2018-11-16 09:44:30 +08:00
|
|
|
/*
|
2023-09-07 16:59:15 +08:00
|
|
|
* Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved.
|
2018-11-16 09:44:30 +08:00
|
|
|
* Copyright (c) 2019, Oracle and/or its affiliates. All rights reserved.
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
|
|
* in the file LICENSE in the source distribution or at
|
|
|
|
* https://www.openssl.org/source/license.html
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <stdarg.h>
|
2020-05-02 12:17:54 +08:00
|
|
|
#include <openssl/evp.h>
|
2018-11-16 09:44:30 +08:00
|
|
|
#include "testutil.h"
|
|
|
|
#include "internal/nelem.h"
|
|
|
|
#include "internal/property.h"
|
2019-09-28 06:45:40 +08:00
|
|
|
#include "../crypto/property/property_local.h"
|
2018-11-16 09:44:30 +08:00
|
|
|
|
2021-10-04 21:33:37 +08:00
|
|
|
/*
|
|
|
|
* We make our OSSL_PROVIDER for testing purposes. All we really need is
|
|
|
|
* a pointer. We know that as long as we don't try to use the method
|
|
|
|
* cache flush functions, the provider pointer is merely a pointer being
|
|
|
|
* passed around, and used as a tag of sorts.
|
|
|
|
*/
|
|
|
|
struct ossl_provider_st {
|
|
|
|
int x;
|
|
|
|
};
|
|
|
|
|
2018-11-16 09:44:30 +08:00
|
|
|
static int add_property_names(const char *n, ...)
|
|
|
|
{
|
|
|
|
va_list args;
|
|
|
|
int res = 1;
|
|
|
|
|
|
|
|
va_start(args, n);
|
|
|
|
do {
|
2019-05-01 18:02:43 +08:00
|
|
|
if (!TEST_int_ne(ossl_property_name(NULL, n, 1), 0))
|
2018-11-16 09:44:30 +08:00
|
|
|
res = 0;
|
|
|
|
} while ((n = va_arg(args, const char *)) != NULL);
|
|
|
|
va_end(args);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2019-11-11 09:17:32 +08:00
|
|
|
static int up_ref(void *p)
|
|
|
|
{
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void down_ref(void *p)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2018-11-16 09:44:30 +08:00
|
|
|
static int test_property_string(void)
|
|
|
|
{
|
2021-12-21 08:44:49 +08:00
|
|
|
OSSL_LIB_CTX *ctx;
|
|
|
|
OSSL_METHOD_STORE *store = NULL;
|
2018-11-16 09:44:30 +08:00
|
|
|
int res = 0;
|
|
|
|
OSSL_PROPERTY_IDX i, j;
|
|
|
|
|
2021-12-21 08:44:49 +08:00
|
|
|
/*-
|
|
|
|
* Use our own library context because we depend on ordering from a
|
|
|
|
* pristine state.
|
|
|
|
*/
|
|
|
|
if (TEST_ptr(ctx = OSSL_LIB_CTX_new())
|
|
|
|
&& TEST_ptr(store = ossl_method_store_new(ctx))
|
|
|
|
&& TEST_int_eq(ossl_property_name(ctx, "fnord", 0), 0)
|
|
|
|
&& TEST_int_ne(ossl_property_name(ctx, "fnord", 1), 0)
|
|
|
|
&& TEST_int_ne(ossl_property_name(ctx, "name", 1), 0)
|
|
|
|
/* Pre loaded names */
|
|
|
|
&& TEST_str_eq(ossl_property_name_str(ctx, 1), "provider")
|
|
|
|
&& TEST_str_eq(ossl_property_name_str(ctx, 2), "version")
|
|
|
|
&& TEST_str_eq(ossl_property_name_str(ctx, 3), "fips")
|
|
|
|
&& TEST_str_eq(ossl_property_name_str(ctx, 4), "output")
|
|
|
|
&& TEST_str_eq(ossl_property_name_str(ctx, 5), "input")
|
|
|
|
&& TEST_str_eq(ossl_property_name_str(ctx, 6), "structure")
|
|
|
|
/* The names we added */
|
|
|
|
&& TEST_str_eq(ossl_property_name_str(ctx, 7), "fnord")
|
|
|
|
&& TEST_str_eq(ossl_property_name_str(ctx, 8), "name")
|
|
|
|
/* Out of range */
|
|
|
|
&& TEST_ptr_null(ossl_property_name_str(ctx, 0))
|
|
|
|
&& TEST_ptr_null(ossl_property_name_str(ctx, 9))
|
2018-11-16 09:44:30 +08:00
|
|
|
/* Property value checks */
|
2021-12-21 08:44:49 +08:00
|
|
|
&& TEST_int_eq(ossl_property_value(ctx, "fnord", 0), 0)
|
|
|
|
&& TEST_int_ne(i = ossl_property_value(ctx, "no", 0), 0)
|
|
|
|
&& TEST_int_ne(j = ossl_property_value(ctx, "yes", 0), 0)
|
2018-11-16 09:44:30 +08:00
|
|
|
&& TEST_int_ne(i, j)
|
2021-12-21 08:44:49 +08:00
|
|
|
&& TEST_int_eq(ossl_property_value(ctx, "yes", 1), j)
|
|
|
|
&& TEST_int_eq(ossl_property_value(ctx, "no", 1), i)
|
|
|
|
