mirror of
https://github.com/CloverHackyColor/CloverBootloader.git
synced 2024-12-02 13:03:28 +01:00
239 lines
5.9 KiB
C
239 lines
5.9 KiB
C
/*
|
|
* Copyright 2020-2021 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
#include <string.h>
|
|
#include <limits.h>
|
|
#include <openssl/store.h>
|
|
#include <openssl/ui.h>
|
|
#include "testutil.h"
|
|
|
|
#ifndef PATH_MAX
|
|
# if defined(_WIN32) && defined(_MAX_PATH)
|
|
# define PATH_MAX _MAX_PATH
|
|
# else
|
|
# define PATH_MAX 4096
|
|
# endif
|
|
#endif
|
|
|
|
typedef enum OPTION_choice {
|
|
OPT_ERR = -1,
|
|
OPT_EOF = 0,
|
|
OPT_INPUTDIR,
|
|
OPT_INFILE,
|
|
OPT_SM2FILE,
|
|
OPT_DATADIR,
|
|
OPT_TEST_ENUM
|
|
} OPTION_CHOICE;
|
|
|
|
static const char *inputdir = NULL;
|
|
static const char *infile = NULL;
|
|
static const char *sm2file = NULL;
|
|
static const char *datadir = NULL;
|
|
|
|
static int test_store_open(void)
|
|
{
|
|
int ret = 0;
|
|
OSSL_STORE_CTX *sctx = NULL;
|
|
OSSL_STORE_SEARCH *search = NULL;
|
|
UI_METHOD *ui_method = NULL;
|
|
char *input = test_mk_file_path(inputdir, infile);
|
|
|
|
ret = TEST_ptr(input)
|
|
&& TEST_ptr(search = OSSL_STORE_SEARCH_by_alias("nothing"))
|
|
&& TEST_ptr(ui_method= UI_create_method("DummyUI"))
|
|
&& TEST_ptr(sctx = OSSL_STORE_open_ex(input, NULL, NULL, ui_method,
|
|
NULL, NULL, NULL, NULL))
|
|
&& TEST_false(OSSL_STORE_find(sctx, NULL))
|
|
&& TEST_true(OSSL_STORE_find(sctx, search));
|
|
UI_destroy_method(ui_method);
|
|
OSSL_STORE_SEARCH_free(search);
|
|
OSSL_STORE_close(sctx);
|
|
OPENSSL_free(input);
|
|
return ret;
|
|
}
|
|
|
|
static int test_store_search_by_key_fingerprint_fail(void)
|
|
{
|
|
int ret;
|
|
OSSL_STORE_SEARCH *search = NULL;
|
|
|
|
ret = TEST_ptr_null(search = OSSL_STORE_SEARCH_by_key_fingerprint(
|
|
EVP_sha256(), NULL, 0));
|
|
OSSL_STORE_SEARCH_free(search);
|
|
return ret;
|
|
}
|
|
|
|
static int get_params(const char *uri, const char *type)
|
|
{
|
|
EVP_PKEY *pkey = NULL;
|
|
OSSL_STORE_CTX *ctx = NULL;
|
|
OSSL_STORE_INFO *info;
|
|
int ret = 0;
|
|
|
|
ctx = OSSL_STORE_open_ex(uri, NULL, NULL, NULL, NULL, NULL, NULL, NULL);
|
|
if (!TEST_ptr(ctx))
|
|
goto err;
|
|
|
|
while (!OSSL_STORE_eof(ctx)
|
|
&& (info = OSSL_STORE_load(ctx)) != NULL
|
|
&& pkey == NULL) {
|
|
if (OSSL_STORE_INFO_get_type(info) == OSSL_STORE_INFO_PARAMS) {
|
|
pkey = OSSL_STORE_INFO_get1_PARAMS(info);
|
|
}
|
|
OSSL_STORE_INFO_free(info);
|
|
info = NULL;
|
|
}
|
|
|
|
if (pkey != NULL)
|
|
ret = EVP_PKEY_is_a(pkey, type);
|
|
EVP_PKEY_free(pkey);
|
|
|
|
err:
|
|
OSSL_STORE_close(ctx);
|
|
return ret;
|
|
}
|
|
|
|
static int test_store_get_params(int idx)
|
|
{
|
|
const char *type;
|
|
const char *urifmt;
|
|
char uri[PATH_MAX];
|
|
|
|
switch(idx) {
|
|
#ifndef OPENSSL_NO_DH
|
|
case 0:
|
|
type = "DH";
|
|
break;
|
|
case 1:
|
|
type = "DHX";
|
|
break;
|
|
#else
|
|
case 0:
|
|
case 1:
|
|
return 1;
|
|
#endif
|
|
case 2:
|
|
#ifndef OPENSSL_NO_DSA
|
|
type = "DSA";
|
|
break;
|
|
#else
|
|
return 1;
|
|
#endif
|
|
default:
|
|
TEST_error("Invalid test index");
|
|
return 0;
|
|
}
|
|
|
|
urifmt = "%s/%s-params.pem";
|
|
#ifdef __VMS
|
|
{
|
|
char datadir_end = datadir[strlen(datadir) - 1];
|
|
|
|
if (datadir_end == ':' || datadir_end == ']' || datadir_end == '>')
|
|
urifmt = "%s%s-params.pem";
|
|
}
|
|
#endif
|
|
if (!TEST_true(BIO_snprintf(uri, sizeof(uri), urifmt, datadir, type)))
|
|
return 0;
|
|
|
|
TEST_info("Testing uri: %s", uri);
|
|
if (!TEST_true(get_params(uri, type)))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
/*
|
|
* This test verifies that calling OSSL_STORE_ATTACH does not set an
|
|
* "unregistered scheme" error when called.
