mirror of
https://github.com/openssl/openssl.git
synced 2025-03-25 20:00:44 +08:00
Fix tests to check for negative results when calling EVP_PKEY_fromdata_init
Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16801)
This commit is contained in:
parent
09d91264c8
commit
884400d789
@ -165,7 +165,7 @@ static int ecdsa_create_pkey(EVP_PKEY **pkey, const char *curve_name,
|
||||
pub, pub_len) > 0)
|
||||
|| !TEST_ptr(params = OSSL_PARAM_BLD_to_param(bld))
|
||||
|| !TEST_ptr(ctx = EVP_PKEY_CTX_new_from_name(libctx, "EC", NULL))
|
||||
|| !TEST_true(EVP_PKEY_fromdata_init(ctx))
|
||||
|| !TEST_int_eq(EVP_PKEY_fromdata_init(ctx), 1)
|
||||
|| !TEST_int_eq(EVP_PKEY_fromdata(ctx, pkey, EVP_PKEY_PUBLIC_KEY,
|
||||
params), expected))
|
||||
goto err;
|
||||
@ -504,8 +504,9 @@ static int dsa_create_pkey(EVP_PKEY **pkey,
|
||||
}
|
||||
if (!TEST_ptr(params = OSSL_PARAM_BLD_to_param(bld))
|
||||
|| !TEST_ptr(ctx = EVP_PKEY_CTX_new_from_name(libctx, "DSA", NULL))
|
||||
|| !TEST_true(EVP_PKEY_fromdata_init(ctx))
|
||||
|| !TEST_true(EVP_PKEY_fromdata(ctx, pkey, EVP_PKEY_PUBLIC_KEY, params)))
|
||||
|| !TEST_int_eq(EVP_PKEY_fromdata_init(ctx), 1)
|
||||
|| !TEST_int_eq(EVP_PKEY_fromdata(ctx, pkey, EVP_PKEY_PUBLIC_KEY,
|
||||
params), 1))
|
||||
goto err;
|
||||
|
||||
ret = 1;
|
||||
@ -925,7 +926,7 @@ static int dh_create_pkey(EVP_PKEY **pkey, const char *group_name,
|
||||
|
||||
if (!TEST_ptr(params = OSSL_PARAM_BLD_to_param(bld))
|
||||
|| !TEST_ptr(ctx = EVP_PKEY_CTX_new_from_name(libctx, "DH", NULL))
|
||||
|| !TEST_true(EVP_PKEY_fromdata_init(ctx))
|
||||
|| !TEST_int_eq(EVP_PKEY_fromdata_init(ctx), 1)
|
||||
|| !TEST_int_eq(EVP_PKEY_fromdata(ctx, pkey, EVP_PKEY_KEYPAIR, params),
|
||||
pass))
|
||||
goto err;
|
||||
@ -1034,8 +1035,9 @@ static int rsa_create_pkey(EVP_PKEY **pkey,
|
||||
}
|
||||
if (!TEST_ptr(params = OSSL_PARAM_BLD_to_param(bld))
|
||||
|| !TEST_ptr(ctx = EVP_PKEY_CTX_new_from_name(libctx, "RSA", NULL))
|
||||
|| !TEST_true(EVP_PKEY_fromdata_init(ctx))
|
||||
|| !TEST_true(EVP_PKEY_fromdata(ctx, pkey, EVP_PKEY_KEYPAIR, params)))
|
||||
|| !TEST_int_eq(EVP_PKEY_fromdata_init(ctx), 1)
|
||||
|| !TEST_int_eq(EVP_PKEY_fromdata(ctx, pkey, EVP_PKEY_KEYPAIR, params),
|
||||
1))
|
||||
goto err;
|
||||
|
||||
ret = 1;
|
||||
|
@ -2919,11 +2919,11 @@ static int custom_params_test(int id)
|
||||
/* create two new provider-native `EVP_PKEY`s */
|
||||
EVP_PKEY_CTX_free(pctx2);
|
||||
if (!TEST_ptr(pctx2 = EVP_PKEY_CTX_new_from_name(NULL, "EC", NULL))
|
||||
|| !TEST_true(EVP_PKEY_fromdata_init(pctx2))