&& TEST_int_ne(i = ossl_property_value(ctx, "illuminati", 1), 0)
|
|
|
|
&& TEST_int_eq(j = ossl_property_value(ctx, "fnord", 1), i + 1)
|
|
|
|
&& TEST_int_eq(ossl_property_value(ctx, "fnord", 1), j)
|
|
|
|
/* Pre loaded values */
|
|
|
|
&& TEST_str_eq(ossl_property_value_str(ctx, 1), "yes")
|
|
|
|
&& TEST_str_eq(ossl_property_value_str(ctx, 2), "no")
|
|
|
|
/* The value we added */
|
|
|
|
&& TEST_str_eq(ossl_property_value_str(ctx, 3), "illuminati")
|
|
|
|
&& TEST_str_eq(ossl_property_value_str(ctx, 4), "fnord")
|
|
|
|
/* Out of range */
|
|
|
|
&& TEST_ptr_null(ossl_property_value_str(ctx, 0))
|
|
|
|
&& TEST_ptr_null(ossl_property_value_str(ctx, 5))
|
2018-11-16 09:44:30 +08:00
|
|
|
/* Check name and values are distinct */
|
2021-12-21 08:44:49 +08:00
|
|
|
&& TEST_int_eq(ossl_property_value(ctx, "cold", 0), 0)
|
|
|
|
&& TEST_int_ne(ossl_property_name(ctx, "fnord", 0),
|
|
|
|
ossl_property_value(ctx, "fnord", 0)))
|
2018-11-16 09:44:30 +08:00
|
|
|
res = 1;
|
|
|
|
ossl_method_store_free(store);
|
2021-12-21 08:44:49 +08:00
|
|
|
OSSL_LIB_CTX_free(ctx);
|
2018-11-16 09:44:30 +08:00
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const struct {
|
|
|
|
const char *defn;
|
|
|
|
const char *query;
|
|
|
|
int e;
|
|
|
|
} parser_tests[] = {
|
2019-05-16 12:50:18 +08:00
|
|
|
{ "", "sky=blue", -1 },
|
2018-11-16 09:44:30 +08:00
|
|
|
{ "", "sky!=blue", 1 },
|
2019-05-16 12:50:18 +08:00
|
|
|
{ "groan", "", 0 },
|
2018-11-16 09:44:30 +08:00
|
|
|
{ "cold=yes", "cold=yes", 1 },
|
|
|
|
{ "cold=yes", "cold", 1 },
|
|
|
|
{ "cold=yes", "cold!=no", 1 },
|
|
|
|
{ "groan", "groan=yes", 1 },
|
2019-05-16 12:50:18 +08:00
|
|
|
{ "groan", "groan=no", -1 },
|
|
|
|
{ "groan", "groan!=yes", -1 },
|
|
|
|
{ "cold=no", "cold", -1 },
|
|
|
|
{ "cold=no", "?cold", 0 },
|
2018-11-16 09:44:30 +08:00
|
|
|
{ "cold=no", "cold=no", 1 },
|
2019-05-16 12:50:18 +08:00
|
|
|
{ "groan", "cold", -1 },
|
2018-11-16 09:44:30 +08:00
|
|
|
{ "groan", "cold=no", 1 },
|
|
|
|
{ "groan", "cold!=yes", 1 },
|
2019-05-16 12:50:18 +08:00
|
|
|
{ "groan=blue", "groan=yellow", -1 },
|
|
|
|
{ "groan=blue", "?groan=yellow", 0 },
|
2018-11-16 09:44:30 +08:00
|
|
|
{ "groan=blue", "groan!=yellow", 1 },
|
2019-05-16 12:50:18 +08:00
|
|
|
{ "groan=blue", "?groan!=yellow", 1 },
|
2018-11-16 09:44:30 +08:00
|
|
|
{ "today=monday, tomorrow=3", "today!=2", 1 },
|
2019-05-16 12:50:18 +08:00
|
|
|
{ "today=monday, tomorrow=3", "today!='monday'", -1 },
|
2018-11-16 09:44:30 +08:00
|
|
|
{ "today=monday, tomorrow=3", "tomorrow=3", 1 },
|
|
|
|
{ "n=0x3", "n=3", 1 },
|
2019-05-16 12:50:18 +08:00
|
|
|
{ "n=0x3", "n=-3", -1 },
|
2018-11-16 09:44:30 +08:00
|
|
|
{ "n=0x33", "n=51", 1 },
|
2023-11-29 02:54:37 +08:00
|
|
|
{ "n=0x123456789abcdef", "n=0x123456789abcdef", 1 },
|
|
|
|
{ "n=0x7fffffffffffffff", "n=0x7fffffffffffffff", 1 }, /* INT64_MAX */
|
|
|
|
{ "n=9223372036854775807", "n=9223372036854775807", 1 }, /* INT64_MAX */
|
|
|
|
{ "n=0777777777777777777777", "n=0777777777777777777777", 1 }, /* INT64_MAX */
|
2018-11-16 09:44:30 +08:00
|
|
|
{ "n=033", "n=27", 1 },
|
|
|
|
{ "n=0", "n=00", 1 },
|
|
|
|
{ "n=0x0", "n=0", 1 },
|
2019-05-16 12:50:18 +08:00
|
|
|
{ "n=0, sky=blue", "?n=0, sky=blue", 2 },
|
|
|
|
{ "n=1, sky=blue", "?n=0, sky=blue", 1 },
|
2018-11-16 09:44:30 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
static int test_property_parse(int n)
|
|
|
|
{
|
|
|
|
OSSL_METHOD_STORE *store;
|
|
|
|
OSSL_PROPERTY_LIST *p = NULL, *q = NULL;
|
|
|
|
int r = 0;
|
|
|
|
|
2019-05-01 18:02:43 +08:00
|
|
|
if (TEST_ptr(store = ossl_method_store_new(NULL))
|
2018-11-16 09:44:30 +08:00
|
|
|
&& add_property_names("sky", "groan", "cold", "today", "tomorrow", "n",
|
|
|
|
NULL)
|
2019-05-01 18:02:43 +08:00
|
|
|
&& TEST_ptr(p = ossl_parse_property(NULL, parser_tests[n].defn))
|
