1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
|
#! /usr/bin/env perl
# Copyright 2017-2022 The OpenSSL Project Authors. All Rights Reserved.
#
# Licensed under the Apache License 2.0 (the "License"). You may not use
# this file except in compliance with the License. You can obtain a copy
# in the file LICENSE in the source distribution or at
# https://www.openssl.org/source/license.html
use strict;
use warnings;
use File::Spec;
use File::Compare qw/compare_text/;
use OpenSSL::Glob;
use OpenSSL::Test qw/:DEFAULT data_file srctop_file bldtop_dir/;
use OpenSSL::Test::Utils;
setup("test_ecparam");
plan skip_all => "EC or EC2M isn't supported in this build"
if disabled("ec") || disabled("ec2m");
my @valid = glob(data_file("valid", "*.pem"));
my @noncanon = glob(data_file("noncanon", "*.pem"));
my @invalid = glob(data_file("invalid", "*.pem"));
if (disabled("sm2")) {
@valid = grep { !/sm2-.*\.pem/} @valid;
}
plan tests => 12;
sub checkload {
my $files = shift; # List of files
my $valid = shift; # Check should pass or fail?
my $app = shift; # Which application
my $opt = shift; # Additional option
foreach (@$files) {
if ($valid) {
ok(run(app(['openssl', $app, '-noout', $opt, '-in', $_])));
} else {
ok(!run(app(['openssl', $app, '-noout', $opt, '-in', $_])));
}
}
}
sub checkcompare {
my $files = shift; # List of files
my $app = shift; # Which application
foreach (@$files) {
my $testout = "$app.tst";
ok(run(app(['openssl', $app, '-out', $testout, '-in', $_])));
ok(!compare_text($_, $testout, sub {
my $in1 = $_[0];
my $in2 = $_[1];
$in1 =~ s/\r\n/\n/g;
$in2 =~ s/\r\n/\n/g;
$in1 ne $in2}), "Original file $_ is the same as new one");
}
}
my $no_fips = disabled('fips') || ($ENV{NO_FIPS} // 0);
subtest "Check loading valid parameters by ecparam with -check" => sub {
plan tests => scalar(@valid);
checkload(\@valid, 1, "ecparam", "-check");
};
subtest "Check loading valid parameters by ecparam with -check_named" => sub {
plan tests => scalar(@valid);
checkload(\@valid, 1, "ecparam", "-check_named");
};
subtest "Check loading valid parameters by pkeyparam with -check" => sub {
plan tests => scalar(@valid);
checkload(\@valid, 1, "pkeyparam", "-check");
};
subtest "Check loading non-canonically encoded parameters by ecparam with -check" => sub {
plan tests => scalar(@noncanon);
checkload(\@noncanon, 1, "ecparam", "-check");
};
subtest "Check loading non-canonically encoded parameters by ecparam with -check_named" => sub {
plan tests => scalar(@noncanon);
checkload(\@noncanon, 1, "ecparam", "-check_named");
};
subtest "Check loading non-canonically encoded parameters by pkeyparam with -check" => sub {
plan tests => scalar(@noncanon);
checkload(\@noncanon, 1, "pkeyparam", "-check");
};
subtest "Check loading invalid parameters by ecparam with -check" => sub {
plan tests => scalar(@invalid);
checkload(\@invalid, 0, "ecparam", "-check");
};
subtest "Check loading invalid parameters by ecparam with -check_named" => sub {
plan tests => scalar(@invalid);
checkload(\@invalid, 0, "ecparam", "-check_named");
};
subtest "Check loading invalid parameters by pkeyparam with -check" => sub {
plan tests => scalar(@invalid);
checkload(\@invalid, 0, "pkeyparam", "-check");
};
subtest "Check ecparam does not change the parameter file on output" => sub {
plan tests => 2 * scalar(@valid);
checkcompare(\@valid, "ecparam");
};
subtest "Check pkeyparam does not change the parameter file on output" => sub {
plan tests => 2 * scalar(@valid);
checkcompare(\@valid, "pkeyparam");
};
subtest "Check loading of fips and non-fips params" => sub {
plan skip_all => "FIPS is disabled"
if $no_fips;
plan tests => 8;
my $fipsconf = srctop_file("test", "fips-and-base.cnf");
my $defaultconf = srctop_file("test", "default.cnf");
$ENV{OPENSSL_CONF} = $fipsconf;
ok(run(app(['openssl', 'ecparam',
'-in', data_file('valid', 'secp384r1-explicit.pem'),
'-check'])),
"Loading explicitly encoded valid curve");
ok(run(app(['openssl', 'ecparam',
'-in', data_file('valid', 'secp384r1-named.pem'),
'-check'])),
"Loading named valid curve");
ok(!run(app(['openssl', 'ecparam',
'-in', data_file('valid', 'secp112r1-named.pem'),
'-check'])),
"Fail loading named non-fips curve");
ok(!run(app(['openssl', 'pkeyparam',
'-in', data_file('valid', 'secp112r1-named.pem'),
'-check'])),
"Fail loading named non-fips curve using pkeyparam");
ok(run(app(['openssl', 'ecparam',
'-provider', 'default',
'-propquery', '?fips!=yes',
'-in', data_file('valid', 'secp112r1-named.pem'),
'-check'])),
"Loading named non-fips curve in FIPS mode with non-FIPS property".
" query");
ok(run(app(['openssl', 'pkeyparam',
'-provider', 'default',
'-propquery', '?fips!=yes',
'-in', data_file('valid', 'secp112r1-named.pem'),
'-check'])),
"Loading named non-fips curve in FIPS mode with non-FIPS property".
" query using pkeyparam");
ok(!run(app(['openssl', 'ecparam',
'-genkey', '-name', 'secp112r1'])),
"Fail generating key for named non-fips curve");
ok(run(app(['openssl', 'ecparam',
'-provider', 'default',
'-propquery', '?fips!=yes',
'-genkey', '-name', 'secp112r1'])),
"Generating key for named non-fips curve with non-FIPS property query");
$ENV{OPENSSL_CONF} = $defaultconf;
};
|