/* * Copyright 2023-2024 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include #include #include #include "testutil.h" typedef enum OPTION_choice { OPT_ERR = -1, OPT_EOF = 0, OPT_PROVIDER_NAME, OPT_CONFIG_FILE, OPT_PAIRWISETEST, OPT_DSAPARAM, OPT_TEST_ENUM } OPTION_CHOICE; struct self_test_arg { const char *type; }; static OSSL_LIB_CTX *libctx = NULL; static char *pairwise_name = NULL; static char *dsaparam_file = NULL; static struct self_test_arg self_test_args = { 0 }; const OPTIONS *test_get_options(void) { static const OPTIONS test_options[] = { OPT_TEST_OPTIONS_DEFAULT_USAGE, { "config", OPT_CONFIG_FILE, '<', "The configuration file to use for the libctx" }, { "pairwise", OPT_PAIRWISETEST, 's', "Test keygen pairwise test failures" }, { "dsaparam", OPT_DSAPARAM, 's', "DSA param file" }, { NULL } }; return test_options; } static int self_test_on_pairwise_fail(const OSSL_PARAM params[], void *arg) { struct self_test_arg *args = arg; const OSSL_PARAM *p = NULL; const char *type = NULL, *phase = NULL; p = OSSL_PARAM_locate_const(params, OSSL_PROV_PARAM_SELF_TEST_PHASE); if (p == NULL || p->data_type != OSSL_PARAM_UTF8_STRING) return 0; phase = (const char *)p->data; if (strcmp(phase, OSSL_SELF_TEST_PHASE_CORRUPT) == 0) { p = OSSL_PARAM_locate_const(params, OSSL_PROV_PARAM_SELF_TEST_TYPE); if (p == NULL || p->data_type != OSSL_PARAM_UTF8_STRING) return 0; type = (const char *)p->data; if (strcmp(type, args->type) == 0) return 0; } return 1; } static int setup_selftest_pairwise_failure(const char *type) { int ret = 0; OSSL_PROVIDER *prov = NULL; if (!TEST_ptr(prov = OSSL_PROVIDER_load(libctx, "fips"))) goto err; /* Setup a callback that corrupts the pairwise self tests and causes failures */ self_test_args.type = type; OSSL_SELF_TEST_set_callback(libctx, self_test_on_pairwise_fail, &self_test_args); ret = 1; err: OSSL_PROVIDER_unload(prov); return ret; } static int test_keygen_pairwise_failure(void) { BIO *bio = NULL; EVP_PKEY_CTX *ctx = NULL; EVP_PKEY *pParams = NULL; EVP_PKEY *pkey = NULL; const char *type = OSSL_SELF_TEST_TYPE_PCT; int ret = 0; if (strcmp(pairwise_name, "rsa") == 0) { if (!TEST_true(setup_selftest_pairwise_failure(type))) goto err; if (!TEST_ptr_null(pkey = EVP_PKEY_Q_keygen(libctx, NULL, "RSA", (size_t)2048))) goto err; } else if (strncmp(pairwise_name, "ec", 2) == 0) { if (strcmp(pairwise_name, "eckat") == 0) type = OSSL_SELF_TEST_TYPE_PCT_KAT; if (!TEST_true(setup_selftest_pairwise_failure(type))) goto err; if (!TEST_ptr_null(pkey = EVP_PKEY_Q_keygen(libctx, NULL, "EC", "P-256"))) goto err; } else if (strncmp(pairwise_name, "dsa", 3) == 0) { if (strcmp(pairwise_name, "dsakat") == 0) type = OSSL_SELF_TEST_TYPE_PCT_KAT; if (!TEST_true(setup_selftest_pairwise_failure(type))) goto err; if (!TEST_ptr(bio = BIO_new_file(dsaparam_file, "r"))) goto err; if (!TEST_ptr(pParams = PEM_read_bio_Parameters_ex(bio, NULL, libctx, NULL))) goto err; if (!TEST_ptr(ctx = EVP_PKEY_CTX_new_from_pkey(libctx, pParams, NULL))) goto err; if (!TEST_int_eq(EVP_PKEY_keygen_init(ctx), 1)) goto err; if (!TEST_int_le(EVP_PKEY_keygen(ctx, &pkey), 0)) goto err; if (!TEST_ptr_null(pkey)) goto err; } else if (strncmp(pairwise_name, "eddsa", 5) == 0) { if (!TEST_true(setup_selftest_pairwise_failure(type))) goto err; if (!TEST_ptr(ctx = EVP_PKEY_CTX_new_from_name(libctx, "ED25519", NULL))) goto err; if (!TEST_int_eq(EVP_PKEY_keygen_init(ctx), 1)) goto err; if (!TEST_int_le(EVP_PKEY_keygen(ctx, &pkey), 0)) goto err; if (!TEST_ptr_null(pkey)) goto err; } ret = 1; err: EVP_PKEY_free(pkey); EVP_PKEY_CTX_free(ctx); BIO_free(bio); EVP_PKEY_free(pParams); return ret; } int setup_tests(void) { OPTION_CHOICE o; char *config_file = NULL; while ((o = opt_next()) != OPT_EOF) { switch (o) { case OPT_CONFIG_FILE: config_file = opt_arg(); break; case OPT_PAIRWISETEST: pairwise_name = opt_arg(); break; case OPT_DSAPARAM: dsaparam_file = opt_arg(); break; case OPT_TEST_CASES: break; default: case OPT_ERR: return 0; } } libctx = OSSL_LIB_CTX_new(); if (libctx == NULL) return 0; if (!OSSL_LIB_CTX_load_config(libctx, config_file)) { opt_printf_stderr("Failed to load config\n"); return 0; } ADD_TEST(test_keygen_pairwise_failure); return 1; } void cleanup_tests(void) { OSSL_LIB_CTX_free(libctx); }