2021-03-13 08:34:49 +08:00
|
|
|
&& TEST_ptr(q = ossl_parse_query(NULL, parser_tests[n].query, 0))
|
2019-05-16 12:50:18 +08:00
|
|
|
&& TEST_int_eq(ossl_property_match_count(q, p), parser_tests[n].e))
|
2018-11-16 09:44:30 +08:00
|
|
|
r = 1;
|
|
|
|
ossl_property_free(p);
|
|
|
|
ossl_property_free(q);
|
|
|
|
ossl_method_store_free(store);
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2021-03-13 08:34:49 +08:00
|
|
|
static int test_property_query_value_create(void)
|
|
|
|
{
|
|
|
|
OSSL_METHOD_STORE *store;
|
|
|
|
OSSL_PROPERTY_LIST *p = NULL, *q = NULL, *o = NULL;
|
|
|
|
int r = 0;
|
|
|
|
|
2021-03-16 20:26:24 +08:00
|
|
|
/* The property value used here must not be used in other test cases */
|
2021-03-13 08:34:49 +08:00
|
|
|
if (TEST_ptr(store = ossl_method_store_new(NULL))
|
2021-03-16 20:26:24 +08:00
|
|
|
&& add_property_names("wood", NULL)
|
|
|
|
&& TEST_ptr(p = ossl_parse_query(NULL, "wood=oak", 0)) /* undefined */
|
|
|
|
&& TEST_ptr(q = ossl_parse_query(NULL, "wood=oak", 1)) /* creates */
|
|
|
|
&& TEST_ptr(o = ossl_parse_query(NULL, "wood=oak", 0)) /* defined */
|
2021-03-13 08:34:49 +08:00
|
|
|
&& TEST_int_eq(ossl_property_match_count(q, p), -1)
|
|
|
|
&& TEST_int_eq(ossl_property_match_count(q, o), 1))
|
|
|
|
r = 1;
|
|
|
|
ossl_property_free(o);
|
|
|
|
ossl_property_free(p);
|
|
|
|
ossl_property_free(q);
|
|
|
|
ossl_method_store_free(store);
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2021-09-30 09:35:32 +08:00
|
|
|
static const struct {
|
|
|
|
int query;
|
|
|
|
const char *ps;
|
|
|
|
} parse_error_tests[] = {
|
|
|
|
{ 0, "n=1, n=1" }, /* duplicate name */
|
|
|
|
{ 0, "n=1, a=hi, n=1" }, /* duplicate name */
|
|
|
|
{ 1, "n=1, a=bye, ?n=0" }, /* duplicate name */
|
|
|
|
{ 0, "a=abc,#@!, n=1" }, /* non-ASCII character located */
|
|
|
|
{ 1, "a='Hello" }, /* Unterminated string */
|
|
|
|
{ 0, "a=\"World" }, /* Unterminated string */
|
2023-01-16 07:04:11 +08:00
|
|
|
{ 0, "a=_abd_" }, /* Unquoted string not starting with alphabetic */
|
2021-09-30 09:35:32 +08:00
|
|
|
{ 1, "a=2, n=012345678" }, /* Bad octal digit */
|
|
|
|
{ 0, "n=0x28FG, a=3" }, /* Bad hex digit */
|
|
|
|
{ 0, "n=145d, a=2" }, /* Bad decimal digit */
|
2023-11-29 02:54:37 +08:00
|
|
|
{ 0, "n=0x8000000000000000, a=3" }, /* Hex overflow */
|
|
|
|
{ 0, "n=922337203000000000d, a=2" }, /* Decimal overflow */
|
|
|
|
{ 0, "a=2, n=1000000000000000000000" }, /* Octal overflow */
|
2021-09-30 09:35:32 +08:00
|
|
|
{ 1, "@='hello'" }, /* Invalid name */
|
|
|
|
{ 1, "n0123456789012345678901234567890123456789"
|
|
|
|
"0123456789012345678901234567890123456789"
|
|
|
|
"0123456789012345678901234567890123456789"
|
|
|
|
"0123456789012345678901234567890123456789=yes" }, /* Name too long */
|
|
|
|
{ 0, ".n=3" }, /* Invalid name */
|
|
|
|
{ 1, "fnord.fnord.=3" } /* Invalid name */
|
|
|
|
};
|
|
|
|
|
|
|
|
static int test_property_parse_error(int n)
|
|
|
|
{
|
|
|
|
OSSL_METHOD_STORE *store;
|
|
|
|
OSSL_PROPERTY_LIST *p = NULL;
|
|
|
|
int r = 0;
|
|
|
|
const char *ps;
|
|
|
|
|
|
|
|
if (!TEST_ptr(store = ossl_method_store_new(NULL))
|
|
|
|
|| !add_property_names("a", "n", NULL))
|
|
|
|
goto err;
|
|
|
|
ps = parse_error_tests[n].ps;
|
|
|
|
if (parse_error_tests[n].query) {
|
|
|
|
if (!TEST_ptr_null(p = ossl_parse_query(NULL, ps, 1)))
|
|
|
|
goto err;
|
|
|
|
} else if (!TEST_ptr_null(p = ossl_parse_property(NULL, ps))) {
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
r = 1;
|
|
|
|
err:
|
|
|
|
ossl_property_free(p);
|
|
|
|
ossl_method_store_free(store);
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2018-11-16 09:44:30 +08:00
|
|
|
static const struct {
|
|
|
|
const char *q_global;
|
|
|
|
const char *q_local;
|
|
|
|
const char *prop;
|
|
|
|
} merge_tests[] = {
|
|
|
|
{ "", "colour=blue", "colour=blue" },
