diff --git a/test/d2i-tests/high_tag.der b/test/d2i-tests/high_tag.der new file mode 100644 index 0000000000000000000000000000000000000000..5c523ecde54f87d4ec5b5c0adb362e02f6b6a4e7 Binary files /dev/null and b/test/d2i-tests/high_tag.der differ diff --git a/test/recipes/25-test_d2i.t b/test/recipes/25-test_d2i.t index 9e1a643aaf797093ed633d5cb436fc774478148e..d50de0431b749a9925a9c806ef9002e5b6404797 100644 --- a/test/recipes/25-test_d2i.t +++ b/test/recipes/25-test_d2i.t @@ -15,7 +15,7 @@ use OpenSSL::Test qw/:DEFAULT srctop_file/; setup("test_d2i"); -plan tests => 3; +plan tests => 4; ok(run(test(["d2i_test", "X509", "decode", srctop_file('test','d2i-tests','bad_cert.der')])), @@ -28,3 +28,12 @@ ok(run(test(["d2i_test", "GENERAL_NAME", "decode", ok(run(test(["d2i_test", "ASN1_ANY", "BIO", srctop_file('test','d2i-tests','bad_bio.der')])), "Running d2i_test bad_bio.der"); +# This test checks CVE-2016-2108. The data consists of an tag 258 and +# two zero content octets. This is parsed as an ASN1_ANY type. If the +# type is incorrectly interpreted as an ASN.1 INTEGER the two zero content +# octets will be reject as invalid padding and this test will fail. +# If the type is correctly interpreted it will by treated as an ASN1_STRING +# type and the content octets copied verbatim. +ok(run(test(["d2i_test", "ASN1_ANY", "OK", + srctop_file('test','d2i-tests','high_tag.der')])), + "Running d2i_test high_tag.der");