|
||||
|| !TEST_true(EVP_PKEY_fromdata(pctx2, &pkey1, EVP_PKEY_KEYPAIR,
|
||||
params1))
|
||||
|| !TEST_true(EVP_PKEY_fromdata(pctx2, &pkey2, EVP_PKEY_PUBLIC_KEY,
|
||||
params2)))
|
||||
|| !TEST_int_eq(EVP_PKEY_fromdata_init(pctx2), 1)
|
||||
|| !TEST_int_eq(EVP_PKEY_fromdata(pctx2, &pkey1, EVP_PKEY_KEYPAIR,
|
||||
params1), 1)
|
||||
|| !TEST_int_eq(EVP_PKEY_fromdata(pctx2, &pkey2, EVP_PKEY_PUBLIC_KEY,
|
||||
params2), 1))
|
||||
goto err;
|
||||
|
||||
/* compute keyexchange once more using the provider keys */
|
||||
|
@ -340,9 +340,9 @@ static int test_fromdata_rsa(void)
|
||||
if (!TEST_ptr(ctx = EVP_PKEY_CTX_new_from_name(NULL, "RSA", NULL)))
|
||||
goto err;
|
||||
|
||||
if (!TEST_true(EVP_PKEY_fromdata_init(ctx))
|
||||
|| !TEST_true(EVP_PKEY_fromdata(ctx, &pk, EVP_PKEY_KEYPAIR,
|
||||
fromdata_params)))
|
||||
if (!TEST_int_eq(EVP_PKEY_fromdata_init(ctx), 1)
|
||||
|| !TEST_int_eq(EVP_PKEY_fromdata(ctx, &pk, EVP_PKEY_KEYPAIR,
|
||||
fromdata_params), 1))
|
||||
goto err;
|
||||
|
||||
while (dup_pk == NULL) {
|
||||
@ -431,9 +431,9 @@ static int test_evp_pkey_get_bn_param_large(void)
|
||||
|| !TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_RSA_D, d))
|
||||
|| !TEST_ptr(fromdata_params = OSSL_PARAM_BLD_to_param(bld))
|
||||
|| !TEST_ptr(ctx = EVP_PKEY_CTX_new_from_name(NULL, "RSA", NULL))
|
||||
|| !TEST_true(EVP_PKEY_fromdata_init(ctx))
|
||||
|| !TEST_true(EVP_PKEY_fromdata(ctx, &pk, EVP_PKEY_KEYPAIR,
|
||||
fromdata_params))
|
||||
|| !TEST_int_eq(EVP_PKEY_fromdata_init(ctx), 1)
|
||||
|| !TEST_int_eq(EVP_PKEY_fromdata(ctx, &pk, EVP_PKEY_KEYPAIR,
|
||||
fromdata_params), 1)
|
||||
|| !TEST_ptr(key_ctx = EVP_PKEY_CTX_new_from_pkey(NULL, pk, ""))
|
||||
|| !TEST_true(EVP_PKEY_get_bn_param(pk, OSSL_PKEY_PARAM_RSA_N, &n_out))
|
||||
|| !TEST_BN_eq(n, n_out))
|
||||
@ -522,9 +522,9 @@ static int test_fromdata_dh_named_group(void)
|
||||
if (!TEST_ptr(ctx = EVP_PKEY_CTX_new_from_name(NULL, "DH", NULL)))
|
||||
goto err;
|
||||
|
||||
if (!TEST_true(EVP_PKEY_fromdata_init(ctx))
|
||||
|| !TEST_true(EVP_PKEY_fromdata(ctx, &pk, EVP_PKEY_KEYPAIR,
|
||||
fromdata_params)))
|
||||
if (!TEST_int_eq(EVP_PKEY_fromdata_init(ctx), 1)
|
||||
|| !TEST_int_eq(EVP_PKEY_fromdata(ctx, &pk, EVP_PKEY_KEYPAIR,
|
||||
fromdata_params), 1))
|
||||
goto err;
|
||||
|
||||
/*
|
||||
@ -734,9 +734,9 @@ static int test_fromdata_dh_fips186_4(void)
|
||||
if (!TEST_ptr(ctx = EVP_PKEY_CTX_new_from_name(NULL, "DH", NULL)))
|
||||
goto err;
|
||||
|
||||
if (!TEST_true(EVP_PKEY_fromdata_init(ctx))
|
||||