|
|
|
|
{ "colour=blue", "", "colour=blue" },
|
|
|
|
{ "colour=red", "colour=blue", "colour=blue" },
|
|
|
|
{ "clouds=pink, urn=red", "urn=blue, colour=green",
|
|
|
|
"urn=blue, colour=green, clouds=pink" },
|
|
|
|
{ "pot=gold", "urn=blue", "pot=gold, urn=blue" },
|
|
|
|
{ "night", "day", "day=yes, night=yes" },
|
|
|
|
{ "day", "night", "day=yes, night=yes" },
|
|
|
|
{ "", "", "" },
|
|
|
|
/*
|
|
|
|
* The following four leave 'day' unspecified in the query, and will match
|
|
|
|
* any definition
|
|
|
|
*/
|
|
|
|
{ "day=yes", "-day", "day=no" },
|
|
|
|
{ "day=yes", "-day", "day=yes" },
|
|
|
|
{ "day=yes", "-day", "day=arglebargle" },
|
|
|
|
{ "day=yes", "-day", "pot=sesquioxidizing" },
|
|
|
|
{ "day, night", "-night, day", "day=yes, night=no" },
|
|
|
|
{ "-day", "day=yes", "day=yes" },
|
|
|
|
};
|
|
|
|
|
|
|
|
static int test_property_merge(int n)
|
|
|
|
{
|
|
|
|
OSSL_METHOD_STORE *store;
|
|
|
|
OSSL_PROPERTY_LIST *q_global = NULL, *q_local = NULL;
|
|
|
|
OSSL_PROPERTY_LIST *q_combined = NULL, *prop = NULL;
|
|
|
|
int r = 0;
|
|
|
|
|
2019-05-01 18:02:43 +08:00
|
|
|
if (TEST_ptr(store = ossl_method_store_new(NULL))
|
2018-11-16 09:44:30 +08:00
|
|
|
&& add_property_names("colour", "urn", "clouds", "pot", "day", "night",
|
|
|
|
NULL)
|
2019-05-01 18:02:43 +08:00
|
|
|
&& TEST_ptr(prop = ossl_parse_property(NULL, merge_tests[n].prop))
|
2021-03-13 08:34:49 +08:00
|
|
|
&& TEST_ptr(q_global = ossl_parse_query(NULL, merge_tests[n].q_global,
|
|
|
|
0))
|
|
|
|
&& TEST_ptr(q_local = ossl_parse_query(NULL, merge_tests[n].q_local, 0))
|
2018-11-16 09:44:30 +08:00
|
|
|
&& TEST_ptr(q_combined = ossl_property_merge(q_local, q_global))
|
2019-05-16 12:50:18 +08:00
|
|
|
&& TEST_int_ge(ossl_property_match_count(q_combined, prop), 0))
|
2018-11-16 09:44:30 +08:00
|
|
|
r = 1;
|
|
|
|
ossl_property_free(q_global);
|
|
|
|
ossl_property_free(q_local);
|
|
|
|
ossl_property_free(q_combined);
|
|
|
|
ossl_property_free(prop);
|
|
|
|
ossl_method_store_free(store);
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int test_property_defn_cache(void)
|
|
|
|
{
|
|
|
|
OSSL_METHOD_STORE *store;
|
2022-11-25 01:48:10 +08:00
|
|
|
OSSL_PROPERTY_LIST *red = NULL, *blue = NULL, *blue2 = NULL;
|
|
|
|
int r;
|
2018-11-16 09:44:30 +08:00
|
|
|
|
2022-11-25 01:48:10 +08:00
|
|
|
r = TEST_ptr(store = ossl_method_store_new(NULL))
|
2018-11-16 09:44:30 +08:00
|
|
|
&& add_property_names("red", "blue", NULL)
|
2019-05-01 18:02:43 +08:00
|
|
|
&& TEST_ptr(red = ossl_parse_property(NULL, "red"))
|
|
|
|
&& TEST_ptr(blue = ossl_parse_property(NULL, "blue"))
|
2018-11-16 09:44:30 +08:00
|
|
|
&& TEST_ptr_ne(red, blue)
|
2022-11-25 01:48:10 +08:00
|
|
|
&& TEST_true(ossl_prop_defn_set(NULL, "red", &red));
|
|
|
|
|
|
|
|
if (!r) {
|
|
|
|
ossl_property_free(red);
|
|
|
|
red = NULL;
|
|
|
|
ossl_property_free(blue);
|
|
|
|
blue = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
r = r && TEST_true(ossl_prop_defn_set(NULL, "blue", &blue));
|
|
|
|
if (!r) {
|
|
|
|
ossl_property_free(blue);
|
|
|
|
blue = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
r = r && TEST_ptr_eq(ossl_prop_defn_get(NULL, "red"), red)
|
|
|
|
&& TEST_ptr_eq(ossl_prop_defn_get(NULL, "blue"), blue)
|
|
|
|
&& TEST_ptr(blue2 = ossl_parse_property(NULL, "blue"))
|
|
|
|
&& TEST_ptr_ne(blue2, blue)
|
|
|
|
&& TEST_true(ossl_prop_defn_set(NULL, "blue", &blue2));
|
|
|
|
if (!r) {
|
|
|
|
ossl_property_free(blue2);
|
|
|
|
blue2 = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
r = r && TEST_ptr_eq(blue2, blue)
|
|
|
|
&& TEST_ptr_eq(ossl_prop_defn_get(NULL, "blue"), blue);
|
|
|
|
|
2018-11-16 09:44:30 +08:00
|
|
|
ossl_method_store_free(store);
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const struct {
|
|
|
|
const char *defn;
