mirror of
https://github.com/openssl/openssl.git
synced 2024-12-09 05:51:54 +08:00
9b2ffec6a0
Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/10633)
129 lines
3.2 KiB
C
129 lines
3.2 KiB
C
/*
|
|
* Copyright 2007-2019 The OpenSSL Project Authors. All Rights Reserved.
|
|
* Copyright Nokia 2007-2019
|
|
* Copyright Siemens AG 2015-2019
|
|
*
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
#include "cmp_testlib.h"
|
|
#include <openssl/rsa.h> /* needed in case config no-deprecated */
|
|
|
|
EVP_PKEY *load_pem_key(const char *file)
|
|
{
|
|
EVP_PKEY *key = NULL;
|
|
BIO *bio = NULL;
|
|
|
|
if (!TEST_ptr(bio = BIO_new(BIO_s_file())))
|
|
return NULL;
|
|
if (TEST_int_gt(BIO_read_filename(bio, file), 0))
|
|
(void)TEST_ptr(key = PEM_read_bio_PrivateKey(bio, NULL, NULL, NULL));
|
|
|
|
BIO_free(bio);
|
|
return key;
|
|
}
|
|
|
|
X509 *load_pem_cert(const char *file)
|
|
{
|
|
X509 *cert = NULL;
|
|
BIO *bio = NULL;
|
|
|
|
if (!TEST_ptr(bio = BIO_new(BIO_s_file())))
|
|
return NULL;
|
|
if (TEST_int_gt(BIO_read_filename(bio, file), 0))
|
|
(void)TEST_ptr(cert = PEM_read_bio_X509(bio, NULL, NULL, NULL));
|
|
|
|
BIO_free(bio);
|
|
return cert;
|
|
}
|
|
|
|
OSSL_CMP_MSG *load_pkimsg(const char *file)
|
|
{
|
|
OSSL_CMP_MSG *msg;
|
|
|
|
(void)TEST_ptr((msg = ossl_cmp_msg_load(file)));
|
|
return msg;
|
|
}
|
|
|
|
X509_REQ *load_csr(const char *file)
|
|
{
|
|
X509_REQ *csr = NULL;
|
|
BIO *bio = NULL;
|
|
|
|
if (!TEST_ptr(file) || !TEST_ptr(bio = BIO_new_file(file, "rb")))
|
|
return NULL;
|
|
(void)TEST_ptr(csr = d2i_X509_REQ_bio(bio, NULL));
|
|
BIO_free(bio);
|
|
return csr;
|
|
}
|
|
|
|
EVP_PKEY *gen_rsa(void)
|
|
{
|
|
EVP_PKEY_CTX *ctx = NULL;
|
|
EVP_PKEY *pkey = NULL;
|
|
|
|
(void)(TEST_ptr(ctx = EVP_PKEY_CTX_new_id(EVP_PKEY_RSA, NULL))
|
|
&& TEST_int_gt(EVP_PKEY_keygen_init(ctx), 0)
|
|
&& TEST_int_gt(EVP_PKEY_CTX_set_rsa_keygen_bits(ctx, 2048), 0)
|
|
&& TEST_int_gt(EVP_PKEY_keygen(ctx, &pkey), 0));
|
|
EVP_PKEY_CTX_free(ctx);
|
|
return pkey;
|
|
}
|
|
|
|
/*
|
|
* Checks whether the syntax of msg conforms to ASN.1
|
|
*/
|
|
int valid_asn1_encoding(const OSSL_CMP_MSG *msg)
|
|
{
|
|
return msg != NULL ? i2d_OSSL_CMP_MSG(msg, NULL) > 0 : 0;
|
|
}
|
|
|
|
/*
|
|
* Compares two stacks of certificates in the order of their elements.
|
|
* Returns 0 if sk1 and sk2 are equal and another value otherwise
|
|
*/
|
|
int STACK_OF_X509_cmp(const STACK_OF(X509) *sk1, const STACK_OF(X509) *sk2)
|
|
{
|
|
int i, res;
|
|
X509 *a, *b;
|
|
|
|
if (sk1 == sk2)
|
|
return 0;
|
|
if (sk1 == NULL)
|
|
return -1;
|
|
if (sk2 == NULL)
|
|
return 1;
|
|
if ((res = sk_X509_num(sk1) - sk_X509_num(sk2)))
|
|
return res;
|
|
for (i = 0; i < sk_X509_num(sk1); i++) {
|
|
a = sk_X509_value(sk1, i);
|
|
b = sk_X509_value(sk2, i);
|
|
if (a != b)
|
|
if ((res = X509_cmp(a, b)) != 0)
|
|
return res;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* Up refs and push a cert onto sk.
|
|
* Returns the number of certificates on the stack on success
|
|
* Returns -1 or 0 on error
|
|
*/
|
|
int STACK_OF_X509_push1(STACK_OF(X509) *sk, X509 *cert)
|
|
{
|
|
int res;
|
|
|
|
if (sk == NULL || cert == NULL)
|
|
return -1;
|
|
if (!X509_up_ref(cert))
|
|
return -1;
|
|
res = sk_X509_push(sk, cert);
|
|
if (res <= 0)
|
|
X509_free(cert); /* down-ref */
|
|
return res;
|
|
}
|