aboutsummaryrefslogtreecommitdiff
path: root/test/recipes/30-test_evp.t
diff options
context:
space:
mode:
Diffstat (limited to 'test/recipes/30-test_evp.t')
-rw-r--r--test/recipes/30-test_evp.t194
1 files changed, 194 insertions, 0 deletions
diff --git a/test/recipes/30-test_evp.t b/test/recipes/30-test_evp.t
new file mode 100644
index 000000000000..af823515f9bd
--- /dev/null
+++ b/test/recipes/30-test_evp.t
@@ -0,0 +1,194 @@
+#! /usr/bin/env perl
+# Copyright 2015-2023 The OpenSSL Project Authors. All Rights Reserved.
+#
+# Licensed under the Apache License 2.0 (the "License"). You may not use
+# this file except in compliance with the License. You can obtain a copy
+# in the file LICENSE in the source distribution or at
+# https://www.openssl.org/source/license.html
+
+
+use strict;
+use warnings;
+
+use OpenSSL::Test qw(:DEFAULT data_file bldtop_dir srctop_file srctop_dir bldtop_file);
+use OpenSSL::Test::Utils;
+
+BEGIN {
+ setup("test_evp");
+}
+
+use lib srctop_dir('Configurations');
+use lib bldtop_dir('.');
+
+my $no_fips = disabled('fips') || ($ENV{NO_FIPS} // 0);
+my $no_legacy = disabled('legacy') || ($ENV{NO_LEGACY} // 0);
+my $no_des = disabled("des");
+my $no_dh = disabled("dh");
+my $no_dsa = disabled("dsa");
+my $no_ec = disabled("ec");
+my $no_sm2 = disabled("sm2");
+
+# Default config depends on if the legacy module is built or not
+my $defaultcnf = $no_legacy ? 'default.cnf' : 'default-and-legacy.cnf';
+
+my @configs = ( $defaultcnf );
+# Only add the FIPS config if the FIPS module has been built
+push @configs, 'fips-and-base.cnf' unless $no_fips;
+
+# A list of tests that run with both the default and fips provider.
+my @files = qw(
+ evpciph_aes_ccm_cavs.txt
+ evpciph_aes_common.txt
+ evpciph_aes_cts.txt
+ evpciph_aes_wrap.txt
+ evpciph_aes_stitched.txt
+ evpciph_des3_common.txt
+ evpkdf_hkdf.txt
+ evpkdf_pbkdf1.txt
+ evpkdf_pbkdf2.txt
+ evpkdf_ss.txt
+ evpkdf_ssh.txt
+ evpkdf_tls12_prf.txt
+ evpkdf_tls13_kdf.txt
+ evpkdf_x942.txt
+ evpkdf_x963.txt
+ evpmac_common.txt
+ evpmd_sha.txt
+ evppbe_pbkdf2.txt
+ evppkey_kdf_hkdf.txt
+ evppkey_rsa_common.txt
+ evprand.txt
+ );
+push @files, qw(
+ evppkey_ffdhe.txt
+ evppkey_dh.txt
+ ) unless $no_dh;
+push @files, qw(
+ evpkdf_x942_des.txt
+ evpmac_cmac_des.txt
+ ) unless $no_des;
+push @files, qw(evppkey_dsa.txt) unless $no_dsa;
+push @files, qw(evppkey_ecx.txt) unless $no_ec;
+push @files, qw(
+ evppkey_ecc.txt
+ evppkey_ecdh.txt
+ evppkey_ecdsa.txt
+ evppkey_kas.txt
+ evppkey_mismatch.txt
+ ) unless $no_ec;
+
+# A list of tests that only run with the default provider
+# (i.e. The algorithms are not present in the fips provider)
+my @defltfiles = qw(
+ evpciph_aes_ocb.txt
+ evpciph_aes_siv.txt
+ evpciph_aria.txt
+ evpciph_bf.txt
+ evpciph_camellia.txt
+ evpciph_camellia_cts.txt
+ evpciph_cast5.txt
+ evpciph_chacha.txt
