if (testctx != NULL) 4514 return 1; 4515 4516 switch(idx) { 4517 case 0: 4518 case 6: 4519 id = EVP_PKEY_RSA; 4520 pkey = load_example_rsa_key(); 4521 break; 4522 case 1: 4523 case 7: 4524 # ifndef OPENSSL_NO_DSA 4525 id = EVP_PKEY_DSA; 4526 pkey = load_example_dsa_key(); 4527 break; 4528 # else 4529 return 1; 4530 # endif 4531 case 2: 4532 case 8: 4533 # ifndef OPENSSL_NO_EC 4534 id = EVP_PKEY_EC; 4535 pkey = load_example_ec_key(); 4536 break; 4537 # else 4538 return 1; 4539 # endif 4540 case 3: 4541 case 9: 4542 # ifndef OPENSSL_NO_EC 4543 id = EVP_PKEY_ED25519; 4544 md = NULL; 4545 pkey = load_example_ed25519_key(); 4546 break; 4547 # else 4548 return 1; 4549 # endif 4550 case 4: 4551 case 10: 4552 # ifndef OPENSSL_NO_DH 4553 id = EVP_PKEY_DH; 4554 doderive = 1; 4555 pkey = load_example_dh_key(); 4556 break; 4557 # else 4558 return 1; 4559 # endif 4560 case 5: 4561 case 11: 4562 # ifndef OPENSSL_NO_EC 4563 id = EVP_PKEY_X25519; 4564 doderive = 1; 4565 pkey = load_example_x25519_key(); 4566 break; 4567 # else 4568 return 1; 4569 # endif 4570 default: 4571 TEST_error("Should not happen"); 4572 goto err; 4573 } 4574 4575 if (!TEST_ptr(pkey)) 4576 goto err; 4577 4578 if (idx < 6) { 4579 if (!TEST_true(evp_pkey_is_provided(pkey))) 4580 goto err; 4581 } else { 4582 EVP_PKEY *tmp = pkey; 4583 4584 /* Convert to a legacy key */ 4585 pkey = EVP_PKEY_new(); 4586 if (!TEST_ptr(pkey)) { 4587 pkey = tmp; 4588 goto err; 4589 } 4590 if (!TEST_true(evp_pkey_copy_downgraded(&pkey, tmp))) { 4591 EVP_PKEY_free(tmp); 4592 goto err; 4593 } 4594 EVP_PKEY_free(tmp); 4595 if (!TEST_true(evp_pkey_is_legacy(pkey))) 4596 goto err; 4597 } 4598 4599 if (!TEST_ptr(orig_pmeth = EVP_PKEY_meth_find(id)) 4600 || !TEST_ptr(pkey)) 4601 goto err; 4602 4603 EVP_PKEY_meth_get0_info(&orig_id, &orig_flags, orig_pmeth); 4604 if (!TEST_int_eq(orig_id, id) 4605 || !TEST_ptr(custom_pmeth = EVP_PKEY_meth_new(id, orig_flags))) 4606 goto err; 4607 4608 if (id == EVP_PKEY_ED25519) { 4609 EVP_PKEY_meth_set_digestsign(custom_pmeth, custom_pmeth_digestsign); 4610 } if (id == EVP_PKEY_DH || id == EVP_PKEY_X25519) { 4611 EVP_PKEY_meth_set_derive(custom_pmeth, NULL, custom_pmeth_derive); 4612 } else { 4613 EVP_PKEY_meth_set_sign(custom_pmeth, NULL, custom_pmeth_sign); 4614 } 4615 if (id != EVP_PKEY_ED25519 && id != EVP_PKEY_X25519) { 4616 EVP_PKEY_meth_set_init(custom_pmeth, custom_pmeth_init); 4617 EVP_PKEY_meth_set_cleanup(custom_pmeth, custom_pmeth_cleanup); 4618 EVP_PKEY_meth_set_copy(custom_pmeth, custom_pmeth_copy); 4619 } 4620 EVP_PKEY_meth_set_ctrl(custom_pmeth, custom_pmeth_ctrl, NULL); 4621 if (!TEST_true(EVP_PKEY_meth_add0(custom_pmeth))) 4622 goto err; 4623 4624 if (doderive) { 4625 pctx = EVP_PKEY_CTX_new(pkey, NULL); 4626 if (!TEST_ptr(pctx) 4627 || !TEST_int_eq(EVP_PKEY_derive_init(pctx), 1) 4628 || !TEST_int_ge(EVP_PKEY_CTX_ctrl(pctx, -1, -1, 4629 EVP_PKEY_CTRL_MY_COMMAND, 0, NULL), 4630 1) 4631 || !TEST_int_eq(ctrl_called, 1) 4632 || !TEST_int_ge(EVP_PKEY_derive_set_peer(pctx, pkey), 1) 4633 || !TEST_int_ge(EVP_PKEY_derive(pctx, NULL, &reslen), 1) 4634 || !TEST_ptr(res = OPENSSL_malloc(reslen)) 4635 || !TEST_int_ge(EVP_PKEY_derive(pctx, res, &reslen), 1)) 4636 goto err; 4637 } else { 4638 ctx = EVP_MD_CTX_new(); 4639 reslen = EVP_PKEY_size(pkey); 4640 res = OPENSSL_malloc(reslen); 4641 if (!TEST_ptr(ctx) 4642 || !TEST_ptr(res) 4643 || !TEST_true(EVP_DigestSignInit(ctx, &pctx, md, NULL, pkey)) 4644 || !TEST_int_ge(EVP_PKEY_CTX_ctrl(pctx, -1, -1, 4645 EVP_PKEY_CTRL_MY_COMMAND, 0, NULL), 4646 1) 4647 || !TEST_int_eq(ctrl_called, 1)) 4648 goto err; 4649 4650 if (id == EVP_PKEY_ED25519) { 4651 if (!TEST_true(EVP_DigestSign(ctx, res, &reslen, msg, sizeof(msg)))) 4652 goto err; 4653 } else { 4654 if (!TEST_true(EVP_DigestUpdate(ctx, msg, sizeof(msg))) 