summaryrefslogtreecommitdiffstats
path: root/test
diff options
context:
space:
mode:
Diffstat (limited to 'test')
-rw-r--r--test/asn1_time_test.c4
-rw-r--r--test/bad_dtls_test.c2
-rw-r--r--test/build.info13
-rw-r--r--test/ca_internals_test.c2
-rw-r--r--test/certs/acert.pem5
-rw-r--r--test/certs/acert_bc1.pem46
-rw-r--r--test/certs/acert_bc2.pem17
-rw-r--r--test/certs/acert_ietf.pem15
-rw-r--r--test/ciphername_test.c2
-rw-r--r--test/clienthellotest.c2
-rw-r--r--test/cmp_hdr_test.c49
-rw-r--r--test/context_internal_test.c28
-rw-r--r--test/ct_test.c9
-rw-r--r--test/drbgtest.c6
-rw-r--r--test/ec_internal_test.c64
-rw-r--r--test/ecstresstest.c2
-rw-r--r--test/evp_libctx_test.c12
-rw-r--r--test/evp_test.c288
-rw-r--r--test/evp_xof_test.c25
-rw-r--r--test/helpers/ssltestlib.c33
-rw-r--r--test/helpers/ssltestlib.h4
-rw-r--r--test/lhash_test.c468
-rw-r--r--test/prov_config_test.c12
-rw-r--r--test/quic_multistream_test.c13
-rw-r--r--test/quicapitest.c10
-rw-r--r--test/recipes/10-test_bn_data/bngcd.txt151
-rw-r--r--test/recipes/15-test_dsaparam_data/invalid/p10240_q256_too_big.pem57
-rw-r--r--test/recipes/20-test_dgst.t8
-rw-r--r--test/recipes/30-test_evp_data/evppkey_ecc.txt14
-rw-r--r--test/recipes/30-test_evp_data/evppkey_rsa_common.txt55
-rw-r--r--test/recipes/60-test_x509_acert.t24
-rw-r--r--test/recipes/70-test_renegotiation.t101
-rw-r--r--test/recipes/70-test_sslextension.t1
-rw-r--r--test/recipes/70-test_sslmessages.t2
-rw-r--r--test/recipes/70-test_tls13certcomp.t3
-rw-r--r--test/recipes/70-test_tls13kexmodes.t6
-rw-r--r--test/recipes/70-test_tls13messages.t6
-rw-r--r--test/recipes/80-test_cmp_http_data/Mock/newcrl.pem12
-rw-r--r--test/recipes/80-test_cmp_http_data/Mock/oldcrl.pem12
-rw-r--r--test/recipes/80-test_cmp_http_data/Mock/server.cnf1
-rw-r--r--test/recipes/80-test_cmp_http_data/test_commands.csv12
-rw-r--r--test/recipes/80-test_cms.t7
-rw-r--r--test/recipes/82-test_ocsp_cert_chain.t12
-rw-r--r--test/recipes/90-test_sslapi.t33
-rw-r--r--test/recipes/90-test_sysdefault.t14
-rw-r--r--test/recipes/90-test_sysdefault_data/sysdefault-bad.cnf (renamed from test/sysdefault.cnf)0
-rw-r--r--test/recipes/90-test_sysdefault_data/sysdefault-ignore.cnf23
-rw-r--r--test/recipes/90-test_sysdefault_data/sysdefault.cnf23
-rwxr-xr-xtest/recipes/95-test_external_oqsprovider_data/oqsprovider.sh6
-rw-r--r--test/recipes/99-test_fuzz_acert.t22
-rw-r--r--test/recipes/99-test_fuzz_hashtable.t22
-rw-r--r--test/recipes/99-test_fuzz_provider.t22
-rw-r--r--test/ssl_old_test.c2
-rw-r--r--test/sslapitest.c316
-rw-r--r--test/sslbuffertest.c174
-rw-r--r--test/sysdefaulttest.c64
-rw-r--r--test/testutil.h2
-rw-r--r--test/testutil/helper.c90
-rw-r--r--test/threadpool_test.c78
-rw-r--r--test/threadstest.c45
-rw-r--r--test/tls-provider.c22
-rw-r--r--test/tls13secretstest.c7
-rw-r--r--test/v3ext.c15
-rw-r--r--test/x509_acert_test.c174
64 files changed, 2456 insertions, 313 deletions
diff --git a/test/asn1_time_test.c b/test/asn1_time_test.c