|
|
|
|
const char *query;
|
|
|
|
int e;
|
|
|
|
} definition_tests[] = {
|
|
|
|
{ "alpha", "alpha=yes", 1 },
|
2019-05-16 12:50:18 +08:00
|
|
|
{ "alpha=no", "alpha", -1 },
|
2018-11-16 09:44:30 +08:00
|
|
|
{ "alpha=1", "alpha=1", 1 },
|
2019-05-16 12:50:18 +08:00
|
|
|
{ "alpha=2", "alpha=1",-1 },
|
|
|
|
{ "alpha", "omega", -1 },
|
|
|
|
{ "alpha", "?omega", 0 },
|
|
|
|
{ "alpha", "?omega=1", 0 },
|
|
|
|
{ "alpha", "?omega=no", 1 },
|
|
|
|
{ "alpha", "?omega=yes", 0 },
|
|
|
|
{ "alpha, omega", "?omega=yes", 1 },
|
|
|
|
{ "alpha, omega", "?omega=no", 0 }
|
2018-11-16 09:44:30 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
static int test_definition_compares(int n)
|
|
|
|
{
|
|
|
|
OSSL_METHOD_STORE *store;
|
|
|
|
OSSL_PROPERTY_LIST *d = NULL, *q = NULL;
|
|
|
|
int r;
|
|
|
|
|
2019-05-01 18:02:43 +08:00
|
|
|
r = TEST_ptr(store = ossl_method_store_new(NULL))
|
2018-11-16 09:44:30 +08:00
|
|
|
&& add_property_names("alpha", "omega", NULL)
|
2019-05-01 18:02:43 +08:00
|
|
|
&& TEST_ptr(d = ossl_parse_property(NULL, definition_tests[n].defn))
|
2021-03-13 08:34:49 +08:00
|
|
|
&& TEST_ptr(q = ossl_parse_query(NULL, definition_tests[n].query, 0))
|
2019-05-16 12:50:18 +08:00
|
|
|
&& TEST_int_eq(ossl_property_match_count(q, d), definition_tests[n].e);
|
2018-11-16 09:44:30 +08:00
|
|
|
|
|
|
|
ossl_property_free(d);
|
|
|
|
ossl_property_free(q);
|
|
|
|
ossl_method_store_free(store);
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int test_register_deregister(void)
|
|
|
|
{
|
|
|
|
static const struct {
|
|
|
|
int nid;
|
|
|
|
const char *prop;
|
|
|
|
char *impl;
|
|
|
|
} impls[] = {
|
|
|
|
{ 6, "position=1", "a" },
|
|
|
|
{ 6, "position=2", "b" },
|
|
|
|
{ 6, "position=3", "c" },
|
|
|
|
{ 6, "position=4", "d" },
|
|
|
|
};
|
|
|
|
size_t i;
|
|
|
|
int ret = 0;
|
|
|
|
OSSL_METHOD_STORE *store;
|
2021-10-04 21:33:37 +08:00
|
|
|
OSSL_PROVIDER prov = { 1 };
|
2018-11-16 09:44:30 +08:00
|
|
|
|
2019-05-01 18:02:43 +08:00
|
|
|
if (!TEST_ptr(store = ossl_method_store_new(NULL))
|
2018-11-16 09:44:30 +08:00
|
|
|
|| !add_property_names("position", NULL))
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
for (i = 0; i < OSSL_NELEM(impls); i++)
|
2021-10-04 21:33:37 +08:00
|
|
|
if (!TEST_true(ossl_method_store_add(store, &prov, impls[i].nid,
|
2019-08-21 16:08:44 +08:00
|
|
|
impls[i].prop, impls[i].impl,
|
2019-11-11 09:17:32 +08:00
|
|
|
&up_ref, &down_ref))) {
|
2018-11-16 09:44:30 +08:00
|
|
|
TEST_note("iteration %zd", i + 1);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Deregister in a different order to registration */
|
|
|
|
for (i = 0; i < OSSL_NELEM(impls); i++) {
|
|
|
|
const size_t j = (1 + i * 3) % OSSL_NELEM(impls);
|
|
|
|
int nid = impls[j].nid;
|
|
|
|
void *impl = impls[j].impl;
|
|
|
|
|
|
|
|
if (!TEST_true(ossl_method_store_remove(store, nid, impl))
|
|
|
|
|| !TEST_false(ossl_method_store_remove(store, nid, impl))) {
|
|
|
|
TEST_note("iteration %zd, position %zd", i + 1, j + 1);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (TEST_false(ossl_method_store_remove(store, impls[0].nid, impls[0].impl)))
|
|
|
|
ret = 1;
|
|
|
|
err:
|
|
|
|
ossl_method_store_free(store);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int test_property(void)
|
|
|
|
{
|
2021-10-04 21:33:37 +08:00
|
|
|
static OSSL_PROVIDER fake_provider1 = { 1 };
|
|
|
|
static OSSL_PROVIDER fake_provider2 = { 2 };
|
|
|
|
static const OSSL_PROVIDER *fake_prov1 = &fake_provider1;
|
|
|
|
static const OSSL_PROVIDER *fake_prov2 = &fake_provider2;
|
2018-11-16 09:44:30 +08:00
|
|
|
static const struct {
|
2021-10-04 21:33:37 +08:00
|
|
|
const OSSL_PROVIDER **prov;
|
2018-11-16 09:44:30 +08:00
|
|
|
int nid;
|
|
|
|
const char *prop;
|
|
|
|
char *impl;
|
|
|
|
} impls[] = {
|
