summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMatt Caswell <matt@openssl.org>2019-03-18 14:36:41 +0000
committerMatt Caswell <matt@openssl.org>2019-03-21 09:23:38 +0000
commit847d0f81bb6f38662aa9d3d448282eda30ed5193 (patch)
tree86d8c3ae1169b13ac16f005a9364344dbfcff8dc
parentde29ff17a207347f77c0d1df8ea79f16efd82f93 (diff)
Add a test for EVP_MD_fetch
Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged from https://github.com/openssl/openssl/pull/8513)
-rw-r--r--test/evp_extra_test.c102
1 files changed, 102 insertions, 0 deletions
diff --git a/test/evp_extra_test.c b/test/evp_extra_test.c
index eac0c43ba1..f68b013844 100644
--- a/test/evp_extra_test.c
+++ b/test/evp_extra_test.c
@@ -18,6 +18,7 @@
#include <openssl/x509.h>
#include <openssl/pem.h>
#include <openssl/kdf.h>
+#include <openssl/provider.h>
#include "testutil.h"
#include "internal/nelem.h"
#include "internal/evp_int.h"
@@ -1009,6 +1010,106 @@ done:
}
#endif
+
+static int calculate_digest(const EVP_MD *md, const char *msg, size_t len,
+ const unsigned char *exptd)
+{
+ unsigned char out[SHA256_DIGEST_LENGTH];
+ EVP_MD_CTX *ctx;
+ int ret = 0;
+
+ if (!TEST_ptr(ctx = EVP_MD_CTX_new())
+ || !TEST_true(EVP_DigestInit_ex(ctx, md, NULL))
+ || !TEST_true(EVP_DigestUpdate(ctx, msg, len))
+ || !TEST_true(EVP_DigestFinal_ex(ctx, out, NULL))
+ || !TEST_mem_eq(out, SHA256_DIGEST_LENGTH, exptd,
+ SHA256_DIGEST_LENGTH))
+ goto err;
+
+ ret = 1;
+ err:
+ EVP_MD_CTX_free(ctx);
+ return ret;
+}
+/*
+ * Test EVP_MD_fetch()
+ *
+ * Test 0: Test with the default OPENSSL_CTX
+ * Test 1: Test with an explicit OPENSSL_CTX
+ * Test 2: Explicit OPENSSL_CTX with explicit load of default provider
+ */
+static int test_EVP_MD_fetch(int tst)
+{
+ OPENSSL_CTX *ctx = NULL;
+ EVP_MD *md = NULL;
+ OSSL_PROVIDER *prov = NULL;
+ int ret = 0;
+ const char testmsg[] = "Hello world";
+ const unsigned char exptd[] = {
+ 0x27, 0x51, 0x8b, 0xa9, 0x68, 0x30, 0x11, 0xf6, 0xb3, 0x96, 0x07, 0x2c,
+ 0x05, 0xf6, 0x65, 0x6d, 0x04, 0xf5, 0xfb, 0xc3, 0x78, 0x7c, 0xf9, 0x24,
+ 0x90, 0xec, 0x60, 0x6e, 0x50, 0x92, 0xe3, 0x26
+ };
+
+ if (tst > 0) {
+ ctx = OPENSSL_CTX_new();
+ if (!TEST_ptr(ctx))
+ goto err;
+
+ if (tst == 2) {
+ prov = OSSL_PROVIDER_load(ctx, "default");
+ if (!TEST_ptr(prov))
+ goto err;
+ }
+ }
+
+ /* Implicit fetching of the MD should produce the expected result */
+ if (!TEST_true(calculate_digest(EVP_sha256(), testmsg, sizeof(testmsg),
+ exptd)))
+ goto err;
+ /*
+ * Test that without loading any providers or specifying any properties we
+ * can get a sha256 md from the default provider.
+ */
+ if (!TEST_ptr(md = EVP_MD_fetch(ctx, "SHA256", NULL))
+ || !TEST_ptr(md)
+ || !TEST_int_eq(EVP_MD_nid(md), NID_sha256)
+ || !TEST_true(calculate_digest(md, testmsg, sizeof(testmsg), exptd)))
+ goto err;
+
+ /* Also test EVP_MD_upref() while we're doing this */
+ if (!TEST_true(EVP_MD_upref(md)))
+ goto err;
+ /* Ref count should now be 2. Release both */
+ EVP_MD_meth_free(md);
+ EVP_MD_meth_free(md);
+ md = NULL;
+
+ /*
+ * We've only loaded the default provider so explicitly asking for a
+ * non-default implementation should fail.
+ */
+ if (!TEST_ptr_null(md = EVP_MD_fetch(ctx, "SHA256", "default=no")))
+ goto err;
+
+ /* Explicitly asking for the default implementation should succeeed */
+ if (!TEST_ptr(md = EVP_MD_fetch(ctx, "SHA256", "default=yes"))
+ || !TEST_int_eq(EVP_MD_nid(md), NID_sha256)
+ || !TEST_true(calculate_digest(md, testmsg, sizeof(testmsg), exptd)))
+ goto err;
+
+ EVP_MD_meth_free(md);
+ md = NULL;
+
+ ret = 1;
+
+ err:
+ EVP_MD_meth_free(md);
+ OSSL_PROVIDER_unload(prov);
+ OPENSSL_CTX_free(ctx);
+ return ret;
+}
+
int setup_tests(void)
{
ADD_TEST(test_EVP_DigestSignInit);
@@ -1036,5 +1137,6 @@ int setup_tests(void)
#ifndef OPENSSL_NO_EC
ADD_TEST(test_X509_PUBKEY_inplace);
#endif
+ ADD_ALL_TESTS(test_EVP_MD_fetch, 3);
return 1;
}