index 7736fd3416..32bc4ff2ad 100644
--- a/test/asn1_time_test.c
+++ b/test/asn1_time_test.c
@@ -434,10 +434,10 @@ static int convert_asn1_to_time_t(int idx)
{
time_t testdateutc;
- testdateutc = ossl_asn1_string_to_time_t(asn1_to_utc[idx].input);
+ testdateutc = test_asn1_string_to_time_t(asn1_to_utc[idx].input);
if (!TEST_time_t_eq(testdateutc, asn1_to_utc[idx].expected)) {
- TEST_info("ossl_asn1_string_to_time_t (%s) failed: expected %lli, got %lli\n",
+ TEST_info("test_asn1_string_to_time_t (%s) failed: expected %lli, got %lli\n",
asn1_to_utc[idx].input,
(long long int)asn1_to_utc[idx].expected,
(long long int)testdateutc);
diff --git a/test/bad_dtls_test.c b/test/bad_dtls_test.c
index 608377c858..611bd4a6c4 100644
--- a/test/bad_dtls_test.c
+++ b/test/bad_dtls_test.c
@@ -508,7 +508,6 @@ static int test_bad_dtls(void)
if (!TEST_ptr(con)
|| !TEST_true(SSL_set_session(con, sess)))
goto end;
- SSL_SESSION_free(sess);
rbio = BIO_new(BIO_s_mem());
wbio = BIO_new(BIO_s_mem());
@@ -596,6 +595,7 @@ static int test_bad_dtls(void)
testresult = 1;
end:
+ SSL_SESSION_free(sess);
BIO_free(rbio);
BIO_free(wbio);
SSL_free(con);
diff --git a/test/build.info b/test/build.info
index 52bc392f12..e2b09ae965 100644
--- a/test/build.info
+++ b/test/build.info
@@ -26,7 +26,7 @@ IF[{- !$disabled{tests} -}]
testutil/format_output.c testutil/load.c testutil/fake_random.c \
testutil/test_cleanup.c testutil/main.c testutil/testutil_init.c \
testutil/options.c testutil/test_options.c testutil/provider.c \
- testutil/apps_shims.c testutil/random.c $LIBAPPSSRC
+ testutil/apps_shims.c testutil/random.c testutil/helper.c $LIBAPPSSRC
INCLUDE[libtestutil.a]=../include ../apps/include ..
DEPEND[libtestutil.a]=../libcrypto
@@ -63,7 +63,8 @@ IF[{- !$disabled{tests} -}]
provfetchtest prov_config_test rand_test \
ca_internals_test bio_tfo_test membio_test bio_dgram_test list_test \
fips_version_test x509_test hpke_test pairwise_fail_test \
- nodefltctxtest evp_xof_test x509_load_cert_file_test bio_meth_test
+ nodefltctxtest evp_xof_test x509_load_cert_file_test bio_meth_test \
+ x509_acert_test
IF[{- !$disabled{'rpk'} -}]
PROGRAMS{noinst}=rpktest
@@ -418,7 +419,7 @@ IF[{- !$disabled{tests} -}]
SOURCE[lhash_test]=lhash_test.c
INCLUDE[lhash_test]=../include ../apps/include
- DEPEND[lhash_test]=../libcrypto libtestutil.a
+ DEPEND[lhash_test]=../libcrypto.a libtestutil.a
SOURCE[dtlsv1listentest]=dtlsv1listentest.c
INCLUDE[dtlsv1listentest]=../include ../apps/include
@@ -531,7 +532,7 @@ IF[{- !$disabled{tests} -}]
SOURCE[sslapitest]=sslapitest.c helpers/ssltestlib.c filterprov.c tls-provider.c
INCLUDE[sslapitest]=../include ../apps/include ..
- DEPEND[sslapitest]=../libcrypto ../libssl libtestutil.a
+ DEPEND[sslapitest]=../libcrypto.a ../libssl.a libtestutil.a
SOURCE[ssl_handshake_rtt_test]=ssl_handshake_rtt_test.c helpers/ssltestlib.c
INCLUDE[ssl_handshake_rtt_test]=../include ../apps/include ..
@@ -1206,6 +1207,10 @@ ENDIF
INCLUDE[cert_comp_test]=../include ../apps/include ..