2021-10-04 21:33:37 +08:00
|
|
|
{ &fake_prov1, 1, "fast=no, colour=green", "a" },
|
|
|
|
{ &fake_prov1, 1, "fast, colour=blue", "b" },
|
|
|
|
{ &fake_prov1, 1, "", "-" },
|
|
|
|
{ &fake_prov2, 9, "sky=blue, furry", "c" },
|
|
|
|
{ &fake_prov2, 3, NULL, "d" },
|
|
|
|
{ &fake_prov2, 6, "sky.colour=blue, sky=green, old.data", "e" },
|
2018-11-16 09:44:30 +08:00
|
|
|
};
|
|
|
|
static struct {
|
2021-10-04 21:33:37 +08:00
|
|
|
const OSSL_PROVIDER **prov;
|
2018-11-16 09:44:30 +08:00
|
|
|
int nid;
|
|
|
|
const char *prop;
|
|
|
|
char *expected;
|
|
|
|
} queries[] = {
|
2021-10-04 21:33:37 +08:00
|
|
|
{ &fake_prov1, 1, "fast", "b" },
|
|
|
|
{ &fake_prov1, 1, "fast=yes", "b" },
|
|
|
|
{ &fake_prov1, 1, "fast=no, colour=green", "a" },
|
|
|
|
{ &fake_prov1, 1, "colour=blue, fast", "b" },
|
|
|
|
{ &fake_prov1, 1, "colour=blue", "b" },
|
|
|
|
{ &fake_prov2, 9, "furry", "c" },
|
|
|
|
{ &fake_prov2, 6, "sky.colour=blue", "e" },
|
|
|
|
{ &fake_prov2, 6, "old.data", "e" },
|
|
|
|
{ &fake_prov2, 9, "furry=yes, sky=blue", "c" },
|
|
|
|
{ &fake_prov1, 1, "", "a" },
|
|
|
|
{ &fake_prov2, 3, "", "d" },
|
2018-11-16 09:44:30 +08:00
|
|
|
};
|
|
|
|
OSSL_METHOD_STORE *store;
|
|
|
|
size_t i;
|
|
|
|
int ret = 0;
|
|
|
|
void *result;
|
|
|
|
|
2019-05-01 18:02:43 +08:00
|
|
|
if (!TEST_ptr(store = ossl_method_store_new(NULL))
|
2018-11-16 09:44:30 +08:00
|
|
|
|| !add_property_names("fast", "colour", "sky", "furry", NULL))
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
for (i = 0; i < OSSL_NELEM(impls); i++)
|
2021-10-04 21:33:37 +08:00
|
|
|
if (!TEST_true(ossl_method_store_add(store, *impls[i].prov,
|
|
|
|
impls[i].nid, impls[i].prop,
|
|
|
|
impls[i].impl,
|
2019-11-11 09:17:32 +08:00
|
|
|
&up_ref, &down_ref))) {
|
2018-11-16 09:44:30 +08:00
|
|
|
TEST_note("iteration %zd", i + 1);
|
|
|
|
goto err;
|
|
|
|
}
|
2021-10-04 21:33:37 +08:00
|
|
|
/*
|
|
|
|
* The first check of queries is with NULL given as provider. All
|
|
|
|
* queries are expected to succeed.
|
|
|
|
*/
|
2018-11-16 09:44:30 +08:00
|
|
|
for (i = 0; i < OSSL_NELEM(queries); i++) {
|
2021-10-04 21:33:37 +08:00
|
|
|
const OSSL_PROVIDER *nullprov = NULL;
|
2018-11-16 09:44:30 +08:00
|
|
|
OSSL_PROPERTY_LIST *pq = NULL;
|
|
|
|
|
2021-10-04 21:33:37 +08:00
|
|
|
if (!TEST_true(ossl_method_store_fetch(store,
|
|
|
|
queries[i].nid, queries[i].prop,
|
|
|
|
&nullprov, &result))
|
2018-11-16 09:44:30 +08:00
|
|
|
|| !TEST_str_eq((char *)result, queries[i].expected)) {
|
|
|
|
TEST_note("iteration %zd", i + 1);
|
|
|
|
ossl_property_free(pq);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
ossl_property_free(pq);
|
|
|
|
}
|
2021-10-04 21:33:37 +08:00
|
|
|
/*
|
|
|
|
* The second check of queries is with &address1 given as provider.
|
|
|
|
*/
|
|
|
|
for (i = 0; i < OSSL_NELEM(queries); i++) {
|
|
|
|
OSSL_PROPERTY_LIST *pq = NULL;
|
|
|
|
|
|
|
|
result = NULL;
|
|
|
|
if (queries[i].prov == &fake_prov1) {
|
|
|
|
if (!TEST_true(ossl_method_store_fetch(store,
|
|
|
|
queries[i].nid,
|
|
|
|
queries[i].prop,
|
|
|
|
&fake_prov1, &result))
|
|
|
|
|| !TEST_ptr_eq(fake_prov1, &fake_provider1)
|
|
|
|
|| !TEST_str_eq((char *)result, queries[i].expected)) {
|
|
|
|
TEST_note("iteration %zd", i + 1);
|
|
|
|
ossl_property_free(pq);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if (!TEST_false(ossl_method_store_fetch(store,
|
|
|
|
queries[i].nid,
|
|
|
|
queries[i].prop,
|
|
|
|
&fake_prov1, &result))
|
|
|
|
|| !TEST_ptr_eq(fake_prov1, &fake_provider1)
|
|
|
|
|| !TEST_ptr_null(result)) {
|
|
|
|
TEST_note("iteration %zd", i + 1);
|
|
|
|
ossl_property_free(pq);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
ossl_property_free(pq);
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* The third check of queries is with &address2 given as provider.
