summaryrefslogtreecommitdiffstats
path: root/test/evp_extra_test.c
diff options
context:
space:
mode:
authorTomas Mraz <tomas@openssl.org>2021-08-25 13:50:40 +0200
committerTomas Mraz <tomas@openssl.org>2021-08-26 16:06:57 +0200
commit78539b250b05d0721da775bf4eddc096bde5ecaa (patch)
tree1a1bef066384c4829417dbb1d333324a664397f3 /test/evp_extra_test.c
parent62bae84d4587ec9a56d0ce830e36e4a5b2fa8a33 (diff)
EVP_DigestSign/VerifyFinal: Duplicate the pctx to allow multiple calls
The legacy implementation duplicates the pctx before creating/verifying the signature unless EVP_MD_CTX_FLAG_FINALISE is set. We have to do the same with provided implementations. Fixes #16321 Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16422)
Diffstat (limited to 'test/evp_extra_test.c')
-rw-r--r--test/evp_extra_test.c33
1 files changed, 25 insertions, 8 deletions
diff --git a/test/evp_extra_test.c b/test/evp_extra_test.c
index bc02cea95d..83f8902d24 100644
--- a/test/evp_extra_test.c
+++ b/test/evp_extra_test.c
@@ -1051,8 +1051,8 @@ static int test_EVP_DigestSignInit(int tst)
{
int ret = 0;
EVP_PKEY *pkey = NULL;
- unsigned char *sig = NULL;
- size_t sig_len = 0;
+ unsigned char *sig = NULL, *sig2 = NULL;
+ size_t sig_len = 0, sig2_len = 0;
EVP_MD_CTX *md_ctx = NULL, *md_ctx_verify = NULL;
EVP_MD_CTX *a_md_ctx = NULL, *a_md_ctx_verify = NULL;
BIO *mdbio = NULL, *membio = NULL;
@@ -1115,17 +1115,17 @@ static int test_EVP_DigestSignInit(int tst)
|| !TEST_true(EVP_DigestSignFinal(md_ctx, sig, &sig_len)))
goto out;
- if (tst >= 6) {
- if (!TEST_int_gt(BIO_reset(mdbio), 0)
- || !TEST_int_gt(BIO_get_md_ctx(mdbio, &md_ctx_verify), 0))
- goto out;
- }
-
/*
* Ensure that the signature round-trips (Verification isn't supported for
* HMAC via EVP_DigestVerify*)
*/
if (tst != 2 && tst != 5 && tst != 8) {
+ if (tst >= 6) {
+ if (!TEST_int_gt(BIO_reset(mdbio), 0)
+ || !TEST_int_gt(BIO_get_md_ctx(mdbio, &md_ctx_verify), 0))
+ goto out;
+ }
+
if (!TEST_true(EVP_DigestVerifyInit(md_ctx_verify, NULL, md,
NULL, pkey)))
goto out;
@@ -1140,6 +1140,22 @@ static int test_EVP_DigestSignInit(int tst)
}
if (!TEST_true(EVP_DigestVerifyFinal(md_ctx_verify, sig, sig_len)))
goto out;
+
+ /* Multiple calls to EVP_DigestVerifyFinal should work */
+ if (!TEST_true(EVP_DigestVerifyFinal(md_ctx_verify, sig, sig_len)))
+ goto out;
+ } else {
+ /*
+ * For HMAC a doubled call to DigestSignFinal should produce the same
+ * value as finalization should not happen.
+ */
+ if (!TEST_true(EVP_DigestSignFinal(md_ctx, NULL, &sig2_len))
+ || !TEST_ptr(sig2 = OPENSSL_malloc(sig2_len))
+ || !TEST_true(EVP_DigestSignFinal(md_ctx, sig2, &sig2_len)))
+ goto out;
+
+ if (!TEST_mem_eq(sig, sig_len, sig2, sig2_len))
+ goto out;
}
ret = 1;
@@ -1151,6 +1167,7 @@ static int test_EVP_DigestSignInit(int tst)
EVP_MD_CTX_free(a_md_ctx_verify);
EVP_PKEY_free(pkey);
OPENSSL_free(sig);
+ OPENSSL_free(sig2);
EVP_MD_free(mdexp);
return ret;