DEPEND[cert_comp_test]=../libcrypto ../libssl libtestutil.a
+ SOURCE[x509_acert_test]=x509_acert_test.c
+ INCLUDE[x509_acert_test]=../include ../apps/include
+ DEPEND[x509_acert_test]=../libcrypto libtestutil.a
+
{-
use File::Spec::Functions;
use File::Basename;
diff --git a/test/ca_internals_test.c b/test/ca_internals_test.c
index 24f7ba3884..776996b4ac 100644
--- a/test/ca_internals_test.c
+++ b/test/ca_internals_test.c
@@ -47,7 +47,7 @@ static int test_do_updatedb(void)
}
testdate = test_get_argument(2);
- testdateutc = ossl_asn1_string_to_time_t(testdate);
+ testdateutc = test_asn1_string_to_time_t(testdate);
if (TEST_time_t_lt(testdateutc, 0)) {
return 0;
}
diff --git a/test/certs/acert.pem b/test/certs/acert.pem
new file mode 100644
index 0000000000..efd2a05dc6
--- /dev/null
+++ b/test/certs/acert.pem
@@ -0,0 +1,5 @@
+Generated with paccor (https://github.com/nsacyber/paccor)
+
+-----BEGIN ATTRIBUTE CERTIFICATE-----
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
+-----END ATTRIBUTE CERTIFICATE-----
diff --git a/test/certs/acert_bc1.pem b/test/certs/acert_bc1.pem
new file mode 100644
index 0000000000..78e25d65f0
--- /dev/null
+++ b/test/certs/acert_bc1.pem
@@ -0,0 +1,46 @@
+Extracted from bouncycastle test case
+Source: pkix/src/test/j2me/org/bouncycastle/cert/test/AttrCertTest.java
+Copyright (c) 2000-2023 The Legion of the Bouncy Castle Inc. (https://www.bouncycastle.org)
+SPDX-License-Identifier: MIT
+
+-----BEGIN ATTRIBUTE CERTIFICATE-----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+-----END ATTRIBUTE CERTIFICATE-----
diff --git a/test/certs/acert_bc2.pem b/test/certs/acert_bc2.pem
new file mode 100644
index 0000000000..4276949f14
--- /dev/null
+++ b/test/certs/acert_bc2.pem
@@ -0,0 +1,17 @@
+Extracted from bouncycastle test case
+Source: pkix/src/test/java/org/bouncycastle/cert/test/PEMData.java
+Copyright (c) 2000-2023 The Legion of the Bouncy Castle Inc. (https://www.bouncycastle.org)
+SPDX-License-Identifier: MIT
+
+-----BEGIN ATTRIBUTE CERTIFICATE-----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+-----END ATTRIBUTE CERTIFICATE-----
diff --git a/test/certs/acert_ietf.pem b/test/certs/acert_ietf.pem
new file mode 100644
index 0000000000..fdb6e1114e
--- /dev/null
+++ b/test/certs/acert_ietf.pem
@@ -0,0 +1,15 @@
+-----BEGIN ATTRIBUTE CERTIFICATE-----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+-----END ATTRIBUTE CERTIFICATE-----
diff --git a/test/ciphername_test.c b/test/ciphername_test.c
index c4ec6cadd7..8f10f26ba1 100644
--- a/test/ciphername_test.c
+++ b/test/ciphername_test.c
@@ -361,6 +361,8 @@ static CIPHER_ID_NAME cipher_names[] = {
{0x1303, "TLS_CHACHA20_POLY1305_SHA256"},
{0x1304, "TLS_AES_128_CCM_SHA256"},
{0x1305, "TLS_AES_128_CCM_8_SHA256"},
+ {0xC0B4, "TLS_SHA256_SHA256"},
+ {0xC0B5, "TLS_SHA384_SHA384"},
{0xFEFE, "SSL_RSA_FIPS_WITH_DES_CBC_SHA"},
{0xFEFF, "SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA"},
};
diff --git a/test/clienthellotest.c b/test/clienthellotest.c
index a86f1ab489..935396a1c1 100644
--- a/test/clienthellotest.c
+++ b/test/clienthellotest.c
@@ -164,7 +164,7 @@ static int test_client_hello(int currtest)
* We reset the creation time so that we don't discard the session as
* too old.