|
|
|
|
*/
|
|
|
|
for (i = 0; i < OSSL_NELEM(queries); i++) {
|
|
|
|
OSSL_PROPERTY_LIST *pq = NULL;
|
|
|
|
|
|
|
|
result = NULL;
|
|
|
|
if (queries[i].prov == &fake_prov2) {
|
|
|
|
if (!TEST_true(ossl_method_store_fetch(store,
|
|
|
|
queries[i].nid,
|
|
|
|
queries[i].prop,
|
|
|
|
&fake_prov2, &result))
|
|
|
|
|| !TEST_ptr_eq(fake_prov2, &fake_provider2)
|
|
|
|
|| !TEST_str_eq((char *)result, queries[i].expected)) {
|
|
|
|
TEST_note("iteration %zd", i + 1);
|
|
|
|
ossl_property_free(pq);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if (!TEST_false(ossl_method_store_fetch(store,
|
|
|
|
queries[i].nid,
|
|
|
|
queries[i].prop,
|
|
|
|
&fake_prov2, &result))
|
|
|
|
|| !TEST_ptr_eq(fake_prov2, &fake_provider2)
|
|
|
|
|| !TEST_ptr_null(result)) {
|
|
|
|
TEST_note("iteration %zd", i + 1);
|
|
|
|
ossl_property_free(pq);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
ossl_property_free(pq);
|
|
|
|
}
|
2018-11-16 09:44:30 +08:00
|
|
|
ret = 1;
|
|
|
|
err:
|
|
|
|
ossl_method_store_free(store);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int test_query_cache_stochastic(void)
|
|
|
|
{
|
|
|
|
const int max = 10000, tail = 10;
|
|
|
|
OSSL_METHOD_STORE *store;
|
|
|
|
int i, res = 0;
|
|
|
|
char buf[50];
|
|
|
|
void *result;
|
|
|
|
int errors = 0;
|
|
|
|
int v[10001];
|
2021-10-04 21:33:37 +08:00
|
|
|
OSSL_PROVIDER prov = { 1 };
|
2018-11-16 09:44:30 +08:00
|
|
|
|
2019-05-01 18:02:43 +08:00
|
|
|
if (!TEST_ptr(store = ossl_method_store_new(NULL))
|
2018-11-16 09:44:30 +08:00
|
|
|
|| !add_property_names("n", NULL))
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
for (i = 1; i <= max; i++) {
|
|
|
|
v[i] = 2 * i;
|
|
|
|
BIO_snprintf(buf, sizeof(buf), "n=%d\n", i);
|
2021-10-04 21:33:37 +08:00
|
|
|
if (!TEST_true(ossl_method_store_add(store, &prov, i, buf, "abc",
|
2019-11-11 09:17:32 +08:00
|
|
|
&up_ref, &down_ref))
|
2021-10-04 21:33:37 +08:00
|
|
|
|| !TEST_true(ossl_method_store_cache_set(store, &prov, i,
|
|
|
|
buf, v + i,
|
2019-11-11 09:17:32 +08:00
|
|
|
&up_ref, &down_ref))
|
2021-10-04 21:33:37 +08:00
|
|
|
|| !TEST_true(ossl_method_store_cache_set(store, &prov, i,
|
|
|
|
"n=1234", "miss",
|
|
|
|
&up_ref, &down_ref))) {
|
2018-11-16 09:44:30 +08:00
|
|
|
TEST_note("iteration %d", i);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
for (i = 1; i <= max; i++) {
|
|
|
|
BIO_snprintf(buf, sizeof(buf), "n=%d\n", i);
|
2021-10-04 21:33:37 +08:00
|
|
|
if (!ossl_method_store_cache_get(store, NULL, i, buf, &result)
|
2018-11-16 09:44:30 +08:00
|
|
|
|| result != v + i)
|
|
|
|
errors++;
|
|
|
|
}
|
|
|
|
/* There is a tiny probability that this will fail when it shouldn't */
|
|
|
|
res = TEST_int_gt(errors, tail) && TEST_int_lt(errors, max - tail);
|
|
|
|
|
|
|
|
err:
|
|
|
|
ossl_method_store_free(store);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2020-05-02 12:17:54 +08:00
|
|
|
static int test_fips_mode(void)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
2020-10-15 17:55:50 +08:00
|
|
|
OSSL_LIB_CTX *ctx = NULL;
|
2020-05-02 12:17:54 +08:00
|
|
|
|
2020-10-15 17:55:50 +08:00
|
|
|
if (!TEST_ptr(ctx = OSSL_LIB_CTX_new()))
|
2020-05-02 12:17:54 +08:00
|
|
|
goto err;
|
|
|
|
|
|
|
|
ret = TEST_true(EVP_set_default_properties(ctx, "default=yes,fips=yes"))
|
|
|
|
&& TEST_true(EVP_default_properties_is_fips_enabled(ctx))
|
|
|
|
&& TEST_true(EVP_set_default_properties(ctx, "fips=no,default=yes"))
|
|
|
|
&& TEST_false(EVP_default_properties_is_fips_enabled(ctx))
|
|
|
|
&& TEST_true(EVP_set_default_properties(ctx, "fips=no"))
|
|
|
|
&& TEST_false(EVP_default_properties_is_fips_enabled(ctx))
|
|
|
|
&& TEST_true(EVP_set_default_properties(ctx, "fips!=no"))
|
|
|
|
&& TEST_true(EVP_default_properties_is_fips_enabled(ctx))
|
|
|
|