4655 || !TEST_true(EVP_DigestSignFinal(ctx, res, &reslen))) 4656 goto err; 4657 } 4658 } 4659 4660 testresult = 1; 4661 err: 4662 OPENSSL_free(res); 4663 EVP_MD_CTX_free(ctx); 4664 if (doderive) 4665 EVP_PKEY_CTX_free(pctx); 4666 EVP_PKEY_free(pkey); 4667 EVP_PKEY_meth_remove(custom_pmeth); 4668 EVP_PKEY_meth_free(custom_pmeth); 4669 custom_pmeth = NULL; 4670 return testresult; 4671 } 4672 4673 static int test_evp_md_cipher_meth(void) 4674 { 4675 EVP_MD *md = EVP_MD_meth_dup(EVP_sha256()); 4676 EVP_CIPHER *ciph = EVP_CIPHER_meth_dup(EVP_aes_128_cbc()); 4677 int testresult = 0; 4678 4679 if (!TEST_ptr(md) || !TEST_ptr(ciph)) 4680 goto err; 4681 4682 testresult = 1; 4683 4684 err: 4685 EVP_MD_meth_free(md); 4686 EVP_CIPHER_meth_free(ciph); 4687 4688 return testresult; 4689 } 4690 4691 typedef struct { 4692 int data; 4693 } custom_dgst_ctx; 4694 4695 static int custom_md_init_called = 0; 4696 static int custom_md_cleanup_called = 0; 4697 4698 static int custom_md_init(EVP_MD_CTX *ctx) 4699 { 4700 custom_dgst_ctx *p = EVP_MD_CTX_md_data(ctx); 4701 4702 if (p == NULL) 4703 return 0; 4704 4705 custom_md_init_called++; 4706 return 1; 4707 } 4708 4709 static int custom_md_cleanup(EVP_MD_CTX *ctx) 4710 { 4711 custom_dgst_ctx *p = EVP_MD_CTX_md_data(ctx); 4712 4713 if (p == NULL) 4714 /* Nothing to do */ 4715 return 1; 4716 4717 custom_md_cleanup_called++; 4718 return 1; 4719 } 4720 4721 static int test_custom_md_meth(void) 4722 { 4723 EVP_MD_CTX *mdctx = NULL; 4724 EVP_MD *tmp = NULL; 4725 char mess[] = "Test Message\n"; 4726 unsigned char md_value[EVP_MAX_MD_SIZE]; 4727 unsigned int md_len; 4728 int testresult = 0; 4729 int nid; 4730 4731 /* 4732 * We are testing deprecated functions. We don't support a non-default 4733 * library context in this test. 4734 */ 4735 if (testctx != NULL) 4736 return TEST_skip("Non-default libctx"); 4737 4738 custom_md_init_called = custom_md_cleanup_called = 0; 4739 4740 nid = OBJ_create("1.3.6.1.4.1.16604.998866.1", "custom-md", "custom-md"); 4741 if (!TEST_int_ne(nid, NID_undef)) 4742 goto err; 4743 tmp = EVP_MD_meth_new(nid, NID_undef); 4744 if (!TEST_ptr(tmp)) 4745 goto err; 4746 4747 if (!TEST_true(EVP_MD_meth_set_init(tmp, custom_md_init)) 4748 || !TEST_true(EVP_MD_meth_set_cleanup(tmp, custom_md_cleanup)) 4749 || !TEST_true(EVP_MD_meth_set_app_datasize(tmp, 4750 sizeof(custom_dgst_ctx)))) 4751 goto err; 4752 4753 mdctx = EVP_MD_CTX_new(); 4754 if (!TEST_ptr(mdctx) 4755 /* 4756 * Initing our custom md and then initing another md should 4757 * result in the init and cleanup functions of the custom md 4758 * being called. 4759 */ 4760 || !TEST_true(EVP_DigestInit_ex(mdctx, tmp, NULL)) 4761 || !TEST_true(EVP_DigestInit_ex(mdctx, EVP_sha256(), NULL)) 4762 || !TEST_true(EVP_DigestUpdate(mdctx, mess, strlen(mess))) 4763 || !TEST_true(EVP_DigestFinal_ex(mdctx, md_value, &md_len)) 4764 || !TEST_int_eq(custom_md_init_called, 1) 4765 || !TEST_int_eq(custom_md_cleanup_called, 1)) 4766 goto err; 4767 4768 testresult = 1; 4769 err: 4770 EVP_MD_CTX_free(mdctx); 4771 EVP_MD_meth_free(tmp); 4772 return testresult; 4773 } 4774 4775 typedef struct { 4776 int data; 4777 } custom_ciph_ctx; 4778 4779 static int custom_ciph_init_called = 0; 4780 static int custom_ciph_cleanup_called = 0; 4781 4782 static int custom_ciph_init(EVP_CIPHER_CTX *ctx, const unsigned char *key, 4783 const unsigned char *iv, int enc) 4784 { 4785 custom_ciph_ctx *p = EVP_CIPHER_CTX_get_cipher_data(ctx); 4786 4787 if (p == NULL) 4788 return 0; 4789 4790 custom_ciph_init_called++; 4791 return 1; 4792 } 4793 4794 static int custom_ciph_cleanup(EVP_CIPHER_CTX *ctx) 4795 { 4796 custom_ciph_ctx *p = EVP_CIPHER_CTX_get_cipher_data(ctx); 4797 4798 if (p == NULL) 4799 /* Nothing to do */ 4800 return 1; 4801 4802 custom_ciph_cleanup_called++; 