|
|
*/
|
|
static int test_store_attach_unregistered_scheme(void)
|
|
{
|
|
int ret;
|
|
OSSL_STORE_CTX *store_ctx = NULL;
|
|
OSSL_PROVIDER *provider = NULL;
|
|
OSSL_LIB_CTX *libctx = NULL;
|
|
BIO *bio = NULL;
|
|
char *input = test_mk_file_path(inputdir, sm2file);
|
|
|
|
ret = TEST_ptr(input)
|
|
&& TEST_ptr(libctx = OSSL_LIB_CTX_new())
|
|
&& TEST_ptr(provider = OSSL_PROVIDER_load(libctx, "default"))
|
|
&& TEST_ptr(bio = BIO_new_file(input, "r"))
|
|
&& TEST_ptr(store_ctx = OSSL_STORE_attach(bio, "file", libctx, NULL,
|
|
NULL, NULL, NULL, NULL, NULL))
|
|
&& TEST_int_ne(ERR_GET_LIB(ERR_peek_error()), ERR_LIB_OSSL_STORE)
|
|
&& TEST_int_ne(ERR_GET_REASON(ERR_peek_error()),
|
|
OSSL_STORE_R_UNREGISTERED_SCHEME);
|
|
|
|
BIO_free(bio);
|
|
OSSL_STORE_close(store_ctx);
|
|
OSSL_PROVIDER_unload(provider);
|
|
OSSL_LIB_CTX_free(libctx);
|
|
OPENSSL_free(input);
|
|
return ret;
|
|
}
|
|
|
|
const OPTIONS *test_get_options(void)
|
|
{
|
|
static const OPTIONS test_options[] = {
|
|
OPT_TEST_OPTIONS_DEFAULT_USAGE,
|
|
{ "dir", OPT_INPUTDIR, '/' },
|
|
{ "in", OPT_INFILE, '<' },
|
|
{ "sm2", OPT_SM2FILE, '<' },
|
|
{ "data", OPT_DATADIR, 's' },
|
|
{ NULL }
|
|
};
|
|
return test_options;
|
|
}
|
|
|
|
int setup_tests(void)
|
|
{
|
|
OPTION_CHOICE o;
|
|
|
|
while ((o = opt_next()) != OPT_EOF) {
|
|
switch (o) {
|
|
case OPT_INPUTDIR:
|
|
inputdir = opt_arg();
|
|
break;
|
|
case OPT_INFILE:
|
|
infile = opt_arg();
|
|
break;
|
|
case OPT_SM2FILE:
|
|
sm2file = opt_arg();
|
|
break;
|
|
case OPT_DATADIR:
|
|
datadir = opt_arg();
|
|
break;
|
|
case OPT_TEST_CASES:
|
|
break;
|
|
default:
|
|
case OPT_ERR:
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
if (datadir == NULL) {
|
|
TEST_error("No data directory specified");
|
|
return 0;
|
|
}
|
|
if (inputdir == NULL) {
|
|
TEST_error("No input directory specified");
|
|
return 0;
|
|
}
|
|
|
|
if (infile != NULL)
|
|
ADD_TEST(test_store_open);
|
|
ADD_TEST(test_store_search_by_key_fingerprint_fail);
|
|
ADD_ALL_TESTS(test_store_get_params, 3);
|
|
if (sm2file != NULL)
|
|
ADD_TEST(test_store_attach_unregistered_scheme);
|
|
return 1;
|
|
}
|