提交 1576dfe0 编写于 作者: M Matt Caswell

Test that we can use the FIPS provider

Reviewed-by: NRichard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/8537)
上级 e7545517
...@@ -186,6 +186,9 @@ IF[{- !$disabled{tests} -}] ...@@ -186,6 +186,9 @@ IF[{- !$disabled{tests} -}]
SOURCE[evp_extra_test]=evp_extra_test.c SOURCE[evp_extra_test]=evp_extra_test.c
INCLUDE[evp_extra_test]=../include ../apps/include ../crypto/include INCLUDE[evp_extra_test]=../include ../apps/include ../crypto/include
DEPEND[evp_extra_test]=../libcrypto libtestutil.a DEPEND[evp_extra_test]=../libcrypto libtestutil.a
IF[{- $disabled{fips} || !$target{dso_scheme} -}]
DEFINE[evp_extra_test]=NO_FIPS_MODULE
ENDIF
SOURCE[igetest]=igetest.c SOURCE[igetest]=igetest.c
INCLUDE[igetest]=../include ../apps/include INCLUDE[igetest]=../include ../apps/include
......
...@@ -1098,12 +1098,14 @@ static int calculate_digest(const EVP_MD *md, const char *msg, size_t len, ...@@ -1098,12 +1098,14 @@ static int calculate_digest(const EVP_MD *md, const char *msg, size_t len,
* Test 0: Test with the default OPENSSL_CTX * Test 0: Test with the default OPENSSL_CTX
* Test 1: Test with an explicit OPENSSL_CTX * Test 1: Test with an explicit OPENSSL_CTX
* Test 2: Explicit OPENSSL_CTX with explicit load of default provider * Test 2: Explicit OPENSSL_CTX with explicit load of default provider
* Test 3: Explicit OPENSSL_CTX with explicit load of default and fips provider
* Test 4: Explicit OPENSSL_CTX with explicit load of fips provider
*/ */
static int test_EVP_MD_fetch(int tst) static int test_EVP_MD_fetch(int tst)
{ {
OPENSSL_CTX *ctx = NULL; OPENSSL_CTX *ctx = NULL;
EVP_MD *md = NULL; EVP_MD *md = NULL;
OSSL_PROVIDER *prov = NULL; OSSL_PROVIDER *defltprov = NULL, *fipsprov = NULL;
int ret = 0; int ret = 0;
const char testmsg[] = "Hello world"; const char testmsg[] = "Hello world";
const unsigned char exptd[] = { const unsigned char exptd[] = {
...@@ -1117,9 +1119,14 @@ static int test_EVP_MD_fetch(int tst) ...@@ -1117,9 +1119,14 @@ static int test_EVP_MD_fetch(int tst)
if (!TEST_ptr(ctx)) if (!TEST_ptr(ctx))
goto err; goto err;
if (tst == 2) { if (tst == 2 || tst == 3) {
prov = OSSL_PROVIDER_load(ctx, "default"); defltprov = OSSL_PROVIDER_load(ctx, "default");
if (!TEST_ptr(prov)) if (!TEST_ptr(defltprov))
goto err;
}
if (tst == 3 || tst == 4) {
fipsprov = OSSL_PROVIDER_load(ctx, "fips");
if (!TEST_ptr(fipsprov))
goto err; goto err;
} }
} }
...@@ -1132,8 +1139,8 @@ static int test_EVP_MD_fetch(int tst) ...@@ -1132,8 +1139,8 @@ static int test_EVP_MD_fetch(int tst)
goto err; goto err;
/* /*
* Test that without loading any providers or specifying any properties we * Test that without specifying any properties we can get a sha256 md from a
* can get a sha256 md from the default provider. * provider.
*/ */
if (!TEST_ptr(md = EVP_MD_fetch(ctx, "SHA256", NULL)) if (!TEST_ptr(md = EVP_MD_fetch(ctx, "SHA256", NULL))
|| !TEST_ptr(md) || !TEST_ptr(md)
...@@ -1152,28 +1159,67 @@ static int test_EVP_MD_fetch(int tst) ...@@ -1152,28 +1159,67 @@ static int test_EVP_MD_fetch(int tst)
md = NULL; md = NULL;
/* /*
* We've only loaded the default provider so explicitly asking for a * In tests 0 - 2 we've only loaded the default provider so explicitly
* non-default implementation should fail. * asking for a non-default implementation should fail. In tests 3 and 4 we
* have the FIPS provider loaded so we should succeed in that case.
