openssl/test/recipes/91-test_pkey_check.t
Richard Levitte b646179229 Copyright year updates
Reviewed-by: Neil Horman <nhorman@openssl.org>
Release: yes
(cherry picked from commit 0ce7d1f355)

Reviewed-by: Hugo Landau <hlandau@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/24034)
2024-04-09 13:43:26 +02:00

107 lines
2.7 KiB
Perl

#! /usr/bin/env perl
# Copyright 2017-2024 The OpenSSL Project Authors. All Rights Reserved.
#
# Licensed under the Apache License 2.0 (the "License"). You may not use
# this file except in compliance with the License. You can obtain a copy
# in the file LICENSE in the source distribution or at
# https://www.openssl.org/source/license.html
use strict;
use warnings;
use File::Spec;
use OpenSSL::Test qw/:DEFAULT data_file with/;
use OpenSSL::Test::Utils;
sub pkey_check {
my $f = shift;
my $pubcheck = shift;
my @checkopt = ('-check');
@checkopt = ('-pubcheck', '-pubin') if $pubcheck;
return run(app(['openssl', 'pkey', @checkopt, '-text',
'-in', $f]));
}
sub check_key {
my $f = shift;
my $should_fail = shift;
my $pubcheck = shift;
my $str;
$str = "$f should fail validation" if $should_fail;
$str = "$f should pass validation" unless $should_fail;
$f = data_file($f);
if ( -s $f ) {
with({ exit_checker => sub { return shift == $should_fail; } },
sub {
ok(pkey_check($f, $pubcheck), $str);
});
} else {
fail("Missing file $f");
}
}
setup("test_pkey_check");
my @negative_tests = ();
push(@negative_tests, (
# For EC keys the range for the secret scalar `k` is `1 <= k <= n-1`
"ec_p256_bad_0.pem", # `k` set to `n` (equivalent to `0 mod n`, invalid)
"ec_p256_bad_1.pem", # `k` set to `n+1` (equivalent to `1 mod n`, invalid)
)) unless disabled("ec");
push(@negative_tests, (
# For SM2 keys the range for the secret scalar `k` is `1 <= k < n-1`
"sm2_bad_neg1.pem", # `k` set to `n-1` (invalid, because SM2 range)
"sm2_bad_0.pem", # `k` set to `n` (equivalent to `0 mod n`, invalid)
"sm2_bad_1.pem", # `k` set to `n+1` (equivalent to `1 mod n`, invalid)
)) unless disabled("sm2");
my @positive_tests = ();
push(@positive_tests, (
"dhpkey.pem"
)) unless disabled("dh");
my @negative_pubtests = ("rsapub_17k.pem"); # Too big RSA public key
push(@negative_pubtests, (
"dsapub_noparam.der"
)) unless disabled("dsa");
my @positive_pubtests = ();
push(@positive_pubtests, (
"dsapub.pem"
)) unless disabled("dsa");
plan skip_all => "No tests within the current enabled feature set"
unless @negative_tests && @positive_tests
&& @negative_pubtests && @positive_pubtests;
plan tests => scalar(@negative_tests) + scalar(@positive_tests)
+ scalar(@negative_pubtests) + scalar(@positive_pubtests);
foreach my $t (@negative_tests) {
check_key($t, 1, 0);
}
foreach my $t (@positive_tests) {
check_key($t, 0, 0);
}
foreach my $t (@negative_pubtests) {
check_key($t, 1, 1);
}
foreach my $t (@positive_pubtests) {
check_key($t, 0, 1);
}