*/
- if (!TEST_true(SSL_SESSION_set_time(sess, (long)time(NULL)))
+ if (!TEST_true(SSL_SESSION_set_time_ex(sess, time(NULL)))
|| !TEST_true(SSL_set_session(con, sess)))
goto end;
}
diff --git a/test/cmp_hdr_test.c b/test/cmp_hdr_test.c
index 69f75a24e2..a00d00c46d 100644
--- a/test/cmp_hdr_test.c
+++ b/test/cmp_hdr_test.c
@@ -71,25 +71,30 @@ static int test_HDR_set_get_pvno(void)
static int execute_HDR_get0_senderNonce_test(CMP_HDR_TEST_FIXTURE *fixture)
{
+ int res = 0;
X509_NAME *sender = X509_NAME_new();
ASN1_OCTET_STRING *sn;
if (!TEST_ptr(sender))
- return 0;
+ goto err;
X509_NAME_ADD(sender, "CN", "A common sender name");
if (!TEST_int_eq(OSSL_CMP_CTX_set1_subjectName(fixture->cmp_ctx, sender),
1))
- return 0;
+ goto err;
if (!TEST_int_eq(ossl_cmp_hdr_init(fixture->cmp_ctx, fixture->hdr),
1))
- return 0;
+ goto err;
sn = ossl_cmp_hdr_get0_senderNonce(fixture->hdr);
if (!TEST_int_eq(ASN1_OCTET_STRING_cmp(fixture->cmp_ctx->senderNonce, sn),
0))
- return 0;
+ goto err;
+
+ res = 1;
+err:
X509_NAME_free(sender);
- return 1;
+
+ return res;
}
static int test_HDR_get0_senderNonce(void)
@@ -102,23 +107,28 @@ static int test_HDR_get0_senderNonce(void)
static int execute_HDR_set1_sender_test(CMP_HDR_TEST_FIXTURE *fixture)
{
+ int res = 0;
X509_NAME *x509name = X509_NAME_new();
if (!TEST_ptr(x509name))
- return 0;
+ goto err;
X509_NAME_ADD(x509name, "CN", "A common sender name");
if (!TEST_int_eq(ossl_cmp_hdr_set1_sender(fixture->hdr, x509name), 1))
- return 0;
+ goto err;
+
if (!TEST_int_eq(fixture->hdr->sender->type, GEN_DIRNAME))
- return 0;
+ goto err;
if (!TEST_int_eq(X509_NAME_cmp(fixture->hdr->sender->d.directoryName,
x509name), 0))
- return 0;
+ goto err;
+ res = 1;
+err:
X509_NAME_free(x509name);
- return 1;
+
+ return res;
}
static int test_HDR_set1_sender(void)
@@ -131,24 +141,28 @@ static int test_HDR_set1_sender(void)
static int execute_HDR_set1_recipient_test(CMP_HDR_TEST_FIXTURE *fixture)
{
+ int res = 0;
X509_NAME *x509name = X509_NAME_new();
if (!TEST_ptr(x509name))
- return 0;
+ goto err;
X509_NAME_ADD(x509name, "CN", "A common recipient name");
if (!TEST_int_eq(ossl_cmp_hdr_set1_recipient(fixture->hdr, x509name), 1))
- return 0;
+ goto err;
if (!TEST_int_eq(fixture->hdr->recipient->type, GEN_DIRNAME))
- return 0;
+ goto err;
if (!TEST_int_eq(X509_NAME_cmp(fixture->hdr->recipient->d.directoryName,
x509name), 0))
- return 0;
+ goto err;
+ res = 1;
+err:
X509_NAME_free(x509name);
- return 1;
+
+ return res;
}
static int test_HDR_set1_recipient(void)
@@ -203,7 +217,7 @@ static int execute_HDR_set1_senderKID_test(CMP_HDR_TEST_FIXTURE *fixture)
int res = 0;
if (!TEST_ptr(senderKID))
- return 0;
+ goto err;
if (!TEST_int_eq(ASN1_OCTET_STRING_set(senderKID, rand_data,
sizeof(rand_data)), 1))
@@ -265,7 +279,7 @@ static int execute_HDR_push1_freeText_test(CMP_HDR_TEST_FIXTURE *fixture)
int res = 0;
if (!TEST_ptr(text))
- return 0;
+ goto err;
if (!ASN1_STRING_set(text, "A free text", -1))
goto err;
@@ -280,6 +294,7 @@ static int execute_HDR_push1_freeText_test(CMP_HDR_TEST_FIXTURE *fixture)
res = 1;
err:
ASN1_UTF8STRING_free(text);
+
return res;
}
diff --git a/test/context_internal_test.c b/test/context_internal_test.c
index 8fea53fee1..c829d8111d 100644