|| !TEST_true(EVP_PKEY_fromdata(ctx, &pk, EVP_PKEY_KEYPAIR,
|
||||
fromdata_params)))
|
||||
if (!TEST_int_eq(EVP_PKEY_fromdata_init(ctx), 1)
|
||||
|| !TEST_int_eq(EVP_PKEY_fromdata(ctx, &pk, EVP_PKEY_KEYPAIR,
|
||||
fromdata_params), 1))
|
||||
goto err;
|
||||
|
||||
while (dup_pk == NULL) {
|
||||
@ -1041,9 +1041,9 @@ static int test_fromdata_ecx(int tst)
|
||||
fromdata_params = params;
|
||||
}
|
||||
|
||||
if (!TEST_true(EVP_PKEY_fromdata_init(ctx))
|
||||
|| !TEST_true(EVP_PKEY_fromdata(ctx, &pk, EVP_PKEY_KEYPAIR,
|
||||
fromdata_params)))
|
||||
if (!TEST_int_eq(EVP_PKEY_fromdata_init(ctx), 1)
|
||||
|| !TEST_int_eq(EVP_PKEY_fromdata(ctx, &pk, EVP_PKEY_KEYPAIR,
|
||||
fromdata_params), 1))
|
||||
goto err;
|
||||
|
||||
while (dup_pk == NULL) {
|
||||
@ -1179,9 +1179,9 @@ static int test_fromdata_ec(void)
|
||||
if (!TEST_ptr(ctx))
|
||||
goto err;
|
||||
|
||||
if (!TEST_true(EVP_PKEY_fromdata_init(ctx))
|
||||
|| !TEST_true(EVP_PKEY_fromdata(ctx, &pk, EVP_PKEY_KEYPAIR,
|
||||
fromdata_params)))
|
||||
if (!TEST_int_eq(EVP_PKEY_fromdata_init(ctx), 1)
|
||||
|| !TEST_int_eq(EVP_PKEY_fromdata(ctx, &pk, EVP_PKEY_KEYPAIR,
|
||||
fromdata_params), 1))
|
||||
goto err;
|
||||
|
||||
while (dup_pk == NULL) {
|
||||
@ -1484,9 +1484,9 @@ static int test_fromdata_dsa_fips186_4(void)
|
||||
if (!TEST_ptr(ctx = EVP_PKEY_CTX_new_from_name(NULL, "DSA", NULL)))
|
||||
goto err;
|
||||
|
||||
if (!TEST_true(EVP_PKEY_fromdata_init(ctx))
|
||||
|| !TEST_true(EVP_PKEY_fromdata(ctx, &pk, EVP_PKEY_KEYPAIR,
|
||||
fromdata_params)))
|
||||
if (!TEST_int_eq(EVP_PKEY_fromdata_init(ctx), 1)
|
||||
|| !TEST_int_eq(EVP_PKEY_fromdata(ctx, &pk, EVP_PKEY_KEYPAIR,
|
||||
fromdata_params), 1))
|
||||
goto err;
|
||||
|
||||
while (dup_pk == NULL) {
|
||||
|
@ -9030,7 +9030,7 @@ static EVP_PKEY *get_tmp_dh_params(void)
|
||||
|
||||
pctx = EVP_PKEY_CTX_new_from_name(libctx, "DH", NULL);
|
||||
if (!TEST_ptr(pctx)
|
||||
|| !TEST_true(EVP_PKEY_fromdata_init(pctx)))
|
||||
|| !TEST_int_eq(EVP_PKEY_fromdata_init(pctx), 1))
|
||||
goto end;
|
||||
|
||||
tmpl = OSSL_PARAM_BLD_new();
|
||||
@ -9045,8 +9045,9 @@ static EVP_PKEY *get_tmp_dh_params(void)
|
||||
|
||||
params = OSSL_PARAM_BLD_to_param(tmpl);
|
||||
if (!TEST_ptr(params)
|
||||
|| !TEST_true(EVP_PKEY_fromdata(pctx, &dhpkey,
|
||||
EVP_PKEY_KEY_PARAMETERS, params)))
|
||||
|| !TEST_int_eq(EVP_PKEY_fromdata(pctx, &dhpkey,
|
||||
EVP_PKEY_KEY_PARAMETERS,
|
||||
params), 1))
|
||||
goto end;
|
||||
|
||||
tmp_dh_params = dhpkey;
|
||||
|
Loading…
x
Reference in New Issue
Block a user