&& TEST_true(EVP_set_default_properties(ctx, "fips=no"))
|
|
|
|
&& TEST_false(EVP_default_properties_is_fips_enabled(ctx))
|
|
|
|
&& TEST_true(EVP_set_default_properties(ctx, "fips=no,default=yes"))
|
|
|
|
&& TEST_true(EVP_default_properties_enable_fips(ctx, 1))
|
|
|
|
&& TEST_true(EVP_default_properties_is_fips_enabled(ctx))
|
|
|
|
&& TEST_true(EVP_default_properties_enable_fips(ctx, 0))
|
|
|
|
&& TEST_false(EVP_default_properties_is_fips_enabled(ctx));
|
|
|
|
err:
|
2020-10-15 17:55:50 +08:00
|
|
|
OSSL_LIB_CTX_free(ctx);
|
2020-05-02 12:17:54 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2021-05-21 09:19:30 +08:00
|
|
|
static struct {
|
|
|
|
const char *in;
|
|
|
|
const char *out;
|
|
|
|
} to_string_tests[] = {
|
|
|
|
{ "fips=yes", "fips=yes" },
|
|
|
|
{ "fips!=yes", "fips!=yes" },
|
|
|
|
{ "fips = yes", "fips=yes" },
|
|
|
|
{ "fips", "fips=yes" },
|
|
|
|
{ "fips=no", "fips=no" },
|
|
|
|
{ "-fips", "-fips" },
|
|
|
|
{ "?fips=yes", "?fips=yes" },
|
|
|
|
{ "fips=yes,provider=fips", "fips=yes,provider=fips" },
|
|
|
|
{ "fips = yes , provider = fips", "fips=yes,provider=fips" },
|
|
|
|
{ "fips=yes,provider!=fips", "fips=yes,provider!=fips" },
|
|
|
|
{ "fips=yes,?provider=fips", "fips=yes,?provider=fips" },
|
|
|
|
{ "fips=yes,-provider", "fips=yes,-provider" },
|
|
|
|
/* foo is an unknown internal name */
|
|
|
|
{ "foo=yes,fips=yes", "fips=yes"},
|
|
|
|
{ "", "" },
|
|
|
|
{ "fips=3", "fips=3" },
|
|
|
|
{ "fips=-3", "fips=-3" },
|
2023-09-25 07:34:07 +08:00
|
|
|
{ "provider='foo bar'", "provider='foo bar'" },
|
|
|
|
{ "provider=\"foo bar'\"", "provider=\"foo bar'\"" },
|
|
|
|
{ "provider=abc***", "provider='abc***'" },
|
2021-05-21 09:19:30 +08:00
|
|
|
{ NULL, "" }
|
|
|
|
};
|
|
|
|
|
|
|
|
static int test_property_list_to_string(int i)
|
2021-05-08 00:13:05 +08:00
|
|
|
{
|
|
|
|
OSSL_PROPERTY_LIST *pl = NULL;
|
|
|
|
int ret = 0;
|
2021-05-21 09:19:30 +08:00
|
|
|
size_t bufsize;
|
2021-05-08 00:13:05 +08:00
|
|
|
char *buf = NULL;
|
|
|
|
|
2021-05-21 09:19:30 +08:00
|
|
|
if (to_string_tests[i].in != NULL
|
|
|
|
&& !TEST_ptr(pl = ossl_parse_query(NULL, to_string_tests[i].in, 1)))
|
|
|
|
goto err;
|
|
|
|
bufsize = ossl_property_list_to_string(NULL, pl, NULL, 0);
|
|
|
|
if (!TEST_size_t_gt(bufsize, 0))
|
|
|
|
goto err;
|
|
|
|
buf = OPENSSL_malloc(bufsize);
|
|
|
|
if (!TEST_ptr(buf)
|
|
|
|
|| !TEST_size_t_eq(ossl_property_list_to_string(NULL, pl, buf,
|
|
|
|
bufsize),
|
|
|
|
bufsize)
|
|
|
|
|| !TEST_str_eq(to_string_tests[i].out, buf)
|
|
|
|
|| !TEST_size_t_eq(bufsize, strlen(to_string_tests[i].out) + 1))
|
|
|
|
goto err;
|
2021-05-08 00:13:05 +08:00
|
|
|
|
|
|
|
ret = 1;
|
|
|
|
err:
|
|
|
|
OPENSSL_free(buf);
|
|
|
|
ossl_property_free(pl);
|
|
|
|
return ret;
|
|
|
|
}
|
2020-05-02 12:17:54 +08:00
|
|
|
|
2018-11-16 09:44:30 +08:00
|
|
|
int setup_tests(void)
|
|
|
|
{
|
|
|
|
ADD_TEST(test_property_string);
|
2021-03-13 08:34:49 +08:00
|
|
|
ADD_TEST(test_property_query_value_create);
|
2018-11-16 09:44:30 +08:00
|
|
|
ADD_ALL_TESTS(test_property_parse, OSSL_NELEM(parser_tests));
|
2021-09-30 09:35:32 +08:00
|
|
|
ADD_ALL_TESTS(test_property_parse_error, OSSL_NELEM(parse_error_tests));
|
2018-11-16 09:44:30 +08:00
|
|
|
ADD_ALL_TESTS(test_property_merge, OSSL_NELEM(merge_tests));
|
|
|
|
ADD_TEST(test_property_defn_cache);
|
|
|
|
ADD_ALL_TESTS(test_definition_compares, OSSL_NELEM(definition_tests));
|
|
|
|
ADD_TEST(test_register_deregister);
|
|
|
|
ADD_TEST(test_property);
|
|
|
|
ADD_TEST(test_query_cache_stochastic);
|
2020-05-02 12:17:54 +08:00
|
|
|
ADD_TEST(test_fips_mode);
|
2021-05-21 09:19:30 +08:00
|
|
|
ADD_ALL_TESTS(test_property_list_to_string, OSSL_NELEM(to_string_tests));
|
2018-11-16 09:44:30 +08:00
|
|
|
return 1;
|
|
|
|
}
|