--- a/test/context_internal_test.c
+++ b/test/context_internal_test.c
@@ -48,8 +48,36 @@ static int test_set0_default(void)
return testresult;
}
+static int test_set_get_conf_diagnostics(void)
+{
+ OSSL_LIB_CTX *ctx = OSSL_LIB_CTX_new();
+ int res = 0;
+
+ if (!TEST_ptr(ctx))
+ goto err;
+
+ if (!TEST_false(OSSL_LIB_CTX_get_conf_diagnostics(ctx)))
+ goto err;
+
+ OSSL_LIB_CTX_set_conf_diagnostics(ctx, 1);
+
+ if (!TEST_true(OSSL_LIB_CTX_get_conf_diagnostics(ctx)))
+ goto err;
+
+ OSSL_LIB_CTX_set_conf_diagnostics(ctx, 0);
+
+ if (!TEST_false(OSSL_LIB_CTX_get_conf_diagnostics(ctx)))
+ goto err;
+
+ res = 1;
+ err:
+ OSSL_LIB_CTX_free(ctx);
+ return res;
+}
+
int setup_tests(void)
{
ADD_TEST(test_set0_default);
+ ADD_TEST(test_set_get_conf_diagnostics);
return 1;
}
diff --git a/test/ct_test.c b/test/ct_test.c
index 26d5bc1084..7bf4e94029 100644
--- a/test/ct_test.c
+++ b/test/ct_test.c
@@ -450,13 +450,18 @@ static int test_encode_tls_sct(void)
fixture->sct_list = sk_SCT_new_null();
if (fixture->sct_list == NULL)
- return 0;
+ {
+ tear_down(fixture);
+ return 0;
+ }
if (!TEST_ptr(sct = SCT_new_from_base64(SCT_VERSION_V1, log_id,
CT_LOG_ENTRY_TYPE_X509, timestamp,
extensions, signature)))
-
+ {
+ tear_down(fixture);
return 0;
+ }
sk_SCT_push(fixture->sct_list, sct);
fixture->sct_dir = ct_dir;
diff --git a/test/drbgtest.c b/test/drbgtest.c
index 13bc62a4c0..06f7dc3cd8 100644
--- a/test/drbgtest.c
+++ b/test/drbgtest.c
@@ -28,12 +28,6 @@
# include <windows.h>
#endif
-#if defined(__TANDEM)
-# if defined(OPENSSL_TANDEM_FLOSS)
-# include <floss.h(floss_fork)>
-# endif
-#endif
-
#if defined(OPENSSL_SYS_UNIX)
# include <sys/types.h>
# include <sys/wait.h>
diff --git a/test/ec_internal_test.c b/test/ec_internal_test.c
index 5076f9894d..8e99f62105 100644
--- a/test/ec_internal_test.c
+++ b/test/ec_internal_test.c
@@ -16,6 +16,7 @@
#include "testutil.h"
#include <openssl/ec.h>
#include "ec_local.h"
+#include <crypto/bn.h>
#include <openssl/objects.h>
static size_t crv_len = 0;
@@ -433,6 +434,68 @@ end:
return testresult;
}
+
+static int check_bn_mont_ctx(BN_MONT_CTX *mont, BIGNUM *mod, BN_CTX *ctx)
+{
+ int ret = 0;
+ BN_MONT_CTX *regenerated = BN_MONT_CTX_new();
+
+ if (!TEST_ptr(regenerated))
+ return ret;
+ if (!TEST_ptr(mont))
+ goto err;
+
+ if (!TEST_true(BN_MONT_CTX_set(regenerated, mod, ctx)))
+ goto err;
+
+ if (!TEST_true(ossl_bn_mont_ctx_eq(regenerated, mont)))
+ goto err;
+
+ ret = 1;
+
+ err:
+ BN_MONT_CTX_free(regenerated);
+ return ret;
+}
+
+static int montgomery_correctness_test(EC_GROUP *group)
+{
+ int ret = 0;
+ BN_CTX *ctx = NULL;
+
+ ctx = BN_CTX_new();
+ if (!TEST_ptr(ctx))
+ return ret;
+ if (!TEST_true(check_bn_mont_ctx(group->mont_data, group->order, ctx))) {
+ TEST_error("group order issue");
+ goto err;
+ }
+ if (group->field_data1 != NULL) {
+ if (!TEST_true(check_bn_mont_ctx(group->field_data1, group->field, ctx)))
+ goto err;
+ }
+ ret = 1;
+ err:
+ BN_CTX_free(ctx);
+ return ret;
+}
+
+static int named_group_creation_test(void)
+{
+ int ret = 0;
+ EC_GROUP *group = NULL;
+
+ if (!TEST_ptr(group = EC_GROUP_new_by_curve_name(NID_X9_62_prime256v1))
+ || !TEST_true(montgomery_correctness_test(group)))
+ goto err;
+
+ ret = 1;
+