4803 return 1; 4804 } 4805 4806 static int test_custom_ciph_meth(void) 4807 { 4808 EVP_CIPHER_CTX *ciphctx = NULL; 4809 EVP_CIPHER *tmp = NULL; 4810 int testresult = 0; 4811 int nid; 4812 4813 /* 4814 * We are testing deprecated functions. We don't support a non-default 4815 * library context in this test. 4816 */ 4817 if (testctx != NULL) 4818 return TEST_skip("Non-default libctx"); 4819 4820 custom_ciph_init_called = custom_ciph_cleanup_called = 0; 4821 4822 nid = OBJ_create("1.3.6.1.4.1.16604.998866.2", "custom-ciph", "custom-ciph"); 4823 if (!TEST_int_ne(nid, NID_undef)) 4824 goto err; 4825 tmp = EVP_CIPHER_meth_new(nid, 16, 16); 4826 if (!TEST_ptr(tmp)) 4827 goto err; 4828 4829 if (!TEST_true(EVP_CIPHER_meth_set_init(tmp, custom_ciph_init)) 4830 || !TEST_true(EVP_CIPHER_meth_set_flags(tmp, EVP_CIPH_ALWAYS_CALL_INIT)) 4831 || !TEST_true(EVP_CIPHER_meth_set_cleanup(tmp, custom_ciph_cleanup)) 4832 || !TEST_true(EVP_CIPHER_meth_set_impl_ctx_size(tmp, 4833 sizeof(custom_ciph_ctx)))) 4834 goto err; 4835 4836 ciphctx = EVP_CIPHER_CTX_new(); 4837 if (!TEST_ptr(ciphctx) 4838 /* 4839 * Initing our custom cipher and then initing another cipher 4840 * should result in the init and cleanup functions of the custom 4841 * cipher being called. 4842 */ 4843 || !TEST_true(EVP_CipherInit_ex(ciphctx, tmp, NULL, NULL, NULL, 1)) 4844 || !TEST_true(EVP_CipherInit_ex(ciphctx, EVP_aes_128_cbc(), NULL, 4845 NULL, NULL, 1)) 4846 || !TEST_int_eq(custom_ciph_init_called, 1) 4847 || !TEST_int_eq(custom_ciph_cleanup_called, 1)) 4848 goto err; 4849 4850 testresult = 1; 4851 err: 4852 EVP_CIPHER_CTX_free(ciphctx); 4853 EVP_CIPHER_meth_free(tmp); 4854 return testresult; 4855 } 4856 4857 # ifndef OPENSSL_NO_DYNAMIC_ENGINE 4858 /* Test we can create a signature keys with an associated ENGINE */ 4859 static int test_signatures_with_engine(int tst) 4860 { 4861 ENGINE *e; 4862 const char *engine_id = "dasync"; 4863 EVP_PKEY *pkey = NULL; 4864 const unsigned char badcmackey[] = { 0x00, 0x01 }; 4865 const unsigned char cmackey[] = { 4866 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 4867 0x0c, 0x0d, 0x0e, 0x0f 4868 }; 4869 const unsigned char ed25519key[] = { 4870 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 4871 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 4872 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f 4873 }; 4874 const unsigned char msg[] = { 0x00, 0x01, 0x02, 0x03 }; 4875 int testresult = 0; 4876 EVP_MD_CTX *ctx = NULL; 4877 unsigned char *mac = NULL; 4878 size_t maclen = 0; 4879 int ret; 4880 4881 # ifdef OPENSSL_NO_CMAC 4882 /* Skip CMAC tests in a no-cmac build */ 4883 if (tst <= 1) 4884 return 1; 4885 # endif 4886 4887 if (!TEST_ptr(e = ENGINE_by_id(engine_id))) 4888 return 0; 4889 4890 if (!TEST_true(ENGINE_init(e))) { 4891 ENGINE_free(e); 4892 return 0; 4893 } 4894 4895 switch (tst) { 4896 case 0: 4897 pkey = EVP_PKEY_new_CMAC_key(e, cmackey, sizeof(cmackey), 4898 EVP_aes_128_cbc()); 4899 break; 4900 case 1: 4901 pkey = EVP_PKEY_new_CMAC_key(e, badcmackey, sizeof(badcmackey), 4902 EVP_aes_128_cbc()); 4903 break; 4904 case 2: 4905 pkey = EVP_PKEY_new_raw_private_key(EVP_PKEY_ED25519, e, ed25519key, 4906 sizeof(ed25519key)); 4907 break; 4908 default: 4909 TEST_error("Invalid test case"); 4910 goto err; 4911 } 4912 if (!TEST_ptr(pkey)) 4913 goto err; 4914 4915 if (!TEST_ptr(ctx = EVP_MD_CTX_new())) 4916 goto err; 4917 4918 ret = EVP_DigestSignInit(ctx, NULL, tst == 2 ? NULL : EVP_sha256(), NULL, 4919 pkey); 4920 if (tst == 0) { 4921 if (!TEST_true(ret)) 4922 goto err; 4923 4924 if (!TEST_true(EVP_DigestSignUpdate(ctx, msg, sizeof(msg))) 4925 || !TEST_true(EVP_DigestSignFinal(ctx, NULL, &maclen))) 4926 goto err; 4927 4928 if (!TEST_ptr(mac = OPENSSL_malloc(maclen))) 4929 goto err; 4930 