diff options
author | Tomas Mraz <tomas@openssl.org> | 2021-07-09 15:48:02 +0200 |
---|---|---|
committer | Richard Levitte <levitte@openssl.org> | 2021-07-10 17:05:07 +0200 |
commit | 6bfd3e51c04faa97ed98f38e35bd9bb5294b9070 (patch) | |
tree | 38419eb0c0d0c5004eede5f457b6214316e74f04 | |
parent | 50d0a51d6dc83815a6fca5c00c711ffcf407a214 (diff) | |
download | openssl-new-6bfd3e51c04faa97ed98f38e35bd9bb5294b9070.tar.gz |
test_cmp_ctx: Avoid using empty X509 with i2d
Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com>
(Merged from https://github.com/openssl/openssl/pull/16036)
-rw-r--r-- | test/cmp_ctx_test.c | 22 | ||||
-rw-r--r-- | test/recipes/65-test_cmp_ctx.t | 6 |
2 files changed, 23 insertions, 5 deletions
diff --git a/test/cmp_ctx_test.c b/test/cmp_ctx_test.c index e25aa9ab43..71fa679ff4 100644 --- a/test/cmp_ctx_test.c +++ b/test/cmp_ctx_test.c @@ -13,6 +13,11 @@ #include <openssl/x509_vfy.h> +static X509 *test_cert; + +/* Avoid using X509_new() via the generic macros below. */ +#define X509_new() X509_dup(test_cert) + typedef struct test_fixture { const char *test_case_name; OSSL_CMP_CTX *ctx; @@ -42,7 +47,7 @@ static OSSL_CMP_CTX_TEST_FIXTURE *set_up(const char *const test_case_name) static STACK_OF(X509) *sk_X509_new_1(void) { STACK_OF(X509) *sk = sk_X509_new_null(); - X509 *x = X509_new(); + X509 *x = X509_dup(test_cert); if (x == NULL || !sk_X509_push(sk, x)) { sk_X509_free(sk); @@ -68,12 +73,12 @@ static int execute_CTX_reinit_test(OSSL_CMP_CTX_TEST_FIXTURE *fixture) ctx->status = 1; ctx->failInfoCode = 1; if (!ossl_cmp_ctx_set0_statusString(ctx, sk_ASN1_UTF8STRING_new_null()) - || !ossl_cmp_ctx_set0_newCert(ctx, X509_new()) + || !ossl_cmp_ctx_set0_newCert(ctx, X509_dup(test_cert)) || !TEST_ptr(certs = sk_X509_new_1()) || !ossl_cmp_ctx_set1_newChain(ctx, certs) || !ossl_cmp_ctx_set1_caPubs(ctx, certs) || !ossl_cmp_ctx_set1_extraCertsIn(ctx, certs) - || !ossl_cmp_ctx_set0_validatedSrvCert(ctx, X509_new()) + || !ossl_cmp_ctx_set0_validatedSrvCert(ctx, X509_dup(test_cert)) || !TEST_ptr(bytes = ASN1_OCTET_STRING_new()) || !OSSL_CMP_CTX_set1_transactionID(ctx, bytes) || !OSSL_CMP_CTX_set1_senderNonce(ctx, bytes) @@ -786,6 +791,17 @@ DEFINE_SET_TEST(ossl_cmp, ctx, 1, 1, recipNonce, ASN1_OCTET_STRING) int setup_tests(void) { + char *cert_file; + + if (!test_skip_common_options()) { + TEST_error("Error parsing test options\n"); + return 0; + } + + if (!TEST_ptr(cert_file = test_get_argument(0)) + || !TEST_ptr(test_cert = load_cert_pem(cert_file, NULL))) + return 0; + /* OSSL_CMP_CTX_new() is tested by set_up() */ /* OSSL_CMP_CTX_free() is tested by tear_down() */ ADD_TEST(test_CTX_reinit); diff --git a/test/recipes/65-test_cmp_ctx.t b/test/recipes/65-test_cmp_ctx.t index 93f26ea994..069c0e660b 100644 --- a/test/recipes/65-test_cmp_ctx.t +++ b/test/recipes/65-test_cmp_ctx.t @@ -10,7 +10,7 @@ use strict; -use OpenSSL::Test; # get 'plan' +use OpenSSL::Test qw/:DEFAULT srctop_file/; use OpenSSL::Test::Simple; use OpenSSL::Test::Utils; @@ -19,4 +19,6 @@ setup("test_cmp_ctx"); plan skip_all => "This test is not supported in a no-cmp build" if disabled("cmp"); -simple_test("test_cmp_ctx", "cmp_ctx_test", "cmp_ctx"); +plan tests => 1; + +ok(run(test(["cmp_ctx_test", srctop_file("test", "certs", "ee-cert.pem")]))); |