*/ */
if (!TEST_ptr_null(md = EVP_MD_fetch(ctx, "SHA256", "default=no"))) md = EVP_MD_fetch(ctx, "SHA256", "default=no");
goto err; if (tst == 3 || tst == 4) {
if (!TEST_ptr(md)
|| !TEST_true(calculate_digest(md, testmsg, sizeof(testmsg),
exptd)))
goto err;
} else {
if (!TEST_ptr_null(md))
goto err;
}
/* Explicitly asking for the default implementation should succeeed */ EVP_MD_meth_free(md);
if (!TEST_ptr(md = EVP_MD_fetch(ctx, "SHA256", "default=yes")) md = NULL;
|| !TEST_int_eq(EVP_MD_nid(md), NID_sha256)
|| !TEST_true(calculate_digest(md, testmsg, sizeof(testmsg), exptd)) /*
|| !TEST_int_eq(EVP_MD_size(md), SHA256_DIGEST_LENGTH) * Explicitly asking for the default implementation should succeeed except
|| !TEST_int_eq(EVP_MD_block_size(md), SHA256_CBLOCK)) * in test 4 where the default provider is not loaded.
goto err; */
md = EVP_MD_fetch(ctx, "SHA256", "default=yes");
if (tst != 4) {
if (!TEST_ptr(md)
|| !TEST_int_eq(EVP_MD_nid(md), NID_sha256)
|| !TEST_true(calculate_digest(md, testmsg, sizeof(testmsg),
exptd))
|| !TEST_int_eq(EVP_MD_size(md), SHA256_DIGEST_LENGTH)
|| !TEST_int_eq(EVP_MD_block_size(md), SHA256_CBLOCK))
goto err;
} else {
if (!TEST_ptr_null(md))
goto err;
}
EVP_MD_meth_free(md); EVP_MD_meth_free(md);
md = NULL; md = NULL;
/*
* Explicitly asking for a fips implementation should succeed if we have
* the FIPS provider loaded and fail otherwise
*/
md = EVP_MD_fetch(ctx, "SHA256", "fips=yes");
if (tst == 3 || tst == 4) {
if (!TEST_ptr(md)
|| !TEST_true(calculate_digest(md, testmsg, sizeof(testmsg),
exptd)))
goto err;
} else {
if (!TEST_ptr_null(md))
goto err;
}
ret = 1; ret = 1;
err: err:
EVP_MD_meth_free(md); EVP_MD_meth_free(md);
OSSL_PROVIDER_unload(prov); OSSL_PROVIDER_unload(defltprov);
OSSL_PROVIDER_unload(fipsprov);
OPENSSL_CTX_free(ctx); OPENSSL_CTX_free(ctx);
return ret; return ret;
} }
...@@ -1207,6 +1253,10 @@ int setup_tests(void) ...@@ -1207,6 +1253,10 @@ int setup_tests(void)
ADD_ALL_TESTS(test_invalide_ec_char2_pub_range_decode, ADD_ALL_TESTS(test_invalide_ec_char2_pub_range_decode,
OSSL_NELEM(ec_der_pub_keys)); OSSL_NELEM(ec_der_pub_keys));
#endif #endif
#ifdef NO_FIPS_MODULE
ADD_ALL_TESTS(test_EVP_MD_fetch, 3); ADD_ALL_TESTS(test_EVP_MD_fetch, 3);
#else
ADD_ALL_TESTS(test_EVP_MD_fetch, 5);
#endif
return 1; return 1;
} }
...@@ -10,9 +10,12 @@ ...@@ -10,9 +10,12 @@
use strict; use strict;
use warnings; use warnings;
use OpenSSL::Test; use OpenSSL::Test qw/:DEFAULT bldtop_dir/;
setup("test_evp_extra"); setup("test_evp_extra");
plan tests => 1; plan tests => 1;
$ENV{OPENSSL_MODULES} = bldtop_dir("providers");
ok(run(test(["evp_extra_test"])), "running evp_extra_test"); ok(run(test(["evp_extra_test"])), "running evp_extra_test");
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册