+ evpciph_des.txt
+ evpciph_idea.txt
+ evpciph_rc2.txt
+ evpciph_rc4.txt
+ evpciph_rc4_stitched.txt
+ evpciph_rc5.txt
+ evpciph_seed.txt
+ evpciph_sm4.txt
+ evpencod.txt
+ evpkdf_krb5.txt
+ evpkdf_scrypt.txt
+ evpkdf_tls11_prf.txt
+ evpmac_blake.txt
+ evpmac_poly1305.txt
+ evpmac_siphash.txt
+ evpmac_sm3.txt
+ evpmd_blake.txt
+ evpmd_md.txt
+ evpmd_mdc2.txt
+ evpmd_ripemd.txt
+ evpmd_sm3.txt
+ evpmd_whirlpool.txt
+ evppbe_scrypt.txt
+ evppbe_pkcs12.txt
+ evppkey_kdf_scrypt.txt
+ evppkey_kdf_tls1_prf.txt
+ evppkey_rsa.txt
+ );
+push @defltfiles, qw(evppkey_brainpool.txt) unless $no_ec;
+push @defltfiles, qw(evppkey_sm2.txt) unless $no_sm2;
+
+plan tests =>
+ + (scalar(@configs) * scalar(@files))
+ + scalar(@defltfiles)
+ + 3; # error output tests
+
+foreach (@configs) {
+ my $conf = srctop_file("test", $_);
+
+ foreach my $f ( @files ) {
+ ok(run(test(["evp_test",
+ "-config", $conf,
+ data_file("$f")])),
+ "running evp_test -config $conf $f");
+ }
+}
+
+my $conf = srctop_file("test", $defaultcnf);
+foreach my $f ( @defltfiles ) {
+ ok(run(test(["evp_test",
+ "-config", $conf,
+ data_file("$f")])),
+ "running evp_test -config $conf $f");
+}
+
+# test_errors OPTIONS
+#
+# OPTIONS may include:
+#
+# key => "filename" # expected to be found in $SRCDIR/test/certs
+# out => "filename" # file to write error strings to
+# args => [ ... extra openssl pkey args ... ]
+# expected => regexps to match error lines against
+sub test_errors { # actually tests diagnostics of OSSL_STORE
+ my %opts = @_;
+ my $infile = srctop_file('test', 'certs', $opts{key});
+ my @args = ( qw(openssl pkey -in), $infile, @{$opts{args} // []} );
+ my $res = !run(app([@args], stderr => $opts{out}));
+ my $found = !exists $opts{expected};
+ open(my $in, '<', $opts{out}) or die "Could not open file $opts{out}";
+ while(my $errline = <$in>) {
+ print $errline; # this may help debugging
+
+ # output must not include ASN.1 parse errors
+ $res &&= $errline !~ m/asn1 encoding/;
+ # output must include what is expressed in $opts{$expected}
+ $found = 1
+ if exists $opts{expected} && $errline =~ m/$opts{expected}/;
+ }
+ close $in;
+ # $tmpfile is kept to help with investigation in case of failure
+ return $res && $found;
+}
+
+SKIP: {
+ skip "DSA not disabled or ERR disabled", 2
+ if !disabled("dsa") || disabled("err");
+
+ ok(test_errors(key => 'server-dsa-key.pem',
+ out => 'server-dsa-key.err'),
+ "expected error loading unsupported dsa private key");
+ ok(test_errors(key => 'server-dsa-pubkey.pem',
+ out => 'server-dsa-pubkey.err',
+ args => [ '-pubin' ],
+ expected => 'unsupported'),
+ "expected error loading unsupported dsa public key");
+}
+
+SKIP: {
+ skip "SM2 not disabled", 1 if !disabled("sm2");
+
+ ok(test_errors(key => 'sm2.key', out => 'sm2.err'),
+ "expected error loading unsupported sm2 private key");
+}