4931 if (!TEST_true(EVP_DigestSignFinal(ctx, mac, &maclen))) 4932 goto err; 4933 } else { 4934 /* We used a bad key. We expect a failure here */ 4935 if (!TEST_false(ret)) 4936 goto err; 4937 } 4938 4939 testresult = 1; 4940 err: 4941 EVP_MD_CTX_free(ctx); 4942 OPENSSL_free(mac); 4943 EVP_PKEY_free(pkey); 4944 ENGINE_finish(e); 4945 ENGINE_free(e); 4946 4947 return testresult; 4948 } 4949 4950 static int test_cipher_with_engine(void) 4951 { 4952 ENGINE *e; 4953 const char *engine_id = "dasync"; 4954 const unsigned char keyiv[] = { 4955 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 4956 0x0c, 0x0d, 0x0e, 0x0f 4957 }; 4958 const unsigned char msg[] = { 0x00, 0x01, 0x02, 0x03 }; 4959 int testresult = 0; 4960 EVP_CIPHER_CTX *ctx = NULL, *ctx2 = NULL; 4961 unsigned char buf[AES_BLOCK_SIZE]; 4962 int len = 0; 4963 4964 if (!TEST_ptr(e = ENGINE_by_id(engine_id))) 4965 return 0; 4966 4967 if (!TEST_true(ENGINE_init(e))) { 4968 ENGINE_free(e); 4969 return 0; 4970 } 4971 4972 if (!TEST_ptr(ctx = EVP_CIPHER_CTX_new()) 4973 || !TEST_ptr(ctx2 = EVP_CIPHER_CTX_new())) 4974 goto err; 4975 4976 if (!TEST_true(EVP_EncryptInit_ex(ctx, EVP_aes_128_cbc(), e, keyiv, keyiv))) 4977 goto err; 4978 4979 /* Copy the ctx, and complete the operation with the new ctx */ 4980 if (!TEST_true(EVP_CIPHER_CTX_copy(ctx2, ctx))) 4981 goto err; 4982 4983 if (!TEST_true(EVP_EncryptUpdate(ctx2, buf, &len, msg, sizeof(msg))) 4984 || !TEST_true(EVP_EncryptFinal_ex(ctx2, buf + len, &len))) 4985 goto err; 4986 4987 testresult = 1; 4988 err: 4989 EVP_CIPHER_CTX_free(ctx); 4990 EVP_CIPHER_CTX_free(ctx2); 4991 ENGINE_finish(e); 4992 ENGINE_free(e); 4993 4994 return testresult; 4995 } 4996 # endif /* OPENSSL_NO_DYNAMIC_ENGINE */ 4997 #endif /* OPENSSL_NO_DEPRECATED_3_0 */ 4998 4999 static int ecxnids[] = { 5000 NID_X25519, 5001 NID_X448, 5002 NID_ED25519, 5003 NID_ED448 5004 }; 5005 5006 /* Test that creating ECX keys with a short private key fails as expected */ 5007 static int test_ecx_short_keys(int tst) 5008 { 5009 unsigned char ecxkeydata = 1; 5010 EVP_PKEY *pkey; 5011 5012 5013 pkey = EVP_PKEY_new_raw_private_key_ex(testctx, OBJ_nid2sn(ecxnids[tst]), 5014 NULL, &ecxkeydata, 1); 5015 if (!TEST_ptr_null(pkey)) { 5016 EVP_PKEY_free(pkey); 5017 return 0; 5018 } 5019 5020 return 1; 5021 } 5022 5023 typedef enum OPTION_choice { 5024 OPT_ERR = -1, 5025 OPT_EOF = 0, 5026 OPT_CONTEXT, 5027 OPT_TEST_ENUM 5028 } OPTION_CHOICE; 5029 5030 const OPTIONS *test_get_options(void) 5031 { 5032 static const OPTIONS options[] = { 5033 OPT_TEST_OPTIONS_DEFAULT_USAGE, 5034 { "context", OPT_CONTEXT, '-', "Explicitly use a non-default library context" }, 5035 { NULL } 5036 }; 5037 return options; 5038 } 5039 5040 #ifndef OPENSSL_NO_EC 5041 /* Test that trying to sign with a public key errors out gracefully */ 5042 static int test_ecx_not_private_key(int tst) 5043 { 5044 EVP_PKEY *pkey = NULL; 5045 5046 const unsigned char msg[] = { 0x00, 0x01, 0x02, 0x03 }; 5047 int testresult = 0; 5048 EVP_MD_CTX *ctx = NULL; 5049 unsigned char *mac = NULL; 5050 size_t maclen = 0; 5051 unsigned char *pubkey; 5052 size_t pubkeylen; 5053 5054 switch (keys[tst].type) { 5055 case NID_X25519: 5056 case NID_X448: 5057 return TEST_skip("signing not supported for X25519/X448"); 5058 } 5059 5060 /* Check if this algorithm supports public keys */ 5061 if (keys[tst].pub == NULL) 5062 return TEST_skip("no public key present"); 5063 5064 pubkey = (unsigned char *)keys[tst].pub; 5065 pubkeylen = strlen(keys[tst].pub); 5066 5067 pkey = EVP_PKEY_new_raw_public_key_ex(testctx, OBJ_nid2sn(keys[tst].type), 5068 NULL, pubkey, pubkeylen); 5069 if (!TEST_ptr(pkey)) 5070 goto err; 5071 5072 if (!TEST_ptr(ctx = EVP_MD_CTX_new())) 5073 goto err; 5074 5075 if (EVP_DigestSignInit(ctx, NULL, NULL, NULL, pkey) != 1) 5076 goto check_err; 5077 5078 if (EVP_DigestSign(ctx, NULL, &maclen, msg, sizeof(msg)) != 1) 5079 goto check_err; 5080 5081 if (!TEST_ptr(mac = OPENSSL_malloc(maclen))) 5082 goto err; 5083 5084 if (!TEST_int_eq(EVP_DigestSign(ctx, mac, &maclen, msg, sizeof(msg)), 0)) 5085 goto err; 5086 5087 check_err: 5088 /* 5089 * Currently only EVP_DigestSign will throw PROV_R_NOT_A_PRIVATE_KEY, 5090 * but we relax the check to allow error also thrown by 5091 * EVP_DigestSignInit and EVP_DigestSign. 