aboutsummaryrefslogtreecommitdiff
path: root/openssl-1.1.0h/test/recipes/25-test_d2i.t
blob: 688c8ed7ac288bfb745b8494c533812b613d1c7a (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
#! /usr/bin/env perl
# Copyright 2015-2016 The OpenSSL Project Authors. All Rights Reserved.
#
# Licensed under the OpenSSL license (the "License").  You may not use
# this file except in compliance with the License.  You can obtain a copy
# in the file LICENSE in the source distribution or at
# https://www.openssl.org/source/license.html


use strict;
use warnings;

use File::Spec;
use OpenSSL::Test qw/:DEFAULT srctop_file/;
use OpenSSL::Test::Utils;

setup("test_d2i");

plan tests => 14;

ok(run(test(["d2i_test", "X509", "decode",
             srctop_file('test','d2i-tests','bad_cert.der')])),
   "Running d2i_test bad_cert.der");

ok(run(test(["d2i_test", "GENERAL_NAME", "decode",
             srctop_file('test','d2i-tests','bad_generalname.der')])),
   "Running d2i_test bad_generalname.der");

ok(run(test(["d2i_test", "ASN1_ANY", "BIO",
             srctop_file('test','d2i-tests','bad_bio.der')])),
   "Running d2i_test bad_bio.der");
# This test checks CVE-2016-2108. The data consists of an tag 258 and
# two zero content octets. This is parsed as an ASN1_ANY type. If the
# type is incorrectly interpreted as an ASN.1 INTEGER the two zero content
# octets will be reject as invalid padding and this test will fail.
# If the type is correctly interpreted it will by treated as an ASN1_STRING
# type and the content octets copied verbatim.
ok(run(test(["d2i_test", "ASN1_ANY", "OK",
             srctop_file('test','d2i-tests','high_tag.der')])),
   "Running d2i_test high_tag.der");

# Above test data but interpreted as ASN.1 INTEGER: this will be rejected
# because the tag is invalid.
ok(run(test(["d2i_test", "ASN1_INTEGER", "decode",
             srctop_file('test','d2i-tests','high_tag.der')])),
   "Running d2i_test high_tag.der INTEGER");

# Parse valid 0, 1 and -1 ASN.1 INTEGER as INTEGER or ANY.

ok(run(test(["d2i_test", "ASN1_INTEGER", "OK",
             srctop_file('test','d2i-tests','int0.der')])),
   "Running d2i_test int0.der INTEGER");

ok(run(test(["d2i_test", "ASN1_INTEGER", "OK",
             srctop_file('test','d2i-tests','int1.der')])),
   "Running d2i_test int1.der INTEGER");

ok(run(test(["d2i_test", "ASN1_INTEGER", "OK",
             srctop_file('test','d2i-tests','intminus1.der')])),
   "Running d2i_test intminus1.der INTEGER");

ok(run(test(["d2i_test", "ASN1_ANY", "OK",
             srctop_file('test','d2i-tests','int0.der')])),
   "Running d2i_test int0.der ANY");

ok(run(test(["d2i_test", "ASN1_ANY", "OK",
             srctop_file('test','d2i-tests','int1.der')])),
   "Running d2i_test int1.der ANY");

ok(run(test(["d2i_test", "ASN1_ANY", "OK",
             srctop_file('test','d2i-tests','intminus1.der')])),
   "Running d2i_test intminus1.der ANY");

# Integers with illegal additional padding.

ok(run(test(["d2i_test", "ASN1_INTEGER", "decode",
             srctop_file('test','d2i-tests','bad-int-pad0.der')])),
   "Running d2i_test bad-int-pad0.der INTEGER");

ok(run(test(["d2i_test", "ASN1_INTEGER", "decode",
             srctop_file('test','d2i-tests','bad-int-padminus1.der')])),
   "Running d2i_test bad-int-padminus1.der INTEGER");

SKIP: {
  skip "No CMS support in this configuration", 1 if disabled("cms");

  # Invalid CMS structure with decode error in CHOICE value.
  # Test for CVE-2016-7053

  ok(run(test(["d2i_test", "CMS_ContentInfo", "decode",
               srctop_file('test','d2i-tests','bad-cms.der')])),
     "Running d2i_test bad-cms.der CMS ContentInfo");
}