mirror of
https://github.com/openssl/openssl.git
synced 2024-12-21 06:09:35 +08:00
6436030486
To be reverted once key generation checks are added everywhere and a way to disable them implemented. Fixes #15502 Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15560)
135 lines
4.8 KiB
Perl
135 lines
4.8 KiB
Perl
#! /usr/bin/env perl
|
|
# Copyright 2017-2021 The OpenSSL Project Authors. All Rights Reserved.
|
|
#
|
|
# Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
# this file except in compliance with the License. You can obtain a copy
|
|
# in the file LICENSE in the source distribution or at
|
|
# https://www.openssl.org/source/license.html
|
|
|
|
|
|
use strict;
|
|
use warnings;
|
|
|
|
use File::Spec;
|
|
use OpenSSL::Test qw/:DEFAULT srctop_file srctop_dir bldtop_dir bldtop_file/;
|
|
use OpenSSL::Test::Utils;
|
|
|
|
BEGIN {
|
|
setup("test_genrsa");
|
|
}
|
|
|
|
use lib srctop_dir('Configurations');
|
|
use lib bldtop_dir('.');
|
|
|
|
my $no_fips = disabled('fips') || ($ENV{NO_FIPS} // 0);
|
|
|
|
plan tests =>
|
|
($no_fips ? 0 : 3) # Extra FIPS related tests
|
|
+ 13;
|
|
|
|
# We want to know that an absurdly small number of bits isn't support
|
|
is(run(app([ 'openssl', 'genpkey', '-out', 'genrsatest.pem',
|
|
'-algorithm', 'RSA', '-pkeyopt', 'rsa_keygen_bits:8',
|
|
'-pkeyopt', 'rsa_keygen_pubexp:3'])),
|
|
0, "genpkey 8");
|
|
is(run(app([ 'openssl', 'genrsa', '-3', '-out', 'genrsatest.pem', '8'])),
|
|
0, "genrsa -3 8");
|
|
|
|
# Depending on the shared library, we might have different lower limits.
|
|
# Let's find it! This is a simple binary search
|
|
# ------------------------------------------------------------
|
|
# NOTE: $good may need an update in the future
|
|
# ------------------------------------------------------------
|
|
note "Looking for lowest amount of bits";
|
|
my $bad = 3; # Log2 of number of bits (2 << 3 == 8)
|
|
my $good = 11; # Log2 of number of bits (2 << 11 == 2048)
|
|
my $fin;
|
|
while ($good > $bad + 1) {
|
|
my $checked = int(($good + $bad + 1) / 2);
|
|
my $bits = 2 ** $checked;
|
|
$fin = run(app([ 'openssl', 'genpkey', '-out', 'genrsatest.pem',
|
|
'-algorithm', 'RSA', '-pkeyopt', 'rsa_keygen_pubexp:65537',
|
|
'-pkeyopt', "rsa_keygen_bits:$bits",
|
|
], stderr => undef));
|
|
if ($fin) {
|
|
note 2 ** $checked, " bits is good";
|
|
$good = $checked;
|
|
} else {
|
|
note 2 ** $checked, " bits is bad";
|
|
$bad = $checked;
|
|
}
|
|
}
|
|
$good++ if $good == $bad;
|
|
$good = 2 ** $good;
|
|
note "Found lowest allowed amount of bits to be $good";
|
|
|
|
ok(run(app([ 'openssl', 'genpkey', '-algorithm', 'RSA',
|
|
'-pkeyopt', 'rsa_keygen_pubexp:65537',
|
|
'-pkeyopt', "rsa_keygen_bits:$good",
|
|
'-out', 'genrsatest.pem' ])),
|
|
"genpkey $good");
|
|
ok(run(app([ 'openssl', 'pkey', '-check', '-in', 'genrsatest.pem', '-noout' ])),
|
|
"pkey -check");
|
|
|
|
ok(run(app([ 'openssl', 'genpkey', '-algorithm', 'RSA',
|
|
'-pkeyopt', 'rsa_keygen_bits:2048',
|
|
'-out', 'genrsatest2048.pem' ])),
|
|
"genpkey 2048 bits");
|
|
ok(run(app([ 'openssl', 'pkey', '-check', '-in', 'genrsatest2048.pem', '-noout' ])),
|
|
"pkey -check");
|
|
|
|
ok(!run(app([ 'openssl', 'genpkey', '-algorithm', 'RSA',
|
|
'-pkeyopt', 'hexe:02',
|
|
'-out', 'genrsatest.pem' ])),
|
|
"genpkey with a bad public exponent should fail");
|
|
ok(!run(app([ 'openssl', 'genpkey', '-algorithm', 'RSA',
|
|
'-pkeyopt', 'e:65538',
|
|
'-out', 'genrsatest.pem' ])),
|
|
"genpkey with a even public exponent should fail");
|
|
ok(!run(app([ 'openssl', 'genpkey', '-propquery', 'unknown',
|
|
'-algorithm', 'RSA' ])),
|
|
"genpkey requesting unknown=yes property should fail");
|
|
|
|
SKIP: {
|
|
skip "Skipping rsa command line test", 2 if disabled("deprecated-3.0");
|
|
|
|
ok(run(app([ 'openssl', 'genrsa', '-3', '-out', 'genrsatest.pem', $good ])),
|
|
"genrsa -3 $good");
|
|
ok(run(app([ 'openssl', 'rsa', '-check', '-in', 'genrsatest.pem', '-noout' ])),
|
|
"rsa -check");
|
|
}
|
|
|
|
ok(run(app([ 'openssl', 'genrsa', '-f4', '-out', 'genrsatest.pem', $good ])),
|
|
"genrsa -f4 $good");
|
|
ok(run(app([ 'openssl', 'rsa', '-check', '-in', 'genrsatest.pem', '-noout' ])),
|
|
"rsa -check");
|
|
|
|
unless ($no_fips) {
|
|
my $provconf = srctop_file("test", "fips-and-base.cnf");
|
|
my $provpath = bldtop_dir("providers");
|
|
my @prov = ( "-provider-path", $provpath,
|
|
"-config", $provconf);
|
|
|
|
$ENV{OPENSSL_TEST_LIBCTX} = "1";
|
|
ok(run(app(['openssl', 'genpkey',
|
|
@prov,
|
|
'-algorithm', 'RSA',
|
|
'-pkeyopt', 'bits:2080',
|
|
'-out', 'genrsatest2080.pem'])),
|
|
"Generating RSA key with > 2048 bits and < 3072 bits");
|
|
ok(run(app(['openssl', 'genpkey',
|
|
@prov,
|
|
'-algorithm', 'RSA',
|
|
'-pkeyopt', 'bits:3072',
|
|
'-out', 'genrsatest3072.pem'])),
|
|
"Generating RSA key with 3072 bits");
|
|
|
|
# We want to know that an absurdly large number of bits fails the RNG check
|
|
is(run(app([ 'openssl', 'genpkey',
|
|
@prov,
|
|
'-algorithm', 'RSA',
|
|
'-pkeyopt', 'bits:1000000000',
|
|
'-out', 'genrsatest.pem'])),
|
|
0, "genpkey 1000000000");
|
|
}
|