5092 */ 5093 if (ERR_GET_REASON(ERR_peek_error()) == PROV_R_NOT_A_PRIVATE_KEY) { 5094 testresult = 1; 5095 ERR_clear_error(); 5096 } 5097 5098 err: 5099 EVP_MD_CTX_free(ctx); 5100 OPENSSL_free(mac); 5101 EVP_PKEY_free(pkey); 5102 5103 return testresult; 5104 } 5105 #endif /* OPENSSL_NO_EC */ 5106 5107 static int aes_gcm_encrypt(const unsigned char *gcm_key, size_t gcm_key_s, 5108 const unsigned char *gcm_iv, size_t gcm_ivlen, 5109 const unsigned char *gcm_pt, size_t gcm_pt_s, 5110 const unsigned char *gcm_aad, size_t gcm_aad_s, 5111 const unsigned char *gcm_ct, size_t gcm_ct_s, 5112 const unsigned char *gcm_tag, size_t gcm_tag_s) 5113 { 5114 int ret = 0; 5115 EVP_CIPHER_CTX *ctx; 5116 EVP_CIPHER *cipher = NULL; 5117 int outlen, tmplen; 5118 unsigned char outbuf[1024]; 5119 unsigned char outtag[16]; 5120 OSSL_PARAM params[2] = { 5121 OSSL_PARAM_END, OSSL_PARAM_END 5122 }; 5123 5124 if (!TEST_ptr(ctx = EVP_CIPHER_CTX_new()) 5125 || !TEST_ptr(cipher = EVP_CIPHER_fetch(testctx, "AES-256-GCM", ""))) 5126 goto err; 5127 5128 params[0] = OSSL_PARAM_construct_size_t(OSSL_CIPHER_PARAM_AEAD_IVLEN, 5129 &gcm_ivlen); 5130 5131 if (!TEST_true(EVP_EncryptInit_ex2(ctx, cipher, gcm_key, gcm_iv, params)) 5132 || (gcm_aad != NULL 5133 && !TEST_true(EVP_EncryptUpdate(ctx, NULL, &outlen, 5134 gcm_aad, gcm_aad_s))) 5135 || !TEST_true(EVP_EncryptUpdate(ctx, outbuf, &outlen, 5136 gcm_pt, gcm_pt_s)) 5137 || !TEST_true(EVP_EncryptFinal_ex(ctx, outbuf, &tmplen))) 5138 goto err; 5139 5140 params[0] = OSSL_PARAM_construct_octet_string(OSSL_CIPHER_PARAM_AEAD_TAG, 5141 outtag, sizeof(outtag)); 5142 5143 if (!TEST_true(EVP_CIPHER_CTX_get_params(ctx, params)) 5144 || !TEST_mem_eq(outbuf, outlen, gcm_ct, gcm_ct_s) 5145 || !TEST_mem_eq(outtag, gcm_tag_s, gcm_tag, gcm_tag_s)) 5146 goto err; 5147 5148 ret = 1; 5149 err: 5150 EVP_CIPHER_free(cipher); 5151 EVP_CIPHER_CTX_free(ctx); 5152 5153 return ret; 5154 } 5155 5156 static int aes_gcm_decrypt(const unsigned char *gcm_key, size_t gcm_key_s, 5157 const unsigned char *gcm_iv, size_t gcm_ivlen, 5158 const unsigned char *gcm_pt, size_t gcm_pt_s, 5159 const unsigned char *gcm_aad, size_t gcm_aad_s, 5160 const unsigned char *gcm_ct, size_t gcm_ct_s, 5161 const unsigned char *gcm_tag, size_t gcm_tag_s) 5162 { 5163 int ret = 0; 5164 EVP_CIPHER_CTX *ctx; 5165 EVP_CIPHER *cipher = NULL; 5166 int outlen; 5167 unsigned char outbuf[1024]; 5168 OSSL_PARAM params[2] = { 5169 OSSL_PARAM_END, OSSL_PARAM_END 5170 }; 5171 5172 if ((ctx = EVP_CIPHER_CTX_new()) == NULL) 5173 goto err; 5174 5175 if ((cipher = EVP_CIPHER_fetch(testctx, "AES-256-GCM", "")) == NULL) 5176 goto err; 5177 5178 params[0] = OSSL_PARAM_construct_size_t(OSSL_CIPHER_PARAM_AEAD_IVLEN, 5179 &gcm_ivlen); 5180 5181 if (!TEST_true(EVP_DecryptInit_ex2(ctx, cipher, gcm_key, gcm_iv, params)) 5182 || (gcm_aad != NULL 5183 && !TEST_true(EVP_DecryptUpdate(ctx, NULL, &outlen, 5184 gcm_aad, gcm_aad_s))) 5185 || !TEST_true(EVP_DecryptUpdate(ctx, outbuf, &outlen, 5186 gcm_ct, gcm_ct_s)) 5187 || !TEST_mem_eq(outbuf, outlen, gcm_pt, gcm_pt_s)) 5188 goto err; 5189 5190 params[0] = OSSL_PARAM_construct_octet_string(OSSL_CIPHER_PARAM_AEAD_TAG, 5191 (void*)gcm_tag, gcm_tag_s); 5192 5193 if (!TEST_true(EVP_CIPHER_CTX_set_params(ctx, params)) 5194 ||!TEST_true(EVP_DecryptFinal_ex(ctx, outbuf, &outlen))) 5195 goto err; 5196 5197 ret = 1; 5198 err: 5199 EVP_CIPHER_free(cipher); 5200 EVP_CIPHER_CTX_free(ctx); 5201 5202 return ret; 5203 } 5204 5205 static int test_aes_gcm_ivlen_change_cve_2023_5363(void) 5206 { 5207 /* AES-GCM test data obtained from NIST public test vectors */ 5208 static const unsigned char gcm_key[] = { 5209 0xd0, 0xc2, 0x67, 0xc1, 0x9f, 0x30, 0xd8, 0x0b, 0x89, 0x14, 0xbb, 0xbf, 5210 0xb7, 0x2f, 0x73, 0xb8, 0xd3, 0xcd, 0x5f, 0x6a, 0x78, 0x70, 0x15, 0x84, 5211 0x8a, 0x7b, 0x30, 0xe3, 0x8f, 0x16, 0xf1, 0x8b, 5212 }; 5213 static const unsigned char gcm_iv[] = { 5214 0xb6, 0xdc, 0xda, 0x95, 0xac, 0x99, 0x77, 0x76, 0x25, 0xae, 0x87, 0xf8, 5215 0xa3, 0xa9, 0xdd, 0x64, 0xd7, 0x9b, 0xbd, 0x5f, 0x4a, 0x0e, 0x54, 0xca, 5216 0x1a, 0x9f, 0xa2, 0xe3, 0xf4, 0x5f, 0x5f, 0xc2, 0xce, 0xa7, 0xb6, 0x14, 5217 0x12, 0x6f, 0xf0, 0xaf, 0xfd, 0x3e, 0x17, 0x35, 0x6e, 0xa0, 0x16, 0x09, 5218 0xdd, 0xa1, 0x3f, 0xd8, 0xdd, 0xf3, 0xdf, 0x4f, 0xcb, 0x18, 0x49, 0xb8, 5219 0xb3, 0x69, 0x2c, 0x5d, 0x4f, 0xad, 0x30, 0x91, 0x08, 0xbc, 0xbe, 0x24, 5220 0x01, 0x0f, 0xbe, 0x9c, 0xfb, 0x4f, 0x5d, 0x19, 0x7f, 0x4c, 0x53, 0xb0, 5221 0x95, 0x90, 0xac, 0x7b, 0x1f, 0x7b, 0xa0, 0x99, 0xe1, 0xf3, 0x48, 0x54, 5222 0xd0, 0xfc, 0xa9, 0xcc, 0x91, 0xf8, 0x1f, 0x9b, 0x6c, 0x9a, 0xe0, 0xdc, 5223 0x63, 0xea, 0x7d, 0x2a, 0x4a, 0x7d, 0xa5, 0xed, 0x68, 0x57, 0x27, 0x6b, 5224 0x68, 0xe0, 0xf2, 0xb8, 0x51, 0x50, 0x8d, 0x3d, 5225 }; 5226 static const unsigned char gcm_pt[] = { 5227 0xb8, 0xb6, 0x88, 0x36, 0x44, 0xe2, 0x34, 0xdf, 0x24, 0x32, 0x91, 0x07, 5228 0x4f, 0xe3, 0x6f, 0x81, 5229 }; 5230 static const unsigned char gcm_ct[] = { 5231 0xff, 0x4f, 0xb3, 0xf3, 0xf9, 0xa2, 0x51, 0xd4, 0x82, 0xc2, 0xbe, 0xf3, 5232 0xe2, 0xd0, 0xec, 0xed, 5233 }; 5234 static const unsigned char gcm_tag[] = { 5235 0xbd, 0x06, 0x38, 0x09, 0xf7, 0xe1, 0xc4, 0x72, 0x0e, 0xf2, 0xea, 0x63, 5236 0xdb, 0x99, 0x6c, 0x21, 5237 }; 5238 5239 return aes_gcm_encrypt(gcm_key, sizeof(gcm_key), gcm_iv, sizeof(gcm_iv), 5240 gcm_pt, sizeof(gcm_pt), NULL, 0, 5241 gcm_ct, sizeof(gcm_ct), gcm_tag, sizeof(gcm_tag)) 5242 && aes_gcm_decrypt(gcm_key, sizeof(gcm_key), gcm_iv, sizeof(gcm_iv), 5243 gcm_pt, sizeof(gcm_pt), NULL, 0, 5244 gcm_ct, sizeof(gcm_ct), gcm_tag, sizeof(gcm_tag)); 5245 } 5246 5247 #ifndef OPENSSL_NO_RC4 5248 static int rc4_encrypt(const unsigned char *rc4_key, size_t rc4_key_s, 5249 const unsigned char *rc4_pt, size_t rc4_pt_s, 5250 const unsigned char *rc4_ct, size_t rc4_ct_s) 5251 { 5252 int ret = 0; 5253 EVP_CIPHER_CTX *ctx; 5254 EVP_CIPHER *cipher = NULL; 5255 int outlen, tmplen; 5256 unsigned char outbuf[1024]; 5257 OSSL_PARAM params[2] = { 5258 OSSL_PARAM_END, OSSL_PARAM_END 5259 }; 5260 5261 if (!TEST_ptr(ctx = EVP_CIPHER_CTX_new()) 5262 || !TEST_ptr(cipher = EVP_CIPHER_fetch(testctx, "RC4", ""))) 5263 goto err; 5264 5265 params[0] = OSSL_PARAM_construct_size_t(OSSL_CIPHER_PARAM_KEYLEN, 5266 &rc4_key_s); 5267 5268 if (!TEST_true(EVP_EncryptInit_ex2(ctx, cipher, rc4_key, NULL, params)) 5269 || !TEST_true(EVP_EncryptUpdate(ctx, outbuf, &outlen, 5270 rc4_pt, rc4_pt_s)) 5271 || !TEST_true(EVP_EncryptFinal_ex(ctx, outbuf, &tmplen))) 5272 goto err; 5273 5274 if (!TEST_mem_eq(outbuf, outlen, rc4_ct, rc4_ct_s)) 5275 goto err; 5276 5277 ret = 1; 5278 err: 5279 EVP_CIPHER_free(cipher); 5280 EVP_CIPHER_CTX_free(ctx); 5281 5282 return ret; 5283 } 5284 5285 static int rc4_decrypt(const unsigned char *rc4_key, size_t rc4_key_s, 5286 const unsigned char *rc4_pt, size_t rc4_pt_s, 5287 const unsigned char *rc4_ct, size_t rc4_ct_s) 5288 { 5289 int ret = 0; 5290 EVP_CIPHER_CTX *ctx; 5291 EVP_CIPHER *cipher = NULL; 5292 int outlen; 5293 unsigned char outbuf[1024]; 5294 OSSL_PARAM params[2] = { 5295 OSSL_PARAM_END, OSSL_PARAM_END 5296 }; 5297 5298 if ((ctx = EVP_CIPHER_CTX_new()) == NULL) 5299 goto err; 5300 5301 if ((cipher = EVP_CIPHER_fetch(testctx, "RC4", "")) == NULL) 5302 goto err; 5303 5304 params[0] = OSSL_PARAM_construct_size_t(OSSL_CIPHER_PARAM_KEYLEN, 5305 &rc4_key_s); 5306 5307 if (!TEST_true(EVP_DecryptInit_ex2(ctx, cipher, rc4_key, NULL, params)) 5308 || !TEST_true(EVP_DecryptUpdate(ctx, outbuf, &outlen, 5309 rc4_ct, rc4_ct_s)) 5310 || !TEST_mem_eq(outbuf, outlen, rc4_pt, rc4_pt_s)) 5311 goto err; 5312 5313 ret = 1; 5314 err: 5315 EVP_CIPHER_free(cipher); 5316 EVP_CIPHER_CTX_free(ctx); 5317 5318 return ret; 5319 } 5320 5321 static int test_aes_rc4_keylen_change_cve_2023_5363(void) 5322 { 5323 /* RC4 test data obtained from RFC 6229 */ 5324 static const struct { 5325 unsigned char key[5]; 5326 unsigned char padding[11]; 5327 } rc4_key = { 5328 { /* Five bytes of key material */ 5329 0x83, 0x32, 0x22, 0x77, 0x2a, 5330 }, 5331 { /* Random padding to 16 bytes */ 5332 0x80, 0xad, 0x97, 0xbd, 0xc9, 0x73, 0xdf, 0x8a, 0xaa, 0x32, 0x91 5333 } 5334 }; 5335 static const unsigned char rc4_pt[] = { 5336 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 5337 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 5338 }; 5339 static const unsigned char rc4_ct[] = { 5340 0x80, 0xad, 0x97, 0xbd, 0xc9, 0x73, 0xdf, 0x8a, 5341 0x2e, 0x87, 0x9e, 0x92, 0xa4, 0x97, 0xef, 0xda 5342 }; 5343 5344 if (lgcyprov == NULL) 5345 return TEST_skip("Test requires legacy provider to be loaded"); 5346 5347 return rc4_encrypt(rc4_key.key, sizeof(rc4_key.key), 5348 rc4_pt, sizeof(rc4_pt), rc4_ct, sizeof(rc4_ct)) 5349 && rc4_decrypt(rc4_key.key, sizeof(rc4_key.key), 5350 rc4_pt, sizeof(rc4_pt), rc4_ct, sizeof(rc4_ct)); 5351 } 5352 #endif 5353 5354 int setup_tests(void) 5355 { 5356 OPTION_CHOICE o; 5357 5358 while ((o = opt_next()) != OPT_EOF) { 5359 switch (o) { 5360 case OPT_CONTEXT: 5361 /* Set up an alternate library context */ 5362 testctx = OSSL_LIB_CTX_new(); 5363 if (!TEST_ptr(testctx)) 5364 return 0; 5365 #ifdef STATIC_LEGACY 5366 /* 5367 * This test is always statically linked against libcrypto. We must not 5368 * attempt to load legacy.so that might be dynamically linked against 5369 * libcrypto. Instead we use a built-in version of the legacy provider. 5370 */ 5371 if (!OSSL_PROVIDER_add_builtin(testctx, "legacy", ossl_legacy_provider_init)) 5372 return 0; 5373 #endif 5374 /* Swap the libctx to test non-default context only */ 5375 nullprov = OSSL_PROVIDER_load(NULL, "null"); 5376 deflprov = OSSL_PROVIDER_load(testctx, "default"); 5377 lgcyprov = OSSL_PROVIDER_load(testctx, "legacy"); 5378 break; 5379 case OPT_TEST_CASES: 5380 break; 5381 default: 5382 return 0; 5383 } 5384 } 5385 5386 ADD_TEST(test_EVP_set_default_properties); 5387 ADD_ALL_TESTS(test_EVP_DigestSignInit, 30); 5388 ADD_TEST(test_EVP_DigestVerifyInit); 5389 #ifndef OPENSSL_NO_SIPHASH 5390 ADD_TEST(test_siphash_digestsign); 5391 #endif 5392 ADD_TEST(test_EVP_Digest); 5393 ADD_TEST(test_EVP_md_null); 5394 ADD_ALL_TESTS(test_EVP_PKEY_sign, 3); 5395 #ifndef OPENSSL_NO_DEPRECATED_3_0 5396 ADD_ALL_TESTS(test_EVP_PKEY_sign_with_app_method, 2); 5397 #endif 5398 ADD_ALL_TESTS(test_EVP_Enveloped, 2); 5399 ADD_ALL_TESTS(test_d2i_AutoPrivateKey, OSSL_NELEM(keydata)); 5400 ADD_TEST(test_privatekey_to_pkcs8); 5401 ADD_TEST(test_EVP_PKCS82PKEY_wrong_tag); 5402 #ifndef OPENSSL_NO_EC 5403 ADD_TEST(test_EVP_PKCS82PKEY); 5404 #endif 5405 #ifndef OPENSSL_NO_EC 5406 ADD_ALL_TESTS(test_EC_keygen_with_enc, OSSL_NELEM(ec_encodings)); 5407 #endif 5408 #if !defined(OPENSSL_NO_SM2) 5409 ADD_TEST(test_EVP_SM2); 5410 ADD_TEST(test_EVP_SM2_verify); 5411 #endif 5412 ADD_ALL_TESTS(test_set_get_raw_keys, OSSL_NELEM(keys)); 5413 #ifndef OPENSSL_NO_DEPRECATED_3_0 5414 custom_pmeth = EVP_PKEY_meth_new(0xdefaced, 0); 5415 if (!TEST_ptr(custom_pmeth)) 5416 return 0; 5417 EVP_PKEY_meth_set_check(custom_pmeth, pkey_custom_check); 5418 EVP_PKEY_meth_set_public_check(custom_pmeth, pkey_custom_pub_check); 5419 EVP_PKEY_meth_set_param_check(custom_pmeth, pkey_custom_param_check); 5420 if (!TEST_int_eq(EVP_PKEY_meth_add0(custom_pmeth), 1)) 5421 return 0; 5422 #endif 5423 ADD_ALL_TESTS(test_EVP_PKEY_check, OSSL_NELEM(keycheckdata)); 5424 #ifndef OPENSSL_NO_CMAC 5425 ADD_TEST(test_CMAC_keygen); 5426 #endif 5427 ADD_TEST(test_HKDF); 5428 ADD_TEST(test_emptyikm_HKDF); 5429 ADD_TEST(test_empty_salt_info_HKDF); 5430 #ifndef OPENSSL_NO_EC 5431 ADD_TEST(test_X509_PUBKEY_inplace); 5432 ADD_TEST(test_X509_PUBKEY_dup); 5433 ADD_ALL_TESTS(test_invalide_ec_char2_pub_range_decode, 5434 OSSL_NELEM(ec_der_pub_keys)); 5435 #endif 5436 #ifndef OPENSSL_NO_DSA 5437 ADD_TEST(test_DSA_get_set_params); 5438 ADD_TEST(test_DSA_priv_pub); 5439 #endif 5440 ADD_TEST(test_RSA_get_set_params); 5441 ADD_TEST(test_RSA_OAEP_set_get_params); 5442 ADD_TEST(test_RSA_OAEP_set_null_label); 5443 #if !defined(OPENSSL_NO_CHACHA) && !defined(OPENSSL_NO_POLY1305) 5444 ADD_TEST(test_decrypt_null_chunks); 5445 #endif 5446 #ifndef OPENSSL_NO_DH 5447 ADD_TEST(test_DH_priv_pub); 5448 # ifndef OPENSSL_NO_DEPRECATED_3_0 5449 ADD_TEST(test_EVP_PKEY_set1_DH); 5450 # endif 5451 #endif 5452 #ifndef OPENSSL_NO_EC 5453 ADD_TEST(test_EC_priv_pub); 5454 # ifndef OPENSSL_NO_DEPRECATED_3_0 5455 ADD_TEST(test_EC_priv_only_legacy); 5456 # endif 5457 #endif 5458 ADD_ALL_TESTS(test_keygen_with_empty_template, 2); 5459 ADD_ALL_TESTS(test_pkey_ctx_fail_without_provider, 2); 5460 5461 ADD_TEST(test_rand_agglomeration); 5462 ADD_ALL_TESTS(test_evp_iv_aes, 12); 5463 #ifndef OPENSSL_NO_DES 5464 ADD_ALL_TESTS(test_evp_iv_des, 6); 5465 #endif 5466 #ifndef OPENSSL_NO_BF 5467 ADD_ALL_TESTS(test_evp_bf_default_keylen, 4); 5468 #endif 5469 ADD_TEST(test_EVP_rsa_pss_with_keygen_bits); 5470 ADD_TEST(test_EVP_rsa_pss_set_saltlen); 5471 #ifndef OPENSSL_NO_EC 5472 ADD_ALL_TESTS(test_ecpub, OSSL_NELEM(ecpub_nids)); 5473 #endif 5474 5475 ADD_TEST(test_names_do_all); 5476 5477 ADD_ALL_TESTS(test_evp_init_seq, OSSL_NELEM(evp_init_tests)); 5478 ADD_ALL_TESTS(test_evp_reset, OSSL_NELEM(evp_reset_tests)); 5479 ADD_ALL_TESTS(test_evp_reinit_seq, OSSL_NELEM(evp_reinit_tests)); 5480 ADD_ALL_TESTS(test_gcm_reinit, OSSL_NELEM(gcm_reinit_tests)); 5481 ADD_ALL_TESTS(test_evp_updated_iv, OSSL_NELEM(evp_updated_iv_tests)); 5482 ADD_ALL_TESTS(test_ivlen_change, OSSL_NELEM(ivlen_change_ciphers)); 5483 if (OSSL_NELEM(keylen_change_ciphers) - 1 > 0) 5484 ADD_ALL_TESTS(test_keylen_change, OSSL_NELEM(keylen_change_ciphers) - 1); 5485 5486 #ifndef OPENSSL_NO_DEPRECATED_3_0 5487 ADD_ALL_TESTS(test_custom_pmeth, 12); 5488 ADD_TEST(test_evp_md_cipher_meth); 5489 ADD_TEST(test_custom_md_meth); 5490 ADD_TEST(test_custom_ciph_meth); 5491 5492 # ifndef OPENSSL_NO_DYNAMIC_ENGINE 5493 /* Tests only support the default libctx */ 5494 if (testctx == NULL) { 5495 # ifndef OPENSSL_NO_EC 5496 ADD_ALL_TESTS(test_signatures_with_engine, 3); 5497 # else 5498 ADD_ALL_TESTS(test_signatures_with_engine, 2); 5499 # endif 5500 ADD_TEST(test_cipher_with_engine); 5501 } 5502 # endif 5503 #endif 5504 5505 ADD_ALL_TESTS(test_ecx_short_keys, OSSL_NELEM(ecxnids)); 5506 5507 #ifndef OPENSSL_NO_EC 5508 ADD_ALL_TESTS(test_ecx_not_private_key, OSSL_NELEM(keys)); 5509 #endif 5510 5511 /* Test cases for CVE-2023-5363 */ 5512 ADD_TEST(test_aes_gcm_ivlen_change_cve_2023_5363); 5513 #ifndef OPENSSL_NO_RC4 5514 ADD_TEST(test_aes_rc4_keylen_change_cve_2023_5363); 5515 #endif 5516 5517 return 1; 5518 } 5519 5520 void cleanup_tests(void) 5521 { 5522 OSSL_PROVIDER_unload(nullprov); 5523 OSSL_PROVIDER_unload(deflprov); 5524 OSSL_PROVIDER_unload(lgcyprov); 5525 OSSL_LIB_CTX_free(testctx); 5526 } 5527